<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='14. April 2026 23:34 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/salesforce-investigates-new-incident-echoing-salesloft-drift-compromise/</loc>
		<lastmod>2025-11-20T22:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-infects-routers-to-hijack-software-updates/</loc>
		<lastmod>2025-11-20T22:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/same-old-security-problems-cyber-training-still-fails-miserably/</loc>
		<lastmod>2025-11-20T22:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-advisory-salesforce-gainsight-incident/</loc>
		<lastmod>2025-11-20T23:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-penetration-testing-supports-iso-27001-certification/</loc>
		<lastmod>2025-11-20T23:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-investigating-campaign-targeting-customer-environments-connected-to-gainsight-app/</loc>
		<lastmod>2025-11-20T23:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-oversight-board-finds-fbi-does-not-buy-real-time-location-data/</loc>
		<lastmod>2025-11-20T23:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-linked-data-breach-claims-200-victims-has-shinyhunters-fingerprints-all-over-it/</loc>
		<lastmod>2025-11-20T23:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enisa-is-now-a-cve-program-root/</loc>
		<lastmod>2025-11-20T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5m-settlement-in-geisinger-health-nuance-insider-breach/</loc>
		<lastmod>2025-11-20T23:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shine-a-light-infrared-imaging-for-hardware-assurance/</loc>
		<lastmod>2025-11-20T23:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-targets-bulletproof-services-that-hosted-ransomware-gangs/</loc>
		<lastmod>2025-11-20T23:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-indicted-in-alleged-conspiracy-to-smuggle-supercomputers-and-nvidia-chips-to-china/</loc>
		<lastmod>2025-11-20T23:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-exposes-badaudio-malware-used-in-apt24-espionage-campaigns/</loc>
		<lastmod>2025-11-20T23:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-experts-optimistic-about-future-ai-security-technology/</loc>
		<lastmod>2025-11-21T00:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-stable-ai-systems-contribute-to-cloud-security/</loc>
		<lastmod>2025-11-21T00:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-effective-secrets-security-fit-within-a-tight-budget/</loc>
		<lastmod>2025-11-21T00:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-enterprises-freely-choose-scalable-agentic-ai-solutions/</loc>
		<lastmod>2025-11-21T00:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-civil-fraud-case-against-solarwinds/</loc>
		<lastmod>2025-11-21T00:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-experts-optimistic-about-future-ai-security-technology-2/</loc>
		<lastmod>2025-11-21T00:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-cuts-off-access-to-third-party-app-after-discovering-unusual-activity/</loc>
		<lastmod>2025-11-21T00:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-case-against-solarwinds-tied-to-monumental-breach/</loc>
		<lastmod>2025-11-21T00:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-salesforce-customers-hit-by-yet-another-third-party-vendor-breach/</loc>
		<lastmod>2025-11-21T00:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nso-group-argues-whatsapp-injunction-threatens-existence-future-u-s-government-work/</loc>
		<lastmod>2025-11-21T00:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zukunftsfahige-ganzheitliche-sicherheitskultur-vdi-stellt-wiki-zu-safety-und-security-bereit/</loc>
		<lastmod>2025-11-21T00:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-cuts-off-access-to-third-party-app-after-discovering-unusual-activity-2/</loc>
		<lastmod>2025-11-21T00:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-publiziert-positionspapier-zum-digitalen-omnibus-der-eu/</loc>
		<lastmod>2025-11-21T00:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-solarwinds-lawsuit-that-painted-a-target-on-cisos-everywhere/</loc>
		<lastmod>2025-11-21T00:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-devised-a-new-enumeration-technique-that-exposed-3-5b-whatsapp-profiles/</loc>
		<lastmod>2025-11-21T00:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-hack-salesforce-instances-via-gainsight-apps/</loc>
		<lastmod>2025-11-21T00:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critics-say-white-houses-draft-ai-order-is-a-power-grab/</loc>
		<lastmod>2025-11-21T00:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-people-indicted-in-alleged-conspiracy-to-smuggle-supercomputers-and-nvidia-chips-to-china/</loc>
		<lastmod>2025-11-21T00:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unified-compliance-with-ai-optimizing-regulatory-demands-with-internal-tools/</loc>
		<lastmod>2025-11-21T00:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/morpheus-on-microsoft-ai-soc-platform-for-mssps-managing-sentinel-defender-entra-and-more/</loc>
		<lastmod>2025-11-21T00:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-wsus-rce-cve-2025-59287-actively-exploited-to-deploy-shadowpad-backdoor/</loc>
		<lastmod>2025-11-21T01:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-drug-funds-flowed-into-bank-tied-to-russian-spy-services-military/</loc>
		<lastmod>2025-11-21T01:00:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisrichtlinie-von-deutschland-beschlossen/</loc>
		<lastmod>2025-11-21T01:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zooms-ai-avatar-watermark-is-security-theatre-and-attackers-already-know-it/</loc>
		<lastmod>2025-11-21T05:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rewriting-the-rules-of-platform-engineering-with-idps-and-eks/</loc>
		<lastmod>2025-11-21T05:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zooms-ai-avatar-watermark-is-security-theatre-and-attackers-already-know-it-2/</loc>
		<lastmod>2025-11-21T05:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rewriting-the-rules-of-platform-engineering-with-idps-and-eks-2/</loc>
		<lastmod>2025-11-21T05:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-nis2-gnadenfrist-lauft-ab/</loc>
		<lastmod>2025-11-21T05:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-betrug-bei-zahlungen-nimmt-an-geschwindigkeit-und-umfang-zu/</loc>
		<lastmod>2025-11-21T05:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sneaky2fa-phishing-tool-adds-ability-to-insert-legit-looking-urls/</loc>
		<lastmod>2025-11-21T05:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-nis2-gnadenfrist-lauft-ab-2/</loc>
		<lastmod>2025-11-21T05:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zooms-ai-avatar-watermark-is-security-theatre-and-attackers-already-know-it-3/</loc>
		<lastmod>2025-11-21T05:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-betrug-bei-zahlungen-nimmt-an-geschwindigkeit-und-umfang-zu-2/</loc>
		<lastmod>2025-11-21T05:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sneaky2fa-phishing-tool-adds-ability-to-insert-legit-looking-urls-2/</loc>
		<lastmod>2025-11-21T05:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rewriting-the-rules-of-platform-engineering-with-idps-and-eks-3/</loc>
		<lastmod>2025-11-21T05:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-remaining-claims-against-solarwinds-over-2020-hack/</loc>
		<lastmod>2025-11-21T05:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-links-androids-quick-share-to-apples-airdrop-without-cupertinos-help/</loc>
		<lastmod>2025-11-21T05:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devs-gripe-about-having-ai-shoved-down-their-throats/</loc>
		<lastmod>2025-11-21T05:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-remaining-claims-against-solarwinds-over-2020-hack-2/</loc>
		<lastmod>2025-11-21T05:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-money-launderers-bought-a-bank-to-disguise-ransomware-profit/</loc>
		<lastmod>2025-11-21T05:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-links-androids-quick-share-to-apples-airdrop-without-cupertinos-help-2/</loc>
		<lastmod>2025-11-21T05:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convenience-culture-is-breaking-personal-security/</loc>
		<lastmod>2025-11-21T05:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-november-21-2025/</loc>
		<lastmod>2025-11-21T06:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convenience-culture-is-breaking-personal-security-2/</loc>
		<lastmod>2025-11-21T06:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-irans-cyber-objectives-what-do-they-want/</loc>
		<lastmod>2025-11-21T06:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-november-21-2025-2/</loc>
		<lastmod>2025-11-21T06:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-weihnacht-soziale-medien-und-online-marktplatze-sind-hochburgen-fur-betrugsversuche/</loc>
		<lastmod>2025-11-21T07:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-iphone-google-pixel-airdrop-und-quick-share-auf-android-sind-jetzt-kompatibel/</loc>
		<lastmod>2025-11-21T07:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-insurers-really-look-at-in-your-identity-controls/</loc>
		<lastmod>2025-11-21T07:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-weihnacht-soziale-medien-und-online-marktplatze-sind-hochburgen-fur-betrugsversuche-2/</loc>
		<lastmod>2025-11-21T07:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-one-quick-ai-check-can-leak-your-companys-secrets/</loc>
		<lastmod>2025-11-21T07:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-iphone-google-pixel-airdrop-und-quick-share-auf-android-sind-jetzt-kompatibel-2/</loc>
		<lastmod>2025-11-21T07:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-to-steal-2-3tb-data-from-italian-rail-group-almaviva/</loc>
		<lastmod>2025-11-21T07:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-insurers-really-look-at-in-your-identity-controls-2/</loc>
		<lastmod>2025-11-21T07:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-one-quick-ai-check-can-leak-your-companys-secrets-2/</loc>
		<lastmod>2025-11-21T07:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-flags-unauthorized-data-access-via-gainsight-linked-oauth-activity/</loc>
		<lastmod>2025-11-21T07:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datei-injection-und-rechteausweitung-sechs-sicherheitslucken-in-ibms-qradar-und-aix/</loc>
		<lastmod>2025-11-21T07:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-token-compromise-hits-salesforce-ecosystem-again-gainsight-impacted/</loc>
		<lastmod>2025-11-21T19:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-turn-threat-intel-into-real-security-wins-2/</loc>
		<lastmod>2025-11-21T19:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-music-store/</loc>
		<lastmod>2025-11-21T19:14:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-token-compromise-hits-salesforce-ecosystem-again-gainsight-impacted-2/</loc>
		<lastmod>2025-11-21T19:14:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-seize-a-new-hostage-your-aws-s3-buckets/</loc>
		<lastmod>2025-11-21T19:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-music-store-2/</loc>
		<lastmod>2025-11-21T19:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-it-viele-fachkrafte-nutzen-ki-ohne-erlaubnis/</loc>
		<lastmod>2025-11-21T19:15:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recognizing-and-responding-to-cyber-threats-what-differentiates-ndr-edr-and-xdr/</loc>
		<lastmod>2025-11-21T19:15:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-causes-of-security-breaches-remain-elusive-jeopardizing-resilience/</loc>
		<lastmod>2025-11-21T19:15:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-it-viele-fachkrafte-nutzen-ki-ohne-erlaubnis-2/</loc>
		<lastmod>2025-11-21T19:16:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-10-hottest-cybersecurity-products-of-2025/</loc>
		<lastmod>2025-11-21T19:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recognizing-and-responding-to-cyber-threats-what-differentiates-ndr-edr-and-xdr-2/</loc>
		<lastmod>2025-11-21T19:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/local-law-enforcement-agencies-in-oklahoma-massachusetts-responding-to-cyber-incidents/</loc>
		<lastmod>2025-11-21T19:16:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-safety-cameras-used-to-monitor-protesters-rights-group-finds/</loc>
		<lastmod>2025-11-21T19:17:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-apt31-linked-to-hacks-on-russian-tech-firms/</loc>
		<lastmod>2025-11-21T19:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-voluntarily-dismisses-solarwinds-lawsuit/</loc>
		<lastmod>2025-11-21T19:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-suspected-scattered-spider-hackers-plead-not-guilty-over-transport-for-london-cyberattack/</loc>
		<lastmod>2025-11-21T19:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legacy-web-forms-are-the-weakest-link-in-government-data-security/</loc>
		<lastmod>2025-11-21T19:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-safety-fallt-durch-den-sicherheitstest/</loc>
		<lastmod>2025-11-21T19:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storage-checkliste-2025-den-speicher-anforderungen-von-heute-und-morgen-genugen/</loc>
		<lastmod>2025-11-21T19:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fahrlassige-unternehmen-strategien-zur-betrugspravention-haufig-noch-blinder-fleck-in-der-chefetage/</loc>
		<lastmod>2025-11-21T19:18:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-hackers-stole-data-from-200-companies-following-gainsight-breach/</loc>
		<lastmod>2025-11-21T19:18:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/despite-chinese-hacks-trumps-fcc-votes-to-scrap-cybersecurity-rules-for-phone-and-internet-companies/</loc>
		<lastmod>2025-11-21T19:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-safety-fallt-durch-den-sicherheitstest-2/</loc>
		<lastmod>2025-11-21T19:19:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-formula-1-las-vegas-grand-prix-faces-rising-cybercrime-threats-experts-caution/</loc>
		<lastmod>2025-11-21T19:20:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-in-warns-of-critical-asus-router-flaw-exposing-millions-in-india/</loc>
		<lastmod>2025-11-21T19:20:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugerische-domains-und-e-commerce-fakes-steigen-zum-black-friday-massiv-an/</loc>
		<lastmod>2025-11-21T19:20:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-management-die-unsichtbare-kraft-hinter-stabilen-it-services/</loc>
		<lastmod>2025-11-21T19:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ai-bill-of-materials-die-blaupause-fur-sichere-ki-modelle-ist/</loc>
		<lastmod>2025-11-21T19:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-formula-1-las-vegas-grand-prix-faces-rising-cybercrime-threats-experts-caution-2/</loc>
		<lastmod>2025-11-21T19:21:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-charged-over-alleged-plot-to-smuggle-nvidia-ai-chips-into-china/</loc>
		<lastmod>2025-11-21T19:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-crooks-bought-a-bank-for-christmas-to-launder-cyber-loot/</loc>
		<lastmod>2025-11-21T19:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sturnus-android-malware-reads-whatsapp-telegram-signal-chats-via-accessibility-abuse/</loc>
		<lastmod>2025-11-21T19:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-breach-gainsight-apps-on-salesforce-claim-data-from-1000-firms/</loc>
		<lastmod>2025-11-21T19:23:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-addressed-three-critical-flaws-in-serv-u/</loc>
		<lastmod>2025-11-21T19:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-charged-over-alleged-plot-to-smuggle-nvidia-ai-chips-into-china-2/</loc>
		<lastmod>2025-11-21T19:23:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-data-leak-hits-italian-railway-operator-ferrovie-dello-stato-via-almaviva-hack/</loc>
		<lastmod>2025-11-21T19:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-alerts-users-to-potential-data-exposure-via-gainsight-oauth-apps/</loc>
		<lastmod>2025-11-21T19:24:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-inside-the-staffing-crisis-crippling-cisa/</loc>
		<lastmod>2025-11-21T19:25:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-risks-rise-as-enterprises-scale-agents/</loc>
		<lastmod>2025-11-21T19:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-data-leak-hits-italian-railway-operator-ferrovie-dello-stato-via-almaviva-hack-2/</loc>
		<lastmod>2025-11-21T19:25:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-scim-flaw-allows-admin-impersonation-and-full-takeover/</loc>
		<lastmod>2025-11-21T19:25:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-alerts-users-to-potential-data-exposure-via-gainsight-oauth-apps-2/</loc>
		<lastmod>2025-11-21T19:25:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/these-gentlemen-arent-gentle-rapidly-evolving-ransomware-threat/</loc>
		<lastmod>2025-11-21T19:26:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-comet-browser-api-allowed-dangerous-local-command-execution/</loc>
		<lastmod>2025-11-21T19:26:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allies-sanction-russian-network-behind-major-cyberattacks/</loc>
		<lastmod>2025-11-21T19:27:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-digital-id-scheme-cash-will-come-from-existing-funds/</loc>
		<lastmod>2025-11-21T19:27:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-foundry-ties-in-with-agent-365/</loc>
		<lastmod>2025-11-21T19:27:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-gainsight-compromise-early-findings-and-customer-guidance/</loc>
		<lastmod>2025-11-21T19:27:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/research-shows-identity-document-checks-are-missing-key-signals/</loc>
		<lastmod>2025-11-21T19:28:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-hacker-conference-installed-a-literal-anti-virus-monitoring-system/</loc>
		<lastmod>2025-11-21T19:28:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-confirms-new-breach-linked-to-gainsight-apps/</loc>
		<lastmod>2025-11-21T19:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enisa-becomes-cve-program-root-strengthening-europes-vulnerability-management-framework/</loc>
		<lastmod>2025-11-21T19:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-gainsight-compromise-early-findings-and-customer-guidance-2/</loc>
		<lastmod>2025-11-21T19:28:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outband-update-fixes-windows-11-hotpatch-install-loop/</loc>
		<lastmod>2025-11-21T19:29:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-warns-of-max-severity-admin-spoofing-vulnerability/</loc>
		<lastmod>2025-11-21T19:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-catches-insider-feeding-information-to-hackers/</loc>
		<lastmod>2025-11-21T19:30:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-rolls-back-cybersecurity-rules-for-telcos-despite-state-hacking-risks/</loc>
		<lastmod>2025-11-21T19:30:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-teens-plead-not-guilty-to-uk-transport-hack/</loc>
		<lastmod>2025-11-21T19:30:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avast-makes-ai-driven-scam-defense-available-for-free-worldwide/</loc>
		<lastmod>2025-11-21T19:31:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-begins-showing-ads-in-ai-mode-ai-answers/</loc>
		<lastmod>2025-11-21T19:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-azure-bastion-vulnerability-lets-attackers-bypass-login-and-gain-higher-privileges/</loc>
		<lastmod>2025-11-21T19:32:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xillen-stealer-advanced-features-bypass-ai-detection-and-steal-password-manager-data/</loc>
		<lastmod>2025-11-21T19:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avast-makes-ai-driven-scam-defense-available-for-free-worldwide-2/</loc>
		<lastmod>2025-11-21T19:32:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-obfuscated-malicious-apps-bypassing-antivirus-detection-to-deliver-malicious-payloads/</loc>
		<lastmod>2025-11-21T19:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-begins-showing-ads-in-ai-mode-ai-answers-2/</loc>
		<lastmod>2025-11-21T19:33:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-job-market-evolved-prioritizes-practical-skills-over-formal-education/</loc>
		<lastmod>2025-11-21T19:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-kimsuky-and-lazarus-teams-target-critical-sectors-with-zero-day-exploits/</loc>
		<lastmod>2025-11-21T19:33:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-to-prevent-bsod-error-messages-from-showing-publicly/</loc>
		<lastmod>2025-11-21T19:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-adopt-matrix-push-c2-for-browser-based-malware-and-phishing-attacks/</loc>
		<lastmod>2025-11-21T19:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-job-market-evolved-prioritizes-practical-skills-over-formal-education-2/</loc>
		<lastmod>2025-11-21T19:34:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc2891-hackers-use-raspberry-pi-and-fake-cards-to-steal-atm-cash/</loc>
		<lastmod>2025-11-21T19:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-kimsuky-and-lazarus-teams-target-critical-sectors-with-zero-day-exploits-2/</loc>
		<lastmod>2025-11-21T19:35:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clop-ransomware-claims-broadcom-breach-through-e-business-suite-0-day/</loc>
		<lastmod>2025-11-21T19:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-grafana-flaw-lets-attackers-escalate-privileges/</loc>
		<lastmod>2025-11-21T19:36:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clop-ransomware-claims-broadcom-breach-through-e-business-suite-0-day-2/</loc>
		<lastmod>2025-11-21T19:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-ai-reshaping-entry-level-cyber-what-happens-to-the-security-talent-pipeline/</loc>
		<lastmod>2025-11-21T19:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-grafana-flaw-lets-attackers-escalate-privileges-2/</loc>
		<lastmod>2025-11-21T19:37:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/switching-to-offense-us-makes-cyber-strategy-changes/</loc>
		<lastmod>2025-11-21T19:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-ai-reshaping-entry-level-cyber-what-happens-to-the-security-talent-pipeline-2/</loc>
		<lastmod>2025-11-21T19:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-win-what-cybersecurity-can-learn-from-the-paddock/</loc>
		<lastmod>2025-11-21T19:38:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/switching-to-offense-us-makes-cyber-strategy-changes-2/</loc>
		<lastmod>2025-11-21T19:38:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clop-ransomware-claims-broadcom-breach-through-e-business-suite-0-day-3/</loc>
		<lastmod>2025-11-21T19:38:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-plushdaemon-hackers-infect-routers-to-hijack-software-updates/</loc>
		<lastmod>2025-11-21T19:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-plushdaemon-hackers-infect-routers-to-hijack-software-updates-2/</loc>
		<lastmod>2025-11-21T19:38:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-plushdaemon-hackers-infect-routers-to-hijack-software-updates-3/</loc>
		<lastmod>2025-11-21T19:38:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation/</loc>
		<lastmod>2025-11-21T19:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation/</loc>
		<lastmod>2025-11-21T19:39:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation/</loc>
		<lastmod>2025-11-21T19:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-airdrop-compatibility-to-androids-quick-share-using-rust-hardened-security/</loc>
		<lastmod>2025-11-21T19:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-airdrop-compatibility-to-androids-quick-share-using-rust-hardened-security/</loc>
		<lastmod>2025-11-21T19:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-airdrop-compatibility-to-androids-quick-share-using-rust-hardened-security/</loc>
		<lastmod>2025-11-21T19:39:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-it-admins-choose-samsung-for-mobile-security/</loc>
		<lastmod>2025-11-21T19:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-it-admins-choose-samsung-for-mobile-security-2/</loc>
		<lastmod>2025-11-21T19:40:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-it-admins-choose-samsung-for-mobile-security-2/</loc>
		<lastmod>2025-11-21T19:40:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-plushdaemon-hackers-infect-routers-to-hijack-software-updates-4/</loc>
		<lastmod>2025-11-21T19:40:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt24-deploys-badaudio-in-years-long-espionage-hitting-taiwan-and-1000-domains/</loc>
		<lastmod>2025-11-21T19:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt24-deploys-badaudio-in-years-long-espionage-hitting-taiwan-and-1000-domains/</loc>
		<lastmod>2025-11-21T19:40:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt24-deploys-badaudio-in-years-long-espionage-hitting-taiwan-and-1000-domains/</loc>
		<lastmod>2025-11-21T19:40:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation-2/</loc>
		<lastmod>2025-11-21T19:40:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-airdrop-compatibility-to-androids-quick-share-using-rust-hardened-security-2/</loc>
		<lastmod>2025-11-21T19:41:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-plushdaemon-hackers-infect-routers-to-hijack-software-updates-5/</loc>
		<lastmod>2025-11-21T19:41:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-solarwinds-case-after-years-of-high-stakes-cybersecurity-scrutiny/</loc>
		<lastmod>2025-11-21T19:42:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-warns-of-poc-exploit-for-7-zip-symbolic-linkbased-rce-vulnerability/</loc>
		<lastmod>2025-11-21T19:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-browser-push-notifications-to-deliver-malware/</loc>
		<lastmod>2025-11-21T19:42:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gainsight-supply-chain-hack-could-affect-salesforce-customers/</loc>
		<lastmod>2025-11-21T19:42:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-drops-solarwinds-case-after-years-of-high-stakes-cybersecurity-scrutiny-2/</loc>
		<lastmod>2025-11-21T19:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-sicherheit-3-von-10-cyberattacken-zielen-auf-zulieferer/</loc>
		<lastmod>2025-11-21T19:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-zu-oauth-cors-und-supply-chain-risiken-in-devops-fehlkonfiguriertes-mcp-sdk-von-anthropic-gefahrdet-die-lieferkette/</loc>
		<lastmod>2025-11-21T19:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonome-arbeitswelt-palo-alto-kundigt-cortex-agentix-fur-sichere-ki-agenten-an/</loc>
		<lastmod>2025-11-21T19:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-schatten-ki-zu-einem-wachsenden-sicherheitsrisiko-wird-schatten-ki-als-risiko-fur-sicherheit-und-compliance-in-unternehmen/</loc>
		<lastmod>2025-11-21T19:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-security-strategien-unterstutzt-automatisierte-compliance-governance-und-sicherheit-in-der-cloud/</loc>
		<lastmod>2025-11-21T19:44:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-zu-oauth-cors-und-supply-chain-risiken-in-devops-fehlkonfiguriertes-mcp-sdk-von-anthropic-gefahrdet-die-lieferkette-2/</loc>
		<lastmod>2025-11-21T19:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzung-in-deutschland-mit-haftung-und-meldepflicht-im-fokus-nis-2-in-der-praxis-zeigt-die-6-typischen-fehler-bei-der-umsetzung/</loc>
		<lastmod>2025-11-21T19:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-whitepaper-warum-eine-aibom-die-blaupause-fur-sichere-ki-modelle-ist/</loc>
		<lastmod>2025-11-21T19:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugerische-domains-und-e-commerce-fakes-steigen-massiv-an/</loc>
		<lastmod>2025-11-21T19:46:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-und-microsoft-bringen-ki-sicherheit-direkt-in-microsoft-copilot/</loc>
		<lastmod>2025-11-21T19:46:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gesteht-kernfunktionen-von-windows-11-seit-monaten-kaputt/</loc>
		<lastmod>2025-11-21T19:46:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ace-und-dazn-illegaler-streamingdienst-mit-millionen-nutzern-zerschlagen/</loc>
		<lastmod>2025-11-21T19:46:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-entlassung-exmitarbeiter-sperrt-ehemalige-kollegen-aus-it-systemen-aus/</loc>
		<lastmod>2025-11-21T19:47:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workload-and-agentic-identity-at-scale-insights-from-cyberarks-workload-identity-day-zero/</loc>
		<lastmod>2025-11-21T19:07:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technical-debt-vs-innovation-debt-why-both-slow-you-down-but-only-one-threatens-your-future-in-the-age-of-ai/</loc>
		<lastmod>2025-11-21T19:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-global-agencies-target-criminal-bulletproof-hosts-as-csa-unveils-agentic-ai-risk-framework/</loc>
		<lastmod>2025-11-21T19:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workload-and-agentic-identity-at-scale-insights-from-cyberarks-workload-identity-day-zero-2/</loc>
		<lastmod>2025-11-21T19:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technical-debt-vs-innovation-debt-why-both-slow-you-down-but-only-one-threatens-your-future-in-the-age-of-ai-2/</loc>
		<lastmod>2025-11-21T19:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-network-monitoring-matters-how-seceon-enables-proactive-intelligent-cyber-defence/</loc>
		<lastmod>2025-11-21T19:09:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-global-agencies-target-criminal-bulletproof-hosts-as-csa-unveils-agentic-ai-risk-framework-2/</loc>
		<lastmod>2025-11-21T19:09:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-new-in-cloud-monitor-classroom-manager-smarter-tools-for-k12-classrooms/</loc>
		<lastmod>2025-11-21T19:09:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-network-monitoring-matters-how-seceon-enables-proactive-intelligent-cyber-defence-2/</loc>
		<lastmod>2025-11-21T19:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workload-and-agentic-identity-at-scale-insights-from-cyberarks-workload-identity-day-zero-3/</loc>
		<lastmod>2025-11-21T19:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-as-cyberattacker/</loc>
		<lastmod>2025-11-21T19:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-are-the-retail-engine-how-to-secure-them-this-black-friday/</loc>
		<lastmod>2025-11-21T19:11:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers/</loc>
		<lastmod>2025-11-21T19:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-as-cyberattacker-2/</loc>
		<lastmod>2025-11-21T19:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scaling-cyber-meet-the-next-cybersecurity-global-leaders/</loc>
		<lastmod>2025-11-21T19:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skipping-threat-modeling-youre-risking-a-breach-you-cant-recover-from/</loc>
		<lastmod>2025-11-21T19:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-are-the-retail-engine-how-to-secure-them-this-black-friday-2/</loc>
		<lastmod>2025-11-21T19:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-user-data-while-boosting-visibility-secure-seo-strategies-for-manufacturers-2/</loc>
		<lastmod>2025-11-21T19:12:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-code-to-boardroom-a-genai-grc-approach-to-supply-chain-risk/</loc>
		<lastmod>2025-11-21T19:13:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-turn-threat-intel-into-real-security-wins/</loc>
		<lastmod>2025-11-21T19:13:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-code-to-boardroom-a-genai-grc-approach-to-supply-chain-risk-2/</loc>
		<lastmod>2025-11-21T19:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/</loc>
		<lastmod>2025-11-21T20:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-issuing-2-5b-in-refunds-to-eligible-prime-customers-to-settle-ftc-suit/</loc>
		<lastmod>2025-11-21T20:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wrthug-attack-hijacks-tens-of-thousands-of-asus-home-routers/</loc>
		<lastmod>2025-11-21T21:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-confirms-october-windows-updates-cause-gaming-issues/</loc>
		<lastmod>2025-11-21T21:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-dismisses-remains-of-lawsuit-against-solarwinds-and-its-ciso/</loc>
		<lastmod>2025-11-21T22:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-themis-regulating-textual-inversion-for-personalized-concept-censorship/</loc>
		<lastmod>2025-11-21T22:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-document-forgery/</loc>
		<lastmod>2025-11-21T22:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm09-misinformation-firetail-blog/</loc>
		<lastmod>2025-11-21T22:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-dismisses-remains-of-lawsuit-against-solarwinds-and-its-ciso-2/</loc>
		<lastmod>2025-11-21T22:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-key-driven-framework-for-identity-preserving-face-anonymization/</loc>
		<lastmod>2025-11-21T22:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-themis-regulating-textual-inversion-for-personalized-concept-censorship-2/</loc>
		<lastmod>2025-11-21T22:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-group-sues-feds-over-talks-with-tech-companies-on-ice-raid-trackers/</loc>
		<lastmod>2025-11-21T22:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-denies-breach-after-insider-sent-internal-screenshots-to-hackers/</loc>
		<lastmod>2025-11-21T22:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-api-could-bulk-leak-user-telephone-numbers/</loc>
		<lastmod>2025-11-21T22:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-security-rollouts-thrive-on-momentum-and-preparation/</loc>
		<lastmod>2025-11-21T22:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socs-must-be-built-for-speed-in-the-ai-threat-era/</loc>
		<lastmod>2025-11-21T22:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-group-sues-feds-over-talks-with-tech-companies-on-ice-raid-trackers-2/</loc>
		<lastmod>2025-11-21T22:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-drops-telecom-cyber-rules-despite-china-espionage-warnings/</loc>
		<lastmod>2025-11-21T22:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/line-messaging-bugs-open-asian-users-to-cyber-espionage/</loc>
		<lastmod>2025-11-21T22:08:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-drops-telecom-cyber-rules-despite-china-espionage-warnings-2/</loc>
		<lastmod>2025-11-21T22:08:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/line-messaging-bugs-open-asian-users-to-cyber-espionage-2/</loc>
		<lastmod>2025-11-21T22:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflares-one-stop-shop-convenience-takes-down-global-digital-economy/</loc>
		<lastmod>2025-11-21T22:09:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-drops-telecom-cyber-rules-despite-china-espionage-warnings-3/</loc>
		<lastmod>2025-11-21T22:09:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-the-hackers-6-laws-for-staying-ahead-of-the-attackers/</loc>
		<lastmod>2025-11-21T22:09:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/line-messaging-bugs-open-asian-users-to-cyber-espionage-3/</loc>
		<lastmod>2025-11-21T22:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-firm-called-factory-disrupts-campaign-designed-to-hijack-development-platform/</loc>
		<lastmod>2025-11-21T23:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-know-if-your-asus-router-is-one-of-thousands-hacked-by-china-state-hackers/</loc>
		<lastmod>2025-11-21T23:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardware-hackers-urge-vendor-engagement-for-security-success/</loc>
		<lastmod>2025-11-21T23:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-ends-solarwinds-suit-after-major-legal-setbacks/</loc>
		<lastmod>2025-11-21T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-firm-called-factory-disrupts-campaign-designed-to-hijack-development-platform-2/</loc>
		<lastmod>2025-11-21T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-know-if-your-asus-router-is-one-of-thousands-hacked-by-china-state-hackers-2/</loc>
		<lastmod>2025-11-21T23:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-that-medical-device-secure-get-it-right-in-the-contract/</loc>
		<lastmod>2025-11-21T23:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardware-hackers-urge-vendor-engagement-for-security-success-2/</loc>
		<lastmod>2025-11-21T23:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sonicos-sslvpn-vulnerability-allows-remote-firewall-crashes/</loc>
		<lastmod>2025-11-21T23:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deja-vu-salesforce-customers-hacked-again-via-gainsight/</loc>
		<lastmod>2025-11-21T23:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-is-fragmenting-and-converging-at-the-same-time-insights-from-the-field/</loc>
		<lastmod>2025-11-21T23:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-eu-unternehmen-streben-unabhangigkeit-von-us-diensten-an/</loc>
		<lastmod>2025-11-22T00:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/domains-digitale-identitat-als-chefsache/</loc>
		<lastmod>2025-11-22T00:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sesameop-neuartige-backdoor-in-openai-api-fur-cc-missbraucht/</loc>
		<lastmod>2025-11-22T00:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt24-deploys-custom-malware-new-stealthy-tactics/</loc>
		<lastmod>2025-11-22T00:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oops-cryptographers-cancel-election-results-after-losing-decryption-key-2/</loc>
		<lastmod>2025-11-22T00:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oops-cryptographers-cancel-election-results-after-losing-decryption-key/</loc>
		<lastmod>2025-11-22T00:59:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited-2/</loc>
		<lastmod>2025-11-22T00:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/</loc>
		<lastmod>2025-11-22T00:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oops-cryptographers-cancel-election-results-after-losing-decryption-key-3/</loc>
		<lastmod>2025-11-22T01:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-on-rewiring-democracy/</loc>
		<lastmod>2025-11-22T04:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-cybersecurity-2025-for-usa-msps-mssps-challenges-threats-and-the-seceon-platform-solution/</loc>
		<lastmod>2025-11-22T04:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-reversal-removes-federal-cyber-safeguards-targeting-telecom-weaknesses-post-salt-typhoon-attacks/</loc>
		<lastmod>2025-11-22T05:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-azure-bastion-vulnerability-lets-attackers-bypass-login-and-escalate-privileges/</loc>
		<lastmod>2025-11-22T05:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-on-rewiring-democracy-2/</loc>
		<lastmod>2025-11-22T05:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-cybersecurity-2025-for-usa-msps-mssps-challenges-threats-and-the-seceon-platform-solution-2/</loc>
		<lastmod>2025-11-22T05:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-ai-security-measures-getting-better-annually/</loc>
		<lastmod>2025-11-22T05:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-i-ensure-secure-interactions-between-agentic-ai-systems/</loc>
		<lastmod>2025-11-22T06:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-nhis-are-tailored-to-handle-specific-enterprise-needs/</loc>
		<lastmod>2025-11-22T06:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-nhis-support-systems-more-secure/</loc>
		<lastmod>2025-11-22T06:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wer-oder-was-ist-cl0p-ransomware/</loc>
		<lastmod>2025-11-22T06:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-i-ensure-secure-interactions-between-agentic-ai-systems-2/</loc>
		<lastmod>2025-11-22T06:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-carol-sturka-declares-i-have-agency-big-techs-ai-models-now-testing-that-claim/</loc>
		<lastmod>2025-11-22T06:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pki-compliance-neue-regulierungen-stellen-finanzinstitute-vor-dringenden-handlungsbedarf/</loc>
		<lastmod>2025-11-22T07:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matrix-push-c2-uses-browser-notifications-for-fileless-cross-platform-phishing-attacks/</loc>
		<lastmod>2025-11-22T08:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-actively-exploited-critical-oracle-identity-manager-zero-day-vulnerability/</loc>
		<lastmod>2025-11-22T08:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-zip-schwachstelle-cve-2025-11001-exploits-und-angriffe-amd-nutzer-mussen-handeln/</loc>
		<lastmod>2025-11-22T10:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-gainsight-hack-daten-von-200-firmen-gestohlen/</loc>
		<lastmod>2025-11-22T11:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-an-oracle-fusion-middleware-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-11-22T11:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-border-patrol-is-spying-on-millions-of-american-drivers/</loc>
		<lastmod>2025-11-22T12:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-hacker-conference-installed-a-literal-antivirus-monitoring-system/</loc>
		<lastmod>2025-11-22T13:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausgesperrt-aus-dem-eigenen-korper-zauberkunstler-vergisst-passwort-fur-hand-chip/</loc>
		<lastmod>2025-11-22T14:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haveibeenpwned-knackt-rekord-625-millionen-neue-passworter-ist-deins-dabei/</loc>
		<lastmod>2025-11-22T14:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-multi-site-certification-for-iso-27001/</loc>
		<lastmod>2025-11-22T15:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kryptobetrug-nachweisen-der-leitfaden-fur-beweise-forensik-und-ruckforderungen/</loc>
		<lastmod>2025-11-22T17:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-fires-worker-over-insider-leak-to-scattered-lapsus-hunters/</loc>
		<lastmod>2025-11-22T17:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-warning-as-hackers-target-oracle-identity-manager-rce-flaw/</loc>
		<lastmod>2025-11-22T17:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-salesforce-gainsight-breach-to-access-data-from-more-than-200-companies/</loc>
		<lastmod>2025-11-22T17:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-fires-employee-for-leaking-internal-system-info-to-hackers/</loc>
		<lastmod>2025-11-22T17:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metasploit-releases-new-exploit-for-fresh-fortiweb-0-day-vulnerabilities/</loc>
		<lastmod>2025-11-22T17:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt31-launches-stealthy-cyberattacks-on-russian-it-using-cloud-services/</loc>
		<lastmod>2025-11-22T17:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badaudio-malware-how-apt24-scaled-its-cyberespionage-through-supply-chain-attacks/</loc>
		<lastmod>2025-11-22T18:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-some-customer-data-accessed-via-gainsight-breach/</loc>
		<lastmod>2025-11-22T18:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-explanation-as-a-watermark/</loc>
		<lastmod>2025-11-22T19:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-some-customer-data-accessed-via-gainsight-breach-2/</loc>
		<lastmod>2025-11-22T19:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saturday-security-zero-day-logitech-breach-exposes-1-8tb-of-data-2/</loc>
		<lastmod>2025-11-22T20:00:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saturday-security-zero-day-logitech-breach-exposes-1-8tb-of-data/</loc>
		<lastmod>2025-11-22T20:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/making-a-cyber-crisis-plan-key-components-not-to-be-missed/</loc>
		<lastmod>2025-11-22T20:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/making-a-cyber-crisis-plan-key-components-not-to-be-missed-2/</loc>
		<lastmod>2025-11-22T20:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-api-flaw-let-researchers-scrape-3-5-billion-accounts-2/</loc>
		<lastmod>2025-11-22T20:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-api-flaw-let-researchers-scrape-3-5-billion-accounts/</loc>
		<lastmod>2025-11-22T20:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cox-enterprises-discloses-oracle-e-business-suite-data-breach/</loc>
		<lastmod>2025-11-22T20:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cox-enterprises-discloses-oracle-e-business-suite-data-breach-2/</loc>
		<lastmod>2025-11-22T20:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/piecing-together-the-puzzle-a-qilin-ransomware-investigation-2/</loc>
		<lastmod>2025-11-22T20:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/piecing-together-the-puzzle-a-qilin-ransomware-investigation/</loc>
		<lastmod>2025-11-22T20:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwarzwald-dogs-hensec-hat-auch-wanzen-spurhunde-im-portfolio/</loc>
		<lastmod>2025-11-22T23:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-24h2-windows-server-2025-zscaler-uber-kritischen-grafik-bug-cve-2025-50165/</loc>
		<lastmod>2025-11-23T00:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-broschuren-zum-business-continuity-management-bcm-fur-kmu/</loc>
		<lastmod>2025-11-23T00:00:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transformation-der-webchats/</loc>
		<lastmod>2025-11-23T00:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-international-partners-target-bulletproof-hosting-services/</loc>
		<lastmod>2025-11-23T04:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-asm-zur-lieferkettenresilienz-beitragt/</loc>
		<lastmod>2025-11-23T04:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-non-human-identities-keep-my-data-protected/</loc>
		<lastmod>2025-11-23T08:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-a-agentic-ai-solution-scalable/</loc>
		<lastmod>2025-11-23T08:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-current-non-human-identities-impenetrable/</loc>
		<lastmod>2025-11-23T08:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsprognosen-fur-2026-der-kampf-um-realitat-und-kontrolle-in-einer-welt-der-agentischen-ki/</loc>
		<lastmod>2025-11-23T08:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pravda-netzwerk-vergiftet-mit-llm-grooming-chatgpt-co/</loc>
		<lastmod>2025-11-23T08:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-non-human-identities-keep-my-data-protected-2/</loc>
		<lastmod>2025-11-23T08:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fire-alert-the-fake-amazon-tv-stick-that-opens-the-door-to-fraudsters/</loc>
		<lastmod>2025-11-23T08:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-stealth-patched-fortiweb-vulnerability-under-active-exploitation-logitech-data-breach/</loc>
		<lastmod>2025-11-23T10:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-goes-rogue-science-fiction-meets-reality/</loc>
		<lastmod>2025-11-23T11:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-outage-should-you-go-multi-cdn/</loc>
		<lastmod>2025-11-23T12:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-flags-sslvpn-flaw-allowing-firewall-crashes/</loc>
		<lastmod>2025-11-23T12:00:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-7-zip-vulnerability-with-public-exploit-requires-manual-update/</loc>
		<lastmod>2025-11-23T14:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-72/</loc>
		<lastmod>2025-11-23T14:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-551-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-11-23T14:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-discloses-customer-data-leak-after-vendor-security-breach/</loc>
		<lastmod>2025-11-23T14:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-costco-gold-star-members-also-get-a-40-digital-costco-shop-card/</loc>
		<lastmod>2025-11-23T15:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-hacker-conference-installed-a-literal-antivirus-monitoring-system-2/</loc>
		<lastmod>2025-11-23T17:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-enables-pixeliphone-file-sharing-via-quick-share-airdrop/</loc>
		<lastmod>2025-11-23T17:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-password-security-and-secrets-management-with-passwork-7/</loc>
		<lastmod>2025-11-23T17:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-launches-nearly-1-million-attacks-targeting-office-365-accounts/</loc>
		<lastmod>2025-11-23T17:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-gap-diff-protecting-jpeg-compressed-images-from-diffusion-based-facial-customization/</loc>
		<lastmod>2025-11-23T18:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-discloses-security-incident-tied-to-supplier-breach/</loc>
		<lastmod>2025-11-23T18:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-costco-gold-star-members-also-get-a-40-digital-costco-shop-card-2/</loc>
		<lastmod>2025-11-23T18:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perspektiven-fur-die-nationale-rz-strategie-eco-ladt-zum-diskussionsabend-ein/</loc>
		<lastmod>2025-11-23T23:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anwendungen-und-apis-schutzen-praktische-security-hebel-fur-admins/</loc>
		<lastmod>2025-11-23T23:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartmeter-daten-wecken-begehrlichkeiten-der-polizei-in-sacramento/</loc>
		<lastmod>2025-11-24T00:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zte-launches-zxcsec-maf-security-solution-for-large-model/</loc>
		<lastmod>2025-11-24T00:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-apt24-launches-stealth-badaudio-malware-hitting-1000-domains-via-taiwanese-supply-chain-hack/</loc>
		<lastmod>2025-11-24T00:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-europas-als-neuer-mega-trend/</loc>
		<lastmod>2025-11-24T00:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutzkonferenz-10-vorschlage-zur-dsgvo-verbesserung-im-kinderinteresse/</loc>
		<lastmod>2025-11-24T00:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-agentic-ai-systems-kept-safe-from-cyber-threats/</loc>
		<lastmod>2025-11-24T04:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-i-be-reassured-of-data-integrity-with-agentic-ai/</loc>
		<lastmod>2025-11-24T05:00:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-should-i-feel-confident-in-adopting-agentic-ai-tech/</loc>
		<lastmod>2025-11-24T05:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-agentic-ai-systems-kept-safe-from-cyber-threats-2/</loc>
		<lastmod>2025-11-24T05:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-drive-innovation-in-cloud-security/</loc>
		<lastmod>2025-11-24T05:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-i-be-reassured-of-data-integrity-with-agentic-ai-2/</loc>
		<lastmod>2025-11-24T05:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-vulnerability-scores-fall-apart/</loc>
		<lastmod>2025-11-24T05:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-blind-spots-are-back-to-bite-security-teams/</loc>
		<lastmod>2025-11-24T06:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scamming-became-the-new-farming-inside-indias-cybercrime-villages-podcast/</loc>
		<lastmod>2025-11-24T06:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-vulnerability-scores-fall-apart-2/</loc>
		<lastmod>2025-11-24T06:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-does-the-hacking-first-documented-ai-orchestrated-cyber-espionage/</loc>
		<lastmod>2025-11-24T06:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signing-in-to-online-accounts/</loc>
		<lastmod>2025-11-24T07:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptology-boffins-association-to-re-run-election-after-losing-encryption-key-needed-to-count-votes/</loc>
		<lastmod>2025-11-24T07:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-does-the-hacking-first-documented-ai-orchestrated-cyber-espionage-2/</loc>
		<lastmod>2025-11-24T07:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cnspec-open-source-cloud-native-security-and-policy-project/</loc>
		<lastmod>2025-11-24T07:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-privacy-tension-driving-the-medical-data-shift-nobody-wants-to-talk-about/</loc>
		<lastmod>2025-11-24T07:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signing-in-to-online-accounts-2/</loc>
		<lastmod>2025-11-24T07:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptology-boffins-association-to-re-run-election-after-losing-encryption-key-needed-to-count-votes-2/</loc>
		<lastmod>2025-11-24T07:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metro-entwicklungsserver-remote-code-ausfuhrung-in-metas-react-native-cli-gefahrdet-entwickler/</loc>
		<lastmod>2025-11-24T07:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-greatest-risk-department-leaders-quitting/</loc>
		<lastmod>2025-11-24T07:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-encryption-is-pushing-satellite-hardware-to-its-limits/</loc>
		<lastmod>2025-11-24T08:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rbac-und-least-privilege-als-basis-fur-sicheres-iam-iam-in-der-cloud-braucht-zero-trust-und-temporare-zugriffstokens/</loc>
		<lastmod>2025-11-24T08:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-alleged-members-deny-tfl-charges/</loc>
		<lastmod>2025-11-24T08:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resilienzlucken-schliesen-commvault-startet-clumio-auf-aws/</loc>
		<lastmod>2025-11-24T09:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowpad-malware-actively-exploits-wsus-vulnerability-for-full-system-access/</loc>
		<lastmod>2025-11-24T09:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-alleged-members-deny-tfl-charges-2/</loc>
		<lastmod>2025-11-24T09:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resilienzlucken-schliesen-commvault-startet-clumio-auf-aws-2/</loc>
		<lastmod>2025-11-24T09:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-mitarbeiter-bei-datenklau-fur-hacker-erwischt/</loc>
		<lastmod>2025-11-24T09:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowpad-malware-actively-exploits-wsus-vulnerability-for-full-system-access-2/</loc>
		<lastmod>2025-11-24T09:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-nspm-in-microsegmentation-and-attack-surface-reduction/</loc>
		<lastmod>2025-11-24T09:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mod-launches-worlds-first-military-gaming-tournament/</loc>
		<lastmod>2025-11-24T10:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-terminates-suspicious-insider-linked-to-scattered-lapsus-hunters/</loc>
		<lastmod>2025-11-24T10:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kryptologie-zeigt-wirkung-verlorener-schlussel-macht-wahlergebnisse-unbrauchbar/</loc>
		<lastmod>2025-11-24T10:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-disrupts-rhadamanthys-information-stealing-malware/</loc>
		<lastmod>2025-11-24T11:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-attack-agents-are-accelerators-not-autonomous-weapons-the-anthropic-attack/</loc>
		<lastmod>2025-11-24T11:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-airlines-notifies-customers-of-supply-chain-data-breach/</loc>
		<lastmod>2025-11-24T11:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-audit-momentaufnahmen-zur-adaptiven-compliance-zertifizierungen-schaffen-vertrauen-ersetzen-aber-keine-sicherheit/</loc>
		<lastmod>2025-11-24T11:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-endgame-disrupts-rhadamanthys-information-stealing-malware-2/</loc>
		<lastmod>2025-11-24T11:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-innovationen-von-sophos-starken-die-cyberresilienz-weltweit/</loc>
		<lastmod>2025-11-24T11:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-attack-agents-are-accelerators-not-autonomous-weapons-the-anthropic-attack-2/</loc>
		<lastmod>2025-11-24T11:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-slow-rise-of-sboms-meets-the-rapid-advance-of-ai/</loc>
		<lastmod>2025-11-24T12:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-trust-turns-toxic-lessons-from-the-salesloft-drift-incident/</loc>
		<lastmod>2025-11-24T12:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-flags-maximum-severity-scim-vulnerability-enabling-privilege-escalation/</loc>
		<lastmod>2025-11-24T12:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-24h2-bug-crashes-explorer-and-start-menu/</loc>
		<lastmod>2025-11-24T12:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-tools-like-gpt-3-5-turbo-and-gpt-4-fuel-the-development-of-fully-autonomous-malware/</loc>
		<lastmod>2025-11-24T12:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-slow-rise-of-sboms-meets-the-rapid-advance-of-ai-2/</loc>
		<lastmod>2025-11-24T12:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-airlines-hit-by-data-breach-exposing-customer-personal-details/</loc>
		<lastmod>2025-11-24T12:06:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-package-used-by-hackers-to-steal-users-crypto-information/</loc>
		<lastmod>2025-11-24T12:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-airlines-hit-by-data-breach-exposing-customer-personal-details-2/</loc>
		<lastmod>2025-11-24T12:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-published-for-w3-total-cache-flaw-exposing-1m-sites-to-rce/</loc>
		<lastmod>2025-11-24T12:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-package-used-by-hackers-to-steal-users-crypto-information-2/</loc>
		<lastmod>2025-11-24T12:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-published-for-w3-total-cache-flaw-exposing-1m-sites-to-rce-2/</loc>
		<lastmod>2025-11-24T12:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-scam-job-platform-targets-u-s-ai-developers/</loc>
		<lastmod>2025-11-24T12:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iberia-airlines-hit-by-data-breach-exposing-customer-personal-details-3/</loc>
		<lastmod>2025-11-24T12:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-scam-job-platform-targets-u-s-ai-developers-2/</loc>
		<lastmod>2025-11-24T12:10:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-etherhiding-technique-uses-web-attacks-to-deploy-malware-and-rotate-payloads/</loc>
		<lastmod>2025-11-24T12:10:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-package-used-by-hackers-to-steal-users-crypto-information-3/</loc>
		<lastmod>2025-11-24T12:10:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-targeting-internal-employee-communications-at-organizations/</loc>
		<lastmod>2025-11-24T12:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenda-n300-flaws-allow-attackers-to-run-commands-as-root/</loc>
		<lastmod>2025-11-24T12:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-targeting-internal-employee-communications-at-organizations-2/</loc>
		<lastmod>2025-11-24T12:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vllm-flaw-allows-remote-code-execution-through-malicious-payloads/</loc>
		<lastmod>2025-11-24T12:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenda-n300-flaws-allow-attackers-to-run-commands-as-root-2/</loc>
		<lastmod>2025-11-24T12:19:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-targeting-internal-employee-communications-at-organizations-3/</loc>
		<lastmod>2025-11-24T12:19:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-based-malware-enables-stealthy-process-injection-into-legitimate-windows-binaries/</loc>
		<lastmod>2025-11-24T12:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vllm-flaw-allows-remote-code-execution-through-malicious-payloads-2/</loc>
		<lastmod>2025-11-24T12:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenda-n300-flaws-allow-attackers-to-run-commands-as-root-3/</loc>
		<lastmod>2025-11-24T12:20:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-targeting-internal-employee-communications-at-organizations-4/</loc>
		<lastmod>2025-11-24T12:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-based-malware-enables-stealthy-process-injection-into-legitimate-windows-binaries-2/</loc>
		<lastmod>2025-11-24T12:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-deepseek-r1-ai-generates-insecure-code-when-prompts-mention-tibet-or-uyghurs/</loc>
		<lastmod>2025-11-24T12:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-targeting-internal-employee-communications-at-organizations-5/</loc>
		<lastmod>2025-11-24T12:22:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vllm-flaw-allows-remote-code-execution-through-malicious-payloads-3/</loc>
		<lastmod>2025-11-24T12:22:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-deepseek-r1-ai-generates-insecure-code-when-prompts-mention-tibet-or-uyghurs-2/</loc>
		<lastmod>2025-11-24T12:22:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-patch-of-actively-exploited-flaw-in-oracle-identity-manager/</loc>
		<lastmod>2025-11-24T12:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sichere-backups-oxibox-verhindert-angriffe-auf-backups/</loc>
		<lastmod>2025-11-24T12:24:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teamgroup-p35s-usb-stick-zerstort-sich-mit-kill-switch-selbst/</loc>
		<lastmod>2025-11-24T12:25:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-genai-in-enterprises-lessons-from-the-field-2/</loc>
		<lastmod>2025-11-24T13:03:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-genai-in-enterprises-lessons-from-the-field-3/</loc>
		<lastmod>2025-11-24T13:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-genai-in-enterprises-lessons-from-the-field/</loc>
		<lastmod>2025-11-24T13:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-oim-zeroday-preauth-rce-forces-rapid-patching-across-enterprises-3/</loc>
		<lastmod>2025-11-24T13:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-oim-zeroday-preauth-rce-forces-rapid-patching-across-enterprises/</loc>
		<lastmod>2025-11-24T13:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-oim-zeroday-preauth-rce-forces-rapid-patching-across-enterprises-2/</loc>
		<lastmod>2025-11-24T13:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-oracle-identity-manager-zero-day-after-signs-of-abuse/</loc>
		<lastmod>2025-11-24T13:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-oracle-identity-manager-zero-day-after-signs-of-abuse-2/</loc>
		<lastmod>2025-11-24T13:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-genai-in-enterprises-lessons-from-the-field-4/</loc>
		<lastmod>2025-11-24T13:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-radzarat-spyware-poses-as-file-manager-to-hijack-android-devices/</loc>
		<lastmod>2025-11-24T13:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-oim-zeroday-preauth-rce-forces-rapid-patching-across-enterprises-4/</loc>
		<lastmod>2025-11-24T13:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-oracle-identity-manager-zero-day-after-signs-of-abuse-3/</loc>
		<lastmod>2025-11-24T13:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-radzarat-spyware-poses-as-file-manager-to-hijack-android-devices-2/</loc>
		<lastmod>2025-11-24T13:05:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-oracle-identity-manager-zero-day-after-signs-of-abuse-4/</loc>
		<lastmod>2025-11-24T13:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-remove-wins-support-after-windows-server-2025/</loc>
		<lastmod>2025-11-24T13:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-radzarat-spyware-poses-as-file-manager-to-hijack-android-devices-3/</loc>
		<lastmod>2025-11-24T13:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-remove-wins-support-after-windows-server-2025-2/</loc>
		<lastmod>2025-11-24T13:06:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zapiers-npm-account-hacked-multiple-packages-infected-with-malware/</loc>
		<lastmod>2025-11-24T13:07:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-6-18-rc7-released-with-new-bug-fixes-and-driver-updates/</loc>
		<lastmod>2025-11-24T13:08:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-im-anmarsch-kritische-windows-lucke-ermoglicht-angriffe-uber-jpeg-daten/</loc>
		<lastmod>2025-11-24T13:09:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zapiers-npm-account-hacked-multiple-packages-infected-with-malware-2/</loc>
		<lastmod>2025-11-24T13:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jpmorgan-citi-morgan-stanley-assess-fallout-from-situsamc-data-breach/</loc>
		<lastmod>2025-11-24T14:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-guts-post-salt-typhoon-telco-rules-despite-ongoing-espionage-risk/</loc>
		<lastmod>2025-11-24T14:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention/</loc>
		<lastmod>2025-11-24T14:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug/</loc>
		<lastmod>2025-11-24T14:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-prettier-extension-on-vscode-marketplace-dropped-anivia-stealer/</loc>
		<lastmod>2025-11-24T14:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tests-file-explorer-preloading-for-faster-performance/</loc>
		<lastmod>2025-11-24T14:08:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tests-file-explorer-preloading-for-faster-performance-2/</loc>
		<lastmod>2025-11-24T14:08:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-sha1-hulud-wave-affects-25000-repositories-via-npm-preinstall-credential-theft/</loc>
		<lastmod>2025-11-24T14:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-sha1-hulud-wave-affects-25000-repositories-via-npm-preinstall-credential-theft-2/</loc>
		<lastmod>2025-11-24T14:09:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploit-chrome-0-day-badiis-malware-record-ddos-saas-breach-more/</loc>
		<lastmod>2025-11-24T14:09:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploit-chrome-0-day-badiis-malware-record-ddos-saas-breach-more-2/</loc>
		<lastmod>2025-11-24T14:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore/</loc>
		<lastmod>2025-11-24T14:10:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore-2/</loc>
		<lastmod>2025-11-24T14:10:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-nimmt-raas-gruppe-dragonforce-unter-die-lupe/</loc>
		<lastmod>2025-11-24T14:10:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-nimmt-raas-gruppe-dragonforce-unter-die-lupe-2/</loc>
		<lastmod>2025-11-24T14:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesrat-stimmt-nis-2-zu-bundestag-verabschiedet-nis-2/</loc>
		<lastmod>2025-11-24T14:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-is-at-a-tipping-point-why-complexity-is-the-new-risk-vector/</loc>
		<lastmod>2025-11-24T15:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention-2/</loc>
		<lastmod>2025-11-24T15:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-sambaspy/</loc>
		<lastmod>2025-11-24T15:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-has-changed-the-cost-of-experimentation/</loc>
		<lastmod>2025-11-24T15:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-is-at-a-tipping-point-why-complexity-is-the-new-risk-vector-2/</loc>
		<lastmod>2025-11-24T15:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-wer-steckt-dahinter/</loc>
		<lastmod>2025-11-24T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-s3-buckets-im-visier-von-ransomware-banden/</loc>
		<lastmod>2025-11-24T15:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisible-battles-how-cybersecurity-work-erodes-mental-health-in-silence-and-what-we-can-do-about-it/</loc>
		<lastmod>2025-11-24T15:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-wer-steckt-dahinter-2/</loc>
		<lastmod>2025-11-24T15:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jpmorgan-citi-morgan-stanley-assess-fallout-from-situsamc-data-breach-2/</loc>
		<lastmod>2025-11-24T15:05:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-s3-buckets-im-visier-von-ransomware-banden-2/</loc>
		<lastmod>2025-11-24T15:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-banks-scramble-to-assess-data-theft-after-hackers-breach-financial-tech-firm/</loc>
		<lastmod>2025-11-24T15:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisible-battles-how-cybersecurity-work-erodes-mental-health-in-silence-and-what-we-can-do-about-it-2/</loc>
		<lastmod>2025-11-24T15:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-wer-steckt-dahinter-3/</loc>
		<lastmod>2025-11-24T15:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-worm-returns-belches-secrets-to-25k-github-repos/</loc>
		<lastmod>2025-11-24T15:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-guts-post-salt-typhoon-telco-rules-despite-ongoing-espionage-risk-2/</loc>
		<lastmod>2025-11-24T15:08:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention-3/</loc>
		<lastmod>2025-11-24T15:09:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-prettier-extension-on-vscode-marketplace-dropped-anivia-stealer-2/</loc>
		<lastmod>2025-11-24T15:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/softcat-shares-customer-priorities-for-2026/</loc>
		<lastmod>2025-11-24T15:11:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore-3/</loc>
		<lastmod>2025-11-24T15:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore-4/</loc>
		<lastmod>2025-11-24T15:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-is-using-specialized-ai-agents-for-deep-bug-hunting/</loc>
		<lastmod>2025-11-24T15:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-is-using-specialized-ai-agents-for-deep-bug-hunting-2/</loc>
		<lastmod>2025-11-24T15:15:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug-2/</loc>
		<lastmod>2025-11-24T15:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore-5/</loc>
		<lastmod>2025-11-24T15:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug-3/</loc>
		<lastmod>2025-11-24T15:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvard-university-discloses-data-breach-affecting-alumni-donors/</loc>
		<lastmod>2025-11-24T15:16:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-is-using-specialized-ai-agents-for-deep-bug-hunting-3/</loc>
		<lastmod>2025-11-24T15:16:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvard-university-discloses-data-breach-affecting-alumni-donors-2/</loc>
		<lastmod>2025-11-24T15:16:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug-4/</loc>
		<lastmod>2025-11-24T15:16:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tests-file-explorer-preloading-for-faster-performance-3/</loc>
		<lastmod>2025-11-24T15:16:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tests-file-explorer-preloading-for-faster-performance-4/</loc>
		<lastmod>2025-11-24T15:16:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-cybersecurity-deals-to-explore-6/</loc>
		<lastmod>2025-11-24T15:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-sha1-hulud-wave-affects-25000-repositories-via-npm-preinstall-credential-theft-3/</loc>
		<lastmod>2025-11-24T15:18:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploit-chrome-0-day-badiis-malware-record-ddos-saas-breach-more-3/</loc>
		<lastmod>2025-11-24T15:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-sha1-hulud-wave-affects-25000-repositories-via-npm-preinstall-credential-theft-4/</loc>
		<lastmod>2025-11-24T15:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-linked-malware-campaign-hides-in-blender-3d-files/</loc>
		<lastmod>2025-11-24T15:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploit-chrome-0-day-badiis-malware-record-ddos-saas-breach-more-4/</loc>
		<lastmod>2025-11-24T15:19:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesrat-stimmt-nis-2-zu-bundestag-verabschiedet-nis-2-2/</loc>
		<lastmod>2025-11-24T15:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-nimmt-raas-gruppe-dragonforce-unter-die-lupe-3/</loc>
		<lastmod>2025-11-24T15:26:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/</loc>
		<lastmod>2025-11-24T15:27:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt31-hackergruppe-nutzt-cloud-zur-verschleierung-2/</loc>
		<lastmod>2025-11-24T16:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intrusion-at-real-estate-finance-biz-sparks-concern-for-big-banks/</loc>
		<lastmod>2025-11-24T16:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-companies-must-be-held-liable-for-british-economic-security-say-mps/</loc>
		<lastmod>2025-11-24T16:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/championing-cyber-security-the-national-uk-cyber-teams-journey-at-the-european-cyber-security-challenge/</loc>
		<lastmod>2025-11-24T16:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-npm-worm-infects-19000-packages-in-major-supply-chain-attack/</loc>
		<lastmod>2025-11-24T16:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delta-dental-of-virginia-data-breach-impacts-145918-customers/</loc>
		<lastmod>2025-11-24T16:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-2-5-pro-und-gpt-5-am-starksten-eqs-report-bewertet-die-compliance-von-ki-modellen/</loc>
		<lastmod>2025-11-24T16:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sccm-and-wsus-in-a-hybrid-world-why-its-time-for-cloud-native-patching/</loc>
		<lastmod>2025-11-24T16:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-expose-risks-in-fluent-bit-logging-agent/</loc>
		<lastmod>2025-11-24T16:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-keeps-cisos-awake-at-night-and-why-zurich-might-hold-the-cure/</loc>
		<lastmod>2025-11-24T16:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-knock-out-systems-at-moscow-run-postal-operator-in-occupied-ukraine/</loc>
		<lastmod>2025-11-24T16:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-keeps-cisos-awake-at-night-and-why-zurich-might-hold-the-cure-2/</loc>
		<lastmod>2025-11-24T16:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt31-hackergruppe-nutzt-cloud-zur-verschleierung/</loc>
		<lastmod>2025-11-24T16:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-campaign-aims-to-tackle-persistent-security-myths-in-favor-of-better-advice/</loc>
		<lastmod>2025-11-24T16:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/years-old-bugs-in-open-source-tool-left-every-major-cloud-open-to-disruption/</loc>
		<lastmod>2025-11-24T16:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-browser-becomes-the-battleground-for-ai-and-last-mile-attacks/</loc>
		<lastmod>2025-11-24T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-steal-sensitive-data-from-major-banking-industry-vendor/</loc>
		<lastmod>2025-11-24T17:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-browser-becomes-the-battleground-for-ai-and-last-mile-attacks-2/</loc>
		<lastmod>2025-11-24T17:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-npm-worm-impacts-26000-repos-in-supply-chain-attack/</loc>
		<lastmod>2025-11-24T17:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fluent-bit-flaws-expose-cloud-to-rce-and-stealthy-infrastructure-intrusions/</loc>
		<lastmod>2025-11-24T17:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-steal-sensitive-data-from-major-banking-industry-vendor-2/</loc>
		<lastmod>2025-11-24T17:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-towards-understanding-unsafe-video-generation/</loc>
		<lastmod>2025-11-24T18:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-says-additional-applications-put-on-hold-after-salesforce-customers-breached/</loc>
		<lastmod>2025-11-24T18:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-oracle-fusion-middleware-exploited-in-attacks/</loc>
		<lastmod>2025-11-24T18:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-towards-understanding-unsafe-video-generation-2/</loc>
		<lastmod>2025-11-24T18:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doge-days-are-over-as-trump-disbands-elon-musks-team-of-federal-cost-cutters/</loc>
		<lastmod>2025-11-24T18:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-says-additional-applications-put-on-hold-after-salesforce-customers-breached-2/</loc>
		<lastmod>2025-11-24T18:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-details-supply-chain-attack-targeting-gainsight/</loc>
		<lastmod>2025-11-24T18:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-oracle-fusion-middleware-exploited-in-attacks-2/</loc>
		<lastmod>2025-11-24T18:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-towards-understanding-unsafe-video-generation-3/</loc>
		<lastmod>2025-11-24T18:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-estate-finance-services-giant-situsamc-breach-exposes-client-data/</loc>
		<lastmod>2025-11-24T18:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-of-situsamc-puts-data-of-financial-services-firms-at-risk/</loc>
		<lastmod>2025-11-24T19:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-of-situsamc-puts-data-of-financial-services-firms-at-risk-2/</loc>
		<lastmod>2025-11-24T19:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-over-14000-secrets-exposed-2/</loc>
		<lastmod>2025-11-24T19:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-over-14000-secrets-exposed/</loc>
		<lastmod>2025-11-24T19:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-strategies-for-securing-customer-data-while-expanding-your-business-internationally/</loc>
		<lastmod>2025-11-24T19:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-strategies-for-securing-customer-data-while-expanding-your-business-internationally-2/</loc>
		<lastmod>2025-11-24T19:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-user-identity-to-payroll-accuracy-automating-local-tax-compliance-with-saas-tools-2/</loc>
		<lastmod>2025-11-24T19:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-user-identity-to-payroll-accuracy-automating-local-tax-compliance-with-saas-tools/</loc>
		<lastmod>2025-11-24T19:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-optimizing-for-google-start-optimizing-for-ai-that-actually-answers-questions/</loc>
		<lastmod>2025-11-24T19:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-optimizing-for-google-start-optimizing-for-ai-that-actually-answers-questions-2/</loc>
		<lastmod>2025-11-24T19:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-2025-updates-supply-chain-secrets-and-misconfigurations-take-center-stage/</loc>
		<lastmod>2025-11-24T19:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-com-viele-der-maga-influencer-konten-nicht-aus-den-usa/</loc>
		<lastmod>2025-11-24T19:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-cso-hall-of-fame-call-for-nominations/</loc>
		<lastmod>2025-11-24T19:15:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-2025-updates-supply-chain-secrets-and-misconfigurations-take-center-stage-2/</loc>
		<lastmod>2025-11-24T19:15:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-hide-your-country-location-on-x-twitter-by-switching-to-region/</loc>
		<lastmod>2025-11-24T19:15:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/podcast-empowers-professionals-to-thrive-in-their-cybersecurity-careers/</loc>
		<lastmod>2025-11-24T19:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-com-viele-der-maga-influencer-konten-nicht-aus-den-usa-2/</loc>
		<lastmod>2025-11-24T19:16:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-2025-updates-supply-chain-secrets-and-misconfigurations-take-center-stage-3/</loc>
		<lastmod>2025-11-24T19:16:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-cso-hall-of-fame-call-for-nominations-2/</loc>
		<lastmod>2025-11-24T19:17:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-firefox-bug-leaves-180m-users-exposed/</loc>
		<lastmod>2025-11-24T19:19:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-death-of-legacy-mfa-and-what-must-rise-in-its-place/</loc>
		<lastmod>2025-11-24T20:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-the-second-coming/</loc>
		<lastmod>2025-11-24T20:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvard-reports-vishing-breach-exposing-alumni-and-donor-contact-data/</loc>
		<lastmod>2025-11-24T20:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tanium-converge-ai-comes-to-enterprise-security-it-needs/</loc>
		<lastmod>2025-11-24T20:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alert-draws-attention-to-spywares-targeting-of-messaging-apps/</loc>
		<lastmod>2025-11-24T21:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-cisa-officials-cisos-dispel-hacklore-spread-cybersecurity-truths/</loc>
		<lastmod>2025-11-24T21:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-us-banks-gauge-their-exposure-to-situsamc-breach/</loc>
		<lastmod>2025-11-24T21:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situsamc-breach-exposes-data-from-100-financial-institutions/</loc>
		<lastmod>2025-11-24T21:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situsamc-cyber-breach-sparks-fallout-for-jpmorgan-citi-and-morgan-stanley/</loc>
		<lastmod>2025-11-24T21:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alert-draws-attention-to-spywares-targeting-of-messaging-apps-2/</loc>
		<lastmod>2025-11-24T21:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-cisa-officials-cisos-dispel-hacklore-spread-cybersecurity-truths-2/</loc>
		<lastmod>2025-11-24T21:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shopping-online-this-holiday-season-5-ways-to-stay-cyber-safe/</loc>
		<lastmod>2025-11-24T21:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vision-language-models-keep-an-eye-on-physical-security/</loc>
		<lastmod>2025-11-24T21:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-privacy-regulator-has-seen-collapse-in-enforcement-activity-rights-coalition-says/</loc>
		<lastmod>2025-11-24T22:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-finds-that-claude-breaks-bad-if-you-teach-it-to-cheat/</loc>
		<lastmod>2025-11-24T22:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/</loc>
		<lastmod>2025-11-24T22:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infamous-shai-hulud-worm-resurfaces-from-the-depths/</loc>
		<lastmod>2025-11-24T22:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-privacy-regulator-has-seen-collapse-in-enforcement-activity-rights-coalition-says-2/</loc>
		<lastmod>2025-11-24T22:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-get-real-about-hiring-in-the-age-of-ai/</loc>
		<lastmod>2025-11-24T22:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-finds-that-claude-breaks-bad-if-you-teach-it-to-cheat-2/</loc>
		<lastmod>2025-11-24T22:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-secrets-management-deliver-value-in-agentic-ai-management/</loc>
		<lastmod>2025-11-24T23:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-exciting-advancements-are-coming-in-nhis-management/</loc>
		<lastmod>2025-11-24T23:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-be-adaptable-to-regulatory-changes/</loc>
		<lastmod>2025-11-24T23:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-the-lifecycle-of-nhis-supported-in-enterprise-environments/</loc>
		<lastmod>2025-11-24T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-secrets-management-deliver-value-in-agentic-ai-management-2/</loc>
		<lastmod>2025-11-24T23:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-dark-web-how-osint-cyber-intelligence-uncovers-hidden-digital-risks/</loc>
		<lastmod>2025-11-24T23:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-exciting-advancements-are-coming-in-nhis-management-2/</loc>
		<lastmod>2025-11-24T23:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-be-adaptable-to-regulatory-changes-2/</loc>
		<lastmod>2025-11-24T23:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-fcc-scraps-calea-move-raising-telecom-security-fears/</loc>
		<lastmod>2025-11-24T23:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sweet-security-raises-75m-for-unified-ai-and-cloud-defense/</loc>
		<lastmod>2025-11-24T23:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-hacks-continue-to-plague-healthcare-sector/</loc>
		<lastmod>2025-11-24T23:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-users-at-risk-as-radzarat-trojan-evades-detection/</loc>
		<lastmod>2025-11-24T23:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-fcc-scraps-calea-move-raising-telecom-security-fears-2/</loc>
		<lastmod>2025-11-24T23:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-blender-model-files-deliver-stealc-infostealing-malware/</loc>
		<lastmod>2025-11-24T23:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sweet-security-raises-75m-for-unified-ai-and-cloud-defense-2/</loc>
		<lastmod>2025-11-24T23:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowray-2-0-turns-ai-clusters-into-crypto-botnets/</loc>
		<lastmod>2025-11-24T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-oracle-identity-manager-under-exploitation/</loc>
		<lastmod>2025-11-24T23:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/size-a%e2%80%b0-security-bigger-businesses-still-fail-at-bot-protection/</loc>
		<lastmod>2025-11-25T00:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-worm-returns-stronger-and-more-automated-than-ever-before/</loc>
		<lastmod>2025-11-25T00:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-der-medizin-arzte-und-patienten-im-spannungsfeld-von-nutzen-und-verunsicherung/</loc>
		<lastmod>2025-11-25T00:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/size-a%e2%80%b0-security-bigger-businesses-still-fail-at-bot-protection-2/</loc>
		<lastmod>2025-11-25T00:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-schwachstellen-als-achillesferse-moderner-technischer-systeme/</loc>
		<lastmod>2025-11-25T00:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-worm-returns-stronger-and-more-automated-than-ever-before-2/</loc>
		<lastmod>2025-11-25T00:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-der-medizin-arzte-und-patienten-im-spannungsfeld-von-nutzen-und-verunsicherung-2/</loc>
		<lastmod>2025-11-25T00:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-bastion-mit-schwerer-schwachstelle-cve-2025-49752/</loc>
		<lastmod>2025-11-25T00:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/size-a%e2%80%b0-security-bigger-businesses-still-fail-at-bot-protection-3/</loc>
		<lastmod>2025-11-25T00:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-schwachstellen-als-achillesferse-moderner-technischer-systeme-2/</loc>
		<lastmod>2025-11-25T00:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-kann-85-der-passworter-in-weniger-als-10-sekunden-knacken/</loc>
		<lastmod>2025-11-25T00:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortiweb-schwachstelle-cve-2025-58034/</loc>
		<lastmod>2025-11-25T00:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fresh-clickfix-attacks-use-windows-update-trick-pics-to-steal-credentials/</loc>
		<lastmod>2025-11-25T00:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-deanonymizing-device-identities-via-side-channel-attacks-in-exclusive-use-iots/</loc>
		<lastmod>2025-11-25T01:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-airspeed/</loc>
		<lastmod>2025-11-25T01:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-autumn-dragon-apt-exploits-winrar-flaw-to-deploy-telegram-c2-backdoor/</loc>
		<lastmod>2025-11-25T01:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bossware-booms-as-bots-determine-whether-youre-doing-a-good-job/</loc>
		<lastmod>2025-11-25T01:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention-4/</loc>
		<lastmod>2025-11-25T01:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leveraging-whatsapp-to-silently-harvest-logs-and-contact-details/</loc>
		<lastmod>2025-11-25T01:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-swap-m-with-rn-in-microsoft-com-to-trick-users/</loc>
		<lastmod>2025-11-25T01:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elephant-group-launches-defense-sector-attacks-using-msbuild-delivered-python-backdoor/</loc>
		<lastmod>2025-11-25T01:08:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt35-data-leak-uncovers-the-iranian-hacker-groups-operations-and-tactics/</loc>
		<lastmod>2025-11-25T01:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-isaac-groot-flaws-let-attackers-inject-malicious-code/</loc>
		<lastmod>2025-11-25T01:09:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-using-fake-windows-updates-in-clickfix-scams/</loc>
		<lastmod>2025-11-25T05:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitepaper-esicherheit-anforderungen-an-sichere-transparente-und-benutzerfreundliche-webmail-dienste/</loc>
		<lastmod>2025-11-25T05:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shai-hulud-worm-spreading-through-npm-github/</loc>
		<lastmod>2025-11-25T05:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-using-fake-windows-updates-in-clickfix-scams-2/</loc>
		<lastmod>2025-11-25T05:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitepaper-esicherheit-anforderungen-an-sichere-transparente-und-benutzerfreundliche-webmail-dienste-2/</loc>
		<lastmod>2025-11-25T05:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-erkennen-bevor-sie-schaden-anrichten/</loc>
		<lastmod>2025-11-25T05:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-sprawl-is-rewriting-security-priorities/</loc>
		<lastmod>2025-11-25T05:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-reverse-engineers-verdienen-uber-5-000-dollar/</loc>
		<lastmod>2025-11-25T07:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-siem-tools-software/</loc>
		<lastmod>2025-11-25T07:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aircraft-cabin-iot-leaves-vendor-and-passenger-data-exposed/</loc>
		<lastmod>2025-11-25T07:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-breaches-everyone-gets-hit-by-and-how-to-stop-them/</loc>
		<lastmod>2025-11-25T07:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hohe-wahrscheinlichkeit-eines-angriffs-cyberangriffe-auf-watchguard-firebox-appliances-laufen/</loc>
		<lastmod>2025-11-25T07:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-reverse-engineers-verdienen-uber-5-000-dollar-2/</loc>
		<lastmod>2025-11-25T07:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-strong-cloud-data-loss-prevention-strategy-a-step-by-step-guide/</loc>
		<lastmod>2025-11-25T08:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-build-an-ai-governance-program-in-2026/</loc>
		<lastmod>2025-11-25T08:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-signs-your-cybersecurity-framework-needs-rebuilding/</loc>
		<lastmod>2025-11-25T08:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-whitepaper-zu-e-mail-sicherheit-bei-webmailern/</loc>
		<lastmod>2025-11-25T08:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-an-ai-meltdown-could-reset-enterprise-expectations/</loc>
		<lastmod>2025-11-25T08:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-spyware-campaigns-hijacking-high-value-signal-and-whatsapp-users/</loc>
		<lastmod>2025-11-25T08:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adversarial-prompting-in-dieser-phase-konnte-ihre-ki-zum-sicherheitsrisiko-werden/</loc>
		<lastmod>2025-11-25T08:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faq-about-sha1-hulud-2-0-the-second-coming/</loc>
		<lastmod>2025-11-25T09:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situsamc-confirms-data-breach-affecting-customer-information/</loc>
		<lastmod>2025-11-25T09:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/komplexitat-reduzieren-reaktion-beschleunigen-neuer-ki-agent-zur-steigerung-der-it-resilienz/</loc>
		<lastmod>2025-11-25T09:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faq-about-sha1-hulud-2-0-the-second-coming-2/</loc>
		<lastmod>2025-11-25T09:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pure-storage-veroffentlicht-leitfaden-zur-vorbereitung-auf-den-eu-cyber-resilience-act/</loc>
		<lastmod>2025-11-25T09:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-ist-zuruck-wurm-kompromittiert-erneut-hunderte-npm-pakete/</loc>
		<lastmod>2025-11-25T09:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situsamc-confirms-data-breach-affecting-customer-information-2/</loc>
		<lastmod>2025-11-25T09:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon-2fa-das-phishing-kit-das-2fa-ausgehebelt-hat/</loc>
		<lastmod>2025-11-25T09:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-cracks-down-on-malicious-meeting-invites/</loc>
		<lastmod>2025-11-25T10:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shai-hulud-worm-spells-trouble-for-npm-users/</loc>
		<lastmod>2025-11-25T11:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synology-surveillance-station-uberwachungszentrale-auf-dem-nas/</loc>
		<lastmod>2025-11-25T11:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-wettlauf-um-sicherheit-in-einer-ara-ki-gesteuerter-bedrohungen/</loc>
		<lastmod>2025-11-25T11:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-grose-clouddienste-durch-bugs-in-open-source-tool-gefahrdet/</loc>
		<lastmod>2025-11-25T11:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nevadas-trojan-download-penns-1-2m-donor-breach-and-the-malware-that-kills-your-defenses-first/</loc>
		<lastmod>2025-11-25T12:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-receives-international-recognition-2025-global-competitive-strategy-leadership-for-ai-driven-security-operation/</loc>
		<lastmod>2025-11-25T12:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-veteran-led-blast-security-launches-pushing-proactive-cloud-defense-over-response/</loc>
		<lastmod>2025-11-25T12:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-spyware-crews-are-breaking-into-signal-and-whatsapp-accounts/</loc>
		<lastmod>2025-11-25T12:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-spy-ship-theories-sink-after-orkney-blackout-traced-to-wind-farm-fault/</loc>
		<lastmod>2025-11-25T12:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-and-rats-used-to-target-whatsapp-and-signal-users/</loc>
		<lastmod>2025-11-25T12:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/</loc>
		<lastmod>2025-11-25T12:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-blender-3d-assets-to-deploy-stealc-v2-data-stealing-malware/</loc>
		<lastmod>2025-11-25T12:03:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-soc-challenges-you-need-to-solve-before-2026/</loc>
		<lastmod>2025-11-25T12:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dartmouth-college-confirms-data-breach-after-clop-extortion-attack-2/</loc>
		<lastmod>2025-11-25T12:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-deepfake-powered-fraud-skyrockets-amid-identity-fraud-stagnation/</loc>
		<lastmod>2025-11-25T12:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-blender-3d-assets-to-deploy-stealc-v2-data-stealing-malware-2/</loc>
		<lastmod>2025-11-25T12:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mounting-cyber-threats-prompt-calls-for-economic-security-bill/</loc>
		<lastmod>2025-11-25T12:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-soc-challenges-you-need-to-solve-before-2026-2/</loc>
		<lastmod>2025-11-25T12:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datensouveranitat-als-standard-fur-versicherungen-kontrolle-uber-verschlusselte-daten-in-der-cloud/</loc>
		<lastmod>2025-11-25T12:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-beratungshaus-entplexit-setzt-auf-securitybridge-fur-mehr-sap-sicherheit/</loc>
		<lastmod>2025-11-25T12:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-vulnerabilities-could-enable-full-cloud-takeover/</loc>
		<lastmod>2025-11-25T13:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-vulnerabilities-could-enable-full-cloud-takeover-2/</loc>
		<lastmod>2025-11-25T13:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-formatters-expose-thousands-of-secrets-from-banks-govt-tech-orgs/</loc>
		<lastmod>2025-11-25T13:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-vulnerabilities-could-enable-full-cloud-takeover-3/</loc>
		<lastmod>2025-11-25T13:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-formatters-expose-thousands-of-secrets-from-banks-govt-tech-orgs-2/</loc>
		<lastmod>2025-11-25T13:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-security-risks-in-new-agentic-ai-feature/</loc>
		<lastmod>2025-11-25T13:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-formatters-expose-thousands-of-secrets-from-banks-govt-tech-orgs-3/</loc>
		<lastmod>2025-11-25T13:06:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-security-risks-in-new-agentic-ai-feature-2/</loc>
		<lastmod>2025-11-25T13:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-vulnerabilities-could-enable-full-cloud-takeover-4/</loc>
		<lastmod>2025-11-25T13:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-data-breach-at-delta-dental-of-virginia-hits-over-146000-customers-info/</loc>
		<lastmod>2025-11-25T13:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-security-risks-in-new-agentic-ai-feature-3/</loc>
		<lastmod>2025-11-25T13:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-data-breach-at-delta-dental-of-virginia-hits-over-146000-customers-info-2/</loc>
		<lastmod>2025-11-25T13:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-flaw-lets-attackers-access-internal-database-content/</loc>
		<lastmod>2025-11-25T13:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-formatters-expose-thousands-of-secrets-from-banks-govt-tech-orgs-4/</loc>
		<lastmod>2025-11-25T13:07:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-blender-files-to-deploy-stealc-v2-infostealer/</loc>
		<lastmod>2025-11-25T13:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-passwords-at-risk-from-newly-disclosed-cve-2025-65998/</loc>
		<lastmod>2025-11-25T13:08:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-hochschule-mainz/</loc>
		<lastmod>2025-11-25T13:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-passwords-at-risk-from-newly-disclosed-cve-2025-65998-2/</loc>
		<lastmod>2025-11-25T13:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-windows-update/</loc>
		<lastmod>2025-11-25T13:10:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-hochschule-mainz-2/</loc>
		<lastmod>2025-11-25T13:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-and-north-korean-hackers-forge-global-cyberattack-alliance/</loc>
		<lastmod>2025-11-25T13:10:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-passwords-at-risk-from-newly-disclosed-cve-2025-65998-3/</loc>
		<lastmod>2025-11-25T13:10:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-windows-update-2/</loc>
		<lastmod>2025-11-25T13:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-uses-steganography-to-hide-malware-in-fake-windows-security-update/</loc>
		<lastmod>2025-11-25T13:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-hochschule-mainz-3/</loc>
		<lastmod>2025-11-25T13:11:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-windows-update-3/</loc>
		<lastmod>2025-11-25T13:11:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fluent-bit-vulnerabilities-allow-remote-attacks-on-cloud-environments/</loc>
		<lastmod>2025-11-25T13:11:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fluent-bit-vulnerabilities-allow-remote-attacks-on-cloud-environments-2/</loc>
		<lastmod>2025-11-25T13:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-finance-giant-situsamc-hit-by-breach-exposing-confidential-files/</loc>
		<lastmod>2025-11-25T13:12:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sha1-hulud-attack-hits-800-npm-packages-and-thousands-of-github-repos/</loc>
		<lastmod>2025-11-25T13:13:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-finance-giant-situsamc-hit-by-breach-exposing-confidential-files-2/</loc>
		<lastmod>2025-11-25T13:13:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fluent-bit-vulnerabilities-allow-remote-attacks-on-cloud-environments-3/</loc>
		<lastmod>2025-11-25T13:13:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-commercial-spyware-targeting-signal-and-whatsapp-users/</loc>
		<lastmod>2025-11-25T13:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sha1-hulud-attack-hits-800-npm-packages-and-thousands-of-github-repos-2/</loc>
		<lastmod>2025-11-25T13:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-finance-giant-situsamc-hit-by-breach-exposing-confidential-files-3/</loc>
		<lastmod>2025-11-25T13:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sha1-hulud-attack-hits-800-npm-packages-and-thousands-of-github-repos-3/</loc>
		<lastmod>2025-11-25T13:14:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fluent-bit-vulnerabilities-allow-remote-attacks-on-cloud-environments-4/</loc>
		<lastmod>2025-11-25T13:14:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-commercial-spyware-targeting-signal-and-whatsapp-users-2/</loc>
		<lastmod>2025-11-25T13:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens/</loc>
		<lastmod>2025-11-25T13:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-commercial-spyware-targeting-signal-and-whatsapp-users-3/</loc>
		<lastmod>2025-11-25T13:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-finance-giant-situsamc-hit-by-breach-exposing-confidential-files-4/</loc>
		<lastmod>2025-11-25T13:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens-2/</loc>
		<lastmod>2025-11-25T13:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grapheneos-verlasst-ovh-frankreich-ist-kein-sicheres-land-fur-privacy-projekte/</loc>
		<lastmod>2025-11-25T14:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-ways-ai-is-being-used-to-strengthen-democracies-worldwide/</loc>
		<lastmod>2025-11-25T14:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thinking-beyond-price-what-tech-teams-should-look-for-in-a-hosting-provider/</loc>
		<lastmod>2025-11-25T14:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-firefox-to-patch-cve-2025-13016-vulnerability-affecting-180-million-users/</loc>
		<lastmod>2025-11-25T14:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jackfix-attack-circumvents-clickfix-mitigations/</loc>
		<lastmod>2025-11-25T14:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-ways-ai-is-being-used-to-strengthen-democracies-worldwide-2/</loc>
		<lastmod>2025-11-25T14:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europa-als-tech-standort-gipfel-zur-europaischen-digitalen-souveranitat-der-zug-ist-nicht-abgefahren/</loc>
		<lastmod>2025-11-25T14:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level/</loc>
		<lastmod>2025-11-25T15:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-sign-windows-binaries-using-aws-kms/</loc>
		<lastmod>2025-11-25T15:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geopolitik-und-hacktivismus-als-ein-trend-der-cyberkriminalitat/</loc>
		<lastmod>2025-11-25T15:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/constant-time-support-lands-in-llvm-protecting-cryptographic-code-at-the-compiler-level-2/</loc>
		<lastmod>2025-11-25T15:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russische-romcom-payload-wird-uber-socgholish-verbreitet/</loc>
		<lastmod>2025-11-25T15:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clops-oracle-ebs-rampage-reaches-dartmouth-college/</loc>
		<lastmod>2025-11-25T15:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-project-is-rolling-out-counter-galois-onion-encryption/</loc>
		<lastmod>2025-11-25T15:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-is-speeding-up-the-teams-desktop-client-for-windows/</loc>
		<lastmod>2025-11-25T15:03:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/year-end-approaches-how-to-maximize-your-cyber-spend/</loc>
		<lastmod>2025-11-25T15:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jackfix-uses-fake-windows-update-pop-ups-on-adult-sites-to-deliver-multiple-stealers/</loc>
		<lastmod>2025-11-25T15:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clops-oracle-ebs-rampage-reaches-dartmouth-college-2/</loc>
		<lastmod>2025-11-25T15:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-project-is-rolling-out-counter-galois-onion-encryption-2/</loc>
		<lastmod>2025-11-25T15:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-flexibleferret-malware-chain-targets-macos-with-go-backdoor/</loc>
		<lastmod>2025-11-25T15:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-use-a-ruler-to-measure-wind-speed-establishing-a-standard-for-competitive-solutions-testing/</loc>
		<lastmod>2025-11-25T16:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-emergence-of-gptpowered-ransomware-and-the-threat-to-iam-systems/</loc>
		<lastmod>2025-11-25T16:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/would-your-business-survive-a-black-friday-cyberattack/</loc>
		<lastmod>2025-11-25T16:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-use-a-ruler-to-measure-wind-speed-establishing-a-standard-for-competitive-solutions-testing-2/</loc>
		<lastmod>2025-11-25T16:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-emergence-of-gptpowered-ransomware-and-the-threat-to-iam-systems-2/</loc>
		<lastmod>2025-11-25T16:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/would-your-business-survive-a-black-friday-cyberattack-2/</loc>
		<lastmod>2025-11-25T16:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sbom-is-an-investment-in-the-future/</loc>
		<lastmod>2025-11-25T16:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-arrests-young-cybersecurity-entrepreneur-on-treason-charges/</loc>
		<lastmod>2025-11-25T16:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecom-security-reboot-why-zero-trust-is-the-only-way-forward/</loc>
		<lastmod>2025-11-25T16:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecom-security-reboot-why-zero-trust-is-the-only-way-forward-2/</loc>
		<lastmod>2025-11-25T16:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/morphisec-warns-stealc-v2-malware-spread-through-weaponized-blender-files/</loc>
		<lastmod>2025-11-25T16:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-beautifiers-expose-credentials-from-banks-govt-tech-orgs/</loc>
		<lastmod>2025-11-25T16:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/globale-betrugstrends-und-staatliche-schutzmechanismen-milliardenverluste-durch-scams-treffen-auf-schwache-staatliche-kontrolle/</loc>
		<lastmod>2025-11-25T16:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/morphisec-warns-stealc-v2-malware-spread-through-weaponized-blender-files-2/</loc>
		<lastmod>2025-11-25T16:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecommunications-network-security-defending-against-nation-state-apts-with-unified-ai-defense/</loc>
		<lastmod>2025-11-25T17:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-new-appsec-requirements-in-the-age-of-ai/</loc>
		<lastmod>2025-11-25T17:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-detection-in-android-apps-security-benefits-challenges-and-implementation-strategies/</loc>
		<lastmod>2025-11-25T17:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-aligned-hackers-target-us-company-in-attack-linked-to-ukraine-war-effort/</loc>
		<lastmod>2025-11-25T17:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecommunications-network-security-defending-against-nation-state-apts-with-unified-ai-defense-2/</loc>
		<lastmod>2025-11-25T17:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exchange-online-outage-blocks-access-to-outlook-mailboxes/</loc>
		<lastmod>2025-11-25T17:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-new-appsec-requirements-in-the-age-of-ai-2/</loc>
		<lastmod>2025-11-25T17:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-code-formatting-sites-are-exposing-credentials-and-other-secrets/</loc>
		<lastmod>2025-11-25T17:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-friends-like-these-china-spies-on-russian-it-orgs/</loc>
		<lastmod>2025-11-25T17:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smishing-triad-impersonation-campaigns-expand-globally/</loc>
		<lastmod>2025-11-25T17:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams/</loc>
		<lastmod>2025-11-25T17:13:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-you-cant-see-can-hurt-you-are-your-security-tools-hiding-the-real-risks/</loc>
		<lastmod>2025-11-25T18:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-mobile-security-as-it-warns-of-sophisticated-spyware-attacks/</loc>
		<lastmod>2025-11-25T18:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/get-ready-for-2026-the-year-of-ai-aided-ransomware/</loc>
		<lastmod>2025-11-25T18:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/find-the-invisible-salt-mcp-finder-technology-for-proactive-mcp-discovery/</loc>
		<lastmod>2025-11-25T18:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-you-cant-see-can-hurt-you-are-your-security-tools-hiding-the-real-risks-2/</loc>
		<lastmod>2025-11-25T18:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-mobile-security-as-it-warns-of-sophisticated-spyware-attacks-2/</loc>
		<lastmod>2025-11-25T18:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zte-china-unicom-liaoning-and-dalian-changhai-airport-launch-5g-a-isac-private-network-to-elevate-low-altitude-security-and-airport-safety/</loc>
		<lastmod>2025-11-25T18:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-breach-at-spains-national-airline-iberia-with-596-gb-data-theft/</loc>
		<lastmod>2025-11-25T18:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-switches-to-new-counter-galois-onion-relay-encryption-algorithm/</loc>
		<lastmod>2025-11-25T18:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cybercriminals-stole-262m-by-impersonating-bank-support-teams/</loc>
		<lastmod>2025-11-25T18:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-gen-z-enters-cybersecurity-jury-is-out-on-ais-impact/</loc>
		<lastmod>2025-11-25T18:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/years-of-jsonformatter-and-codebeautify-leaks-expose-thousands-of-passwords-and-api-keys/</loc>
		<lastmod>2025-11-25T18:03:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-breach-at-spains-national-airline-iberia-with-596-gb-data-theft-2/</loc>
		<lastmod>2025-11-25T18:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-switches-to-new-counter-galois-onion-relay-encryption-algorithm-2/</loc>
		<lastmod>2025-11-25T18:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-eagleye-exposing-hidden-web-interfaces-in-lot-devices-via-routing-analysis/</loc>
		<lastmod>2025-11-25T19:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/georgia-court-filing-organization-warns-of-outages-after-ransomware-allegations/</loc>
		<lastmod>2025-11-25T19:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vllm-flaw-puts-ai-systems-at-risk-of-remote-code-execution/</loc>
		<lastmod>2025-11-25T19:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashjack-attack-shows-ai-browsers-can-be-fooled-with-a-simple/</loc>
		<lastmod>2025-11-25T19:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nominations-open-for-the-most-inspiring-women-in-cyber-awards-2026/</loc>
		<lastmod>2025-11-25T19:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-salt-mcp-finder-technology/</loc>
		<lastmod>2025-11-25T19:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-salt-mcp-finder-technology-2/</loc>
		<lastmod>2025-11-25T19:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-salt-mcp-finder-technology-3/</loc>
		<lastmod>2025-11-25T19:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-salt-mcp-finder-technology-4/</loc>
		<lastmod>2025-11-25T19:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features/</loc>
		<lastmod>2025-11-25T19:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features-2/</loc>
		<lastmod>2025-11-25T19:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features-4/</loc>
		<lastmod>2025-11-25T19:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features-3/</loc>
		<lastmod>2025-11-25T19:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams-2/</loc>
		<lastmod>2025-11-25T19:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams-4/</loc>
		<lastmod>2025-11-25T19:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams-3/</loc>
		<lastmod>2025-11-25T19:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vscode-marketplace-hit-by-rogue-prettier-extension-delivering-anivia-stealer/</loc>
		<lastmod>2025-11-25T19:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams-5/</loc>
		<lastmod>2025-11-25T19:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vscode-marketplace-hit-by-rogue-prettier-extension-delivering-anivia-stealer-2/</loc>
		<lastmod>2025-11-25T19:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vscode-marketplace-hit-by-rogue-prettier-extension-delivering-anivia-stealer-3/</loc>
		<lastmod>2025-11-25T19:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-salt-mcp-finder-technology-5/</loc>
		<lastmod>2025-11-25T19:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-security-isnt-stopping-ancient-phishing-tactics/</loc>
		<lastmod>2025-11-25T19:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-security-isnt-stopping-ancient-phishing-tactics-2/</loc>
		<lastmod>2025-11-25T19:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features-5/</loc>
		<lastmod>2025-11-25T19:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vscode-marketplace-hit-by-rogue-prettier-extension-delivering-anivia-stealer-4/</loc>
		<lastmod>2025-11-25T19:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-security-isnt-stopping-ancient-phishing-tactics-3/</loc>
		<lastmod>2025-11-25T19:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detego-global-launches-case-management-platform-for-digital-forensics-and-incident-response-teams-6/</loc>
		<lastmod>2025-11-25T19:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radware-adds-firewall-for-llms-to-security-portfolio/</loc>
		<lastmod>2025-11-25T20:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-we-trust-ai-with-our-cybersecurity-the-growing-importance-of-ai-security/</loc>
		<lastmod>2025-11-25T20:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-leaks-why-are-we-so-stupid-about-free-online-services/</loc>
		<lastmod>2025-11-25T20:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fluent-bit-flaws-open-the-door-to-log-hijacking-and-cloud-takeover/</loc>
		<lastmod>2025-11-25T20:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radware-adds-firewall-for-llms-to-security-portfolio-2/</loc>
		<lastmod>2025-11-25T20:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-black-friday-2025-cybersecurity-it-vpn-antivirus-deals/</loc>
		<lastmod>2025-11-25T20:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-we-trust-ai-with-our-cybersecurity-the-growing-importance-of-ai-security-2/</loc>
		<lastmod>2025-11-25T20:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/constella-intelligence-named-best-in-class-in-javelin-strategy-researchs-2025-dark-web-threat-intelligence-vendor-scorecard/</loc>
		<lastmod>2025-11-25T21:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/262-million-stolen-in-account-takeover-fraud-schemes-this-year-fbi-says-ahead-of-holiday-season/</loc>
		<lastmod>2025-11-25T21:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-vault-bug-allows-attackers-to-log-in-without-credentials/</loc>
		<lastmod>2025-11-25T21:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-offers-up-to-280-million-to-immigrant-tracking-bounty-hunter-firms/</loc>
		<lastmod>2025-11-25T21:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-latest-shai-hulud-malware-is-faster-and-more-dangerous/</loc>
		<lastmod>2025-11-25T22:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-bank-impersonators-fuel-262m-surge-in-account-takeover-fraud/</loc>
		<lastmod>2025-11-25T22:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delta-dental-of-virginia-breach-exposes-data-of-145000-customers/</loc>
		<lastmod>2025-11-25T22:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developers-left-large-cache-of-credentials-exposed-on-code-generation-websites/</loc>
		<lastmod>2025-11-25T23:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/underground-ai-models-promise-to-be-hackers-cyber-pentesting-waifu/</loc>
		<lastmod>2025-11-25T23:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudweek-so-schutzen-sich-organisationen-vor-betrug-und-phishing/</loc>
		<lastmod>2025-11-25T23:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acquired-firms-turned-into-ransomware-bait-inside-parent-companies-via-porous-sonicwalls/</loc>
		<lastmod>2025-11-25T23:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developers-left-large-cache-of-credentials-exposed-on-code-generation-websites-2/</loc>
		<lastmod>2025-11-25T23:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rare-apt-collaboration-emerges-between-russia-and-north-korea/</loc>
		<lastmod>2025-11-25T23:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-firefox-bug-leaves-180m-users-exposed-2/</loc>
		<lastmod>2025-11-25T23:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/</loc>
		<lastmod>2025-11-25T23:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprks-flexibleferret-tightens-macos-grip/</loc>
		<lastmod>2025-11-25T23:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-hidden-and-lost-control-on-security-design-risks-in-lot-user-facing-matter-controller/</loc>
		<lastmod>2025-11-26T00:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-threat-hunting-discovers-and-reconstructs-a-sophisticated-water-gamayun-apt-group-attack/</loc>
		<lastmod>2025-11-26T00:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-hidden-and-lost-control-on-security-design-risks-in-lot-user-facing-matter-controller-2/</loc>
		<lastmod>2025-11-26T00:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mosa-principles-will-reshape-the-dod-rmf/</loc>
		<lastmod>2025-11-26T00:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-ceo-downplays-impact-of-attack-that-spread-to-salesforce-environments/</loc>
		<lastmod>2025-11-26T00:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-threat-hunting-discovers-and-reconstructs-a-sophisticated-water-gamayun-apt-group-attack-2/</loc>
		<lastmod>2025-11-26T00:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mysql-8-0-fallt-am-30-april-2026-aus-dem-support/</loc>
		<lastmod>2025-11-26T00:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lifetime-access-to-aievil-wormgpt-4-costs-just-220/</loc>
		<lastmod>2025-11-26T00:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-predators-get-more-than-they-bargain-for-when-their-prey-runs-sonicwall-firewalls/</loc>
		<lastmod>2025-11-26T00:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-abuse-of-signal-and-whatsapp-targeting-us-officials/</loc>
		<lastmod>2025-11-26T00:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lifetime-access-to-aievil-wormgpt-4-costs-just-220-2/</loc>
		<lastmod>2025-11-26T00:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-parliamentary-committee-recommends-software-liability/</loc>
		<lastmod>2025-11-26T00:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-predators-get-more-than-they-bargain-for-when-their-prey-runs-sonicwall-firewalls-2/</loc>
		<lastmod>2025-11-26T00:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/info-blocking-enforcement-what-hhs-will-likely-focus-on/</loc>
		<lastmod>2025-11-26T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-abuse-of-signal-and-whatsapp-targeting-us-officials-2/</loc>
		<lastmod>2025-11-26T00:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cheap-hardware-module-bypasses-amd-intel-memory-encryption/</loc>
		<lastmod>2025-11-26T00:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-investing-in-advanced-nhis-justified/</loc>
		<lastmod>2025-11-26T01:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-i-free-to-choose-different-agentic-ai-frameworks/</loc>
		<lastmod>2025-11-26T01:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-nhis-a-powerful-tool-in-cybersecurity/</loc>
		<lastmod>2025-11-26T01:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-certain-can-i-be-of-the-security-in-nhis/</loc>
		<lastmod>2025-11-26T01:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-investing-in-advanced-nhis-justified-2/</loc>
		<lastmod>2025-11-26T01:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/183-million-credentials-misreported-as-a-gmail-breach/</loc>
		<lastmod>2025-11-26T01:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-i-free-to-choose-different-agentic-ai-frameworks-2/</loc>
		<lastmod>2025-11-26T01:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crif-studie-alarmiert-95-prozent-der-webshops-von-betrug-betroffen/</loc>
		<lastmod>2025-11-26T01:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/esicherheit-bei-webmail-diensten-bsi-anforderungen-hinsichtlich-sicherheit-transparenz-und-benutzerfreundlichkeit/</loc>
		<lastmod>2025-11-26T01:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-security-of-passkeys/</loc>
		<lastmod>2025-11-26T05:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weshalb-modernes-pam-eindeutig-die-sicherere-wahl-im-vergleich-zu-klassischem-ztna-ist/</loc>
		<lastmod>2025-11-26T05:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-trends-2026-ki-cyberrisiken-und-digitale-souveranitat-verandern-die-it-landschaft/</loc>
		<lastmod>2025-11-26T05:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-die-besten-security-anwendungsfalle/</loc>
		<lastmod>2025-11-26T05:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-security-of-passkeys-2/</loc>
		<lastmod>2025-11-26T05:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attacks-use-fake-windows-update-screens-to-fool-employees/</loc>
		<lastmod>2025-11-26T05:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weshalb-modernes-pam-eindeutig-die-sicherere-wahl-im-vergleich-zu-klassischem-ztna-ist-2/</loc>
		<lastmod>2025-11-26T05:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-trends-2026-ki-cyberrisiken-und-digitale-souveranitat-verandern-die-it-landschaft-2/</loc>
		<lastmod>2025-11-26T05:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gru-unit-29155-uses-socgholish-to-target-us-firm/</loc>
		<lastmod>2025-11-26T05:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-reports-262m-in-ato-fraud-as-researchers-cite-growing-ai-phishing-and-holiday-scams/</loc>
		<lastmod>2025-11-26T05:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-im-thankful-for-in-devsecops-this-year-living-through-interesting-times/</loc>
		<lastmod>2025-11-26T06:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepteam-open-source-llm-red-teaming-framework/</loc>
		<lastmod>2025-11-26T06:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-board-members-think-about-cyber-risk-and-what-cisos-should-tell-them/</loc>
		<lastmod>2025-11-26T06:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-im-thankful-for-in-devsecops-this-year-living-through-interesting-times-2/</loc>
		<lastmod>2025-11-26T06:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepteam-open-source-llm-red-teaming-framework-2/</loc>
		<lastmod>2025-11-26T06:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-board-members-think-about-cyber-risk-and-what-cisos-should-tell-them-2/</loc>
		<lastmod>2025-11-26T06:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-exploits-cyber-domain-to-aid-kinetic-strikes/</loc>
		<lastmod>2025-11-26T06:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-exploits-cyber-domain-to-aid-kinetic-strikes-2/</loc>
		<lastmod>2025-11-26T06:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-threats-have-broken-strong-authentication/</loc>
		<lastmod>2025-11-26T07:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adware-kampagne-ghostad-im-google-play-store/</loc>
		<lastmod>2025-11-26T07:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-threats-have-broken-strong-authentication-2/</loc>
		<lastmod>2025-11-26T07:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/small-language-models-step-into-the-fight-against-phishing-sites/</loc>
		<lastmod>2025-11-26T07:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-for-infosec-how-to-spot-real-value-and-avoid-the-noise/</loc>
		<lastmod>2025-11-26T07:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gamayun-apt-exploits-new-msc-eviltwin-vulnerability-to-deliver-malicious-payloads/</loc>
		<lastmod>2025-11-26T07:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adware-kampagne-ghostad-im-google-play-store-2/</loc>
		<lastmod>2025-11-26T07:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-threats-have-broken-strong-authentication-3/</loc>
		<lastmod>2025-11-26T07:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-in-chrome-google-warnt-vor-gefahrlichen-sicherheitslucken-in-cloud-und-browser/</loc>
		<lastmod>2025-11-26T07:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-cybercriminals-target-black-friday-and-cyber-monday/</loc>
		<lastmod>2025-11-26T08:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-ai-firewalls-worth-the-investment/</loc>
		<lastmod>2025-11-26T08:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-generated-code-in-enterprise-applications-the-new-frontier-for-appsec-teams/</loc>
		<lastmod>2025-11-26T08:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alliances-between-ransomware-groups-tied-to-recent-surge-in-cybercrime/</loc>
		<lastmod>2025-11-26T08:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-cybercriminals-target-black-friday-and-cyber-monday-2/</loc>
		<lastmod>2025-11-26T08:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-ai-firewalls-worth-the-investment-2/</loc>
		<lastmod>2025-11-26T08:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heineken-ciso-champions-a-new-risk-mindset-to-unlock-innovation/</loc>
		<lastmod>2025-11-26T08:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-generated-code-in-enterprise-applications-the-new-frontier-for-appsec-teams-2/</loc>
		<lastmod>2025-11-26T08:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-mit-plan-a-und-plan-b-cyberresilienz-mit-business-continuity-und-disaster-recovery/</loc>
		<lastmod>2025-11-26T08:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle/</loc>
		<lastmod>2025-11-26T09:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erweiterung-des-cyber-resilienz-angebots-service-soll-datenschutzverletzungen-beim-enterprise-storage-aufdecken/</loc>
		<lastmod>2025-11-26T09:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bombendrohungen-bka-greift-gegen-online-gruppierung-schweinetreff-durch/</loc>
		<lastmod>2025-11-26T09:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudulent-email-domain-tracker-november-2025/</loc>
		<lastmod>2025-11-26T10:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-principles/</loc>
		<lastmod>2025-11-26T10:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dissecting-a-new-malspam-chain-delivering-purelogs-infostealer/</loc>
		<lastmod>2025-11-26T10:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automating-compliance-to-boost-security-and-roi/</loc>
		<lastmod>2025-11-26T10:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudulent-email-domain-tracker-november-2025-2/</loc>
		<lastmod>2025-11-26T10:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-transforms-data-aggregation-speed-for-energy-traders/</loc>
		<lastmod>2025-11-26T10:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-principles-2/</loc>
		<lastmod>2025-11-26T10:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romcom-uses-socgholish-fake-update-attacks-to-deliver-mythic-agent-malware/</loc>
		<lastmod>2025-11-26T10:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-councils-hit-by-serious-cyber-incidents/</loc>
		<lastmod>2025-11-26T10:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcoming-hurdles-in-telecom-network-automation/</loc>
		<lastmod>2025-11-26T11:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quanten-kryptografie-gegen-q-day-gefahr-droht-die-kryptokalypse-durch-quantencomputer/</loc>
		<lastmod>2025-11-26T11:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashjack-indirect-prompt-injection-weaponizes-websites/</loc>
		<lastmod>2025-11-26T11:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unifying-cloud-strategy-to-unlock-ai-potential/</loc>
		<lastmod>2025-11-26T11:12:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-mehrere-ki-browser-mit-nur-einem-zeichen-uberlistet/</loc>
		<lastmod>2025-11-26T11:13:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-mails-der-freese-gruppe-nach-hack-nov-2025/</loc>
		<lastmod>2025-11-26T11:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oig-audit-finds-commerce-department-failing-to-fully-secure-public-facing-systems/</loc>
		<lastmod>2025-11-26T11:17:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-evade-un-sanctions-through-cyber-operations-and-crypto-schemes/</loc>
		<lastmod>2025-11-26T12:17:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-rolls-out-new-feature-for-faster-startup-and-better-performance/</loc>
		<lastmod>2025-11-26T12:18:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reward-hacking-training-produces-malicious-cross-task-behaviors/</loc>
		<lastmod>2025-11-26T12:18:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-learn-to-spot-risks-and-patch-safely-with-community-maintained-tools/</loc>
		<lastmod>2025-11-26T12:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-evade-un-sanctions-through-cyber-operations-and-crypto-schemes-2/</loc>
		<lastmod>2025-11-26T12:18:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fruhwarnsysteme-fur-industrieumgebungen-ot-monitoring-anomalien-erkennen-bevor-es-zu-spat-ist/</loc>
		<lastmod>2025-11-26T12:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-rolls-out-new-feature-for-faster-startup-and-better-performance-2/</loc>
		<lastmod>2025-11-26T12:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reward-hacking-training-produces-malicious-cross-task-behaviors-2/</loc>
		<lastmod>2025-11-26T12:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-councils-probe-cyber-incident-as-shared-it-systems-knocked-offline/</loc>
		<lastmod>2025-11-26T12:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashjack-a-novel-exploit-leveraging-url-fragments-to-deceive-ai-browsers/</loc>
		<lastmod>2025-11-26T12:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-caught-injecting-hidden-solana-transfer-fees-into-raydium-swaps/</loc>
		<lastmod>2025-11-26T12:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developers-are-exposing-passwords-and-api-keys-through-online-code-tools/</loc>
		<lastmod>2025-11-26T12:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-battlefield-6-downloads-are-spreading-malware-stealing-player-data/</loc>
		<lastmod>2025-11-26T12:13:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-alerts-go-dark-after-cyberattack-on-onsolve-codered/</loc>
		<lastmod>2025-11-26T12:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-breach-reinforces-need-to-plug-third-party-security-weaknesses/</loc>
		<lastmod>2025-11-26T12:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-battlefield-6-hype-to-spread-stealers-and-c2-malware/</loc>
		<lastmod>2025-11-26T12:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-breach-reinforces-need-to-plug-third-party-security-weaknesses-2/</loc>
		<lastmod>2025-11-26T12:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-trick-macos-users-into-running-terminal-commands-to-install-flexibleferret-malware/</loc>
		<lastmod>2025-11-26T12:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-battlefield-6-hype-to-spread-stealers-and-c2-malware-2/</loc>
		<lastmod>2025-11-26T12:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-trick-macos-users-into-running-terminal-commands-to-install-flexibleferret-malware-2/</loc>
		<lastmod>2025-11-26T12:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-network-adopts-galois-onion-encryption-to-strengthen-user-protection/</loc>
		<lastmod>2025-11-26T12:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-network-adopts-galois-onion-encryption-to-strengthen-user-protection-2/</loc>
		<lastmod>2025-11-26T12:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-as-a-service-olymp-loader-emerges-on-hacker-forums-with-advanced-anti-analysis-features/</loc>
		<lastmod>2025-11-26T12:16:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-breach-reinforces-need-to-plug-third-party-security-weaknesses-3/</loc>
		<lastmod>2025-11-26T12:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stranger-things-emerge-when-ot-security-is-stuck-in-the-past/</loc>
		<lastmod>2025-11-26T13:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharjah-police-experiment-exposes-how-easily-people-fall-for-fake-qr-codes/</loc>
		<lastmod>2025-11-26T13:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-evolves-to-target-outlook-archives-and-microsoft-365-tokens/</loc>
		<lastmod>2025-11-26T13:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stranger-things-emerge-when-ot-security-is-stuck-in-the-past-2/</loc>
		<lastmod>2025-11-26T13:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharjah-police-experiment-exposes-how-easily-people-fall-for-fake-qr-codes-2/</loc>
		<lastmod>2025-11-26T13:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-observability-und-sicherheit-neu-denken-mussen/</loc>
		<lastmod>2025-11-26T13:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-apt-evolves-to-target-outlook-archives-and-microsoft-365-tokens-2/</loc>
		<lastmod>2025-11-26T13:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stranger-things-emerge-when-ot-security-is-stuck-in-the-past-3/</loc>
		<lastmod>2025-11-26T13:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-deckt-adware-kampagne-ghostad-in-google-play-auf/</loc>
		<lastmod>2025-11-26T13:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-hashjack/</loc>
		<lastmod>2025-11-26T13:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-managedprovider-mit-netzwerk-monitoring-risiken-reduzieren-und-transparenz-erhohen-konnen/</loc>
		<lastmod>2025-11-26T13:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-hashjack-2/</loc>
		<lastmod>2025-11-26T13:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-warns-of-new-critical-auth-bypass-flaw-in-aicloud-routers/</loc>
		<lastmod>2025-11-26T13:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-managedprovider-mit-netzwerk-monitoring-risiken-reduzieren-und-transparenz-erhohen-konnen-2/</loc>
		<lastmod>2025-11-26T13:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-your-2m-security-detection-fails-can-your-soc-save-you/</loc>
		<lastmod>2025-11-26T13:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-nutzern-eingefugt-forscher-finden-brisanten-datenschatz-bei-codeformatierern/</loc>
		<lastmod>2025-11-26T13:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-warns-of-new-critical-auth-bypass-flaw-in-aicloud-routers-2/</loc>
		<lastmod>2025-11-26T13:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-cyber-attack-affect-more-salesforce-customers/</loc>
		<lastmod>2025-11-26T13:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-cyber-attack-affect-more-salesforce-customers-2/</loc>
		<lastmod>2025-11-26T13:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-choose-the-right-virtual-data-room-for-your-startup/</loc>
		<lastmod>2025-11-26T14:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-issue-hits-three-london-councils-with-shared-it-services/</loc>
		<lastmod>2025-11-26T14:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-choose-the-right-virtual-data-room-for-your-startup-2/</loc>
		<lastmod>2025-11-26T14:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-founders-jailed-in-237m-crypto-laundering-case/</loc>
		<lastmod>2025-11-26T14:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-cisos-perspective-on-scaling-genai-securely/</loc>
		<lastmod>2025-11-26T14:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-issue-hits-three-london-councils-with-shared-it-services-2/</loc>
		<lastmod>2025-11-26T14:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/price-drop-this-complete-ethical-hacking-bundle-is-now-33/</loc>
		<lastmod>2025-11-26T14:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-choose-the-right-virtual-data-room-for-your-startup-3/</loc>
		<lastmod>2025-11-26T14:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-issue-hits-three-london-councils-with-shared-it-services-3/</loc>
		<lastmod>2025-11-26T14:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samourai-wallet-founders-jailed-in-237m-crypto-laundering-case-2/</loc>
		<lastmod>2025-11-26T14:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-secure-entra-id-sign-ins-from-script-injection-attacks/</loc>
		<lastmod>2025-11-26T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-data-leak-bytetobreach-offers-stolen-global-airline-banking-and-government-records/</loc>
		<lastmod>2025-11-26T14:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-secure-entra-id-sign-ins-from-script-injection-attacks-2/</loc>
		<lastmod>2025-11-26T14:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-fake-update-lures-to-deploy-socgholish-malware/</loc>
		<lastmod>2025-11-26T14:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-data-leak-bytetobreach-offers-stolen-global-airline-banking-and-government-records-2/</loc>
		<lastmod>2025-11-26T14:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-active-attacks-on-telecom-and-media-industries/</loc>
		<lastmod>2025-11-26T14:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-fake-update-lures-to-deploy-socgholish-malware-2/</loc>
		<lastmod>2025-11-26T14:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-london-councils-enact-emergency-plans-after-being-hit-by-cyber-attack/</loc>
		<lastmod>2025-11-26T14:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-active-attacks-on-telecom-and-media-industries-2/</loc>
		<lastmod>2025-11-26T14:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-secure-entra-id-sign-ins-from-script-injection-attacks-3/</loc>
		<lastmod>2025-11-26T14:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations/</loc>
		<lastmod>2025-11-26T15:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-video-translation-enhances-multilingual-user-training-for-sso-and-access-management-systems/</loc>
		<lastmod>2025-11-26T15:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-surface-of-cloud-based-generative-ai-applications-is-evolving/</loc>
		<lastmod>2025-11-26T15:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-clickfix-kampagne-nutzt-fake-windows-updates/</loc>
		<lastmod>2025-11-26T15:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations-2/</loc>
		<lastmod>2025-11-26T15:03:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airbus-nach-stromausfall-in-spanien-vor-produktionsabbruch-us-notfallsystem-steht-nach-cyberangriff/</loc>
		<lastmod>2025-11-26T15:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-video-translation-enhances-multilingual-user-training-for-sso-and-access-management-systems-2/</loc>
		<lastmod>2025-11-26T15:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/codered-emergency-alert-system-codedead-after-inc-ransomware-attack/</loc>
		<lastmod>2025-11-26T15:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/municipal-emergency-warning-service-offline-after-hackers-steal-user-data/</loc>
		<lastmod>2025-11-26T15:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-breach-salesforce-details-attack-window-issues-investigation-guidance/</loc>
		<lastmod>2025-11-26T15:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-navy-scuttles-constellation-frigate-program-for-being-too-slow-for-tomorrows-threats/</loc>
		<lastmod>2025-11-26T15:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/codered-emergency-alert-system-codedead-after-inc-ransomware-attack-2/</loc>
		<lastmod>2025-11-26T15:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-malware-secretly-adds-hidden-sol-fees-to-solana-swap-transactions/</loc>
		<lastmod>2025-11-26T15:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/municipal-emergency-warning-service-offline-after-hackers-steal-user-data-2/</loc>
		<lastmod>2025-11-26T15:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations-3/</loc>
		<lastmod>2025-11-26T15:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-262m-losses-from-account-takeover-fraud-in-2025/</loc>
		<lastmod>2025-11-26T15:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations-4/</loc>
		<lastmod>2025-11-26T15:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hochsicherheits-pakt-nato-und-google-cloud-schliesen-deal-fur-ki-fahige-cloud/</loc>
		<lastmod>2025-11-26T15:08:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-262m-losses-from-account-takeover-fraud-in-2025-2/</loc>
		<lastmod>2025-11-26T15:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations-5/</loc>
		<lastmod>2025-11-26T15:08:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-infostealer-digitstealer-hinterlasst-kaum-spuren-in-betroffenen-systemen/</loc>
		<lastmod>2025-11-26T15:08:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-262m-losses-from-account-takeover-fraud-in-2025-3/</loc>
		<lastmod>2025-11-26T15:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-3d-design-software-to-target-game-developers-animators/</loc>
		<lastmod>2025-11-26T16:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-scheitern-haufig-an-den-verborgenen-risiken-in-microsoft-365/</loc>
		<lastmod>2025-11-26T16:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-london-councils-faced-a-cyberattack/</loc>
		<lastmod>2025-11-26T16:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-keys-may-prompt-for-pin-after-recent-updates/</loc>
		<lastmod>2025-11-26T16:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-3d-design-software-to-target-game-developers-animators-2/</loc>
		<lastmod>2025-11-26T16:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-arent-confident-they-can-secure-non-human-identities-nhis/</loc>
		<lastmod>2025-11-26T16:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-scheitern-haufig-an-den-verborgenen-risiken-in-microsoft-365-2/</loc>
		<lastmod>2025-11-26T16:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwork-7-self-hosted-password-and-secrets-manager-for-enterprise-teams/</loc>
		<lastmod>2025-11-26T16:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-report-proposes-liability-for-software-provider-insecurity/</loc>
		<lastmod>2025-11-26T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-turns-south-korean-msp-breach-into-28-victim-korean-leaks-data-heist/</loc>
		<lastmod>2025-11-26T16:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tightens-cloud-login-process-to-prevent-common-attack/</loc>
		<lastmod>2025-11-26T17:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-backed-threat-group-uses-socgholish-to-target-u-s-company/</loc>
		<lastmod>2025-11-26T17:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thailand-bans-world-iris-scans-orders-company-to-delete-data/</loc>
		<lastmod>2025-11-26T17:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telefonbetrug-mit-der-ja-masche-per-mitschnitt-abgezockt/</loc>
		<lastmod>2025-11-26T17:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tightens-cloud-login-process-to-prevent-common-attack-2/</loc>
		<lastmod>2025-11-26T17:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-security-breaches-will-hit-40-of-all-companies-by-2030-warns-gartner/</loc>
		<lastmod>2025-11-26T17:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-backed-threat-group-uses-socgholish-to-target-u-s-company-2/</loc>
		<lastmod>2025-11-26T17:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-flaw-in-guest-chat-exposes-users-to-malware-attacks/</loc>
		<lastmod>2025-11-26T17:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data/</loc>
		<lastmod>2025-11-26T17:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-destruction-of-a-notorious-myanmar-scam-compound-appears-to-have-been-performative/</loc>
		<lastmod>2025-11-26T17:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-flaw-in-guest-chat-exposes-users-to-malware-attacks-2/</loc>
		<lastmod>2025-11-26T17:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-councils-endure-wave-of-cyber-attacks-shared-it-services-hit/</loc>
		<lastmod>2025-11-26T17:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-flaw-in-guest-chat-exposes-users-to-malware-attacks-3/</loc>
		<lastmod>2025-11-26T17:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data-2/</loc>
		<lastmod>2025-11-26T17:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-jury-systems-used-by-several-us-states-exposed-sensitive-personal-data-3/</loc>
		<lastmod>2025-11-26T17:06:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-councils-enact-emergency-plans-after-three-hit-by-cyber-attack/</loc>
		<lastmod>2025-11-26T17:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-destruction-of-a-notorious-myanmar-scam-compound-appears-to-have-been-performative-2/</loc>
		<lastmod>2025-11-26T17:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injections-loom-large-over-chatgpts-atlas-browser/</loc>
		<lastmod>2025-11-26T17:08:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iomart-strikes-positive-tone-after-mixed-h1/</loc>
		<lastmod>2025-11-26T17:08:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injections-loom-large-over-chatgpts-atlas-browser-2/</loc>
		<lastmod>2025-11-26T17:09:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attack-disrupts-onsolve-codered-emergency-notification-system/</loc>
		<lastmod>2025-11-26T17:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iomart-strikes-positive-tone-after-mixed-h1-2/</loc>
		<lastmod>2025-11-26T17:09:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injections-loom-large-over-chatgpts-atlas-browser-3/</loc>
		<lastmod>2025-11-26T17:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-from-online-fraud-this-holiday-season/</loc>
		<lastmod>2025-11-26T18:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-machine-learning-based-lot-device-identification-models-for-security-applications/</loc>
		<lastmod>2025-11-26T18:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thanksgiving-holiday-weekend-kicks-off-heightened-threat-environment-for-security-teams/</loc>
		<lastmod>2025-11-26T18:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/care-that-you-share/</loc>
		<lastmod>2025-11-26T18:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-ceo-promises-transparency-as-it-responds-to-compromise-of-salesforce-integration/</loc>
		<lastmod>2025-11-26T18:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-five-cybersecurity-black-friday-deals-for-businesses-2025/</loc>
		<lastmod>2025-11-26T18:03:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-industry-warns-patchwork-cyber-regs-are-driving-up-costs/</loc>
		<lastmod>2025-11-26T18:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-meeting-assistants-are-rising-but-is-your-data-safe-a-deep-look-at-ticnote-ai/</loc>
		<lastmod>2025-11-26T18:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-london-councils-responding-to-cyberattack/</loc>
		<lastmod>2025-11-26T18:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-five-cybersecurity-black-friday-deals-for-businesses-2025-2/</loc>
		<lastmod>2025-11-26T18:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-industry-warns-patchwork-cyber-regs-are-driving-up-costs-2/</loc>
		<lastmod>2025-11-26T18:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-mathy-friends-cybersecurity-needs-you/</loc>
		<lastmod>2025-11-26T18:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-smarter-faster-and-ai-powered-scams-drive-a-surge-in-cyber-threats/</loc>
		<lastmod>2025-11-26T18:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-user-education-can-become-the-strongest-link-in-casino-security/</loc>
		<lastmod>2025-11-26T18:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-smarter-faster-and-ai-powered-scams-drive-a-surge-in-cyber-threats-2/</loc>
		<lastmod>2025-11-26T18:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-user-education-can-become-the-strongest-link-in-casino-security-2/</loc>
		<lastmod>2025-11-26T18:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ctem-helps-cyber-teams-to-become-more-proactive/</loc>
		<lastmod>2025-11-26T18:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ctem-helps-cyber-teams-to-become-more-proactive-2/</loc>
		<lastmod>2025-11-26T18:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-london-councils-it-systems-disrupted-by-cyberattack/</loc>
		<lastmod>2025-11-26T18:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-smarter-faster-and-ai-powered-scams-drive-a-surge-in-cyber-threats-3/</loc>
		<lastmod>2025-11-26T18:07:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-llms-aid-petty-criminals-but-underwhelm-technically/</loc>
		<lastmod>2025-11-26T18:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-user-education-can-become-the-strongest-link-in-casino-security-3/</loc>
		<lastmod>2025-11-26T18:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-london-councils-it-systems-disrupted-by-cyberattack-2/</loc>
		<lastmod>2025-11-26T18:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-llms-aid-petty-criminals-but-underwhelm-technically-2/</loc>
		<lastmod>2025-11-26T18:08:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trust-crisis-why-digital-services-are-losing-consumer-confidence/</loc>
		<lastmod>2025-11-26T19:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-calls-on-anthropic-ceo-to-testify-on-chinese-claude-espionage-campaign/</loc>
		<lastmod>2025-11-26T19:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-energy-and-commerce-committee-unveils-new-draft-childrens-online-safety-bill/</loc>
		<lastmod>2025-11-26T19:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-controlvault-lasso-gl-inet-vulnerabilities/</loc>
		<lastmod>2025-11-26T19:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trust-crisis-why-digital-services-are-losing-consumer-confidence-2/</loc>
		<lastmod>2025-11-26T19:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comcast-to-pay-1-5m-fine-for-vendor-breach-affecting-270k-customers/</loc>
		<lastmod>2025-11-26T19:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-calls-on-anthropic-ceo-to-testify-on-chinese-claude-espionage-campaign-2/</loc>
		<lastmod>2025-11-26T19:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-legislation-targets-scammers-that-use-ai-to-deceive/</loc>
		<lastmod>2025-11-26T19:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-fraud-at-industrial-scale-2025-wasnt-great/</loc>
		<lastmod>2025-11-26T19:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-malware-authors-are-incorporating-llms-to-evade-detection/</loc>
		<lastmod>2025-11-26T19:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-legislation-targets-scammers-that-use-ai-to-deceive-2/</loc>
		<lastmod>2025-11-26T19:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-v2-campaign-spreads-from-npm-to-maven-exposing-thousands-of-secrets/</loc>
		<lastmod>2025-11-26T19:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-fraud-at-industrial-scale-2025-wasnt-great-2/</loc>
		<lastmod>2025-11-26T19:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-variante-des-shai-hulud-worm-supply-chain-angriff-trifft-uber-1-000-npm-pakete/</loc>
		<lastmod>2025-11-26T19:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-malware-authors-are-incorporating-llms-to-evade-detection-2/</loc>
		<lastmod>2025-11-26T19:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-v2-campaign-spreads-from-npm-to-maven-exposing-thousands-of-secrets-2/</loc>
		<lastmod>2025-11-26T19:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-thales-protects-online-retail-sites-from-ai-driven-bots-during-holiday-shopping-season/</loc>
		<lastmod>2025-11-26T20:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paris-the-thinker-and-why-your-waf-should-block-xss-by-default/</loc>
		<lastmod>2025-11-26T20:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-london-councils-report-disruption-amid-ongoing-cyberattack/</loc>
		<lastmod>2025-11-26T20:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnet-takes-advantage-of-aws-outage-to-smack-28-countries/</loc>
		<lastmod>2025-11-26T20:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rare-apt-collaboration-emerges-between-russia-and-north-korea-2/</loc>
		<lastmod>2025-11-26T20:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-thales-protects-online-retail-sites-from-ai-driven-bots-during-holiday-shopping-season-2/</loc>
		<lastmod>2025-11-26T20:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-forge-library-gets-fix-for-signature-verification-bypass-flaw/</loc>
		<lastmod>2025-11-26T20:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crewai-github-token-exposure-highlights-the-growing-risk-of-static-credentials-in-ai-systems/</loc>
		<lastmod>2025-11-26T21:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/because-fraud-detection-deserves-better-than-another-ai-written-seo-page/</loc>
		<lastmod>2025-11-26T21:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-most-common-soar-use-cases/</loc>
		<lastmod>2025-11-26T21:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/at-least-35000-impacted-by-dartmouth-college-breach-through-oracle-ebs-campaign/</loc>
		<lastmod>2025-11-26T21:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crewai-github-token-exposure-highlights-the-growing-risk-of-static-credentials-in-ai-systems-2/</loc>
		<lastmod>2025-11-26T21:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-ceo-downplays-breach-says-only-a-handful-of-customers-had-data-stolen/</loc>
		<lastmod>2025-11-26T21:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-the-first-time-a-romcom-payload-has-been-observed-being-distributed-via-socgholish/</loc>
		<lastmod>2025-11-26T21:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akiras-sonicwall-hacks-are-taking-down-large-enterprises/</loc>
		<lastmod>2025-11-26T21:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xillen-stealer-evolves-with-ai-like-evasion-and-broader-targeting/</loc>
		<lastmod>2025-11-26T21:03:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-ceo-downplays-breach-says-only-a-handful-of-customers-had-data-stolen-2/</loc>
		<lastmod>2025-11-26T21:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordvpn-black-friday-deal-unlock-77-off-vpn-plans-in-2025/</loc>
		<lastmod>2025-11-26T21:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-moves-to-defend-undersea-cables-from-china-russia/</loc>
		<lastmod>2025-11-26T22:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-account-takeover-scammers-stole-262-million-this-year/</loc>
		<lastmod>2025-11-26T23:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-voiceradar-voice-deepfake-detection-using-micro-frequency-and-compositional-analysis/</loc>
		<lastmod>2025-11-26T23:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-heart-mountain/</loc>
		<lastmod>2025-11-26T23:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crisis24-shuts-down-emergency-notification-system-in-wake-of-ransomware-attack/</loc>
		<lastmod>2025-11-26T23:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-account-takeover-scammers-stole-262-million-this-year-2/</loc>
		<lastmod>2025-11-26T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-voiceradar-voice-deepfake-detection-using-micro-frequency-and-compositional-analysis-2/</loc>
		<lastmod>2025-11-26T23:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/</loc>
		<lastmod>2025-11-26T23:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-prioritizing-code-quality-is-the-fastest-way-to-reduce-security-risks/</loc>
		<lastmod>2025-11-27T00:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/effortless-ssl-automation-why-its-faster-and-more-cost-efficient-than-you-think/</loc>
		<lastmod>2025-11-27T00:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-digitale-souveranitat-franzosischer-richter-nicolas-guillou-nach-us-sanktionen-in-digitaler-steinzeit-ovh-soll-daten-eines-kunden-an-kanada-liefern/</loc>
		<lastmod>2025-11-27T00:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elena-lazar-failures-are-inevitable-reliability-is-a-choice/</loc>
		<lastmod>2025-11-27T00:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cyber-defenses-continue-to-lag-at-rural-hospitals/</loc>
		<lastmod>2025-11-27T00:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-prioritizing-code-quality-is-the-fastest-way-to-reduce-security-risks-2/</loc>
		<lastmod>2025-11-27T00:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-browsers-can-be-tricked-with-malicious-prompts-hidden-in-url-fragments/</loc>
		<lastmod>2025-11-27T01:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/water-gamayun-weaponizes-msc-eviltwin/</loc>
		<lastmod>2025-11-27T01:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasked-massive-leak-exposes-irans-department-40-cyber-terror-unit/</loc>
		<lastmod>2025-11-27T01:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-browsers-can-be-tricked-with-malicious-prompts-hidden-in-url-fragments-2/</loc>
		<lastmod>2025-11-27T01:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chat-kontrolle-light-fur-eu-beschlossen-dav-warnt-vor-freiwilligen-uberwachungsmasnahmen/</loc>
		<lastmod>2025-11-27T01:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-deals-als-koder-bsi-warnt-vor-cyberbetrug-beim-onlineshopping/</loc>
		<lastmod>2025-11-27T01:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/water-gamayun-weaponizes-msc-eviltwin-2/</loc>
		<lastmod>2025-11-27T01:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-says-windows-11-transition-is-far-slower-than-win-10-shift-as-pc-sales-stall/</loc>
		<lastmod>2025-11-27T01:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ine-expands-cross-skilling-innovations-6/</loc>
		<lastmod>2025-11-27T05:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-v2-spreads-from-npm-to-maven-as-campaign-exposes-thousands-of-secrets/</loc>
		<lastmod>2025-11-27T05:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-angreifer-das-npm-okosystem-infiltrierten/</loc>
		<lastmod>2025-11-27T05:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-llm-generierte-malware-wird-immer-besser/</loc>
		<lastmod>2025-11-27T05:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-445-the-hack-that-brought-back-the-zombie-apocalypse/</loc>
		<lastmod>2025-11-27T05:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminalitat-wird-im-jahr-2026-vollstandig-industrialisiert/</loc>
		<lastmod>2025-11-27T06:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontinuierliches-netzwerk-monitoring-als-strategischer-vorteil-fur-managed-service-provider/</loc>
		<lastmod>2025-11-27T06:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-identity-mess-your-customers-feel-before-you-do/</loc>
		<lastmod>2025-11-27T06:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminalitat-wird-im-jahr-2026-vollstandig-industrialisiert-2/</loc>
		<lastmod>2025-11-27T06:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-networks-industrialize-payment-fraud-operations/</loc>
		<lastmod>2025-11-27T06:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontinuierliches-netzwerk-monitoring-als-strategischer-vorteil-fur-managed-service-provider-2/</loc>
		<lastmod>2025-11-27T06:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashjack-ki-browser-werden-zur-unsichtbaren-phishing-waffe/</loc>
		<lastmod>2025-11-27T07:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-it-techtalk-unveranderliche-speicherkomponenten-sind-eine-wichtige-masnahme-gegen-ransomware-attacken/</loc>
		<lastmod>2025-11-27T07:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hottest-cybersecurity-open-source-tools-of-the-month-november-2025/</loc>
		<lastmod>2025-11-27T07:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-critical-infrastructure-is-running-out-of-time/</loc>
		<lastmod>2025-11-27T07:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cspm-buyers-guide-how-to-choose-the-best-cloud-security-posture-management-tools/</loc>
		<lastmod>2025-11-27T08:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-expands-impacted-customer-list-following-salesforce-security-alert/</loc>
		<lastmod>2025-11-27T08:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zu-black-friday-und-cyber-monday-startet-die-hochsaison-fur-cyberbetrug-fake-shops-und-phishing-erkennen-und-sicher-online-einkaufen/</loc>
		<lastmod>2025-11-27T08:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubertragt-auch-outlook-365-classic-zugangsdaten-an-microsoft/</loc>
		<lastmod>2025-11-27T09:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-asus-firmware-patches-critical-aicloud-vulnerability/</loc>
		<lastmod>2025-11-27T09:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/utimaco-dienst-soll-kontrolle-uber-cloud-schlussel-verbessern-enterprise-key-manager-as-a-service-fur-microsoft-azure/</loc>
		<lastmod>2025-11-27T09:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-wie-sich-ein-supply-chain-wurm-weiterentwickelt/</loc>
		<lastmod>2025-11-27T09:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sans-bericht-zeigt-wachsende-lucke-zwischen-erkennungs-und-wiederherstellungszeiten/</loc>
		<lastmod>2025-11-27T09:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-zeigt-extern-tags-schutzen-kaum-vor-datenklau-via-phishing/</loc>
		<lastmod>2025-11-27T09:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opendesk-1-10-erhoht-sicherheit-und-optimiert-zusammenarbeit/</loc>
		<lastmod>2025-11-27T09:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feiertage-und-wochenenden-bleiben-bei-angreifern-beliebt/</loc>
		<lastmod>2025-11-27T10:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-backed-spyware-attacks-are-targeting-signal-and-whatsapp-users-cisa-warns/</loc>
		<lastmod>2025-11-27T10:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-take-aim-at-zendesk-users/</loc>
		<lastmod>2025-11-27T10:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-provisions-of-the-uk-cyber-resilience-bill-revealed/</loc>
		<lastmod>2025-11-27T10:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-threat-intelligence-von-vorschrift-zur-praktischen-resilienz/</loc>
		<lastmod>2025-11-27T11:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-fur-vernetzte-produktionsumgebungen-zero-trust-schutzt-den-zugang-zu-ot-umgebungen/</loc>
		<lastmod>2025-11-27T11:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stranger-things-in-der-cybersicherheit-warum-unsere-digitale-welt-heute-unberechenbarer-ist-denn-je/</loc>
		<lastmod>2025-11-27T11:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberbehorde-warnt-signal-und-whatsapp-nutzer-laufend-mit-spyware-attackiert/</loc>
		<lastmod>2025-11-27T11:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-discloses-api-customer-data-breach-via-mixpanel-vendor-hack/</loc>
		<lastmod>2025-11-27T12:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-ai-malware-voice-bot-flaws-crypto-laundering-iot-attacks-and-20-more-stories/</loc>
		<lastmod>2025-11-27T12:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-warns-of-mixpanel-data-breach-impacting-api-users/</loc>
		<lastmod>2025-11-27T12:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-fears-but-no-breach-spike-expected-this-festive-season/</loc>
		<lastmod>2025-11-27T12:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gigamon-umfrage-unter-cisos-metadaten-sind-die-eckpfeiler-der-sicherheitsstrategien-fur-2026/</loc>
		<lastmod>2025-11-27T12:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-openai-dienstleister-fallt-auf-phishing-sms-rein/</loc>
		<lastmod>2025-11-27T12:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-guest-chat-feature-exposes-cross-tenant-blind-spot/</loc>
		<lastmod>2025-11-27T13:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-server-uber-dienstleister-gehackt-api-daten-abgeflossen/</loc>
		<lastmod>2025-11-27T13:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scottish-council-still-rebuilding-systems-two-years-after-ransomware-attack/</loc>
		<lastmod>2025-11-27T13:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-api-user-data-exposed-in-mixpanel-breach-chatgpt-unaffected/</loc>
		<lastmod>2025-11-27T13:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-co-bad-bot-traffic-gefahrdet-online-handel/</loc>
		<lastmod>2025-11-27T13:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nutzerdaten-abgeflossen-dienstleister-von-openai-fallt-auf-phishing-sms-rein/</loc>
		<lastmod>2025-11-27T13:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-is-in-talks-to-buy-identity-security-firm-veza-for-over-1-billion-report/</loc>
		<lastmod>2025-11-27T14:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-toddycat-toolkit-greift-outlook-und-microsoft-token-an/</loc>
		<lastmod>2025-11-27T14:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werden-ki-orchestrierte-cyber-angriffe-zur-realitat/</loc>
		<lastmod>2025-11-27T14:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-admits-ransomware-gang-may-have-spilled-almost-2m-peoples-data/</loc>
		<lastmod>2025-11-27T14:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-in-der-neuen-version-ist-der-wurm-noch-schwerer-zu-entdecken-erzeugt-hinterturen-fur-spionage-und-loscht-unwiederbringlich-die-daten-der-opfer/</loc>
		<lastmod>2025-11-27T14:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cronos-kicks-off-42k-global-hackathon-focused-on-ai-powered-on-chain-payments/</loc>
		<lastmod>2025-11-27T14:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rollen-und-berechtigungen-sollten-im-gesamten-identity-lifecycle-dynamisch-gesteuert-werden/</loc>
		<lastmod>2025-11-27T14:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-wlf-scrambles-to-secure-user-funds/</loc>
		<lastmod>2025-11-27T14:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-angreifer-das-npm-okosystem-infiltrierten-2/</loc>
		<lastmod>2025-11-27T15:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-budget-2025-reactions-from-tech-leaders/</loc>
		<lastmod>2025-11-27T15:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-sounds-alarm-after-emergency-tones-turned-into-potty-mouthed-radio-takeover/</loc>
		<lastmod>2025-11-27T15:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-disrupts-services-across-london-councils/</loc>
		<lastmod>2025-11-27T15:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-multiple-london-councils-exposes-fragility-of-shared-public-sector-systems/</loc>
		<lastmod>2025-11-27T15:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-skywalking-flaw-allows-attackers-to-launch-xss-attacks/</loc>
		<lastmod>2025-11-27T15:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-reveals-mixpanel-data-breach-exposing-user-details/</loc>
		<lastmod>2025-11-27T15:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dead-mans-switch-triggers-massive-npm-supply-chain-malware-attack/</loc>
		<lastmod>2025-11-27T15:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lapsus-hunters-register-40-domains-impersonating-zendesk-environments/</loc>
		<lastmod>2025-11-27T15:03:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-skywalking-flaw-allows-attackers-to-launch-xss-attacks-2/</loc>
		<lastmod>2025-11-27T15:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-guest-chat-flaw-could-let-hackers-deliver-malware/</loc>
		<lastmod>2025-11-27T15:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-reveals-mixpanel-data-breach-exposing-user-details-2/</loc>
		<lastmod>2025-11-27T15:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abandoned-ical-domains-threaten-4m-devices/</loc>
		<lastmod>2025-11-27T15:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-dgx-spark-flaws-allow-attackers-to-run-malicious-code-and-launch-dos-attacks/</loc>
		<lastmod>2025-11-27T15:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-v2-exploits-github-actions-to-steal-secrets/</loc>
		<lastmod>2025-11-27T15:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-wenn-shopping-fieber-und-ki-betrug-zusammenkommen/</loc>
		<lastmod>2025-11-27T15:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abandoned-ical-domains-threaten-4m-devices-2/</loc>
		<lastmod>2025-11-27T15:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-confirms-1-5-million-customers-affected-in-major-cyber-attack/</loc>
		<lastmod>2025-11-27T15:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-dgx-spark-flaws-allow-attackers-to-run-malicious-code-and-launch-dos-attacks-2/</loc>
		<lastmod>2025-11-27T15:05:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retroperspektive-wie-kommt-cybersicherheit-in-den-chefetagen-an/</loc>
		<lastmod>2025-11-27T15:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hacker-group-targets-israeli-high-tech-and-aerospace-professionals/</loc>
		<lastmod>2025-11-27T15:06:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam/</loc>
		<lastmod>2025-11-27T16:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quttera-launches-evidence-as-code/</loc>
		<lastmod>2025-11-27T16:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-admits-data-breach-after-analytics-partner-hit-by-phishing-attack/</loc>
		<lastmod>2025-11-27T16:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-dienstleister-gehackt/</loc>
		<lastmod>2025-11-27T16:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam-2/</loc>
		<lastmod>2025-11-27T16:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-data-may-have-been-exposed-after-a-cyberattack-on-analytics-firm-mixpanel/</loc>
		<lastmod>2025-11-27T16:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-recently-patched-oracle-flaw-under-attack/</loc>
		<lastmod>2025-11-27T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ab-januar-2026-microsoft-teams-ermoglicht-standorterfassung-im-buro/</loc>
		<lastmod>2025-11-27T16:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-exchange-upbit-suffers-security-breach-after-10b-deal/</loc>
		<lastmod>2025-11-27T16:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-cyber-attack-affects-more-salesforce-customers/</loc>
		<lastmod>2025-11-27T16:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zendesk-users-targeted-as-scattered-lapsus-hunters-spin-up-fake-support-sites/</loc>
		<lastmod>2025-11-27T17:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-cuts-off-mixpanel-after-analytics-leak-exposes-api-users/</loc>
		<lastmod>2025-11-27T17:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-space-becomes-warfare-domain-cyber-is-on-the-frontlines/</loc>
		<lastmod>2025-11-27T17:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-block-unauthorized-scripts-in-entra-id-logins-with-2026-csp-update/</loc>
		<lastmod>2025-11-27T17:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-threat-actor-expands-activity-across-central-asia/</loc>
		<lastmod>2025-11-27T17:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zendesk-users-targeted-as-scattered-lapsus-hunters-spin-up-fake-support-sites-2/</loc>
		<lastmod>2025-11-27T17:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-names-teen-in-scattered-lapsus-hunters-group-denies/</loc>
		<lastmod>2025-11-27T18:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam-3/</loc>
		<lastmod>2025-11-27T18:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quttera-launches-evidence-as-code-2/</loc>
		<lastmod>2025-11-27T18:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-warns-of-hackers-hijacking-radio-equipment-for-false-alerts/</loc>
		<lastmod>2025-11-27T18:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-reshaping-cyber-as-national-security-priority/</loc>
		<lastmod>2025-11-27T19:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-hospital-cyber-rules-to-raise-the-bar-nationwide/</loc>
		<lastmod>2025-11-27T19:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-your-firewall-sees-that-your-edr-doesnt/</loc>
		<lastmod>2025-11-27T19:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-expands-java-based-netsupport-rat-attacks-in-kyrgyzstan-and-uzbekistan/</loc>
		<lastmod>2025-11-27T19:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-detains-russian-citizen-suspected-of-hacking-local-firms/</loc>
		<lastmod>2025-11-27T20:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-says-crooks-stole-data-of-approximately-2m-customers-and-employees/</loc>
		<lastmod>2025-11-27T20:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2026-kaspersky-meldet-146-500-spam-mails-mit-rabatt-bezug-seit-anfang-november/</loc>
		<lastmod>2025-11-28T00:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bmds-etat-2026-laut-eco-unzureichend-fur-digitalen-aufbruch-deutschlands/</loc>
		<lastmod>2025-11-28T00:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-schwachstelle-cve-2025-59287-wird-fur-shadowpad-malware-verteilung-per-wsus-genutzt/</loc>
		<lastmod>2025-11-28T00:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-schutz-teams-protection-stoppt-angriffe-uber-kompromittierte-konten-in-microsoft-teams/</loc>
		<lastmod>2025-11-28T05:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-schutz-teams-protection-stoppt-angriffe-uber-kompromittierte-konten-in-microsoft-teams-4/</loc>
		<lastmod>2025-11-28T05:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-schutz-teams-protection-stoppt-angriffe-uber-kompromittierte-konten-in-microsoft-teams-2/</loc>
		<lastmod>2025-11-28T05:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-schutz-teams-protection-stoppt-angriffe-uber-kompromittierte-konten-in-microsoft-teams-3/</loc>
		<lastmod>2025-11-28T05:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-schutz-teams-protection-stoppt-angriffe-uber-kompromittierte-konten-in-microsoft-teams-5/</loc>
		<lastmod>2025-11-28T05:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-in-eigener-sache-mit-smart-answers-zu-mehr-information-5/</loc>
		<lastmod>2025-11-28T05:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-in-eigener-sache-mit-smart-answers-zu-mehr-information-2/</loc>
		<lastmod>2025-11-28T05:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-in-eigener-sache-mit-smart-answers-zu-mehr-information/</loc>
		<lastmod>2025-11-28T05:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-in-eigener-sache-mit-smart-answers-zu-mehr-information-4/</loc>
		<lastmod>2025-11-28T05:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-in-eigener-sache-mit-smart-answers-zu-mehr-information-3/</loc>
		<lastmod>2025-11-28T05:01:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-caution-app-developers-about-risks-in-using-google-antigravity/</loc>
		<lastmod>2025-11-28T05:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-caution-app-developers-about-risks-in-using-google-antigravity-3/</loc>
		<lastmod>2025-11-28T05:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-caution-app-developers-about-risks-in-using-google-antigravity-2/</loc>
		<lastmod>2025-11-28T05:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-caution-app-developers-about-risks-in-using-google-antigravity-4/</loc>
		<lastmod>2025-11-28T05:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-caution-app-developers-about-risks-in-using-google-antigravity-5/</loc>
		<lastmod>2025-11-28T05:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-web-giant-naver-acquired-crypto-exchange-upbit-which-reported-a-30m-heist-a-day-later/</loc>
		<lastmod>2025-11-28T05:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-web-giant-naver-acquired-crypto-exchange-upbit-which-reported-a-30m-heist-a-day-later-2/</loc>
		<lastmod>2025-11-28T05:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-web-giant-naver-acquired-crypto-exchange-upbit-which-reported-a-30m-heist-a-day-later-3/</loc>
		<lastmod>2025-11-28T05:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-web-giant-naver-acquired-crypto-exchange-upbit-which-reported-a-30m-heist-a-day-later-4/</loc>
		<lastmod>2025-11-28T05:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-web-giant-naver-acquired-crypto-exchange-upbit-which-reported-a-30m-heist-a-day-later-5/</loc>
		<lastmod>2025-11-28T05:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alibaba-cloud-cant-deploy-servers-fast-enough-to-satisfy-demand-for-ai-2/</loc>
		<lastmod>2025-11-28T05:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alibaba-cloud-cant-deploy-servers-fast-enough-to-satisfy-demand-for-ai/</loc>
		<lastmod>2025-11-28T05:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alibaba-cloud-cant-deploy-servers-fast-enough-to-satisfy-demand-for-ai-3/</loc>
		<lastmod>2025-11-28T05:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alibaba-cloud-cant-deploy-servers-fast-enough-to-satisfy-demand-for-ai-4/</loc>
		<lastmod>2025-11-28T05:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alibaba-cloud-cant-deploy-servers-fast-enough-to-satisfy-demand-for-ai-5/</loc>
		<lastmod>2025-11-28T05:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-lousy-ai-didnt-stop-it-beating-samsungs-smartphone-sales-for-the-first-time-since-2011/</loc>
		<lastmod>2025-11-28T05:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-builds-a-dns-backstop-to-allow-changes-when-its-notoriously-flaky-us-east-region-wobbles/</loc>
		<lastmod>2025-11-28T05:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-lousy-ai-didnt-stop-it-beating-samsungs-smartphone-sales-for-the-first-time-since-2011-2/</loc>
		<lastmod>2025-11-28T05:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-builds-a-dns-backstop-to-allow-changes-when-its-notoriously-flaky-us-east-region-wobbles-2/</loc>
		<lastmod>2025-11-28T05:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/620-mehr-phishing-angriffe-am-black-friday/</loc>
		<lastmod>2025-11-28T06:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosec-products-of-the-month-november-2025/</loc>
		<lastmod>2025-11-28T06:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fragmented-tooling-slows-vulnerability-management/</loc>
		<lastmod>2025-11-28T06:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-councils-hit-by-cyberattack-disrupts-it-and-telephone-lines/</loc>
		<lastmod>2025-11-28T06:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-scammers-are-impersonating-major-brands-to-steal-your-money/</loc>
		<lastmod>2025-11-28T06:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/620-mehr-phishing-angriffe-am-black-friday-2/</loc>
		<lastmod>2025-11-28T06:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-blocks-external-scripts-in-entra-id-logins-to-boost-security/</loc>
		<lastmod>2025-11-28T06:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kawaiigpt-a-free-wormgpt-clone-using-deepseek-gemini-and-kimi-k2-models/</loc>
		<lastmod>2025-11-28T06:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-gefahr-fur-macos-digitstealer-stiehlt-daten-unbemerkt/</loc>
		<lastmod>2025-11-28T07:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-observational-auditing-framework-takes-aim-at-machine-learning-privacy-leaks/</loc>
		<lastmod>2025-11-28T07:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-password-management-defines-pci-dss-success/</loc>
		<lastmod>2025-11-28T07:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstelle-in-der-contact-discovery-funktion-35-milliarden-whatsapp-konten-ausgelesen/</loc>
		<lastmod>2025-11-28T07:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-gefahr-fur-macos-digitstealer-stiehlt-daten-unbemerkt-2/</loc>
		<lastmod>2025-11-28T07:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empathetic-policy-engineering-the-secret-to-better-security-behavior-and-awareness/</loc>
		<lastmod>2025-11-28T08:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiny-tweak-for-pi-os-big-makeover-for-the-imager/</loc>
		<lastmod>2025-11-28T08:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-data-puts-user-passwords-at-risk-in-unexpected-ways/</loc>
		<lastmod>2025-11-28T08:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konsolidierte-it-losungen-fur-kmu-so-klappt-ganzheitliche-sicherheit-auch-fur-den-mittelstand/</loc>
		<lastmod>2025-11-28T08:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empathetic-policy-engineering-the-secret-to-better-security-behavior-and-awareness-2/</loc>
		<lastmod>2025-11-28T08:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-wird-chefsache-was-drei-jahre-managementbefragungen-zeigen/</loc>
		<lastmod>2025-11-28T08:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werbefreies-youtube-streaming-signatur-leak-macht-smarttube-zur-malware-bedrohung/</loc>
		<lastmod>2025-11-28T09:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerk-und-security-konsolidierung-versa-integriert-secure-sd-wan-in-microsoft-entra-internet-access/</loc>
		<lastmod>2025-11-28T09:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-variant-shadowv2-tests-iot-exploits-amid-aws-disruption/</loc>
		<lastmod>2025-11-28T10:44:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-guest-access-leaves-users-exposed-to-attacks/</loc>
		<lastmod>2025-11-28T10:44:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-malware-robuste-cyberabwehr-braucht-moderne-technik-und-awareness-trainings/</loc>
		<lastmod>2025-11-28T10:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-confirms-cyberattack-exposed-data-of-1-5m-customers/</loc>
		<lastmod>2025-11-28T10:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riskante-nutzungsmuster-die-psychologie-hinter-der-ki-begeisterung/</loc>
		<lastmod>2025-11-28T10:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-teams-guest-access-can-remove-defender-protection-when-users-join-external-tenants/</loc>
		<lastmod>2025-11-28T10:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-target-zendesk-users-with-fake-domains/</loc>
		<lastmod>2025-11-28T11:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-football-federation-suffers-data-breach/</loc>
		<lastmod>2025-11-28T11:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-abwehr-und-krisenhilfe-fur-unternehmen-die-eu-als-neuer-sheriff-in-town/</loc>
		<lastmod>2025-11-28T11:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storung-bei-webland-tagelange-ausfalle-bei-grosem-schweizer-hoster/</loc>
		<lastmod>2025-11-28T11:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werbefreies-youtube-streaming-smarttube-app-mutiert-durch-leak-zur-malware-gefahr/</loc>
		<lastmod>2025-11-28T11:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poems-can-trick-ai-into-helping-you-make-a-nuclear-weapon/</loc>
		<lastmod>2025-11-28T11:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-sensitive-secrets-published-on-jsonformatter-and-codebeautify/</loc>
		<lastmod>2025-11-28T11:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-digital-id-plan-gets-a-price-tag-at-last-1-8b/</loc>
		<lastmod>2025-11-28T12:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-dora-ruckt-das-ikt-risikomanagement-immer-mehr-in-den-fokus/</loc>
		<lastmod>2025-11-28T12:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gerateflut-ohne-uberblick-palo-alto-report-deckt-transparenzlucke-in-unternehmensnetzen-auf/</loc>
		<lastmod>2025-11-28T12:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romcom-tries-dropping-a-notromantic-payload-on-ukraine-linked-us-firms/</loc>
		<lastmod>2025-11-28T13:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-law-regulating-web-browsers-could-have-national-data-privacy-impact-experts-say/</loc>
		<lastmod>2025-11-28T13:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obr-drags-in-cyber-bigwig-after-budget-leak-blunder/</loc>
		<lastmod>2025-11-28T13:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-indias-data-protection-rules-get-more-teeth/</loc>
		<lastmod>2025-11-28T13:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romcom-tries-dropping-a-notromantic-payload-on-ukraine-linked-us-firms-2/</loc>
		<lastmod>2025-11-28T13:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-organizations-are-turning-to-rpam/</loc>
		<lastmod>2025-11-28T13:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auf-github-verfugbar-virenscanner-erkennen-offentlichen-android-trojaner-nicht/</loc>
		<lastmod>2025-11-28T13:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-dora-ruckt-das-ikt-risikomanagement-in-den-fokus/</loc>
		<lastmod>2025-11-28T14:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asahi-cybervorfall-kein-bier-bis-2026-aber-191-millionen-daten-abgeflossen/</loc>
		<lastmod>2025-11-28T14:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-randthema-zur-fuhrungsaufgabe-cybersicherheit-erreicht-die-chefetagen/</loc>
		<lastmod>2025-11-28T14:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-llms-empower-inexperienced-hackers-with-advanced-tools/</loc>
		<lastmod>2025-11-28T14:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tryhackme-races-to-add-women-to-christmas-cyber-challenge-roster-after-backlash/</loc>
		<lastmod>2025-11-28T14:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-black-friday-scams-to-watch-out-for-this-year/</loc>
		<lastmod>2025-11-28T14:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greynoise-launches-free-scanner-to-check-if-youre-part-of-a-botnet/</loc>
		<lastmod>2025-11-28T14:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seit-wochen-auf-github-virenscanner-scheitern-an-offentlichem-android-trojaner/</loc>
		<lastmod>2025-11-28T14:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundeswehr-s4-hana-sap-raumt-mangelnde-softwarequalitat-ein/</loc>
		<lastmod>2025-11-28T14:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-antigravity-lucke-ki-coding-tool-anfallig-fur-angriffe/</loc>
		<lastmod>2025-11-28T15:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doom-hits-kicad-as-pcb-traces-become-demons-and-doors/</loc>
		<lastmod>2025-11-28T15:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-halt-chipstute-fur-eine-waffe-und-weitere-ki-fails-des-jahres/</loc>
		<lastmod>2025-11-28T15:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-durch-bequemlichkeit-tausende-bank-und-behordendaten-offen-im-netz/</loc>
		<lastmod>2025-11-28T15:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-friday-2025-ki-betrug-von-cyberkriminellen-im-bestellchaos-lanciert/</loc>
		<lastmod>2025-11-28T16:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-register-18000-holiday-themed-domains-to-launch-seasonal-scams/</loc>
		<lastmod>2025-11-28T16:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gainsight-verifies-token-breach-linked-to-salesforce-advisory-issues-new-iocs/</loc>
		<lastmod>2025-11-28T16:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-arrests-suspected-russian-hacker-targeting-local-organizations-networks/</loc>
		<lastmod>2025-11-28T16:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-develop-sophisticated-new-ransomware-as-a-service-tool/</loc>
		<lastmod>2025-11-28T16:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-greynoise-ip-checker-helps-users-identify-botnet-activity/</loc>
		<lastmod>2025-11-28T16:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-calendar-subscriptions-for-phishing-and-malware-delivery/</loc>
		<lastmod>2025-11-28T16:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comcast-fined-1-5-million-to-settle-fcc-probe-tied-to-vendor-data-breach/</loc>
		<lastmod>2025-11-28T16:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seit-wochen-auf-github-virenscanner-scheitern-an-neuem-android-trojaner/</loc>
		<lastmod>2025-11-28T16:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-greynoise-ip-checker-helps-users-identify-botnet-activity-2/</loc>
		<lastmod>2025-11-28T16:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardwaredefekt-im-storage-cluster-tagelange-ausfalle-bei-schweizer-hoster-webland/</loc>
		<lastmod>2025-11-28T16:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-calendar-subscriptions-for-phishing-and-malware-delivery-2/</loc>
		<lastmod>2025-11-28T16:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoor-vshell-chinesisches-spionage-tool-auf-uber-1-500-servern/</loc>
		<lastmod>2025-11-28T16:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-fur-das-eigene-unternehmen-nutzen-wie-googles-neuer-modus-die-spielregeln-andert/</loc>
		<lastmod>2025-11-28T17:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/posthog-admits-shai-hulud-2-0-was-its-biggest-ever-security-bungle/</loc>
		<lastmod>2025-11-28T17:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-telco-brsk-confirms-breach-as-bidding-begins-for-230k-customer-records/</loc>
		<lastmod>2025-11-28T17:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-football-federation-discloses-data-breach-after-cyberattack/</loc>
		<lastmod>2025-11-28T17:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grapheneos-bails-on-ovhcloud-over-frances-privacy-stance/</loc>
		<lastmod>2025-11-28T17:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-eltern-ihre-kinder-vor-dem-online-pranger-schutzen-konnen/</loc>
		<lastmod>2025-11-28T17:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-beer-giant-asahi-says-ransomware-attack-may-have-exposed-data-of-1-5-million-people/</loc>
		<lastmod>2025-11-28T18:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-moves-supply-chain-hits-credential-harvesting/</loc>
		<lastmod>2025-11-28T18:00:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legacy-python-bootstrap-scripts-create-domain-takeover-risk-in-multiple-pypi-packages/</loc>
		<lastmod>2025-11-28T18:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-deploy-197-npm-packages-to-spread-updated-ottercookie-malware/</loc>
		<lastmod>2025-11-28T18:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-beer-giant-asahi-says-ransomware-attack-may-have-exposed-data-of-1-5-million-people-2/</loc>
		<lastmod>2025-11-28T18:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/londoners-told-to-be-vigilant-with-messages-after-cyber-attack-on-council/</loc>
		<lastmod>2025-11-28T18:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-moves-supply-chain-hits-credential-harvesting-2/</loc>
		<lastmod>2025-11-28T18:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-coalition-to-government-shutdown-is-over-get-to-work/</loc>
		<lastmod>2025-11-28T19:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-suspends-mixpanel-use-after-analytics-data-breach/</loc>
		<lastmod>2025-11-28T19:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-modern-igaming-platforms-offer-better-cyber-protections-than-traditional-apps/</loc>
		<lastmod>2025-11-28T19:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/</loc>
		<lastmod>2025-11-28T19:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-coalition-to-government-shutdown-is-over-get-to-work-2/</loc>
		<lastmod>2025-11-28T19:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-updates-make-password-login-option-invisible/</loc>
		<lastmod>2025-11-28T19:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/public-gitlab-repositories-exposed-more-than-17000-secrets/</loc>
		<lastmod>2025-11-28T19:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/werbefreies-youtube-streaming-smarttube-app-funktioniert-plotzlich-nicht-mehr/</loc>
		<lastmod>2025-11-28T19:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-stole-member-data-from-french-soccer-federation/</loc>
		<lastmod>2025-11-28T23:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-tied-to-targeting-of-zendesk-users/</loc>
		<lastmod>2025-11-28T23:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sturnus-androidtrojaner-eine-weitere-gefahrliche-eskalation-beim-mobil-betrug/</loc>
		<lastmod>2025-11-29T00:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verantwortung-in-der-cloud-das-shared-responsibility-modell/</loc>
		<lastmod>2025-11-29T00:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-realty-equinix-battle-for-euro4-5b-atnorth-acquisition/</loc>
		<lastmod>2025-11-29T01:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-digital-services-tax-raises-800m-from-global-tech-giants/</loc>
		<lastmod>2025-11-29T01:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-resilienz-aufbauen-so-sichern-wir-digitale-netze-und-services/</loc>
		<lastmod>2025-11-29T05:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haftungsfalle-cybersecurity-nis2-schulungspflicht-setzt-geschaftsleiter-unter-zugzwang/</loc>
		<lastmod>2025-11-29T05:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-schatten-ki-ihre-groste-sicherheitslucke-sein-konnte/</loc>
		<lastmod>2025-11-29T05:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-true-crime-blinkenlights-aus-der-holle/</loc>
		<lastmod>2025-11-29T10:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-ki-verscharft-sicherheitsrisiken-sieben-punkte-plan-fur-ctos-zum-schutz-der-cloud/</loc>
		<lastmod>2025-11-29T10:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundeswehr-s-4hana-sap-raumt-mangelnde-softwarequalitat-ein/</loc>
		<lastmod>2025-11-29T11:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leak-confirms-openai-is-preparing-ads-on-chatgpt-for-public-roll-out/</loc>
		<lastmod>2025-11-29T11:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-wired-guide-to-digital-opsec-for-teens/</loc>
		<lastmod>2025-11-29T13:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/volle-datenhoheit-fur-nutzer-dwinity-launcht-unknackbare-blockchain-cloud/</loc>
		<lastmod>2025-11-29T13:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashjack-attack-uses-url-to-control-ai-browser-behavior/</loc>
		<lastmod>2025-11-29T14:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-beer-giant-asahi-says-data-breach-hit-1-5-million-people/</loc>
		<lastmod>2025-11-29T16:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tomiris-hacker-group-unveils-new-tools-and-techniques-for-global-attacks/</loc>
		<lastmod>2025-11-29T16:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mystery-oast-tool-exploits-200-cves-using-google-cloud-for-large-scale-attacks/</loc>
		<lastmod>2025-11-29T16:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/albiriox-malware-emerges-targeting-android-users-for-full-device-takeover/</loc>
		<lastmod>2025-11-29T16:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-beer-giant-asahi-says-data-breach-hit-1-5-million-people-2/</loc>
		<lastmod>2025-11-29T16:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-data-prognostiziert-neue-dynamik-der-cyberkriminalitat-ki-malware-und-insider-bedrohungen-bestimmen-2026-die-bedrohungslage/</loc>
		<lastmod>2025-11-30T00:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-verordnung-nis-2-richtlinie-und-cyber-resilience-act-auswirkungen-auf-kmu/</loc>
		<lastmod>2025-11-30T00:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-update-health-tools-kb4023057-war-per-rce-angreifbar/</loc>
		<lastmod>2025-11-30T00:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-in-fluent-bit-gefahrdeten-usinstanzen/</loc>
		<lastmod>2025-11-30T00:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-data-prognostiziert-neue-dynamik-der-cyberkriminalitat-ki-malware-und-insider-bedrohungen-bestimmen-2026-die-bedrohungslage-2/</loc>
		<lastmod>2025-11-30T00:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/21-deutscher-it-sicherheitskongress-bsi-hat-call-for-papers-gestartet/</loc>
		<lastmod>2025-11-30T00:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-campaign-expands-with-197-npm-ppackages-spreading-new-ottercookie-malware/</loc>
		<lastmod>2025-11-30T05:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nachste-ransomware-evolutionsstufe-nutzt-agentic-ai-fahigkeiten/</loc>
		<lastmod>2025-11-30T08:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-fake-windows-update-fuels-malware-salesforce-details-gainsight-breach/</loc>
		<lastmod>2025-11-30T09:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-xss-bug-cve-2021-26829-in-openplc-scadabr-to-kev/</loc>
		<lastmod>2025-11-30T11:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spesenbetrug-ist-ki-das-perfekte-werkzeug-fur-betruger/</loc>
		<lastmod>2025-11-30T15:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-grapheneos-kann-wenn-es-richtig-eingerichtet-ist/</loc>
		<lastmod>2025-11-30T15:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-podcasts-app-gehackt-warum-sie-plotzlich-fremde-inhalte-abspielt/</loc>
		<lastmod>2025-11-30T15:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v4-0/</loc>
		<lastmod>2025-11-30T16:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-552-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-11-30T16:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-73/</loc>
		<lastmod>2025-11-30T17:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-2000-fake-shopping-sites-spotted-before-cyber-monday/</loc>
		<lastmod>2025-11-30T23:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regelbasierte-automatisierung-neue-wege-beim-endpoint-management-in-unternehmen/</loc>
		<lastmod>2025-12-01T00:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handlungsbedarf-digitale-souveranitat-von-strategischer-relevanz-fur-unternehmen/</loc>
		<lastmod>2025-12-01T00:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entra-id-blockt-externe-fremd-scripte/</loc>
		<lastmod>2025-12-01T00:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bin-ich-teil-eines-botnets-gray-nose-ip-check-seite/</loc>
		<lastmod>2025-12-01T00:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-tomiris-apt-adopts-polyglot/</loc>
		<lastmod>2025-12-01T01:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-contagious-interview/</loc>
		<lastmod>2025-12-01T01:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-tomiris-apt-adopts-polyglot-2/</loc>
		<lastmod>2025-12-01T01:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-contagious-interview-2/</loc>
		<lastmod>2025-12-01T01:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-apt-expands-to-central-asia-deploys-netsupport-rat-via-custom-java-droppers-and-geo-fencing/</loc>
		<lastmod>2025-12-01T01:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-apt-expands-to-central-asia-deploys-netsupport-rat-via-custom-java-droppers-and-geo-fencing-2/</loc>
		<lastmod>2025-12-01T01:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsprognosen-2026-auf-welche-phishing-techniken-sich-unternehmen-vorbereiten-sollten/</loc>
		<lastmod>2025-12-01T04:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-minuten-gehackt-die-neue-cyberbedrohung/</loc>
		<lastmod>2025-12-01T06:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-zero-trust-looks-like-when-you-build-it-step-by-step/</loc>
		<lastmod>2025-12-01T06:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-weekend-is-prime-time-for-ransomware/</loc>
		<lastmod>2025-12-01T06:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-enforces-mandatory-sim-binding-for-messaging-apps-under-new-dot-rules/</loc>
		<lastmod>2025-12-01T07:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-wie-sich-ein-supply-chain-wurm-weiterentwickelt-2/</loc>
		<lastmod>2025-12-01T07:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-password-audits-made-practical-for-busy-security-teams/</loc>
		<lastmod>2025-12-01T07:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-deploys-python-based-elf-malware-in-targeted-attacks-on-indian-government-agencies/</loc>
		<lastmod>2025-12-01T07:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-6-18-rolls-out-with-major-hardware-support-upgrades-and-driver-enhancements/</loc>
		<lastmod>2025-12-01T07:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-released-for-outlook-monikerlink-rce-flaw-allowing-remote-code-execution/</loc>
		<lastmod>2025-12-01T07:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-password-audits-made-practical-for-busy-security-teams-2/</loc>
		<lastmod>2025-12-01T07:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-deploys-python-based-elf-malware-in-targeted-attacks-on-indian-government-agencies-2/</loc>
		<lastmod>2025-12-01T07:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tomiris-shifts-to-public-service-implants-for-stealthier-c2-in-attacks-on-government-targets/</loc>
		<lastmod>2025-12-01T07:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diskstation-manager-angreifer-konnen-authentifizierung-im-synology-dsm-umgehen/</loc>
		<lastmod>2025-12-01T07:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offensive-cyber-power-is-spreading-fast-and-changing-global-security/</loc>
		<lastmod>2025-12-01T07:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-signs-the-ciso-cio-relationship-is-broken-and-steps-to-fix-it/</loc>
		<lastmod>2025-12-01T08:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treating-mcp-like-an-api-creates-security-blind-spots/</loc>
		<lastmod>2025-12-01T08:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zentrales-zertifikatsregister-der-dreh-und-angelpunkt-regulatorischer-resilienz-nach-dora/</loc>
		<lastmod>2025-12-01T08:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kevin-lancaster-joins-the-usecure-board-to-accelerate-north-american-channel-growth/</loc>
		<lastmod>2025-12-01T09:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kevin-lancaster-joins-the-usecure-board-to-accelerate-north-american-channel-growth-2/</loc>
		<lastmod>2025-12-01T09:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-bestatigt-bug-windows-11-update-lasst-passwortin-verschwinden/</loc>
		<lastmod>2025-12-01T09:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-backup-kein-log-phisher-lieben-idplucken-rubrik-okta-recovery-halt-dagegen/</loc>
		<lastmod>2025-12-01T09:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-boomt-nicht-nur-im-weihnachtsgeschaft/</loc>
		<lastmod>2025-12-01T10:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kevin-lancaster-joins-the-usecure-board-to-accelerate-north-american-channel-growth-3/</loc>
		<lastmod>2025-12-01T10:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bin-ich-teil-eines-botnets-greynoise-ip-check-seite/</loc>
		<lastmod>2025-12-01T10:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-an-openplc-scadabr-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-12-01T10:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-takes-down-cryptomixer-cryptocurrency-mixing-service/</loc>
		<lastmod>2025-12-01T10:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-albiriox-maas-malware-targets-400-apps-for-on-device-fraud-and-screen-control/</loc>
		<lastmod>2025-12-01T10:02:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-an-openplc-scadabr-flaw-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2025-12-01T10:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greynoise-ip-check-neues-tool-erkennt-botnetz-aktivitaten-am-eigenen-anschluss/</loc>
		<lastmod>2025-12-01T10:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-man-gets-seven-years-for-running-evil-twin-wi-fi/</loc>
		<lastmod>2025-12-01T11:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/royal-borough-of-kensington-and-chelsea-reveals-data-breach/</loc>
		<lastmod>2025-12-01T11:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontinuierliches-monitoring-statt-momentaufnahme-so-behalten-unternehmen-mit-easm-ihre-externe-angriffsflache-im-blick/</loc>
		<lastmod>2025-12-01T11:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-gegen-geldwasche-polizei-zerschlagt-grosen-bitcoin-mixer-cryptomixer/</loc>
		<lastmod>2025-12-01T11:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-druck-mehr-klarheit-nis-2-und-die-neuen-regeln-fur-kritis-betreiber/</loc>
		<lastmod>2025-12-01T11:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-android-threat-albiriox-enables-full-ondevice-fraud/</loc>
		<lastmod>2025-12-01T12:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-takes-down-illegal-cryptocurrency-mixing-service/</loc>
		<lastmod>2025-12-01T12:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-setzen-verstarkt-auf-datenperimeter-schadensbegrenzung-bei-gestohlenen-zugangsdaten/</loc>
		<lastmod>2025-12-01T12:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-3-aus-sicht-der-cybersecurity-ki-innovationen-rennen-der-compliance-davon/</loc>
		<lastmod>2025-12-01T12:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-android-threat-albiriox-enables-full-ondevice-fraud-2/</loc>
		<lastmod>2025-12-01T12:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ermittler-zerschlagen-plattform-fur-online-geldwasche/</loc>
		<lastmod>2025-12-01T13:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koreas-coupang-says-data-breach-exposed-nearly-34m-customers-personal-information/</loc>
		<lastmod>2025-12-01T13:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-football-federation-faces-own-goal-after-club-software-data-breach/</loc>
		<lastmod>2025-12-01T13:01:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-crypto-laundering-service-taken-down-by-law-enforcement/</loc>
		<lastmod>2025-12-01T13:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-deletes-x-post-after-getting-caught-using-a-stolen-ai-recipe-infographic/</loc>
		<lastmod>2025-12-01T13:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-the-agentic-trojan-horse-why-the-new-ai-browsers-war-is-a-nightmare-for-security-teams/</loc>
		<lastmod>2025-12-01T13:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-cybersicherheit-warum-sicherheitslucken-exponentiell-wachsen/</loc>
		<lastmod>2025-12-01T13:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-unveils-revamped-channel-program-major-partner-services-push/</loc>
		<lastmod>2025-12-01T14:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-hits-south-koreas-amazon-potentially-affecting-65-of-countrys-population/</loc>
		<lastmod>2025-12-01T14:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airbus-nears-completion-of-a320-retrofit-as-regulators-monitor-largest-emergency-recall-in-company-history/</loc>
		<lastmod>2025-12-01T14:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-3-aus-sicht-der-it-sicherheit-der-ki-assistent-als-geschaftsgrundlage/</loc>
		<lastmod>2025-12-01T14:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-unveils-revamped-channel-program-major-partner-services-push-2/</loc>
		<lastmod>2025-12-01T14:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-koreas-answer-to-amazon-admits-breach-exposed-33-7m-customers/</loc>
		<lastmod>2025-12-01T14:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-hits-south-koreas-amazon-potentially-affecting-65-of-countrys-population-2/</loc>
		<lastmod>2025-12-01T14:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evil-twin-wifi-hacker-jailed-for-stealing-data-midflight/</loc>
		<lastmod>2025-12-01T14:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-football-federation-hit-by-breach-via-compromised-admin-account/</loc>
		<lastmod>2025-12-01T14:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivist-group-handala-publishes-list-of-israeli-tech-workers/</loc>
		<lastmod>2025-12-01T14:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-hot-cves-npm-worm-returns-firefox-rce-m365-email-raid-more/</loc>
		<lastmod>2025-12-01T14:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-ma-roundup-cyber-giants-strengthen-ai-security-offerings/</loc>
		<lastmod>2025-12-01T14:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evil-twin-wifi-hacker-jailed-for-stealing-data-midflight-2/</loc>
		<lastmod>2025-12-01T14:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitsvorfalle-aktuelle-cyberangriffe-auf-deutsche-unternehmen-2025/</loc>
		<lastmod>2025-12-01T14:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cheaper-1-gb-raspberry-pi-5-lands-as-memory-costs-go-through-the-roof/</loc>
		<lastmod>2025-12-01T15:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asdas-self-inflicted-sap-mess-after-walmart-divorce-stalls-financial-revival/</loc>
		<lastmod>2025-12-01T15:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-alerts-users-to-critical-flaws-that-compromise-the-secure-boot-process/</loc>
		<lastmod>2025-12-01T15:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-front-companies-offering-advanced-steganography-tools-for-apt-groups/</loc>
		<lastmod>2025-12-01T15:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cheaper-1-gb-raspberry-pi-5-lands-as-memory-costs-go-through-the-roof-2/</loc>
		<lastmod>2025-12-01T15:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-man-jailed-for-running-fake-wi-fi-attacks-at-airports-and-onboard-flights/</loc>
		<lastmod>2025-12-01T15:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/</loc>
		<lastmod>2025-12-01T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimjongrat-strikes-windows-users-via-malicious-hta-files/</loc>
		<lastmod>2025-12-01T15:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-shift-to-living-off-the-land-tactics-to-evade-edr-on-windows-systems/</loc>
		<lastmod>2025-12-01T15:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-man-jailed-for-running-fake-wi-fi-attacks-at-airports-and-onboard-flights-2/</loc>
		<lastmod>2025-12-01T15:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-shut-down-cryptomixer-platform-used-for-cybercrime-and-money-laundering/</loc>
		<lastmod>2025-12-01T15:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai-2/</loc>
		<lastmod>2025-12-01T15:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-hanoi-thief-pseudo-polyglot-payloads-targeting-it-professionals/</loc>
		<lastmod>2025-12-01T15:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devolutions-server-hit-by-sql-injection-flaw-allowing-data-theft/</loc>
		<lastmod>2025-12-01T15:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-2000-fake-holiday-shops-in-massive-payment-theft-scheme/</loc>
		<lastmod>2025-12-01T15:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-hanoi-thief-pseudo-polyglot-payloads-targeting-it-professionals-2/</loc>
		<lastmod>2025-12-01T15:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-variant-threatens-cloud-ecosystem/</loc>
		<lastmod>2025-12-01T15:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devolutions-server-hit-by-sql-injection-flaw-allowing-data-theft-2/</loc>
		<lastmod>2025-12-01T15:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-2000-fake-holiday-shops-in-massive-payment-theft-scheme-2/</loc>
		<lastmod>2025-12-01T15:07:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kevin-lancaster-joins-the-usecure-board-to-accelerate-north-american-channel-growth-4/</loc>
		<lastmod>2025-12-01T15:07:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-a-secure-setup-really-looks-like-for-storing-digital-assets/</loc>
		<lastmod>2025-12-01T15:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-paradox-enabling-innovation-while-managing-risk/</loc>
		<lastmod>2025-12-01T16:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hide-me-weihnachtsaktion-28-monate-fur-249-euro-netto-monatlich/</loc>
		<lastmod>2025-12-01T16:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-nimmt-cryptomixer-infrastruktur-in-d-und-ch-offline/</loc>
		<lastmod>2025-12-01T16:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-study-finds-teen-cybercrime-is-mostly-just-a-phase/</loc>
		<lastmod>2025-12-01T16:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-futures-reopen-after-cme-suffers-data-center-cooling-failure/</loc>
		<lastmod>2025-12-01T16:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-hackers-wear-suits-protecting-your-team-from-insider-cyber-threats/</loc>
		<lastmod>2025-12-01T16:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hide-me-weihnachtsaktion-28-monate-fur-249-euro-netto-monatlich-2/</loc>
		<lastmod>2025-12-01T16:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-browser-extensions-amass-4-3m-installs-in-malicious-campaign/</loc>
		<lastmod>2025-12-01T16:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-manipulates-ai-detection-in-latest-npm-package-breach/</loc>
		<lastmod>2025-12-01T16:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionageaktivitaten-in-der-apac-region-salt-typhoon-organisiert-zugangshandel-unter-apt-gruppen/</loc>
		<lastmod>2025-12-01T16:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-police-dismantle-cryptocurrency-mixer-that-laundered-1-5-billion-for-ransomware-gangs-other-criminals/</loc>
		<lastmod>2025-12-01T17:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-ready-threat-campaign-aimed-at-zendesk-environments/</loc>
		<lastmod>2025-12-01T17:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bin-ich-teil-eines-botnets-jetzt-kostenlos-nachprufen/</loc>
		<lastmod>2025-12-01T17:02:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-attackers-go-full-stack-to-fool-developers/</loc>
		<lastmod>2025-12-01T17:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-police-dismantle-cryptocurrency-mixer-that-laundered-1-5-billion-for-ransomware-gangs-other-criminals-2/</loc>
		<lastmod>2025-12-01T17:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-ready-threat-campaign-aimed-at-zendesk-environments-2/</loc>
		<lastmod>2025-12-01T17:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-limits-whatsapp-use-claiming-it-enables-terrorism-crime-espionage/</loc>
		<lastmod>2025-12-01T17:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-3-jailbreak-offenbart-hochgefahrliche-anleitungen/</loc>
		<lastmod>2025-12-01T17:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-seize-cryptomixer-domains-infrastructure-and-28m-dollars-in-bitcoin/</loc>
		<lastmod>2025-12-01T17:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-giant-coupang-data-breach-impacts-33-7-million-customers/</loc>
		<lastmod>2025-12-01T17:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-3-jailbreak-offenbart-hochgefahrliche-anleitungen-2/</loc>
		<lastmod>2025-12-01T17:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-seize-cryptomixer-domains-infrastructure-and-28m-dollars-in-bitcoin-2/</loc>
		<lastmod>2025-12-01T17:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-giant-coupang-data-breach-impacts-33-7-million-customers-2/</loc>
		<lastmod>2025-12-01T17:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-albiriox-malware-gains-traction-in-dark-web-markets/</loc>
		<lastmod>2025-12-01T17:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-albiriox-malware-gains-traction-in-dark-web-markets-2/</loc>
		<lastmod>2025-12-01T17:06:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-3-jailbreak-offenbart-hochgefahrliche-anleitungen-3/</loc>
		<lastmod>2025-12-01T17:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-und-physische-sicherheit-entfalten-in-it-unternehmen-nur-gemeinsam-ihre-volle-wirkung/</loc>
		<lastmod>2025-12-01T17:06:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-und-physische-sicherheit-entfalten-in-it-unternehmen-nur-gemeinsam-ihre-volle-wirkung-2/</loc>
		<lastmod>2025-12-01T17:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-seize-cryptomixer-domains-infrastructure-and-28m-dollars-in-bitcoin-3/</loc>
		<lastmod>2025-12-01T17:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-koreas-coupang-confirms-34-million-customer-data-leak/</loc>
		<lastmod>2025-12-01T17:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-access-control-policies-for-post-quantum-ai-environments/</loc>
		<lastmod>2025-12-01T18:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-key-exchange-for-mcp-authentication/</loc>
		<lastmod>2025-12-01T18:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-anomaly-detection-with-post-quantum-secure-aggregation/</loc>
		<lastmod>2025-12-01T18:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-police-dismantle-cryptocurrency-mixer-popular-with-ransomware-gangs/</loc>
		<lastmod>2025-12-01T18:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netscout-wins-overall-network-security-solution-of-the-year/</loc>
		<lastmod>2025-12-01T18:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-access-control-policies-for-post-quantum-ai-environments-2/</loc>
		<lastmod>2025-12-01T18:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-key-exchange-for-mcp-authentication-2/</loc>
		<lastmod>2025-12-01T18:03:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-zero-day-attacks-and-why-do-they-work/</loc>
		<lastmod>2025-12-01T18:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-first-line-of-defense-is-still-the-network-but-thats-only-the-beginning/</loc>
		<lastmod>2025-12-01T18:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-windows-admins-a-legacy-migration-headache-with-wins-sunset/</loc>
		<lastmod>2025-12-01T18:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-zero-day-attacks-and-why-do-they-work-2/</loc>
		<lastmod>2025-12-01T18:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandatory-digital-id-paves-way-for-surveillance-and-exclusion-mps-hear/</loc>
		<lastmod>2025-12-01T18:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-president-dali-rajic-on-32b-google-deal-deeper-partner-collaboration/</loc>
		<lastmod>2025-12-01T19:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-platform-raided-by-european-police-29-million-in-bitcoin-seized/</loc>
		<lastmod>2025-12-01T19:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-take-down-cryptomixer-seize-28m-in-switzerland/</loc>
		<lastmod>2025-12-01T19:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-cops-shut-down-crypto-mixing-website-that-helped-launder-1-3-billion-euros/</loc>
		<lastmod>2025-12-01T19:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-arrested-in-south-korea-over-massive-ip-camera-snooping-spree/</loc>
		<lastmod>2025-12-01T19:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-president-dali-rajic-on-32b-google-deal-deeper-partner-collaboration-2/</loc>
		<lastmod>2025-12-01T19:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-pumps-ai-cloud-lineup-with-extra-nvidia-capabilities/</loc>
		<lastmod>2025-12-01T19:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-needs-an-xp-sp2-moment-says-ex-microsoft-engineer/</loc>
		<lastmod>2025-12-01T19:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-data-breach-affects-all-33-7-million-south-korean-accounts/</loc>
		<lastmod>2025-12-01T19:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-pumps-ai-cloud-lineup-with-extra-nvidia-capabilities-2/</loc>
		<lastmod>2025-12-01T19:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akamai-study-shows-microsegmentation-boosts-security/</loc>
		<lastmod>2025-12-01T19:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-needs-an-xp-sp2-moment-says-ex-microsoft-engineer-2/</loc>
		<lastmod>2025-12-01T19:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-orders-phone-makers-to-pre-install-sanchar-saathi-app-to-tackle-telecom-fraud/</loc>
		<lastmod>2025-12-01T19:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-data-breach-affects-all-33-7-million-south-korean-accounts-2/</loc>
		<lastmod>2025-12-01T19:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-new-outlook-cant-open-some-excel-attachments/</loc>
		<lastmod>2025-12-01T19:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-turns-popular-browser-extensions-with-4-3-million-installs-into-spyware/</loc>
		<lastmod>2025-12-01T19:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-new-outlook-cant-open-some-excel-attachments-2/</loc>
		<lastmod>2025-12-01T19:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edtech-company-settles-with-ftc-in-wake-of-data-breach/</loc>
		<lastmod>2025-12-01T20:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealthy-browser-extensions-waited-years-before-infecting-4-3m-chrome-edge-users-with-backdoors-and-spyware/</loc>
		<lastmod>2025-12-01T20:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-named-a-leader-in-2025-gigaom-radar-report-for-penetration-testing-as-a-service-ptaas-for-third-consecutive-year/</loc>
		<lastmod>2025-12-01T20:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-breach-exposes-data-of-nearly-34-million-customers/</loc>
		<lastmod>2025-12-01T20:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarttube-youtube-app-for-android-tv-breached-to-push-malicious-update/</loc>
		<lastmod>2025-12-01T20:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edtech-company-settles-with-ftc-in-wake-of-data-breach-2/</loc>
		<lastmod>2025-12-01T20:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/officials-accuse-north-koreas-lazarus-of-30-million-theft-from-crypto-exchange/</loc>
		<lastmod>2025-12-01T21:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-man-jailed-for-7-years-over-airport-and-in-flight-wi-fi-attacks/</loc>
		<lastmod>2025-12-01T21:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ads-without-eyeballs-online-shoppings-ai-agent-problem/</loc>
		<lastmod>2025-12-01T21:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-calendar-threat-putting-4-million-apple-devices-at-risk/</loc>
		<lastmod>2025-12-01T21:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-disrupt-cryptomixer-seize-millions-in-crypto/</loc>
		<lastmod>2025-12-01T21:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/officials-accuse-north-koreas-lazarus-of-30-million-theft-from-crypto-exchange-2/</loc>
		<lastmod>2025-12-01T21:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-cops-shut-down-crypto-mixing-website-that-helped-launder-1-3b-euros/</loc>
		<lastmod>2025-12-01T22:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-sentenced-after-running-fake-airport-and-in-flight-wi-fi-networks/</loc>
		<lastmod>2025-12-01T22:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-turns-npm-installs-into-a-full-cloud-compromise-path/</loc>
		<lastmod>2025-12-01T22:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-returns-in-third-wave-of-malicious-vs-code-packages/</loc>
		<lastmod>2025-12-01T22:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dual-role-of-ai-in-cybersecurity-shield-or-weapon-2/</loc>
		<lastmod>2025-12-01T22:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dual-role-of-ai-in-cybersecurity-shield-or-weapon/</loc>
		<lastmod>2025-12-01T22:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-addresses-107-android-vulnerabilities-including-two-zero-days/</loc>
		<lastmod>2025-12-01T23:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-drops-challenge-to-25-year-old-hipaa-privacy-rule/</loc>
		<lastmod>2025-12-01T23:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tomiris-unleashes-havoc-with-new-tools-tactics/</loc>
		<lastmod>2025-12-01T23:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/codered-emergency-alert-platform-shut-down-following-cyberattack/</loc>
		<lastmod>2025-12-01T23:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-io-altester-online-geldwaschedienst-laut-bka-abgeschaltet/</loc>
		<lastmod>2025-12-02T00:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-monday-online-rabattschlacht-durch-bad-bot-traffic-gefahrdet/</loc>
		<lastmod>2025-12-02T00:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiko-minimierung-will-ebay-bei-euch-zugriff-auf-bankkonto/</loc>
		<lastmod>2025-12-02T00:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-federal-modernization-funds-slashed-in-senate-bill/</loc>
		<lastmod>2025-12-02T00:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-io-altester-online-geldwaschedienst-laut-bka-abgeschaltet-2/</loc>
		<lastmod>2025-12-02T00:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-issue-leads-to-fda-recall-of-baxter-respiratory-gear/</loc>
		<lastmod>2025-12-02T00:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-monday-online-rabattschlacht-durch-bad-bot-traffic-gefahrdet-2/</loc>
		<lastmod>2025-12-02T00:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiko-minimierung-will-ebay-bei-euch-zugriff-auf-bankkonto-2/</loc>
		<lastmod>2025-12-02T00:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptomixer-io-altester-online-geldwaschedienst-laut-bka-abgeschaltet-3/</loc>
		<lastmod>2025-12-02T00:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-threats-moving-out-to-the-edge/</loc>
		<lastmod>2025-12-02T00:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-boss-breach-apt36-pivots-to-linux-espionage-with-silent/</loc>
		<lastmod>2025-12-02T01:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-shuts-down-cryptomixer-in-major-crypto-crime-takedown/</loc>
		<lastmod>2025-12-02T01:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriff-aus-dem-schatten-multi-channel-cyberattacken-und-der-effektive-gegenschlag/</loc>
		<lastmod>2025-12-02T05:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-demands-smartphone-makers-install-a-government-app-on-every-handset/</loc>
		<lastmod>2025-12-02T05:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriff-aus-dem-schatten-multi-channel-cyberattacken-und-der-effektive-gegenschlag-2/</loc>
		<lastmod>2025-12-02T05:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/age-of-the-scam-state-how-an-illicit-multibillion-dollar-industry-has-taken-root-in-south-east-asia/</loc>
		<lastmod>2025-12-02T05:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-demands-smartphone-makers-install-a-government-app-on-every-handset-2/</loc>
		<lastmod>2025-12-02T05:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesichtserkennung-erklaren-statt-polarisieren-ein-pladoyer-fur-klare-regeln/</loc>
		<lastmod>2025-12-02T06:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-collapse-of-trust-at-the-identity-layer/</loc>
		<lastmod>2025-12-02T06:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandatory-undeletable-security-app-to-be-installed-on-every-smartphone-in-india/</loc>
		<lastmod>2025-12-02T06:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-named-a-leader-in-2025-gigaom-radar-report-for-penetration-testing-as-a-service-ptaas-for-third-consecutive-year-2/</loc>
		<lastmod>2025-12-02T06:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesichtserkennung-erklaren-statt-polarisieren-ein-pladoyer-fur-klare-regeln-2/</loc>
		<lastmod>2025-12-02T06:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-issues-critical-security-alert-over-secure-boot-vulnerability/</loc>
		<lastmod>2025-12-02T07:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonesta-international-hotels-implements-industry-leading-cloud-security-through-accuknox-collaboration/</loc>
		<lastmod>2025-12-02T07:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-userlock-iam-for-active-directory/</loc>
		<lastmod>2025-12-02T07:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-keep-finding-new-ways-to-fool-ai/</loc>
		<lastmod>2025-12-02T07:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehler-in-der-authentifizierung-zdi-macht-zwei-zero-days-in-nvidias-aistore-publik/</loc>
		<lastmod>2025-12-02T07:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-issues-critical-security-alert-over-secure-boot-vulnerability-2/</loc>
		<lastmod>2025-12-02T07:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techtalk-die-sicherheit-von-identitaten-und-die-kunstliche-intelligenz-wachsen-weiter-zusammen/</loc>
		<lastmod>2025-12-02T08:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-questions-cisos-must-ask-before-adopting-ai-enabled-cyber-solutions/</loc>
		<lastmod>2025-12-02T08:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techtalk-die-sicherheit-von-identitaten-und-die-kunstliche-intelligenz-wachsen-weiter-zusammen-2/</loc>
		<lastmod>2025-12-02T08:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-questions-cisos-must-ask-before-adopting-ai-enabled-cyber-solutions-2/</loc>
		<lastmod>2025-12-02T08:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creative-cybersecurity-strategies-for-resource-constrained-institutions/</loc>
		<lastmod>2025-12-02T08:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-android-zero-day-flaws-actively-exploited-in-the-wild/</loc>
		<lastmod>2025-12-02T08:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creative-cybersecurity-strategies-for-resource-constrained-institutions-2/</loc>
		<lastmod>2025-12-02T08:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-struts-flaw-allows-attackers-to-launch-disk-exhaustion-attacks/</loc>
		<lastmod>2025-12-02T08:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/techtalk-die-sicherheit-von-identitaten-und-die-kunstliche-intelligenz-wachsen-weiter-zusammen-3/</loc>
		<lastmod>2025-12-02T08:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-android-zero-day-flaws-actively-exploited-in-the-wild-2/</loc>
		<lastmod>2025-12-02T08:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-questions-cisos-must-ask-before-adopting-ai-enabled-cyber-solutions-3/</loc>
		<lastmod>2025-12-02T08:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-targets-openvsx-and-microsoft-visual-studio-with-24-new-malicious-packages/</loc>
		<lastmod>2025-12-02T08:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-codex-cli-flaw-allows-attackers-to-run-arbitrary-commands/</loc>
		<lastmod>2025-12-02T08:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-3-million-chrome-and-edge-users-hacked-in-7-year-shadypanda-malware-campaign/</loc>
		<lastmod>2025-12-02T08:06:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-targets-openvsx-and-microsoft-visual-studio-with-24-new-malicious-packages-2/</loc>
		<lastmod>2025-12-02T08:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-codex-cli-flaw-allows-attackers-to-run-arbitrary-commands-2/</loc>
		<lastmod>2025-12-02T08:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-data-breach-exposes-personal-information-of-33-7-million-customers/</loc>
		<lastmod>2025-12-02T08:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-orders-phone-makers-to-pre-install-government-app-to-tackle-telecom-fraud/</loc>
		<lastmod>2025-12-02T08:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsneuausrichtung-auf-dem-ki-markt-2026-aufraumen-absichern-angreifen-das-ki-jahr-2026/</loc>
		<lastmod>2025-12-02T08:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sql-injection-flaw-exposes-sensitive-data-in-devolutions-server/</loc>
		<lastmod>2025-12-02T09:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaillant-ciso-starten-statt-warten/</loc>
		<lastmod>2025-12-02T09:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sql-injection-flaw-exposes-sensitive-data-in-devolutions-server-2/</loc>
		<lastmod>2025-12-02T09:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noid-privacy-tool-zur-hartung-von-windows-11-25h2/</loc>
		<lastmod>2025-12-02T09:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-107-android-flaws-including-two-framework-bugs-exploited-in-the-wild/</loc>
		<lastmod>2025-12-02T09:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaillant-ciso-starten-statt-warten-2/</loc>
		<lastmod>2025-12-02T09:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fruhwarnsystem-fur-sap-onapsis-integration-macht-microsoft-sentinel-zur-sap-sicherheitszentrale/</loc>
		<lastmod>2025-12-02T09:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noid-privacy-tool-zur-hartung-von-windows-11-25h2-2/</loc>
		<lastmod>2025-12-02T09:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forschungsteam-entwickelt-chiptechnologie-die-den-ki-energiehunger-zahmt/</loc>
		<lastmod>2025-12-02T09:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-werden-ausgenutzt-angreifer-attackieren-android-gerate/</loc>
		<lastmod>2025-12-02T09:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noid-privacy-tool-zur-hartung-von-windows-11-24h2-25h2/</loc>
		<lastmod>2025-12-02T10:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-latest-android-security-update-fixes-two-actively-exploited-flaws/</loc>
		<lastmod>2025-12-02T11:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-cyber-campaign-adds-new-backdoors-in-latest-wave-of-attacks/</loc>
		<lastmod>2025-12-02T11:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ico-set-to-check-if-mobile-games-comply-with-childrens-code/</loc>
		<lastmod>2025-12-02T11:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-latest-android-security-update-fixes-two-actively-exploited-flaws-2/</loc>
		<lastmod>2025-12-02T11:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-companies-fear-state-sponsored-cyber-attacks-and-want-more-government-help/</loc>
		<lastmod>2025-12-02T11:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-cyber-campaign-adds-new-backdoors-in-latest-wave-of-attacks-2/</loc>
		<lastmod>2025-12-02T11:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-update-orchestration-platform-microsofts-neue-infrastruktur-fur-einheitliche-updates-unter-windows/</loc>
		<lastmod>2025-12-02T11:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrierte-datensicherheit-und-compliance-als-weg-zu-echter-digitaler-resilienz/</loc>
		<lastmod>2025-12-02T11:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-cybersecurity-die-basis-unseres-alltaglichen-lebens-ist/</loc>
		<lastmod>2025-12-02T11:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-antigravity-vibe-coding-tool-loscht-unerwartet-ganzen-datentrager/</loc>
		<lastmod>2025-12-02T11:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-hackers-take-inspiration-from-snake-video-game/</loc>
		<lastmod>2025-12-02T12:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5070311-update-fixes-file-explorer-freezes-search-issues/</loc>
		<lastmod>2025-12-02T12:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devilstongue-spyware-targets-windows-users-across-multiple-countries/</loc>
		<lastmod>2025-12-02T12:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-noisy-ransomware-intrusion-exposed-a-long-term-espionage-foothold/</loc>
		<lastmod>2025-12-02T12:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-hackers-take-inspiration-from-snake-video-game-2/</loc>
		<lastmod>2025-12-02T12:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5070311-update-fixes-file-explorer-freezes-search-issues-2/</loc>
		<lastmod>2025-12-02T12:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-api-management-vulnerability-lets-attackers-create-accounts-across-tenants/</loc>
		<lastmod>2025-12-02T12:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devilstongue-spyware-targets-windows-users-across-multiple-countries-2/</loc>
		<lastmod>2025-12-02T12:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openvpn-flaws-allow-hackers-to-launch-dos-attacks-and-bypass-security-checks/</loc>
		<lastmod>2025-12-02T12:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-telegram-winscp-chrome-and-teams-to-deliver-valleyrat-malware/</loc>
		<lastmod>2025-12-02T12:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonesta-international-hotels-implements-industry-leading-cloud-security-through-accuknox-collaboration-2/</loc>
		<lastmod>2025-12-02T12:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openvpn-flaws-allow-hackers-to-launch-dos-attacks-and-bypass-security-checks-2/</loc>
		<lastmod>2025-12-02T12:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arkanix-stealer-emerges-as-new-threat-steals-vpn-logins-wi-fi-credentials-and-screenshots/</loc>
		<lastmod>2025-12-02T12:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-telegram-winscp-chrome-and-teams-to-deliver-valleyrat-malware-2/</loc>
		<lastmod>2025-12-02T12:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonome-handelnde-entitaten-im-iam-darauf-kommt-es-an-ki-als-eigenstandige-identitat-im-identity-and-access-management/</loc>
		<lastmod>2025-12-02T12:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-releases-patches-for-android-zero-day-flaws-exploited-in-the-wild/</loc>
		<lastmod>2025-12-02T12:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk/</loc>
		<lastmod>2025-12-02T13:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk-2/</loc>
		<lastmod>2025-12-02T13:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-plans-to-verify-and-record-every-smartphone-in-circulation/</loc>
		<lastmod>2025-12-02T13:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-und-die-komplexitat-der-cybersicherheit/</loc>
		<lastmod>2025-12-02T13:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk-3/</loc>
		<lastmod>2025-12-02T13:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk-4/</loc>
		<lastmod>2025-12-02T13:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk-5/</loc>
		<lastmod>2025-12-02T13:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-als-schlussel-zur-optimierung-von-datenbanken/</loc>
		<lastmod>2025-12-02T13:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proxyearth-tool-lets-anyone-trace-users-in-india-with-just-a-mobile-number/</loc>
		<lastmod>2025-12-02T13:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koreas-amazon-coupang-discloses-a-data-breach-impacting-34m-customers/</loc>
		<lastmod>2025-12-02T13:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secalerts-cuts-through-the-noise-with-a-smarter-faster-way-to-track-vulnerabilities/</loc>
		<lastmod>2025-12-02T13:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-als-schlussel-zur-optimierung-von-datenbanken-2/</loc>
		<lastmod>2025-12-02T13:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/add-ons-fur-chrome-und-edge-43-millionen-gerate-per-update-mit-malware-infiziert/</loc>
		<lastmod>2025-12-02T13:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proxyearth-tool-lets-anyone-trace-users-in-india-with-just-a-mobile-number-2/</loc>
		<lastmod>2025-12-02T13:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race/</loc>
		<lastmod>2025-12-02T14:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race-2/</loc>
		<lastmod>2025-12-02T14:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race-3/</loc>
		<lastmod>2025-12-02T14:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race-4/</loc>
		<lastmod>2025-12-02T14:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-pennsylvania-confirms-new-data-breach-after-oracle-hack/</loc>
		<lastmod>2025-12-02T14:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race-5/</loc>
		<lastmod>2025-12-02T14:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-schools-edtech-outfit-after-intruder-walked-off-with-10m-student-records/</loc>
		<lastmod>2025-12-02T15:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-two-android-zero-days-exploited-in-attacks-107-flaws/</loc>
		<lastmod>2025-12-02T15:00:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-calendly-invites-spoof-top-brands-to-hijack-ad-manager-accounts/</loc>
		<lastmod>2025-12-02T15:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kb5070311-triggers-file-explorer-white-flash-in-dark-mode/</loc>
		<lastmod>2025-12-02T15:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-schools-edtech-outfit-after-intruder-walked-off-with-10m-student-records-2/</loc>
		<lastmod>2025-12-02T15:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-hits-israeli-sectors-with-new-muddyviper-backdoor-in-targeted-attacks/</loc>
		<lastmod>2025-12-02T15:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-two-android-zero-days-exploited-in-attacks-107-flaws-2/</loc>
		<lastmod>2025-12-02T15:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freiwillig-statt-aufgezwungen-die-debatte-um-die-chatkontrolle-ist-zuruck/</loc>
		<lastmod>2025-12-02T15:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-30-awards-2025-celebrating-excellence-innovation-and-leadership-in-cybersecurity/</loc>
		<lastmod>2025-12-02T16:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-acquire-veza-for-major-identity-security-expansion/</loc>
		<lastmod>2025-12-02T16:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kensington-and-chelsea-confirms-it-outage-was-a-data-breach-after-all/</loc>
		<lastmod>2025-12-02T16:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-strikes-israel-with-advanced-muddyviper-malware/</loc>
		<lastmod>2025-12-02T16:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-android-vulnerabilities-under-targeted-exploitation/</loc>
		<lastmod>2025-12-02T16:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-30-awards-2025-celebrating-excellence-innovation-and-leadership-in-cybersecurity-2/</loc>
		<lastmod>2025-12-02T16:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-goes-saas-renting-tools-access-and-infrastructure/</loc>
		<lastmod>2025-12-02T16:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme/</loc>
		<lastmod>2025-12-02T16:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startup-frenetik-launches-with-patented-deception-technology-that-bets-against-the-ai-arms-race-6/</loc>
		<lastmod>2025-12-02T16:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-surges-while-governance-lags-report-warns-of-growing-shadow-identity-risk-6/</loc>
		<lastmod>2025-12-02T16:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-goes-saas-renting-tools-access-and-infrastructure-2/</loc>
		<lastmod>2025-12-02T16:06:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dash-cam-hack-how-criminals-can-seize-control-in-seconds/</loc>
		<lastmod>2025-12-02T16:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-lures-engineers-to-rent-identities-in-fake-it-worker-scheme-2/</loc>
		<lastmod>2025-12-02T16:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/early-indicators-of-insider-threats-through-authentication-and-access-controls/</loc>
		<lastmod>2025-12-02T16:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/early-indicators-of-insider-threats-through-authentication-and-access-controls-2/</loc>
		<lastmod>2025-12-02T16:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-hackers-target-russian-aerospace-and-defense-sectors/</loc>
		<lastmod>2025-12-02T16:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-hackers-target-russian-aerospace-and-defense-sectors-2/</loc>
		<lastmod>2025-12-02T16:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nopcommerce-flaw-lets-attackers-access-accounts-using-captured-cookies-2/</loc>
		<lastmod>2025-12-02T16:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nopcommerce-flaw-lets-attackers-access-accounts-using-captured-cookies/</loc>
		<lastmod>2025-12-02T16:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evilginx-attack-techniques-allow-hackers-to-defeat-mfa-through-sso-phishing/</loc>
		<lastmod>2025-12-02T16:07:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarttube-android-tv-app-compromised-after-signing-keys-leak/</loc>
		<lastmod>2025-12-02T16:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evilginx-attack-techniques-allow-hackers-to-defeat-mfa-through-sso-phishing-2/</loc>
		<lastmod>2025-12-02T16:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/early-indicators-of-insider-threats-through-authentication-and-access-controls-3/</loc>
		<lastmod>2025-12-02T16:08:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprks-contagious-interview-spawns-malicious-npm-package-factory/</loc>
		<lastmod>2025-12-02T16:09:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-capture-lazarus-apts-remote-worker-scheme-live-on-camera/</loc>
		<lastmod>2025-12-02T16:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-returns-with-24-malicious-extensions-impersonating-popular-developer-tools/</loc>
		<lastmod>2025-12-02T16:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprks-contagious-interview-spawns-malicious-npm-package-factory-2/</loc>
		<lastmod>2025-12-02T16:10:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-capture-lazarus-apts-remote-worker-scheme-live-on-camera-2/</loc>
		<lastmod>2025-12-02T16:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-uses-hidden-prompt-and-script-to-evade-ai-security-tools/</loc>
		<lastmod>2025-12-02T16:10:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-returns-with-24-malicious-extensions-impersonating-popular-developer-tools-2/</loc>
		<lastmod>2025-12-02T16:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypandas-seven-year-campaign-infects-4-3m-chrome-and-edge-users/</loc>
		<lastmod>2025-12-02T16:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revolution-der-agentic-ai-verandert-cybersicherheit-in-2026/</loc>
		<lastmod>2025-12-02T16:11:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/programmiersprache-von-google-schwachstellen-in-golang-go-bringen-anwendungen-zum-absturz/</loc>
		<lastmod>2025-12-02T16:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-discovered-malicious-extensions-could-be-lurking-in-enterprise-browsers/</loc>
		<lastmod>2025-12-02T17:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-faces-backlash-over-government-cyber-safety-app-mandate/</loc>
		<lastmod>2025-12-02T17:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-data-breach-at-analytics-giant-mixpanel-leaves-a-lot-of-open-questions/</loc>
		<lastmod>2025-12-02T17:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-discovered-malicious-extensions-could-be-lurking-in-enterprise-browsers-2/</loc>
		<lastmod>2025-12-02T17:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-2000-fake-shopping-sites-spotted-before-cyber-monday-2/</loc>
		<lastmod>2025-12-02T17:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-nukes-cryptomixer-laundering-hub-seizing-euro25m-in-bitcoin/</loc>
		<lastmod>2025-12-02T17:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-faces-backlash-over-government-cyber-safety-app-mandate-2/</loc>
		<lastmod>2025-12-02T17:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-data-breach-at-analytics-giant-mixpanel-leaves-a-lot-of-open-questions-2/</loc>
		<lastmod>2025-12-02T17:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nk-hackers-push-200-malicious-npm-packages-with-ottercookie-malware/</loc>
		<lastmod>2025-12-02T17:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-e-commerce-giant-coupang-probes-massive-breach/</loc>
		<lastmod>2025-12-02T17:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nk-hackers-push-200-malicious-npm-packages-with-ottercookie-malware-2/</loc>
		<lastmod>2025-12-02T17:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/use-of-digital-id-in-uk-achieves-statutory-status/</loc>
		<lastmod>2025-12-02T17:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-e-commerce-giant-coupang-probes-massive-breach-2/</loc>
		<lastmod>2025-12-02T17:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-portal-outage-disrupts-threat-hunting-alerts/</loc>
		<lastmod>2025-12-02T17:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nk-hackers-push-200-malicious-npm-packages-with-ottercookie-malware-3/</loc>
		<lastmod>2025-12-02T17:06:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/use-of-digital-id-in-uk-achieves-statutory-status-2/</loc>
		<lastmod>2025-12-02T17:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-e-commerce-giant-coupang-probes-massive-breach-3/</loc>
		<lastmod>2025-12-02T17:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstelle-fur-malware-verteilung-genutzt-notfall-update-fur-kritische-rce-sicherheitslucke-in-wsus/</loc>
		<lastmod>2025-12-02T17:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nk-hackers-push-200-malicious-npm-packages-with-ottercookie-malware-4/</loc>
		<lastmod>2025-12-02T17:07:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-portal-outage-disrupts-threat-hunting-alerts-2/</loc>
		<lastmod>2025-12-02T17:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/use-of-digital-id-in-uk-achieves-statutory-status-3/</loc>
		<lastmod>2025-12-02T17:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-picklescan-vulnerabilities-expose-ai-model-supply-chains/</loc>
		<lastmod>2025-12-02T17:08:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/closing-the-document-security-gap-why-document-workflows-must-be-part-of-cybersecurity/</loc>
		<lastmod>2025-12-02T18:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-financial-institutions-can-future-proof-their-security-against-a-new-breed-of-cyber-attackers/</loc>
		<lastmod>2025-12-02T18:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-gap-widens-as-organizations-rush-to-deploy-ai-agents-without-proper-identity-controls/</loc>
		<lastmod>2025-12-02T18:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/closing-the-document-security-gap-why-document-workflows-must-be-part-of-cybersecurity-2/</loc>
		<lastmod>2025-12-02T18:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senators-push-to-renew-cyber-grant-program-for-state-local-governments/</loc>
		<lastmod>2025-12-02T18:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-financial-institutions-can-future-proof-their-security-against-a-new-breed-of-cyber-attackers-2/</loc>
		<lastmod>2025-12-02T18:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-firewall/</loc>
		<lastmod>2025-12-02T18:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-mops-up-mesh-after-another-metaverse-misfire/</loc>
		<lastmod>2025-12-02T18:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sinks-to-fifth-in-esa-funding-league-behind-spain/</loc>
		<lastmod>2025-12-02T18:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-3m-users-exposed-in-shadypandas-long-running-browser-hack/</loc>
		<lastmod>2025-12-02T18:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-acquire-identity-security-firm-veza/</loc>
		<lastmod>2025-12-02T19:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/undetected-firefox-webassembly-flaw-put-180-million-users-at-risk-2/</loc>
		<lastmod>2025-12-02T19:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-target-israeli-egyptian-critical-infrastructure-through-phishing-campaign/</loc>
		<lastmod>2025-12-02T19:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-isnt-enough-for-agents-2/</loc>
		<lastmod>2025-12-02T19:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitys-next-control-plane-the-rise-of-pipeline-first-architecture-2/</loc>
		<lastmod>2025-12-02T19:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-pennsylvania-joins-list-of-victims-from-clops-oracle-ebs-raid/</loc>
		<lastmod>2025-12-02T19:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legislation-would-designate-critical-cyber-threat-actors-direct-sanctions-against-them/</loc>
		<lastmod>2025-12-02T19:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-asus-breach-and-1tb-data-theft/</loc>
		<lastmod>2025-12-02T19:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-rce-in-codex-exposes-developer-workflows/</loc>
		<lastmod>2025-12-02T19:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-pennsylvania-joins-list-of-victims-from-clops-oracle-ebs-raid-2/</loc>
		<lastmod>2025-12-02T19:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/undetected-firefox-webassembly-flaw-put-180-million-users-at-risk/</loc>
		<lastmod>2025-12-02T19:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-isnt-enough-for-agents/</loc>
		<lastmod>2025-12-02T19:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitys-next-control-plane-the-rise-of-pipeline-first-architecture/</loc>
		<lastmod>2025-12-02T19:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-congressional-remedy-for-salt-typhoon-more-information-sharing-with-industry/</loc>
		<lastmod>2025-12-02T20:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-pennsylvania-joins-growing-pool-of-oracle-customers-impacted-by-clop-attacks/</loc>
		<lastmod>2025-12-02T20:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-android-0-day-bugs-disclosed-and-fixed-plus-105-more-to-patch/</loc>
		<lastmod>2025-12-02T20:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-data-might-determine-how-much-you-pay-for-eggs/</loc>
		<lastmod>2025-12-02T20:01:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-npm-malware-attack-exposed-up-to-400000-dev-secrets/</loc>
		<lastmod>2025-12-02T20:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-orders-messaging-apps-to-work-only-with-active-sim-cards-to-prevent-fraud-and-misuse/</loc>
		<lastmod>2025-12-02T20:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developers-scramble-as-critical-react-flaw-threatens-major-apps/</loc>
		<lastmod>2025-12-03T20:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-and-singapore-deepen-tech-ties-prioritize-ai-safety-and-cybersecurity/</loc>
		<lastmod>2025-12-03T20:15:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nationwide-onsolve-codered-breach-hits-monroe-county-exposing-resident-data/</loc>
		<lastmod>2025-12-03T20:15:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-pennsylvania-and-university-of-phoenix-disclose-data-breaches/</loc>
		<lastmod>2025-12-03T20:16:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endend-encrypted-smart-toilet-camera-is-not-actually-endend-encrypted/</loc>
		<lastmod>2025-12-03T20:42:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/utilities-warn-us-grid-at-risk-as-federal-cyber-funds-dry-up/</loc>
		<lastmod>2025-12-03T21:43:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-national-security-strategy-failing-to-account-for-online-world/</loc>
		<lastmod>2025-12-03T21:43:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-florence-mottay-global-ciso-zalando/</loc>
		<lastmod>2025-12-03T21:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-office-avoids-1m-fine-over-botched-website-upgrade-data-breach/</loc>
		<lastmod>2025-12-03T21:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-u-s-cyberdefenses-take-aim-at-foreign-threats/</loc>
		<lastmod>2025-12-03T21:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-diy-retail-giant-leroy-merlin-discloses-a-data-breach/</loc>
		<lastmod>2025-12-03T21:44:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freedom-mobile-discloses-data-breach-exposing-customer-data/</loc>
		<lastmod>2025-12-03T21:44:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arizona-ag-sues-temu-over-stealing-user-data/</loc>
		<lastmod>2025-12-03T21:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploitation-is-imminent-as-39-percent-of-cloud-environs-have-max-severity-react-hole/</loc>
		<lastmod>2025-12-03T22:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-5-dark-web-intelligence-platforms/</loc>
		<lastmod>2025-12-03T22:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-severe-flaws-in-nuclear-med-tracking-software/</loc>
		<lastmod>2025-12-03T22:44:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-data-breach-impacts-over-74-us-banks-credit-unions/</loc>
		<lastmod>2025-12-03T22:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-wordpress-add-on-for-elementor-exploited-in-attacks/</loc>
		<lastmod>2025-12-03T22:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-react-flaw-triggers-calls-for-immediate-action/</loc>
		<lastmod>2025-12-03T22:44:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/admins-and-defenders-gird-themselves-against-maximum-severity-server-vulnerability/</loc>
		<lastmod>2025-12-03T23:43:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-verbessert-ein-passwort-audit-ihre-cybersecurity/</loc>
		<lastmod>2025-12-03T23:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/king-addons-flaw-lets-anyone-become-wordpress-admin/</loc>
		<lastmod>2025-12-03T23:43:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-erp-systems-become-the-attack-surface/</loc>
		<lastmod>2025-12-03T23:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-pledges-to-rewrite-computer-misuse-act/</loc>
		<lastmod>2025-12-03T23:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-and-bt-block-a-billion-dangerous-clicks/</loc>
		<lastmod>2025-12-03T23:44:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-hackers-weaponize-millions-of-browsers/</loc>
		<lastmod>2025-12-03T23:44:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/admins-and-defenders-gird-themselves-against-maximum-severity-server-vuln/</loc>
		<lastmod>2025-12-04T00:43:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rce-flaw-in-openais-codex-cli-highlights-new-risks-to-dev-environments/</loc>
		<lastmod>2025-12-04T00:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/twins-with-hacking-history-charged-in-insider-data-breach-affecting-multiple-federal-agencies/</loc>
		<lastmod>2025-12-04T00:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dsgvo-nachbesserung-signifikante-mehrheit-deutscher-unternehmen-fordert-datenschutz-reform/</loc>
		<lastmod>2025-12-04T00:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weihnachtsgeschaft-2025-als-booster-virtueller-markenpiraterie-und-ki-gestutzten-betrugs/</loc>
		<lastmod>2025-12-04T00:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-ki-als-neuer-standard-fur-finanzdienstleistungen/</loc>
		<lastmod>2025-12-04T04:43:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-sich-gegen-neue-ki-gefahren-wappnen/</loc>
		<lastmod>2025-12-04T04:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developers-urged-to-immediately-upgrade-react-next-js/</loc>
		<lastmod>2025-12-04T04:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-446-a-hacker-doxxes-himself-and-social-engineering-as-a-service/</loc>
		<lastmod>2025-12-04T04:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-ki-als-neuer-standard-fur-finanzdienstleistungen-2/</loc>
		<lastmod>2025-12-04T04:44:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-schwachstelle-in-react-und-next-js/</loc>
		<lastmod>2025-12-04T04:44:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-sich-gegen-neue-ki-gefahren-wappnen-2/</loc>
		<lastmod>2025-12-04T04:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-2-0-npm-malware-angriff-erbeutet-400-k-entwickler-geheimnisse/</loc>
		<lastmod>2025-12-04T04:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rust-core-library-partly-polished-for-industrial-safety-spec/</loc>
		<lastmod>2025-12-04T04:45:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thailand-seizes-more-than-300m-in-assets-and-issues-42-arrest-warrants-in-cyberscam-crackdown/</loc>
		<lastmod>2025-12-04T04:45:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-angriffe-steigen-um-uber-50-prozent/</loc>
		<lastmod>2025-12-04T05:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-im-jahr-2026-sechs-entscheidenden-trends-fur-die-digitale-wirtschaft/</loc>
		<lastmod>2025-12-04T05:43:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-tarnen-schadsoftware-als-kultspiel-snake/</loc>
		<lastmod>2025-12-04T06:43:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-vs-you-whos-better-at-permission-decisions/</loc>
		<lastmod>2025-12-04T06:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-quantum-clock-is-ticking-and-businesses-are-still-stuck-in-prep-mode/</loc>
		<lastmod>2025-12-04T06:43:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-scraps-mandatory-app-preinstall-following-industry-pushback/</loc>
		<lastmod>2025-12-04T06:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-vscode-extension-deploys-anivia-loader-and-octorat/</loc>
		<lastmod>2025-12-04T06:44:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploit-new-windows-lnk-0-day-vulnerability/</loc>
		<lastmod>2025-12-04T06:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-in-linux-grafikkomponenten-x-org-und-xwayland-trotz-unklarem-angriffsweg-angreifbar/</loc>
		<lastmod>2025-12-04T06:45:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-cios-and-boards-bridging-the-cybersecurity-confidence-gap/</loc>
		<lastmod>2025-12-04T07:42:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coach-or-mentor-what-you-need-depends-on-where-you-are-as-a-cyber-leader/</loc>
		<lastmod>2025-12-04T07:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-143-0-7499-40-41-schliest-schwachstellen/</loc>
		<lastmod>2025-12-04T07:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-grids-are-trying-to-modernize-and-attackers-are-treating-it-like-an-invitation/</loc>
		<lastmod>2025-12-04T07:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-day-in-the-life-of-the-internet-tells-a-bigger-story/</loc>
		<lastmod>2025-12-04T07:43:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-hackers-target-israeli-orgs-with-retro-game-tactic/</loc>
		<lastmod>2025-12-04T07:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-29-7-tbps-ddos-attack-linked-to-aisuru-botnet-with-up-to-4-million-infected-hosts/</loc>
		<lastmod>2025-12-04T07:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-as-a-service-industrialisiert-online-betrug-automatisiertes-phishing-fangt-einmalpassworter-ab-und-stiehlt-daten/</loc>
		<lastmod>2025-12-04T07:44:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convenience-or-catastrophe-the-dangers-of-ai-browsers-no-one-is-talking-about/</loc>
		<lastmod>2025-12-04T08:43:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sleepless-in-security-whats-actually-keeping-cisos-up-at-night/</loc>
		<lastmod>2025-12-04T08:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/submarine-cable-cybersecurity-protecting-critical-infrastructure/</loc>
		<lastmod>2025-12-04T08:44:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparente-sasearchitektur-ubiqube-veroffentlicht-sase-map/</loc>
		<lastmod>2025-12-04T08:44:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-data-warnt-vor-finanziellen-verlusten-durch-infostealer-arkanix/</loc>
		<lastmod>2025-12-04T08:44:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-web-services-verkundet-bei-der-reinvent-eine-reihe-von-ki-innovationen/</loc>
		<lastmod>2025-12-04T08:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-next-js-betroffen-kritische-react-lucke-gefahrdet-unzahlige-serversysteme/</loc>
		<lastmod>2025-12-04T08:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-reveals-its-first-tri-fold-phone-and-its-desktop-mode/</loc>
		<lastmod>2025-12-04T09:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-botnet-auf-dem-vormarsch-ki-unternehmen-im-visier/</loc>
		<lastmod>2025-12-04T09:44:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waymo-chalks-up-another-four-legged-casualty-on-san-francisco-streets/</loc>
		<lastmod>2025-12-04T10:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-mitigates-record-29-7-tbps-ddos-attack-by-the-aisuru-botnet/</loc>
		<lastmod>2025-12-04T10:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-silently-fixes-8-year-windows-security-flaw/</loc>
		<lastmod>2025-12-04T10:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/goldfactory-hits-southeast-asia-with-modified-banking-apps-driving-11000-infections/</loc>
		<lastmod>2025-12-04T10:44:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-office-escapes-1m-fine-after-postmaster-data-breach/</loc>
		<lastmod>2025-12-04T10:44:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-ddos-rekord-aisuru-botnetz-attackiert-mit-nie-dagewesenen-datenfluten/</loc>
		<lastmod>2025-12-04T10:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/licht-und-schatten-bei-der-cyberabwehr-in-der-fertigungsindustrie/</loc>
		<lastmod>2025-12-04T10:44:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugsversuche-via-whatsapp-haben-hochkonjunktur/</loc>
		<lastmod>2025-12-04T11:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-withdraws-order-mandating-pre-installation-of-sanchar-saathi-cybersecurity-app-on-smartphones/</loc>
		<lastmod>2025-12-04T11:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mysterious-shutdown-of-porsche-vehicles-in-russia-sparks-fears-over-connected-car-vulnerabilities/</loc>
		<lastmod>2025-12-04T11:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skills-shortages-trump-headcount-as-critical-cyber-challenge/</loc>
		<lastmod>2025-12-04T11:44:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sichtbarkeit-in-der-cyberabwehr-warum-it-sicherheit-die-paketanalyse-braucht/</loc>
		<lastmod>2025-12-04T11:44:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-coalition-supplying-tech-to-ukraine-prepared-for-long-war/</loc>
		<lastmod>2025-12-04T12:43:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-vulnerability-in-react-node-js-patched-update-asap-cve-2025-55182/</loc>
		<lastmod>2025-12-04T12:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-louisiana-department-of-wildlife-and-fisheries-is-detaining-people-for-ice/</loc>
		<lastmod>2025-12-04T12:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/picklescan-uncovers-0-day-vulnerabilities-allowing-arbitrary-code-execution-via-malicious-pytorch-models/</loc>
		<lastmod>2025-12-04T12:44:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-scanner-released-to-detect-exposed-reactjs-and-next-js-rsc-endpoints-cve-2025-55182/</loc>
		<lastmod>2025-12-04T12:44:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-for-windows-flaw-lets-attackers-execute-arbitrary-code/</loc>
		<lastmod>2025-12-04T12:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sryxen-malware-uses-headless-browser-trick-to-bypass-chrome-protections/</loc>
		<lastmod>2025-12-04T12:45:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-for-windows-flaw-lets-attackers-execute-arbitrary-code-2/</loc>
		<lastmod>2025-12-04T12:45:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akamai-fixes-http-request-smuggling-flaw-in-edge-servers/</loc>
		<lastmod>2025-12-04T12:46:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sryxen-malware-uses-headless-browser-trick-to-bypass-chrome-protections-2/</loc>
		<lastmod>2025-12-04T12:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-velociraptor-dfir-for-stealthy-c2-and-ransomware-deployment/</loc>
		<lastmod>2025-12-04T12:46:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akamai-fixes-http-request-smuggling-flaw-in-edge-servers-2/</loc>
		<lastmod>2025-12-04T12:46:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-data-breach-exposes-dozens-of-u-s-banks-and-credit-unions/</loc>
		<lastmod>2025-12-04T12:46:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-for-windows-flaw-lets-attackers-execute-arbitrary-code-3/</loc>
		<lastmod>2025-12-04T12:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-velociraptor-dfir-for-stealthy-c2-and-ransomware-deployment-2/</loc>
		<lastmod>2025-12-04T12:47:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-vulnerability-under-active-attack-allowing-remote-code-execution/</loc>
		<lastmod>2025-12-04T12:48:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-five-new-ics-advisories-on-emerging-vulnerabilities-and-exploits/</loc>
		<lastmod>2025-12-04T12:48:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-vulnerability-under-active-attack-allowing-remote-code-execution-2/</loc>
		<lastmod>2025-12-04T12:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/k7-antivirus-flaw-lets-attackers-gain-system-level-privileges/</loc>
		<lastmod>2025-12-04T12:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-five-new-ics-advisories-on-emerging-vulnerabilities-and-exploits-2/</loc>
		<lastmod>2025-12-04T12:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-threats-that-reshaped-web-security-this-year-2025/</loc>
		<lastmod>2025-12-04T12:49:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/k7-antivirus-flaw-lets-attackers-gain-system-level-privileges-2/</loc>
		<lastmod>2025-12-04T12:50:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-vulnerability-under-active-attack-allowing-remote-code-execution-3/</loc>
		<lastmod>2025-12-04T12:50:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-studie-ransomware-in-der-produktion-fortschritte-in-der-abwehr-aber-angreifer-sind-einen-schritt-voraus/</loc>
		<lastmod>2025-12-04T12:50:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-threats-that-reshaped-web-security-this-year-2025-2/</loc>
		<lastmod>2025-12-04T12:50:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-five-new-ics-advisories-on-emerging-vulnerabilities-and-exploits-3/</loc>
		<lastmod>2025-12-04T12:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-cookie-day-verbraucher-bleiben-bei-der-datenerhebung-uber-cookies-skeptisch/</loc>
		<lastmod>2025-12-04T12:51:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsforscher-warnt-apple-zeigt-den-mittelfinger-in-richtung-macos/</loc>
		<lastmod>2025-12-04T12:51:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-cookie-day-verbraucher-bleiben-bei-der-datenerhebung-uber-cookies-skeptisch-2/</loc>
		<lastmod>2025-12-04T12:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-ddos-rekord-riesiges-botnetz-attackiert-mit-beispielloser-datenflut/</loc>
		<lastmod>2025-12-04T12:51:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsforscher-warnt-apple-zeigt-den-mittelfinger-in-richtung-macos-2/</loc>
		<lastmod>2025-12-04T12:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-oder-uberwachung-indien-will-tracking-app-auf-jedem-smartphone-installieren/</loc>
		<lastmod>2025-12-04T12:52:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-ddos-rekord-riesiges-botnetz-attackiert-mit-beispielloser-datenflut-2/</loc>
		<lastmod>2025-12-04T12:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypandas-years-long-browser-hack-infected-4-3-million-users/</loc>
		<lastmod>2025-12-04T13:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-predator-spyware-is-being-used-in-several-countries-including-iraq/</loc>
		<lastmod>2025-12-04T13:44:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/licht-und-schatten-bei-der-cyberabwehr-in-der-produktions-und-fertigungsindustrie/</loc>
		<lastmod>2025-12-04T13:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-botnet-turns-q3-into-a-terabit-scale-stress-test-for-the-entire-internet/</loc>
		<lastmod>2025-12-04T13:44:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webxr-flaw-hits-4-billion-chromium-users-update-your-browser-now/</loc>
		<lastmod>2025-12-04T13:44:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypandas-years-long-browser-hack-infected-4-3-million-users-2/</loc>
		<lastmod>2025-12-04T13:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-sold-albiriox-android-malware-targets-banks-and-crypto-holders/</loc>
		<lastmod>2025-12-04T13:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-named-a-leader-in-gartner-magic-quadrant-for-email-security/</loc>
		<lastmod>2025-12-04T13:45:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-license-check-bug-blocks-desktop-app-downloads/</loc>
		<lastmod>2025-12-04T13:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-wi-fi-hack-npm-worm-defi-theft-phishing-blasts-and-15-more-stories/</loc>
		<lastmod>2025-12-04T13:46:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-adds-bevy-of-tools-and-capilities-to-improve-cloud-security/</loc>
		<lastmod>2025-12-04T14:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-data-shows-corporate-users-3x-more-likely-to-be-targeted-by-phishing-than-by-malware/</loc>
		<lastmod>2025-12-04T14:43:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sanctions-russias-gru-agency-and-cyber-spies-over-deadly-nerve-agent-attack/</loc>
		<lastmod>2025-12-04T14:44:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spy-vs-spy-how-genai-is-powering-defenders-and-attackers/</loc>
		<lastmod>2025-12-04T14:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-budgets-bleiben-angespannt-und-der-bedarf-an-fachkraften-wachst/</loc>
		<lastmod>2025-12-04T14:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advent-advent-das-postfach-brennt-hochkonjunktur-fur-cyberattacken-in-der-weihnachtszeit/</loc>
		<lastmod>2025-12-04T14:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-scheitert-haufig-an-der-unternehmenskultur/</loc>
		<lastmod>2025-12-04T14:44:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-data-shows-corporate-users-3x-more-likely-to-be-targeted-by-phishing-than-by-malware-2/</loc>
		<lastmod>2025-12-04T14:44:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/student-sells-govt-university-sites-to-chinese-actors/</loc>
		<lastmod>2025-12-04T14:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-cyber-service-for-telcos-blocks-one-billion-malicious-site-attempts/</loc>
		<lastmod>2025-12-04T14:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-nutzung-im-it-service-im-uberblick-wie-ki-fit-ist-der-channel-wirklich/</loc>
		<lastmod>2025-12-04T14:45:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-shortcuts-use-as-a-vector-for-malware-may-be-cut-short/</loc>
		<lastmod>2025-12-04T15:43:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/momberger-betrugmails-an-kunden-im-umlauf/</loc>
		<lastmod>2025-12-04T15:43:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-page-draft-trump-administration-cyber-strategy-targeted-for-january-release/</loc>
		<lastmod>2025-12-04T15:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-quietly-shuts-down-windows-shortcut-flaw-after-years-of-espionage-abuse/</loc>
		<lastmod>2025-12-04T15:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-office-launches-police-facial-recognition-consultation/</loc>
		<lastmod>2025-12-04T15:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-rust-packages-targeted-web3-developers/</loc>
		<lastmod>2025-12-04T15:44:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-react-next-js-flaw-lets-hackers-execute-code-on-servers/</loc>
		<lastmod>2025-12-04T15:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-agencies-push-for-digital-trust-amid-ai-era-with-new-provenance-report/</loc>
		<lastmod>2025-12-04T15:44:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ghostframe-phishing-framework-hits-over-one-million-attacks/</loc>
		<lastmod>2025-12-04T15:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-physische-systeme-unter-druck-ot-risiken-steigen-durch-lieferketten-fernzugriff-und-neue-regulierung/</loc>
		<lastmod>2025-12-04T15:45:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dangerous-rce-flaw-in-react-next-js-threatens-cloud-environments-apps/</loc>
		<lastmod>2025-12-04T16:48:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-question-white-house-on-strategy-for-countering-ai-fueled-hacks/</loc>
		<lastmod>2025-12-04T16:48:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerabilities-found-in-react-and-next-js/</loc>
		<lastmod>2025-12-04T16:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7ai-raises-130m-to-boost-agentic-powered-security-operations/</loc>
		<lastmod>2025-12-04T16:49:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anwaltsbetrug-fake-kanzlei-snorvarski-partners-lockt-mit-64-280-euro/</loc>
		<lastmod>2025-12-04T16:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-blocks-aisuru-botnet-powered-largest-ever-29-7-tbps-ddos-attack/</loc>
		<lastmod>2025-12-04T16:49:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/att-extends-deadline-for-data-breach-settlement-claims/</loc>
		<lastmod>2025-12-04T16:49:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protect-your-digital-life-with-a-5-year-iprovpn-plan-for-20/</loc>
		<lastmod>2025-12-04T16:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-strong-password-policies-secure-ot-systems-against-cyber-threats/</loc>
		<lastmod>2025-12-04T16:50:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenows-acquisition-of-nhi-provider-veza-strengthens-governance-portfolio/</loc>
		<lastmod>2025-12-04T16:50:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-school-hamburg-schutzt-ihre-ekommunikation-mit-smarter-komplettlosung/</loc>
		<lastmod>2025-12-04T16:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-eliminates-pay-incentives-as-it-changes-how-it-retains-top-cyber-talent/</loc>
		<lastmod>2025-12-04T17:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-attack-volume-rises-in-q3-fueled-by-aisuru-botnet/</loc>
		<lastmod>2025-12-04T17:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-feeds-to-flows-using-a-unified-linkage-model-to-operationalize-threat-intelligence/</loc>
		<lastmod>2025-12-04T17:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-scientist-sentenced-to-21-years-on-treason-cyber-sabotage-charges/</loc>
		<lastmod>2025-12-04T17:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-confirms-vendor-breach-as-everest-gang-leaks-data-claims-arcsoft-and-qualcomm/</loc>
		<lastmod>2025-12-04T17:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-authorities-shutter-cryptomixer/</loc>
		<lastmod>2025-12-04T17:44:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-botnet-shatters-records-with-29-7-tbps-ddos-attack/</loc>
		<lastmod>2025-12-04T17:44:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grc-automation-becomes-essential-as-compliance-demands-accelerate/</loc>
		<lastmod>2025-12-04T17:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-anonymous-phone-carrier-lets-you-sign-up-with-nothing-but-a-zip-code/</loc>
		<lastmod>2025-12-04T17:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contractors-with-hacking-records-accused-of-wiping-96-govt-databases/</loc>
		<lastmod>2025-12-04T17:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-and-international-partners-issue-guidance-for-secure-ai-in-infrastructure/</loc>
		<lastmod>2025-12-04T17:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-urge-critical-infrastructure-operators-to-carefully-plan-and-oversee-ai-use/</loc>
		<lastmod>2025-12-04T18:44:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amid-rising-threats-nato-holds-its-largest-ever-cyberdefense-exercise/</loc>
		<lastmod>2025-12-04T18:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-record-breaking-30-tbps-ddos-attack-should-concern-every-business/</loc>
		<lastmod>2025-12-04T18:44:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sanctioned-spyware-maker-intellexa-had-direct-access-to-government-espionage-victims-researchers-say/</loc>
		<lastmod>2025-12-04T18:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kohlers-smart-toilet-camera-isnt-actually-endend-encrypted/</loc>
		<lastmod>2025-12-04T18:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/constrained-budgets-left-security-teams-short-handed-in-2025/</loc>
		<lastmod>2025-12-04T18:45:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-chinese-brickstorm-malware-attacks-on-vmware-servers/</loc>
		<lastmod>2025-12-04T18:45:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-uses-fake-microsoft-teams-installer-to-spread-valleyrat-malware-in-china/</loc>
		<lastmod>2025-12-04T18:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/virginia-brothers-charged-with-hacking-deleting-federal-databases-holding-foia-info/</loc>
		<lastmod>2025-12-04T19:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-plankey-nomination-to-lead-cisa-appears-to-be-over-after-thursday-vote/</loc>
		<lastmod>2025-12-04T19:43:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-year-end-infosec-wrapped/</loc>
		<lastmod>2025-12-04T19:43:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-blocks-facetime-and-snapchat-over-use-in-terrorist-attacks/</loc>
		<lastmod>2025-12-04T19:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-things-to-know-on-vmware-brickstorm-attacks/</loc>
		<lastmod>2025-12-04T20:43:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-attempt-against-reporters-without-borders-attributed-to-russia-linked-group/</loc>
		<lastmod>2025-12-04T20:43:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-officials-seek-to-expand-facial-recognition-technology-use/</loc>
		<lastmod>2025-12-04T20:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socomec-diris-digiware-m-series-and-easy-config-pdf-xchange-editor-vulnerabilities/</loc>
		<lastmod>2025-12-04T20:44:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/twins-who-hacked-state-dept-hired-to-work-for-gov-again-now-charged-with-deleting-databases/</loc>
		<lastmod>2025-12-04T20:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lummac2-infects-north-korean-hacker-device-linked-to-bybit-heist/</loc>
		<lastmod>2025-12-04T20:44:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-data-breach-impacted-more-than-780000-individuals/</loc>
		<lastmod>2025-12-04T20:44:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-warn-ai-in-ot-may-undermine-system-safety/</loc>
		<lastmod>2025-12-04T20:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-says-dc-pipe-bomb-suspect-brian-cole-kept-buying-bomb-parts-after-january-6/</loc>
		<lastmod>2025-12-04T20:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-creates-new-security-risks-for-ot-networks-warns-nsa/</loc>
		<lastmod>2025-12-04T21:43:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hegseth-needs-to-go-to-secure-messaging-school-report-says/</loc>
		<lastmod>2025-12-04T21:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/</loc>
		<lastmod>2025-12-04T21:44:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-blocks-facetime-and-snapchat-for-alleged-use-by-terrorists/</loc>
		<lastmod>2025-12-04T21:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-publishes-security-guidance-for-using-ai-in-ot/</loc>
		<lastmod>2025-12-04T21:44:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-creates-new-security-risks-for-ot-networks-warns-nsa-2/</loc>
		<lastmod>2025-12-04T21:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-nsa-warn-of-chinas-brickstorm-malware-after-incident-response-efforts/</loc>
		<lastmod>2025-12-04T22:44:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/officials-warn-about-expansive-ongoing-china-espionage-threat-riding-on-brickstorm-malware/</loc>
		<lastmod>2025-12-04T22:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sen-mark-kelly-investing-in-safe-secure-ai-is-key-to-u-s-dominance/</loc>
		<lastmod>2025-12-04T22:44:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prc-spies-brickstromed-their-way-into-critical-us-networks-and-remained-hidden-for-years/</loc>
		<lastmod>2025-12-04T22:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-claims-data-theft-from-church-of-scientology/</loc>
		<lastmod>2025-12-04T22:44:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-react-flaw-incites-supply-chain-risk/</loc>
		<lastmod>2025-12-04T22:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-has-blocked-416-billion-ai-bot-requests-since-july-1/</loc>
		<lastmod>2025-12-04T22:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncscs-proactive-notifications-warns-orgs-of-flaws-in-exposed-devices/</loc>
		<lastmod>2025-12-04T22:45:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-ongoing-brickstorm-backdoor-attacks/</loc>
		<lastmod>2025-12-04T22:45:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intellexa-remotely-accessed-predator-spyware-customer-systems-investigation-finds/</loc>
		<lastmod>2025-12-04T23:43:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-new-an-openplc-scadabr-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-12-04T23:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-considers-computer-misuse-act-revision/</loc>
		<lastmod>2025-12-04T23:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-outlines-ai-road-map-amid-major-department-overhaul/</loc>
		<lastmod>2025-12-04T23:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brickstorm-malware-hits-us-critical-systems-cisa-warns/</loc>
		<lastmod>2025-12-04T23:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-create-critical-supply-chain-risk-in-github-actions/</loc>
		<lastmod>2025-12-04T23:44:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncc-supporting-london-councils-gripped-by-cyber-attacks/</loc>
		<lastmod>2025-12-04T23:45:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-exploiting-arrayos-ag-vpn-flaw-to-plant-webshells/</loc>
		<lastmod>2025-12-04T23:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-agentic-ai-can-boost-cyber-defense/</loc>
		<lastmod>2025-12-04T23:45:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-microsoft-schliest-stillschweigend-lnk-schwachstelle-cve-2025-9491/</loc>
		<lastmod>2025-12-05T00:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-rce-flaws-put-react-and-next-js-apps-at-severe-risk/</loc>
		<lastmod>2025-12-05T00:44:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signalgate-inspector-general-report-wants-just-one-change-to-avoid-a-repeat-debacle/</loc>
		<lastmod>2025-12-05T00:44:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-data-shows-corporate-users-3x-more-likely-to-be-targeted-by-phishing-than-by-malware-3/</loc>
		<lastmod>2025-12-05T00:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-foxit-pdf-reader-to-seize-system-access-and-steal-data/</loc>
		<lastmod>2025-12-05T00:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-impersonates-indias-income-tax-department-to-distribute-asyncrat/</loc>
		<lastmod>2025-12-05T00:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-rce-flaws-put-react-and-next-js-apps-at-severe-risk-2/</loc>
		<lastmod>2025-12-05T00:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signalgate-inspector-general-report-wants-just-one-change-to-avoid-a-repeat-debacle-2/</loc>
		<lastmod>2025-12-05T00:45:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-data-shows-corporate-users-3x-more-likely-to-be-targeted-by-phishing-than-by-malware-4/</loc>
		<lastmod>2025-12-05T00:45:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chained-synology-beestation-vulnerabilities-enable-root-privilege-escalation-via-task-scheduler-exploit/</loc>
		<lastmod>2025-12-05T00:46:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ios-zero-day-exploit-chain-enables-advanced-surveillance-by-mercenary-spyware/</loc>
		<lastmod>2025-12-05T00:47:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kohlers-smart-toilet-camera-not-truly-endend-encrypted/</loc>
		<lastmod>2025-12-05T00:47:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evilginx-attack-campaigns-session-cookie-theft-and-mfa-bypass-tactics/</loc>
		<lastmod>2025-12-05T00:47:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-calisto-apt-targets-reporters-without-borders-with-custom-aitm-phishing-and-missing-file/</loc>
		<lastmod>2025-12-05T00:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchwork-apt-deploys-streamspy-trojan-hiding-c2-commands-in-websocket-traffic-for-stealth-espionage/</loc>
		<lastmod>2025-12-05T00:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dreiste-anruf-maschen-trickbetruger-missbrauchen-personliche-informationen-als-koder/</loc>
		<lastmod>2025-12-05T00:44:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-stack-dirk-arendt-fordert-cybersicherheit-als-strategischen-grundpfeiler/</loc>
		<lastmod>2025-12-05T00:44:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durch-automatisierung-wird-sicherheit-zum-wettbewerbsvorteil/</loc>
		<lastmod>2025-12-05T04:43:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspicious-traffic-could-be-testing-cdn-evasion-says-expert/</loc>
		<lastmod>2025-12-05T04:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-ceo-siem-purple-ai-driving-outsized-growth-surge/</loc>
		<lastmod>2025-12-05T04:44:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/durch-automatisierung-wird-sicherheit-zum-wettbewerbsvorteil-2/</loc>
		<lastmod>2025-12-05T04:44:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ai-for-an-ai-anthropic-says-ai-agents-require-ai-defense/</loc>
		<lastmod>2025-12-05T04:45:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspicious-traffic-could-be-testing-cdn-evasion-says-expert-2/</loc>
		<lastmod>2025-12-05T04:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-wichtigsten-trends-im-bereich-der-physischen-sicherheit-fur-das-jahr-2026/</loc>
		<lastmod>2025-12-05T05:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-ciso-paradoxon-innovation-ermoglichen-und-risiken-managen/</loc>
		<lastmod>2025-12-05T05:42:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-december-5-2025/</loc>
		<lastmod>2025-12-05T05:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-wichtigsten-trends-im-bereich-der-physischen-sicherheit-fur-das-jahr-2026-2/</loc>
		<lastmod>2025-12-05T05:43:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-oben-zero-days-unten-cyber-eisberg-wachst/</loc>
		<lastmod>2025-12-05T06:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-leaders-should-watch-for-when-companies-buy-or-sell-a-business/</loc>
		<lastmod>2025-12-05T06:44:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-oben-zero-days-unten-cyber-eisberg-wachst-2/</loc>
		<lastmod>2025-12-05T06:44:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-brokers-are-exposing-medical-professionals-and-turning-their-personal-lives-into-open-files/</loc>
		<lastmod>2025-12-05T06:45:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-leaders-should-watch-for-when-companies-buy-or-sell-a-business-2/</loc>
		<lastmod>2025-12-05T06:45:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-nsa-alert-on-brickstorm-malware-targeting-vmware-esxi-and-windows-systems/</loc>
		<lastmod>2025-12-05T06:45:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-brokers-are-exposing-medical-professionals-and-turning-their-personal-lives-into-open-files-2/</loc>
		<lastmod>2025-12-05T06:46:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-oben-zero-days-unten-cyber-eisberg-wachst-3/</loc>
		<lastmod>2025-12-05T06:46:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-stealthy-linux-malware-merges-mirai-based-ddos-botnet-with-fileless-cryptominer/</loc>
		<lastmod>2025-12-05T06:46:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-nsa-alert-on-brickstorm-malware-targeting-vmware-esxi-and-windows-systems-2/</loc>
		<lastmod>2025-12-05T06:46:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-leaders-should-watch-for-when-companies-buy-or-sell-a-business-3/</loc>
		<lastmod>2025-12-05T06:47:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-svg-technique-enables-highly-interactive-clickjacking-attacks/</loc>
		<lastmod>2025-12-05T06:47:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jpcert-confirms-active-command-injection-attacks-on-array-ag-gateways/</loc>
		<lastmod>2025-12-05T06:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-svg-technique-enables-highly-interactive-clickjacking-attacks-2/</loc>
		<lastmod>2025-12-05T06:49:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cvss-10-0-identitatsdiebstahl-und-rechteausweitung-in-grafana/</loc>
		<lastmod>2025-12-05T06:49:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jpcert-confirms-active-command-injection-attacks-on-array-ag-gateways-2/</loc>
		<lastmod>2025-12-05T06:49:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-years-in-zero-trust-remains-elusive-with-ai-rising-to-complicate-the-challenge/</loc>
		<lastmod>2025-12-05T07:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-data-shows-corporate-users-3x-more-likely-to-be-targeted-by-phishing-than-by-malware-5/</loc>
		<lastmod>2025-12-05T07:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-the-missing-layers-for-an-internet-of-agents/</loc>
		<lastmod>2025-12-05T07:44:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitaten-definieren-sicherheit-2026-dieser-sieben-iam-trends-pragen-die-sicherheitsarchitekturen/</loc>
		<lastmod>2025-12-05T07:44:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anlagebetruger-kodern-mit-falscher-promi-werbung/</loc>
		<lastmod>2025-12-05T08:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-als-kontinuierlicher-prozess-absicherung-der-logistik-wird-immer-wichtiger/</loc>
		<lastmod>2025-12-05T08:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ein-backup-von-amazon-s3-so-wichtig-ist/</loc>
		<lastmod>2025-12-05T08:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behorden-warnen-chinesische-hacker-attackieren-vmware-systeme/</loc>
		<lastmod>2025-12-05T08:44:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-down-websites-offline-with-500-internal-server-error/</loc>
		<lastmod>2025-12-05T09:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-reports-prc-hackers-using-brickstorm-for-long-term-access-in-u-s-systems/</loc>
		<lastmod>2025-12-05T09:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-student-charged-in-western-sydney-university-cyberattacks/</loc>
		<lastmod>2025-12-05T09:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-maker-intellexa-evades-sanctions-new-victims-identified/</loc>
		<lastmod>2025-12-05T09:44:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-extends-scope-of-aws-cybersecurity-alliance/</loc>
		<lastmod>2025-12-05T10:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis-2-tritt-morgen-in-kraft-bundestag-verabschiedet-nis-2/</loc>
		<lastmod>2025-12-05T10:44:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wo-kmu-beim-datenschutz-wirklich-unterstutzung-brauchen-dsgvo-im-mittelstand-braucht-vereinfachung-und-klare-hilfen-im-alltag/</loc>
		<lastmod>2025-12-05T10:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-entlassung-bruder-wegen-vernichtung-von-us-regierungsdaten-verhaftet/</loc>
		<lastmod>2025-12-05T10:44:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-takes-its-time-to-weaponize-legitimate-extensions/</loc>
		<lastmod>2025-12-05T11:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-takes-its-time-to-weaponize-legitimate-extensions-2/</loc>
		<lastmod>2025-12-05T11:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-tap-scam-makes-payments-scarier-2/</loc>
		<lastmod>2025-12-05T11:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-tap-scam-makes-payments-scarier/</loc>
		<lastmod>2025-12-05T11:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-pushes-ahead-with-facial-recognition-expansion-despite-civil-liberties-backlash/</loc>
		<lastmod>2025-12-05T11:43:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-pushes-ahead-with-facial-recognition-expansion-despite-civil-liberties-backlash-2/</loc>
		<lastmod>2025-12-05T11:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database/</loc>
		<lastmod>2025-12-05T11:44:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huge-trove-of-nude-images-leaked-by-ai-image-generator-startups-exposed-database-2/</loc>
		<lastmod>2025-12-05T11:44:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadypanda-takes-its-time-to-weaponize-legitimate-extensions-3/</loc>
		<lastmod>2025-12-05T11:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-sicherheit-ist-mehr-als-vielschichtig-neue-ansatze-fur-eine-cloud-zertifizierung-in-der-eu/</loc>
		<lastmod>2025-12-05T11:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-sicherheit-ist-mehr-als-vielschichtig-neue-ansatze-fur-eine-cloud-zertifizierung-in-der-eu-2/</loc>
		<lastmod>2025-12-05T11:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-tap-scam-makes-payments-scarier-3/</loc>
		<lastmod>2025-12-05T11:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-und-veeam-starten-nachste-stufe-ihrer-partnerschaft/</loc>
		<lastmod>2025-12-05T11:45:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-entlassung-festnahmen-wegen-massenhafter-loschung-von-behordendaten/</loc>
		<lastmod>2025-12-05T11:46:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-command-injection-flaw-confirmed-in-array-ag-gateways/</loc>
		<lastmod>2025-12-05T12:43:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brickstorm-backdoor-exposed-cisa-warns-of-advanced-china-backed-intrusions/</loc>
		<lastmod>2025-12-05T12:43:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-critical-flaw-actively-exploited-in-china-linked-attacks/</loc>
		<lastmod>2025-12-05T12:44:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intellexa-leaks-reveal-zero-days-and-ads-based-vector-for-predator-spyware-delivery/</loc>
		<lastmod>2025-12-05T12:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-to-yes-an-anti-sales-guide-for-msps/</loc>
		<lastmod>2025-12-05T12:44:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/draas-was-ist-disaster-recovery-as-a-service/</loc>
		<lastmod>2025-12-05T12:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchday-von-microsoft-sap-co-was-ist-der-patchday/</loc>
		<lastmod>2025-12-05T12:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 39feb2d5ba348eb35e1e1aec601d8ec3; Queries for sitemap: 3; Total queries: 88; Seconds: 4.19; Memory for sitemap: 1KB; Total memory: 44MB -->
