<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='10. April 2026 7:16 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/why-appsec-cant-keep-up-with-ai-generated-code/</loc>
		<lastmod>2025-12-19T17:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firetails-2022-review-on-macro-industry-and-thoughts-about-whats-next-firetail-blog/</loc>
		<lastmod>2025-12-19T17:32:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-linked-and-criminal-hackers-use-device-code-phishing-against-m365-users/</loc>
		<lastmod>2025-12-19T17:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sydney-uni-data-goes-walkabout-after-criminals-raid-code-repo/</loc>
		<lastmod>2025-12-19T17:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-cybersecurity-two-sides-of-the-same-coin/</loc>
		<lastmod>2025-12-19T17:33:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waterfox-browser-goes-ai-free-targets-the-firefox-faithful/</loc>
		<lastmod>2025-12-19T17:34:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyboard-lag-leads-amazon-to-north-korean-impostor-in-remote-role/</loc>
		<lastmod>2025-12-19T17:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-drops-first-ai-agent-risk-list/</loc>
		<lastmod>2025-12-19T17:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-gpt-5-2-codex-for-secure-coding/</loc>
		<lastmod>2025-12-19T17:35:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/longnosedgoblin-caught-snooping-on-asian-governments/</loc>
		<lastmod>2025-12-19T17:36:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-managements-new-mandate-remediate-whats-real/</loc>
		<lastmod>2025-12-19T18:31:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-warns-perncious-fake-north-korea-it-worker-threat-has-become-widespread/</loc>
		<lastmod>2025-12-19T18:31:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-cyber-pros-emerge-as-bold-ai-adopters-while-ai-changes-data-security-game-csa-reports-say/</loc>
		<lastmod>2025-12-19T18:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-spotlight-lefteris-tzelepis-on-leadership-strategy-and-the-modern-security-mandate/</loc>
		<lastmod>2025-12-19T18:33:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-cyber-pros-emerge-as-bold-ai-adopters-while-ai-changes-data-security-game-csa-reports-say-2/</loc>
		<lastmod>2025-12-19T18:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-hires-google-cisco-and-symantec-vet-as-new-cto/</loc>
		<lastmod>2025-12-19T18:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigeria-arrests-suspected-raccoono365-phishing-kit-developer-on-tip-from-microsoft-fbi/</loc>
		<lastmod>2025-12-19T18:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/denmark-summons-russian-ambassador-over-alleged-cyberattacks-on-water-utility-elections/</loc>
		<lastmod>2025-12-19T18:35:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacks-thefts-and-disruption-the-worst-data-breaches-of-2025-2/</loc>
		<lastmod>2025-12-19T18:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sensitive-data-stolen-in-westminster-city-council-cyber-attack/</loc>
		<lastmod>2025-12-19T18:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-bolsters-federal-leadership-to-advance-government-cybersecurity-initiatives/</loc>
		<lastmod>2025-12-19T18:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cultureai-selected-for-microsofts-agentic-launchpad-initiative-to-advance-secure-ai-usage/</loc>
		<lastmod>2025-12-19T18:37:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-accounts-targeted-in-wave-of-oauth-phishing-attacks/</loc>
		<lastmod>2025-12-19T18:37:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-fifteen-years/</loc>
		<lastmod>2025-12-19T19:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-fifteen-years-2/</loc>
		<lastmod>2025-12-19T19:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-powerradio-manipulate-sensor-measurement-via-power-gnd-radiation/</loc>
		<lastmod>2025-12-19T19:30:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-powerradio-manipulate-sensor-measurement-via-power-gnd-radiation-2/</loc>
		<lastmod>2025-12-19T19:30:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-major-cyberattacks-and-data-breaches-in-2025/</loc>
		<lastmod>2025-12-19T19:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-sydney-reports-data-breach-affecting-over-20000-staff-affiliates/</loc>
		<lastmod>2025-12-19T19:32:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-sounds-alarm-as-critical-firebox-flaw-comes-under-active-attack/</loc>
		<lastmod>2025-12-19T19:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-when-kyc-no-longer-signals-trust/</loc>
		<lastmod>2025-12-19T19:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-centers-fueling-thailands-border-war-with-cambodia/</loc>
		<lastmod>2025-12-19T19:33:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigeria-arrests-dev-of-microsoft-365-raccoon0365-phishing-platform/</loc>
		<lastmod>2025-12-19T19:33:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-google-cloud-inks-an-interesting-deal-with-palo-alto-networks/</loc>
		<lastmod>2025-12-19T20:31:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-charges-gang-for-atm-hacks-using-ploutus-malware/</loc>
		<lastmod>2025-12-19T20:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kirsten-davies-confirmed-as-pentagon-cio/</loc>
		<lastmod>2025-12-19T20:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-code-ships-faster-but-crashes-harder/</loc>
		<lastmod>2025-12-19T20:32:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hubspot-phishing-campaign-bypasses-trusted-email-defenses/</loc>
		<lastmod>2025-12-19T20:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-teams-is-down-and-messages-are-delayed/</loc>
		<lastmod>2025-12-19T20:33:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-hackers-use-microsoft-365-device-code-phishing-for-account-takeovers/</loc>
		<lastmod>2025-12-19T20:34:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-compliance-maintaining-credential-security/</loc>
		<lastmod>2025-12-19T21:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-interventional-root-cause-analysis-of-failures-in-multi-sensor-fusion-perception-systems/</loc>
		<lastmod>2025-12-19T21:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preventing-this-weeks-aws-cryptomining-attacks-why-detection-fails-and-permissions-matter/</loc>
		<lastmod>2025-12-19T21:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-says-ongoing-deepfake-impersonation-of-u-s-gov-officials-dates-back-to-2023/</loc>
		<lastmod>2025-12-19T21:33:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-cisco-customers-are-vulnerable-to-new-chinese-hacking-campaign-researchers-say/</loc>
		<lastmod>2025-12-19T21:34:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/atm-jackpotting-gang-accused-of-unleashing-ploutus-malware-across-us/</loc>
		<lastmod>2025-12-19T21:34:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-foreign-office-targeted-by-hackers/</loc>
		<lastmod>2025-12-19T21:35:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-foreign-office-targeted-by-hackers-2/</loc>
		<lastmod>2025-12-19T21:35:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-renews-uk-data-adequacy-agreement-ensuring-continued-free-flow-of-data/</loc>
		<lastmod>2025-12-19T21:35:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-renews-uk-data-adequacy-agreement-ensuring-continued-free-flow-of-data-2/</loc>
		<lastmod>2025-12-19T21:35:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluedelta-hackers-target-users-of-popular-ukrainian-webmail-and-news-service/</loc>
		<lastmod>2025-12-19T21:36:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mapping-the-emerging-alliance-between-qilin-dragonforce-and-lockbit/</loc>
		<lastmod>2025-12-19T21:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-atlas-exploits-office-vulnerabilities-to-execute-malicious-code/</loc>
		<lastmod>2025-12-19T21:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leverage-gladinet-triofox-0-day-vulnerability-to-run-malicious-code/</loc>
		<lastmod>2025-12-19T21:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-log4j-flaw-enables-interception-of-sensitive-logging-data/</loc>
		<lastmod>2025-12-19T21:38:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-targeting-networks-and-critical-infrastructure-organizations/</loc>
		<lastmod>2025-12-19T21:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-kibana-vulnerabilities-allow-attackers-to-embed-malicious-scripts/</loc>
		<lastmod>2025-12-19T21:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scripted-sparrow-utilizes-automation-to-generate-and-dispatch-attack-messages/</loc>
		<lastmod>2025-12-19T21:39:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-vpns-email-services-hit-in-separate-threat-campaigns/</loc>
		<lastmod>2025-12-19T21:40:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncc-group-taps-qualys-to-extend-managed-security-service-into-shadow-it-realm/</loc>
		<lastmod>2025-12-19T22:30:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-pillars-of-network-risk-reduction-a-guide-to-network-security-risk-management/</loc>
		<lastmod>2025-12-19T22:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-watchguard-firebox-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2025-12-19T22:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-watchguard-firebox-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2025-12-19T22:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-watchguard-firebox-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2025-12-19T22:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-incident-responders-plead-guilty-to-ransomware-attack-spree-3/</loc>
		<lastmod>2025-12-19T22:32:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-incident-responders-plead-guilty-to-ransomware-attack-spree/</loc>
		<lastmod>2025-12-19T22:32:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-incident-responders-plead-guilty-to-ransomware-attack-spree-2/</loc>
		<lastmod>2025-12-19T22:32:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-google-cloud-expand-partnership-in-multibillion-dollar-deal/</loc>
		<lastmod>2025-12-19T22:32:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-of-oauth-device-code-phishing-attacks-targets-m365-accounts/</loc>
		<lastmod>2025-12-19T23:30:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-prince-of-persia-returns-with-new-malware-and-c2-infrastructure/</loc>
		<lastmod>2025-12-19T23:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-national-pleads-guilty-to-nefilim-ransomware-attacks/</loc>
		<lastmod>2025-12-19T23:31:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-unworried-by-salesforce-firing-shots-across-its-bow/</loc>
		<lastmod>2025-12-19T23:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-ai-challenge-runs-deeper-than-regulation/</loc>
		<lastmod>2025-12-19T23:32:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-intel-chair-warns-of-open-source-security-risks/</loc>
		<lastmod>2025-12-19T23:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-smart-glasses-in-hospitals-are-not-a-bright-idea/</loc>
		<lastmod>2025-12-19T23:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-fraud-among-home-care-workers-puts-patients-at-risk-2/</loc>
		<lastmod>2025-12-19T23:33:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/epa-7-der-versicherten-widersprachen-einrichtung/</loc>
		<lastmod>2025-12-20T00:30:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reduzierung-menschlicher-fehler-als-erfolgsfaktor-zur-senkung-der-it-risiken/</loc>
		<lastmod>2025-12-20T00:30:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-fuels-google-cloud-pact-to-guard-ai-stack/</loc>
		<lastmod>2025-12-20T00:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-fuels-google-cloud-pact-to-guard-ai-stack-2/</loc>
		<lastmod>2025-12-20T00:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-fuels-google-cloud-pact-to-guard-ai-stack-3/</loc>
		<lastmod>2025-12-20T00:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-influence-cybersecurity-trends/</loc>
		<lastmod>2025-12-20T04:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-compliance-challenges-do-nhis-pose/</loc>
		<lastmod>2025-12-20T04:30:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-manage-secrets-securely/</loc>
		<lastmod>2025-12-20T04:32:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-the-future-of-non-human-identities-in-cybersecurity/</loc>
		<lastmod>2025-12-20T04:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-update-caused-a-blizzard-of-failures-worldwide/</loc>
		<lastmod>2025-12-20T04:33:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-was-behind-a-destructive-cyber-attack-on-a-water-utility-in-2024-denmark-says/</loc>
		<lastmod>2025-12-20T04:33:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-whats-in-the-dojs-epstein-file-release-and-whats-missing/</loc>
		<lastmod>2025-12-20T04:33:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jede-zweite-mail-mit-bezug-auf-weihnachten-und-weihnachtsurlaub-ist-bosartig-2/</loc>
		<lastmod>2025-12-20T05:30:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jede-zweite-mail-mit-bezug-auf-weihnachten-und-weihnachtsurlaub-ist-bosartig-3/</loc>
		<lastmod>2025-12-20T05:30:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jede-zweite-mail-mit-bezug-auf-weihnachten-und-weihnachtsurlaub-ist-bosartig-4/</loc>
		<lastmod>2025-12-20T05:30:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mikrosegmentierung-zur-verhinderung-erfolgreicher-angriffe/</loc>
		<lastmod>2025-12-20T05:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mikrosegmentierung-zur-verhinderung-erfolgreicher-angriffe-2/</loc>
		<lastmod>2025-12-20T05:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-budgets-are-going-up-pointing-to-a-boom/</loc>
		<lastmod>2025-12-20T07:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25000-forticloud-sso-enabled-systems-vulnerable-to-remote-exploitation/</loc>
		<lastmod>2025-12-20T09:30:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25000-forticloud-sso-enabled-systems-vulnerable-to-remote-exploitation-2/</loc>
		<lastmod>2025-12-20T09:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-outage-causes-global-messaging-delays-and-service-interruptions/</loc>
		<lastmod>2025-12-20T09:30:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-outage-causes-global-messaging-delays-and-service-interruptions-2/</loc>
		<lastmod>2025-12-20T09:30:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-ip-and-palo-alto-networks-cortex-xsoar-integrate-to-bring-ai-driven-exposure-intelligence-to-automated-incident-response-3/</loc>
		<lastmod>2025-12-20T09:32:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-erklart-brisante-react2shell-server-sicherheitslucke/</loc>
		<lastmod>2025-12-20T09:32:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-watchguard-fireware-os-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-12-20T11:30:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-stole-millions-of-pornhub-users-data-for-extortion/</loc>
		<lastmod>2025-12-20T12:31:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-stole-millions-of-pornhub-users-data-for-extortion-2/</loc>
		<lastmod>2025-12-20T12:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-ink-dragon/</loc>
		<lastmod>2025-12-20T13:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzesentwurf-bnd-bekommt-lizenz-zum-hacken-und-sabotieren/</loc>
		<lastmod>2025-12-20T13:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-doj-charges-54-in-atm-jackpotting-scheme-using-ploutus-malware/</loc>
		<lastmod>2025-12-20T15:30:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-doj-charges-54-in-atm-jackpotting-scheme-using-ploutus-malware-2/</loc>
		<lastmod>2025-12-20T15:30:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-tesla-kameras-dokumentieren-straftaten-im-offentlichen-raum/</loc>
		<lastmod>2025-12-20T15:30:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-whats-in-the-dojs-epstein-files-release-and-whats-missing/</loc>
		<lastmod>2025-12-20T16:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-we-becoming-children-of-the-magentai/</loc>
		<lastmod>2025-12-20T19:30:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fedramp-audit-log-retention-rules-and-storage-options/</loc>
		<lastmod>2025-12-20T19:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devops-and-cybersecurity-building-a-new-line-of-defense-against-digital-threats/</loc>
		<lastmod>2025-12-20T19:32:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-fake-id-template-domains-operating-from-bangladesh/</loc>
		<lastmod>2025-12-20T19:33:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-too-subtle-to-notice-investigating-executable-stack-issues-in-linux-systems/</loc>
		<lastmod>2025-12-20T20:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pearos-is-a-linux-that-falls-rather-close-to-the-apple-tree/</loc>
		<lastmod>2025-12-20T21:30:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomhouse-upgrades-encryption-with-multi-layered-data-processing/</loc>
		<lastmod>2025-12-20T21:31:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bangladeshi-operator-of-fake-id-marketplaces-charged-in-international-fraud-case/</loc>
		<lastmod>2025-12-20T21:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/atm-jackpotting-ring-busted-54-indicted-by-doj/</loc>
		<lastmod>2025-12-20T22:29:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einigung-auf-digitalpakt-2-0-bitkom-begrust-durchbruch-fur-digitale-bildung-in-deutschland/</loc>
		<lastmod>2025-12-21T00:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-und-cybersicherheit-benotigen-solide-basis-beide-auf-riesige-mengen-vielfaltiger-hochwertiger-daten-angewiesen/</loc>
		<lastmod>2025-12-21T00:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-2026-ki-und-regulierungen-verandern-das-spiel/</loc>
		<lastmod>2025-12-21T05:30:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-infy-apt-resurfaces-with-new-malware-activity-after-years-of-silence/</loc>
		<lastmod>2025-12-21T06:29:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/help-i-need-money-its-an-emergency-your-childs-voicemail-that-could-be-a-scam-2/</loc>
		<lastmod>2025-12-21T07:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/help-i-need-money-its-an-emergency-your-childs-voicemail-that-could-be-a-scam/</loc>
		<lastmod>2025-12-21T07:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-tried-to-pull-the-pin-on-ntp-servers-after-blackout-caused-atomic-clock-drift/</loc>
		<lastmod>2025-12-21T08:29:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-tried-to-pull-the-pin-on-ntp-servers-after-blackout-caused-atomic-clock-drift-2/</loc>
		<lastmod>2025-12-21T08:29:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-android-botnet-kimwolf-infects-millions-strikes-with-ddos/</loc>
		<lastmod>2025-12-21T09:30:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-exploited-zero-day-in-cisco-email-security-appliances-kali-linux-2025-4-released/</loc>
		<lastmod>2025-12-21T09:31:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-unter-dem-weihnachtsbaum/</loc>
		<lastmod>2025-12-21T11:30:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovations-in-nhis-are-transforming-cybersecurity/</loc>
		<lastmod>2025-12-21T12:30:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-leverage-agentic-ai-for-cost-effective-security/</loc>
		<lastmod>2025-12-21T12:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-nhis-drive-better-data-security-practices/</loc>
		<lastmod>2025-12-21T12:33:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-essential-are-nhis-in-the-effective-management-of-cloud-security/</loc>
		<lastmod>2025-12-21T12:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-cert-in-empanelled-auditors-in-india-in-2026/</loc>
		<lastmod>2025-12-21T13:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-76/</loc>
		<lastmod>2025-12-21T14:31:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-555-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-12-21T14:33:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forrester-stuft-tricentis-als-leader-fur-autonomes-testen-ein/</loc>
		<lastmod>2025-12-21T14:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkwarden-uberall-der-lesezeichen-manager-ohne-cloud-pflicht/</loc>
		<lastmod>2025-12-21T15:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-raconteur-a-knowledgeable-insightful-and-portable-llm-powered-shell-command-explainer/</loc>
		<lastmod>2025-12-21T18:30:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-data-stolen-in-cyberattack/</loc>
		<lastmod>2025-12-21T18:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-enhance-operational-security/</loc>
		<lastmod>2025-12-21T23:30:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-non-human-identities-safe-in-cloud-environments/</loc>
		<lastmod>2025-12-21T23:30:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-nhis-handle-complex-security-requirements/</loc>
		<lastmod>2025-12-21T23:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/future-scope-of-agentic-ai-in-enhancing-enterprise-security/</loc>
		<lastmod>2025-12-21T23:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-zu-espam/</loc>
		<lastmod>2025-12-22T00:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-zu-espam-2/</loc>
		<lastmod>2025-12-22T00:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-zu-espam-3/</loc>
		<lastmod>2025-12-22T00:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenubermittlungen-nach-china-tiktok-betreiber-muss-nutzer-in-der-eu-entsprechend-informieren/</loc>
		<lastmod>2025-12-22T00:29:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-platform-comparison-best-authentication-systems-tools-for-your-business/</loc>
		<lastmod>2025-12-22T04:29:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handwritten-passwords-for-touchscreen-devices/</loc>
		<lastmod>2025-12-22T04:30:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-security-update-triggers-renewed-attention-with-mid-month-changes/</loc>
		<lastmod>2025-12-22T04:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-data-breach-exposes-hundreds-of-thousands-of-bank-customers/</loc>
		<lastmod>2025-12-22T04:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kann-europa-die-kontrolle-zuruckgewinnen/</loc>
		<lastmod>2025-12-22T04:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadows-of-the-north-unmasking-the-sprawling-cyber-infrastructure-of-the-dprk/</loc>
		<lastmod>2025-12-22T04:34:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-grus-silent-shift-how-bluedelta-hijacks-ukrainian-webmail-using-ngrok-and-mocky/</loc>
		<lastmod>2025-12-22T04:35:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waymo-suspends-service-after-power-outage-hit-san-francisco/</loc>
		<lastmod>2025-12-22T04:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminalitat-wird-im-jahr-2026-vollstandig-industrialisiert-3/</loc>
		<lastmod>2025-12-22T05:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-and-out-was-haben-unternehmen-aus-den-globalen-it-ausfallen-im-jahr-2025-gelernt/</loc>
		<lastmod>2025-12-22T05:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/podcast-die-it-tops-und-flops-2025/</loc>
		<lastmod>2025-12-22T05:32:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/theres-so-much-stolen-data-in-the-world-south-korea-will-require-face-scans-to-buy-a-sim/</loc>
		<lastmod>2025-12-22T05:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-issues-guidance-on-securing-smart-speakers/</loc>
		<lastmod>2025-12-22T05:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anubis-open-source-web-ai-firewall-to-protect-from-scraper-bots/</loc>
		<lastmod>2025-12-22T06:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/session-tokens-give-attackers-a-shortcut-around-mfa/</loc>
		<lastmod>2025-12-22T06:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erpressung-nach-smishing-bei-analytics-dienstleister-pornhub-meldet-diebstahl-von-kundendaten-hacker-drohen-mit-leak/</loc>
		<lastmod>2025-12-22T06:32:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsdiebstahl-so-prufst-du-ob-deine-daten-im-darknet-gelandet-sind/</loc>
		<lastmod>2025-12-22T06:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drei-jahre-lang-hackbar-ki-entdeckt-kritische-sicherheitslucke-in-nasa-raumfahrzeugen/</loc>
		<lastmod>2025-12-22T06:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-should-know-about-the-solarwinds-lawsuit-dismissal/</loc>
		<lastmod>2025-12-22T07:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-should-know-about-the-solarwinds-lawsuit-dismissal-2/</loc>
		<lastmod>2025-12-22T07:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-flaw-in-somalias-e-visa-system-exposes-travelers-passport-data/</loc>
		<lastmod>2025-12-22T07:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-cyber-talent-through-competition-residency-and-real-world-immersion/</loc>
		<lastmod>2025-12-22T07:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browser-agents-dont-always-respect-your-privacy-choices/</loc>
		<lastmod>2025-12-22T07:34:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-operations-merge-droppers-sms-theft-and-rat-capabilities-at-scale/</loc>
		<lastmod>2025-12-22T07:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitsprognosen-2026-zehn-schritte-fur-mehr-ki-sicherheit-und-weniger-komplexitat-im-jahr-2026/</loc>
		<lastmod>2025-12-22T07:37:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partnerschaft-zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein-2/</loc>
		<lastmod>2025-12-22T07:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partnerschaft-zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein/</loc>
		<lastmod>2025-12-22T07:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partnerschaft-zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein-3/</loc>
		<lastmod>2025-12-22T07:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-skizziert-cyberresilienz-ausblick-2026/</loc>
		<lastmod>2025-12-22T08:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-skizziert-cyberresilienz-ausblick-2026-2/</loc>
		<lastmod>2025-12-22T08:29:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-skizziert-cyberresilienz-ausblick-2026-3/</loc>
		<lastmod>2025-12-22T08:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-dome-dobrindt-plant-uberwachung-mit-gesichtserkennung/</loc>
		<lastmod>2025-12-22T08:30:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polygraph-controversy-at-cisa-sparks-internal-investigation-six-staff-placed-on-leave/</loc>
		<lastmod>2025-12-22T09:29:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-flaw-impacts-over-115000-watchguard-firewalls/</loc>
		<lastmod>2025-12-22T09:31:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-flaw-impacts-over-115000-watchguard-firewalls-2/</loc>
		<lastmod>2025-12-22T09:31:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-hardened-images-now-open-source-and-available-for-free/</loc>
		<lastmod>2025-12-22T09:33:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/termine-das-war-der-microsoft-patchday-2025/</loc>
		<lastmod>2025-12-22T09:33:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leicht-hackbar-deutschlandticket-betrug-erreicht-dreistellige-millionenhohe/</loc>
		<lastmod>2025-12-22T09:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucke-laufende-attacken-gefahrden-uber-100-000-firewalls/</loc>
		<lastmod>2025-12-22T09:35:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-hacker-admits-affiliate-role-in-nefilim-ransomware-gang/</loc>
		<lastmod>2025-12-22T10:34:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scripted-sparrow-sends-millions-of-bec-emails-each-month/</loc>
		<lastmod>2025-12-22T10:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-weite-standards-fur-nis-2-fehlen-noch-vom-versprechen-zur-realitat-was-nis-2-kann-und-woran-es-noch-fehlt/</loc>
		<lastmod>2025-12-22T10:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geld-futsch-kryptotransfer-von-50-millionen-us-dollar-geht-schief/</loc>
		<lastmod>2025-12-22T10:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-networking-is-your-secret-weapon-in-cybersecurity-job-hunting/</loc>
		<lastmod>2025-12-22T10:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-sydney-discloses-a-data-breach-impacting-27000-people/</loc>
		<lastmod>2025-12-22T10:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-makes-hardened-images-free-open-and-transparent-for-everyone/</loc>
		<lastmod>2025-12-22T10:32:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/574-arrests-3-million-recovered-in-africa-wide-cybercrime-crackdown/</loc>
		<lastmod>2025-12-22T10:33:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-multi-factor-authentication-solutions-in-2026/</loc>
		<lastmod>2025-12-22T11:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-best-passwordless-authentication-solutions-in-2026/</loc>
		<lastmod>2025-12-22T11:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-mfa-mistakes-in-manufacturing-it-and-fixes/</loc>
		<lastmod>2025-12-22T11:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dig-ai-uncensored-darknet-ai-assistant-at-the-service-of-criminals-and-terrorists-3/</loc>
		<lastmod>2025-12-22T11:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/not-all-cisa-linked-alerts-are-urgent-asus-live-update-cve-2025-59374/</loc>
		<lastmod>2025-12-22T11:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nefilim-ransomware-affiliate-pleads-guilty/</loc>
		<lastmod>2025-12-22T11:36:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-cloud-zu-vertrauen-reicht-nicht-aus-sieben-grunde-warum-unternehmen-microsoft-365-backups-brauchen/</loc>
		<lastmod>2025-12-22T11:38:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesregierung-nutzung-von-datenbrokern-ist-staatsgeheimnis/</loc>
		<lastmod>2025-12-22T11:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-microsoft-oauth-device-codes-to-hijack-enterprise-accounts/</loc>
		<lastmod>2025-12-22T12:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-microsoft-oauth-device-codes-to-hijack-enterprise-accounts-2/</loc>
		<lastmod>2025-12-22T12:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-threat-hackers-paying-company-insiders-to-bypass-security/</loc>
		<lastmod>2025-12-22T12:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-firebox-firewalls-under-attack-cve-2025-14733/</loc>
		<lastmod>2025-12-22T12:33:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-supplier-confirms-cyber-attack-operations-unaffected/</loc>
		<lastmod>2025-12-22T12:34:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/think-you-can-beat-ransomware-ransomhouse-just-made-it-a-lot-harder/</loc>
		<lastmod>2025-12-22T13:30:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-national-water-agency-hit-by-bitlocker-ransomware-attack/</loc>
		<lastmod>2025-12-22T13:32:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/around-1000-systems-compromised-in-ransomware-attack-on-romanian-water-agency/</loc>
		<lastmod>2025-12-22T13:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-popular-monitoring-tool-nezha-as-a-stealth-trojan/</loc>
		<lastmod>2025-12-22T13:33:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-an-lms-cloud-model-supports-scalable-learning/</loc>
		<lastmod>2025-12-22T13:35:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infy-returns-iran-linked-hacking-group-shows-renewed-activity/</loc>
		<lastmod>2025-12-22T13:35:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-firewall-exploits-ai-data-theft-android-hacks-apt-attacks-insider-leaks-more/</loc>
		<lastmod>2025-12-22T13:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-browse-the-web-more-sustainably-with-a-green-browser/</loc>
		<lastmod>2025-12-22T13:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-browse-the-web-more-sustainably-with-a-green-browser/</loc>
		<lastmod>2025-12-22T13:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-browse-the-web-more-sustainably-with-a-green-browser-3/</loc>
		<lastmod>2025-12-22T13:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-browse-the-web-more-sustainably-with-a-green-browser-2/</loc>
		<lastmod>2025-12-22T13:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-scattered-spider-targets-aflac-other-insurance-companies/</loc>
		<lastmod>2025-12-22T14:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-detection-software-the-complete-guide-to-protecting-your-digital-assets-in-2026/</loc>
		<lastmod>2025-12-22T14:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-ai-security-the-comprehensive-guide-to-next-generation-cybersecurity-in-2026/</loc>
		<lastmod>2025-12-22T14:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-angriffsflache-wachst-rasant-durch-ki/</loc>
		<lastmod>2025-12-22T14:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-gruppe-ink-dragon-cyberangriffe-werden-zur-infrastruktur/</loc>
		<lastmod>2025-12-22T14:34:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nissan-discloses-data-breach-linked-to-compromised-red-hat-infrastructure/</loc>
		<lastmod>2025-12-22T14:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blind-eagle-hackers-target-government-agencies-using-powershell-scripts/</loc>
		<lastmod>2025-12-22T14:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sidewinder-apt-launches-cyberattacks-on-indian-entities-posing-as-the-income-tax-department/</loc>
		<lastmod>2025-12-22T14:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-brokering-file-system-vulnerability-enables-local-privilege-escalation/</loc>
		<lastmod>2025-12-22T14:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-released-for-usefree-vulnerability-in-linux-kernel-posix-cpu-timers/</loc>
		<lastmod>2025-12-22T14:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sleeping-bouncer-vulnerability-impacts-gigabyte-msi-asrock-and-asus-motherboards/</loc>
		<lastmod>2025-12-22T14:40:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-releases-free-production-grade-hardened-container-images/</loc>
		<lastmod>2025-12-22T14:42:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arcane-werewolf-hacker-group-expands-arsenal-with-loki-2-1-malware-toolkit/</loc>
		<lastmod>2025-12-22T14:42:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dig-ai-new-darknet-ai-platform-enhancing-capabilities-of-cybercriminals/</loc>
		<lastmod>2025-12-22T14:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wonderland-android-malware-targets-otps-through-two-way-sms-hijacking/</loc>
		<lastmod>2025-12-22T14:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-inside-the-minds-of-cybercriminals-a-deep-dive-into-black-bastas-leaked-chats/</loc>
		<lastmod>2025-12-22T15:30:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-von-large-language-models/</loc>
		<lastmod>2025-12-22T15:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-phoenix-data-breach-impacts-nearly-3-5-million-individuals/</loc>
		<lastmod>2025-12-22T15:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-breach-affecting-33-7-million-users-raises-data-protection-questions/</loc>
		<lastmod>2025-12-22T15:33:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-tool-nezha-abused-for-stealthy-post-exploitation-access/</loc>
		<lastmod>2025-12-22T15:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftapi-secure-data-report-2025-mit-automatisierung-lucken-schliesen/</loc>
		<lastmod>2025-12-22T15:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nefilim-ransomware-hacker-pleads-guilty-to-computer-fraud/</loc>
		<lastmod>2025-12-22T16:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealka-stealer-fake-roblox-mods-und-cheats-plundern-krypto-wallets/</loc>
		<lastmod>2025-12-22T16:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-hacker-pleads-guilty-to-nefilim-ransomware-attacks-in-u-s/</loc>
		<lastmod>2025-12-22T16:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-fixes-firewall-zero-day-being-actively-exploited/</loc>
		<lastmod>2025-12-22T16:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/125000-watchguard-firewalls-vulnerable-to-remote-attacks/</loc>
		<lastmod>2025-12-22T16:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-steals-whatsapp-accounts-and-messages/</loc>
		<lastmod>2025-12-22T16:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-water-authority-hit-by-ransomware-attack-over-weekend/</loc>
		<lastmod>2025-12-22T16:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzentwurf-zu-vorratsdatenspeicherung-neuer-anlauf-fur-den-digitalen-zombie/</loc>
		<lastmod>2025-12-22T16:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-is-fundamentally-a-cloud-infrastructure-problem-palo-alto-networks-says/</loc>
		<lastmod>2025-12-22T17:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-continued-threat-activity-linked-to-brickstorm-malware/</loc>
		<lastmod>2025-12-22T17:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-use-ai-to-make-fake-art-seem-real/</loc>
		<lastmod>2025-12-22T17:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pirate-activists-have-copied-spotifys-entire-music-library/</loc>
		<lastmod>2025-12-22T17:33:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-rules-that-nso-cannot-continue-to-install-spyware-via-whatsapp-pending-appeal/</loc>
		<lastmod>2025-12-22T17:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conman-and-wannabe-mi6-agent-must-repay-125k-to-romance-scam-victim/</loc>
		<lastmod>2025-12-22T17:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frogblight-malware-targets-android-users-with-fake-court-and-aid-apps/</loc>
		<lastmod>2025-12-22T17:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-safety-prompts-abused-to-trigger-remote-code-execution/</loc>
		<lastmod>2025-12-22T17:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-compromise-to-control-the-ato-prevention-plan-for-2026/</loc>
		<lastmod>2025-12-22T18:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-spies-use-fake-new-year-concert-invites-to-target-russian-military/</loc>
		<lastmod>2025-12-22T18:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korea-to-require-facial-recognition-for-new-mobile-numbers/</loc>
		<lastmod>2025-12-22T18:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivists-scrape-86m-spotify-tracks-claim-their-aim-is-to-preserve-culture/</loc>
		<lastmod>2025-12-22T18:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-national-pleads-guilty-in-nefilim-ransomware-conspiracy/</loc>
		<lastmod>2025-12-22T18:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/urban-vpn-proxy-spies-on-ai-chatbot-conversations/</loc>
		<lastmod>2025-12-22T18:35:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insiders-become-prime-targets-for-cybercriminals/</loc>
		<lastmod>2025-12-22T18:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uzbek-users-under-attack-by-android-sms-stealers/</loc>
		<lastmod>2025-12-22T18:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-whatsapp-api-package-on-npm-steals-messages-contacts-and-login-tokens/</loc>
		<lastmod>2025-12-22T18:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/86-surge-in-fake-delivery-websites-hits-shoppers-during-holiday-rush/</loc>
		<lastmod>2025-12-22T18:41:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-holiday-bot-attack-trends/</loc>
		<lastmod>2025-12-22T19:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/</loc>
		<lastmod>2025-12-22T19:31:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-asus-live-update-cve-but-the-attack-is-years-old/</loc>
		<lastmod>2025-12-22T19:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-is-moving-faster-than-security-market-research-agrees/</loc>
		<lastmod>2025-12-22T20:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-year-in-review-at-cloud-security-podcast-by-google/</loc>
		<lastmod>2025-12-22T20:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-recognized-in-the-bot-and-agent-trust-management-software-landscape-q4-2025-from-forrester/</loc>
		<lastmod>2025-12-22T20:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-incident-disrupts-frances-postal-and-banking-services-ahead-of-christmas/</loc>
		<lastmod>2025-12-22T20:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leader-of-764-offshoot-pleads-guilty-faces-up-to-60-years-in-jail/</loc>
		<lastmod>2025-12-22T20:34:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-justice-department-just-released-more-epstein-files/</loc>
		<lastmod>2025-12-22T20:36:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spotify-disables-accounts-after-open-source-group-scrapes-86-million-songs-from-platform/</loc>
		<lastmod>2025-12-22T21:29:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-waters-confirms-cyberattack-critical-water-operations-unaffected/</loc>
		<lastmod>2025-12-22T21:30:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-justice-department-released-more-epstein-files-but-not-the-ones-survivors-want/</loc>
		<lastmod>2025-12-22T21:32:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macsync-malware-dropper-evades-macos-gatekeeper-checks/</loc>
		<lastmod>2025-12-22T21:33:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-mitre-announce-20-million-research-effort-on-ai-cybersecurity/</loc>
		<lastmod>2025-12-22T22:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-ai-browsers-may-always-be-vulnerable-to-prompt-injection-attacks/</loc>
		<lastmod>2025-12-22T22:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisoned-whatsapp-api-package-steals-messages-and-accounts/</loc>
		<lastmod>2025-12-22T22:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-altos-new-google-cloud-deal-boosts-ai-integration-could-save-on-cloud-costs/</loc>
		<lastmod>2025-12-22T22:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-must-go-on-offense-in-cyberspace-report-warns/</loc>
		<lastmod>2025-12-22T22:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nissan-says-thousands-of-customers-exposed-in-red-hat-breach/</loc>
		<lastmod>2025-12-22T22:35:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-zero-day-in-watchguard-firebox-devices/</loc>
		<lastmod>2025-12-22T22:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preparing-healthcare-workers-for-secure-responsible-ai-use/</loc>
		<lastmod>2025-12-22T23:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dig-ai-a-dark-web-ai-powering-cybercrime-and-extremism/</loc>
		<lastmod>2025-12-22T23:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geplante-ip-speicherung-dav-kritisiert-umbenannte-massenuberwachung/</loc>
		<lastmod>2025-12-23T00:29:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/generationenfrage-weihnachtsstimmung-smartphone-als-fluch-und-segen/</loc>
		<lastmod>2025-12-23T00:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-epsteins-suicide-video-in-the-latest-doj-release-isnt-what-it-seems/</loc>
		<lastmod>2025-12-23T00:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/model-context-protocol-mcp-vulnerability-assessment-in-a-post-quantum-setting/</loc>
		<lastmod>2025-12-23T04:30:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-redan-an-empirical-study-on-remote-dos-attacks-against-nat-networks/</loc>
		<lastmod>2025-12-23T04:31:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mend-leadership-update-building-on-our-momentum-for-the-next-phase-of-growth/</loc>
		<lastmod>2025-12-23T04:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-chessboard-alignment/</loc>
		<lastmod>2025-12-23T04:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-gadgetmeter-quantitatively-and-accurately-gauging-the-exploitability-of-speculative-gadgets/</loc>
		<lastmod>2025-12-23T04:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-aufstieg-des-chief-trust-officers-wo-passt-der-ciso-hinein/</loc>
		<lastmod>2025-12-23T04:35:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-prince-of-persia/</loc>
		<lastmod>2025-12-23T04:37:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deep-packet-inspection-fur-mehr-resilienz/</loc>
		<lastmod>2025-12-23T05:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-angriffswelle-auf-microsoft-365-konten/</loc>
		<lastmod>2025-12-23T06:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-code-looks-fine-until-the-review-starts/</loc>
		<lastmod>2025-12-23T06:30:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-is-stuck-in-slow-motion/</loc>
		<lastmod>2025-12-23T06:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-denial-ofschwachstellen-0patch-schliest-rasman-absturzlucke-vor-microsoft/</loc>
		<lastmod>2025-12-23T06:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kuaishou-cyberattack-disrupts-livestreaming-triggers-sharp-stock-decline/</loc>
		<lastmod>2025-12-23T07:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kuaishou-cyberattack-disrupts-livestreaming-triggers-sharp-stock-decline-2/</loc>
		<lastmod>2025-12-23T07:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weak-enforcement-keeps-pci-dss-compliance-low/</loc>
		<lastmod>2025-12-23T07:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-50165-doch-nicht-so-schlimm-wie-gedacht/</loc>
		<lastmod>2025-12-23T07:31:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-foreign-made-drones-and-key-parts-over-u-s-national-security-risks/</loc>
		<lastmod>2025-12-23T07:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/formal-proofs-expose-long-standing-cracks-in-dnssec/</loc>
		<lastmod>2025-12-23T07:33:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddoshire-und-kunstliche-intelligenz-in-cybercrime-plattformen-chatbots-als-steuerungsebene-fur-ddoshire-angriffe/</loc>
		<lastmod>2025-12-23T07:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-already-hinting-at-cybersecuritys-pending-identity-crisis/</loc>
		<lastmod>2025-12-23T08:31:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaw-cvss-9-9-enables-arbitrary-code-execution-across-thousands-of-instances/</loc>
		<lastmod>2025-12-23T08:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-greift-durch-fast-600-festnahmen-bei-antioperation/</loc>
		<lastmod>2025-12-23T08:33:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-treibt-betrug-in-der-weihnachtszeit-zu-neuen-hohen/</loc>
		<lastmod>2025-12-23T09:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-digiever-ds-2105-pro-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2025-12-23T09:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wichtig-zu-wissen-teams-kehrt-in-die-lizenzpakete-zuruck-windows-10-erhalt-weiter-updates/</loc>
		<lastmod>2025-12-23T09:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-api-vulnerability-scanner-in-2026/</loc>
		<lastmod>2025-12-23T10:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-year-of-keeper-security/</loc>
		<lastmod>2025-12-23T10:30:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/baker-university-says-2024-data-breach-impacts-53000-people/</loc>
		<lastmod>2025-12-23T10:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-doj-seizes-fraud-domain-behind-14-6-million-bank-account-takeover-scheme/</loc>
		<lastmod>2025-12-23T10:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-arrests-as-operation-sentinel-recovers-3m/</loc>
		<lastmod>2025-12-23T10:34:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-arrests-as-operation-sentinel-recovers-3m-2/</loc>
		<lastmod>2025-12-23T10:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alles-zum-cyber-resilience-act-teil-4-konformitat-und-konsequenzen-des-cra/</loc>
		<lastmod>2025-12-23T10:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-jeder-zugang-ein-risiko-ist-insider-bedrohungen-im-zeitalter-der-cloud/</loc>
		<lastmod>2025-12-23T10:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-uber-ki-browser-prompt-injection-problem-wahrscheinlich-nie-losbar/</loc>
		<lastmod>2025-12-23T10:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gutscheincodes-im-netz-honey-erpresste-offenbar-onlineshops-und-nutzte-kinder-aus/</loc>
		<lastmod>2025-12-23T10:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japan-adopts-new-cybersecurity-strategy-to-counter-rising-cyber-threats/</loc>
		<lastmod>2025-12-23T11:30:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-third-party-access-remains-the-weak-link-in-supply-chain-security/</loc>
		<lastmod>2025-12-23T11:32:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pirate-group-annas-archive-copies-256m-spotify-songs-in-data-scrape/</loc>
		<lastmod>2025-12-23T11:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-anz-stories-of-2025/</loc>
		<lastmod>2025-12-23T11:33:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-anz-stories-of-2025/</loc>
		<lastmod>2025-12-23T11:33:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-crypto-scammers-on-telegram-are-fueling-the-biggest-darknet-markets-ever/</loc>
		<lastmod>2025-12-23T11:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-crypto-scammers-on-telegram-are-fueling-the-biggest-darknet-markets-ever-2/</loc>
		<lastmod>2025-12-23T11:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-fines-apple-116-million-over-app-store-privacy-policy-issues-2/</loc>
		<lastmod>2025-12-23T11:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-fines-apple-116-million-over-app-store-privacy-policy-issues/</loc>
		<lastmod>2025-12-23T11:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-fines-apple-116-million-over-app-store-privacy-policy-issues-3/</loc>
		<lastmod>2025-12-23T11:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nissan-thousands-impacted-by-red-hat-breach/</loc>
		<lastmod>2025-12-23T11:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-internet-im-wurgegriff-network-blocking-wie-netzsperren-das-web-kaputtmachen/</loc>
		<lastmod>2025-12-23T11:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-bringing-cyber-resiliency-to-organizations/</loc>
		<lastmod>2025-12-23T12:30:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-api-worked-exactly-as-promised-and-stole-everything/</loc>
		<lastmod>2025-12-23T12:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-determine-if-agentic-ai-browsers-are-safe-enough-for-your-enterprise/</loc>
		<lastmod>2025-12-23T12:34:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwd-a-walkthrough-of-the-google-workspace-password-manager/</loc>
		<lastmod>2025-12-23T12:34:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-arrests-574-in-africa-ukrainian-ransomware-affiliate-pleads-guilty/</loc>
		<lastmod>2025-12-23T12:35:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forscher-warnen-kritische-n8n-lucke-betrifft-uber-17-000-deutsche-server/</loc>
		<lastmod>2025-12-23T12:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-confidently-manage-secrets-in-an-ai-driven-environment/</loc>
		<lastmod>2025-12-23T13:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-nhidr-foster-innovation-in-data-security/</loc>
		<lastmod>2025-12-23T13:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-tools-empower-secure-ai-operation-2/</loc>
		<lastmod>2025-12-23T13:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-tools-empower-secure-ai-operation/</loc>
		<lastmod>2025-12-23T13:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-cyber-attacks-impact-machine-identities-effectively/</loc>
		<lastmod>2025-12-23T13:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-firm-hit-with-us-investor-lawsuit-over-data-breach-disclosure-failures/</loc>
		<lastmod>2025-12-23T13:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bescherung-cybercrime/</loc>
		<lastmod>2025-12-23T13:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/budding-infosec-pros-and-aspiring-cyber-crooks-targeted-with-fake-poc-exploits/</loc>
		<lastmod>2025-12-23T13:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-knocks-offline-frances-postal-banking-services/</loc>
		<lastmod>2025-12-23T13:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-income-taxlure-campaign-deploying-multi-stage-malware-against-businesses/</loc>
		<lastmod>2025-12-23T13:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-exposes-103000-automation-instances-to-rce-attacks/</loc>
		<lastmod>2025-12-23T13:40:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-impersonate-korean-tv-writers-to-deliver-malware/</loc>
		<lastmod>2025-12-23T13:41:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macsync-stealer-malware-targets-macos-users-through-digitally-signed-apps/</loc>
		<lastmod>2025-12-23T13:42:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spotify-music-library-targeted-as-hacktivists-scrape-86-million-files/</loc>
		<lastmod>2025-12-23T13:43:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-vpn-chrome-extensions-steal-credentials-by-intercepting-user-traffic/</loc>
		<lastmod>2025-12-23T13:44:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-released-for-critical-n8n-rce-vulnerability/</loc>
		<lastmod>2025-12-23T13:45:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-phoenix-data-breach-impacts-over-3-5-million-individuals/</loc>
		<lastmod>2025-12-23T13:46:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-hits-56k-downloads-steals-whatsapp-messages/</loc>
		<lastmod>2025-12-23T13:47:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attack-hits-romanian-waters-authority-compromising-1000-it-systems/</loc>
		<lastmod>2025-12-23T13:48:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ransomware-trends-of-2025/</loc>
		<lastmod>2025-12-23T13:49:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-has-stopped-1800-job-applications-from-north-korean-agents/</loc>
		<lastmod>2025-12-23T14:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-outsourced-cyber-defenses-create-systemic-risks/</loc>
		<lastmod>2025-12-23T14:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hits-romanian-water-authority-1000-systems-knocked-offline/</loc>
		<lastmod>2025-12-23T14:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-targets-crypto-platforms-in-social-media-scam-crackdown/</loc>
		<lastmod>2025-12-23T14:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-extensions-in-chrome-web-store-steal-user-credentials/</loc>
		<lastmod>2025-12-23T14:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-strengthens-messaging-security-by-default-in-january/</loc>
		<lastmod>2025-12-23T14:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uzbek-users-under-attack-by-android-sms-stealers-2/</loc>
		<lastmod>2025-12-23T14:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-secure-user-portals-for-content-heavy-saas-applications/</loc>
		<lastmod>2025-12-23T15:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-acquire-exposure-management-vendor-armis-in-7-75b-all-cash-deal/</loc>
		<lastmod>2025-12-23T15:31:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-agrees-to-buy-cyber-firm-armis-for-7-75b/</loc>
		<lastmod>2025-12-23T15:33:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-uzbekistans-nationwide-license-plate-surveillance-system/</loc>
		<lastmod>2025-12-23T15:33:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metas-plane-fur-2026-weniger-personalisierte-werbung-fur-eu-nutzer-moglich/</loc>
		<lastmod>2025-12-23T15:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hochsaison-im-dezember-so-nutzen-cyberkriminelle-das-weihnachtsgeschaft-aus/</loc>
		<lastmod>2025-12-23T15:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-salesforce-risk-from-misconfigurations-to-saas-supply-chain-attacks/</loc>
		<lastmod>2025-12-23T16:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-microsofts-january-2025-patch-tuesday-addresses-157-cves-cve-2025-21333-cve-2025-21334-cve-2025-21335/</loc>
		<lastmod>2025-12-23T16:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-blue-shield-of-california-data-breach-exposes-4-7m-members-info/</loc>
		<lastmod>2025-12-23T16:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-sanitize-production-data-for-use-in-testing/</loc>
		<lastmod>2025-12-23T16:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-postal-and-banking-services-disrupted-by-suspected-ddos-attack/</loc>
		<lastmod>2025-12-23T16:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaw-could-enable-arbitrary-code-execution/</loc>
		<lastmod>2025-12-23T16:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaw-could-enable-arbitrary-code-execution-2/</loc>
		<lastmod>2025-12-23T16:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-chrome-extensions-caught-secretly-stealing-credentials-from-over-170-sites/</loc>
		<lastmod>2025-12-23T16:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clop-ransomware-group-linked-to-3-5m-university-of-phoenix-breach/</loc>
		<lastmod>2025-12-23T16:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-3-rule-how-to-silence-97-of-your-cloud-alerts-and-be-more-secure/</loc>
		<lastmod>2025-12-23T17:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-agent2agent-prompt-injection-to-runtime-self-defense-how-wallarm-redefines-agentic-ai-security/</loc>
		<lastmod>2025-12-23T17:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-buy-armis-for-7-75b/</loc>
		<lastmod>2025-12-23T17:34:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-buy-armis-for-7-75b-2/</loc>
		<lastmod>2025-12-23T17:34:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-disrupts-multimillion-dollar-bank-account-takeover-operation-targeting-americans/</loc>
		<lastmod>2025-12-23T17:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rushes-an-outband-update-for-message-queuing-bug/</loc>
		<lastmod>2025-12-23T17:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-urged-to-review-palantir-contracts-after-swiss-security-report/</loc>
		<lastmod>2025-12-23T17:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-asked-the-experts-2026-predictions/</loc>
		<lastmod>2025-12-23T17:37:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reworked-macsync-stealer-adopts-quieter-installation-process/</loc>
		<lastmod>2025-12-23T17:39:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/episode-3-bought-the-wrong-proxies-again-did-an-unboxing-anyway/</loc>
		<lastmod>2025-12-23T18:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-warns-critical-flaw-in-firebox-devices-facing-exploitation/</loc>
		<lastmod>2025-12-23T18:31:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-loses-key-employee-behind-early-ransomware-warnings/</loc>
		<lastmod>2025-12-23T18:32:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-insurance-giant-aflac-says-hackers-stole-personal-and-health-data-of-22-6-million/</loc>
		<lastmod>2025-12-23T18:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/21k-nissan-customers-data-stolen-in-red-hat-raid/</loc>
		<lastmod>2025-12-23T18:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macsync-stealer-disguised-as-trusted-mac-app-hunts-saved-passwords/</loc>
		<lastmod>2025-12-23T18:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nypd-sued-over-possible-records-collected-through-muslim-spying-program/</loc>
		<lastmod>2025-12-23T18:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-dismantles-six-ransomware-operations-detains-500-individuals/</loc>
		<lastmod>2025-12-23T18:37:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardbit-4-0-ransomware-abuses-unsecured-rdp-and-smb-for-access-persistence/</loc>
		<lastmod>2025-12-23T18:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-announces-7-75-billion-acquisition-of-cybersecurity-firm-armis/</loc>
		<lastmod>2025-12-23T19:30:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-sues-crypto-firms-for-defrauding-investors-out-of-14-million/</loc>
		<lastmod>2025-12-23T19:32:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-stole-over-2-7b-in-crypto-in-2025-data-shows/</loc>
		<lastmod>2025-12-23T19:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-phoenix-data-breach-3-5m-individuals-affected/</loc>
		<lastmod>2025-12-23T19:33:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-phoenix-data-breach-3-5m-individuals-affected-2/</loc>
		<lastmod>2025-12-23T19:33:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-phoenix-data-breach-3-5m-individuals-affected-3/</loc>
		<lastmod>2025-12-23T19:33:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-5-million-impacted-in-university-of-phoenix-data-breach/</loc>
		<lastmod>2025-12-23T19:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-fends-off-1800-suspected-dprk-it-job-scammers/</loc>
		<lastmod>2025-12-23T19:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-ways-to-move-from-security-questionnaires-to-self-serve-trust/</loc>
		<lastmod>2025-12-23T20:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-22-million-aflac-customers-impacted-by-june-data-breach/</loc>
		<lastmod>2025-12-23T20:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-insurance-giant-aflac-says-hackers-stole-personal-and-health-data-of-22-6-million-people/</loc>
		<lastmod>2025-12-23T20:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-will-forever-fight-prompt-injection-attacks/</loc>
		<lastmod>2025-12-23T20:33:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-will-reshape-health-data-breach-attack-trends/</loc>
		<lastmod>2025-12-23T20:34:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/103k-n8n-automation-instances-at-risk-from-rce-flaw/</loc>
		<lastmod>2025-12-23T20:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/</loc>
		<lastmod>2025-12-23T20:36:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprawling-operation-sentinel-neutralizes-african-cybercrime-syndicates/</loc>
		<lastmod>2025-12-23T20:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-acquire-cybersecurity-startup-armis-for-7-75b/</loc>
		<lastmod>2025-12-23T21:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-hat-gitlab-breach-exposes-data-of-21000-nissan-customers/</loc>
		<lastmod>2025-12-23T21:31:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-tax-phishing-campaign-delivers-persistent-rat-malware/</loc>
		<lastmod>2025-12-23T21:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-tax-phishing-campaign-delivers-persistent-rat-malware-2/</loc>
		<lastmod>2025-12-23T21:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-continues-to-push-back-on-hipaa-security-rule-overhaul/</loc>
		<lastmod>2025-12-23T21:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-buys-armis-for-7-75b-gets-ai-control-tower/</loc>
		<lastmod>2025-12-23T21:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-sdn-control-policy-manipulation-via-contextual-semantics-of-provenance-graphs-2/</loc>
		<lastmod>2025-12-23T22:31:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-sdn-control-policy-manipulation-via-contextual-semantics-of-provenance-graphs/</loc>
		<lastmod>2025-12-23T22:31:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-large-scale-measurement-study-of-the-proxy-protocol-and-its-security-implications/</loc>
		<lastmod>2025-12-23T22:32:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenows-amit-zavery-armis-veza-acquisitions-aim-to-strengthen-platform-cybersecurity-posture/</loc>
		<lastmod>2025-12-23T22:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/take-a-beat-on-ai-cisa-tells-ot-operators/</loc>
		<lastmod>2025-12-23T22:33:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-digital-twin-lets-trend-micro-simulate-cyberattacks/</loc>
		<lastmod>2025-12-23T22:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-proactive-ai-security-prevent-data-breaches/</loc>
		<lastmod>2025-12-23T23:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-staying-ahead-with-agentic-ai-is-crucial-for-business/</loc>
		<lastmod>2025-12-23T23:32:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-features-ensure-scalability-in-secret-management/</loc>
		<lastmod>2025-12-23T23:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-ai-system-adaptable-to-new-security-challenges/</loc>
		<lastmod>2025-12-23T23:33:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-communicate-cyber-risk-in-commercial-terms/</loc>
		<lastmod>2025-12-23T23:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-opens-7-7b-ticket-titled-buy-security-company-make-it-armis/</loc>
		<lastmod>2025-12-23T23:36:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-opens-7-7b-ticket-titled-buy-security-company-make-it-armis-2/</loc>
		<lastmod>2025-12-23T23:36:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-opens-7-7b-ticket-titled-buy-security-company-make-it-armis-3/</loc>
		<lastmod>2025-12-23T23:36:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenows-7-75b-armis-deal-expands-it-and-ot-security-reach/</loc>
		<lastmod>2025-12-23T23:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-buys-armis-for-7-75b-boosts-ai-control-tower/</loc>
		<lastmod>2025-12-23T23:37:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quishing-kaspersky-meldet-signifikante-zunahme-des-qr-code-phishings/</loc>
		<lastmod>2025-12-24T00:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quishing-kaspersky-meldet-signifikante-zunahme-des-qr-code-phishings-2/</loc>
		<lastmod>2025-12-24T00:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-kritik-an-neuauflage-der-vorratsdatenspeicherung-des-bmjv/</loc>
		<lastmod>2025-12-24T00:33:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unix-v4-tape-successfully-recovered-first-ever-version-of-unix-written-in-c-is-running-again/</loc>
		<lastmod>2025-12-24T00:33:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/formal-verification-of-mcp-security-properties-against-post-quantum-adversaries/</loc>
		<lastmod>2025-12-24T04:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saml-security-complete-guide-to-saml-request-signing-response-encryption/</loc>
		<lastmod>2025-12-24T04:32:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-global-data-residency-crisis-how-enterprises-can-navigate-geolocation-storage-and-privacy-compliance-without-sacrificing-performance/</loc>
		<lastmod>2025-12-24T04:32:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenows-7-75-billion-cash-deal-for-armis-illustrates-shifting-strategies/</loc>
		<lastmod>2025-12-24T04:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-sweep-takes-down-cybercrooks-in-19-countries/</loc>
		<lastmod>2025-12-24T04:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/casting-call/</loc>
		<lastmod>2025-12-24T04:35:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-iconcat/</loc>
		<lastmod>2025-12-24T04:37:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-36-uses-fake-whatsapp-fraud/</loc>
		<lastmod>2025-12-24T04:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-wants-to-replace-its-entire-c-and-c-codebase-perhaps-by-2030/</loc>
		<lastmod>2025-12-24T04:39:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-access-tokens-complete-guide-to-access-token-structure-usage-security/</loc>
		<lastmod>2025-12-24T05:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-wird-zu-einem-zentralen-sicherheitsproblem/</loc>
		<lastmod>2025-12-24T05:31:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-to-enterprise-data-when-genai-shows-up-everywhere/</loc>
		<lastmod>2025-12-24T05:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governance-maturity-defines-enterprise-ai-confidence/</loc>
		<lastmod>2025-12-24T06:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elementary-os-8-1-rolls-out-with-a-stronger-focus-on-system-security/</loc>
		<lastmod>2025-12-24T06:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/counterfeit-defenses-built-on-paper-have-blind-spots/</loc>
		<lastmod>2025-12-24T06:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-pcpcat-exploits-next-js-and-react-impacting-59000-servers/</loc>
		<lastmod>2025-12-24T06:33:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webrat-malware-campaign-leveraging-github-hosted-proof-of-concept-code/</loc>
		<lastmod>2025-12-24T06:34:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mongodb-flaw-leaks-sensitive-data-through-zlib-compression/</loc>
		<lastmod>2025-12-24T06:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scams-und-cybersicheres-spielzeug-insider-wunscht-frohe-feiertage-und-wachsames-shoppen/</loc>
		<lastmod>2025-12-24T06:36:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-if-your-face-could-say-dont-record-me/</loc>
		<lastmod>2025-12-24T07:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conjur-open-source-secrets-management-and-application-identity/</loc>
		<lastmod>2025-12-24T07:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-fur-generative-kunstliche-intelligenz-shift-left-als-basis-fur-secure-by-design-bei-ki/</loc>
		<lastmod>2025-12-24T07:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/implementing-nis2-without-getting-bogged-down-in-red-tape/</loc>
		<lastmod>2025-12-24T08:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-vehicle-owners-warned-as-browser-based-e-challan-phishing-gains-momentum/</loc>
		<lastmod>2025-12-24T08:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-fines-apple-euro98-6-million-over-att-rules-limiting-app-store-competition/</loc>
		<lastmod>2025-12-24T08:32:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-anbieter-investiert-in-luzern-hornetsecurity-eroffnet-rechenzentrumsstandort-in-der-schweiz/</loc>
		<lastmod>2025-12-24T08:33:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-den-jahren-im-visier-der-mittelstand-im-fokus-von-cyberangriffen/</loc>
		<lastmod>2025-12-24T08:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitation/</loc>
		<lastmod>2025-12-24T09:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-end-of-excuses-10-cybersecurity-investments-every-ciso-must-make-by-2026/</loc>
		<lastmod>2025-12-24T09:31:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-cyber-crime-stories-of-2025/</loc>
		<lastmod>2025-12-24T09:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-identity-driven-shifts-reshaping-enterprise-security-in-2026/</loc>
		<lastmod>2025-12-24T09:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-knocks-la-poste-offline-disrupting-postal-and-banking-services-across-france/</loc>
		<lastmod>2025-12-24T09:34:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-volunteer-effort-for-small-water-utilities-announces-new-mssp-effort/</loc>
		<lastmod>2025-12-24T10:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-files-charges-over-14-million-crypto-scam-using-fake-ai-themed-investment-tips/</loc>
		<lastmod>2025-12-24T10:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/la-poste-still-offline-after-major-ddos-attack/</loc>
		<lastmod>2025-12-24T10:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantensichere-strategien-kombinieren-pqc-und-qkd-so-gehen-unternehmen-schon-heute-den-weg-zu-quantensicheren-netzen/</loc>
		<lastmod>2025-12-24T10:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/la-poste-outage-after-a-cyber-attack-disrupts-digital-banking-and-online-services/</loc>
		<lastmod>2025-12-24T11:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-age-of-the-all-access-ai-agent-is-here/</loc>
		<lastmod>2025-12-24T11:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-experts-warn-of-increased-consumer-scams-this-festive-season/</loc>
		<lastmod>2025-12-24T11:32:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-mitre-partner-on-20m-ai-centers-for-manufacturing-and-cybersecurity/</loc>
		<lastmod>2025-12-24T11:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-pay-7-8bn-for-ot-security-specialist-armis/</loc>
		<lastmod>2025-12-24T11:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-detect-insider-threats-before-they-damage-your-business/</loc>
		<lastmod>2025-12-24T12:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-mobile-first-saas-needs-passwordless-authentication-for-field-teams/</loc>
		<lastmod>2025-12-24T12:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-difference-between-passkeys-and-biometrics/</loc>
		<lastmod>2025-12-24T12:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webrat-turns-github-pocs-into-a-malware-trap/</loc>
		<lastmod>2025-12-24T12:33:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurostar-accused-researchers-of-blackmail-for-reporting-ai-chatbot-flaws/</loc>
		<lastmod>2025-12-24T12:34:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-are-evolving-3-ways-to-protect-your-business-in-2026/</loc>
		<lastmod>2025-12-24T12:36:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/19-billion-passwords-leaked-essential-tips-for-your-protection/</loc>
		<lastmod>2025-12-24T13:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-anomaly-detection-for-mcp-security/</loc>
		<lastmod>2025-12-24T13:31:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/59000-servers-breached-operation-pcpcat-targets-react-and-next-js-at-internet-scale/</loc>
		<lastmod>2025-12-24T13:32:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-ukraine-pwns-russian-drone-maker-gaskar-is-paralyzed/</loc>
		<lastmod>2025-12-24T14:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-ldapnightmare-safebreach-labs-publishes-first-proofconcept-exploit-for-cve-2024-49112/</loc>
		<lastmod>2025-12-24T14:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nomani-investment-scam-surges-62-using-ai-deepfake-ads-on-social-media/</loc>
		<lastmod>2025-12-24T14:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-regulator-rules-apples-att-feature-limits-competition/</loc>
		<lastmod>2025-12-24T14:33:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-shuts-down-phisherfolks-14-6m-password-hoarding-platform/</loc>
		<lastmod>2025-12-24T15:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-protection-faces-fresh-challenges-as-bot-traffic-reaches-new-peak/</loc>
		<lastmod>2025-12-24T15:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-venture-studios-eliminate-the-early-stage-execution-gap/</loc>
		<lastmod>2025-12-24T16:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krypto-schwarzmarkt-auf-telegram-milliardenhandel-verdrangt-das-darknet/</loc>
		<lastmod>2025-12-24T16:32:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-interviews-are-risk-assessments-in-disguise/</loc>
		<lastmod>2025-12-24T16:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongodb-warns-admins-to-patch-severe-rce-flaw-immediately/</loc>
		<lastmod>2025-12-24T16:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-domain-storing-bank-credentials-stolen-from-u-s-victims/</loc>
		<lastmod>2025-12-24T16:35:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rolls-out-hardware-accelerated-bitlocker-in-windows-11/</loc>
		<lastmod>2025-12-24T16:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coordinated-scams-target-mena-region-with-fake-online-job-ads/</loc>
		<lastmod>2025-12-24T16:36:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recent-cyber-attacks-and-threat-actor-activity-a-deep-dive-into-the-evolving-threat-landscape/</loc>
		<lastmod>2025-12-24T17:31:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-world-cyber-attack-detection-how-modern-socs-identify-block-and-contain-advanced-threats/</loc>
		<lastmod>2025-12-24T17:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-federal-communications-commission-fcc-bans-foreign-made-drones-over-national-security-concerns/</loc>
		<lastmod>2025-12-24T17:33:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trust-gap-fueling-multi-billion-dollar-fraud-losses/</loc>
		<lastmod>2025-12-24T17:34:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/getting-a-tighter-grip-on-third-party-ai-risk-in-healthcare/</loc>
		<lastmod>2025-12-24T17:35:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sec-charges-crypto-firms-in-14m-investment-scam/</loc>
		<lastmod>2025-12-24T17:35:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-to-acquire-cyber-firm-armis-in-7-75-billion-deal/</loc>
		<lastmod>2025-12-24T18:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/softbank-scrambling-to-come-up-with-22-5b-in-openai-funding-before-new-year/</loc>
		<lastmod>2025-12-24T18:32:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evasive-panda-apt-malware-delivery-via-aitm-and-dns-poisoning/</loc>
		<lastmod>2025-12-24T18:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-enhances-bitlocker-with-hardware-acceleration-support/</loc>
		<lastmod>2025-12-24T18:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-isaac-vulnerabilities-enable-remote-code-execution-attacks/</loc>
		<lastmod>2025-12-24T18:36:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/israeli-organizations-targeted-by-av-themed-malicious-word-and-pdf-files/</loc>
		<lastmod>2025-12-24T18:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/m-files-vulnerability-allows-attackers-to-steal-active-user-session-tokens/</loc>
		<lastmod>2025-12-24T18:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/net-snmp-vulnerability-triggers-buffer-overflow-crashing-the-daemon/</loc>
		<lastmod>2025-12-24T18:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ntkiller-malware-advertised-on-dark-web-with-claims-of-antivirus-and-edr-bypass/</loc>
		<lastmod>2025-12-24T18:39:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macsync-macos-stealer-uses-signed-app-to-bypass-apple-gatekeeper/</loc>
		<lastmod>2025-12-24T18:41:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-satellite-imagery/</loc>
		<lastmod>2025-12-24T19:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-lamp-lightweight-approaches-for-latency-minimization-in-mixnets-with-practical-deployment-considerations/</loc>
		<lastmod>2025-12-24T19:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-phishing-red-flags-to-remember-this-holiday-season/</loc>
		<lastmod>2025-12-24T19:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-phishing-red-flags-to-remember-this-holiday-season-2/</loc>
		<lastmod>2025-12-24T19:34:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pen-testers-accused-of-blackmail-after-reporting-eurostar-chatbot-flaws/</loc>
		<lastmod>2025-12-24T19:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seized-web3adspanels-org-hosting-stolen-logins/</loc>
		<lastmod>2025-12-24T19:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-energy-dept-flags-ai-cyber-gaps-as-top-risks-for-2026/</loc>
		<lastmod>2025-12-24T19:37:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starlink-satellite-fails-polluting-orbit-with-debris-and-falling-toward-earth/</loc>
		<lastmod>2025-12-24T21:29:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-reportedly-testing-claude-like-skills-for-chatgpt/</loc>
		<lastmod>2025-12-24T23:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-mas-windows-activation-domain-used-to-spread-powershell-malware/</loc>
		<lastmod>2025-12-24T23:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-let-admins-block-external-users-via-defender-portal/</loc>
		<lastmod>2025-12-24T23:32:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohnen-im-bevolkerungsschutz-lba-setzt-pionierarbeit-des-bbk-fort/</loc>
		<lastmod>2025-12-25T00:31:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-nutzung-auswege-fur-kmu-aus-dem-dilemma-der-datensouveranitat/</loc>
		<lastmod>2025-12-25T00:32:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwort-audit-zur-verbesserung-der-cybersecurity/</loc>
		<lastmod>2025-12-25T00:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-powerful-are-new-age-ai-driven-cybersecurity-tools/</loc>
		<lastmod>2025-12-25T04:30:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-advanced-iam-solutions-reassure-companies-on-nhi-security/</loc>
		<lastmod>2025-12-25T04:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-the-high-costs-of-ai-security-tools-justified/</loc>
		<lastmod>2025-12-25T04:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synthetic-data-a-new-frontier-for-cyber-deception-and-honeypots/</loc>
		<lastmod>2025-12-25T04:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-vor-spionageangriffen-auf-smartphones/</loc>
		<lastmod>2025-12-25T05:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-generation-document-exchange-dokumente-sicher-und-rechtsgultig-versenden-telko-innovationen-inklusive-sicherem-dokumentenaustausch/</loc>
		<lastmod>2025-12-25T05:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-key-management-for-ai-model-deployments/</loc>
		<lastmod>2025-12-25T06:29:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-key-management-for-ai-model-deployments-2/</loc>
		<lastmod>2025-12-25T06:29:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-mysticeti-reaching-the-latency-limits-with-uncertified-dags/</loc>
		<lastmod>2025-12-25T07:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-spotify-metadata-dumped-online/</loc>
		<lastmod>2025-12-25T07:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-fca-outlines-uk-crypto-rules/</loc>
		<lastmod>2025-12-25T07:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reducing-cyber-privacy-risks-in-healthcare-sector-mas/</loc>
		<lastmod>2025-12-25T07:33:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cern-how-does-the-international-research-institution-manage-risk/</loc>
		<lastmod>2025-12-25T08:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-attacks-and-the-future-of-security/</loc>
		<lastmod>2025-12-25T08:32:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-active-exploitation-of-fortios-ssl-vpn-2fa-bypass-vulnerability/</loc>
		<lastmod>2025-12-25T09:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-actively-exploited-digiever-nvr-vulnerability-allowing-remote-code-execution/</loc>
		<lastmod>2025-12-25T09:31:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-mongodb-flaw-cve-2025-14847-could-lead-to-server-takeover/</loc>
		<lastmod>2025-12-25T11:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-complete-developers-guide-to-essential-hackathon-software-10-categories-that-separate-winners-from-participants/</loc>
		<lastmod>2025-12-25T13:30:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-2022-breach-led-to-years-long-cryptocurrency-thefts-trm-labs-finds/</loc>
		<lastmod>2025-12-25T13:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-2022-breach-led-to-years-long-cryptocurrency-thefts-trm-labs-finds-2/</loc>
		<lastmod>2025-12-25T13:31:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-unc6395-and-the-salesloft-drift-attack-why-salesforce-oauth-integrations-are-a-growing-risk/</loc>
		<lastmod>2025-12-25T14:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-new-akira-ransomware-decryptor-leans-on-nvidia-gpu-power/</loc>
		<lastmod>2025-12-25T15:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-will-finally-allow-you-to-change-your-gmail-com-address/</loc>
		<lastmod>2025-12-25T15:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-stealth-loaders-ai-chatbot-flaws-ai-exploits-docker-hack-and-15-more-stories/</loc>
		<lastmod>2025-12-25T15:32:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-us-wishes-for-your-merry-christmas-and-happy-new-year/</loc>
		<lastmod>2025-12-25T16:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-warnt-warum-ki-browser-wie-atlas-immer-anfallig-fur-angriffe-bleiben-konnten/</loc>
		<lastmod>2025-12-25T17:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drum-prufe-wer-deine-abos-nutzt-die-last-durch-geteilte-streaming-accounts/</loc>
		<lastmod>2025-12-25T17:31:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-stillstand-zum-risiko-wird-cyber-resilienz-von-unternehmen-im-fokus/</loc>
		<lastmod>2025-12-25T17:32:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-fortigate-security-flaw-allows-attackers-to-bypass-2fa-controls/</loc>
		<lastmod>2025-12-25T18:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-flaw-in-mongodb-could-allow-memory-leakage/</loc>
		<lastmod>2025-12-26T22:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanias-water-authority-targeted-in-ransomware-attack/</loc>
		<lastmod>2025-12-26T22:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-group-claims-theft-of-over-1tb-of-chrysler-data/</loc>
		<lastmod>2025-12-26T23:06:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gaming-mit-risiko-kostenfallen-fur-kinder/</loc>
		<lastmod>2025-12-27T00:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-vergabe-wird-standard-zwei-drittel-vereinbaren-arzttermine-online/</loc>
		<lastmod>2025-12-27T00:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/friday-squid-blogging-squid-camouflage/</loc>
		<lastmod>2025-12-27T05:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-012-the-architect-of-the-internet-on-the-future-of-trust/</loc>
		<lastmod>2025-12-27T05:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evilgpt-quantenrisiken-fehlinformationen-und-cloud-abhangigkeit-diese-cybergefahren-drohen-2026/</loc>
		<lastmod>2025-12-27T05:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-cloud-compliance-make-tech-leaders-feel-more-relaxed/</loc>
		<lastmod>2025-12-27T06:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stay-ahead-in-managing-nhis-effectively/</loc>
		<lastmod>2025-12-27T06:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-secrets-security-fit-within-a-tight-it-budget/</loc>
		<lastmod>2025-12-27T06:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-ai-system-smart-in-managing-secrets/</loc>
		<lastmod>2025-12-27T06:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sa-2025-zwischen-ki-disruption-und-dem-gebot-der-cyberresilienz/</loc>
		<lastmod>2025-12-27T07:06:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerothreat-review-the-next-gen-automated-pentesting-s-dast-platform/</loc>
		<lastmod>2025-12-27T07:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mongodb-flaw-lets-unauthenticated-attackers-read-uninitialized-memory/</loc>
		<lastmod>2025-12-27T09:06:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-package-with-56000-downloads-compromises-whatsapp-accounts/</loc>
		<lastmod>2025-12-27T11:06:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-must-stop-underestimating-drone-warfare/</loc>
		<lastmod>2025-12-27T11:07:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-chatgpt-ads-will-allegedly-prioritize-sponsored-content-in-answers/</loc>
		<lastmod>2025-12-27T11:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-chatgpt-ads-will-allegedly-prioritize-sponsored-content-in-answers-2/</loc>
		<lastmod>2025-12-27T11:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mas-malware-durch-rechtschreibfehler-bei-windows-hack/</loc>
		<lastmod>2025-12-27T12:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databroker-files-adtech-enttarnt-bnd-bundeswehr-und-spezialeinheiten/</loc>
		<lastmod>2025-12-27T14:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-verified-identity-data-means-for-apis-and-how-to-evaluate-a-data-partner/</loc>
		<lastmod>2025-12-27T15:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-biggest-cyber-attacks-of-2025/</loc>
		<lastmod>2025-12-27T16:06:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dunner-als-iphone-air-youtuber-leakt-bilder-des-faltbaren-iphones-trotz-apple-klage/</loc>
		<lastmod>2025-12-27T17:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-rekord-so-viel-geld-erbeuteten-krypto-hacker-2025/</loc>
		<lastmod>2025-12-27T17:07:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-counterseveillance-performance-counter-attacks-on-amd-sev-snp/</loc>
		<lastmod>2025-12-27T19:06:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-the-team-that-investigates-when-journalists-and-activists-get-hacked-with-government-spyware/</loc>
		<lastmod>2025-12-27T19:07:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-leaks-2-3m-wired-com-records-claims-40m-user-conda-nast-breach/</loc>
		<lastmod>2025-12-27T19:08:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-compromise-trust-wallet-chrome-extension-users-claim-millions-stolen/</loc>
		<lastmod>2025-12-27T19:09:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure/</loc>
		<lastmod>2025-12-27T20:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-does-a-free-to-implement-ai-compliance-strategy-look-like/</loc>
		<lastmod>2025-12-28T00:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-current-pam-solutions-capable-of-handling-nhis/</loc>
		<lastmod>2025-12-28T00:07:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-impenetrable-are-secrets-vaulting-solutions/</loc>
		<lastmod>2025-12-28T00:07:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-betrug-datenklau-fake-shops-nur-14-prozent-der-deutschen-machen-sich-keine-sorgen-beim-online-shopping/</loc>
		<lastmod>2025-12-28T05:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-steht-im-zeichen-des-identity-hackings/</loc>
		<lastmod>2025-12-28T06:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-rainbow-six-siege-breach-gives-players-billions-of-credits/</loc>
		<lastmod>2025-12-28T06:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/av1-die-nachste-generation-der-videokodierung-fur-die-videobasierte-sicherheit-modern-lizenzfrei-und-quelloffen/</loc>
		<lastmod>2025-12-28T07:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-watchguard-firebox-firewalls-attacked-infosec-enthusiasts-targeted-with-fake-pocs/</loc>
		<lastmod>2025-12-28T10:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-risk-is-fragmented-strategy-suffers/</loc>
		<lastmod>2025-12-28T11:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-556-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2025-12-28T11:06:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-network-erwartet-weitere-zunahme-von-angriffen-ohne-malware/</loc>
		<lastmod>2025-12-28T11:07:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-in-arztemails-immer-noch-besser-als-fax/</loc>
		<lastmod>2025-12-28T11:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-77/</loc>
		<lastmod>2025-12-28T13:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubisoft-rainbow-six-siege-server-wegen-hack-heruntergefahren/</loc>
		<lastmod>2025-12-28T13:08:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stolen-lastpass-backups-enable-crypto-theft-through-2025/</loc>
		<lastmod>2025-12-28T14:05:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-26-security-predictions-for-2026-part-2/</loc>
		<lastmod>2025-12-28T15:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/death-torture-and-amputation-how-cybercrime-shook-the-world-in-2025/</loc>
		<lastmod>2025-12-28T15:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/death-torture-and-amputation-how-cybercrime-shook-the-world-in-2025-2/</loc>
		<lastmod>2025-12-28T15:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mullvad-ersetzt-wireguard-go-durch-gotatun/</loc>
		<lastmod>2025-12-28T17:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsforscher-roboter-ein-wort-genugt-zur-ubernahme/</loc>
		<lastmod>2025-12-28T17:07:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-to-leak-wired-database-with-2-3-million-records/</loc>
		<lastmod>2025-12-28T19:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conda-nast-faces-major-data-breach-2-3m-wired-records-leaked-40m-more-at-risk/</loc>
		<lastmod>2025-12-28T21:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploited-mongobleed-flaw-leaks-mongodb-secrets-87k-servers-exposed/</loc>
		<lastmod>2025-12-28T21:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-automated-data-protection-for-embedded-systems-via-data-flow-based-compartmentalization/</loc>
		<lastmod>2025-12-28T22:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-the-security-for-non-human-identities-getting-better/</loc>
		<lastmod>2025-12-29T00:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-support-is-available-for-implementing-agentic-ai-systems/</loc>
		<lastmod>2025-12-29T00:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-cloud-security-assure-full-data-protection/</loc>
		<lastmod>2025-12-29T00:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-businesses-trust-ai-to-handle-sensitive-data/</loc>
		<lastmod>2025-12-29T00:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-auth-tokens-complete-guide-to-token-based-authentication-implementation/</loc>
		<lastmod>2025-12-29T05:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitstrends-2026-welche-angriffe-ohne-malware-zunehmen-2/</loc>
		<lastmod>2025-12-29T05:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitstrends-2026-welche-angriffe-ohne-malware-zunehmen/</loc>
		<lastmod>2025-12-29T05:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-datensicherung-zur-strategischen-kernkompetenz-wird-die-neue-relevanz-von-backup/</loc>
		<lastmod>2025-12-29T05:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tipps-fur-cisos-die-die-branche-wechseln-wollen/</loc>
		<lastmod>2025-12-29T05:11:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sauron-the-high-end-home-security-startup-for-super-premium/</loc>
		<lastmod>2025-12-29T05:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accused-data-thief-threw-macbook-into-a-river-to-destroy-evidence/</loc>
		<lastmod>2025-12-29T05:13:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/middle-east-tech-trends-2026-ai-cyber-security-and-sovereign-infrastructure-take-centre-stage/</loc>
		<lastmod>2025-12-29T06:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automation-forces-a-reset-in-security-strategy/</loc>
		<lastmod>2025-12-29T06:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-are-managing-risk-in-survival-mode/</loc>
		<lastmod>2025-12-29T06:08:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivist-proxies-and-the-normalization-of-cyber-pressure-campaigns/</loc>
		<lastmod>2025-12-29T06:09:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongobleed-detector-launched-to-identify-critical-mongodb-flaw-cve-2025-14847/</loc>
		<lastmod>2025-12-29T06:11:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welche-compliance-risiken-beschert-ki-deutschen-unternehmen-vom-regelhuter-zum-risikonavigator/</loc>
		<lastmod>2025-12-29T07:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/superagent-open-source-framework-for-guardrails-around-agentic-ai/</loc>
		<lastmod>2025-12-29T07:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-chaos-engineering-matters-when-nothing-is-broken/</loc>
		<lastmod>2025-12-29T07:08:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktive-angriffe-auf-fortigate-nutzen-schwachstellen-in-forticloud-sso-angriff-auf-fortigate-firewalls-uber-manipulierte-saml-sso-anmeldungen/</loc>
		<lastmod>2025-12-29T07:09:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-real-world-ai-security-threats-revealed-in-2025/</loc>
		<lastmod>2025-12-29T08:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evasive-panda-andert-das-dns-statt-updates-ladt-man-malware/</loc>
		<lastmod>2025-12-29T08:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-are-automating-the-human-part-of-romance-scams/</loc>
		<lastmod>2025-12-29T08:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fragmentierte-tool-landschaften-werden-zum-sicherheitsrisiko-allone-plattformen-reduzieren-angriffsflache-und-zombie-accounts/</loc>
		<lastmod>2025-12-29T08:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/traditional-security-frameworks-leave-organizations-exposed-to-ai-specific-attack-vectors/</loc>
		<lastmod>2025-12-29T09:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurocloud-pulse-check-2025-digitale-widerstandsfahigkeit-made-in-europe/</loc>
		<lastmod>2025-12-29T09:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongodb-vulnerability-cve-2025-14847-under-active-exploitation-worldwide/</loc>
		<lastmod>2025-12-29T09:09:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-predictions-hits-misses-what-we-learned/</loc>
		<lastmod>2025-12-29T10:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evasive-panda-cyberespionage-campaign-uses-dns-poisoning-to-install-mgbot-backdoor/</loc>
		<lastmod>2025-12-29T10:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-starkt-mit-tromzo-ubernahme-seine-ki-kompetenzen/</loc>
		<lastmod>2025-12-29T10:07:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-threat-detection-for-post-quantum-ai-inference-environments/</loc>
		<lastmod>2025-12-29T11:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youve-been-targeted-by-government-spyware-now-what/</loc>
		<lastmod>2025-12-29T11:07:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youve-been-targeted-by-government-spyware-now-what-2/</loc>
		<lastmod>2025-12-29T11:07:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-most-dangerous-people-on-the-internet-in-2025/</loc>
		<lastmod>2025-12-29T11:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials/</loc>
		<lastmod>2025-12-29T11:09:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-angriffe-bedrohen-versorgung-und-compliance-der-pharmaindustrie-so-sichern-pharmaunternehmen-ihre-ot-vor-ransomware-und-spionage/</loc>
		<lastmod>2025-12-29T11:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-angriffe-bedrohen-versorgung-und-compliance-der-pharmaindustrie-so-sichern-pharmaunternehmen-ihre-ot-vor-ransomware-und-spionage-2/</loc>
		<lastmod>2025-12-29T11:11:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wired-abonnentendatenbank-geleakt/</loc>
		<lastmod>2025-12-29T11:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wired-abonnentendatenbank-geleakt/</loc>
		<lastmod>2025-12-29T11:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-anatomy-of-a-max-severity-flaw-that-sent-shockwaves-through-the-web/</loc>
		<lastmod>2025-12-29T12:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-5-year-old-fortios-2fa-bypass-still-exploited-in-attacks/</loc>
		<lastmod>2025-12-29T12:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rechenzentren-unter-druck-resilienz-fur-kritische-infrastrukturen-wie-energieversorger-und-datacenter/</loc>
		<lastmod>2025-12-29T12:09:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-surveillance-state-is-you/</loc>
		<lastmod>2025-12-29T12:09:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-passwordless-authentication-matters-for-external-vendor-and-partner-access/</loc>
		<lastmod>2025-12-29T13:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-facial-recognition-considered-a-passkey-2/</loc>
		<lastmod>2025-12-29T13:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-facial-recognition-considered-a-passkey/</loc>
		<lastmod>2025-12-29T13:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-facial-recognition-considered-a-passkey-3/</loc>
		<lastmod>2025-12-29T13:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-facial-recognition-considered-a-passkey-4/</loc>
		<lastmod>2025-12-29T13:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-0day-flaw-exposes-70k-xspeeder-devices-as-vendor-ignores-alert/</loc>
		<lastmod>2025-12-29T13:09:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-worst-hacks-of-2025/</loc>
		<lastmod>2025-12-29T13:09:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-is-rolling-out-gpt-5-2-as-smart-plus-mode/</loc>
		<lastmod>2025-12-29T13:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-is-rolling-out-gpt-5-2-as-smart-plus-mode-2/</loc>
		<lastmod>2025-12-29T13:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-2026-was-firmen-aus-den-cyberattacken-2025-lernen-sollten/</loc>
		<lastmod>2025-12-29T13:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-one-vulnerability-breaks-the-internet-and-millions-of-devices-join-in/</loc>
		<lastmod>2025-12-29T14:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-recovers-smashed-laptop-that-alleged-data-leaker-threw-into-river/</loc>
		<lastmod>2025-12-29T14:08:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-air-data-breach-exposes-data-of-thousands-of-employees/</loc>
		<lastmod>2025-12-29T14:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-should-we-pay-these-criminals-the-hidden-world-of-ransomware-negotiations/</loc>
		<lastmod>2025-12-29T14:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufrusten-oder-neu-kaufen-10-support-ende-viele-nutzer-vor-gerate-neukauf/</loc>
		<lastmod>2025-12-29T14:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufrusten-oder-neu-kaufen-10-support-ende-viele-nutzer-vor-gerate-neukauf/</loc>
		<lastmod>2025-12-29T14:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufrusten-oder-neu-kaufen-10-support-ende-viele-nutzer-vor-gerate-neukauf/</loc>
		<lastmod>2025-12-29T14:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesregierung-behordendomains-als-geheimsache-und-schadcodeverteiler/</loc>
		<lastmod>2025-12-29T14:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-how-secure-are-your-machine-identities-in-the-cloud/</loc>
		<lastmod>2025-12-30T16:21:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-prompt-injection-may-never-be-solved-for-browser-agents-like-atlas/</loc>
		<lastmod>2025-12-30T16:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeymyte-aka-mustang-panda-deploys-toneshell-backdoor-in-new-attacks/</loc>
		<lastmod>2025-12-30T16:23:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeymyte-aka-mustang-panda-deploys-toneshell-backdoor-in-new-attacks-2/</loc>
		<lastmod>2025-12-30T16:23:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mustang-panda-deploys-toneshell-via-signed-kernel-mode-rootkit-driver/</loc>
		<lastmod>2025-12-30T16:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/75000-mongodbs-exposed-as-attackers-exploit-mongobleed/</loc>
		<lastmod>2025-12-30T16:24:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybersecurity-experts-plead-guilty-to-blackcat-ransomware-attacks/</loc>
		<lastmod>2025-12-30T16:25:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-tech-deployments-that-cyber-insurers-recommend-for-2026/</loc>
		<lastmod>2025-12-30T16:26:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sumsub-identity-fraud-report-2025-2026-deepfake-angriffe-steigen-in-deutschland-um-uber-50-prozent/</loc>
		<lastmod>2025-12-30T16:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elektronische-patientenakte-scheitern-mit-jahrelanger-ansage/</loc>
		<lastmod>2025-12-30T16:28:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-the-year-we-stopped-building-features-and-started-building-outcomes/</loc>
		<lastmod>2025-12-30T17:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-5m-malicious-requests-hit-adobe-coldfusion-and-others-in-holiday-attack/</loc>
		<lastmod>2025-12-30T17:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-space-agency-confirms-breach-of-external-servers/</loc>
		<lastmod>2025-12-30T17:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-stealer-browser-extensions-harvest-corporate-meeting-intelligence/</loc>
		<lastmod>2025-12-30T17:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/symantec-carbon-black-unite-under-broadcom/</loc>
		<lastmod>2025-12-30T17:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copilot-studio-feature-enables-silent-ai-backdoors/</loc>
		<lastmod>2025-12-30T18:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magecart-campaign-deploys-50-malicious-scripts-to-hijack-e-commerce-transactions/</loc>
		<lastmod>2025-12-30T18:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-promote-void-av-killer-claiming-kernel-level-defense-evasion/</loc>
		<lastmod>2025-12-30T18:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eset-flags-rising-threat-of-ai-driven-malware-and-ransomware/</loc>
		<lastmod>2025-12-30T18:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-spear-phishing-attack-targeting-security-individuals-in-the-israel-region/</loc>
		<lastmod>2025-12-30T18:10:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-smartermail-flaw-allows-attackers-to-execute-remote-code/</loc>
		<lastmod>2025-12-30T18:12:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-smartermail-flaw-allows-attackers-to-execute-remote-code-2/</loc>
		<lastmod>2025-12-30T18:12:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-ibm-api-connect-flaw-allows-attackers-to-bypass-authentication/</loc>
		<lastmod>2025-12-30T18:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-impersonated-jackson-json-library-to-infiltrate-maven-central/</loc>
		<lastmod>2025-12-30T18:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-active-exploitation-of-mongodb-vulnerability-cve-2025-14847/</loc>
		<lastmod>2025-12-30T18:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-copilot-studios-new-connected-agents-feature-to-plant-backdoors/</loc>
		<lastmod>2025-12-30T18:15:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-deploy-rootkit-to-stealthily-mask-toneshell-malware/</loc>
		<lastmod>2025-12-30T18:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/csa-issues-alert-on-critical-smartermail-bug-allowing-remote-code-execution/</loc>
		<lastmod>2025-12-30T18:18:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/csa-issues-alert-on-critical-smartermail-bug-allowing-remote-code-execution-2/</loc>
		<lastmod>2025-12-30T18:18:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-distributed-function-secret-sharing-and-applications/</loc>
		<lastmod>2025-12-30T18:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-responders-plead-guilty-to-using-alphv-in-attacks-on-us-organizations/</loc>
		<lastmod>2025-12-30T18:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-team-brainstorming-with-gpts-accelerates-threat-modeling/</loc>
		<lastmod>2025-12-30T18:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widely-used-malicious-extensions-steal-chatgpt-deepseek-conversations/</loc>
		<lastmod>2025-12-30T19:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widely-used-malicious-extensions-steal-chatgpt-deepseek-conversations-2/</loc>
		<lastmod>2025-12-30T19:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-cyber-pros-admit-to-being-blackcat-ransomware-affiliates/</loc>
		<lastmod>2025-12-30T19:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-vulnerabilities-what-they-are-and-how-to-respond/</loc>
		<lastmod>2025-12-30T20:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-early-end-to-the-holidays-heartbleed-of-mongodb-is-now-under-active-exploit/</loc>
		<lastmod>2025-12-30T20:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluetooth-headphones-can-be-weaponized-to-hack-phones/</loc>
		<lastmod>2025-12-30T20:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-app-store-source-map-leak-a-preventable-vulnerability-we-found-in-70-of-organizations-2/</loc>
		<lastmod>2025-12-30T21:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-app-store-source-map-leak-a-preventable-vulnerability-we-found-in-70-of-organizations/</loc>
		<lastmod>2025-12-30T21:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-allies-with-google-to-secure-ai/</loc>
		<lastmod>2025-12-30T21:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-removes-sanctions-for-three-executives-tied-to-spyware-maker-intellexa/</loc>
		<lastmod>2025-12-30T21:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudsters-stick-to-what-works-even-in-the-age-of-ai/</loc>
		<lastmod>2025-12-30T21:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-pqconnect-automated-post-quantum-end-to-end-tunnels/</loc>
		<lastmod>2025-12-30T22:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudulent-email-domain-tracker-december-2025/</loc>
		<lastmod>2025-12-30T22:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-announces-1-17b-compensation-plan-for-33-7m-data-breach-victims/</loc>
		<lastmod>2025-12-30T22:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-jobs-whats-actually-sticking/</loc>
		<lastmod>2025-12-30T22:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emeditor-website-breach-turns-trusted-installer-into-infostealer-malware/</loc>
		<lastmod>2025-12-30T22:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ghostpairing-technique-enables-undetected-whatsapp-access/</loc>
		<lastmod>2025-12-30T22:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-errtraffic-service-enables-clickfix-attacks-via-fake-browser-glitches/</loc>
		<lastmod>2025-12-30T22:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovations-are-driving-secure-nhi-management/</loc>
		<lastmod>2025-12-31T00:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-powerful-are-current-ai-solutions-in-detecting-nhidr/</loc>
		<lastmod>2025-12-31T00:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-nhis-safe-from-unauthorized-access-in-cloud-environments/</loc>
		<lastmod>2025-12-31T00:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-decision-making-help-companies-stay-ahead-of-threats/</loc>
		<lastmod>2025-12-31T00:06:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weiterhin-geduld-erforderlich-ein-behordenbesuch-dauert-im-schnitt-gut-zwei-stunden/</loc>
		<lastmod>2025-12-31T00:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-credential-stuffing-attacks-detection-protection-strategies/</loc>
		<lastmod>2025-12-31T01:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-einsatz-bei-behorden-datenschutz-sollte-von-anfang-an-mitgedacht-werden/</loc>
		<lastmod>2025-12-31T01:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-yorks-incoming-mayor-bans-raspberry-pi-at-his-inauguration-party/</loc>
		<lastmod>2025-12-31T01:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-60-of-firewalls-fail-high-severity-checks-and-how-nspm-fixes-it/</loc>
		<lastmod>2025-12-31T05:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-reisebranche-muss-in-resilienz-investieren-und-sie-priorisieren/</loc>
		<lastmod>2025-12-31T05:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/daran-scheitert-passwordless/</loc>
		<lastmod>2025-12-31T05:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-inc-wenn-hacker-besser-organsiert-sind-als-die-it/</loc>
		<lastmod>2025-12-31T05:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-geht-post-incident-review/</loc>
		<lastmod>2025-12-31T05:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-pros-admit-to-moonlighting-as-ransomware-scum/</loc>
		<lastmod>2025-12-31T05:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imagine-theres-no-ai-its-easy-if-you-try/</loc>
		<lastmod>2025-12-31T05:08:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongobleed-cve-2025-14847-mongodb-memory-leak-flaw/</loc>
		<lastmod>2025-12-31T06:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hong-kongs-newest-anti-scam-technology-is-over-the-counter-banking/</loc>
		<lastmod>2025-12-31T06:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-coverage-is-falling-behind-the-way-attackers-behave/</loc>
		<lastmod>2025-12-31T06:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomwares-new-playbook-is-chaos/</loc>
		<lastmod>2025-12-31T06:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-enhanced-crypter-promoted-as-capable-of-evading-windows-defender/</loc>
		<lastmod>2025-12-31T06:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-open-source-c2-framework-adaptixc2-debuts-with-improved-stability-and-speed/</loc>
		<lastmod>2025-12-31T06:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-consumers-expect-from-data-security/</loc>
		<lastmod>2025-12-31T07:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risk-based-user-sign-in-protection-strategies/</loc>
		<lastmod>2025-12-31T07:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illegal-streaming-grew-into-an-organized-profitable-and-dangerous-industry/</loc>
		<lastmod>2025-12-31T07:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-treasury-lifts-sanctions-on-three-individuals-linked-to-intellexa-and-predator-spyware/</loc>
		<lastmod>2025-12-31T07:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/start-in-die-ara-des-agentic-soc-vom-analysten-zum-kommandanten/</loc>
		<lastmod>2025-12-31T07:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-november-2025/</loc>
		<lastmod>2025-12-31T08:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pqc-hardened-model-context-protocol-transport-layer-security/</loc>
		<lastmod>2025-12-31T08:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mikrosegmentierung-und-zero-trust-2026-identitaten-werden-zum-perimeter-und-segmentierung-wird-pflicht/</loc>
		<lastmod>2025-12-31T08:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/equifax-europe-ciso-notorious-breach-spurred-cybersecurity-transformation/</loc>
		<lastmod>2025-12-31T08:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/duplicati-free-open-source-backup-client/</loc>
		<lastmod>2025-12-31T08:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-csa-warns-of-critical-smartermail-flaw-enabling-unauthenticated-remote-code-execution/</loc>
		<lastmod>2025-12-31T08:08:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongobleed-cve-2025-14847-the-us-china-and-the-eu-are-among-the-top-exploited-geos/</loc>
		<lastmod>2025-12-31T10:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-review-channel-stories-of-the-year/</loc>
		<lastmod>2025-12-31T11:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-surveillance-journalism-and-encryption-stories-of-2025/</loc>
		<lastmod>2025-12-31T11:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discovering-the-dimensions-of-a-new-cold-war/</loc>
		<lastmod>2025-12-31T11:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-police-technology-stories-of-2025/</loc>
		<lastmod>2025-12-31T11:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disney-will-pay-10-million-to-settle-childrens-data-privacy-lawsuit/</loc>
		<lastmod>2025-12-31T11:08:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/</loc>
		<lastmod>2025-12-31T11:09:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governance-und-technik-sichern-ki-generierten-code-ki-coding-tools-steigern-produktivitat-und-das-risiko-gleichermasen/</loc>
		<lastmod>2025-12-31T11:09:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-helps-recover-both-technical-dept-innovation-debt/</loc>
		<lastmod>2025-12-31T12:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30000-korean-air-employee-records-stolen-as-cl0p-leaks-data-online/</loc>
		<lastmod>2025-12-31T12:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fears-mount-that-us-federal-cybersecurity-is-stagnating-or-worse/</loc>
		<lastmod>2025-12-31T12:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-vishing/</loc>
		<lastmod>2025-12-31T13:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-ai-bubble-pops-nvidia-becomes-the-most-important-software-company-overnight/</loc>
		<lastmod>2025-12-31T13:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-predictions-2026-an-ai-arms-race-and-malware-autonomy/</loc>
		<lastmod>2025-12-31T13:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-data-breaches-of-december-2025/</loc>
		<lastmod>2025-12-31T14:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-visibility-alone-fails-and-context-wins-in-2026/</loc>
		<lastmod>2025-12-31T14:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chains-ai-and-the-cloud-the-biggest-failures-and-one-success-of-2025/</loc>
		<lastmod>2025-12-31T14:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-us-cybersecurity-experts-guilty-of-extortion-scheme-for-alphv-ransomware/</loc>
		<lastmod>2025-12-31T14:06:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-notgreat-firewall-china-blocks-the-web-for-74-min/</loc>
		<lastmod>2025-12-31T15:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finland-seizes-ship-suspected-of-damaging-subsea-cable-in-baltic-sea/</loc>
		<lastmod>2025-12-31T15:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammer-in-singapur-erhalten-stockschlage-harte-abschreckung-gegen-online-betrug/</loc>
		<lastmod>2025-12-31T15:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-cloud-rains-on-everyones-iot-parade/</loc>
		<lastmod>2025-12-31T15:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-2026-four-predictions-and-recommendations/</loc>
		<lastmod>2025-12-31T15:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-reading-opens-state-of-application-security-survey/</loc>
		<lastmod>2025-12-31T15:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrarians-no-more-ai-skepticism-is-on-the-rise/</loc>
		<lastmod>2025-12-31T15:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-warns-of-critical-api-connect-bug-allowing-remote-authentication-bypass/</loc>
		<lastmod>2025-12-31T15:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-warns-of-critical-api-connect-bug-allowing-remote-authentication-bypass-2/</loc>
		<lastmod>2025-12-31T15:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-spot-modified-shai-hulud-worm-testing-payload-on-npm-registry/</loc>
		<lastmod>2025-12-31T15:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminalitat-security-profis-gestehen-alphv-angriffe/</loc>
		<lastmod>2025-12-31T15:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-news-alert-squarex-research-finds-browser-ai-agents-are-proving-riskier-than-human-employees/</loc>
		<lastmod>2025-12-31T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-csa-warns-of-maximun-severity-smartermail-rce-flaw/</loc>
		<lastmod>2025-12-31T16:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-kevin-bacon-can-teach-you-about-cybersecurity-careers/</loc>
		<lastmod>2025-12-31T16:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-exploits-react2shell-flaw-to-breach-next-js-servers/</loc>
		<lastmod>2025-12-31T16:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-leaks-1tb-of-stolen-asus-data/</loc>
		<lastmod>2025-12-31T17:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-banks-issue-breach-notifications-over-supplier-breach/</loc>
		<lastmod>2025-12-31T17:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkspectre-browser-extension-campaigns-exposed-after-impacting-8-8-million-users-worldwide/</loc>
		<lastmod>2025-12-31T17:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-drain-3-9m-from-unleash-protocol-after-multisig-hijack/</loc>
		<lastmod>2025-12-31T17:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-betrugern-bei-phishing-angriffen-hilft-und-wie-du-dich-davor-schutzt/</loc>
		<lastmod>2025-12-31T17:06:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsexperte-ki-coding-assistenten-lassen-sich-leicht-kapern-und-du-kannst-wenig-dagegen-tun/</loc>
		<lastmod>2025-12-31T17:07:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shared-intel-qa-why-data-bill-of-materials-dbom-is-surfacing-as-a-crucial-tool-to-secure-ai/</loc>
		<lastmod>2025-12-31T18:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-space-agency-hit-again-as-cybercrims-claim-200-gb-data-up-for-sale/</loc>
		<lastmod>2025-12-31T18:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/esa-disclosed-a-data-breach-hackers-breached-external-servers/</loc>
		<lastmod>2025-12-31T18:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-cybersecurity-trends-to-watch-in-2026/</loc>
		<lastmod>2025-12-31T18:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-patches-critical-api-connect-bug-enabling-authentication-bypass/</loc>
		<lastmod>2025-12-31T18:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-turns-vs-code-extensions-into-an-attack-vector-against-macos/</loc>
		<lastmod>2025-12-31T18:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cybercrime-tool-errtraffic-enables-automated-clickfix-attacks/</loc>
		<lastmod>2025-12-31T18:08:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neurosploit-v2-launches-as-ai-powered-penetration-testing-framework/</loc>
		<lastmod>2025-12-31T18:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkspectre-malware-campaign-hits-chrome-edge-and-firefox-users/</loc>
		<lastmod>2025-12-31T18:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-manipulation-of-llms-for-scalable-vulnerability-exploitation/</loc>
		<lastmod>2025-12-31T18:12:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-u-s-cybersecurity-professionals-plead-guilty-to-acting-as-alphv-blackcat-affiliates/</loc>
		<lastmod>2025-12-31T18:13:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-apache-streampipes-flaw-allows-attackers-to-take-over-admin-accounts/</loc>
		<lastmod>2025-12-31T18:15:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-targets-indian-government-systems-using-malicious-windows-lnk-files/</loc>
		<lastmod>2025-12-31T18:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-wallet-chrome-extension-hack-drains-8-5m-via-shai-hulud-supply-chain-attack/</loc>
		<lastmod>2025-12-31T18:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-city-burgermeister-amtseinfuhrung-mit-raspberry-pi-verbot/</loc>
		<lastmod>2025-12-31T18:17:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sunken-ships-will-orgs-learn-from-ivanti-epmm-attacks/</loc>
		<lastmod>2025-12-31T19:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-jackson-lookalike-library-slips-into-maven-central/</loc>
		<lastmod>2025-12-31T19:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-2026-four-predictions-recommendations/</loc>
		<lastmod>2025-12-31T19:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mentorship-diversity-shaping-the-next-generation-of-cyber-experts-2/</loc>
		<lastmod>2025-12-31T19:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mentorship-diversity-shaping-the-next-generation-of-cyber-experts/</loc>
		<lastmod>2025-12-31T19:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnish-police-investigating-new-undersea-cable-incident/</loc>
		<lastmod>2025-12-31T20:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-streampipes-flaw-lets-anyone-become-admin/</loc>
		<lastmod>2025-12-31T20:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-makes-teams-secure-by-default-starting-january-2026/</loc>
		<lastmod>2025-12-31T21:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-%c2%a2-decentralized-infrastructure-for-sharing-trusted-encrypted-facts-and-nothing-more/</loc>
		<lastmod>2025-12-31T22:03:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-inverted-catenaries/</loc>
		<lastmod>2025-12-31T22:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-impact-tracing-identifying-the-culprit-of-misinformation-in-encrypted-messaging-systems/</loc>
		<lastmod>2025-12-31T22:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detect-gos-silent-arithmetic-bugs-with-go-panikint/</loc>
		<lastmod>2025-12-31T22:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knownsec-data-breach-a-trove-of-espionage-tradecraft-with-an-insider-narrative/</loc>
		<lastmod>2026-01-01T00:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zur-erfolgreichen-digitalen-transformation-muss-2026-it-sicherheit-endlich-chefsache-werden/</loc>
		<lastmod>2026-01-01T00:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-angriffe-auf-unternehmen-zwischen-den-jahren-lauern-viele-gefahren/</loc>
		<lastmod>2026-01-01T00:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-european-space-agency-breach-selling-200gb-of-data/</loc>
		<lastmod>2026-01-01T00:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nyc-mayoral-inauguration-bans-flipper-zero-raspberry-pi-devices/</loc>
		<lastmod>2026-01-01T00:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ghost-in-the-kernel-how-honeymyte-weaponized-a-rootkit-to-hijack-asian-governments/</loc>
		<lastmod>2026-01-01T01:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-attribute-based-access-control-for-context-window-injections/</loc>
		<lastmod>2026-01-01T05:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerability-in-ibm-api-connect-could-allow-authentication-bypass/</loc>
		<lastmod>2026-01-01T05:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-die-ki-revolution-geht-weiter-und-wird-noch-schneller/</loc>
		<lastmod>2026-01-01T06:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cvss-9-8-flaw-found-in-ibm-api-connect-authentication-system/</loc>
		<lastmod>2026-01-01T06:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-cybersecurity-experts-excited-about-the-latest-in-secrets-vaulting/</loc>
		<lastmod>2026-01-01T07:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-features-in-iam-solutions-make-it-managers-feel-relieved/</loc>
		<lastmod>2026-01-01T07:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-secrets-scanning-systems-to-new-threats/</loc>
		<lastmod>2026-01-01T07:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-secrets-scanning-systems-to-new-threats-2/</loc>
		<lastmod>2026-01-01T07:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-soc-teams-empowered-by-advanced-machine-identity-management/</loc>
		<lastmod>2026-01-01T07:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecuritys-top-10-cybersecurity-stories-of-2025/</loc>
		<lastmod>2026-01-01T09:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-cybersecurity-predictions-for-2026/</loc>
		<lastmod>2026-01-01T10:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-exploits-critical-react2shell-flaw-to-hijack-iot-devices-and-web-servers/</loc>
		<lastmod>2026-01-01T11:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-happy-prosperous-safe-new-year-2026-wish-to-you-and-yours/</loc>
		<lastmod>2026-01-01T13:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strafanzeige-nach-digitalem-unterricht-microsoft-365-education-darf-schuler-nicht-tracken/</loc>
		<lastmod>2026-01-01T13:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/48-stunden-angriff-zeigt-risiken-ungepatchter-edge-komponenten-so-fuhrte-eine-ungepatchte-firewall-zur-kompletten-netzwerkubernahme/</loc>
		<lastmod>2026-01-01T14:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-google-gemini-ai-flaw-could-lead-to-gmail-compromise-phishing/</loc>
		<lastmod>2026-01-01T15:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-clop-tied-to-korean-air-vendor-breach/</loc>
		<lastmod>2026-01-01T15:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-7m-trust-wallet-hack/</loc>
		<lastmod>2026-01-01T15:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-cve-2025-29927-understanding-the-next-js-middleware-vulnerability/</loc>
		<lastmod>2026-01-01T16:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-under-attack-rondodox-botnet-spreads-miners-and-malware/</loc>
		<lastmod>2026-01-01T16:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-browse-faster-and-get-more-done-using-adapt-browser/</loc>
		<lastmod>2026-01-01T16:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bis-2050-frauen-sollen-die-halfte-der-stellen-in-der-cybersecurity-branche-ausmachen/</loc>
		<lastmod>2026-01-01T16:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-ghostad-drain-macos-attacks-proxy-botnets-cloud-exploits-and-12-stories/</loc>
		<lastmod>2026-01-01T17:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-wallet-confirms-second-shai-hulud-supply-chain-attack-8-5m-in-crypto-stolen/</loc>
		<lastmod>2026-01-01T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-offering-20-chatgpt-plus-for-free-to-some-users/</loc>
		<lastmod>2026-01-01T20:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-biggest-cybersecurity-and-cyberattack-stories-of-2025/</loc>
		<lastmod>2026-01-01T20:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-glassworm-malware-wave-targets-macs-with-trojanized-crypto-wallets/</loc>
		<lastmod>2026-01-01T20:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-webflow-helps-companies-move-faster-without-sacrificing-brand-control/</loc>
		<lastmod>2026-01-01T22:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-identity-and-access-management-for-ai-agents/</loc>
		<lastmod>2026-01-02T05:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-passkeys-ready-for-use-in-enterprises/</loc>
		<lastmod>2026-01-02T05:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-die-cybersicherheit-neu-gestaltet/</loc>
		<lastmod>2026-01-02T05:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-the-slop-by-disabling-ai-features-in-chrome/</loc>
		<lastmod>2026-01-02T05:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-experiment-to-production-ai-settles-into-embedded-software-development/</loc>
		<lastmod>2026-01-02T06:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hospitals-are-drowning-in-threats-they-cant-triage/</loc>
		<lastmod>2026-01-02T06:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-nuttx-flaw-allows-attackers-to-crash-embedded-systems/</loc>
		<lastmod>2026-01-02T06:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/careto-hacker-group-resurfaces-after-a-decade-unleashing-new-attack-techniques/</loc>
		<lastmod>2026-01-02T06:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-autosect-helps-security-teams-handle-1000-endpoints-effortlessly/</loc>
		<lastmod>2026-01-02T07:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/types-of-authentication-complete-guide-to-authentication-methods-mechanisms/</loc>
		<lastmod>2026-01-02T07:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/support-ende-windows-10-azure-co-diese-produkte-mustert-microsoft-2026-aus/</loc>
		<lastmod>2026-01-02T07:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-shadow-ai-means-for-saas-security-and-integrations/</loc>
		<lastmod>2026-01-02T07:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-skills-matter-more-than-headcount-in-the-ai-era/</loc>
		<lastmod>2026-01-02T08:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-im-soc-braucht-governance-und-klare-verantwortlichkeiten-ohne-governance-wird-agentenbasierte-ki-im-soc-zum-sicherheitsrisiko/</loc>
		<lastmod>2026-01-02T08:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einheitliches-geratemanagement-fur-macos-cortado-erweitert-mdm-plattform-um-mac-management/</loc>
		<lastmod>2026-01-02T09:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-saas-management-reduces-organizational-risk-and-improves-grc-outcomes/</loc>
		<lastmod>2026-01-02T10:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everybody-has-a-theory-about-why-nvidia-dropped-20b-on-groq-theyre-mostly-wrong/</loc>
		<lastmod>2026-01-02T10:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-first-cybersecurity-predictions-for-2026/</loc>
		<lastmod>2026-01-02T11:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutzverletzungen-made-in-germany-die-grosten-deutschen-datenpannen-in-2025/</loc>
		<lastmod>2026-01-02T11:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-esa-bestatigt-datendiebstahl-durch-hackerangriff/</loc>
		<lastmod>2026-01-02T11:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-abuse-google-cloud-email-feature-in-multi-stage-phishing-campaign/</loc>
		<lastmod>2026-01-02T11:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/la-poste-and-la-banque-postale-hit-by-cyberattack-online-services-disrupted/</loc>
		<lastmod>2026-01-02T11:06:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-warns-of-critical-api-connect-bug-enabling-remote-access/</loc>
		<lastmod>2026-01-02T12:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-protesters-became-content-for-the-cops/</loc>
		<lastmod>2026-01-02T12:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manufacturing-ai-mit-ki-die-zukunft-der-produktion-sichern/</loc>
		<lastmod>2026-01-02T12:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-that-set-the-tone-for-2026-cyber-laws-breaches-and-disinformation/</loc>
		<lastmod>2026-01-02T13:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-takedown-architect-gets-new-year-award-from-king-charles/</loc>
		<lastmod>2026-01-02T13:03:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-roi-problem-in-attack-surface-management/</loc>
		<lastmod>2026-01-02T13:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flock-exposes-its-ai-enabled-surveillance-cameras/</loc>
		<lastmod>2026-01-02T14:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-abuses-google-cloud-application-to-impersonate-legitimate-google-emails/</loc>
		<lastmod>2026-01-02T14:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/baden-wurttemberg-cyberattacke-auf-the-land-shop/</loc>
		<lastmod>2026-01-02T14:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cves-of-december-2025/</loc>
		<lastmod>2026-01-02T14:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-nist-launches-updated-incident-response-guide/</loc>
		<lastmod>2026-01-02T15:02:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finland-arrests-two-crew-members-of-ship-suspected-of-cable-break/</loc>
		<lastmod>2026-01-02T15:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mssp-security-management-platform-enabling-scalable-intelligence-driven-cyber-defense/</loc>
		<lastmod>2026-01-02T15:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-wallet-links-8-5-million-crypto-theft-to-shai-hulud-npm-attack/</loc>
		<lastmod>2026-01-02T15:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hackers-breach-telegram-accounts-linked-to-israeli-officials/</loc>
		<lastmod>2026-01-02T15:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-tasks-feature-exploited-in-new-sophisticated-phishing-campaign/</loc>
		<lastmod>2026-01-02T15:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-group-claims-responsibility-for-alleged-tokyo-fm-broadcasting-breach/</loc>
		<lastmod>2026-01-02T15:07:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cognizant-faces-multiple-us-class-action-lawsuits-after-trizetto-data-breach/</loc>
		<lastmod>2026-01-02T15:09:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-abuses-react2shell-vulnerability-for-malware-deployment/</loc>
		<lastmod>2026-01-02T15:10:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cardano-users-warned-of-possible-phishing-attempt-posing-as-eternl-desktop-update/</loc>
		<lastmod>2026-01-02T15:11:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gnu-wget2-vulnerability-enables-remote-file-overwrite-attacks/</loc>
		<lastmod>2026-01-02T15:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-warning-on-whill-model-c2-wheelchair-takeover-vulnerabilities/</loc>
		<lastmod>2026-01-02T15:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-test-a-highly-obfuscated-modified-variant-of-the-shai-hulud-malware/</loc>
		<lastmod>2026-01-02T15:15:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-predictions-for-2026-navigating-the-future-of-digital-threats/</loc>
		<lastmod>2026-01-02T15:16:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cto-new-year-resolutions-for-a-more-secure-2026/</loc>
		<lastmod>2026-01-02T15:17:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xous-baochip-1x-rust-os-und-eigener-chip-fur-sicherere-embedded-anwendungen/</loc>
		<lastmod>2026-01-02T15:18:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-launches-new-rat-attacks-against-indian-government-and-academia/</loc>
		<lastmod>2026-01-02T15:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-launches-new-rat-attacks-against-indian-government-and-academia-2/</loc>
		<lastmod>2026-01-02T15:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-launches-new-rat-attacks-against-indian-government-and-academia-3/</loc>
		<lastmod>2026-01-02T15:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-2025-huge-food-wholesaler-paralyzed-by-hack-is-it-scattered-spider-again/</loc>
		<lastmod>2026-01-02T16:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-dms-tsmc-please-sir-can-i-have-some-more-the-chinese-are-starved-for-h200s/</loc>
		<lastmod>2026-01-02T16:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-is-testing-a-new-image-ai-and-its-going-to-be-its-fastest-model/</loc>
		<lastmod>2026-01-02T16:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-how-ai-is-reshaping-cybersecurity-strategy/</loc>
		<lastmod>2026-01-02T16:06:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trizetto-data-breach-triggers-class-action-lawsuits-against-cognizant/</loc>
		<lastmod>2026-01-02T16:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erp-angriffe-und-ki-machen-sicherheit-zur-chefsache-patching-reicht-nicht-erp-sicherheit-braucht-ki-und-monitoring/</loc>
		<lastmod>2026-01-02T16:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-removes-intellexa-spyware-linked-trio-from-sanctions-list/</loc>
		<lastmod>2026-01-02T17:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-lands-invite-only-aussie-visa-after-uncovering-vuln-in-government-systems/</loc>
		<lastmod>2026-01-02T17:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-lands-invite-only-aussie-visa-after-uncovering-vuln-in-government-systems-2/</loc>
		<lastmod>2026-01-02T17:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-lands-invite-only-aussie-visa-after-uncovering-vuln-in-government-systems-3/</loc>
		<lastmod>2026-01-02T17:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/covenant-health-data-breach-after-ransomware-attack-impacted-over-478000-people/</loc>
		<lastmod>2026-01-02T17:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-puts-whill-electric-wheelchairs-at-risk-of-hijacking/</loc>
		<lastmod>2026-01-02T17:06:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-10k-fortinet-firewalls-exposed-to-actively-exploited-2fa-bypass/</loc>
		<lastmod>2026-01-02T17:07:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-47-day-tls-and-ssl-certificate-renewal-cycles-alarm-cios/</loc>
		<lastmod>2026-01-02T17:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-200gb-data-theft-from-european-space-agency-heres-what-we-know/</loc>
		<lastmod>2026-01-02T17:08:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-venture-studios-use-ai-to-accelerate-mvps-without-creating-tech-debt/</loc>
		<lastmod>2026-01-02T18:03:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sedgwick-confirms-cyber-incident-affecting-its-major-federal-contractor-subsidiary/</loc>
		<lastmod>2026-01-02T18:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-army-seeks-human-ai-officers-to-manage-its-battle-bots/</loc>
		<lastmod>2026-01-02T18:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach/</loc>
		<lastmod>2026-01-02T18:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrook-claims-to-be-selling-infrastructure-info-about-three-major-us-utilities/</loc>
		<lastmod>2026-01-02T19:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tokyo-fm-data-breach-hacker-claims-over-3-million-records-stolen/</loc>
		<lastmod>2026-01-02T19:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkspectre-malware-hit-8-8m-browsers-via-malicious-extensions/</loc>
		<lastmod>2026-01-02T19:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pakistan-linked-hackers-target-indian-government-universities-in-new-spying-campaign/</loc>
		<lastmod>2026-01-02T20:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-regulators-take-aim-at-x-after-grok-creates-deepfake-of-minor/</loc>
		<lastmod>2026-01-02T20:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-uses-malicious-windows-shortcuts-to-target-indian-government/</loc>
		<lastmod>2026-01-02T20:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/covenant-health-says-may-data-breach-impacted-nearly-478000-patients/</loc>
		<lastmod>2026-01-02T20:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-480000-impacted-by-covenant-health-data-breach/</loc>
		<lastmod>2026-01-02T21:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitfinex-crypto-thief-who-was-serving-five-years-thanks-trump-for-early-release/</loc>
		<lastmod>2026-01-02T21:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-xdr-in-30-turning-security-signals-into-confident-action/</loc>
		<lastmod>2026-01-02T21:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-microsoft-gave-customers-what-they-wanted-an-audience-with-bill-gates/</loc>
		<lastmod>2026-01-02T21:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-professionals-plead-guilty-in-alphv-ransomware-case/</loc>
		<lastmod>2026-01-02T21:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-snapshot-predictions-for-2026-ai-attack-acceleration-automated-remediation-custom-made-ai-security-tools-machine-identity-threats-and-more/</loc>
		<lastmod>2026-01-02T22:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starlink-to-lower-orbits-of-thousands-of-satellites-over-safety-concerns/</loc>
		<lastmod>2026-01-02T22:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-exploiting-devices-with-react2shell-flaw/</loc>
		<lastmod>2026-01-02T22:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aflac-notifies-22-6-million-people-of-june-data-theft-attack/</loc>
		<lastmod>2026-01-02T22:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-your-digital-wallet-what-you-need-to-know-about-fintech-security/</loc>
		<lastmod>2026-01-03T00:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-u-s-cybersecurity-professionals-plead-guilty-in-blackcat-alphv-ransomware-case/</loc>
		<lastmod>2026-01-03T00:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/largest-cyber-stocks-feast-in-2025-as-smaller-stocks-famish/</loc>
		<lastmod>2026-01-03T00:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arkose-labs-android-sdk-enhanced-protection-with-mobile-integrity-check/</loc>
		<lastmod>2026-01-03T01:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-chasing-false-alarms-how-ai-powered-traffic-monitoring-cuts-alert-fatigue/</loc>
		<lastmod>2026-01-03T01:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-only-identifying-devices-or-actually-understanding-them/</loc>
		<lastmod>2026-01-03T01:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-enterprise-identity-and-why-most-companies-get-sso-rbac-catastrophically-wrong/</loc>
		<lastmod>2026-01-03T05:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-investments-in-privileged-access-management-justified-by-results/</loc>
		<lastmod>2026-01-03T05:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-capable-are-current-secrets-rotation-systems-in-preventing-breaches/</loc>
		<lastmod>2026-01-03T05:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-agentic-ai-systems-deliver-value-in-real-time-operations/</loc>
		<lastmod>2026-01-03T05:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-it-leaders-optimistic-about-future-ai-governance/</loc>
		<lastmod>2026-01-03T05:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-understanding-data-importance-in-machine-learning-attacks/</loc>
		<lastmod>2026-01-03T05:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-alphadog-no-box-camouflage-attacks-via-alpha-channel-oversight/</loc>
		<lastmod>2026-01-03T05:08:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-gefahren-von-ki-agenten-und-wie-unternehmen-ihnen-begegnen-konnen/</loc>
		<lastmod>2026-01-03T06:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eine-neue-klasse-operativer-und-sicherheitsrelevanter-risiken-ki-agenten/</loc>
		<lastmod>2026-01-03T06:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outpace-malware-build-faster-and-secure-software-with-real-time-protection-2/</loc>
		<lastmod>2026-01-03T11:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outpace-malware-build-faster-and-secure-software-with-real-time-protection/</loc>
		<lastmod>2026-01-03T11:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finally-a-terminal-solution-to-the-browser-wars/</loc>
		<lastmod>2026-01-03T11:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-your-iphone-or-android-device-from-spyware/</loc>
		<lastmod>2026-01-03T11:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-coldfusion-exploit-attempts-spotted-during-christmas-holiday/</loc>
		<lastmod>2026-01-03T13:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnish-authorities-arrest-two-sailors-in-probe-into-undersea-cable-disruption/</loc>
		<lastmod>2026-01-03T15:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-is-using-react2shell-to-hijack-thousands-of-unpatched-devices/</loc>
		<lastmod>2026-01-03T16:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-breach-of-us-cybersecurity-firm-resecurity/</loc>
		<lastmod>2026-01-03T18:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-vs-cybersecurity-solutions-key-differences/</loc>
		<lastmod>2026-01-03T20:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-dlbox-new-model-training-framework-for-protecting-training-data/</loc>
		<lastmod>2026-01-03T20:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resecurity-says-shinyhunters-fell-for-honeypot-after-breach-claim/</loc>
		<lastmod>2026-01-03T20:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-breach-of-us-cybersecurity-firm-resecurity-updated/</loc>
		<lastmod>2026-01-03T20:06:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitfinex-hacker-ilya-lichtenstein-credits-trump-for-early-release-from-prison/</loc>
		<lastmod>2026-01-03T21:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnish-authorities-detain-crew-after-undersea-internet-cable-severed/</loc>
		<lastmod>2026-01-03T21:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-authorities-investigate-ai-undressing-deepfakes-on-x/</loc>
		<lastmod>2026-01-03T21:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-resecurity-hack-firm-says-its-a-honeypot/</loc>
		<lastmod>2026-01-03T21:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-residents-can-use-new-tool-to-demand-brokers-delete-their-personal-data/</loc>
		<lastmod>2026-01-03T23:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-to-hack-resecurity-firm-says-it-was-a-honeypot/</loc>
		<lastmod>2026-01-04T00:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-to-hack-resecurity-firm-says-it-was-a-honeypot-2/</loc>
		<lastmod>2026-01-04T00:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-truly-handle-the-complex-needs-of-modern-enterprises/</loc>
		<lastmod>2026-01-04T01:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-independent-can-ai-systems-be-in-managing-nhis/</loc>
		<lastmod>2026-01-04T01:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-companies-truly-be-free-from-cybersecurity-threats-with-ai/</loc>
		<lastmod>2026-01-04T01:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-action-in-venezuela-provokes-cyberattack-speculation/</loc>
		<lastmod>2026-01-04T05:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputer-ki-agenten-und-neue-rechenzentren-die-it-welt-steht-2026-kopf/</loc>
		<lastmod>2026-01-04T06:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputer-ki-agenten-und-neue-rechenzentren-die-it-welt-steht-2026-kopf-2/</loc>
		<lastmod>2026-01-04T06:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-tenant-vs-multi-tenant-fedramp-deployments/</loc>
		<lastmod>2026-01-04T08:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raspberry-pi-verbot-maker-hardware-wie-pi-flipper-zero-auf-new-yorker-verbotsliste/</loc>
		<lastmod>2026-01-04T10:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-is-his-copilot-rust-veteran-designs-new-rue-programming-language-with-help-from-ai-bot/</loc>
		<lastmod>2026-01-04T11:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jailbreak-star-wars-ps4-spiel-knackt-playstation-5/</loc>
		<lastmod>2026-01-04T11:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/president-trump-blocks-2-9m-emcore-chip-sale-over-security-concerns/</loc>
		<lastmod>2026-01-04T12:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-whatsapp-features-to-boost-your-security-and-privacy/</loc>
		<lastmod>2026-01-04T12:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-trump-sperrt-china-von-pentagon-cloudsystemen-aus-2/</loc>
		<lastmod>2026-01-04T13:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-trump-sperrt-china-von-pentagon-cloudsystemen-aus/</loc>
		<lastmod>2026-01-04T13:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-trump-sperrt-china-von-pentagon-cloudsystemen-aus-3/</loc>
		<lastmod>2026-01-04T13:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-78/</loc>
		<lastmod>2026-01-04T15:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-557-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-01-04T15:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fingerabdrucke-und-gesichtsbilder-usa-wollen-zugriff-auf-millionen-europaischer-polizeidaten/</loc>
		<lastmod>2026-01-04T15:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-happening-to-the-internet-in-venezuela-did-the-u-s-use-cyber-capabilities/</loc>
		<lastmod>2026-01-04T17:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resecurity-caught-shinyhunters-in-honeypot/</loc>
		<lastmod>2026-01-04T20:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krypto-hacks-2025-noch-nie-haben-cyberkriminelle-so-viel-geld-erbeutet/</loc>
		<lastmod>2026-01-04T20:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/liest-du-datenschutzerklarungen-dieser-test-zeigt-wie-wenige-es-tun/</loc>
		<lastmod>2026-01-04T20:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-new-ppml-paradigm-for-quantized-models/</loc>
		<lastmod>2026-01-04T21:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-weaponizes-jlpt-2/</loc>
		<lastmod>2026-01-05T01:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-weaponizes-jlpt/</loc>
		<lastmod>2026-01-05T01:02:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-authentication-methods-explained-api-keys-oauth-jwt-hmac-compared/</loc>
		<lastmod>2026-01-05T05:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-decentralized-identifiers-for-autonomous-tool-calling/</loc>
		<lastmod>2026-01-05T05:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-cybersecurity-teams-supported-by-latest-secrets-management-tools/</loc>
		<lastmod>2026-01-05T05:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-much-freedom-do-companies-have-in-choosing-nhis/</loc>
		<lastmod>2026-01-05T05:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-industry-leaders-satisfied-with-current-ai-security-measures/</loc>
		<lastmod>2026-01-05T05:07:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-current-nhi-security-measures-truly-impenetrable/</loc>
		<lastmod>2026-01-05T05:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-muss-im-jahr-2026-neu-gedacht-werden/</loc>
		<lastmod>2026-01-05T05:09:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-bei-der-cloud-konfiguration-schieflauft-und-wie-es-besser-geht/</loc>
		<lastmod>2026-01-05T05:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researcher-wipes-white-supremacist-dating-sites-leaks-data-on-okstupid-lol/</loc>
		<lastmod>2026-01-05T05:12:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-ai-insider-risk-before-it-becomes-a-problem/</loc>
		<lastmod>2026-01-05T06:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-the-end-of-the-traditional-entry-level-tech-job/</loc>
		<lastmod>2026-01-05T07:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slowmist-flags-potential-security-risk-at-hitbtc-exchange/</loc>
		<lastmod>2026-01-05T07:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiefpreis-bei-hide-me-nur-noch-fur-kurze-zeit/</loc>
		<lastmod>2026-01-05T07:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pharmas-most-underestimated-cyber-risk-isnt-a-breach/</loc>
		<lastmod>2026-01-05T07:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-risks-are-also-cultural-and-developmental/</loc>
		<lastmod>2026-01-05T07:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openaev-open-source-adversarial-exposure-validation-platform/</loc>
		<lastmod>2026-01-05T07:07:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-react2shell-schwachstelle-wird-aktiv-ausgenutzt-cve-2025-55182-offnet-react-server-components-fur-linux-backdoors/</loc>
		<lastmod>2026-01-05T07:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheimdienst-bnd-uberwachte-obama-telefonate-von-air-force-one/</loc>
		<lastmod>2026-01-05T07:09:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/californias-drop-platform-launches-what-enterprise-b2b-saas-companies-need-to-know-about-data-deletion-compliance-2/</loc>
		<lastmod>2026-01-05T08:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/californias-drop-platform-launches-what-enterprise-b2b-saas-companies-need-to-know-about-data-deletion-compliance/</loc>
		<lastmod>2026-01-05T08:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-osint-breach-data-connects-the-dots-in-attribution-investigations/</loc>
		<lastmod>2026-01-05T08:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-passkey-for-account-login/</loc>
		<lastmod>2026-01-05T08:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-leaders-resolutions-for-2026/</loc>
		<lastmod>2026-01-05T08:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-verkurzt-sich-die-zeit-bis-zum-exploit-drastisch-so-sichern-unternehmen-lieferketten-und-edge-gegen-schnelle-exploits/</loc>
		<lastmod>2026-01-05T08:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sedgwick-discloses-data-breach-after-tridentlocker-ransomware-attack/</loc>
		<lastmod>2026-01-05T08:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sedgwick-discloses-data-breach-after-tridentlocker-ransomware-attack-2/</loc>
		<lastmod>2026-01-05T08:08:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managemyhealth-provides-update-on-ongoing-cyberattack-investigation/</loc>
		<lastmod>2026-01-05T09:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vvs-stealer-malware-targets-discord-accounts-via-obfuscated-python-code/</loc>
		<lastmod>2026-01-05T09:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wichtig-zu-wissen-mehr-flexibilitat-mit-anthropic-claude-in-microsoft-copilot/</loc>
		<lastmod>2026-01-05T09:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-jahre-alte-sicherheitslucke-laufende-attacken-gefahrden-10-000-firewalls/</loc>
		<lastmod>2026-01-05T09:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silent-authentication-redefining-security-flexibility-and-customer-engagement/</loc>
		<lastmod>2026-01-05T10:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-agentic-ai-hurt-or-help-your-security-posture/</loc>
		<lastmod>2026-01-05T10:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vvs-stealer-a-new-python-malware-steals-discord-credentials/</loc>
		<lastmod>2026-01-05T10:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-trace-35m-in-stolen-crypto-to-lastpass-breach-2/</loc>
		<lastmod>2026-01-05T10:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-trace-35m-in-stolen-crypto-to-lastpass-breach/</loc>
		<lastmod>2026-01-05T10:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-trace-35m-in-stolen-crypto-to-lastpass-breach-3/</loc>
		<lastmod>2026-01-05T10:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-geschenkkarten-zur-falle-werden-die-wichtigsten-betrugsmaschen-im-uberblick/</loc>
		<lastmod>2026-01-05T10:07:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-computing-stats-trends-future-2026-crucial-year-for-quantum-security/</loc>
		<lastmod>2026-01-05T11:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-2025s-top-threat-groups-why-familiar-actors-still-have-the-upper-hand/</loc>
		<lastmod>2026-01-05T11:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-is-the-year-to-be-breach-ready-augment-cyber-resilience-with-operational-excellence/</loc>
		<lastmod>2026-01-05T11:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-tech-sprawl-to-clarity-with-xdr/</loc>
		<lastmod>2026-01-05T11:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitfinex-hack-convict-ilya-lichtenstein-released-early-under-u-s-first-step-act/</loc>
		<lastmod>2026-01-05T11:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-space-agency-confirms-server-breach/</loc>
		<lastmod>2026-01-05T11:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-zielt-auf-den-hypervisor-so-schutzen-unternehmen-hypervisoren-vor-ransomware-angriffen/</loc>
		<lastmod>2026-01-05T11:09:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-legt-funften-impact-jahresbericht-vor/</loc>
		<lastmod>2026-01-05T11:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-und-office-aktivierungstool-infiziert-28-millionen-systeme-mit-malware/</loc>
		<lastmod>2026-01-05T11:12:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth-2/</loc>
		<lastmod>2026-01-05T12:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/californias-drop-program-changes-everything-how-b2c-companies-can-eliminate-authentication-liabilities-and-meet-global-privacy-compliance-with-mojoauth/</loc>
		<lastmod>2026-01-05T12:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/time-to-restore-americas-cyberspace-security-system/</loc>
		<lastmod>2026-01-05T12:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disney-fined-10m-for-violating-childrens-privacy-laws-on-youtube/</loc>
		<lastmod>2026-01-05T12:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cybercriminal-behind-the-2016-bitfinex-hack-has-been-released-from-prison-early-thanks-to-trumps-2018-first-step-act/</loc>
		<lastmod>2026-01-05T12:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-ohne-cloud-zwang-mehr-datenschutz-windows-11-ohne-microsoft-konto-nutzen/</loc>
		<lastmod>2026-01-05T12:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-ciso-need-for-continuous-observability-is-now-critical/</loc>
		<lastmod>2026-01-05T13:03:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-turns-tables-on-threat-actors-with-decoy-data-trap/</loc>
		<lastmod>2026-01-05T13:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-turns-tables-on-threat-actors-with-decoy-data-trap-2/</loc>
		<lastmod>2026-01-05T13:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zealand-orders-review-into-managemyhealth-cyberattack/</loc>
		<lastmod>2026-01-05T13:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zealand-orders-review-into-managemyhealth-cyberattack-2/</loc>
		<lastmod>2026-01-05T13:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-build-ransomware-resilient-ai-data-pipelines-a-practical-guide-for-modern-enterprises/</loc>
		<lastmod>2026-01-05T13:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sergey-petrossovs-aero-ventures-addresses-aviations-younger-tech-focused-buyer-demographic/</loc>
		<lastmod>2026-01-05T13:08:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-geht-schief-beruchtigte-hackergruppe-fallt-auf-honeypot-rein/</loc>
		<lastmod>2026-01-05T13:10:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spd-staatsregierung-tut-zu-wenig-fur-ki-sicherheit/</loc>
		<lastmod>2026-01-05T14:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spd-staatsregierung-tut-zu-wenig-fur-ki-sicherheit-2/</loc>
		<lastmod>2026-01-05T14:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-preparing-to-drop-pop3-mail-fetching/</loc>
		<lastmod>2026-01-05T15:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-eyes-400m-acquisition-of-koi-security/</loc>
		<lastmod>2026-01-05T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-organizational-risk-culture-standard-can-supercharge-your-cybersecurity-culture/</loc>
		<lastmod>2026-01-05T15:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-botnet-exploits-2-million-devices-to-build-a-global-proxy-infrastructure/</loc>
		<lastmod>2026-01-05T15:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-steal-35m-in-cryptocurrency-following-lastpass-breach/</loc>
		<lastmod>2026-01-05T15:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/profilehound-post-escalation-tool-designed-to-achieve-red-team-objectives/</loc>
		<lastmod>2026-01-05T15:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-leverage-fortiweb-vulnerabilities-to-deploy-sliver-c2-for-long-term-access/</loc>
		<lastmod>2026-01-05T15:09:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostcrew-ai-powered-red-team-toolkit-integrating-metasploit-nmap-and-more/</loc>
		<lastmod>2026-01-05T15:10:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crimson-collective-claims-alleged-breach-of-brightspeed-fiber-network/</loc>
		<lastmod>2026-01-05T15:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pyarmor-obfuscation-as-a-method-to-hinder-static-and-signature-based-analysis/</loc>
		<lastmod>2026-01-05T15:13:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-abuse-trusted-business-infrastructure-to-host-infostealers/</loc>
		<lastmod>2026-01-05T15:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eaton-vulnerabilities-allow-attackers-to-execute-arbitrary-code-on-host-systems/</loc>
		<lastmod>2026-01-05T15:15:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-flaws-in-qnap-tools-allow-attackers-to-steal-sensitive-data/</loc>
		<lastmod>2026-01-05T15:16:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-iot-exploits-wallet-breaches-rogue-extensions-ai-abuse-more/</loc>
		<lastmod>2026-01-05T15:17:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cto-new-years-resolutions-for-a-more-secure-2026/</loc>
		<lastmod>2026-01-05T15:18:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-looking-very-seriously-at-taking-action-against-x-over-grok/</loc>
		<lastmod>2026-01-05T16:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aflac-notifies-22-7-million-people-of-june-data-theft-attack/</loc>
		<lastmod>2026-01-05T16:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-leak-shows-telegram-account-risk-not-iphone-hacks/</loc>
		<lastmod>2026-01-05T16:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-tasks-used-to-deliver-stealth-phishing-attacks/</loc>
		<lastmod>2026-01-05T16:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-unveils-drop-tool-for-personal-data-deletion/</loc>
		<lastmod>2026-01-05T16:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ledger-customers-impacted-by-third-party-global-e-data-breach/</loc>
		<lastmod>2026-01-05T16:08:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-is-an-identity-problem-and-cisos-will-be-accountable-for-the-outcome/</loc>
		<lastmod>2026-01-05T16:09:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zealand-orders-review-of-manage-my-health-breach-affecting-100000-patients/</loc>
		<lastmod>2026-01-05T16:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/</loc>
		<lastmod>2026-01-05T16:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gastkommentar-von-ismet-koyun-ceo-und-grunder-der-kobil-gruppe-mit-verantwortungsvoller-und-intelligenter-ki-ins-neue-jahr/</loc>
		<lastmod>2026-01-05T16:12:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-firewalls-at-risk-as-legacy-flaw-in-fortinet-faces-renewed-threat/</loc>
		<lastmod>2026-01-05T17:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-risks-grow-as-manufacturers-turn-to-ai-and-cloud-systems/</loc>
		<lastmod>2026-01-05T17:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-and-mitre-partner-to-test-ai-defense-technology-for-critical-infrastructure/</loc>
		<lastmod>2026-01-05T17:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-forces-british-high-school-to-close/</loc>
		<lastmod>2026-01-05T17:06:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordvpn-denies-breach-after-hacker-claims-access-to-salesforce-dev-data/</loc>
		<lastmod>2026-01-05T17:07:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-iot-labeling-program-loses-lead-company-after-china-probe/</loc>
		<lastmod>2026-01-05T17:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2m-devices-at-risk-as-kimwolf-botnet-abuses-proxy-networks/</loc>
		<lastmod>2026-01-05T17:09:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-botnet-leverages-residential-proxies-to-hijack-2m-android-devices/</loc>
		<lastmod>2026-01-05T17:10:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-expands-scope-with-react2shell-exploitation/</loc>
		<lastmod>2026-01-05T17:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-expands-scope-with-react2shell-exploitation-2/</loc>
		<lastmod>2026-01-05T17:12:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vscode-ide-forks-expose-users-to-recommended-extension-attacks/</loc>
		<lastmod>2026-01-05T17:13:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-users-at-risk-as-critical-zoom-vulnerability-exploited/</loc>
		<lastmod>2026-01-05T17:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vvs-stealer-uses-advanced-obfuscation-to-target-discord-users/</loc>
		<lastmod>2026-01-05T17:15:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-subjected-to-2-6-million-chinese-cyberattacks-a-day-in-2025/</loc>
		<lastmod>2026-01-05T18:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/several-countries-investigate-elon-musks-grok-after-sexualized-deepfakes-on-women-and-children/</loc>
		<lastmod>2026-01-05T18:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breached-e-commerce-giant-details-1b-customer-trust-plan/</loc>
		<lastmod>2026-01-05T18:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-cybersecurity-startups-to-watch-in-2026/</loc>
		<lastmod>2026-01-05T18:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-smartermail-bug-enables-unauthenticated-file-uploads/</loc>
		<lastmod>2026-01-05T18:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-noise-to-signal-building-a-risk-first-alert-pipeline-that-analysts-trust/</loc>
		<lastmod>2026-01-05T18:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-android-botnet-infects-over-2-million-devices-via-exposed-adb-and-proxy-networks/</loc>
		<lastmod>2026-01-05T18:09:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-android-botnet-infects-over-2-million-devices-via-exposed-adb-and-proxy-networks-2/</loc>
		<lastmod>2026-01-05T18:09:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-android-botnet-infects-over-2-million-devices-via-exposed-adb-and-proxy-networks-3/</loc>
		<lastmod>2026-01-05T18:09:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ilya-lichtenstein-released-early-after-bitfinex-hack-conviction/</loc>
		<lastmod>2026-01-05T18:10:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-probenot-protecting-pre-trained-encoders-from-malicious-probing/</loc>
		<lastmod>2026-01-05T19:03:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-ceo-and-c-suite-must-ask-before-building-an-ai-enabled-enterprise/</loc>
		<lastmod>2026-01-05T19:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ten-thousand-firewalls-are-vulnerable-to-old-vulnerability/</loc>
		<lastmod>2026-01-05T19:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stress-caused-by-cybersecurity-threats-is-taking-its-toll/</loc>
		<lastmod>2026-01-05T19:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convicted-bitfinex-bitcoin-launderer-freed-from-prison-thanks-trump-law/</loc>
		<lastmod>2026-01-05T19:07:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/playing-koi-palo-alto-isnt-saying-if-it-will-buy-security-start-up/</loc>
		<lastmod>2026-01-05T19:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-of-data-exposure-risks-in-claude-chrome-extension/</loc>
		<lastmod>2026-01-05T19:09:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-aligned-hackers-abuse-viber-to-target-ukrainian-military-and-government/</loc>
		<lastmod>2026-01-05T19:10:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-campaign-abuses-booking-com-against-hospitality-sector/</loc>
		<lastmod>2026-01-05T20:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-stealc-malware/</loc>
		<lastmod>2026-01-05T20:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivist-deletes-white-supremacist-websites-live-onstage-during-hacker-conference/</loc>
		<lastmod>2026-01-05T20:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-the-explosion-of-machine-identities-in-financial-services/</loc>
		<lastmod>2026-01-05T20:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zealand-probes-ransomware-hack-of-health-portal/</loc>
		<lastmod>2026-01-05T20:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordvpn-says-breach-claims-involve-dummy-test-data/</loc>
		<lastmod>2026-01-05T20:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trusted-google-notifications-used-in-phishing-campaign-targeting-3000-orgs/</loc>
		<lastmod>2026-01-05T20:09:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cyber-pros-plead-guilty-over-blackcat-ransomware-activity/</loc>
		<lastmod>2026-01-05T20:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-target-european-hospitality-industry-with-blue-screen-of-death-malware/</loc>
		<lastmod>2026-01-05T21:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congrats-cybercrims-you-just-fell-into-a-honeypot/</loc>
		<lastmod>2026-01-05T21:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-broadband-provider-brightspeed-investigates-breach-claims/</loc>
		<lastmod>2026-01-05T21:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-awareness-why-centralized-monitoring-is-no-longer-optional/</loc>
		<lastmod>2026-01-05T22:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-arbor-edge-defense-and-cdn-based-ddos-protection-are-better-together/</loc>
		<lastmod>2026-01-05T22:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-needs-to-focus-more-on-investigation-and-less-on-just-detection-and-response/</loc>
		<lastmod>2026-01-05T22:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-myths-about-ddos-attacks-and-protection/</loc>
		<lastmod>2026-01-05T22:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-uses-fake-windows-bsod-screens-to-push-malware/</loc>
		<lastmod>2026-01-05T22:07:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-enduring-attack-surface-of-vpns/</loc>
		<lastmod>2026-01-05T22:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-osint-strengthens-executive-threat-intelligence/</loc>
		<lastmod>2026-01-05T23:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongobleed-unauthenticated-memory-disclosure-in-mongodb-cve-2025-14847/</loc>
		<lastmod>2026-01-05T23:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-nations-strictest-privacy-law-just-took-effect-to-data-brokers-chagrin/</loc>
		<lastmod>2026-01-05T23:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/covenant-health-notifying-480k-patients-of-2025-data-theft/</loc>
		<lastmod>2026-01-05T23:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mongobleed-bug-under-active-attack-patch-now/</loc>
		<lastmod>2026-01-05T23:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-enhance-cloud-security/</loc>
		<lastmod>2026-01-06T00:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-non-human-identities-safe/</loc>
		<lastmod>2026-01-06T00:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-being-proactive-in-nhi-management-is-critical-for-security/</loc>
		<lastmod>2026-01-06T00:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-voting-machine-conspiracies-fill-information-vacuum-around-venezuela-operation/</loc>
		<lastmod>2026-01-06T00:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-uac-0184-uses-viber-to-spy-on-ukrainian-military-in-2025-2/</loc>
		<lastmod>2026-01-06T00:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-uac-0184-uses-viber-to-spy-on-ukrainian-military-in-2025/</loc>
		<lastmod>2026-01-06T00:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-uac-0184-uses-viber-to-spy-on-ukrainian-military-in-2025-3/</loc>
		<lastmod>2026-01-06T00:07:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-the-us-and-a-blackout-what-cut-off-venezuelas-grid/</loc>
		<lastmod>2026-01-06T00:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-the-us-and-a-blackout-what-cut-off-venezuelas-grid-2/</loc>
		<lastmod>2026-01-06T00:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-cisco-axonius-deal-makes-sense-and-why-it-might-not-2/</loc>
		<lastmod>2026-01-06T00:10:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-cisco-axonius-deal-makes-sense-and-why-it-might-not/</loc>
		<lastmod>2026-01-06T00:10:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-file-sharing-sites-targeted-for-corporate-data-theft-attacks/</loc>
		<lastmod>2026-01-06T00:12:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-last-supported-version-of-hp-ux-is-no-more/</loc>
		<lastmod>2026-01-06T01:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-to-spend-210m-on-public-sector-cyber-resilience/</loc>
		<lastmod>2026-01-06T01:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-mcp-tool-definition-schemas/</loc>
		<lastmod>2026-01-06T05:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-key-principles-of-corporate-governance/</loc>
		<lastmod>2026-01-06T05:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-are-still-breaking-compliance-programs/</loc>
		<lastmod>2026-01-06T06:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-teams-miss-in-email-attacks/</loc>
		<lastmod>2026-01-06T06:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-n8n-vulnerability-9-9-cvss-lets-authenticated-users-execute-system-commands/</loc>
		<lastmod>2026-01-06T06:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-hyperacute-interdynamics/</loc>
		<lastmod>2026-01-06T07:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-roles-and-challenges-in-moving-to-quantum-safe-cryptography/</loc>
		<lastmod>2026-01-06T07:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-blokada-for-android-gives-users-control-over-network-traffic/</loc>
		<lastmod>2026-01-06T07:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aus-bluelinestealer-wird-santastealer-als-malware-as-a-santastealer-klaut-passworter-und-wallets-im-abo-model/</loc>
		<lastmod>2026-01-06T07:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-tough-ai-questions-for-the-2026-public-sector-cio/</loc>
		<lastmod>2026-01-06T08:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-strategies-for-building-a-high-performance-cybersecurity-team/</loc>
		<lastmod>2026-01-06T08:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-strategies-for-building-a-high-performance-cybersecurity-team-2/</loc>
		<lastmod>2026-01-06T08:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-adonisjs-bodyparser-flaw-cvss-9-2-enables-arbitrary-file-write-on-servers/</loc>
		<lastmod>2026-01-06T08:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontinuierliche-awareness-statt-einmal-schulungen-phishing-und-deepfakes-erfordern-2026-eine-gelebte-sicherheitskultur/</loc>
		<lastmod>2026-01-06T08:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-plain-language-into-firewall-rules/</loc>
		<lastmod>2026-01-06T08:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chaos-communication-congress-pinker-ranger-schaltet-rassistische-webseiten-live-ab/</loc>
		<lastmod>2026-01-06T08:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-reports-2-6-million-chinese-cyberattacks-per-day-in-2025/</loc>
		<lastmod>2026-01-06T08:12:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-gericht-starkt-bsi-bei-warnungen-vor-software/</loc>
		<lastmod>2026-01-06T08:13:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-criminal-50-hacked-organizations-and-all-because-mfa-wasnt-turned-on/</loc>
		<lastmod>2026-01-06T08:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-prinzip-protected-self-custody-der-sqares-ag-ein-wegwerf-wallet-fur-die-blockchain/</loc>
		<lastmod>2026-01-06T09:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connex-it-partners-with-accuknox-for-zero-trust-cnapp-security-in-southeast-asia/</loc>
		<lastmod>2026-01-06T09:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-allows-arbitrary-command-execution-cve-2025-68668/</loc>
		<lastmod>2026-01-06T09:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/berlin-datenschutz-beschwerdeflut-vor-allem-durch-ki/</loc>
		<lastmod>2026-01-06T09:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-behavioral-analytics-in-enhancing-cybersecurity-defense/</loc>
		<lastmod>2026-01-06T10:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-quantum-and-the-new-threat-frontier-what-will-define-cybersecurity-in-2026/</loc>
		<lastmod>2026-01-06T10:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coinbase-insider-who-sold-customer-data-to-criminals-arrested-in-india/</loc>
		<lastmod>2026-01-06T10:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-splashes-210m-on-cyber-plan-to-stop-whitehall-getting-pwnd/</loc>
		<lastmod>2026-01-06T11:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vvs-stealer-malware-targets-discord-users-via-fake-system-errors/</loc>
		<lastmod>2026-01-06T11:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-business-structure-matters-for-cybersecurity-compliance-in-remote-first-companies/</loc>
		<lastmod>2026-01-06T11:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-act-bleibt-risiko-trotz-eurechenzentren-usrecht-gefahrdet-datensouveranitat-auch-bei-eurechenzentren/</loc>
		<lastmod>2026-01-06T11:06:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-im-anmarsch-hacker-tricksen-windows-nutzer-mit-fake-bluescreens-aus/</loc>
		<lastmod>2026-01-06T11:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-increase-usage-of-generative-ai-services-creates-cybersecurity-challenge/</loc>
		<lastmod>2026-01-06T12:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/students-bag-extended-christmas-break-after-cyber-hit-on-school-it/</loc>
		<lastmod>2026-01-06T12:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-injects-just-210m-into-cyber-plan-to-stop-whitehall-getting-pwnd/</loc>
		<lastmod>2026-01-06T12:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fujitsu-post-office-it-support-team-were-legalised-hackers/</loc>
		<lastmod>2026-01-06T12:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-copilot-prompt-injection-flaws-vulnerabilities-or-ai-limits/</loc>
		<lastmod>2026-01-06T12:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-identity-dark-matter/</loc>
		<lastmod>2026-01-06T12:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rovers-q3-sales-crash-amid-cyber-attack-fallout/</loc>
		<lastmod>2026-01-06T12:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis-2-portal-zur-meldung-von-sicherheitsvorfallen-ist-live/</loc>
		<lastmod>2026-01-06T12:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberabwehr-im-kosten-nutzen-vergleich-selbermachen-oder-outtasken-der-mehrwert-eines-managed-soc/</loc>
		<lastmod>2026-01-06T12:12:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vs-code-forks-recommend-missing-extensions-creating-supply-chain-risk-in-open-vsx/</loc>
		<lastmod>2026-01-06T13:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-2026-sicherheitsrisiko-iot-gerate/</loc>
		<lastmod>2026-01-06T13:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-set-up-azure-trusted-signing-to-sign-an-exe/</loc>
		<lastmod>2026-01-06T13:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-webui-bug-turns-the-free-model-into-an-enterprise-backdoor/</loc>
		<lastmod>2026-01-06T13:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-governments-need-to-treat-fraud-like-cyberwarfare-not-customer-service/</loc>
		<lastmod>2026-01-06T13:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-counterintelligence-cci-when-shiny-objects-trick-shiny-hunters/</loc>
		<lastmod>2026-01-06T13:06:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-booking-emails-redirect-hotel-staff-to-fake-bsod-pages-delivering-dcrat/</loc>
		<lastmod>2026-01-06T13:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-avoid-phishing-incidents-in-2026-a-ciso-guide/</loc>
		<lastmod>2026-01-06T13:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guardrails-make-ai-assisted-development-safer-by-design/</loc>
		<lastmod>2026-01-06T14:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dec-recap-new-aws-privileged-permissions-and-services/</loc>
		<lastmod>2026-01-06T14:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-proxy-server-a-complete-guide-to-types-uses-and-benefits/</loc>
		<lastmod>2026-01-06T14:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-wallet-shop-ledger-confirms-customer-data-lifted-in-global-e-snafu/</loc>
		<lastmod>2026-01-06T14:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-raises-gpu-prices-15-on-a-saturday-hopes-you-werent-paying-attention/</loc>
		<lastmod>2026-01-06T14:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-trends-shaking-up-browsers-soc-automation-appsec/</loc>
		<lastmod>2026-01-06T14:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advisor360-gets-a-handle-on-shadow-ai-via-automation/</loc>
		<lastmod>2026-01-06T14:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mongobleed-bug-under-attack-patch-now/</loc>
		<lastmod>2026-01-06T14:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-new-cyber-unit-to-bolster-defences-against-cyber-threats/</loc>
		<lastmod>2026-01-06T14:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-new-cyber-unit-to-bolster-defences-against-cyber-threats-2/</loc>
		<lastmod>2026-01-06T14:12:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmailify-und-pop-in-gmail-gmail-stellt-efunktionen-fur-drittanbieter-ein/</loc>
		<lastmod>2026-01-06T14:13:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-magician-gefahrliche-sicherheitslucke-in-verbreitetem-ssd-tool/</loc>
		<lastmod>2026-01-06T14:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-ai-risk-awareness-into-robust-ai-governance-kovrr/</loc>
		<lastmod>2026-01-06T15:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-security-safety-why-cloud-monitor-is-worth-the-investment-at-morgan-local-schools/</loc>
		<lastmod>2026-01-06T15:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-windows-bsods-check-in-at-europes-hotels-to-con-staff-into-running-malware/</loc>
		<lastmod>2026-01-06T15:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resecurity-went-on-the-cyber-offensive-when-shiny-objects-trick-shiny-hunters/</loc>
		<lastmod>2026-01-06T15:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudeye-maas-downloader-and-cryptor-infects-over-100000-users-globally/</loc>
		<lastmod>2026-01-06T15:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copilot-recall-and-other-ai-tools-can-be-removed-from-windows-11-with-new-tool/</loc>
		<lastmod>2026-01-06T15:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-office-assistant-to-deliver-malicious-mltab-browser-plugin/</loc>
		<lastmod>2026-01-06T15:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-n8n-vulnerability-allows-attackers-to-execute-arbitrary-commands/</loc>
		<lastmod>2026-01-06T15:10:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-adonisjs-vulnerability-allows-remote-attackers-to-write-files-on-server/</loc>
		<lastmod>2026-01-06T15:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-commodity-loader-in-targeted-email-campaigns-against-organizations/</loc>
		<lastmod>2026-01-06T15:13:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connex-it-partners-with-accuknox-for-zero-trust-cnapp-security-in-southeast-asia-2/</loc>
		<lastmod>2026-01-06T15:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-flaw-allows-tcc-bypass-exposing-sensitive-user-information/</loc>
		<lastmod>2026-01-06T15:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-windsurf-google-antigravity-ides-linked-to-malicious-extension-exposure/</loc>
		<lastmod>2026-01-06T15:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-uses-fake-bsod-to-trick-users-into-running-malicious-code/</loc>
		<lastmod>2026-01-06T15:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-face-a-tighter-insurance-market-in-2026/</loc>
		<lastmod>2026-01-06T15:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detecting-zero-day-vulnerabilities-without-signatures-contrast-security/</loc>
		<lastmod>2026-01-06T16:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-fast-flux-is-harder-to-detect-in-cdn-and-cloud-based-setups/</loc>
		<lastmod>2026-01-06T16:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-flaw-enables-silent-bypass-of-apple-privacy-controls/</loc>
		<lastmod>2026-01-06T16:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-generative-ai-accelerates-identity-attacks-against-active-directory/</loc>
		<lastmod>2026-01-06T16:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-gigantischer-stromausfall-in-berlin-sorgt-fur-angst-um-infrastrukturen/</loc>
		<lastmod>2026-01-06T16:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sedgwick-confirms-breach-at-government-contractor-subsidiary/</loc>
		<lastmod>2026-01-06T16:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-warnt-ki-browser-wie-atlas-konnten-dauerhaft-anfallig-fur-prompt-injection-angriffe-bleiben/</loc>
		<lastmod>2026-01-06T16:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gratis-versprechen-teurer-fehler-hacker-kapert-uber-windows-aktivierungstool-tausende-krypto-transfers/</loc>
		<lastmod>2026-01-06T16:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-genai-leaving-two-thirds-of-security-teams-behind/</loc>
		<lastmod>2026-01-06T17:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-leboncoin-blocks-millions-of-malicious-requests-every-day/</loc>
		<lastmod>2026-01-06T17:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risky-shadow-ai-use-remains-widespread/</loc>
		<lastmod>2026-01-06T17:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-reports-fiscal-q3-sales-slump-following-cyberattack/</loc>
		<lastmod>2026-01-06T17:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-admits-years-of-cyber-policy-have-failed-announces-reset/</loc>
		<lastmod>2026-01-06T17:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrity360-starts-the-year-with-an-acquisition/</loc>
		<lastmod>2026-01-06T17:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-ransomware-attacks-surge-healthcare-must-look-beyond-compliance-to-establish-a-cyber-risk-mindset/</loc>
		<lastmod>2026-01-06T17:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-firmware-flaw-exposes-totolink-ex200-to-full-remote-device-takeover/</loc>
		<lastmod>2026-01-06T17:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-flaw-in-open-webui-affects-ai-connections/</loc>
		<lastmod>2026-01-06T17:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hospitality-sector-hit-by-phaltblyx-clickfix-malware-campaign/</loc>
		<lastmod>2026-01-06T17:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ledger-confirms-global-e-breach-warns-users-of-phishing-attempts/</loc>
		<lastmod>2026-01-06T18:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-admins-targeted-by-renewal-email-phishing-scam/</loc>
		<lastmod>2026-01-06T18:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-will-be-under-unprecedented-attack-in-2026/</loc>
		<lastmod>2026-01-06T18:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-serves-up-fake-blue-screen-of-death/</loc>
		<lastmod>2026-01-06T18:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-chrome-extensions-caught-stealing-chatgpt-and-deepseek-chats-from-900000-users/</loc>
		<lastmod>2026-01-06T18:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-hades-attack-understanding-and-evaluating-manipulation-risks-of-email-blocklists/</loc>
		<lastmod>2026-01-06T19:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-exploiting-the-complexity-of-modern-css-for-email-and-browser-fingerprinting/</loc>
		<lastmod>2026-01-06T19:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-silent-threat-to-the-agentic-enterprise-why-bola-is-the-1-risk-for-ai-agents/</loc>
		<lastmod>2026-01-06T19:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-silent-threat-to-the-agentic-enterprise-why-bola-is-the-1-risk-for-ai-agents-2/</loc>
		<lastmod>2026-01-06T19:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-wholesale-volumes-down-43-after-cyberattack/</loc>
		<lastmod>2026-01-06T19:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-cybersecurity-experts-plead-guilty-to-running-ransomware-operation/</loc>
		<lastmod>2026-01-06T20:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/founder-of-spyware-maker-pctattletale-pleads-guilty-to-hacking-and-advertising-surveillance-software/</loc>
		<lastmod>2026-01-06T20:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitfinex-hack-mastermind-behind-10-billion-theft-gets-early-release/</loc>
		<lastmod>2026-01-06T20:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-critical-dolby-decoder-bug-in-android-january-update/</loc>
		<lastmod>2026-01-06T20:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flare-researchers-analyze-safepay-ransomware-leak-data/</loc>
		<lastmod>2026-01-06T20:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-android-botnet-abuses-residential-proxies-to-infect-internal-devices/</loc>
		<lastmod>2026-01-06T20:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-operators-set-react2shell-flaw-in-their-sights/</loc>
		<lastmod>2026-01-06T21:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/certificate-life-cycle-management-emerging-trends-to-watch-in-2026/</loc>
		<lastmod>2026-01-06T21:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missing-mfa-strikes-again-hacker-hits-collaboration-tools/</loc>
		<lastmod>2026-01-06T21:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/</loc>
		<lastmod>2026-01-06T21:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-snared-in-cyber-researcher-honeypot/</loc>
		<lastmod>2026-01-06T21:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-soc-anxiety-does-more-control-equal-more-complexity/</loc>
		<lastmod>2026-01-06T22:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brightspeed-investigates-breach-as-crims-post-stolen-data-for-sale/</loc>
		<lastmod>2026-01-06T22:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-cc-warns-of-critical-unfixed-vulnerability-in-totolink-ex200/</loc>
		<lastmod>2026-01-06T22:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-bets-on-reasoning-ai-for-self-driving-cars/</loc>
		<lastmod>2026-01-06T22:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-hack-victim-count-soars-by-at-least-50/</loc>
		<lastmod>2026-01-06T22:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-cancels-plans-to-rate-limit-exchange-online-bulk-emails/</loc>
		<lastmod>2026-01-06T22:08:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-cancels-plans-to-rate-limit-exchange-online-bulk-emails-2/</loc>
		<lastmod>2026-01-06T22:08:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-identity-and-credential-risk-questions-for-2026/</loc>
		<lastmod>2026-01-06T23:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-android-powered-tvs-and-streaming-devices-infected-by-kimwolf-botnet/</loc>
		<lastmod>2026-01-06T23:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grok-is-pushing-ai-undressing-mainstream/</loc>
		<lastmod>2026-01-06T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/</loc>
		<lastmod>2026-01-06T23:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-finalizes-new-penalties-for-robocall-violators/</loc>
		<lastmod>2026-01-07T00:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-stromausfall-in-berlin-eco-fordert-zugige-verabschiedung-des-kritis-dachgesetzes/</loc>
		<lastmod>2026-01-07T00:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-europa-die-kontrolle-zuruckgewinnen-kann/</loc>
		<lastmod>2026-01-07T00:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threats-to-critical-infrastructure-expected-to-intensify/</loc>
		<lastmod>2026-01-07T00:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-loses-lead-support-for-biden-era-iot-security-labeling/</loc>
		<lastmod>2026-01-07T00:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-palo-alto-is-eyeing-a-400m-buy-of-endpoint-vendor-koi/</loc>
		<lastmod>2026-01-07T00:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-manage-secrets-in-autonomous-systems-effectively/</loc>
		<lastmod>2026-01-07T01:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-management-vital-for-nhis/</loc>
		<lastmod>2026-01-07T01:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-drive-business-value/</loc>
		<lastmod>2026-01-07T01:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-ghosted-me-for-months-over-8500-bug-bounty-says-researcher/</loc>
		<lastmod>2026-01-07T01:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-machine-identities-secure/</loc>
		<lastmod>2026-01-07T01:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-rolling-out-gpt-5-2-codex-max-for-some-users/</loc>
		<lastmod>2026-01-07T01:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/algorithmic-agility-in-mcp-server-client-cryptographic-negotiation/</loc>
		<lastmod>2026-01-07T05:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-refresh-tokens-complete-implementation-guide-security-best-practices/</loc>
		<lastmod>2026-01-07T05:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-launches-aibas360-ai-powered-breach-attack-simulation-platform-enables-organizations-to-test-defenses-against-real-world-apts-and-threat-actors/</loc>
		<lastmod>2026-01-07T05:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-hat-kein-budget-problem/</loc>
		<lastmod>2026-01-07T05:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-data-poisoning-proposed-as-a-solution-for-ai-theft-threat/</loc>
		<lastmod>2026-01-07T06:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausblick-2026-agentic-ai-und-ki-basierte-angriffe-pragen-cyberresilienz-strategien/</loc>
		<lastmod>2026-01-07T06:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gen-ai-data-violations-more-than-double/</loc>
		<lastmod>2026-01-07T06:05:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-planning-for-2026-is-shifting-under-pressure/</loc>
		<lastmod>2026-01-07T06:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ongoing-attacks-exploiting-critical-rce-vulnerability-in-legacy-d-link-dsl-routers/</loc>
		<lastmod>2026-01-07T06:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-sscs-recognized-by-frostsullivan-in-insights-for-cisos-challenges-and-opportunities-in-the-software-supply-chain-security-space/</loc>
		<lastmod>2026-01-07T07:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bedrohungen-und-risiken-fur-unternehmen-durch-desinformation/</loc>
		<lastmod>2026-01-07T07:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-implicit-identity-authentication-methods/</loc>
		<lastmod>2026-01-07T07:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-agents-interact-risk-can-emerge-without-warning/</loc>
		<lastmod>2026-01-07T07:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-european-security-teams-are-struggling-to-operationalize/</loc>
		<lastmod>2026-01-07T07:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/urban-vpn-proxy-sendet-prompts-an-analytics-server-browser-erweiterungen-zapfen-heimlich-ki-chats-ab/</loc>
		<lastmod>2026-01-07T07:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-things-cisos-cant-afford-to-get-wrong-in-2026/</loc>
		<lastmod>2026-01-07T08:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-panda-zielt-auf-vcenter-und-esxi-so-sichern-unternehmen-vcenter-und-esxi-gegen-versteckte-zugriffe/</loc>
		<lastmod>2026-01-07T08:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-booking-com-lures-and-bsod-scams-spread-dcrat-in-european-hospitality-sector/</loc>
		<lastmod>2026-01-07T09:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-totolink-ex200-flaw-enables-root-level-telnet-access-cert-cc-warns/</loc>
		<lastmod>2026-01-07T09:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-backup-vulnerability-exposes-systems-to-root-level-remote-code-execution/</loc>
		<lastmod>2026-01-07T09:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-cat-hacker-group-uses-fake-notepad-websites-to-distribute-malware-and-steal-data/</loc>
		<lastmod>2026-01-07T09:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-high-risk-webview-vulnerability-that-breaks-security-controls/</loc>
		<lastmod>2026-01-07T09:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-create-fake-docusign-login-page-to-steal-user-credentials/</loc>
		<lastmod>2026-01-07T09:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-demands-openai-hand-over-20m-anonymized-chatgpt-chats-in-ai-copyright-dispute/</loc>
		<lastmod>2026-01-07T09:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sedgwick-acknowledges-data-breach-after-tridentlocker-ransomware-claim/</loc>
		<lastmod>2026-01-07T09:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-routing-misconfigurations-to-successfully-spoof-organizations/</loc>
		<lastmod>2026-01-07T09:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entsorgung-empfohlen-drouter-werden-uber-zero-day-lucke-attackiert/</loc>
		<lastmod>2026-01-07T09:13:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-von-opengear-84-prozent-der-unternehmen-melden-mehr-netzwerkausfalle/</loc>
		<lastmod>2026-01-07T09:13:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-windsurf-und-co-vibe-coding-tools-konnen-usern-malware-empfehlen/</loc>
		<lastmod>2026-01-07T09:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-leaks-chatgpt-and-deepseek-chats-of-900000-users/</loc>
		<lastmod>2026-01-07T09:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-intelligence-how-to-leverage-osint-for-proactive-threat-mitigation/</loc>
		<lastmod>2026-01-07T10:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-knowledge-layer-enterprise-security-architecture-frameworks-for-proprietary-data-integration-with-large-language-models/</loc>
		<lastmod>2026-01-07T10:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-shift-left-of-boom-making-cyberthreat-prevention-practical-again/</loc>
		<lastmod>2026-01-07T10:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entsorgung-empfohlen-laufende-attacken-auf-drouter-uber-zero-day-lucke/</loc>
		<lastmod>2026-01-07T10:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-rolls-out-ios-26-3-security-test-to-beta-users/</loc>
		<lastmod>2026-01-07T10:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-lock-u400-aqara-bringt-turschloss-mit-apple-home-key/</loc>
		<lastmod>2026-01-07T11:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hsbc-app-takes-a-dim-view-of-sideloaded-bitwarden-installations/</loc>
		<lastmod>2026-01-07T11:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploit-critical-rce-flaw-in-legacy-d-link-dsl-routers/</loc>
		<lastmod>2026-01-07T11:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-to-disconnect-brightspeed-customers-after-breach/</loc>
		<lastmod>2026-01-07T11:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-booking-com-emails-and-bsods-used-to-infect-hospitality-staff/</loc>
		<lastmod>2026-01-07T11:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resilienz-durch-fuhrung-kultur-und-realem-lernen-resilienz-entsteht-aus-kultur-technischem-rahmen-und-gelebter-praxis/</loc>
		<lastmod>2026-01-07T11:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-weg-zur-cmmc-compliance/</loc>
		<lastmod>2026-01-07T11:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-misconfigured-email-routing-can-enable-internal-domain-phishing/</loc>
		<lastmod>2026-01-07T11:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-bund-243-millionen-malware-meldungen-an-deutsche-provider/</loc>
		<lastmod>2026-01-07T11:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-bund-243-millionen-malware-meldungen-an-deutsche-provider-2/</loc>
		<lastmod>2026-01-07T11:12:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/selber-hochladen-unter-vier-prozent-nutzen-aktiv-elektronische-patientenakte/</loc>
		<lastmod>2026-01-07T11:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mfa-failure-enables-infostealer-breach-at-50-enterprises/</loc>
		<lastmod>2026-01-07T11:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisco-talos-powers-the-solutions-protecting-your-organization/</loc>
		<lastmod>2026-01-07T12:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debian-seeks-volunteers-to-rebuild-its-data-protection-team/</loc>
		<lastmod>2026-01-07T12:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecommunications-sector-sees-a-four-fold-jump-in-ransomware-attacks-in-last-4-years-report/</loc>
		<lastmod>2026-01-07T12:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-reportedly-getting-ready-to-test-ads-in-chatgpt/</loc>
		<lastmod>2026-01-07T12:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/business-judgement-rule-manager-haftung-bei-cyberangriffen/</loc>
		<lastmod>2026-01-07T12:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybergrooming-gefahrliche-nahe-im-netz/</loc>
		<lastmod>2026-01-07T12:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-a-surge-in-phishing-attacks-exploiting-email-routing-gaps/</loc>
		<lastmod>2026-01-07T13:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-cannot-hire-its-way-through-the-ai-era/</loc>
		<lastmod>2026-01-07T13:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-210m-cyber-action-plan/</loc>
		<lastmod>2026-01-07T13:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-data-breach-hits-company-operating-150-gas-stations-in-the-us/</loc>
		<lastmod>2026-01-07T13:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-announces-plan-to-strengthen-public-sector-cyber-defenses/</loc>
		<lastmod>2026-01-07T13:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rover-wholesale-volumes-plummet-43-in-cyberattack-aftermath/</loc>
		<lastmod>2026-01-07T13:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ministry-of-justice-splurged-50m-on-security-still-missed-legal-aid-agency-cyberattack/</loc>
		<lastmod>2026-01-07T13:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-resolves-cvss-9-0-rce-flaw-and-other-security-issues/</loc>
		<lastmod>2026-01-07T13:12:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-resolves-cvss-9-0-rce-flaw-and-other-security-issues-2/</loc>
		<lastmod>2026-01-07T13:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-resolves-cvss-9-0-rce-flaw-and-other-security-issues-3/</loc>
		<lastmod>2026-01-07T13:12:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-cybersecurity-includes-non-human-employees/</loc>
		<lastmod>2026-01-07T13:13:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-patches-critical-rce-vulnerability-with-cvss-9-0-in-backup-replication/</loc>
		<lastmod>2026-01-07T13:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-zugriff-moglich-kritische-coolify-lucken-gefahrden-14-000-deutsche-server/</loc>
		<lastmod>2026-01-07T13:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnetze-in-deutschland-bsi-meldet-millionen-von-malware-aktivitaten-an-provider/</loc>
		<lastmod>2026-01-07T13:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-warns-of-cvss-10-0-rce-vulnerability-affecting-self-hosted-and-cloud-versions/</loc>
		<lastmod>2026-01-07T13:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-learn-how-ai-powered-zero-trust-detects-attacks-with-no-files-or-indicators/</loc>
		<lastmod>2026-01-07T13:18:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-forces-british-high-school-to-cancel-classes-and-delay-reopening/</loc>
		<lastmod>2026-01-07T14:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-announces-grand-plan-to-secure-online-public-services/</loc>
		<lastmod>2026-01-07T14:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/babys-got-clack-hp-pushes-pca-keyboard-for-businesses-with-hot-desks/</loc>
		<lastmod>2026-01-07T14:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-veeam-vulnerabilities-expose-backup-servers-to-rce-attacks/</loc>
		<lastmod>2026-01-07T14:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-search-ai-hallucinations-push-google-to-hire-ai-answers-quality-engineers/</loc>
		<lastmod>2026-01-07T14:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/personal-llm-accounts-drive-shadow-ai-data-leak-risks/</loc>
		<lastmod>2026-01-07T14:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-threats-themes-for-regional-phishing-campaigns/</loc>
		<lastmod>2026-01-07T15:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owner-of-stalkerware-maker-pctattletale-pleads-guilty-to-hacking/</loc>
		<lastmod>2026-01-07T15:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-hijacking-bedroht-mcp-workflows-in-oatpp-mcp/</loc>
		<lastmod>2026-01-07T15:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-kommt-der-wechsel-zur-praventiven-gefahrenabwehr/</loc>
		<lastmod>2026-01-07T15:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-legitimate-bot-traffic-is-a-growing-security-blind-spot/</loc>
		<lastmod>2026-01-07T15:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australias-scams-framework-criticized-over-major-exclusions/</loc>
		<lastmod>2026-01-07T15:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-office-digital-only-evisa-system-could-be-ruled-unlawful/</loc>
		<lastmod>2026-01-07T15:10:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owncloud-urges-users-to-enable-mfa-after-credential-theft-reports/</loc>
		<lastmod>2026-01-07T15:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddosia-powers-affiliate-driven-hacktivist-attacks/</loc>
		<lastmod>2026-01-07T15:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-intensifies-cyber-attacks-on-taiwan-as-energy-sector-sees-tenfold-spike/</loc>
		<lastmod>2026-01-07T15:13:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-zero-click-schwachstelle-zero-click-angriff-was-ist-ein-zero-click-angriff/</loc>
		<lastmod>2026-01-07T15:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-likely-part-of-military-operation-in-venezuela/</loc>
		<lastmod>2026-01-07T15:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zander-labs-erreicht-durchbruch-in-der-gehirnschnittstellen-technologie/</loc>
		<lastmod>2026-01-07T15:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-sicher-bezahlen-funktion-bei-paypal-betrug-auf-kleinanzeigen/</loc>
		<lastmod>2026-01-07T15:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fingerprints-beyond-device-ids-engineered-representations-for-fraud-detection/</loc>
		<lastmod>2026-01-07T16:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-attacks-expected-to-ramp-up-in-ai-perfect-storm/</loc>
		<lastmod>2026-01-07T16:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-open-webui-macht-kostenlos-tool-zur-backdoor/</loc>
		<lastmod>2026-01-07T16:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-issues-patch-to-close-critical-remote-code-execution-flaw/</loc>
		<lastmod>2026-01-07T16:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-ransomware-bedrohung-zielt-auf-deutsche-unternehmen/</loc>
		<lastmod>2026-01-07T16:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-eliminate-it-blind-spots-in-the-modern-ai-driven-enterprise/</loc>
		<lastmod>2026-01-07T16:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-eliminate-it-blind-spots-in-the-modern-ai-driven-enterprise-2/</loc>
		<lastmod>2026-01-07T16:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-if-linux-ran-windows%c2%a6-and-meant-it-meet-loss32/</loc>
		<lastmod>2026-01-07T16:10:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lone-hacker-used-infostealers-to-access-data-at-50-global-companies/</loc>
		<lastmod>2026-01-07T16:11:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/misconfigured-email-routing-enables-internal-spoofed-phishing/</loc>
		<lastmod>2026-01-07T16:12:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-for-the-age-of-autonomous-ai-agents-part-1/</loc>
		<lastmod>2026-01-07T16:13:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-scraps-exchange-online-spam-clamp-after-customers-cry-foul/</loc>
		<lastmod>2026-01-07T16:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-cvss-10-0-allows-unauthenticated-attackers-to-take-full-control/</loc>
		<lastmod>2026-01-07T16:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lack-of-mfa-is-common-thread-in-vast-cloud-credential-heist/</loc>
		<lastmod>2026-01-07T16:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-skills-gap-2025-report-ki-allein-kann-das-skill-gap-in-der-cybersecurity-nicht-fullen/</loc>
		<lastmod>2026-01-07T16:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reverse-dns-mismatch-fix-smtp-banner-errors/</loc>
		<lastmod>2026-01-07T17:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-asks-public-for-help-securing-ai-agents/</loc>
		<lastmod>2026-01-07T17:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-cyber-scam-kingpin-arrested-extradited-to-china/</loc>
		<lastmod>2026-01-07T17:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-2026-hackers-want-ai-threat-intel-on-vibe-hacking-hackgpt/</loc>
		<lastmod>2026-01-07T17:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/classic-outlook-bug-prevents-opening-encrypted-emails/</loc>
		<lastmod>2026-01-07T17:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/900000-users-hit-as-chrome-extensions-steal-ai-chat-data/</loc>
		<lastmod>2026-01-07T17:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-macos-flaw-lets-attackers-bypass-apple-privacy-controls-without-consent/</loc>
		<lastmod>2026-01-07T17:09:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-tap-malware-fuels-surge-in-remote-nfc-payment-fraud/</loc>
		<lastmod>2026-01-07T17:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-unterstutzt-nun-google-cloud-network-security-integration/</loc>
		<lastmod>2026-01-07T17:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stalkerware-slinger-pleads-guilty-for-selling-snooper-software-to-suspicious-spouses/</loc>
		<lastmod>2026-01-07T18:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-poison-stolen-data-to-make-ai-systems-return-wrong-results/</loc>
		<lastmod>2026-01-07T18:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-blames-chinese-cyber-army-for-rise-in-millions-of-daily-intrusion-attempts/</loc>
		<lastmod>2026-01-07T18:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1m-customer-records-allegedly-stolen-in-brightspeed-breach/</loc>
		<lastmod>2026-01-07T18:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/</loc>
		<lastmod>2026-01-07T18:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versatile-malware-loader-pkr_mtsi-delivers-diverse-payloads/</loc>
		<lastmod>2026-01-07T18:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-deep-fakes-think-like-the-attacker/</loc>
		<lastmod>2026-01-07T19:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-changes-the-risk-model-for-application-security/</loc>
		<lastmod>2026-01-07T19:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-automatic-insecurity-exploring-email-auto-configuration-in-the-wild/</loc>
		<lastmod>2026-01-07T19:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poison-pill-defense-protects-proprietary-ai-data-from-theft/</loc>
		<lastmod>2026-01-07T19:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/txp-snaps-up-vigil/</loc>
		<lastmod>2026-01-07T19:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-options-g-hub-macos-apps-break-after-certificate-expires-2/</loc>
		<lastmod>2026-01-07T19:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-options-g-hub-macos-apps-break-after-certificate-expires/</loc>
		<lastmod>2026-01-07T19:09:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-options-g-hub-macos-apps-break-after-certificate-expires-3/</loc>
		<lastmod>2026-01-07T19:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-cat-behind-seo-poisoning-malware-campaign-targeting-popular-software-searches/</loc>
		<lastmod>2026-01-07T19:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-fishing/</loc>
		<lastmod>2026-01-07T20:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-deliver-nodecordrat/</loc>
		<lastmod>2026-01-07T20:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-deliver-nodecordrat-2/</loc>
		<lastmod>2026-01-07T20:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/humanthe-loop-vs-autonomous-development-for-enterprise-software/</loc>
		<lastmod>2026-01-07T20:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-risk-governance-suite-for-enterprise-oversight-kovrr/</loc>
		<lastmod>2026-01-07T20:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-flaw-allows-full-takeover-of-n8n-ai-workflow-platform/</loc>
		<lastmod>2026-01-07T20:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stalkerware-operator-pleads-guilty-in-rare-prosecution/</loc>
		<lastmod>2026-01-07T20:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-enables-authenticated-rce/</loc>
		<lastmod>2026-01-07T20:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orthopedic-practice-pays-500k-settlement-to-nys-in-hack/</loc>
		<lastmod>2026-01-07T21:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deception-tech-snares-shiny-hunter-attackers-ip-address/</loc>
		<lastmod>2026-01-07T21:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-using-malicious-qr-codes-for-phishing-via-html-table/</loc>
		<lastmod>2026-01-07T21:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-allows-authenticated-remote-code-execution/</loc>
		<lastmod>2026-01-07T21:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-packer-pkr_mtsi-powers-widespread-malvertising-campaigns-with-multiple-malware/</loc>
		<lastmod>2026-01-07T21:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crazyhunter-ransomware-targets-healthcare-sector-using-sophisticated-evasion-tactics/</loc>
		<lastmod>2026-01-07T21:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-use-nfc-enabled-android-malware-to-steal-payment-information/</loc>
		<lastmod>2026-01-07T21:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/totolink-ex200-extender-flaw-allows-attackers-full-system-access/</loc>
		<lastmod>2026-01-07T21:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-google-cloud-services-to-steal-microsoft-365-credentials/</loc>
		<lastmod>2026-01-07T21:13:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toddycat-malware-exploits-proxylogon-to-compromise-microsoft-exchange-servers/</loc>
		<lastmod>2026-01-07T21:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-5-0-unveils-advanced-encryption-and-enhanced-anti-analysis-techniques/</loc>
		<lastmod>2026-01-07T21:14:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-launch-ongoing-attacks-on-taiwans-critical-infrastructure/</loc>
		<lastmod>2026-01-07T21:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-airline-iberia-attributes-recent-data-breach-claims-to-november-incident/</loc>
		<lastmod>2026-01-07T22:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-state-agency-exposed-personal-data-of-700000-people/</loc>
		<lastmod>2026-01-07T22:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fda-takes-hands-off-approach-to-ai-devices-and-software/</loc>
		<lastmod>2026-01-07T22:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orca-wiz-end-dueling-lawsuits-over-cloud-security-patents/</loc>
		<lastmod>2026-01-07T22:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-flatlines-in-fy-2026-justice-commerce-spending-bill/</loc>
		<lastmod>2026-01-07T22:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/900000-users-hit-as-malicious-chrome-extensions-steal-chatgpt-deepseek-chats/</loc>
		<lastmod>2026-01-07T22:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-is-losing-market-share-as-google-gemini-gains-ground/</loc>
		<lastmod>2026-01-07T22:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-zero-day-in-end-of-life-d-link-routers/</loc>
		<lastmod>2026-01-07T23:12:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishers-exploit-office-365-users-who-let-their-guard-down/</loc>
		<lastmod>2026-01-07T23:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-capable-are-nhis-in-managing-complex-networks/</loc>
		<lastmod>2026-01-07T23:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-scalable-are-secret-management-methods-for-nhis/</loc>
		<lastmod>2026-01-07T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-is-your-data-with-agentic-ai/</loc>
		<lastmod>2026-01-07T23:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovations-are-shaping-agentic-ai-today/</loc>
		<lastmod>2026-01-07T23:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-multifaceted-study-on-the-use-of-tls-and-auto-detect-in-email-ecosystems/</loc>
		<lastmod>2026-01-07T23:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibms-ai-agent-bob-easily-duped-to-run-malware-researchers-show/</loc>
		<lastmod>2026-01-07T23:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ni8mare-flaw-gives-unauthenticated-control-of-n8n-instances/</loc>
		<lastmod>2026-01-07T23:09:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grok-is-generating-sexual-content-far-more-graphic-than-whats-on-x/</loc>
		<lastmod>2026-01-07T23:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/</loc>
		<lastmod>2026-01-07T23:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-rush-to-warn-defenders-of-max-severity-defect-in-n8n/</loc>
		<lastmod>2026-01-08T00:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkoms-monitor-digitalpolitik-jedes-zweite-digitalvorhaben-auf-den-weg-gebracht/</loc>
		<lastmod>2026-01-08T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-portal-ab-sofort-fur-zweiten-schritt-zur-nis-2-registrierung-freigeschaltet/</loc>
		<lastmod>2026-01-08T00:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-chatgpt-wont-use-your-health-information-to-train-its-models/</loc>
		<lastmod>2026-01-08T00:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/</loc>
		<lastmod>2026-01-08T00:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hits-a-claims-giant-what-the-sedgwick-breach-reveals-about-modern-extortion-attacks/</loc>
		<lastmod>2026-01-08T04:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-single-browser-flaw-millions-at-risk-what-the-chrome-webview-vulnerability-teaches-us-about-exposure-windows/</loc>
		<lastmod>2026-01-08T04:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/holes-in-veeam-backup-suite-allow-remote-code-execution-creation-of-malicious-backup-config-files/</loc>
		<lastmod>2026-01-08T04:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-faces-2-6-million-cyberattacks-daily-from-china/</loc>
		<lastmod>2026-01-08T04:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-449-how-to-scam-someone-in-seven-days/</loc>
		<lastmod>2026-01-08T04:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-scam-kingpin-chen-zhi-extradited-to-china-after-cambodia-arrest/</loc>
		<lastmod>2026-01-08T04:08:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-durable-integrity-verification-for-machine-to-machine-model-contexts/</loc>
		<lastmod>2026-01-08T05:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-erzielt-100-erkennung-und-100-schutz-in-den-bislang-anspruchsvollsten-mitre-attck-enterprise-evaluations/</loc>
		<lastmod>2026-01-08T05:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-wichtigsten-ciso-trends-fur-2026/</loc>
		<lastmod>2026-01-08T05:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/humongous-52-inch-dell-monitor-will-make-you-feel-like-king-of-the-internet-with-four-screens-in-one/</loc>
		<lastmod>2026-01-08T05:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-are-where-pci-dss-compliance-often-breaks-down/</loc>
		<lastmod>2026-01-08T06:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voice-cloning-defenses-are-easier-to-undo-than-expected/</loc>
		<lastmod>2026-01-08T06:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-predictions-are-a-window-into-a-vendors-roadmap-and-business-priorities/</loc>
		<lastmod>2026-01-08T07:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anzahl-der-phishing-kits-hat-sich-im-jahr-2025-verdoppelt/</loc>
		<lastmod>2026-01-08T07:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-insurer-prosura-confirms-cyber-incident-takes-online-services-offline-amid-investigation/</loc>
		<lastmod>2026-01-08T07:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-pours-cold-water-on-bgp-weirdness-preceded-us-attack-on-venezuela-theory/</loc>
		<lastmod>2026-01-08T07:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stackrox-open-source-kubernetes-security-platform/</loc>
		<lastmod>2026-01-08T07:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-to-insider-risk-when-ai-becomes-a-coworker/</loc>
		<lastmod>2026-01-08T07:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-microsoft-office-and-hpe-oneview-bugs-as-actively-exploited/</loc>
		<lastmod>2026-01-08T07:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/typosquatting-schleust-wallet-stealer-in-nuget-projekte-nuget-trojaner-stiehlt-krypto-wallets-uber-net-projekte/</loc>
		<lastmod>2026-01-08T07:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-ki-und-supply-chains-pragen-die-cyberlage-2026-verlangt-digitales-vertrauen-mit-ki-sicheren-identitaten/</loc>
		<lastmod>2026-01-08T08:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-scaling-phishing-attacks-with-ready-made-kits/</loc>
		<lastmod>2026-01-08T08:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cyber-threats-to-your-ai-systems-and-infrastructure/</loc>
		<lastmod>2026-01-08T08:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-schalter-umlegen-von-der-reaktion-zur-pravention/</loc>
		<lastmod>2026-01-08T09:03:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/</loc>
		<lastmod>2026-01-08T09:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-patches-multiple-flaws-allowing-arbitrary-code-execution/</loc>
		<lastmod>2026-01-08T09:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-n8n-vulnerability-cve-2026-21858-allows-unauthenticated-file-access-and-rce/</loc>
		<lastmod>2026-01-08T09:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluedelta-hackers-target-microsoft-owa-google-and-sophos-vpn-to-steal-credentials/</loc>
		<lastmod>2026-01-08T09:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-malicious-npm-packages-target-developers-login-credentials/</loc>
		<lastmod>2026-01-08T09:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ipfire-update-brings-new-network-and-security-features-to-firewall-deployments/</loc>
		<lastmod>2026-01-08T09:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owncloud-warns-users-to-enable-mfa-after-credential-theft-incident/</loc>
		<lastmod>2026-01-08T09:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-poison-stolen-data-to-sabotage-ai-model-accuracy/</loc>
		<lastmod>2026-01-08T09:11:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-gobruteforcer-botnet-campaign-threatens-50000-linux-servers/</loc>
		<lastmod>2026-01-08T09:12:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-vmware-esxi-vulnerabilities-using-zero-day-toolset/</loc>
		<lastmod>2026-01-08T09:13:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-vmware-esxi-vulnerabilities-using-zero-day-toolset-2/</loc>
		<lastmod>2026-01-08T09:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-battery-utility-vulnerability-allows-authentication-bypass-and-system-tampering/</loc>
		<lastmod>2026-01-08T09:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wasabi-covert-copy-unsichtbare-backups-fur-hot-cloud-storage/</loc>
		<lastmod>2026-01-08T09:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-chatgpt-health-with-isolated-encrypted-health-data-controls/</loc>
		<lastmod>2026-01-08T09:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dringend-mfa-aktivieren-massenhaft-daten-aus-cloud-instanzen-abgeflossen/</loc>
		<lastmod>2026-01-08T09:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-email-scam-how-it-worked-before-the-fix/</loc>
		<lastmod>2026-01-08T10:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/logitech-macos-mouse-mayhem-traced-to-expired-dev-certificate/</loc>
		<lastmod>2026-01-08T10:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-groups-intensify-attacks-on-taiwans-critical-infrastructure-nsb-warns/</loc>
		<lastmod>2026-01-08T10:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/</loc>
		<lastmod>2026-01-08T10:06:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximum-severity-ni8mare-bug-lets-hackers-hijack-n8n-servers/</loc>
		<lastmod>2026-01-08T11:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nas-im-unternehmenseinsatz-synology-apps-starken-sicherheit-und-betrieb-auf-dem-nas/</loc>
		<lastmod>2026-01-08T11:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-goldgrube-wie-sich-per-datei-upload-ganze-n8n-instanzen-kapern-lassen/</loc>
		<lastmod>2026-01-08T11:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-gap-between-sre-and-security-a-unified-framework-for-modern-reliability/</loc>
		<lastmod>2026-01-08T12:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-7290-targets-high-value-telecommunications-infrastructure-in-south-asia/</loc>
		<lastmod>2026-01-08T12:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximum-severity-n8n-flaw-lets-randos-run-your-automation-server/</loc>
		<lastmod>2026-01-08T12:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-putting-bandaids-on-bandaids-as-prompt-injection-problems-keep-festering/</loc>
		<lastmod>2026-01-08T12:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-hpe-oneview-and-microsoft-office-powerpoint-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-08T12:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-released-for-unauthenticated-rce-in-trend-micro-apex-central-cve-2025-69258/</loc>
		<lastmod>2026-01-08T12:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-ise-security-vulnerability-after-public-poc-exploit-release/</loc>
		<lastmod>2026-01-08T12:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-nodecordrat-hidden-in-npm-bitcoin-themed-packages/</loc>
		<lastmod>2026-01-08T12:10:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-to-leave-global-forum-on-cyber-expertise/</loc>
		<lastmod>2026-01-08T12:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coolify-discloses-11-critical-flaws-enabling-full-server-compromise-on-self-hosted-instances/</loc>
		<lastmod>2026-01-08T12:13:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coolify-discloses-11-critical-flaws-enabling-full-server-compromise-on-self-hosted-instances-2/</loc>
		<lastmod>2026-01-08T12:13:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zeit-fur-eine-neue-perspektive-nicht-die-firewalls-versagen-sondern-die-verwaltung-und-prozesse-dahinter/</loc>
		<lastmod>2026-01-08T12:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-data-security-into-the-defining-msp-opportunity-of-2026/</loc>
		<lastmod>2026-01-08T13:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-umsetzung-neues-bsi-portal-geht-an-den-start/</loc>
		<lastmod>2026-01-08T13:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-jspdf-vulnerability-enables-arbitrary-file-read-in-node-js-deployments/</loc>
		<lastmod>2026-01-08T13:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-taps-dh-to-drive-smb-midmarket-cybersecurity-sales-growth/</loc>
		<lastmod>2026-01-08T13:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-regulators-swarm-x-after-grok-generated-nudes-from-photos/</loc>
		<lastmod>2026-01-08T13:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-enforce-mfa-for-microsoft-365-admin-center-sign-ins/</loc>
		<lastmod>2026-01-08T13:08:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-trusted-open-source/</loc>
		<lastmod>2026-01-08T13:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fifth-of-breaches-take-two-weeks-to-recover-from/</loc>
		<lastmod>2026-01-08T13:11:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzung-bsi-schaltet-meldeportal-auf-amazon-servern-frei/</loc>
		<lastmod>2026-01-08T13:12:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-announces-withdrawal-from-dozens-of-international-treaties/</loc>
		<lastmod>2026-01-08T14:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-bleibt-skeptiker-in-puncto-cloud-speicher/</loc>
		<lastmod>2026-01-08T14:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-erneut-leader-in-g2-winter-grid-reports-fur-security-awareness-training-und-incident-response/</loc>
		<lastmod>2026-01-08T14:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-sichert-ki-fabriken-mit-nvidia/</loc>
		<lastmod>2026-01-08T14:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/relevante-cybersecurity-entwicklungen-2026/</loc>
		<lastmod>2026-01-08T14:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pctattletale-founder-bryan-fleming-pleads-guilty-in-federal-stalkerware-case/</loc>
		<lastmod>2026-01-08T14:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-online-outage-blocks-access-to-mailboxes-via-imap4/</loc>
		<lastmod>2026-01-08T14:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-rustfs-flaw-iranian-ops-webui-rce-cloud-leaks-and-12-more-stories/</loc>
		<lastmod>2026-01-08T14:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-sicherheitslucken-android-schwachstellen-ist-ihr-smartphone-sicher/</loc>
		<lastmod>2026-01-08T14:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neujahrsputz-und-vorsatze-schwachstellen-management-mit-dem-bsi-grundschutz/</loc>
		<lastmod>2026-01-08T14:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neujahrsputz-und-vorsatze-schwachstellen-management-mit-dem-bsi-grundschutz-2/</loc>
		<lastmod>2026-01-08T14:13:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-starkt-marketingfuhrung-genefa-murphy-ubernimmt-cmo-rolle/</loc>
		<lastmod>2026-01-08T14:15:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-starkt-marketingfuhrung-genefa-murphy-ubernimmt-cmo-rolle-2/</loc>
		<lastmod>2026-01-08T14:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-warnt-40-prozent-der-deutschen-zimbra-server-sind-angreifbar/</loc>
		<lastmod>2026-01-08T14:16:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-falls-to-new-data-pilfering-attack-as-a-vicious-cycle-in-ai-continues/</loc>
		<lastmod>2026-01-08T15:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-angreifer-setzen-vermehrt-auf-e-mail-routing-lucken/</loc>
		<lastmod>2026-01-08T15:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musk-is-playing-with-fire-all-the-legal-risks-that-apply-to-groks-deepfake-disaster/</loc>
		<lastmod>2026-01-08T15:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-actively-exploited-office-relic-alongside-fresh-hpe-flaw/</loc>
		<lastmod>2026-01-08T15:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-chatgpt-and-deepseek-extensions-spied-on-over-1-million-chrome-users/</loc>
		<lastmod>2026-01-08T15:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jumpcloud-grows-presence-in-brazil-with-msp-macsolution-buy/</loc>
		<lastmod>2026-01-08T15:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50000-servers-exposed-as-gobruteforcer-scales-brute-force-attacks/</loc>
		<lastmod>2026-01-08T15:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recently-fixed-hpe-oneview-flaw-is-being-exploited-cve-2025-37164/</loc>
		<lastmod>2026-01-08T15:11:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-attacks-exploit-misconfigured-email-routing-settings-to-target-microsoft-365-users/</loc>
		<lastmod>2026-01-08T15:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-scam-kingpin-chen-zhi-arrives-in-china-after-extradition-from-colombia/</loc>
		<lastmod>2026-01-08T15:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-scam-kingpin-chen-zhi-arrives-in-china-after-extradition-from-colombia-2/</loc>
		<lastmod>2026-01-08T15:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ping-identity-erhoht-sicherheitsstandard-zero-knowledge-biometrie-fur-das-ki-zeitalter/</loc>
		<lastmod>2026-01-08T15:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology/</loc>
		<lastmod>2026-01-08T16:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-automate-safe-removal-of-unused-code/</loc>
		<lastmod>2026-01-08T16:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-boardroom-case-for-penetration-testing/</loc>
		<lastmod>2026-01-08T16:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-at-the-edge-securing-rugged-iot-in-mission-critical-environments/</loc>
		<lastmod>2026-01-08T16:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-at-the-edge-securing-rugged-iot-in-mission-critical-environments-2/</loc>
		<lastmod>2026-01-08T16:11:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyera-adds-400m-in-funding-brings-valuation-to-9b/</loc>
		<lastmod>2026-01-08T16:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-cyber-directorate-gets-new-acting-leadership/</loc>
		<lastmod>2026-01-08T16:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-boost-identity-security-for-ai-agents-with-sgnl-acquisition/</loc>
		<lastmod>2026-01-08T16:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-kept-climbing-in-2025-as-gangs-refused-to-stay-dead/</loc>
		<lastmod>2026-01-08T16:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-snort-3-security-flaws-threaten-network-inspection/</loc>
		<lastmod>2026-01-08T16:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-scam-kingpin-chen-zhi-arrives-in-china-after-extradition-from-cambodia/</loc>
		<lastmod>2026-01-08T16:18:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-uat-7290-targets-telecoms-with-linux-malware-and-orb-nodes/</loc>
		<lastmod>2026-01-08T16:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-for-2026-the-cyber-threats-you-cant-ignore/</loc>
		<lastmod>2026-01-08T16:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-malware-mutationen-und-neue-interfaces-vier-cybertrends-pragen-2026-von-ki-agenten-bis-hirn-interfaces/</loc>
		<lastmod>2026-01-08T16:21:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise/</loc>
		<lastmod>2026-01-08T17:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity/</loc>
		<lastmod>2026-01-08T17:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moodys-forecasts-growing-ai-threats-regulatory-friction-for-2026/</loc>
		<lastmod>2026-01-08T17:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cios-can-brace-for-ai-fueled-cyberthreats/</loc>
		<lastmod>2026-01-08T17:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-leadership-lessons-from-channel-women-in-security/</loc>
		<lastmod>2026-01-08T17:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-dont-guess-and-defenders-shouldnt-either/</loc>
		<lastmod>2026-01-08T17:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-controlled-nodecordrat-steals-chrome-data-via-npm-packages/</loc>
		<lastmod>2026-01-08T17:11:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/public-poc-prompts-cisco-patch-for-ise-ise-pic-vulnerability/</loc>
		<lastmod>2026-01-08T17:12:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bbc-bitesize-launches-media-literacy-series-to-help-teens-separate-fact-from-fiction-online/</loc>
		<lastmod>2026-01-08T17:13:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-uat-7290-targets-telecom-networks-in-south-asia/</loc>
		<lastmod>2026-01-08T17:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-leaking-api-keys-the-backend-for-frontend-bff-pattern-explained/</loc>
		<lastmod>2026-01-08T18:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/embracing-uncertainty-with-ai-agents-vulnerability-assessment-using-pydantic-ai/</loc>
		<lastmod>2026-01-08T18:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-sonicwall-channel-chief-michelle-ragusa-mcbain-joins-corero-network-security/</loc>
		<lastmod>2026-01-08T18:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-pulls-us-out-of-international-cyber-orgs/</loc>
		<lastmod>2026-01-08T18:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-health-department-exposed-over-700000-residents-personal-data-for-years/</loc>
		<lastmod>2026-01-08T18:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-health-department-exposed-over-700000-residents-personal-data-for-years-2/</loc>
		<lastmod>2026-01-08T18:09:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-man-jailed-after-fbi-traced-1100-ip-addresses-in-cyberstalking-case/</loc>
		<lastmod>2026-01-08T18:10:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-alleged-fraud-kingpin-deported-to-china/</loc>
		<lastmod>2026-01-08T18:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-ise-flaw-lets-admins-access-restricted-system-files/</loc>
		<lastmod>2026-01-08T18:12:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-court-blocks-samsung-from-collecting-smart-tv-viewing-data/</loc>
		<lastmod>2026-01-08T18:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-oauth-attack-lets-hackers-bypass-microsoft-entra-authentication-and-steal-keys/</loc>
		<lastmod>2026-01-08T18:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-docusign-themed-phishing-scam-delivers-stealth-malware-to-windows-devices/</loc>
		<lastmod>2026-01-08T18:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-signals-possible-cyber-involvement-in-caracas-power-loss-during-maduro-extraction/</loc>
		<lastmod>2026-01-08T18:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-ise-vulnerability-enables-access-to-sensitive-data/</loc>
		<lastmod>2026-01-08T18:18:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-health-a-new-secure-space-for-trusted-health-and-medical-conversations/</loc>
		<lastmod>2026-01-08T18:19:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-snort-3-vulnerability-leading-to-sensitive-data-disclosure/</loc>
		<lastmod>2026-01-08T18:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-launches-cyber-action-plan-to-bolster-public-sector-security/</loc>
		<lastmod>2026-01-08T18:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-vulnerability-hit-by-8-1-million-attack-attempts/</loc>
		<lastmod>2026-01-08T18:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-china-breached-email-systems-used-by-u-s-congressional-staff/</loc>
		<lastmod>2026-01-08T18:23:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-attackers-hide-processes-by-abusing-kernel-patch-protection/</loc>
		<lastmod>2026-01-08T18:25:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-worm-spreads-astaroth-banking-trojan-across-brazil-via-contact-auto-messaging/</loc>
		<lastmod>2026-01-08T18:26:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gobruteforcer-botnet-targets-linux-servers/</loc>
		<lastmod>2026-01-08T18:27:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zero-click-attack-lets-chatgpt-user-steal-data/</loc>
		<lastmod>2026-01-08T18:28:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creating-a-safe-learning-environment-in-k-12-schools-without-adding-complexity/</loc>
		<lastmod>2026-01-08T19:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2-faces-of-ai-how-emerging-models-empower-and-endanger-cybersecurity/</loc>
		<lastmod>2026-01-08T19:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2-faces-of-ai-how-emerging-models-empower-and-endanger-cybersecurity-2/</loc>
		<lastmod>2026-01-08T19:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-health-feature-draws-concern-from-privacy-critics-over-sensitive-medical-data/</loc>
		<lastmod>2026-01-08T19:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-collapses-in-iran-amid-protests-over-economic-crisis/</loc>
		<lastmod>2026-01-08T19:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-cisco-ise-bug-now-before-attackers-abuse-proofconcept-exploit/</loc>
		<lastmod>2026-01-08T19:08:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/britain-debuts-early-revamp-of-government-cyber-action-plan/</loc>
		<lastmod>2026-01-08T19:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-buy-identity-startup-sgnl-for-nearly-740m/</loc>
		<lastmod>2026-01-08T20:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resolutions-shmesolutions-and-whats-actually-worked-for-me/</loc>
		<lastmod>2026-01-08T20:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critics-pan-spyware-maker-nsos-transparency-claims-amid-its-push-to-enter-us-market/</loc>
		<lastmod>2026-01-08T20:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gendigital-research-exposes-aurastealer-infostealer-tactics/</loc>
		<lastmod>2026-01-08T20:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-the-future-of-work-5-predictions-for-2026/</loc>
		<lastmod>2026-01-08T20:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-what-cloud-securitys-future-holds-for-the-year-ahead/</loc>
		<lastmod>2026-01-08T20:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-acquires-sgnl-for-740-million-to-thwart-ai-powered-cyber-threats/</loc>
		<lastmod>2026-01-08T21:03:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-implement-multi-user-testing-in-dast-real-world-examples/</loc>
		<lastmod>2026-01-08T21:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-users-urged-to-patch-cvss-10-0-full-system-takeover-vulnerability/</loc>
		<lastmod>2026-01-08T21:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/astaroth-banking-trojan-spreads-in-brazil-via-whatsapp-worm/</loc>
		<lastmod>2026-01-08T21:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-switches-hit-by-reboot-loops-due-to-dns-client-bug/</loc>
		<lastmod>2026-01-08T21:08:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-court-blocks-samsung-from-tracking-tv-viewing-then-vacates-order/</loc>
		<lastmod>2026-01-08T21:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/135-surge-inside-the-holiday-bot-attacks-of-december-2025/</loc>
		<lastmod>2026-01-08T22:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-fim-add-ons-arent-integrity-monitoring-why-edr-still-isnt-enough/</loc>
		<lastmod>2026-01-08T22:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cppa-fines-data-broker-selling-lists-of-alzheimers-patients/</loc>
		<lastmod>2026-01-08T22:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/astaroth-banking-trojan-targets-brazilians-via-whatsapp-messages/</loc>
		<lastmod>2026-01-08T22:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-firewalls-headed-for-obsolesce/</loc>
		<lastmod>2026-01-08T22:07:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-esxi-zero-days-likely-exploited-a-year-before-disclosure/</loc>
		<lastmod>2026-01-08T22:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpts-memory-feature-supercharges-prompt-injection/</loc>
		<lastmod>2026-01-08T22:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/michigan-man-learns-the-hard-way-that-catch-a-cheater-spyware-apps-arent-legal/</loc>
		<lastmod>2026-01-08T23:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-sunsets-10-emergency-directives-thanks-to-evolution-of-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-08T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-agents-run-amok-crowdstrikes-740m-sgnl-deal-aims-to-help-get-a-grip-on-identity-security/</loc>
		<lastmod>2026-01-08T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-health-top-privacy-security-governance-concerns/</loc>
		<lastmod>2026-01-08T23:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximum-severity-hpe-oneview-flaw-exploited-in-the-wild/</loc>
		<lastmod>2026-01-08T23:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-chrome-extensions-steal-900k-users-data/</loc>
		<lastmod>2026-01-08T23:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-vercels-sleep-deprived-race-to-contain-react2shell/</loc>
		<lastmod>2026-01-09T00:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-rat-an-unternehmen-2026-von-reaktion-zur-pravention-wechseln/</loc>
		<lastmod>2026-01-09T00:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyera-secures-400m-series-f-to-lead-in-agentic-ai-security/</loc>
		<lastmod>2026-01-09T00:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-retaliation-risks-rise-after-us-venezuela-operation/</loc>
		<lastmod>2026-01-09T00:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detect-and-respond-faster-with-elastic-tines/</loc>
		<lastmod>2026-01-09T00:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-china-linked-hackers-breach-telcos-using-edge-device-exploits/</loc>
		<lastmod>2026-01-09T00:08:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-about-kimsuky-hackers-using-qr-codes-to-phish-u-s-orgs/</loc>
		<lastmod>2026-01-09T00:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xai-teases-major-grok-upgrade-hints-at-grok-code-cli/</loc>
		<lastmod>2026-01-09T00:10:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-be-trusted-with-sensitive-data/</loc>
		<lastmod>2026-01-09T04:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-adapt-to-changing-security-needs/</loc>
		<lastmod>2026-01-09T04:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-being-proactive-with-nhis-critical/</loc>
		<lastmod>2026-01-09T04:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-latest-trends-in-nhis-security/</loc>
		<lastmod>2026-01-09T04:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-mcp-servers-at-scale-how-to-govern-ai-agents-with-an-enterprise-identity-fabric/</loc>
		<lastmod>2026-01-09T04:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform/</loc>
		<lastmod>2026-01-09T04:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-identifies-vulnerability-in-ise-network-access-control-devices/</loc>
		<lastmod>2026-01-09T04:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluedelta-espionage-russian-hackers-abuse-free-apps-to-target-energy-sector/</loc>
		<lastmod>2026-01-09T04:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuv-verband-zum-stromausfall-in-berlin-deutschlands-infrastruktur-braucht-mehr-resilienz/</loc>
		<lastmod>2026-01-09T04:11:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-speaking-hackers-exploited-esxi-zero-days-long-before-disclosure/</loc>
		<lastmod>2026-01-09T04:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-agent-who-reportedly-shot-renee-good-was-a-firearms-trainer-per-testimony/</loc>
		<lastmod>2026-01-09T04:13:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmails-new-ai-inbox-uses-gemini-but-google-says-it-wont-train-ai-on-user-emails/</loc>
		<lastmod>2026-01-09T04:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passkeys-an-overview/</loc>
		<lastmod>2026-01-09T05:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-still-arent-getting-iam-right/</loc>
		<lastmod>2026-01-09T05:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linus-torvalds-stop-making-an-issue-out-of-ai-slop-in-kernel-docs-youre-not-changing-anybodys-mind/</loc>
		<lastmod>2026-01-09T05:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-retires-10-emergency-cyber-orders-in-rare-bulk-closure/</loc>
		<lastmod>2026-01-09T05:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/personal-data-of-thousands-stolen-in-attack-on-london-councils/</loc>
		<lastmod>2026-01-09T06:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/campaigners-urge-uk-to-develop-digital-sovereignty-strategy/</loc>
		<lastmod>2026-01-09T06:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-will-happen-with-starmers-digital-id-scheme-in-2026/</loc>
		<lastmod>2026-01-09T06:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/like-it-or-not-ai-will-transform-cyber-strategy-in-2026/</loc>
		<lastmod>2026-01-09T06:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/labour-mp-josh-simons-to-lead-digital-id-scheme/</loc>
		<lastmod>2026-01-09T06:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-docker-hardened-images-challenge-chainguard/</loc>
		<lastmod>2026-01-09T06:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-evolution-tightens-focus-on-access-control/</loc>
		<lastmod>2026-01-09T06:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ghost-tap-attack-hijacks-android-phones-to-drain-bank-accounts/</loc>
		<lastmod>2026-01-09T06:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-mandates-mfa-for-microsoft-365-admin-center-access/</loc>
		<lastmod>2026-01-09T06:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scim-provisioning-explained-automating-user-lifecycle-management-with-sso/</loc>
		<lastmod>2026-01-09T07:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grauer-schwan-acht-plausible-szenarien-mit-potenziell-hohem-cyberrisiko/</loc>
		<lastmod>2026-01-09T07:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-trackercontrol-lets-android-users-see-whos-tracking-them/</loc>
		<lastmod>2026-01-09T07:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gestohlene-iam-keys-starten-krypto-mining-direkt-in-aws-klau-reicht-angreifer-starten-mining-in-aws-ohne-jede-lucke/</loc>
		<lastmod>2026-01-09T07:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-teams-are-paying-more-attention-to-the-energy-cost-of-detection/</loc>
		<lastmod>2026-01-09T07:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-agents-are-turning-security-inside-out/</loc>
		<lastmod>2026-01-09T08:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-north-korean-hackers-using-malicious-qr-codes-in-spear-phishing/</loc>
		<lastmod>2026-01-09T08:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wormgpt-und-kawaiigpt-senken-einstiegshurden-fur-angreifer-ki-modelle-fur-cyberangriffe-beschleunigen-angriffsketten/</loc>
		<lastmod>2026-01-09T08:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-rethink-reveal-the-threat-of-electromagnetic-interference-on-power-inverters/</loc>
		<lastmod>2026-01-09T09:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funk-von-kritischer-infrastruktur-leicht-abhorbar/</loc>
		<lastmod>2026-01-09T09:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-penetration-testing-tools-process-and-importance/</loc>
		<lastmod>2026-01-09T09:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-penetration-testing-tools-process-and-importance-2/</loc>
		<lastmod>2026-01-09T09:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/january-2026-patch-tuesday-forecast-and-so-it-continues/</loc>
		<lastmod>2026-01-09T09:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-dns-crash-triggers-reboot-loops-across-cisco-small-business-switches/</loc>
		<lastmod>2026-01-09T09:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-dns-crash-triggers-reboot-loops-across-cisco-small-business-switches-2/</loc>
		<lastmod>2026-01-09T09:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-fernzugriff-ohne-agent-teamviewer-ermoglicht-agentenlosen-remote-zugriff-auf-industrieanlagen/</loc>
		<lastmod>2026-01-09T09:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/17-millionen-rezepte-datenpanne-bei-dr-ansay-betrifft-unzahlige-kunden/</loc>
		<lastmod>2026-01-09T09:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/berliner-stromausfall-physische-sabotage-beginnt-digital/</loc>
		<lastmod>2026-01-09T10:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pctattletale-founder-pleads-guilty-in-rare-stalkerware-prosecution/</loc>
		<lastmod>2026-01-09T10:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sans-institute-sieht-2026-als-jahr-der-vertrauenskrise-in-digitale-services/</loc>
		<lastmod>2026-01-09T10:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-und-nvidia-sorgen-fur-schutz-der-gesamten-ki-lieferkette/</loc>
		<lastmod>2026-01-09T10:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dns-fehler-unzahlige-cisco-switches-plotzlich-in-bootschleife-gefangen/</loc>
		<lastmod>2026-01-09T10:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/17-millionen-rezepte-datenpanne-bei-dr-ansay-betrifft-hunderttausende-kunden/</loc>
		<lastmod>2026-01-09T10:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grok-told-to-cover-up-as-uk-weighs-action-over-ai-undressing/</loc>
		<lastmod>2026-01-09T11:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-security-firm-cyera-raises-400m-hits-9b-valuation/</loc>
		<lastmod>2026-01-09T11:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-uat-7290-spies-on-telco-in-south-asia-and-europe-using-modular-malware/</loc>
		<lastmod>2026-01-09T11:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-warns-of-critical-apex-central-rce-vulnerability/</loc>
		<lastmod>2026-01-09T11:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrlich-echt-voice-cloning-betrugsanrufe/</loc>
		<lastmod>2026-01-09T11:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-stuffing-so-gefahrlich-ist-die-mehrfachnutzung-von-passwortern-immer-noch/</loc>
		<lastmod>2026-01-09T11:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-masche-beim-wohnungsbetrug/</loc>
		<lastmod>2026-01-09T11:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krypto-betrug-mit-ki-deepfakes-ein-anleger-verliert-fast-alles/</loc>
		<lastmod>2026-01-09T11:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-retires-10-emergency-cybersecurity-directives-issued-between-2019-and-2024/</loc>
		<lastmod>2026-01-09T11:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-north-korean-qr-phishing-campaigns/</loc>
		<lastmod>2026-01-09T11:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-north-korean-qr-phishing-campaigns-2/</loc>
		<lastmod>2026-01-09T11:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inkaufe-im-blick/</loc>
		<lastmod>2026-01-09T11:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-apex-central-rce-flaw-scores-9-8-cvss-in-on-prem-windows-versions/</loc>
		<lastmod>2026-01-09T11:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenzugang-und-portabilitat-erhohen-sicherheitsanforderungen-data-act-und-dsgvo-verlangen-abgestimmte-schutzmasnahmen/</loc>
		<lastmod>2026-01-09T11:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welche-gefahren-von-geparkten-domains-ausgehen/</loc>
		<lastmod>2026-01-09T11:18:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stromausfall-in-berlin-wie-sicher-ist-unsere-kritische-infrastruktur/</loc>
		<lastmod>2026-01-09T11:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kolner-gutachten-stellt-microsoft-nutzung-infrage-kurzungen-bei-familien-milliarden-fur-microsoft/</loc>
		<lastmod>2026-01-09T12:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-teaming-als-eckpfeiler-der-ki-compliance/</loc>
		<lastmod>2026-01-09T12:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-vier-jahre-haft-cyberstalker-belastigt-freundin-uber-50-rufnummern/</loc>
		<lastmod>2026-01-09T12:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ccpa-compliance-checklist-for-2026-what-you-need-to-know/</loc>
		<lastmod>2026-01-09T12:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-schools-hacktivists-and-national-cyber-overhauls/</loc>
		<lastmod>2026-01-09T12:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-billion-pig-butchering-scam-boss-chen-zhi-extradited-to-china/</loc>
		<lastmod>2026-01-09T12:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-firewalls-headed-for-obsolescence/</loc>
		<lastmod>2026-01-09T12:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-truman-show-operation-industrializes-investment-fraud/</loc>
		<lastmod>2026-01-09T12:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-acquire-sgnl-for-740m-expanding-real-time-identity-security/</loc>
		<lastmod>2026-01-09T13:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-acquire-sgnl-for-740m-expanding-real-time-identity-security-2/</loc>
		<lastmod>2026-01-09T13:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welche-gefahren-von-geparkten-domains-ausgehen-2/</loc>
		<lastmod>2026-01-09T13:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-max-severity-bug-in-hpe-oneview-amid-active-exploitation/</loc>
		<lastmod>2026-01-09T13:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-teaming-als-eckpfeiler-der-ki-compliance-2/</loc>
		<lastmod>2026-01-09T13:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gehirnschnittstelle-neurotechnologie-mit-echtzeit-erkennung-mentaler-zustande/</loc>
		<lastmod>2026-01-09T13:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-betruger-bauen-komplette-schein-investoren-community-um-ihre-opfer-herum-auf/</loc>
		<lastmod>2026-01-09T13:10:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-betruger-bauen-komplette-schein-investoren-community-um-ihre-opfer-herum-auf-2/</loc>
		<lastmod>2026-01-09T13:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-cuts-internet-nationwide-amid-deadly-protest-crackdown/</loc>
		<lastmod>2026-01-09T13:11:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-predictions-2026-the-hype-we-can-ignore-and-the-risks-we-cant/</loc>
		<lastmod>2026-01-09T13:12:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-economic-forum-deepfake-face-swapping-tools-are-creating-critical-security-risks/</loc>
		<lastmod>2026-01-09T13:13:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-it-sicherheit-ki-agenten-mit-der-lizenz-zum-angreifen/</loc>
		<lastmod>2026-01-09T13:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzentwurf-von-justizministerin-hubig-adressen-sollen-drei-monate-gespeichert-bleiben/</loc>
		<lastmod>2026-01-09T13:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-definitive-guide-to-iso-42001/</loc>
		<lastmod>2026-01-09T14:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peekboo-dy-emoji-smuggling-and-modern-llms-firetail-blog/</loc>
		<lastmod>2026-01-09T14:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peekboo-dy-emoji-smuggling-and-modern-llms-firetail-blog-2/</loc>
		<lastmod>2026-01-09T14:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide/</loc>
		<lastmod>2026-01-09T14:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-7-biggest-challenges-in-2026/</loc>
		<lastmod>2026-01-09T14:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ni8mare-kritische-n8n-lucke-bedroht-100-000-server/</loc>
		<lastmod>2026-01-09T14:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-cybercrims-abused-vmware-esxi-zero-days-a-year-before-disclosure/</loc>
		<lastmod>2026-01-09T14:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-opens-consultation-on-eu-digital-ecosystems/</loc>
		<lastmod>2026-01-09T14:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-leads-global-crackdown-on-black-axe-cybercrime-gang-34-arrested/</loc>
		<lastmod>2026-01-09T14:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-cybergrooming-gefahrliche-nahe-im-netz/</loc>
		<lastmod>2026-01-09T14:13:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-nsa-insider-kosiba-brought-back-as-spy-agencys-no-2/</loc>
		<lastmod>2026-01-09T15:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-man-charged-with-hacking-snapchat-accounts-to-steal-nude-photos/</loc>
		<lastmod>2026-01-09T15:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnets-breaches-and-critical-flaws-define-this-week-in-cybersecurity/</loc>
		<lastmod>2026-01-09T15:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notorious-russian-apt-nabs-credentials-from-global-targets/</loc>
		<lastmod>2026-01-09T15:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-buy-sgnl-to-expand-identity-security-capabilities/</loc>
		<lastmod>2026-01-09T15:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-behind-wired-com-leak-now-selling-full-40m-conda-nast-records/</loc>
		<lastmod>2026-01-09T16:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mistral-ai-wins-french-military-deal/</loc>
		<lastmod>2026-01-09T16:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-crs-flaw-lets-encoded-attacks-slip-past-wafs/</loc>
		<lastmod>2026-01-09T16:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-didnt-fix-groks-undressing-problem-it-just-makes-people-pay-for-it/</loc>
		<lastmod>2026-01-09T16:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-council-cyber-attack-exposes-personal-data-and-highlights-risks-of-shared-public-sector-it/</loc>
		<lastmod>2026-01-09T16:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-department-of-human-services-data-breach-affects-700k-people/</loc>
		<lastmod>2026-01-09T16:08:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-fancy-bear-apt-doubles-down-on-global-secrets-theft/</loc>
		<lastmod>2026-01-09T16:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-security-needs-more-seatbelts-why-click-rate-is-the-wrong-metric/</loc>
		<lastmod>2026-01-09T16:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/termine-2026-wann-ist-microsoft-patchday/</loc>
		<lastmod>2026-01-09T16:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-weak-link-in-compliance-isnt-code-its-communication/</loc>
		<lastmod>2026-01-09T17:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere/</loc>
		<lastmod>2026-01-09T17:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-deception-is-here-what-security-teams-must-do-now/</loc>
		<lastmod>2026-01-09T17:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telecom-sector-sees-steady-rise-in-ransomware-attacks/</loc>
		<lastmod>2026-01-09T17:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rocket-report-a-new-super-heavy-launch-site-in-california-2025-year-in-review/</loc>
		<lastmod>2026-01-09T17:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inform-2026-mitres-updated-threat-informed-defense-maturity-model-explained/</loc>
		<lastmod>2026-01-09T17:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/at-least-26-million-in-crypto-stolen-from-truebit-platform-as-crypto-crime-landscape-evolves/</loc>
		<lastmod>2026-01-09T17:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/putinswap-france-trades-alleged-ransomware-crook-for-conflict-researcher/</loc>
		<lastmod>2026-01-09T17:11:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qr-codes-a-powerful-new-phishing-weapon-in-hands-of-pyongyang-cyberspies/</loc>
		<lastmod>2026-01-09T17:12:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-apt28-runs-credential-stealing-campaign-targeting-energy-and-policy-organizations/</loc>
		<lastmod>2026-01-09T17:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radware-discloses-zombieagent-technique-to-compromise-ai-agents/</loc>
		<lastmod>2026-01-09T18:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/use-of-xmrig-cryptominer-by-threat-actors-expanding-expel/</loc>
		<lastmod>2026-01-09T18:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonicwall-vet-jason-carter-assumes-role-of-global-channel-chief/</loc>
		<lastmod>2026-01-09T18:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-call-on-app-stores-to-remove-grok-x-over-sexualized-deepfakes/</loc>
		<lastmod>2026-01-09T18:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-rest-in-2026-as-patch-alerts-amass-for-cisco-hpe-and-n8n/</loc>
		<lastmod>2026-01-09T18:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-requires-rethink-of-cloud-security-strategy/</loc>
		<lastmod>2026-01-09T18:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-launches-jetbrains-extension/</loc>
		<lastmod>2026-01-09T18:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-introduces-teams-external-collaboration-administrator-role/</loc>
		<lastmod>2026-01-09T18:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fog-ransomware-targets-u-s-organizations-via-compromised-vpn-credentials/</loc>
		<lastmod>2026-01-09T18:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fog-ransomware-targets-u-s-organizations-via-compromised-vpn-credentials-2/</loc>
		<lastmod>2026-01-09T18:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xrat-malware-targets-windows-users-via-fake-adult-game/</loc>
		<lastmod>2026-01-09T18:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-ways-to-learn-everything-about-investing-in-bitcoin/</loc>
		<lastmod>2026-01-09T18:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-crs-vulnerability-enables-charset-validation-bypass/</loc>
		<lastmod>2026-01-09T18:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-over-240-exploits-ahead-of-ransomware-attacks/</loc>
		<lastmod>2026-01-09T18:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50-best-free-cyber-threat-intelligence-tools-2026/</loc>
		<lastmod>2026-01-09T18:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-acquires-identity-security-startup-sgnl-in-740-million-deal/</loc>
		<lastmod>2026-01-09T18:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-initial-access-markets-in-ransomware-campaigns-targeting-australia-and-new-zealand/</loc>
		<lastmod>2026-01-09T18:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-apex-central-flaw-enable-remote-code-execution-attacks/</loc>
		<lastmod>2026-01-09T18:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world/</loc>
		<lastmod>2026-01-09T19:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-apex-central-flaws-enable-remote-code-execution/</loc>
		<lastmod>2026-01-09T19:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illicit-crypto-economy-surges-as-nation-states-join-in-the-fray/</loc>
		<lastmod>2026-01-09T19:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/basketball-player-arrested-for-alleged-ransomware-ties-freed-in-russia-france-prisoner-swap/</loc>
		<lastmod>2026-01-09T20:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dems-pressure-google-apple-to-drop-x-app-as-international-regulators-turn-up-heat/</loc>
		<lastmod>2026-01-09T20:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-fixed-a-remote-code-execution-in-apex-central/</loc>
		<lastmod>2026-01-09T20:05:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-deployments-targeted-in-91000-attack-sessions/</loc>
		<lastmod>2026-01-09T20:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-exploit-vmware-esxi-zero-days-to-escape-virtual-machines/</loc>
		<lastmod>2026-01-09T20:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-is-your-soc-ai-ready-plan-the-journey/</loc>
		<lastmod>2026-01-09T21:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-ai-agents-can-teach-us-about-nhi-governance/</loc>
		<lastmod>2026-01-09T21:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hegseth-gabbard-tap-tim-kosiba-as-nsa-deputy-director-after-months-of-cyber-leadership-tumult/</loc>
		<lastmod>2026-01-09T21:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-powered-cyber-defense-is-no-longer-optional-for-modern-businesses/</loc>
		<lastmod>2026-01-09T21:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maestro-toolkit-exploiting-vmware-vm-escape-vulnerabilities/</loc>
		<lastmod>2026-01-09T21:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-tapped-turns-android-phones-into-fraud-payment-relays/</loc>
		<lastmod>2026-01-09T21:08:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-may-soon-allow-it-admins-to-uninstall-copilot/</loc>
		<lastmod>2026-01-09T21:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-misconfigured-proxies-to-access-paid-llm-services/</loc>
		<lastmod>2026-01-09T21:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-ghostshot-manipulating-the-image-of-ccd-cameras-with-electromagnetic-interference/</loc>
		<lastmod>2026-01-09T22:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-frameworks-for-ai-results-a-practical-guide-for-leaders-and-product-teams/</loc>
		<lastmod>2026-01-09T22:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-apples/</loc>
		<lastmod>2026-01-09T22:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-hackers-are-fighting-back-against-ice-surveillance-tech/</loc>
		<lastmod>2026-01-09T22:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-chatbots-provoke-unease-in-ai-governance-analysts/</loc>
		<lastmod>2026-01-09T22:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-notifies-700000-of-misconfiguration-breach/</loc>
		<lastmod>2026-01-09T23:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-typhoon-hackers-hit-congressional-emails-in-new-breach/</loc>
		<lastmod>2026-01-09T23:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-fraud-tools-are-lagging-behind-expectations/</loc>
		<lastmod>2026-01-09T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zombieagent-chatgpt-attack-shows-persistent-data-leak-risks-of-ai-agents/</loc>
		<lastmod>2026-01-10T00:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-lack-of-mfa-keeps-fueling-cloud-data-breaches/</loc>
		<lastmod>2026-01-10T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-adds-real-time-identity-control-with-sgnl-deal/</loc>
		<lastmod>2026-01-10T00:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-areas-of-convergence-for-it-ot-security-in-energy-sector/</loc>
		<lastmod>2026-01-10T00:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-tests-a-new-feature-to-find-jobs-improve-your-resume-and-more/</loc>
		<lastmod>2026-01-10T00:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-agentic-ai-systems-ensuring-compliance/</loc>
		<lastmod>2026-01-10T04:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-roles-do-agentic-ai-play-in-innovation/</loc>
		<lastmod>2026-01-10T04:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-impenetrable-are-modern-secret-defenses/</loc>
		<lastmod>2026-01-10T04:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-empower-secure-cloud-environments/</loc>
		<lastmod>2026-01-10T04:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tonic-ai-product-updates-january-2026/</loc>
		<lastmod>2026-01-10T04:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doomsday-for-cybercriminals-data-breach-of-major-dark-web-forum/</loc>
		<lastmod>2026-01-10T04:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-migration-und-identity-security-digitale-transformation-benutzerfreundlichkeit-und-sicherheit-sind-vereinbar/</loc>
		<lastmod>2026-01-10T04:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heftiger-wintereinbruch-in-deutschland-bitkom-gibt-tipps-zum-schutz-des-smartphones-bei-kalte/</loc>
		<lastmod>2026-01-10T04:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boffins-probe-commercial-ai-models-find-an-entire-harry-potter-book/</loc>
		<lastmod>2026-01-10T04:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-department-of-human-services-idhs-suffered-a-data-breach-that-impacted-700k-individuals/</loc>
		<lastmod>2026-01-10T04:12:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-browser-security-flaws-pose-growing-risk/</loc>
		<lastmod>2026-01-10T04:13:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-viral-claude-banned-and-reported-to-authorities-message-isnt-real/</loc>
		<lastmod>2026-01-10T04:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-maduro-arrest-news-to-spread-backdoor-malware/</loc>
		<lastmod>2026-01-10T06:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-privileged-access-management-solutions-for-2026/</loc>
		<lastmod>2026-01-10T08:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-ist-zentral-doch-it-dienstleister-setzen-sie-zu-selten-an-die-erste-stelle/</loc>
		<lastmod>2026-01-10T09:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-arrests-34-black-axe-members-in-spain-over-euro5-9m-fraud-and-organized-crime/</loc>
		<lastmod>2026-01-10T10:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investment-scam-mit-falscher-investoren-community-mittels-ki/</loc>
		<lastmod>2026-01-10T11:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-recalls-almost-13000-passports-over-missing-irl-code/</loc>
		<lastmod>2026-01-10T11:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-generierte-finanz-profis-locken-anleger-in-die-falle/</loc>
		<lastmod>2026-01-10T11:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-act-eu-kommission-will-hartes-verbot-von-huawei/</loc>
		<lastmod>2026-01-10T11:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-windows-media-player-stops-serving-up-cd-album-info/</loc>
		<lastmod>2026-01-10T12:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-news-this-week-ice-can-now-spy-on-every-phone-in-your-neighborhood/</loc>
		<lastmod>2026-01-10T12:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-launches-rustywater-rat-via-spear-phishing-across-middle-east-sectors/</loc>
		<lastmod>2026-01-10T12:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lohnabrechnungen-falsch-verschickt-dsgvo-vorfall-bei-der-datev/</loc>
		<lastmod>2026-01-10T12:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-application-security-testing-detail-explanation/</loc>
		<lastmod>2026-01-10T13:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-can-now-spy-on-every-phone-in-your-neighborhood/</loc>
		<lastmod>2026-01-10T13:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leading-game-art-studios-in-ukraine-for-global-developers-2026/</loc>
		<lastmod>2026-01-10T15:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-emergency-patching-for-actively-exploited-hpe-oneview-flaw/</loc>
		<lastmod>2026-01-10T15:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundeskanzleramt-bnd-gesetz-soll-internetuberwachung-ausweiten/</loc>
		<lastmod>2026-01-10T15:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grosbritannien-plant-totaluberwachung-von-smartphones-pflicht-scanning-direkt-im-betriebssystem/</loc>
		<lastmod>2026-01-10T17:03:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korealinked-apt-kimsuky-behind-quishing-attacks-fbi-warns/</loc>
		<lastmod>2026-01-10T17:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-arrests-34-suspects-linked-to-black-axe-cyber-crime/</loc>
		<lastmod>2026-01-10T17:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debian-goes-retro-with-a-spatial-desktop-that-time-forgot/</loc>
		<lastmod>2026-01-10T18:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-instagram-data-breach-exposes-personal-details-of-17-5-million-users/</loc>
		<lastmod>2026-01-10T18:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-incident-response-timelines-and-reporting-rules/</loc>
		<lastmod>2026-01-10T19:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/database-of-323986-breachforums-users-leaked-as-admin-disputes-scope/</loc>
		<lastmod>2026-01-10T19:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-hacking-forum-database-leaked-exposing-324000-accounts/</loc>
		<lastmod>2026-01-10T19:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel/</loc>
		<lastmod>2026-01-10T23:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-massive-breach-exposed-data-of-17-5m-instagram-users/</loc>
		<lastmod>2026-01-10T23:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stay-ahead-with-agentic-ai-in-cybersecurity/</loc>
		<lastmod>2026-01-11T00:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-the-handling-of-nhis-getting-better/</loc>
		<lastmod>2026-01-11T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-agentic-ai-for-critical-system-operations/</loc>
		<lastmod>2026-01-11T00:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-certain-can-we-be-about-nhis-reliability/</loc>
		<lastmod>2026-01-11T00:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/18-security-forum-der-th-brandenburg-unternehmenssicherheit-compliance-und-resilienz-im-fokus/</loc>
		<lastmod>2026-01-11T00:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-umfrage-zu-social-commerce-3-von-10-nutzern-kaufen-uber-soziale-netzwerke-ein/</loc>
		<lastmod>2026-01-11T04:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-is-retiring-send-to-kindle-in-word/</loc>
		<lastmod>2026-01-11T04:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-beim-online-banking-bsi-warnt-vor-zunehmenden-angriffen-von-betrugern/</loc>
		<lastmod>2026-01-11T05:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicher-zahlen-mit-paypal-neue-betrugsmasche-bei-kleinanzeigen/</loc>
		<lastmod>2026-01-11T05:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-proofing-your-it-cyber-career-the-human-only-capabilities-that-matter/</loc>
		<lastmod>2026-01-11T08:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-of-englands-oracle-cloud-migration-bill-triples-as-project-grinds-on/</loc>
		<lastmod>2026-01-11T09:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-poc-for-trend-micro-apex-central-rce-released-patch-tuesday-forecast/</loc>
		<lastmod>2026-01-11T10:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-raids-disrupt-black-axe-cybercrime-ring-in-spain/</loc>
		<lastmod>2026-01-11T11:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-missbrauchen-fernwartungstools-bluevoyant-deckt-rmm-kampagne-auf/</loc>
		<lastmod>2026-01-11T11:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ces-2026-worst-in-show-ai-girlfriends-a-fridge-that-wont-open-unless-you-talk-to-it-and-more/</loc>
		<lastmod>2026-01-11T12:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-79/</loc>
		<lastmod>2026-01-11T12:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-558-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-01-11T12:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/altes-datenleck-passwort-reset-attacken-gegen-instagram-nutzer/</loc>
		<lastmod>2026-01-11T14:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monero-zieht-an-weil-privatsphare-unter-druck-gerat/</loc>
		<lastmod>2026-01-11T16:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ideals-of-aaron-swartz-in-an-age-of-control/</loc>
		<lastmod>2026-01-11T17:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-instagram-data-scare-ties-17-5m-accounts-to-leak-but-meta-denies-breach/</loc>
		<lastmod>2026-01-11T18:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-popular-cybersecurity-blogs-from-2025/</loc>
		<lastmod>2026-01-11T18:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/generative-ai-in-enterprises-security-risks-most-companies-are-not-measuring/</loc>
		<lastmod>2026-01-11T19:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-denies-breach-amid-claims-of-17-million-account-data-leak/</loc>
		<lastmod>2026-01-11T20:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-bans-data-broker-reselling-health-data-of-millions/</loc>
		<lastmod>2026-01-11T20:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-protected-are-your-secrets-in-hybrid-environments/</loc>
		<lastmod>2026-01-11T23:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-nhi-management-strategy-scalable/</loc>
		<lastmod>2026-01-11T23:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovative-approaches-exist-for-agentic-ai-security/</loc>
		<lastmod>2026-01-11T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-reduce-the-burden-of-compliance/</loc>
		<lastmod>2026-01-11T23:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-says-theres-been-no-breach-despite-password-reset-requests/</loc>
		<lastmod>2026-01-11T23:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagrams-17-million-user-data-leak-was-just-scraped-records-from-2022/</loc>
		<lastmod>2026-01-11T23:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-informationsfreiheit-2025-rheinland-pfalz-lfdi-meldet-284-falle-sieben-beanstandungen-und-ein-jubilaum/</loc>
		<lastmod>2026-01-12T00:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kmu-fitness-fur-nis-2-universitat-paderborn-bietet-online-tool-und-lernplattform-zur-starkung-der-cybersicherheit/</loc>
		<lastmod>2026-01-12T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rustywater-rising-muddywater-drops-powershell-for-stealthy-rust-implants/</loc>
		<lastmod>2026-01-12T04:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-actor-uat-7290-caught-targeting-telecoms-in-south-asia-and-europe/</loc>
		<lastmod>2026-01-12T04:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-government-denies-it-plans-to-demand-smartphone-source-code/</loc>
		<lastmod>2026-01-12T05:03:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eus-chat-control-could-put-government-monitoring-inside-robots/</loc>
		<lastmod>2026-01-12T06:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/downtime-pushes-resilience-planning-into-security-operations/</loc>
		<lastmod>2026-01-12T06:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-penguin-platform-sells-pig-butchering-kits-pii-and-stolen-accounts/</loc>
		<lastmod>2026-01-12T06:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zlib-flaw-let-attackers-can-trigger-a-buffer-overflow-via-untgz/</loc>
		<lastmod>2026-01-12T06:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edrstartuphinder-blocks-antivirus-edr-at-windows-11-25h2-startup-defender-included/</loc>
		<lastmod>2026-01-12T06:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-kritis-iso-und-dora-verlasslich-einhalten-wie-digitale-zwillinge-die-it-compliance-sichern/</loc>
		<lastmod>2026-01-12T07:03:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canopy-health-confirms-cyberattack-patients-not-notified-for-six-months/</loc>
		<lastmod>2026-01-12T07:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pfsense-open-source-firewall-and-routing-platform/</loc>
		<lastmod>2026-01-12T07:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-teams-can-learn-from-torrent-metadata/</loc>
		<lastmod>2026-01-12T07:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-inputplumber-flaw-enables-ui-input-injection-and-denialservice/</loc>
		<lastmod>2026-01-12T07:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-28-unique-ips-and-85-domains-hosting-carding-markets/</loc>
		<lastmod>2026-01-12T07:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trotz-kritik-und-moglicher-sicherheitsrisiken-microsoft-treibt-agentenbasiertes-windows-11-weiter-voran/</loc>
		<lastmod>2026-01-12T07:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-top-10-cybersecurity-priorities-for-2026/</loc>
		<lastmod>2026-01-12T08:03:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-top-10-cybersecurity-priorities-for-2026-2/</loc>
		<lastmod>2026-01-12T08:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-ot-security-for-project-heavy-shipyards/</loc>
		<lastmod>2026-01-12T08:06:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-employee-performance-reports-deliver-guloader-malware/</loc>
		<lastmod>2026-01-12T08:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-group-everest-allegedly-claims-nissan-motor-breach/</loc>
		<lastmod>2026-01-12T08:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-crisis-von-rubrik-zero-labs-ki-agenten-bedrohung-durch-nicht-menschliche-identitaten-nehmen-zu/</loc>
		<lastmod>2026-01-12T08:09:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierte-vs-konventionelle-mikrosegmentierung-die-komplexitat-uberwinden/</loc>
		<lastmod>2026-01-12T09:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kyowon-group-confirms-cyberattack-as-multiple-systems-go-offline/</loc>
		<lastmod>2026-01-12T09:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-service-providers-fueling-industrial-scale-pig-butchering-fraud/</loc>
		<lastmod>2026-01-12T09:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/index-digitale-souveranitat-von-adesso-digitale-souveranitat-vier-von-funf-unternehmen-sind-ohne-strategie/</loc>
		<lastmod>2026-01-12T09:07:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/were-hiring-hacking-groups-recruit-teens-while-feds-want-to-ground-them/</loc>
		<lastmod>2026-01-12T10:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-cronos-leader-gets-nod-from-king-charles/</loc>
		<lastmod>2026-01-12T10:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dobrindt-mehr-kooperation-mit-israel-fur-sicherheit-deutschlands/</loc>
		<lastmod>2026-01-12T10:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/debian-13-3-is-now-available-with-targeted-corrections-updates/</loc>
		<lastmod>2026-01-12T10:07:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-crime-hits-record-levels-as-state-actors-move-billions/</loc>
		<lastmod>2026-01-12T10:08:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminal-crypto-transactions-surge-to-2025-high/</loc>
		<lastmod>2026-01-12T10:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-brings-claude-to-healthcare-with-hipaa-ready-enterprise-tools/</loc>
		<lastmod>2026-01-12T10:10:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-apache-struts-2-flaw-could-let-attackers-steal-sensitive-data/</loc>
		<lastmod>2026-01-12T10:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/valleyrat_s2-stealth-intrusions-aimed-at-financial-data-exfiltration/</loc>
		<lastmod>2026-01-12T10:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-react-router-flaws-could-let-attackers-access-or-modify-server-files/</loc>
		<lastmod>2026-01-12T10:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-launches-claude-ai-for-healthcare-with-secure-health-record-access/</loc>
		<lastmod>2026-01-12T10:14:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-database-leak-turns-the-tables-on-threat-actors/</loc>
		<lastmod>2026-01-12T10:15:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entscheidungsfrist-bis-ende-2026-eu-plant-den-usa-zugriff-auf-biometrische-daten-zu-gewahren/</loc>
		<lastmod>2026-01-12T10:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-insider-preview-admins-konnen-copilot-app-per-richtlinie-entfernen/</loc>
		<lastmod>2026-01-12T10:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turkish-security-researcher-gets-nod-from-nasa-over-vulnerability-discoveries/</loc>
		<lastmod>2026-01-12T11:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stop-insider-driven-data-loss-in-browser-sessions/</loc>
		<lastmod>2026-01-12T11:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberbedrohungen-nehmen-zum-jahresende-deutlich-zu/</loc>
		<lastmod>2026-01-12T11:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-muddywater-apt-deploys-rust-based-implant-in-latest-campaign/</loc>
		<lastmod>2026-01-12T11:07:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-the-us-adopting-the-gray-zone-cyber-playbook/</loc>
		<lastmod>2026-01-12T11:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tories-vow-to-boot-under-16s-off-social-media-and-ban-phones-in-schools/</loc>
		<lastmod>2026-01-12T11:09:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-harvesting-attacks-by-apt28-hit-turkish-european-and-central-asian-organizations/</loc>
		<lastmod>2026-01-12T11:10:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intersec-dubai-highlights-why-ai-has-become-critical-in-the-race-against-cyber-attackers/</loc>
		<lastmod>2026-01-12T11:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-fraud-network-behind-euro593-million-in-losses-dismantled-in-spain/</loc>
		<lastmod>2026-01-12T11:12:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-calls-for-calm-amidst-instagram-password-reset-panic/</loc>
		<lastmod>2026-01-12T11:13:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illicit-crypto-activity-hits-record-158bn-in-2025/</loc>
		<lastmod>2026-01-12T11:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-rolle-der-isc2-chapter-vernetzung-als-katalysator-fur-cybersicherheitskompetenz/</loc>
		<lastmod>2026-01-12T11:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italien-gegen-cloudflare-rekordstrafe-wegen-unterlassener-dns-sperren/</loc>
		<lastmod>2026-01-12T11:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-it-admins-durfen-copilot-wohl-bald-per-richtlinie-entfernen/</loc>
		<lastmod>2026-01-12T11:17:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprunghafter-anstieg-web-bedrohungen-legen-um-82-prozent-zu-malware-angriffe-um-28-prozent/</loc>
		<lastmod>2026-01-12T12:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-hack-35-milliarden-konten-auslesbar-warum-ihre-mobil-telefonnummer-ein-echtes-risiko-ist/</loc>
		<lastmod>2026-01-12T12:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/there-was-no-data-breach-instagram-says/</loc>
		<lastmod>2026-01-12T12:05:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-connects-to-more-healthcare-data-under-security-oversight/</loc>
		<lastmod>2026-01-12T12:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-der-sps-bis-zum-scada-system-die-funf-grosten-othurden-und-wie-sie-sich-uberwinden-lassen/</loc>
		<lastmod>2026-01-12T12:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/piracy-shield-rekordstrafe-fur-cloudflare-wegen-unterlassener-dns-sperren/</loc>
		<lastmod>2026-01-12T12:08:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-defines-shield-framework-to-secure-vibecoding/</loc>
		<lastmod>2026-01-12T13:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-target-the-n8n-automation-platform-in-a-supply-chain-attack/</loc>
		<lastmod>2026-01-12T13:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ofcom-officially-investigating-x-as-groks-nudify-button-stays-switched-on/</loc>
		<lastmod>2026-01-12T13:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-industry-insiders-launch-site-to-poison-the-data-that-feeds-them/</loc>
		<lastmod>2026-01-12T13:07:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brussels-plots-open-source-push-to-pry-europe-off-big-tech/</loc>
		<lastmod>2026-01-12T13:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-opcopro-scam-uses-ai-and-fake-whatsapp-groups-to-defraud-victim/</loc>
		<lastmod>2026-01-12T13:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rapid7-increases-focus-on-compliance/</loc>
		<lastmod>2026-01-12T13:10:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/where-the-channel-is-going-in-2026/</loc>
		<lastmod>2026-01-12T13:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uaes-ventureone-to-deploy-secure-autonomy-technologies-in-europe-through-unikie-and-solita-partners/</loc>
		<lastmod>2026-01-12T13:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/israeli-cybersecurity-startup-torq-gets-140m-funding-to-hit-1-2b-valuation/</loc>
		<lastmod>2026-01-12T13:13:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gobruteforcer-botnet-targets-crypto-project-databases-by-exploiting-weak-credentials/</loc>
		<lastmod>2026-01-12T13:14:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/support-ende-windows-10-co-diese-produkte-hat-microsoft-2025-ausgemustert/</loc>
		<lastmod>2026-01-12T13:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gobruteforcer-modulares-botnetz-nutzt-standard-zugangsdaten-fur-angriffe/</loc>
		<lastmod>2026-01-12T14:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-2026-business-blast-radius-dr-amit-chaubey-on-why-cyber-disruption-is-now-a-sovereign-risk/</loc>
		<lastmod>2026-01-12T14:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/networking-im-rittersaal-allonesicherheitslosung/</loc>
		<lastmod>2026-01-12T14:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infamous-breachforums-forum-breached-spilling-data-on-325k-users/</loc>
		<lastmod>2026-01-12T14:07:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-ceo-threatens-to-make-the-winter-olympics-a-political-football-after-italy-slugs-it-with-a-fine/</loc>
		<lastmod>2026-01-12T14:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-and-spanish-police-arrest-34-in-crackdown-on-black-axe-criminal-network/</loc>
		<lastmod>2026-01-12T14:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-angriffsvariante-consentfix-so-tricksen-hacker-microsoft-konten-aus/</loc>
		<lastmod>2026-01-12T14:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-research-enttarnt-modulares-botnetz-gobruteforcer/</loc>
		<lastmod>2026-01-12T14:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sieben-jahre-haft-hafen-it-gehackt-um-drogen-zu-schmuggeln/</loc>
		<lastmod>2026-01-12T14:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-economic-forum-cyber-fraud-overtakes-ransomware-as-business-leaders-top-cyber-security-concern/</loc>
		<lastmod>2026-01-12T15:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unlock-remote-works-grc-impact-challenges-to-opportunities/</loc>
		<lastmod>2026-01-12T15:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-denies-breach-after-password-reset-emails-alarm-users/</loc>
		<lastmod>2026-01-12T15:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-formal-investigation-into-x-over-nudification-of-children-images/</loc>
		<lastmod>2026-01-12T15:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-ni8mare-flaw-impacts-nearly-60000-n8n-instances/</loc>
		<lastmod>2026-01-12T15:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illicit-crypto-economy-surges-amid-increased-nation-state-activity/</loc>
		<lastmod>2026-01-12T15:08:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-ai-automation-exploits-telecom-espionage-prompt-poaching-more/</loc>
		<lastmod>2026-01-12T15:09:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-google-searches-arent-private-pa-courts-surprising-ruling/</loc>
		<lastmod>2026-01-12T16:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-co-die-supply-chain-als-achillesferse/</loc>
		<lastmod>2026-01-12T16:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predict-2026-ai-trust-and-the-security-reckoning-ahead/</loc>
		<lastmod>2026-01-12T16:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ofcom-begins-investigation-of-explicit-image-generation-on-grok/</loc>
		<lastmod>2026-01-12T16:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-says-goodbye-to-gmailify-and-pop3-what-users-need-to-know/</loc>
		<lastmod>2026-01-12T16:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-court-sentences-hacker-who-used-port-systems-to-smuggle-cocaine-to-7-years/</loc>
		<lastmod>2026-01-12T16:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prevent-cloud-data-leaks-with-microsoft-365-access-reviews/</loc>
		<lastmod>2026-01-12T16:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-navigator-2026-von-orange-cyberdefense-zahl-der-erfolgreichen-cyberangriffe-hat-sich-seit-2020-verdreifacht/</loc>
		<lastmod>2026-01-12T16:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-mens-sana-in-corpore-sano-sound-firmware-corpora-for-vulnerability-research/</loc>
		<lastmod>2026-01-12T17:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-is-a-gartner-peer-insights-customers-choice-for-cloud-native-application-protection-platforms/</loc>
		<lastmod>2026-01-12T17:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-enterprises-need-in-ai-governance-software-kovrr/</loc>
		<lastmod>2026-01-12T17:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-isnt-optional-anymore-its-your-ai-agent-fire-drill/</loc>
		<lastmod>2026-01-12T17:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corrupting-llms-through-weird-generalizations/</loc>
		<lastmod>2026-01-12T17:09:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/executives-worry-most-about-cyber-enabled-fraud-geopolitics-and-ai/</loc>
		<lastmod>2026-01-12T17:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurityportal-prasentation-beim-kostenfreien-web-seminar-am-29-januar-2026/</loc>
		<lastmod>2026-01-12T17:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-breach-at-nissan-says-900gb-of-data-stolen/</loc>
		<lastmod>2026-01-12T17:13:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/377000-affected-in-texas-gas-station-operator-breach/</loc>
		<lastmod>2026-01-12T17:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-soc-startup-torq-lands-1-2b-valuation-140m-funding-round/</loc>
		<lastmod>2026-01-12T17:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-pushes-critical-security-update-for-3b-users/</loc>
		<lastmod>2026-01-12T17:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/</loc>
		<lastmod>2026-01-12T17:17:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/</loc>
		<lastmod>2026-01-12T17:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web3-dev-environments-hit-by-fake-interview-software-scam/</loc>
		<lastmod>2026-01-12T17:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-confirms-no-system-breach-after-external-password-reset-problem/</loc>
		<lastmod>2026-01-12T17:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 30135a62f5caf4040d015841ada3ee78; Queries for sitemap: 3; Total queries: 88; Seconds: 4.02; Memory for sitemap: 1KB; Total memory: 44MB -->
