<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='30. April 2026 1:56 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/microsoft-is-retiring-the-lens-scanner-app-for-ios-android/</loc>
		<lastmod>2026-01-12T17:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-integrates-gemini-into-gmail-rolling-out-new-capabilities/</loc>
		<lastmod>2026-01-12T17:22:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-remains-top-target-for-mobile-attacks-as-threats-surge-38/</loc>
		<lastmod>2026-01-12T17:23:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-released-for-atarim-plugin-auth-bypass-vulnerability/</loc>
		<lastmod>2026-01-12T17:24:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-networks-get-a-boost-from-new-pig-butchering-asservice-toolkits/</loc>
		<lastmod>2026-01-12T17:25:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-shuts-down-health-data-resales-by-unregistered-brokers/</loc>
		<lastmod>2026-01-12T17:26:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-separate-campaigns-target-exposed-llm-services/</loc>
		<lastmod>2026-01-12T17:27:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerability-found-in-n8n-workflow-automation-platform/</loc>
		<lastmod>2026-01-12T18:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-employee-reports-spread-guloader-and-remcos-rat-malware/</loc>
		<lastmod>2026-01-12T18:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-the-public-sector-challenges-strategies-and-best-practices/</loc>
		<lastmod>2026-01-12T18:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-confirms-password-reset-spam-flood-denies-breach/</loc>
		<lastmod>2026-01-12T18:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/business-leaders-see-ai-risks-and-fraud-outpacing-ransomware-says-wef/</loc>
		<lastmod>2026-01-12T18:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-confirms-google-gemini-will-power-siri-says-privacy-remains-a-priority/</loc>
		<lastmod>2026-01-12T18:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-closes-ten-emergency-directives-after-federal-cyber-reviews/</loc>
		<lastmod>2026-01-12T18:10:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-introduces-new-vibe-coding-security-governance-framework/</loc>
		<lastmod>2026-01-12T18:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/account-takeover-ato-attacks-explained-detection-prevention-mitigation/</loc>
		<lastmod>2026-01-12T19:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-benefits-and-risks-of-transitioning-to-passwordless-solutions/</loc>
		<lastmod>2026-01-12T19:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-firm-betterment-confirms-data-breach-after-hackers-send-fake-crypto-scam-notification-to-users/</loc>
		<lastmod>2026-01-12T19:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/businesses-in-2026-maybe-we-should-finally-look-into-that-ai-security-stuff/</loc>
		<lastmod>2026-01-12T19:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-best-secure-container-images-for-modern-applications-2026/</loc>
		<lastmod>2026-01-12T19:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/</loc>
		<lastmod>2026-01-12T19:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-supply-chain-attack-abuses-community-nodes-to-steal-oauth-tokens/</loc>
		<lastmod>2026-01-12T19:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-probing-popular-llms-looking-for-access-to-apis-report/</loc>
		<lastmod>2026-01-12T20:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-jumping-frog-radius/</loc>
		<lastmod>2026-01-12T20:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-coolest-cloud-security-companies-of-the-2026-cloud-100/</loc>
		<lastmod>2026-01-12T20:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sweden-detains-ex-military-it-consultant-suspected-of-spying-for-russia/</loc>
		<lastmod>2026-01-12T20:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-regulator-ofcom-opens-investigation-into-x/</loc>
		<lastmod>2026-01-12T20:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-fixes-instagram-password-reset-flaw-denies-data-breach/</loc>
		<lastmod>2026-01-12T20:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-probes-x-over-ai-deepfake-porn/</loc>
		<lastmod>2026-01-12T20:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-data-breach-exposes-nearly-324000-users/</loc>
		<lastmod>2026-01-12T20:11:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gofundme-ignores-own-rules-by-hosting-a-legal-defense-fund-for-the-ice-agent-who-killed-renee-good/</loc>
		<lastmod>2026-01-12T20:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-hawaii-cancer-center-hit-by-ransomware-attack/</loc>
		<lastmod>2026-01-12T20:13:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armenia-probes-alleged-sale-of-8-million-government-records-on-hacker-forum/</loc>
		<lastmod>2026-01-12T21:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hungary-grants-asylum-to-former-polish-minister-implicated-in-spyware-probe/</loc>
		<lastmod>2026-01-12T21:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-launch-mass-reconnaissance-of-ai-systems/</loc>
		<lastmod>2026-01-12T21:06:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-gogs-rce-flaw-exploited-in-zero-day-attacks/</loc>
		<lastmod>2026-01-12T21:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bad-actor-hijacks-apex-legends-characters-in-live-matches/</loc>
		<lastmod>2026-01-12T21:08:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-privacy-and-cybersecurity-laws-in-2026-will-prove-difficult/</loc>
		<lastmod>2026-01-12T21:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-38-of-consumers-now-use-ai-to-shop-online-what-retailers-need-to-know/</loc>
		<lastmod>2026-01-12T22:03:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnet-threat-update-july-to-december-2025/</loc>
		<lastmod>2026-01-12T22:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-monitoring-experts-say-iran-blackout-likely-to-continue/</loc>
		<lastmod>2026-01-12T22:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modulares-botnetz-nutzt-standard-zugangsdaten-fur-angriffe-auf-webserver/</loc>
		<lastmod>2026-01-12T22:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-genai-is-aiding-a-rise-in-identity-based-threats/</loc>
		<lastmod>2026-01-12T22:07:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-login-thieves-now-using-browserbrowser-trick/</loc>
		<lastmod>2026-01-12T22:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gobruteforcer-botnet-targets-50k-plus-linux-servers/</loc>
		<lastmod>2026-01-12T22:09:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-flags-quishing-attacks-from-north-korean-apt/</loc>
		<lastmod>2026-01-12T22:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notorious-breachforums-hacking-site-hit-by-doomsday-leak-of-324000-criminal-users/</loc>
		<lastmod>2026-01-12T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-fire-sale-for-firewalls-as-memory-shortages-could-push-prices-higher/</loc>
		<lastmod>2026-01-12T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/violence-as-a-service-suspect-arrested-in-iraq-extradition-underway/</loc>
		<lastmod>2026-01-12T23:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-bluedelta-fancy-bear-uses-pdfs-to-steal-logins-in-just-2-seconds/</loc>
		<lastmod>2026-01-12T23:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-gogs-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-12T23:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-fines-bans-data-broker-in-privacy-crackdown/</loc>
		<lastmod>2026-01-12T23:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberthreats-target-legacy-systems-in-manufacturing/</loc>
		<lastmod>2026-01-12T23:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-start-of-the-year-is-prime-time-for-insider-risk/</loc>
		<lastmod>2026-01-12T23:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-dns-resiliency-is-critical-as-outages-surge/</loc>
		<lastmod>2026-01-12T23:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-agents-sworn-testimony-contradicts-claims-ices-jonathan-ross-made-under-oath/</loc>
		<lastmod>2026-01-12T23:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-breached-exposing-324k-cybercriminals/</loc>
		<lastmod>2026-01-12T23:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-police-disrupt-black-axe-arrest-alleged-leaders-in-action-spanning-four-cities/</loc>
		<lastmod>2026-01-13T00:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-growing-problem-of-identity-sprawl/</loc>
		<lastmod>2026-01-13T00:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-defense-in-focus-as-zerlang-takes-over-at-securitybridge/</loc>
		<lastmod>2026-01-13T00:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-calls-for-public-to-help-better-secure-ai-agents/</loc>
		<lastmod>2026-01-13T00:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-focuses-on-identity-security-in-agentic-ai-era/</loc>
		<lastmod>2026-01-13T00:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-sues-to-stop-ice-invasion/</loc>
		<lastmod>2026-01-13T00:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/</loc>
		<lastmod>2026-01-13T00:09:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-are-the-latest-nhis-in-threat-detection/</loc>
		<lastmod>2026-01-13T04:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-feel-reassured-by-advanced-secrets-management/</loc>
		<lastmod>2026-01-13T04:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-meet-future-cybersecurity-demands/</loc>
		<lastmod>2026-01-13T04:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-are-your-secret-management-protocols/</loc>
		<lastmod>2026-01-13T04:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-llmpirate-llms-for-black-box-hardware-ip-piracy/</loc>
		<lastmod>2026-01-13T04:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-security-risk-and-ai-governance-frameworks-for-2026/</loc>
		<lastmod>2026-01-13T04:09:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grey-swan-risiken-kaspersky-skizziert-acht-plausible-szenarien-mit-potenziell-hohem-cyberrisiko/</loc>
		<lastmod>2026-01-13T04:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datev-datenpanne-probe-lohnabrechnungen-landeten-bei-falschen-empfangern/</loc>
		<lastmod>2026-01-13T04:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-demands-crypto-outfits-geolocate-customers-get-a-selfie-to-prove-theyre-real/</loc>
		<lastmod>2026-01-13T04:12:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-jspdf-vulnerability-enables-arbitrary-file-read-in-node-js-cve-2025-68428/</loc>
		<lastmod>2026-01-13T05:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-zu-lange-betriebsunterbrechungen-in-den-unternehmen/</loc>
		<lastmod>2026-01-13T05:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-tricks-bei-kleinanzeigen-und-wie-man-sich-davor-schutzen-kann/</loc>
		<lastmod>2026-01-13T05:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itstrategie-fur-komplexe-landschaften-entwickeln/</loc>
		<lastmod>2026-01-13T06:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-insurers-expect-from-cyber-risk-in-2026/</loc>
		<lastmod>2026-01-13T06:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-angular-vulnerability-allows-attackers-to-execute-malicious-payloads/</loc>
		<lastmod>2026-01-13T06:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-actively-exploited-gogs-path-traversal-flaw/</loc>
		<lastmod>2026-01-13T06:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-steals-wallet-credentials-enables-automated-trading-abuse/</loc>
		<lastmod>2026-01-13T06:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisiblejs-executable-es-modules-hidden-in-plain-sight-with-zero-width-characters/</loc>
		<lastmod>2026-01-13T06:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-cyber-metrics-into-decisions-leaders-can-act-on/</loc>
		<lastmod>2026-01-13T07:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teaching-cybersecurity-by-letting-students-break-things/</loc>
		<lastmod>2026-01-13T07:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-important-consideration-to-prevent-insider-cyber-security-threats-in-your-organization/</loc>
		<lastmod>2026-01-13T07:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-best-free-vpn-for-2026-to-protect-your-anonymity-on-the-internet/</loc>
		<lastmod>2026-01-13T07:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-best-cyber-attack-prevention-methods-for-small-businesses-with-breach-attack-simulation/</loc>
		<lastmod>2026-01-13T07:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-do-we-need-antivirus-software-for-android-top-4-best-anti-virus-their-impacts/</loc>
		<lastmod>2026-01-13T07:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-3-categories-that-mostly-impact-by-cyber-threats-protection-against-cyber-attack/</loc>
		<lastmod>2026-01-13T07:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/organized-desktop-top-6-best-mac-apps-for-productivity-to-keep-you-organized/</loc>
		<lastmod>2026-01-13T07:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-extratorrents-proxy-list-extratorrent-alternatives-for-2026100-working/</loc>
		<lastmod>2026-01-13T07:13:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-web-testing-tools-to-improve-website-performance/</loc>
		<lastmod>2026-01-13T07:13:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-6-best-pdf-editor-rank-2026/</loc>
		<lastmod>2026-01-13T07:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cwe-top-25-2026-list-of-top-25-most-dangerous-software-weakness-that-developers-need-to-focus/</loc>
		<lastmod>2026-01-13T07:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrdete-npm-pakete-kritische-sicherheitslucken-in-adonisjs-und-jspdf/</loc>
		<lastmod>2026-01-13T07:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-vendors-for-ai-enabled-security-according-to-cisos/</loc>
		<lastmod>2026-01-13T08:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rakuten-viber-ciso-cto-on-balancing-encryption-abuse-prevention-and-platform-resilience/</loc>
		<lastmod>2026-01-13T08:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-browserthe-browser-trick-to-hijack-facebook-accounts/</loc>
		<lastmod>2026-01-13T08:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vereinbarkeit-von-ki-und-compliance-genai-firewalls-schutzen-sensible-daten-bei-ki-interaktionen/</loc>
		<lastmod>2026-01-13T08:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-hikvision-flaws-allow-device-disruption-via-crafted-network-packets/</loc>
		<lastmod>2026-01-13T09:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-vulnerability-enables-privilege-escalation-without-authentication/</loc>
		<lastmod>2026-01-13T09:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-hackers-earn-600m-posing-as-remote-workers/</loc>
		<lastmod>2026-01-13T09:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-exploitation-of-gogs-vulnerability-enabling-code-execution/</loc>
		<lastmod>2026-01-13T09:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ni8mare-8-600-deutsche-server-uber-kritische-n8n-lucke-angreifbar/</loc>
		<lastmod>2026-01-13T09:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/app-charts-chinesische-notfall-app-sileme-erobert-die-app-store-charts/</loc>
		<lastmod>2026-01-13T09:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isx-it-security-conference-2026-sichern-sie-sich-ihr-kostenloses-ticket-fur-die-isx-2026/</loc>
		<lastmod>2026-01-13T09:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-says-non-ca%c2%a8-modo-no-way-in-defiance-of-italy-piracy-shield-law/</loc>
		<lastmod>2026-01-13T10:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-is-not-legacy-its-infrastructure/</loc>
		<lastmod>2026-01-13T10:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-crackdown-on-probiv-data-leaks-may-have-fed-the-beast-instead/</loc>
		<lastmod>2026-01-13T10:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threema-soll-an-investmentfirma-comitis-capital-verkauft-werden/</loc>
		<lastmod>2026-01-13T10:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parrot-os-shares-its-2026-plans-for-security-tools-and-platform-support-2/</loc>
		<lastmod>2026-01-13T10:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parrot-os-shares-its-2026-plans-for-security-tools-and-platform-support/</loc>
		<lastmod>2026-01-13T10:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-security-faces-a-three-front-war-cybercrime-ai-misuse-and-supply-chains/</loc>
		<lastmod>2026-01-13T10:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-customer-data-exposed-in-crypto-scam-hack/</loc>
		<lastmod>2026-01-13T10:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-best-android-apps-to-help-college-students/</loc>
		<lastmod>2026-01-13T10:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-remotely-took-control-of-an-apex-legends-players-inputs/</loc>
		<lastmod>2026-01-13T10:12:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/driving-passwordless-adoption-with-fido-and-biometric-authentication/</loc>
		<lastmod>2026-01-13T11:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-get-hacked-as-breachforums-database-is-leaked/</loc>
		<lastmod>2026-01-13T11:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-struts-external-entity-xxe-injection-vulnerability-s2-069-cve-2025-68493/</loc>
		<lastmod>2026-01-13T11:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/britain-goes-shopping-for-a-rapid-fire-missile-to-help-ukraine-hit-back/</loc>
		<lastmod>2026-01-13T11:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hexaware-partners-with-accuknox-for-cloud-security-services/</loc>
		<lastmod>2026-01-13T11:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-do-if-ice-invades-your-neighborhood/</loc>
		<lastmod>2026-01-13T11:09:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-campaign-delivers-remcos-rat-through-multi-stage-windows-attack/</loc>
		<lastmod>2026-01-13T11:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heulende-sirenen-in-halle-mysterioser-fehlalarm-wohl-folge-eines-cyberangriffs/</loc>
		<lastmod>2026-01-13T11:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-2025-im-ruckblick-plattformvielfalt-identitatsrisiken-und-neue-sichtbarkeit/</loc>
		<lastmod>2026-01-13T11:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-it-landschaften-sind-kein-ubergangsphanomen/</loc>
		<lastmod>2026-01-13T12:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parliament-asks-security-pros-to-shape-cyber-security-and-resilience-bill/</loc>
		<lastmod>2026-01-13T12:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-magecart-campaign-targets-six-card-networks/</loc>
		<lastmod>2026-01-13T12:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenloses-monitoring-tool-fur-windows-infrastrukturen-mit-whatsup-gold-auch-das-active-directory-uberwachen/</loc>
		<lastmod>2026-01-13T12:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-creator-moxie-marlinspike-wants-to-do-for-ai-what-he-did-for-messaging/</loc>
		<lastmod>2026-01-13T13:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-application-security-sca-sast-dast-and-mast-what-next/</loc>
		<lastmod>2026-01-13T13:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-internet-der-dinge-wird-smarter/</loc>
		<lastmod>2026-01-13T13:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hiscout-stellt-geschaftsfuhrung-neu-auf-tom-lienhart-ubernimmt-ab-2026/</loc>
		<lastmod>2026-01-13T13:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-open-sources-tool-to-prevent-leaky-salesforce-misconfigs/</loc>
		<lastmod>2026-01-13T13:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-tosses-appeal-by-hacker-who-opened-port-to-coke-smugglers-with-malware/</loc>
		<lastmod>2026-01-13T13:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-tosses-appeal-by-hacker-who-opened-port-to-coke-smugglers-with-malware-2/</loc>
		<lastmod>2026-01-13T13:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/q4-2025-malware-trends-telegram-backdoor-banking-trojans-surge-joker-returns-to-google-play/</loc>
		<lastmod>2026-01-13T13:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browserthe-browser-phishing-is-on-the-rise-heres-how-to-spot-it/</loc>
		<lastmod>2026-01-13T13:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minimal-ubuntu-pro-expands-canonicals-cloud-security-offerings/</loc>
		<lastmod>2026-01-13T13:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-advanced-linux-voidlink-malware-targets-cloud-and-container-environments/</loc>
		<lastmod>2026-01-13T13:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-should-we-learn-from-how-attackers-leveraged-ai-in-2025/</loc>
		<lastmod>2026-01-13T13:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-patches-critical-ai-platform-flaw-allowing-unauthenticated-user-impersonation/</loc>
		<lastmod>2026-01-13T13:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schweden-ex-it-berater-des-militars-soll-fur-russland-spioniert-haben/</loc>
		<lastmod>2026-01-13T13:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silent-push-exposes-magecart-network-operating-since-early-2022/</loc>
		<lastmod>2026-01-13T14:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-bug-in-broadcom-software-enables-easy-wifi-denial-of-service/</loc>
		<lastmod>2026-01-13T14:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-agencies-told-to-fix-or-ditch-gogs-as-exploited-zero-day-lands-on-cisa-hit-list/</loc>
		<lastmod>2026-01-13T14:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aurainspector-open-source-tool-to-audit-salesforce-aura-access-control-misconfigurations/</loc>
		<lastmod>2026-01-13T14:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/target-employees-confirm-leaked-code-after-accelerated-git-lockdown/</loc>
		<lastmod>2026-01-13T14:09:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sponsored-by-security-insider-jetzt-anmelden-zur-hacking-challenge-2026/</loc>
		<lastmod>2026-01-13T14:10:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kmu-wollen-nachhaltiger-wirtschaften-aber-mangelnde-digitalisierung-blockiert-zugang-zu-finanzmitteln/</loc>
		<lastmod>2026-01-13T14:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schweden-ex-militardienstleister-der-spionage-fur-russland-bezichtigt/</loc>
		<lastmod>2026-01-13T14:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/colortokens-achieves-fedramp-moderate-ato-for-xshield/</loc>
		<lastmod>2026-01-13T15:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-cops-cuff-alleged-avcheck-malware-kingpin-in-amsterdam/</loc>
		<lastmod>2026-01-13T15:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widespread-magecart-campaign-targets-users-of-all-major-credit-cards/</loc>
		<lastmod>2026-01-13T15:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-simple-trick-to-knock-out-the-wi-fi-network/</loc>
		<lastmod>2026-01-13T15:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-supply-chain-risk-will-cios-be-held-accountable/</loc>
		<lastmod>2026-01-13T15:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-securing-agentic-ai-from-mcps-and-tool-access-to-shadow-api-key-sprawl/</loc>
		<lastmod>2026-01-13T15:09:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-scams-exploit-browserthe-browser-attacks-to-steal-facebook-passwords/</loc>
		<lastmod>2026-01-13T15:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chinese-made-malware-framework-targets-linux-based-cloud-environments/</loc>
		<lastmod>2026-01-13T15:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chinese-made-malware-framework-targets-linux-based-cloud-environments-2/</loc>
		<lastmod>2026-01-13T15:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-marketing-graph-becomes-the-target-map/</loc>
		<lastmod>2026-01-13T16:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bodysnatcher-cve-2025-12420-a-broken-authentication-and-agentic-hijacking-vulnerability-in-servicenow/</loc>
		<lastmod>2026-01-13T16:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyrc-advisory-vulnerability-in-broadcom-chipset-causes-network-disruption-and-client-disconnection-on-wireless-routers/</loc>
		<lastmod>2026-01-13T16:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-learnings-from-the-latest-cyrc-wi-fi-vulnerabilities/</loc>
		<lastmod>2026-01-13T16:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-banden-erpressen-opfer-mit-compliance-verstosen/</loc>
		<lastmod>2026-01-13T16:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kremlin-linked-hackers-pose-as-charities-to-spy-on-ukraines-military/</loc>
		<lastmod>2026-01-13T16:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-ransomware-attack-threatens-one-of-south-koreas-largest-companies/</loc>
		<lastmod>2026-01-13T16:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-is-buying-seraphic-security-to-lock-down-the-browser-where-work-actually-happens/</loc>
		<lastmod>2026-01-13T16:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rtx-5090-amazon-betrug-kaufer-erhalten-bauchtaschen-statt-grafikkarten/</loc>
		<lastmod>2026-01-13T16:12:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-crypto-scams-drive-record-17b-losses-in-2025/</loc>
		<lastmod>2026-01-13T16:13:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isc2-cybersecurity-workforce-study-2025-angespannte-budgets-und-wachsender-bedarf-an-fachkraften/</loc>
		<lastmod>2026-01-13T16:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-you-afford-the-total-cost-of-free-java/</loc>
		<lastmod>2026-01-13T17:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1980s-hacker-manifesto/</loc>
		<lastmod>2026-01-13T17:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/majority-of-hedge-funds-boosted-cybersecurity-spending-in-2025/</loc>
		<lastmod>2026-01-13T17:07:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-sector-breaches-double-as-shadow-ai-vendor-risks-proliferate/</loc>
		<lastmod>2026-01-13T17:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-acquire-seraphic-security-for-secure-browser-push/</loc>
		<lastmod>2026-01-13T17:10:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-acquire-seraphic-security-for-secure-browser-push-2/</loc>
		<lastmod>2026-01-13T17:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-patches-critical-ai-platform-flaw-that-could-allow-user-impersonation/</loc>
		<lastmod>2026-01-13T17:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-court-convicts-hacker-who-exploited-port-networks-for-drug-trafficking/</loc>
		<lastmod>2026-01-13T17:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-teaming-browsesafe-exposes-ai-browser-guardrail-gaps/</loc>
		<lastmod>2026-01-13T17:13:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-data-leak-raises-fresh-questions-over-credibility/</loc>
		<lastmod>2026-01-13T17:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/</loc>
		<lastmod>2026-01-13T17:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-python-cloudflare-to-deliver-asyncrat/</loc>
		<lastmod>2026-01-13T17:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multipurpose-gobruteforcer-botnet-targets-50k-linux-servers/</loc>
		<lastmod>2026-01-13T17:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-separate-campaigns-probe-corporate-llms-for-secrets/</loc>
		<lastmod>2026-01-13T17:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowreactor-campaign-uses-text-only-staging-to-deploy-remcos-rat/</loc>
		<lastmod>2026-01-13T17:19:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-veroffentlicht-cyber-threat-report-fur-dezember-2025/</loc>
		<lastmod>2026-01-13T17:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-eu-ai-act-wenn-compliance-zur-ki-strategie-wird/</loc>
		<lastmod>2026-01-13T17:21:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ni8mare-8-600-deutsche-server-uber-n8n-lucke-angreifbar/</loc>
		<lastmod>2026-01-13T17:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lack-of-isolation-in-agentic-browsers-resurfaces-old-vulnerabilities/</loc>
		<lastmod>2026-01-13T18:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/author-qa-new-techno-thriller-the-virus-simulates-an-ai-malware-outbreak-gone-global/</loc>
		<lastmod>2026-01-13T18:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-breaches-double-as-shadow-ai-vendor-risks-proliferate/</loc>
		<lastmod>2026-01-13T18:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senior-military-cyber-operator-removed-from-russia-task-force/</loc>
		<lastmod>2026-01-13T18:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flowable-2025-2-brings-governed-multi-agent-ai-orchestration-to-enterprises/</loc>
		<lastmod>2026-01-13T18:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-ai-flaw-allows-unauthenticated-user-impersonation/</loc>
		<lastmod>2026-01-13T18:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-of-ice-vehicles-in-minnesota-lack-necessary-lights-and-sirens/</loc>
		<lastmod>2026-01-13T18:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/</loc>
		<lastmod>2026-01-13T18:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails-2/</loc>
		<lastmod>2026-01-13T18:11:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-steals-mexc-api-keys-by-masquerading-as-trading-tool/</loc>
		<lastmod>2026-01-13T18:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-actively-exploited-gogs-vulnerability-with-no-patch/</loc>
		<lastmod>2026-01-13T18:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comitis-capital-threema-bekommt-einen-neuen-deutschen-eigentumer/</loc>
		<lastmod>2026-01-13T18:14:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/session-based-authentication-vs-token-based-authentication-key-differences-explained-3/</loc>
		<lastmod>2026-01-13T19:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/session-based-authentication-vs-token-based-authentication-key-differences-explained-2/</loc>
		<lastmod>2026-01-13T19:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/session-based-authentication-vs-token-based-authentication-key-differences-explained/</loc>
		<lastmod>2026-01-13T19:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rbac-vs-rebac-comparing-role-based-relationship-based-access-control/</loc>
		<lastmod>2026-01-13T19:06:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-rob-lefferts-on-rise-of-ai-attacks-be-prepared-to-go-faster/</loc>
		<lastmod>2026-01-13T19:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-for-january-2026-snort-rules-and-prominent-vulnerabilities/</loc>
		<lastmod>2026-01-13T19:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-dns-attack-understanding-the-risks-and-threats/</loc>
		<lastmod>2026-01-13T19:09:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-to-add-warning-for-proxy-links-after-ip-leak-concerns/</loc>
		<lastmod>2026-01-13T19:10:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dual-channel-attacks-are-the-new-face-of-bec-in-2026/</loc>
		<lastmod>2026-01-13T19:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/</loc>
		<lastmod>2026-01-13T19:12:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-android-bug-causing-volume-key-issues/</loc>
		<lastmod>2026-01-13T19:13:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-facts-you-should-know-about-cybersecurity/</loc>
		<lastmod>2026-01-13T19:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/powershell-driven-multi-stage-windows-malware-using-text-payloads/</loc>
		<lastmod>2026-01-13T19:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeytrap-outsmarting-jailbreak-attacks-on-large-language-models/</loc>
		<lastmod>2026-01-13T19:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-banking-malware-devixor-actively-targeting-users-with-ransomware-capabilities/</loc>
		<lastmod>2026-01-13T19:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-of-voidlink-a-cloud-native-malware-threat-targeting-linux-systems/</loc>
		<lastmod>2026-01-13T19:18:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hexaware-partners-with-accuknox-for-cloud-security-services-2/</loc>
		<lastmod>2026-01-13T19:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-rmm-tools-through-weaponized-pdf-files/</loc>
		<lastmod>2026-01-13T19:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-january-2026-security-patch-day-fixes-critical-injection-and-rce-flaws/</loc>
		<lastmod>2026-01-13T19:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-to-plead-guilty-to-hacking-us-supreme-court-filing-system/</loc>
		<lastmod>2026-01-13T20:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magecart-hits-continue-stripe-spoofing-supply-chain-risks/</loc>
		<lastmod>2026-01-13T20:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-patterns-childrens-data-and-corporate-fiduciary-risk/</loc>
		<lastmod>2026-01-13T20:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortios-vulnerability-allows-remote-code-execution-without-login/</loc>
		<lastmod>2026-01-13T20:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-windows-10-kb5073724-extended-security-update/</loc>
		<lastmod>2026-01-13T20:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5074109-kb5073455-cumulative-updates-released/</loc>
		<lastmod>2026-01-13T20:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/target-employees-confirm-leaked-source-code-is-authentic/</loc>
		<lastmod>2026-01-13T20:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/long-running-web-skimming-campaign-steals-credit-cards-from-online-checkout-pages/</loc>
		<lastmod>2026-01-13T20:11:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcoming-machine-identity-overload/</loc>
		<lastmod>2026-01-13T21:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/respawn-confirms-apex-legends-game-remote-input-control-incident/</loc>
		<lastmod>2026-01-13T21:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/central-maine-healthcare-breach-exposed-data-of-over-145000-people/</loc>
		<lastmod>2026-01-13T21:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/</loc>
		<lastmod>2026-01-13T21:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-updates-replace-expiring-secure-boot-certificates/</loc>
		<lastmod>2026-01-13T21:11:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-updates-replace-expiring-secure-boot-certificates-2/</loc>
		<lastmod>2026-01-13T21:11:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-parliament-approves-resignation-of-security-service-chief-in-major-reshuffle/</loc>
		<lastmod>2026-01-13T21:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hill-warning-dont-put-cyber-offense-before-defense/</loc>
		<lastmod>2026-01-13T21:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-claims-the-theft-of-full-customer-data-from-spanish-energy-firm-endesa/</loc>
		<lastmod>2026-01-13T21:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/service-providers-help-pig-butcher-scammers-scale-operations-infoblox/</loc>
		<lastmod>2026-01-13T22:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-risk-will-accelerate-this-year-fueled-in-part-by-ai-says-world-economic-forum/</loc>
		<lastmod>2026-01-13T22:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-40-countries-impacted-by-north-korea-it-worker-scams-crypto-thefts/</loc>
		<lastmod>2026-01-13T22:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tennessee-man-to-plead-guilty-to-hacking-supreme-courts-electronic-case-filing-system/</loc>
		<lastmod>2026-01-13T22:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-python-libraries-used-in-hugging-face-models-subject-to-poisoned-metadata-attack/</loc>
		<lastmod>2026-01-13T22:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cancer-center-hackers-stole-research-files-encrypted-data/</loc>
		<lastmod>2026-01-13T22:09:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowreactor-uses-text-files-to-deliver-remcos-rat/</loc>
		<lastmod>2026-01-13T22:10:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-january-2026-patch-tuesday-addresses-113-cves-cve-2026-20805/</loc>
		<lastmod>2026-01-13T23:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-january-2026-patch-tuesday-addresses-113-cves-cve-2026-20805-2/</loc>
		<lastmod>2026-01-13T23:07:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/never-before-seen-linux-malware-is-far-more-advanced-than-typical/</loc>
		<lastmod>2026-01-13T23:08:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-addresses-112-defects-including-one-actively-exploited-zero-day/</loc>
		<lastmod>2026-01-13T23:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ceser-chief-touts-ai-projects-as-congressional-dems-point-to-federal-cuts/</loc>
		<lastmod>2026-01-13T23:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ceser-chief-touts-ai-projects-as-congressional-dems-point-to-federal-cuts/</loc>
		<lastmod>2026-01-13T23:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ceser-chief-touts-ai-projects-as-congressional-dems-point-to-federal-cuts-2/</loc>
		<lastmod>2026-01-13T23:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-112-cves-on-first-patch-tuesday-of-2026/</loc>
		<lastmod>2026-01-13T23:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-voidlink-malware-framework-targets-linux-cloud-servers/</loc>
		<lastmod>2026-01-13T23:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-severe-ai-vulnerability-to-date-hits-servicenow-2/</loc>
		<lastmod>2026-01-13T23:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-severe-ai-vulnerability-to-date-hits-servicenow/</loc>
		<lastmod>2026-01-13T23:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-severe-ai-vulnerability-to-date-hits-servicenow-3/</loc>
		<lastmod>2026-01-13T23:14:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-starts-2026-with-a-bang-a-freshly-exploited-zero-day/</loc>
		<lastmod>2026-01-13T23:15:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-fraud-takes-the-lead-what-the-shift-away-from-ransomware-signals-for-enterprises/</loc>
		<lastmod>2026-01-14T00:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-under-siege-what-the-salt-typhoon-campaign-reveals-about-trusted-access-risks/</loc>
		<lastmod>2026-01-14T00:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-breaks-the-ot-security-barrier-aisecot360-delivers-holistic-protection-without-compromising-air-gap-integrity/</loc>
		<lastmod>2026-01-14T00:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/registrierung-bei-elefand-krisen-und-katastrophenvorsorge-bei-auslandsaufenthalten/</loc>
		<lastmod>2026-01-14T00:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-urged-to-let-us-take-on-offensive-cyber-role/</loc>
		<lastmod>2026-01-14T00:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/witnessai-secures-58m-to-grow-global-ai-security-reach/</loc>
		<lastmod>2026-01-14T00:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wine-11-brings-major-architectural-work-synchronization-changes-600-bug-fixes/</loc>
		<lastmod>2026-01-14T00:09:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraines-army-targeted-in-new-charity-themed-malware-campaign/</loc>
		<lastmod>2026-01-14T00:10:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-acquires-browser-security-startup-seraphic-in-latest-buying-spree/</loc>
		<lastmod>2026-01-14T18:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appomni-surfaces-bodysnatcher-ai-agent-security-flaw-affecting-servicenow-apps/</loc>
		<lastmod>2026-01-14T18:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-teases-source-code-for-sale-after-hack-of-target-systems/</loc>
		<lastmod>2026-01-14T18:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/easydmarc-expands-executive-team-with-armen-najarian-as-chief-commercial-officer/</loc>
		<lastmod>2026-01-14T18:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats/</loc>
		<lastmod>2026-01-14T18:21:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-penetration-testing-and-threat-led-exercises-explained/</loc>
		<lastmod>2026-01-14T18:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-microsegmentation-during-a-vmware-exit/</loc>
		<lastmod>2026-01-14T18:23:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-is-reshaping-software-development-and-how-tech-leaders-should-measure-its-impact/</loc>
		<lastmod>2026-01-14T18:24:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detecting-browser-extensions-for-bot-detection-lessons-from-linkedin-and-castle/</loc>
		<lastmod>2026-01-14T18:25:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-manufacturing-the-growing-risk-and-reward-dilemma-escalating-data-security/</loc>
		<lastmod>2026-01-14T18:26:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-surges-among-top-business-risk-concerns-while-cybersecurity-holds-firm/</loc>
		<lastmod>2026-01-14T18:27:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-surges-among-top-business-risk-concerns-while-cybersecurity-holds-firm-2/</loc>
		<lastmod>2026-01-14T18:27:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-resubmits-sean-plankey-for-cisa-director/</loc>
		<lastmod>2026-01-14T18:28:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-incident-management-in-einem-lean-dev-team/</loc>
		<lastmod>2026-01-14T18:29:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats-2/</loc>
		<lastmod>2026-01-14T18:30:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-add-browser-security-to-falcon-with-seraphic-acquisition/</loc>
		<lastmod>2026-01-14T18:31:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-lost-fehlalarm-in-halle-aus/</loc>
		<lastmod>2026-01-14T18:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-ki-birgt-grose-gefahr-fur-unternehmen/</loc>
		<lastmod>2026-01-14T18:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybersecurity-weakened-by-congressional-delays-despite-plankey-renomination/</loc>
		<lastmod>2026-01-14T18:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-inc-when-hackers-are-better-organized-than-it/</loc>
		<lastmod>2026-01-14T18:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/january-2026-microsoft-patch-tuesday-actively-exploited-zero-day-needs-attention/</loc>
		<lastmod>2026-01-14T18:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-debuts-refreshed-channel-program-to-boost-partner-simplicity-flexibility/</loc>
		<lastmod>2026-01-14T18:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ugandan-officials-turn-off-internet-on-eve-of-national-elections/</loc>
		<lastmod>2026-01-14T18:38:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-data-regulator-fines-telco-subsidiaries-48-million-over-data-breach/</loc>
		<lastmod>2026-01-14T18:39:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-says-it-repelled-major-cyberattack-on-power-grid-blames-russia/</loc>
		<lastmod>2026-01-14T18:40:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-cyber-agencies-warn-about-threats-to-industrial-operational-technology/</loc>
		<lastmod>2026-01-14T18:42:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-appoints-digital-chief-as-defense-minister-to-drive-military-reform/</loc>
		<lastmod>2026-01-14T18:43:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-seizes-redvds-infrastructure-disrupts-fast-growing-cybercrime-marketplace/</loc>
		<lastmod>2026-01-14T18:43:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-plankey-re-nominated-to-lead-cisa/</loc>
		<lastmod>2026-01-14T18:44:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brushstrokes-and-breaches-with-terryn-valikodath/</loc>
		<lastmod>2026-01-14T18:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-betrug-angebliche-mediamarkt-laptops-fur-4-euro-zielen-auf-menschen-ab-45/</loc>
		<lastmod>2026-01-14T18:46:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internationale-datentransfers-unverzichtbar-unternehmen-benotigen-rechtssicherheit/</loc>
		<lastmod>2026-01-14T18:47:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-firm-depthfirst-announces-40-million-series-a/</loc>
		<lastmod>2026-01-14T18:48:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cargo-tech-company-publicly-exposed-its-shipping-systems-and-customer-data-to-the-web/</loc>
		<lastmod>2026-01-14T18:49:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-isac-flags-high-risk-security-flaws-in-fortinet-products/</loc>
		<lastmod>2026-01-14T18:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-h200-nach-china-sicherheitsmasnahmen-vorab-tests-und-weitere-auflagen/</loc>
		<lastmod>2026-01-14T18:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-die-ihre-anwendungen-modernisieren-profitieren-dreimal-haufiger-von-ki/</loc>
		<lastmod>2026-01-14T18:52:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-multichaos-zur-einheitlichen-sichtbarkeit/</loc>
		<lastmod>2026-01-14T18:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-multichaos-zur-einheitlichen-sichtbarkeit/</loc>
		<lastmod>2026-01-14T18:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/droht-2026-die-ekrise/</loc>
		<lastmod>2026-01-14T18:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-rekrutieren-insider/</loc>
		<lastmod>2026-01-14T18:55:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-fines-telcos-euro42m-for-sub-par-security-prior-to-24m-customer-breach/</loc>
		<lastmod>2026-01-14T18:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imagination-the-limit-deadlock-ransomware-gang-using-smart-contracts-to-hide-their-work/</loc>
		<lastmod>2026-01-14T18:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-stricken-belgian-hospitals-refuse-ambulances-transfer-critical-patients/</loc>
		<lastmod>2026-01-14T18:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-passengers-taken-for-a-ride-as-data-breach-spills-passports-bank-details/</loc>
		<lastmod>2026-01-14T18:59:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-backtracks-on-digital-id-requirement-for-right-to-work/</loc>
		<lastmod>2026-01-14T19:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-power-giant-sparks-breach-probe-amid-claims-of-massive-data-grab/</loc>
		<lastmod>2026-01-14T19:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-finds-1-5-million-to-help-python-foundation-improve-security/</loc>
		<lastmod>2026-01-14T19:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-info-disclosure-0-day-bug-gets-a-fix-as-cisa-sounds-alarm/</loc>
		<lastmod>2026-01-14T19:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developer-writes-script-to-throw-ai-out-of-windows/</loc>
		<lastmod>2026-01-14T19:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linus-torvalds-tries-vibe-coding-world-still-intact-somehow/</loc>
		<lastmod>2026-01-14T19:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lenovo-has-a-hunch-youre-about-to-try-quitting-vmware/</loc>
		<lastmod>2026-01-14T19:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-full-breach-of-russias-max-messenger-threatens-public-leak/</loc>
		<lastmod>2026-01-14T19:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-rapid-ai-adoption-causes-major-cyber-risk-visibility-gaps/</loc>
		<lastmod>2026-01-14T19:08:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-january-2026-patch-tuesday-115-vulnerabilities-fixed/</loc>
		<lastmod>2026-01-14T19:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats-3/</loc>
		<lastmod>2026-01-14T19:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-closes-2025-with-strong-enterprise-momentum-protecting-millions-of-developers-worldwide/</loc>
		<lastmod>2026-01-14T19:11:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-does-a-chatbot-make-sense-in-freshdesk-and-when-it-doesnt/</loc>
		<lastmod>2026-01-14T19:12:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-over-91000-attacks-on-ai-systems-using-fake-ollama-servers/</loc>
		<lastmod>2026-01-14T19:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convert-video-to-text-a-comprehensive-guide/</loc>
		<lastmod>2026-01-14T19:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cybercrime-markets-launder-breach-proceeds-and-what-security-teams-miss/</loc>
		<lastmod>2026-01-14T19:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cybercrime-markets-launder-breach-proceeds-and-what-security-teams-miss-2/</loc>
		<lastmod>2026-01-14T19:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fixed-two-critical-flaws-in-fortifone-and-fortisiem-2/</loc>
		<lastmod>2026-01-14T19:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fixed-two-critical-flaws-in-fortifone-and-fortisiem/</loc>
		<lastmod>2026-01-14T19:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fixed-two-critical-flaws-in-fortifone-and-fortisiem-3/</loc>
		<lastmod>2026-01-14T19:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-microsoft-windows-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-14T19:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-security-updates-for-january-2026-fixed-actively-exploited-zero-day/</loc>
		<lastmod>2026-01-14T19:19:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/az-monica-hospital-in-belgium-shuts-down-servers-after-cyberattack/</loc>
		<lastmod>2026-01-14T19:20:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deadlock-ransomware-group-utilizes-polygon-smart-contracts/</loc>
		<lastmod>2026-01-14T19:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-solid-it-strategy-in-an-unstable-world/</loc>
		<lastmod>2026-01-14T19:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortisandbox-ssrf-bug-proxies-internal-network-requests/</loc>
		<lastmod>2026-01-14T19:23:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-dcu-uses-uk-courts-to-hunt-down-cyber-criminals/</loc>
		<lastmod>2026-01-14T19:24:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nozomi-networks-opens-apac-headquarters-in-singapore/</loc>
		<lastmod>2026-01-14T19:25:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/distology-boss-looking-for-strong-2026/</loc>
		<lastmod>2026-01-14T19:26:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-backtracks-on-plans-for-mandatory-digital-id/</loc>
		<lastmod>2026-01-14T19:27:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-ai-threats-to-shape-2026-cybersecurity/</loc>
		<lastmod>2026-01-14T19:28:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-beyond-the-quadrant-an-analysts-guide-to-evaluating-email-security-in-2026/</loc>
		<lastmod>2026-01-14T19:29:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-backs-python-software-foundation-security-work-with-1-5-million/</loc>
		<lastmod>2026-01-14T19:30:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-assistant-open-source-cybersecurity-management-and-grc/</loc>
		<lastmod>2026-01-14T19:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firmware-scanning-time-cost-and-where-teams-run-emba/</loc>
		<lastmod>2026-01-14T19:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-image-tools-can-be-tricked-into-making-political-propaganda/</loc>
		<lastmod>2026-01-14T19:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-orbot-tor-vpn-for-ios/</loc>
		<lastmod>2026-01-14T19:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-expands-lumo-ai-assistant-with-encrypted-project-based-workspaces/</loc>
		<lastmod>2026-01-14T19:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-warned-of-a-tren-de-aragua-invasion-us-intel-told-a-different-story/</loc>
		<lastmod>2026-01-14T19:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-data-exposes-thousands-of-border-patrol-ice-agents-after-renee-good-shooting/</loc>
		<lastmod>2026-01-14T19:37:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-digital-id-scheme-faces-resistance-over-security-concerns/</loc>
		<lastmod>2026-01-14T19:38:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-puts-atlassian-williams-f1-team-in-pole-position-on-cybersecurity/</loc>
		<lastmod>2026-01-14T19:39:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-updates-windows-dll-that-triggered-security-alerts/</loc>
		<lastmod>2026-01-14T19:40:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consentfix-debrief-insights-from-the-new-oauth-phishing-attack/</loc>
		<lastmod>2026-01-14T19:41:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reprompt-attack-hijacked-microsoft-copilot-sessions-for-data-theft/</loc>
		<lastmod>2026-01-14T19:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-marketplace-pax8-accidentally-exposes-data-on-1800-msp-partners/</loc>
		<lastmod>2026-01-14T19:44:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-marketplace-pax8-accidentally-exposes-data-on-1800-msp-partners-2/</loc>
		<lastmod>2026-01-14T19:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victorian-department-of-education-says-hackers-stole-students-data/</loc>
		<lastmod>2026-01-14T19:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-365-update-blocks-access-to-cloud-pc-sessions/</loc>
		<lastmod>2026-01-14T19:46:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-365-update-blocks-access-to-cloud-pc-sessions/</loc>
		<lastmod>2026-01-14T19:46:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monroe-university-says-2024-data-breach-affects-320000-people/</loc>
		<lastmod>2026-01-14T19:47:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-study-from-panorays-85-of-cisos-cant-see-third-party-threats-amid-increasing-supply-chain-attacks/</loc>
		<lastmod>2026-01-14T19:48:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spycloud-launches-supply-chain-solution-to-combat-rising-third-party-identity-threats-4/</loc>
		<lastmod>2026-01-14T19:49:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-closes-2025-with-strong-enterprise-momentum-protecting-millions-of-developers-worldwide-2/</loc>
		<lastmod>2026-01-14T19:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-breakdown-and-decryptor-for-esxi-windows/</loc>
		<lastmod>2026-01-14T19:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-exploit-code-repositories-in-contagious-interview-campaign/</loc>
		<lastmod>2026-01-14T19:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-confirms-unauthorised-access-to-its-internal-systems/</loc>
		<lastmod>2026-01-14T19:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-users-hit-by-volume-button-bug-linked-to-select-to-speak/</loc>
		<lastmod>2026-01-14T19:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-elastic-vulnerabilities-could-lead-to-file-theft-and-dos/</loc>
		<lastmod>2026-01-14T19:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aurainspector-open-source-misconfiguration-detection-for-salesforce-aura/</loc>
		<lastmod>2026-01-14T19:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-poses-advanced-threat-to-linux-systems/</loc>
		<lastmod>2026-01-14T19:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-endures-greater-cyber-pressure-from-china/</loc>
		<lastmod>2026-01-14T19:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-endures-greater-cyber-pressure-from-china-2/</loc>
		<lastmod>2026-01-14T19:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-endures-greater-cyber-pressure-from-china-3/</loc>
		<lastmod>2026-01-14T19:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-to-buy-seraphic-security-in-bid-to-boost-browser-security/</loc>
		<lastmod>2026-01-14T20:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-succession-crisis-highlights-how-turnover-amplifies-security-risks/</loc>
		<lastmod>2026-01-14T20:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-becoming-privilege-escalation-paths/</loc>
		<lastmod>2026-01-14T20:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-c-ares-dll-side-loading-to-bypass-security-and-deploy-malware/</loc>
		<lastmod>2026-01-14T20:03:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fixes-critical-fortisiem-flaw-allowing-unauthenticated-remote-code-execution/</loc>
		<lastmod>2026-01-14T20:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-64-of-3rd-party-applications-access-sensitive-data-without-justification/</loc>
		<lastmod>2026-01-14T20:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-114-windows-flaws-in-january-2026-patch-one-actively-exploited/</loc>
		<lastmod>2026-01-14T20:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-node-js-vulnerability-can-cause-server-crashes-via-async_hooks-stack-overflow/</loc>
		<lastmod>2026-01-14T20:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pluggyape-malware-uses-signal-and-whatsapp-to-target-ukrainian-defense-forces/</loc>
		<lastmod>2026-01-14T20:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-subscription-service-behind-ai-powered-cyber-attacks-taken-out-by-microsoft/</loc>
		<lastmod>2026-01-14T20:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-paypal-notices-to-steal-credentials-deploy-rmms/</loc>
		<lastmod>2026-01-14T20:10:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deadlock-ransomware-uses-polygon-smart-contracts-for-proxy-rotation/</loc>
		<lastmod>2026-01-14T20:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g7-sets-2034-deadline-for-finance-to-adopt-quantum-safe-systems/</loc>
		<lastmod>2026-01-14T20:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-three-zero-days-on-busy-patch-tuesday/</loc>
		<lastmod>2026-01-14T20:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/impersonation-fraud-drives-record-17bn-in-crypto-losses/</loc>
		<lastmod>2026-01-14T20:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitskultur-in-unternehmen-akzeptanz-durch-dialog-so-macht-man-it-richtlinien-im-arbeitsalltag-wirksam/</loc>
		<lastmod>2026-01-14T20:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patchday-januar-2026-viele-kritische-schwachstellen-und-immer-mehr-rechteausweitungen/</loc>
		<lastmod>2026-01-14T20:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fritz-failsafe-fur-unterbrechungsfreies-arbeiten-hochverfugbares-internet-mit-der-fritzbox/</loc>
		<lastmod>2026-01-14T20:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-und-desinformation-fake-leaks-als-mittel-der-cybererpressung/</loc>
		<lastmod>2026-01-14T20:18:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-und-desinformation-fake-leaks-als-mittel-der-cybererpressung-2/</loc>
		<lastmod>2026-01-14T20:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-und-desinformation-fake-leaks-als-mittel-der-cybererpressung-3/</loc>
		<lastmod>2026-01-14T20:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-independence-day-wir-mussen-weg-von-big-tech/</loc>
		<lastmod>2026-01-14T20:19:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-independence-day-wir-mussen-weg-von-big-tech-2/</loc>
		<lastmod>2026-01-14T20:19:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hohe-summen-fur-verrat-von-innen-cyber-kriminelle-suchen-gezielt-insider/</loc>
		<lastmod>2026-01-14T20:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enclaive-unterstutzt-mit-genai-firewall-garnet-eine-sichere-ki-nutzung/</loc>
		<lastmod>2026-01-14T20:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mercedes-benz-gehaufte-ruckrufe-bei-limousine-cla/</loc>
		<lastmod>2026-01-14T20:22:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interrail-warnt-vor-datenleck-ausweisdaten-zahlreicher-bahnreisender-abgeflossen/</loc>
		<lastmod>2026-01-14T20:23:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-authentifizierung-broadcom-lucke-lasst-angreifer-ganze-wlan-netze-lahmlegen/</loc>
		<lastmod>2026-01-14T20:24:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jetzt-updates-einspielen-windows-nutzer-werden-attackiert/</loc>
		<lastmod>2026-01-14T20:25:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security-it-sicherheit-leidet-unter-entlassungen-und-sparzwang/</loc>
		<lastmod>2026-01-14T20:26:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutsche-marine-rustet-auf-acht-riesige-uberwachungsdrohnen-sollen-2028-fliegen/</loc>
		<lastmod>2026-01-14T20:27:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/living-security-adds-ai-engine-to-surface-risky-end-user-behavior/</loc>
		<lastmod>2026-01-14T20:28:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-ag-to-probe-musks-grok-for-nonconsensual-deepfakes/</loc>
		<lastmod>2026-01-14T20:29:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-demonstrates-troubleshooting-researcher-dodging-capabilities/</loc>
		<lastmod>2026-01-14T20:30:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/structure-and-reliability-in-e-commerce-platforms/</loc>
		<lastmod>2026-01-14T20:31:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-ai-libraries-exposes-models-to-remote-code-execution/</loc>
		<lastmod>2026-01-14T20:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verizon-wireless-outage-puts-phones-in-sos-mode-without-cell-service/</loc>
		<lastmod>2026-01-14T20:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-china-linked-voidlink-linux-malware-targets-major-cloud-providers/</loc>
		<lastmod>2026-01-14T20:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-code-public-for-critical-fortisiem-command-injection-flaw/</loc>
		<lastmod>2026-01-14T20:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-ag-launches-investigation-into-xs-sexualized-deepfakes/</loc>
		<lastmod>2026-01-14T20:36:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-multi-billion-ai-security-problem-enterprises-cant-ignore/</loc>
		<lastmod>2026-01-14T20:37:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-judge-throws-out-second-lawsuit-over-crowdstrike-outage/</loc>
		<lastmod>2026-01-14T20:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-judge-throws-out-second-lawsuit-over-crowdstrike-outage-2/</loc>
		<lastmod>2026-01-14T20:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-judge-throws-out-second-lawsuit-over-crowdstrike-outage-2/</loc>
		<lastmod>2026-01-14T20:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verizon-outage-knocks-out-us-mobile-service-including-some-911-calls/</loc>
		<lastmod>2026-01-14T20:39:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-fines-free-mobile-euro42-million-over-2024-data-breach-incident/</loc>
		<lastmod>2026-01-14T20:40:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-bot-noise-to-real-insights-how-jobrapido-achieved-true-marketing-roi/</loc>
		<lastmod>2026-01-14T21:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-testing-api-security-as-the-foundational-intelligence-for-an-industry-leader-level-security-strategy/</loc>
		<lastmod>2026-01-14T21:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/output-from-vibe-coding-tools-prone-to-critical-security-flaws-study-finds/</loc>
		<lastmod>2026-01-14T21:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-partial-internet-shutdown-may-be-a-windfall-for-cybersecurity-intel/</loc>
		<lastmod>2026-01-14T21:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-disrupts-redvds-cybercrime-platform-behind-40-million-in-scam-losses/</loc>
		<lastmod>2026-01-14T21:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sources-dhs-finalizing-replacement-for-disbanded-critical-infrastructure-security-council/</loc>
		<lastmod>2026-01-14T21:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-botnets-swift-rise-to-2m-infected-devices-agitates-security-researchers/</loc>
		<lastmod>2026-01-14T21:19:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-multibillion-dollar-ai-security-problem-enterprises-cant-ignore/</loc>
		<lastmod>2026-01-14T21:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-witnessai-raised-58m-to-solve-enterprise-ais-biggest-risk/</loc>
		<lastmod>2026-01-14T21:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-witnessai-raised-58m-to-solve-enterprise-ais-biggest-risk-2/</loc>
		<lastmod>2026-01-14T21:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-witnessai-raised-58m-to-solve-enterprise-ais-biggest-risk-3/</loc>
		<lastmod>2026-01-14T21:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-malware-targets-the-cloud-steals-creds-and-then-vanishes/</loc>
		<lastmod>2026-01-14T21:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-ua-reports-pluggyape-cyberattacks-on-defense-forces/</loc>
		<lastmod>2026-01-14T21:23:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-whatsapp-link-can-hand-over-your-account-in-seconds/</loc>
		<lastmod>2026-01-14T21:24:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-null-route-over-550-kimwolf-and-aisuru-botnet-command-servers/</loc>
		<lastmod>2026-01-14T21:25:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-passkeys-without-biometric-authentication/</loc>
		<lastmod>2026-01-14T22:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-govt-house-sysadmin-stole-200-phones-caught-by-house-it-desk/</loc>
		<lastmod>2026-01-14T22:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seraphic-acquisition-arms-crowdstrike-for-ai-browser-threats/</loc>
		<lastmod>2026-01-14T22:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-difference-between-answering-for-and-owning-it/</loc>
		<lastmod>2026-01-14T22:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-reprompt-attack-enables-stealthy-data-exfiltration/</loc>
		<lastmod>2026-01-14T22:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-giant-kyowon-confirms-data-theft-in-ransomware-attack/</loc>
		<lastmod>2026-01-14T22:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-services-industries-under-fire-in-oceania/</loc>
		<lastmod>2026-01-14T22:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-64155-exploit-code-released-for-critical-fortinet-fortisiem-command-injection-vulnerability/</loc>
		<lastmod>2026-01-14T23:12:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-single-click-mounted-a-covert-multistage-attack-against-copilot/</loc>
		<lastmod>2026-01-14T23:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verizon-outage-felt-across-united-states/</loc>
		<lastmod>2026-01-14T23:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-disrupts-cybercrime-service-redvds/</loc>
		<lastmod>2026-01-14T23:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-schlachtfeld-bis-zum-serverraum-neuerscheinung-zu-europas-rolle-im-cyberkrieg/</loc>
		<lastmod>2026-01-15T00:12:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-schlachtfeld-bis-zum-serverraum-neuerscheinung-zu-europas-rolle-im-cyberkrieg-2/</loc>
		<lastmod>2026-01-15T00:12:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incorporating-geopolitical-risk-into-your-it-strategy/</loc>
		<lastmod>2026-01-15T00:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-axes-investor-lawsuit-over-crowdstrike-software-update/</loc>
		<lastmod>2026-01-15T00:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pharmerica-will-pay-at-least-5-2m-to-settle-hack-lawsuit/</loc>
		<lastmod>2026-01-15T00:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-hidden-chatgpt-translate-tool-takes-on-google-translate/</loc>
		<lastmod>2026-01-15T00:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-law-enforcement-disrupt-redvds-global-cybercrime-service/</loc>
		<lastmod>2026-01-15T07:47:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-nhis-scalable-for-growing-tech-ecosystems/</loc>
		<lastmod>2026-01-15T07:48:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-you-trust-a-machine-with-secret-management/</loc>
		<lastmod>2026-01-15T07:49:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-keep-your-data-protection-strategies-ahead/</loc>
		<lastmod>2026-01-15T07:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-keep-your-data-protection-strategies-ahead-2/</loc>
		<lastmod>2026-01-15T07:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovations-do-nhis-bring-to-cloud-security/</loc>
		<lastmod>2026-01-15T07:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophisticated-voidlink-malware-framework-targets-linux-cloud-servers/</loc>
		<lastmod>2026-01-15T07:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gruppenchats-deutsche-durchschnittlich-in-funf-messengern-prasent/</loc>
		<lastmod>2026-01-15T07:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentische-ki-skaliert-schneller-als-vertrauen-verantwortung-und-verbraucherbewusstsein/</loc>
		<lastmod>2026-01-15T07:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersichere-backups-backup-ist-keine-lebensversicherung-fur-daten/</loc>
		<lastmod>2026-01-15T07:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-regeln-neue-risiken-die-wichtigsten-ithandlungsfelder-fur-2026/</loc>
		<lastmod>2026-01-15T07:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpts-upcoming-cross-platform-feature-is-codenamed-agora/</loc>
		<lastmod>2026-01-15T07:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-plans-to-make-chrome-for-android-an-agentic-browser-with-gemini/</loc>
		<lastmod>2026-01-15T07:58:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-personal-intelligence-links-gmail-photos-and-search-to-gemini/</loc>
		<lastmod>2026-01-15T07:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-bei-instagram-mysteriose-passwort-mails-verunsichern-nutzer/</loc>
		<lastmod>2026-01-15T08:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-policypulseprecision-semantic-role-extraction-for-enhanced-privacy-policy-comprehension/</loc>
		<lastmod>2026-01-15T08:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-flag-gaps-in-third-party-risk-management/</loc>
		<lastmod>2026-01-15T08:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-spending-keeps-rising-so-why-is-business-impact-still-hard-to-explain/</loc>
		<lastmod>2026-01-15T08:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-telescope-types/</loc>
		<lastmod>2026-01-15T08:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-nsa-lays-out-the-first-steps-for-zero-trust-adoption/</loc>
		<lastmod>2026-01-15T08:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-jwt-as-api-keys-security-best-practices-implementation-guide/</loc>
		<lastmod>2026-01-15T08:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-trifft-industrie-besonders-hart/</loc>
		<lastmod>2026-01-15T08:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-trifft-industrie-besonders-hart-2/</loc>
		<lastmod>2026-01-15T08:08:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-resilience-2026-die-scorecard-die-it-fuhrungskrafte-kennen-sollten/</loc>
		<lastmod>2026-01-15T08:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-wants-to-make-verification-a-portable-trust-signal/</loc>
		<lastmod>2026-01-15T08:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qr-codes-are-getting-colorful-fancy-and-dangerous/</loc>
		<lastmod>2026-01-15T08:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gologin-vs-multilogin-vs-vmlogin-whats-the-anti-detect-browsers-difference/</loc>
		<lastmod>2026-01-15T08:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-in-der-lohnabrechnung-datev-sendet-lohnabrechnungen-an-falsche-empfanger/</loc>
		<lastmod>2026-01-15T08:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-typos-to-takeovers-inside-the-industrialization-of-npm-supply-chain-attacks/</loc>
		<lastmod>2026-01-15T08:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ai-fuzzing-and-what-tools-threats-and-challenges-generative-ai-brings/</loc>
		<lastmod>2026-01-15T08:15:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-extort-victims-by-citing-compliance-violations/</loc>
		<lastmod>2026-01-15T08:16:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-disrupts-massive-redvds-cybercrime-virtual-desktop-service/</loc>
		<lastmod>2026-01-15T08:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/war-for-talents-und-neue-angriffsziele-cybersecurity-ausblick-security-2026-zwischen-fachkraftemangel-und-ki-getriebenen-angriffen/</loc>
		<lastmod>2026-01-15T08:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlag-gegen-cyberkriminelle-in-deutschland/</loc>
		<lastmod>2026-01-15T09:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-bans-u-s-and-israeli-cybersecurity-software-over-security-concerns/</loc>
		<lastmod>2026-01-15T09:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shuts-down-redvds-cybercrime-subscription-service-tied-to-millions-in-fraud-losses/</loc>
		<lastmod>2026-01-15T09:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-hackerangriff-auf-klinik-it-notaufnahme-wurde-geschlossen/</loc>
		<lastmod>2026-01-15T09:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dr-nils-kaufmann-ubernimmt-vertriebsfuhrung-bei-indevis-x-data-sec/</loc>
		<lastmod>2026-01-15T09:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-hoster-zerschlagen-razzia-in-deutschem-rechenzentrum/</loc>
		<lastmod>2026-01-15T09:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arcjet-python-sdk-sinks-teeth-into-application-layer-security/</loc>
		<lastmod>2026-01-15T10:13:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-flips-switch-on-euro-cloud-as-customers-fret-about-digital-sovereignty/</loc>
		<lastmod>2026-01-15T10:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-warns-of-dos-bug-letting-hackers-disable-firewalls/</loc>
		<lastmod>2026-01-15T10:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-legal-action-disrupts-redvds-cybercrime-infrastructure-used-for-online-fraud/</loc>
		<lastmod>2026-01-15T10:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-fixes-globalprotect-dos-flaw-that-can-crash-firewalls-without-login/</loc>
		<lastmod>2026-01-15T10:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-becoming-authorization-bypass-paths/</loc>
		<lastmod>2026-01-15T10:18:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-becoming-authorization-bypass-paths-2/</loc>
		<lastmod>2026-01-15T10:18:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/januar-patchday-windows-updates-machen-windows-app-kaputt/</loc>
		<lastmod>2026-01-15T10:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-gefahrlicher-als-gedacht/</loc>
		<lastmod>2026-01-15T11:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lumen-disrupts-aisuru-and-kimwolf-botnet-by-blocking-over-550-c2-servers/</loc>
		<lastmod>2026-01-15T11:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-european-sovereign-cloud-puts-data-operations-and-oversight-inside-the-eu/</loc>
		<lastmod>2026-01-15T11:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-bans-gm-from-selling-drivers-location-data-for-five-years/</loc>
		<lastmod>2026-01-15T11:16:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-governance-vom-regulatorischen-labyrinth-zur-praktikablen-compliance/</loc>
		<lastmod>2026-01-15T11:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/januar-patchday-windows-updates-machen-remote-anmeldung-kaputt-2/</loc>
		<lastmod>2026-01-15T11:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/januar-patchday-windows-updates-machen-remote-anmeldung-kaputt/</loc>
		<lastmod>2026-01-15T11:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/januar-patchday-windows-updates-machen-remote-anmeldung-kaputt-3/</loc>
		<lastmod>2026-01-15T11:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-chatgpt-aber-sicher-signal-erfinder-startet-verschlusselten-ki-chatbot/</loc>
		<lastmod>2026-01-15T11:19:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modern-executive-protection-digital-exposure-physical-risk/</loc>
		<lastmod>2026-01-15T12:13:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-panorays-study-finds-most-cisos-lack-vendor-visibility-as-supply-chain-attacks-climb/</loc>
		<lastmod>2026-01-15T12:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-spycloud-unveils-supply-chain-security-tool-that-detects-compromised-vendors-employees/</loc>
		<lastmod>2026-01-15T12:15:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-8837-targets-critical-infrastructure-sectors-in-north-america/</loc>
		<lastmod>2026-01-15T12:16:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-mensch-wird-neben-ki-eine-masgebliche-rolle-in-der-cybersicherheit-2026-spielen/</loc>
		<lastmod>2026-01-15T12:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-taps-uk-courts-to-dismantle-cybercrime-host-redvds/</loc>
		<lastmod>2026-01-15T12:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ofcom-keeps-x-under-the-microscope-despite-grok-nudify-fix/</loc>
		<lastmod>2026-01-15T12:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/years-old-vulnerable-apache-struts-2-versions-see-387k-weekly-downloads/</loc>
		<lastmod>2026-01-15T12:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trio-of-critical-bugs-spotted-in-delta-industrial-plcs/</loc>
		<lastmod>2026-01-15T12:21:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-outdated-habits-destroying-your-socs-mttr-in-2026/</loc>
		<lastmod>2026-01-15T12:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-agent-doxxing-site-ddos-ed-via-russian-servers/</loc>
		<lastmod>2026-01-15T12:23:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-datenchaos-zur-datenherrschaft-in-hybriden-microsoft-umgebungen-single-source-of-trust-im-identitatsmanagement/</loc>
		<lastmod>2026-01-15T12:24:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-der-mensch-trotz-ki-unverzichtbar-bleibt/</loc>
		<lastmod>2026-01-15T12:25:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-startet-neues-partnerprogramm-zur-starkung-der-globalen-cyber-resilienz/</loc>
		<lastmod>2026-01-15T12:26:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-boss-gesucht-dieser-mann-soll-der-anfuhrer-von-black-basta-sein/</loc>
		<lastmod>2026-01-15T12:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-threat-landscape-in-review-lessons-for-businesses-moving-into-2026/</loc>
		<lastmod>2026-01-15T18:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-and-the-trust-gap/</loc>
		<lastmod>2026-01-15T18:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/</loc>
		<lastmod>2026-01-15T18:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-by-the-numbers-count-of-victims-and-groups-surge/</loc>
		<lastmod>2026-01-15T18:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-inspiring-women-in-cyber-2026-meet-the-judges/</loc>
		<lastmod>2026-01-15T18:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predicting-2026/</loc>
		<lastmod>2026-01-15T19:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-internet-shutdown-is-now-one-of-its-longest-ever-as-protests-continue/</loc>
		<lastmod>2026-01-15T19:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-claude-code-bug-anthropic-ignored-promptly-spreads-to-cowork/</loc>
		<lastmod>2026-01-15T19:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-renominates-sean-plankey-to-lead-cisa/</loc>
		<lastmod>2026-01-15T19:56:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ice-can-kill-with-impunity/</loc>
		<lastmod>2026-01-15T19:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-studio-extension-for-vs-code-now-publicly-available/</loc>
		<lastmod>2026-01-15T19:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-cyber-command-nominee-defends-record-during-senate-hearing/</loc>
		<lastmod>2026-01-15T19:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-who-is-trying-to-access-my-account/</loc>
		<lastmod>2026-01-15T20:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mdr-built-for-state-local-tribal-and-territorial-government/</loc>
		<lastmod>2026-01-15T20:54:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-profit-monroe-university-notifies-321000-of-data-theft/</loc>
		<lastmod>2026-01-15T20:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-research-voidlink-shows-cloud-native-linux-malware-evolving/</loc>
		<lastmod>2026-01-15T20:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musks-grok-undressing-problem-isnt-fixed/</loc>
		<lastmod>2026-01-15T20:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verizon-blames-nationwide-outage-on-a-software-issue/</loc>
		<lastmod>2026-01-15T20:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asyncrat-malware-infests-orgs-via-python-cloudflare/</loc>
		<lastmod>2026-01-15T20:59:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-targeting-high-value-north-american-critical-infrastructure-cisco-says/</loc>
		<lastmod>2026-01-15T21:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flipping-one-bit-leaves-amd-cpus-open-to-vm-vuln/</loc>
		<lastmod>2026-01-15T21:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-paypal-scam-sends-verified-invoices-with-fake-support-numbers/</loc>
		<lastmod>2026-01-15T21:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-patches-pan-os-bug-that-can-disrupt-globalprotect/</loc>
		<lastmod>2026-01-15T21:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/</loc>
		<lastmod>2026-01-15T21:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winter-olympics-could-share-podium-with-cyberattackers/</loc>
		<lastmod>2026-01-15T21:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-codebuild-misconfiguration-exposed-github-repos-to-potential-supply-chain-attacks/</loc>
		<lastmod>2026-01-15T21:59:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cost-of-eks-auto-capabilities-vs-fairwinds-managed-kaas/</loc>
		<lastmod>2026-01-15T22:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-im-withholding-certainty-that-precise-us-cyber-op-disrupted-venezuelan-electricity/</loc>
		<lastmod>2026-01-15T22:54:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-customer-database-hacked/</loc>
		<lastmod>2026-01-15T22:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anchorage-police-department-takes-servers-offline-after-cyberattack-on-service-provider/</loc>
		<lastmod>2026-01-15T22:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-spies-used-maduros-capture-as-a-lure-to-phish-us-govt-agencies/</loc>
		<lastmod>2026-01-15T22:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-ransomware-attack-disrupted-operations-at-south-korean-conglomerate-kyowon/</loc>
		<lastmod>2026-01-15T22:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-software-update-caused-verizon-outage/</loc>
		<lastmod>2026-01-15T22:59:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infoblox-buys-axur-to-expand-cyberthreat-takedown-power/</loc>
		<lastmod>2026-01-15T23:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/40k-wordpress-installs-at-risk-from-modular-ds-admin-bypass/</loc>
		<lastmod>2026-01-15T23:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaiser-to-pay-46m-in-patient-data-lawsuit-find-out-if-youre-eligible/</loc>
		<lastmod>2026-01-15T23:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-new-ai-security-guidance-for-critical-infrastructure/</loc>
		<lastmod>2026-01-15T23:03:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grubhub-confirms-hackers-stole-data-in-recent-security-breach/</loc>
		<lastmod>2026-01-15T23:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-sample-indicates-vendor-controlled-c2/</loc>
		<lastmod>2026-01-15T23:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/possible-software-supply-chain-attack-through-aws-codebuild-service-blunted/</loc>
		<lastmod>2026-01-15T23:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-chief-pick-tells-lawmakers-hell-assess-efficacy-of-cybercom-nsa-dual-hat-role-if-confirmed/</loc>
		<lastmod>2026-01-15T23:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-secure-software-buying-tool-had-a-simple-xss-vulnerability-of-its-own/</loc>
		<lastmod>2026-01-15T23:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cio-playbook-for-post-quantum-security/</loc>
		<lastmod>2026-01-15T23:56:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/torq-gets-140m-series-d-to-fuel-ai-powered-soc-capabilities/</loc>
		<lastmod>2026-01-15T23:57:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-allies-sound-alarm-on-ot-network-exposure/</loc>
		<lastmod>2026-01-15T23:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-body-isc2-signs-on-as-uk-software-security-ambassador/</loc>
		<lastmod>2026-01-15T23:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoho-opens-its-first-uae-datacentres-to-boost-cloud-adoption/</loc>
		<lastmod>2026-01-16T00:00:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-now-uses-1000-part-zip-archives-for-stealthy-delivery/</loc>
		<lastmod>2026-01-16T00:01:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swedish-welfare-authority-suspends-discriminatory-ai-model/</loc>
		<lastmod>2026-01-16T00:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-patches-firewalls-after-discovery-of-a-new-denialservice-flaw/</loc>
		<lastmod>2026-01-16T00:53:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-basta-internationale-fahndung-nach-dem-kopf-der-ransomware-gruppierung/</loc>
		<lastmod>2026-01-16T00:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geister-fabriken-dark-factories-zur-erhaltung-industrieller-wertschopfung-in-deutschland/</loc>
		<lastmod>2026-01-16T00:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-finally-fixes-max-severity-bug-under-active-attack-for-weeks/</loc>
		<lastmod>2026-01-16T00:56:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-is-now-more-reliable-at-finding-and-remembering-your-past-chat/</loc>
		<lastmod>2026-01-16T00:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-deliver-value-in-soc-operations/</loc>
		<lastmod>2026-01-16T04:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-ai-managed-nhis-reliable-in-identity-management/</loc>
		<lastmod>2026-01-16T04:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-ai-driven-security-systems-empower-compliance/</loc>
		<lastmod>2026-01-16T04:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-testing-most-ai-attacks-are-noise-a-few-leave-craters/</loc>
		<lastmod>2026-01-16T04:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-authorization-server-setup-implementation-guide-configuration/</loc>
		<lastmod>2026-01-16T04:57:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-zero-trust-architecture-for-mcp-hosts/</loc>
		<lastmod>2026-01-16T04:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherer-umgang-mit-personlichen-kiagenten/</loc>
		<lastmod>2026-01-16T04:59:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-click-is-all-it-takes-how-reprompt-turned-microsoft-copilot-into-data-exfiltration-tools/</loc>
		<lastmod>2026-01-16T05:00:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-are-your-secrets-with-agentic-ai-handling-them/</loc>
		<lastmod>2026-01-16T05:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-threat-uat-8837-targets-north-american-infrastructure/</loc>
		<lastmod>2026-01-16T05:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-now-lets-you-change-your-gmail-com-address-rolling-out/</loc>
		<lastmod>2026-01-16T05:03:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcares-blind-spot-what-happens-after-our-data-is-shared/</loc>
		<lastmod>2026-01-16T05:52:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-planen-cyberkriminelle-fur-2026/</loc>
		<lastmod>2026-01-16T05:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whos-on-the-other-end-rented-accounts-are-stress-testing-trust-in-gig-platforms/</loc>
		<lastmod>2026-01-16T05:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-january-16-2026/</loc>
		<lastmod>2026-01-16T05:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confidential-supply-chains-wie-unternehmen-ihre-softwarelieferkette-strategisch-absichern/</loc>
		<lastmod>2026-01-16T06:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-ai-raises-the-stakes-app-modernization-and-security-are-becoming-inseparable/</loc>
		<lastmod>2026-01-16T06:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-intelligence-is-moving-faster-than-enterprise-controls/</loc>
		<lastmod>2026-01-16T06:57:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verkauft-vernetzt-verwundbar-so-landen-ihre-daten-im-darknet/</loc>
		<lastmod>2026-01-16T06:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-zero-day-rce-exploited-by-china-linked-apt-in-secure-email-gateways/</loc>
		<lastmod>2026-01-16T06:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cvss-10-0-und-exploit-hpe-oneview-sicherheitslucke-wird-sehr-wahrscheinlich-ausgenutzt/</loc>
		<lastmod>2026-01-16T07:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-prasentiert-brandtrends-fur-q4-2025/</loc>
		<lastmod>2026-01-16T07:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-breachlock-unveils-agentic-ai-pen-testing-that-mimics-attacker-behavior-on-web-apps/</loc>
		<lastmod>2026-01-16T07:53:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-appguard-reopens-insider-program-as-ai-enhanced-malware-outpaces-detection-defenses/</loc>
		<lastmod>2026-01-16T07:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-risk-in-an-age-of-workforce-volatility/</loc>
		<lastmod>2026-01-16T07:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-polands-power-system-but-blackout-prevented/</loc>
		<lastmod>2026-01-16T07:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-activity-never-dies-it-multiplies/</loc>
		<lastmod>2026-01-16T07:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-penetration-test-reporting-with-pentestpad/</loc>
		<lastmod>2026-01-16T07:58:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/</loc>
		<lastmod>2026-01-16T07:59:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-optimierung-das-dilemma-der-schatten-it/</loc>
		<lastmod>2026-01-16T08:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fast-pair-sicherheitslucke-macht-horstopsel-zur-wanze/</loc>
		<lastmod>2026-01-16T08:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-android-app-needs-scanning-best-android-app-vulnerability-scanner-in-2026/</loc>
		<lastmod>2026-01-16T08:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-and-israel-deepen-cybersecurity-ties-with-new-security-pact/</loc>
		<lastmod>2026-01-16T08:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitaten-absichern-crowdstrike-ubernimmt-sgnl-fur-dynamische-identitatssicherheit/</loc>
		<lastmod>2026-01-16T08:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-bounty-programm-curl-entwickler-dreht-dem-ki-schrott-den-geldhahn-zu/</loc>
		<lastmod>2026-01-16T08:56:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-stands-tall-appointing-a-true-leader-jen-easterly-as-ceo/</loc>
		<lastmod>2026-01-16T09:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</loc>
		<lastmod>2026-01-16T09:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/actively-exploited-critical-flaw-in-modular-ds-wordpress-plugin-enables-admin-takeover/</loc>
		<lastmod>2026-01-16T09:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-finally-fixes-asyncos-zero-day-exploited-since-november/</loc>
		<lastmod>2026-01-16T09:56:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/some-windows-pcs-fail-to-shut-down-after-january-update/</loc>
		<lastmod>2026-01-16T09:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-console-supply-chain-breach-enables-github-repository-hijacking/</loc>
		<lastmod>2026-01-16T09:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-click-exploit-chain-discovered-targeting-google-pixel-9-devices/</loc>
		<lastmod>2026-01-16T09:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-identity-token-flaw-exposes-windows-admin-center-to-tenant-wide-breaches/</loc>
		<lastmod>2026-01-16T10:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-identity-token-flaw-exposes-windows-admin-center-to-tenant-wide-breaches-2/</loc>
		<lastmod>2026-01-16T10:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt-exploits-sitecore-zero-day-in-attacks-on-american-critical-infrastructure/</loc>
		<lastmod>2026-01-16T10:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-targets-hpe-oneview-vulnerability-in-exploitation-wave/</loc>
		<lastmod>2026-01-16T10:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/micro-trainings-und-klare-prozesse-erhohen-die-melderate-phishing-abwehr-gelingt-nur-vernetzt-mit-technik-und-verhalten/</loc>
		<lastmod>2026-01-16T10:52:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-januar-patchday-einige-windows-11-pcs-lassen-sich-nicht-mehr-runterfahren/</loc>
		<lastmod>2026-01-16T10:53:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dezember-2025-cyberangriffe-stiegen-global-und-in-europa-um-9-prozent/</loc>
		<lastmod>2026-01-17T11:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-hackers-reportedly-caused-a-blackout-in-venezuela/</loc>
		<lastmod>2026-01-17T12:14:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-umsatz-fur-nvidia-update-china-soll-den-import-von-h200-gpus-untersagt-haben/</loc>
		<lastmod>2026-01-17T13:14:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-pair-loose-security-bluetooth-accessories-open-to-silent-hijack/</loc>
		<lastmod>2026-01-17T13:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ccpa-understanding-how-synthetic-data-can-help-achieve-compliance/</loc>
		<lastmod>2026-01-17T14:14:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-scalable-approach-to-pii-protection-within-ai-governance-frameworks/</loc>
		<lastmod>2026-01-17T14:15:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-vertex-ai-flaw-lets-low-privilege-users-escalate-to-service-agent-roles/</loc>
		<lastmod>2026-01-17T14:16:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-bringen-copilot-zum-plaudern-wie-sie-microsofts-ki-austricksen-um-an-eure-daten-zu-gelangen/</loc>
		<lastmod>2026-01-17T15:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-researchers-uncover-rce-exploit-for-existing-redis-database-vulnerability/</loc>
		<lastmod>2026-01-17T16:15:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt-uat-8837-targets-north-american-critical-infrastructure/</loc>
		<lastmod>2026-01-17T17:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-attackers-target-financial-applications-and-vapt-stops-them/</loc>
		<lastmod>2026-01-17T18:16:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-basta-ransomware-leader-added-to-eu-most-wanted-and-interpol-red-notice/</loc>
		<lastmod>2026-01-17T18:17:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-scopeverif-analyzing-the-security-of-androids-scoped-storage-via-differential-analysis/</loc>
		<lastmod>2026-01-17T19:14:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-attackers-target-financial-applications-and-vapt-stops-them-2/</loc>
		<lastmod>2026-01-17T19:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-basta-ransomware-leader-added-to-eu-most-wanted-and-interpol-red-notice-2/</loc>
		<lastmod>2026-01-17T19:16:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainegermany-operation-targets-black-basta-russian-leader-wanted/</loc>
		<lastmod>2026-01-17T20:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-und-interrail-hacker-erlangten-zugriff-auf-daten-von-bahnreisenden/</loc>
		<lastmod>2026-01-18T00:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unit-42-warnt-vor-cyberkrimineller-vorfreude-auf-olympische-winterspiele-2026/</loc>
		<lastmod>2026-01-18T00:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ready-for-a-newbie-friendly-linux-mint-team-officially-releases-v-22-3-zena/</loc>
		<lastmod>2026-01-18T04:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-now-lets-you-turn-off-on-device-ai-model-powering-scam-detection/</loc>
		<lastmod>2026-01-18T04:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-stealing-chrome-extensions-target-enterprise-hr-platforms/</loc>
		<lastmod>2026-01-18T04:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-ghostposter-browser-extensions-found-with-840000-installs/</loc>
		<lastmod>2026-01-18T04:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-datenschutzbudgets-werden-trotz-steigender-risiken-voraussichtlich-schrumpfen/</loc>
		<lastmod>2026-01-18T07:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-nutzen-zunehmend-hybride-sicherheitsmodelle/</loc>
		<lastmod>2026-01-18T07:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-9001/</loc>
		<lastmod>2026-01-18T08:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-wirtschaft-braucht-mehr-schulung-in-sachen-hackerabwehr/</loc>
		<lastmod>2026-01-18T08:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-pam-reduce-stress-for-security-teams-2/</loc>
		<lastmod>2026-01-18T09:16:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-pam-reduce-stress-for-security-teams/</loc>
		<lastmod>2026-01-18T09:16:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-are-ai-systems-in-managing-cloud-compliance/</loc>
		<lastmod>2026-01-18T09:17:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-is-ai-in-detecting-non-human-identity-breaches/</loc>
		<lastmod>2026-01-18T09:18:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-support-dynamic-secrets-management/</loc>
		<lastmod>2026-01-18T09:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-irs-1075-safeguards-audit-requirements/</loc>
		<lastmod>2026-01-18T10:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-retreats-from-metaverse-after-virtual-reality-check/</loc>
		<lastmod>2026-01-18T10:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-poc-for-fortisiem-flaw-released-rakuten-viber-ciso-cto-on-messaging-risks/</loc>
		<lastmod>2026-01-18T10:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-2026-see-a-chatgpt-moment-for-microchip-implants/</loc>
		<lastmod>2026-01-18T11:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-personalmangel-kommunen-als-hacker-opfer/</loc>
		<lastmod>2026-01-18T12:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion/</loc>
		<lastmod>2026-01-18T15:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-559-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-01-18T15:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-80/</loc>
		<lastmod>2026-01-18T18:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-oob-windows-updates-to-fix-shutdown-cloud-pc-bugs/</loc>
		<lastmod>2026-01-18T19:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciro-confirms-data-breach-exposed-info-on-750000-canadian-investors/</loc>
		<lastmod>2026-01-18T19:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-tests-gemini-powered-ai-skills/</loc>
		<lastmod>2026-01-18T19:17:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-uses-malformed-zip-files-to-bypass-security-controls/</loc>
		<lastmod>2026-01-18T20:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-uses-malformed-zip-files-to-bypass-security-controls-2/</loc>
		<lastmod>2026-01-18T20:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whos-stalking-whom-ice-uses-social-media-and-phone-surveillance-system-to-track-protesters/</loc>
		<lastmod>2026-01-18T20:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-compiled-models-built-in-exploits/</loc>
		<lastmod>2026-01-18T23:14:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trotz-steigender-risiken-datenschutzbudgets-werden-voraussichtlich-vielfach-schrumpfen/</loc>
		<lastmod>2026-01-19T00:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-stack-bitkom-kommentiert-zweite-beteiligungsrunde/</loc>
		<lastmod>2026-01-19T00:15:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivists-hijacked-iran-s-state-tv-to-air-anti-regime-messages-and-an-appeal-to-protest-from-reza-pahlavi/</loc>
		<lastmod>2026-01-19T00:16:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardware-security-module-integration-for-quantum-safe-model-contexts/</loc>
		<lastmod>2026-01-19T04:14:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/southeast-asia-cisos-top-13-predictions-for-2026-securing-ai-centering-identity-and-making-resilience-strategic/</loc>
		<lastmod>2026-01-19T04:15:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-lotuslite/</loc>
		<lastmod>2026-01-19T04:16:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-openai-leak-hints-at-upcoming-chatgpt-features/</loc>
		<lastmod>2026-01-19T04:17:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-olympics-connect-everything-attackers-pay-attention/</loc>
		<lastmod>2026-01-19T06:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-risk-keeps-winning-even-as-ai-takes-over/</loc>
		<lastmod>2026-01-19T06:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-kerberos-relay-technique-exploits-dns-cnames-to-bypass-existing-defenses/</loc>
		<lastmod>2026-01-19T06:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostposter-malware-targets-chrome-users-via-17-rogue-extensions/</loc>
		<lastmod>2026-01-19T06:17:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-ciam-essential-information-you-need-to-know/</loc>
		<lastmod>2026-01-19T07:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bytebase-open-source-database-devops-tool/</loc>
		<lastmod>2026-01-19T07:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-european-standard-outlines-security-requirements-for-ai/</loc>
		<lastmod>2026-01-19T07:17:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-bodysnatcher-flaw-allows-full-servicenow-user-impersonation/</loc>
		<lastmod>2026-01-19T07:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-hijack-hacker-domain-using-name-server-delegation/</loc>
		<lastmod>2026-01-19T07:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-abuse-browser-extensions-to-deliver-fake-warning-messages/</loc>
		<lastmod>2026-01-19T07:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-january-2026-security-update-triggers-credential-prompt-failures-in-remote-desktop-2/</loc>
		<lastmod>2026-01-19T07:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-january-2026-security-update-triggers-credential-prompt-failures-in-remote-desktop/</loc>
		<lastmod>2026-01-19T07:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-patch-kein-workaround-schwachstelle-in-veralteten-d-link-routern-aktiv-ausgenutzt/</loc>
		<lastmod>2026-01-19T07:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-top-cybersecurity-projects-for-2026/</loc>
		<lastmod>2026-01-19T08:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-top-cybersecurity-projects-for-2026-2/</loc>
		<lastmod>2026-01-19T08:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-bodysnatcher-flaw-highlights-risks-of-rushed-ai-integrations/</loc>
		<lastmod>2026-01-19T08:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-and-interpol-hunt-black-basta-ransomware-kingpin-suspects-identified-in-ukraine/</loc>
		<lastmod>2026-01-19T08:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-tensions-are-pushing-cyber-activity-toward-dangerous-territory/</loc>
		<lastmod>2026-01-19T08:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-ai-strategy-and-security/</loc>
		<lastmod>2026-01-19T08:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-bug-in-stealc-malware-panel-let-researchers-spy-on-threat-actor-operations/</loc>
		<lastmod>2026-01-19T08:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-betrieb-und-sicherheit-im-spannungsfeld-steigender-bedrohungen-secops-und-itops-2026-strategisch-zusammenfuhren/</loc>
		<lastmod>2026-01-19T08:23:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ntlmv1-veraltete-windows-passworter-lassen-sich-in-stunden-knacken/</loc>
		<lastmod>2026-01-19T08:24:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-arts-degree-to-cybersecurity-rona-michele-spiegel-brings-fresh-perspective-to-cyber-leadership/</loc>
		<lastmod>2026-01-19T09:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-reprompt-attack-let-hackers-steal-data-from-microsoft-copilot/</loc>
		<lastmod>2026-01-19T09:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pdfsider-malware-actively-exploited-to-evade-antivirus-and-edr-defenses/</loc>
		<lastmod>2026-01-19T09:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-publishes-rainbow-tables-that-crack-ntlmv1-admin-passwords/</loc>
		<lastmod>2026-01-19T09:17:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/argus-python-based-recon-toolkit-aims-to-boost-security-intelligence/</loc>
		<lastmod>2026-01-19T09:18:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-security-teams-use-ip-location-and-dns-history-in-cybercrime-investigation/</loc>
		<lastmod>2026-01-19T09:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-insellosungen-zur-plattform-watchguard-bietet-neues-bundle-als-zero-trust-losung/</loc>
		<lastmod>2026-01-19T09:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherer-fernzugriff-neu-gedacht-warum-vpns-nicht-mehr-ausreichen/</loc>
		<lastmod>2026-01-19T09:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nutzerbeschwerden-windows-11-update-beschert-outlook-nutzern-nervige-fehler/</loc>
		<lastmod>2026-01-19T09:23:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rings-facial-recognition-feature-convenience-or-privacy-nightmare/</loc>
		<lastmod>2026-01-19T10:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entity-resolution-vs-identity-verification-what-security-teams-actually-need/</loc>
		<lastmod>2026-01-19T10:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-pleads-guilty-to-hacking-supreme-court-americorps-and-va-systems/</loc>
		<lastmod>2026-01-19T10:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-hostname-hints-at-a-new-chatgpt-feature-codenamed-sonata/</loc>
		<lastmod>2026-01-19T10:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-chrome-extensions-used-to-hijack-enterprise-hr-and-erp-systems/</loc>
		<lastmod>2026-01-19T10:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-exploit-bug-in-stealc-infostealer-to-collect-evidence/</loc>
		<lastmod>2026-01-19T10:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-exploit-bug-in-stealc-infostealer-to-collect-evidence-2/</loc>
		<lastmod>2026-01-19T10:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notfall-patch-ist-da-microsoft-patzt-beim-ersten-update-2026/</loc>
		<lastmod>2026-01-19T10:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-scopes-consent-complete-guide-to-secure-api-authorization/</loc>
		<lastmod>2026-01-19T11:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth2-identity-provider-setup-complete-implementation-guide/</loc>
		<lastmod>2026-01-19T11:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-culture-you-cant-see-is-running-your-security-operations/</loc>
		<lastmod>2026-01-19T11:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fahndung-nach-kopf-von-black-basta/</loc>
		<lastmod>2026-01-19T11:18:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-year-ransomware-went-fully-decentralized-cybles-2025-threat-analysis/</loc>
		<lastmod>2026-01-19T11:18:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/royal-navys-helicopter-drone-makes-its-first-autonomous-flight/</loc>
		<lastmod>2026-01-19T11:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-army-to-spend-279-million-on-permanent-cyber-regiment-base/</loc>
		<lastmod>2026-01-19T11:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-chrome-extension-delivers-modelorat-using-clickfix-style-browser-crash-lures/</loc>
		<lastmod>2026-01-19T11:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-chrome-extension-delivers-modelorat-using-clickfix-style-browser-crash-lures-2/</loc>
		<lastmod>2026-01-19T11:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-breaches-compliance-and-reputation-top-uk-corporate-concerns/</loc>
		<lastmod>2026-01-19T11:23:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerk-und-sicherheitsarchitektur-im-umbruch-firewall-refresh-zwischen-lebenszyklus-und-architekturwandel/</loc>
		<lastmod>2026-01-19T11:24:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autotype-windows-11-update-macht-beliebte-keepass-funktion-kaputt/</loc>
		<lastmod>2026-01-19T11:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-ways-email-automation-will-reshape-customer-journeys-in-2026/</loc>
		<lastmod>2026-01-19T12:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outsourcing-it-support-benefits-risks-and-smart-next-steps/</loc>
		<lastmod>2026-01-19T12:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-chrome-extensions-caught-hijacking-enterprise-sessions/</loc>
		<lastmod>2026-01-19T12:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-bibliotheken-fur-hugging-face-modelle-vergiftet/</loc>
		<lastmod>2026-01-19T12:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-in-one-seo-plugin-flaw-exposes-ai-token-to-low-privilege-wordpress-users/</loc>
		<lastmod>2026-01-19T12:18:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warwickshire-school-to-reopen-after-cyberattack-crippled-it/</loc>
		<lastmod>2026-01-19T12:19:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastang-panda-uses-venezuela-news-to-spread-lotuslite-malware/</loc>
		<lastmod>2026-01-19T12:20:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-tracks-ransomware-group-blamed-for-massive-financial-losses/</loc>
		<lastmod>2026-01-19T12:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspects-linked-to-black-basta-ransomware-group-raided-in-ukraine/</loc>
		<lastmod>2026-01-19T12:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wechat-als-einfallstor-fur-betruger-eine-unterschatzte-gefahr-nimmt-rasant-zu/</loc>
		<lastmod>2026-01-19T12:24:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingram-micro-admits-summer-ransomware-raid-exposed-thousands-of-staff-records/</loc>
		<lastmod>2026-01-19T13:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-prime-minister-stares-down-barrel-of-ban-on-social-media-for-kids/</loc>
		<lastmod>2026-01-19T13:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/not-hot-on-bots-project-names-and-shames-ai-created-open-source-software/</loc>
		<lastmod>2026-01-19T13:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-leans-on-emulation-to-squeeze-more-hpc-oomph-from-ai-chips-in-race-against-amd/</loc>
		<lastmod>2026-01-19T13:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploiting-pdf24-app-to-deploy-stealthy-pdfsider-backdoor/</loc>
		<lastmod>2026-01-19T13:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devops-saas-downtime-the-high-and-hidden-costs-for-cloud-first-businesses/</loc>
		<lastmod>2026-01-19T13:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-stackwarp-hardware-flaw-breaks-amd-sev-snp-protections-on-zen-15-cpus/</loc>
		<lastmod>2026-01-19T13:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-google-chrome-extensions-hijack-workday-and-netsuite/</loc>
		<lastmod>2026-01-19T13:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allianz-risk-barometer-2026-ki-risiken-wachsen-rasant/</loc>
		<lastmod>2026-01-19T13:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keepit-starkt-seine-globale-channel-fuhrungsposition/</loc>
		<lastmod>2026-01-19T13:25:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-rolle-des-ciso-steht-vor-einem-tiefgreifenden-wandel/</loc>
		<lastmod>2026-01-19T13:26:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-zwang-ade-alle-e-scooter-eines-insolventen-herstellers-geknackt/</loc>
		<lastmod>2026-01-19T13:27:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-most-startup-founders-fail-and-how-ishir-texas-venture-studio-helps-the-right-ones-win/</loc>
		<lastmod>2026-01-19T13:14:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-remove-saved-passwords-from-google-chrome-and-why-you-should/</loc>
		<lastmod>2026-01-19T13:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-state-tv-feed-reportedly-hijacked-to-air-anti-regime-messages/</loc>
		<lastmod>2026-01-19T14:14:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-underestimate-pro-russia-hacktivists-warns-uks-cyber-crew/</loc>
		<lastmod>2026-01-19T14:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-shutdown-bug-forces-microsoft-into-outband-damage-control/</loc>
		<lastmod>2026-01-19T14:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google%c2%afgemini%c2%afai-tricked-into-leaking-calendar-data-via-meeting-invites/</loc>
		<lastmod>2026-01-19T14:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acting-cisa-director-pushed-to-remove-agency-cio/</loc>
		<lastmod>2026-01-19T14:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingram-micro-says-ransomware-attack-affected-42000-people/</loc>
		<lastmod>2026-01-19T14:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remcos-rat-campaign-uses-trojanized-veracrypt-installers-to-steal-credentials/</loc>
		<lastmod>2026-01-19T14:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasked-by-leaks-the-hidden-backbone-of-a-ransomware-operation/</loc>
		<lastmod>2026-01-19T14:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciro-confirms-data-breach-impacting-750000-canadian-investors/</loc>
		<lastmod>2026-01-19T14:25:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-smb-client-vulnerability-exposes-organizations-to-full-active-directory-compromise/</loc>
		<lastmod>2026-01-19T14:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-impersonate-malwarebytes-to-steal-user-credentials/</loc>
		<lastmod>2026-01-19T14:27:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-wsl2-to-operate-undetected-on-windows-systems/</loc>
		<lastmod>2026-01-19T14:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-rerouted-employee-pay-without-breaching-it-systems/</loc>
		<lastmod>2026-01-19T14:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spear-phishing-campaign-leverages-google-ads-to-distribute-endrat-malware/</loc>
		<lastmod>2026-01-19T14:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/redmi-buds-vulnerability-could-allow-call-data-theft-and-firmware-instability/</loc>
		<lastmod>2026-01-19T14:32:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fortinet-exploits-redline-clipjack-ntlm-crack-copilot-attack-more/</loc>
		<lastmod>2026-01-19T14:33:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/niemand-halt-das-mehr-fur-unwahrscheinlich-cyberangriffe-auf-kritische-infrastrukturen-auch-in-deutschland/</loc>
		<lastmod>2026-01-19T14:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/175-millionen-konten-betroffen-was-hinter-den-seltsamen-instagram-mails-steckt/</loc>
		<lastmod>2026-01-19T14:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-schwarz-it-software-engineer-for-ai-forecasting-gesucht-schau-dir-unsere-jobs-der-woche-an/</loc>
		<lastmod>2026-01-19T14:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/relevante-entwicklungen-und-cyberrisiken-der-kunstlichen-intelligenz/</loc>
		<lastmod>2026-01-19T15:14:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-schwachstelle-in-hpe-oneview-ausgenutzt/</loc>
		<lastmod>2026-01-19T15:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-kunftige-rolle-des-ciso-in-der-cybersecurity/</loc>
		<lastmod>2026-01-19T15:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-browser-crash-alerts-turn-chrome-extension-into-enterprise-backdoor/</loc>
		<lastmod>2026-01-19T15:17:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/visual-studio-code-abused-in-sophisticated-multistage-malware-attacks/</loc>
		<lastmod>2026-01-19T15:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expansion-in-europa-fur-digitale-souveranitat-aws-nimmt-european-sovereign-cloud-in-betrieb/</loc>
		<lastmod>2026-01-19T15:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jordanian-pleads-guilty-to-selling-access-to-50-corporate-networks/</loc>
		<lastmod>2026-01-19T15:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-eu-schwachstellen-datenbank-gestartet/</loc>
		<lastmod>2026-01-19T16:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passagierdatenspeicherung-eu-plant-totale-uberwachung-von-bus-bahn-schiff-und-auto/</loc>
		<lastmod>2026-01-19T16:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogue-agents-and-shadow-ai-why-vcs-are-betting-big-on-ai-security/</loc>
		<lastmod>2026-01-19T16:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealc-malware-control-panel-flaw-leaks-details-on-active-attacker/</loc>
		<lastmod>2026-01-19T16:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-fix-after-some-windows-11-systems-cant-shut-down/</loc>
		<lastmod>2026-01-19T16:26:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacktivists-intensify-disruptive-cyber-pressure-on-uk-orgs/</loc>
		<lastmod>2026-01-19T16:28:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-forecast-2026-von-google-europa-wird-starker-in-den-fokus-staatlicher-cyberangriffe-rucken/</loc>
		<lastmod>2026-01-19T16:29:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutztes-social-engineering-setzt-den-kmus-zunehmend-zu/</loc>
		<lastmod>2026-01-19T16:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massenhafte-exploit-versuche-auf-kritische-schwachstelle-in-hpe-oneview/</loc>
		<lastmod>2026-01-19T16:30:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-pleads-guilty-to-access-supreme-court-americorps-va-systems/</loc>
		<lastmod>2026-01-19T17:14:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-bitshield-defending-against-bit-flip-attacks-on-dnn-executables/</loc>
		<lastmod>2026-01-19T17:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broker-who-sold-malware-to-the-fbi-set-for-sentencing/</loc>
		<lastmod>2026-01-19T17:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-admits-to-leaking-stolen-supreme-court-data-on-instagram/</loc>
		<lastmod>2026-01-19T17:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-pdfsider-malware-built-for-long-term-covert-system-access/</loc>
		<lastmod>2026-01-19T17:18:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cop-cops-it-after-copilot-cops-out-west-midlands-police-chief-quits-over-ai-hallucination/</loc>
		<lastmod>2026-01-19T18:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-cowork-shipped-with-known-vulnerability/</loc>
		<lastmod>2026-01-19T18:15:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-copyright-law-unfit-for-protecting-creative-workers-from-ai/</loc>
		<lastmod>2026-01-19T18:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-govt-warns-about-ongoing-russian-hacktivist-group-attacks/</loc>
		<lastmod>2026-01-19T18:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-visualize-web-api-coverage-with-screenshots-and-validate-attack-paths-in-escape/</loc>
		<lastmod>2026-01-19T19:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-threat-intelligence-empowering-proactive-cybersecurity-with-seceon/</loc>
		<lastmod>2026-01-19T19:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-threat-intelligence-empowering-proactive-cybersecurity-with-seceon-2/</loc>
		<lastmod>2026-01-19T19:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-health-raises-big-security-safety-concerns/</loc>
		<lastmod>2026-01-19T19:18:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-prompt-injection-flaw-exposed-private-calendar-data-via-malicious-invites/</loc>
		<lastmod>2026-01-19T19:19:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jordanian-man-pleads-guilty-to-selling-stolen-logins-for-50-companies/</loc>
		<lastmod>2026-01-19T20:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attack-on-ingram-micro-impacts-42000-individuals/</loc>
		<lastmod>2026-01-19T20:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-asgard/</loc>
		<lastmod>2026-01-19T21:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-funny-numbers/</loc>
		<lastmod>2026-01-19T21:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-shareholders-lose-battle-to-recoup-losses-from-2024-outage/</loc>
		<lastmod>2026-01-19T21:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-most-wanted-cops-seek-head-of-black-basta/</loc>
		<lastmod>2026-01-19T21:18:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-pushes-organizations-to-dump-insecure-ntlmv1-by-releasing-a-way-to-crack-it/</loc>
		<lastmod>2026-01-19T22:14:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overair-software-updates-pose-risks-to-vehicles/</loc>
		<lastmod>2026-01-19T22:15:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-urges-health-sector-to-harden-security-of-phi-devices/</loc>
		<lastmod>2026-01-19T22:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pdfsider-windows-malware-deployed-on-fortune-100-firms-network/</loc>
		<lastmod>2026-01-19T22:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aikido-gets-60m-series-b-to-scale-automate-ai-pen-testing/</loc>
		<lastmod>2026-01-19T23:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ad-blocker-extension-crashes-the-browser-for-clickfix-attacks/</loc>
		<lastmod>2026-01-19T23:15:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-trends-to-watch-in-2026/</loc>
		<lastmod>2026-01-20T00:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rabatte-mittels-supermarkt-apps-ungunstiger-umtausch-personlicher-daten/</loc>
		<lastmod>2026-01-20T00:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flare-research-phishing-kits-now-operate-like-saas-platforms/</loc>
		<lastmod>2026-01-20T00:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-phishing-makes-human-risk-management-critical/</loc>
		<lastmod>2026-01-20T00:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-policy-enforcement-for-decentralized-model-context-resources/</loc>
		<lastmod>2026-01-20T04:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-hipaa-compliance-software-solutions/</loc>
		<lastmod>2026-01-20T04:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-ai-the-key-to-impenetrable-non-human-identity-security/</loc>
		<lastmod>2026-01-20T04:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-proactive-can-ai-be-in-secrets-rotation-processes/</loc>
		<lastmod>2026-01-20T04:18:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-independently-manage-secrets-without-human-oversight/</loc>
		<lastmod>2026-01-20T04:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-capabilities-does-ai-add-to-cloud-native-security/</loc>
		<lastmod>2026-01-20T04:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nomad-leopard/</loc>
		<lastmod>2026-01-20T04:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-poseidon-konni-apt-hijacks-google-naver-ads-for-malware/</loc>
		<lastmod>2026-01-20T04:23:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertrauen-ethik-und-resilienz-im-fokus-der-ciso-der-zukunft-ubernimmt-fuhrungsrolle/</loc>
		<lastmod>2026-01-20T04:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-go-now-unlocks-unlimited-access-to-gpt-5-2-instant-for-8/</loc>
		<lastmod>2026-01-20T04:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-can-get-chatgpts-20-plus-subscription-for-free-for-a-limited-time/</loc>
		<lastmod>2026-01-20T04:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/justtime-jit-provisioning-how-automated-user-provisioning-works-in-sso/</loc>
		<lastmod>2026-01-20T05:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saml-vs-oidc-choosing-the-right-protocol-for-modern-single-sign-on/</loc>
		<lastmod>2026-01-20T05:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-2026-trends-und-predictions/</loc>
		<lastmod>2026-01-20T05:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-intune-update-isnt-optional-its-a-kill-switch-for-outdated-apps/</loc>
		<lastmod>2026-01-20T05:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-zero-day-flaw-allows-attackers-to-bypass-security-and-access-any-host/</loc>
		<lastmod>2026-01-20T05:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-teams-feel-the-strain-as-ai-breaches-and-budgets-collide/</loc>
		<lastmod>2026-01-20T06:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-aveva-software-flaws-allow-remote-code-execution-with-system-privileges/</loc>
		<lastmod>2026-01-20T06:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-flaw-allows-access-to-private-meeting-details-through-calendar-events/</loc>
		<lastmod>2026-01-20T06:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-ads-exploited-to-deliver-tamperedchef-through-malicious-pdf-editor/</loc>
		<lastmod>2026-01-20T06:17:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-space-isnt-safe-inside-the-european-space-agencys-massive-cyberattack/</loc>
		<lastmod>2026-01-20T07:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confusion-and-fear-send-people-to-reddit-for-cybersecurity-advice/</loc>
		<lastmod>2026-01-20T07:16:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-privacyhawk-for-ios-helps-users-track-and-remove-personal-data-from-data-brokers/</loc>
		<lastmod>2026-01-20T07:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whisperpair-vulnerability-allows-attackers-to-pair-devices-without-user-consent/</loc>
		<lastmod>2026-01-20T07:18:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solyximmortal-malware-abuses-discord-to-quietly-harvest-sensitive-information/</loc>
		<lastmod>2026-01-20T07:20:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opt-out-erforderlich-starlink-nutzt-kundendaten-fur-ki-training/</loc>
		<lastmod>2026-01-20T07:21:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucke-angriffe-auf-ibm-api-connect-ohne-authentifizierung-moglich/</loc>
		<lastmod>2026-01-20T07:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-on-the-tube-or-rather-in-the-tube-kimwolf-targets-android-based-tvs-and-streaming-devices/</loc>
		<lastmod>2026-01-20T08:14:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-web-browsers-for-the-enterprise-compared-how-to-pick-the-right-one/</loc>
		<lastmod>2026-01-20T08:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-exploited-to-spread-clipboard-hijacker-stealing-cryptocurrency-funds/</loc>
		<lastmod>2026-01-20T08:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intelligence-und-operative-informationssicherheit-methodische-individualisierung-der-bedrohungsanalyse/</loc>
		<lastmod>2026-01-20T08:17:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-from-holy-mackeral-to-daily-routine-ai-vendors-maneuver-to-commandeer-your-life/</loc>
		<lastmod>2026-01-20T09:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/daten-von-eureil-interrail-reisenden-gehackt/</loc>
		<lastmod>2026-01-20T09:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-debuts-ai-assisted-server-side-kernel-compilation-rootkit-technique/</loc>
		<lastmod>2026-01-20T09:17:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-router-flaw-enables-authentication-bypass-through-password-recovery-mechanism/</loc>
		<lastmod>2026-01-20T09:18:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tudou-guarantee-marketplace-halts-telegram-transactions-after-processing-over-12-billion/</loc>
		<lastmod>2026-01-20T09:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flexibilitat-und-effizienz-fur-digitale-arbeitsbereiche-parallels-ras-21-0-fokus-auf-hybrid-cloud-und-sicherheit/</loc>
		<lastmod>2026-01-20T09:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-deep-observability-transparenz-schaffen-und-uberlastete-sicherheitsteams-entlasten/</loc>
		<lastmod>2026-01-20T09:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-deep-observability-transparenz-schaffen-und-uberlastete-sicherheitsteams-entlasten-2/</loc>
		<lastmod>2026-01-20T09:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-admin-konten-zahlloser-uberwachungskameras-knackbar/</loc>
		<lastmod>2026-01-20T09:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-unveils-major-upgrade-to-identity-manager-strengthening-enterprise-identity-security/</loc>
		<lastmod>2026-01-20T10:14:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-video-mit-reinhold-wurth-wirbt-fur-dubiose-geldanlagen/</loc>
		<lastmod>2026-01-20T10:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-of-russian-hacktivists-targeting-uk/</loc>
		<lastmod>2026-01-20T10:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-unveils-major-upgrade-to-identity-manager-strengthening-enterprise-identity-security-2/</loc>
		<lastmod>2026-01-20T10:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-ncsc-warns-of-russia-linked-hacktivists-ddos-attacks/</loc>
		<lastmod>2026-01-20T10:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-wordpress-plugin-vulnerability-exposes-100000-websites-to-privilege-escalation-attacks/</loc>
		<lastmod>2026-01-20T10:19:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exeon-ueba-identitatsbasierte-angriffe-in-echtzeit-erkennen/</loc>
		<lastmod>2026-01-20T10:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-future-of-security-starts-with-who-not-where/</loc>
		<lastmod>2026-01-20T11:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-based-illicit-billionaire-marketplace-tudou-guarantee-stopped-transactions/</loc>
		<lastmod>2026-01-20T11:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lets-encrypt-rolls-out-6-day-and-ip-based-certificates/</loc>
		<lastmod>2026-01-20T11:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risk-of-ai-model-collapse-to-drive-zero-trust-data-governance-gartner-says/</loc>
		<lastmod>2026-01-20T11:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-marketplace-tudou-guarantee-shutters-telegram-ops/</loc>
		<lastmod>2026-01-20T11:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-108-das-jahr-der-nisrichtlinie-beginnt/</loc>
		<lastmod>2026-01-20T11:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-adblocker-erweiterung-bringt-browser-absichtlich-zum-absturz/</loc>
		<lastmod>2026-01-20T11:21:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-bei-tp-link-uberwachungskameras-per-passwort-reset-knackbar/</loc>
		<lastmod>2026-01-20T11:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-configure-keylocker-for-jarsigner-using-the-digicert-ksp-library/</loc>
		<lastmod>2026-01-20T12:15:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-flaw-exposes-new-ai-prompt-injection-risks-for-enterprises/</loc>
		<lastmod>2026-01-20T12:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-bots-are-exploiting-apis-at-scale-heres-how-defenders-must-respond/</loc>
		<lastmod>2026-01-20T12:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-fixes-acme-validation-bug-allowing-waf-bypass-to-origin-servers/</loc>
		<lastmod>2026-01-20T12:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-secrets-in-javascript-bundles-are-still-being-missed/</loc>
		<lastmod>2026-01-20T12:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ip-insider-workshop-monitoring-mit-checkmk-teil-12-zertifikate-mit-check_cert-uberwachen-auch-ohne-checkmk/</loc>
		<lastmod>2026-01-20T12:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-adblocker-bringt-browser-absichtlich-zum-absturz/</loc>
		<lastmod>2026-01-20T12:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-named-growth-index-leader-in-frost-radar-data-security-platforms-report/</loc>
		<lastmod>2026-01-20T13:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-attack-hijacks-browser-failures-to-deliver-modelrat-malware-via-fake-chrome-extension/</loc>
		<lastmod>2026-01-20T13:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-warns-of-sustained-cyberthreat-from-pro-russian-hacktivists/</loc>
		<lastmod>2026-01-20T13:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workspace-protection-fur-sicheres-arbeiten-im-hybrid-und-remote-modus/</loc>
		<lastmod>2026-01-20T13:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-the-price-of-netflix-crooks-can-now-rent-ai-to-run-cybercrime/</loc>
		<lastmod>2026-01-20T13:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-of-increased-russian-hacktivist-threat-to-uk-online-services/</loc>
		<lastmod>2026-01-20T13:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spear-phishing-campaign-abuses-argentine-federal-court-rulings-to-deliver-covert-rat/</loc>
		<lastmod>2026-01-20T13:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opnsense-25-7-11-enhances-network-visibility-with-host-discovery-feature/</loc>
		<lastmod>2026-01-20T13:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-study-finds-gpt-5-2-can-reliably-develop-zero-day-exploits-at-scale/</loc>
		<lastmod>2026-01-20T13:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wpair-scanner-released-to-detect-whisperpair-flaw-in-googles-fast-pair-protocol/</loc>
		<lastmod>2026-01-20T13:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-supercharges-attacks-in-cybercrimes-new-fifth-wave/</loc>
		<lastmod>2026-01-20T13:25:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundesinnenministerium-warnt-chinesische-autos-werden-zu-spionen-auf-radern/</loc>
		<lastmod>2026-01-20T13:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/could-chatgpt-convince-you-to-buy-something/</loc>
		<lastmod>2026-01-20T14:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-limacharlie-manifesto-security-for-an-autonomous-future/</loc>
		<lastmod>2026-01-20T14:16:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-landmark-report-fraud-service-to-tackle-cybercrime-and-fraud/</loc>
		<lastmod>2026-01-20T14:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-sicherheit-mittels-ki-verunsicherung-uberwinden-und-vertrauen-begrunden/</loc>
		<lastmod>2026-01-20T14:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-zero-day-let-attackers-bypass-waf-via-acme-certificate-validation-path/</loc>
		<lastmod>2026-01-20T14:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-language-becomes-the-attack-surface-inside-the-google-gemini-calendar-exploit/</loc>
		<lastmod>2026-01-20T14:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sechs-milliarden-durch-malware-kompromittierte-zugangsdaten-uber-die-haufigsten-passworter-verraten/</loc>
		<lastmod>2026-01-20T14:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sechs-milliarden-durch-malware-kompromittierte-zugangsdaten-uber-die-haufigsten-passworter-verraten-2/</loc>
		<lastmod>2026-01-20T14:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-sechs-milliarden-durch-malware-kompromittierte-zugangsdaten-uber-die-haufigsten-passworter-verraten-3/</loc>
		<lastmod>2026-01-20T14:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-digitaltrends-die-it-entscheider-jetzt-auf-dem-schirm-haben-sollten/</loc>
		<lastmod>2026-01-20T14:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-als-schlusselkomponente-moderner-verteidigungsfahigkeit/</loc>
		<lastmod>2026-01-20T14:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-harmonisierung-interoperabilitat-und-resilienz-im-mittelpunkt-des-uberarbeiteten-eu-cybersicherheitsgesetzes-stehen-sollten/</loc>
		<lastmod>2026-01-20T14:26:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-quietly-fixed-flaws-in-its-git-mcp-server-that-allowed-for-remote-code-execution/</loc>
		<lastmod>2026-01-20T14:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackathon-projects-show-ai-wellness-apps-can-leak-sensitive-user-info/</loc>
		<lastmod>2026-01-20T14:28:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomhouse-claims-data-breach-at-major-apple-contractor-luxshare/</loc>
		<lastmod>2026-01-20T14:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-console-supply-chain-flaw-could-have-enabled-github-repo-hijacks/</loc>
		<lastmod>2026-01-20T14:30:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-email-appliance-rce-exploited-in-attacks/</loc>
		<lastmod>2026-01-20T14:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-email-appliance-rce-exploited-in-attacks-2/</loc>
		<lastmod>2026-01-20T14:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-email-appliance-rce-exploited-in-attacks-3/</loc>
		<lastmod>2026-01-20T14:33:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/initial-access-broker-pleads-guilty-to-selling-access-to-50-corporate-networks/</loc>
		<lastmod>2026-01-20T14:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-why-execs-dont-buy-soc-teams-the-tools-they-need/</loc>
		<lastmod>2026-01-20T14:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raaga-confirms-major-data-breach-exposing-personal-information-of-10-2million-users/</loc>
		<lastmod>2026-01-20T14:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gootloader-malware-with-low-detection-rate-evades-most-security-tools/</loc>
		<lastmod>2026-01-20T14:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-airflow-flaws-expose-sensitive-workflow-data-to-potential-attackers/</loc>
		<lastmod>2026-01-20T14:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-risk-of-orphan-accounts/</loc>
		<lastmod>2026-01-20T14:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evelyn-stealer-malware-abuses-vs-code-extensions-to-steal-developer-credentials-and-crypto/</loc>
		<lastmod>2026-01-20T14:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-campaign-exploits-open-source-pen-testing-tool-to-compromise-business-execs/</loc>
		<lastmod>2026-01-20T14:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-campaign-exploits-open-source-pen-testing-tool-to-compromise-business-execs-2/</loc>
		<lastmod>2026-01-20T14:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-campaign-exploits-open-source-pen-testing-tool-to-compromise-business-execs-3/</loc>
		<lastmod>2026-01-20T14:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-campaign-exploits-open-source-pen-testing-tool-to-compromise-business-execs-4/</loc>
		<lastmod>2026-01-20T14:42:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-challenge-2026-junge-hacker-stellen-sich-boser-ki/</loc>
		<lastmod>2026-01-20T14:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtiger-gesteht-50-firmen-gehackt-und-malware-an-das-fbi-verkauft/</loc>
		<lastmod>2026-01-20T14:44:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtiger-gesteht-50-firmen-gehackt-und-malware-an-das-fbi-verkauft-2/</loc>
		<lastmod>2026-01-20T14:44:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtiger-gesteht-50-firmen-gehackt-und-malware-an-das-fbi-verkauft-3/</loc>
		<lastmod>2026-01-20T14:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploiting-google-gemini-to-abuse-calendar-invites-illustrates-ai-threats-2/</loc>
		<lastmod>2026-01-20T15:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploiting-google-gemini-to-abuse-calendar-invites-illustrates-ai-threats/</loc>
		<lastmod>2026-01-20T15:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploiting-google-gemini-to-abuse-calendar-invites-illustrates-ai-threats-3/</loc>
		<lastmod>2026-01-20T15:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-security-incidents-break-the-questions-every-ciso-asks-and-how-we-securely-built-a-solution-in-record-time/</loc>
		<lastmod>2026-01-20T15:17:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-chrome-erweiterungen-die-unternehmenssitzungen-kapern/</loc>
		<lastmod>2026-01-20T15:19:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-chrome-erweiterungen-die-unternehmenssitzungen-kapern-2/</loc>
		<lastmod>2026-01-20T15:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-framework-flaws-put-enterprise-clouds-at-risk-of-takeover/</loc>
		<lastmod>2026-01-20T15:20:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-tops-ransomware-in-wefs-2026-cybersecurity-outlook/</loc>
		<lastmod>2026-01-20T15:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-tops-ransomware-in-wefs-2026-cybersecurity-outlook-2/</loc>
		<lastmod>2026-01-20T15:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-tops-ransomware-in-wefs-2026-cybersecurity-outlook-3/</loc>
		<lastmod>2026-01-20T15:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-flaw-lets-attackers-bypass-mark-of-the-web/</loc>
		<lastmod>2026-01-20T15:24:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-aligning-cybersecurity-purchases-with-what-your-soc-team-needs/</loc>
		<lastmod>2026-01-20T15:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-flaws-in-anthropic-mcp-git-server-enable-file-access-and-code-execution/</loc>
		<lastmod>2026-01-20T15:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-linkedin-messages-to-spread-rat-malware-through-dll-sideloading/</loc>
		<lastmod>2026-01-20T15:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-risks-among-ceos-top-worries-amid-weak-short-term-growth-outlook/</loc>
		<lastmod>2026-01-20T15:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingram-micro-data-from-42000-individuals-impacted-in-2025-cyberattack/</loc>
		<lastmod>2026-01-20T16:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-your-business-traffic-with-military-grade-vpn-for-only-20-2/</loc>
		<lastmod>2026-01-20T16:30:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-your-business-traffic-with-military-grade-vpn-for-only-20/</loc>
		<lastmod>2026-01-20T16:30:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-your-business-traffic-with-military-grade-vpn-for-only-20-3/</loc>
		<lastmod>2026-01-20T16:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/make-identity-threat-detection-your-security-strategy-for-2026/</loc>
		<lastmod>2026-01-20T16:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-bugs-found-in-official-anthropic-git-mcp-server/</loc>
		<lastmod>2026-01-20T16:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-data-threat-report-2025-security-verschiebt-sich-richtung-ki-und-post-quanten-risiken/</loc>
		<lastmod>2026-01-20T16:34:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50-unternehmen-gehackt-hacker-soll-malware-an-das-fbi-verkauft-haben/</loc>
		<lastmod>2026-01-20T16:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-authorities-warn-of-pro-russia-groups-targeting-critical-infrastructure-local-government/</loc>
		<lastmod>2026-01-20T17:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ceos-and-cisos-differ-on-ais-security-value-and-risks/</loc>
		<lastmod>2026-01-20T17:47:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-says-it-will-consider-banning-social-media-for-children/</loc>
		<lastmod>2026-01-20T17:48:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-move-to-extend-two-cyber-programs-again-in-funding-proposal/</loc>
		<lastmod>2026-01-20T17:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-afghan-government-workers-with-fake-correspondence-from-senior-officials/</loc>
		<lastmod>2026-01-20T17:50:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems/</loc>
		<lastmod>2026-01-20T17:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems-2/</loc>
		<lastmod>2026-01-20T17:52:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems-3/</loc>
		<lastmod>2026-01-20T17:52:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-claims-success-for-permanent-facial-recognition-in-croydon/</loc>
		<lastmod>2026-01-20T17:53:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-powertoys-adds-new-cursorwrap-mouse-teleport-tool/</loc>
		<lastmod>2026-01-20T17:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-flaw-turns-calendar-invites-into-attack-vector/</loc>
		<lastmod>2026-01-20T17:55:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-anthropic-mcp-servers-at-risk-of-rce-cloud-takeovers/</loc>
		<lastmod>2026-01-20T17:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainlit-security-flaws-highlight-infrastructure-risks-in-ai-apps/</loc>
		<lastmod>2026-01-20T17:57:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-erste-belegte-ki-generierte-malware-dieser-komplexitat/</loc>
		<lastmod>2026-01-20T17:58:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalkommissarin-nutzer-sollen-den-ausbau-von-huawei-im-5g-netz-bezahlen/</loc>
		<lastmod>2026-01-20T17:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-smart-contract-security-cant-wait-for-better/</loc>
		<lastmod>2026-01-20T18:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-the-age-of-aiops-proactive-defense-strategies-for-it-leaders/</loc>
		<lastmod>2026-01-20T18:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fight-for-the-future-eff-others-push-back-against-growing-ice-surveillance/</loc>
		<lastmod>2026-01-20T18:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ecdsa-encryption-how-does-it-work/</loc>
		<lastmod>2026-01-20T18:48:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-ai-assistant-tricked-into-leaking-google-calendar-data/</loc>
		<lastmod>2026-01-20T18:49:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-data-center-is-secure-but-your-users-are-not/</loc>
		<lastmod>2026-01-20T19:32:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nists-blueprint-for-ai-security-how-data-trust-enables-ai-success/</loc>
		<lastmod>2026-01-20T19:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-the-age-of-microsegmentation-enforcement-in-hours-are-you-still-shutting-down-operations/</loc>
		<lastmod>2026-01-20T19:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-tech-support-scams-on-the-rise-how-cybercriminals-are-turning-your-feed-into-a-trap/</loc>
		<lastmod>2026-01-20T19:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa-2/</loc>
		<lastmod>2026-01-20T19:36:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congressional-appropriators-move-to-extend-information-sharing-law-fund-cisa/</loc>
		<lastmod>2026-01-20T19:36:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remember-voidlink-the-cloud-targeting-linux-malware-an-ai-agent-wrote-it/</loc>
		<lastmod>2026-01-20T19:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-to-crashfix-kongtuke-used-fake-chrome-ad-blocker-to-install-modelorat/</loc>
		<lastmod>2026-01-20T19:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-launches-gcve-to-track-vulnerabilities-without-relying-on-us/</loc>
		<lastmod>2026-01-20T19:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprocket-security-appoints-eric-sheridan-as-chief-technology-officer/</loc>
		<lastmod>2026-01-20T19:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12b-scam-market-tudou-guarantee-shuts-down/</loc>
		<lastmod>2026-01-20T19:42:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12b-scam-market-tudou-guarantee-shuts-down-2/</loc>
		<lastmod>2026-01-20T19:42:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-flaw-let-attackers-access-private-calendar-data/</loc>
		<lastmod>2026-01-20T19:43:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprocket-security-appoints-eric-sheridan-as-chief-technology-officer-2/</loc>
		<lastmod>2026-01-20T19:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-unveils-major-upgrade-to-identity-manager-strengthening-enterprise-identity-security-3/</loc>
		<lastmod>2026-01-20T19:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerabilities-threaten-to-break-chainlit-ai-framework/</loc>
		<lastmod>2026-01-20T19:46:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-hackers-target-developers-via-malicious-vs-code-projects/</loc>
		<lastmod>2026-01-20T19:47:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ios-and-ipados-flaws-leave-millions-of-iphones-at-risk/</loc>
		<lastmod>2026-01-20T20:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/</loc>
		<lastmod>2026-01-20T20:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-plans-cybersecurity-overhaul-to-block-foreign-high-risk-suppliers/</loc>
		<lastmod>2026-01-20T20:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-zero-risk-trap-how-to-ditch-perfection-and-prioritize-real-cyber-resilience/</loc>
		<lastmod>2026-01-20T20:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supreme-court-to-consider-whether-geofence-warrants-are-constitutional/</loc>
		<lastmod>2026-01-20T20:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-readies-law-to-eject-chinese-equipment-from-telecoms-2/</loc>
		<lastmod>2026-01-20T20:40:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-readies-law-to-eject-chinese-equipment-from-telecoms/</loc>
		<lastmod>2026-01-20T20:40:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/layerx-links-ghostposter-to-17-extensions-and-840k-downloads/</loc>
		<lastmod>2026-01-20T20:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-details-a-new-minnesota-based-detention-network-that-spans-5-states/</loc>
		<lastmod>2026-01-20T20:42:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-represents-the-future-of-ai-developed-malware-check-point/</loc>
		<lastmod>2026-01-20T21:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-security-impact/</loc>
		<lastmod>2026-01-20T21:56:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-studying-the-defensive-registration-practices-of-the-fortune-500/</loc>
		<lastmod>2026-01-20T21:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cybersecurity-risk-of-integrated-security-platforms/</loc>
		<lastmod>2026-01-20T21:58:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-top-cybersecurity-ceos-on-ais-impact-in-2026/</loc>
		<lastmod>2026-01-20T21:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-admits-doge-may-have-misused-americans-social-security-data/</loc>
		<lastmod>2026-01-20T22:00:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children/</loc>
		<lastmod>2026-01-20T22:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children-2/</loc>
		<lastmod>2026-01-20T22:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ustrive-security-lapse-exposed-personal-data-of-its-users-including-children-3/</loc>
		<lastmod>2026-01-20T22:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-security-impact-2/</loc>
		<lastmod>2026-01-20T22:03:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/access-broker-caught-jordanian-pleads-guilty-to-hacking-50-companies/</loc>
		<lastmod>2026-01-20T22:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/face-swapping-tools-pose-elevated-know-your-customer-risks/</loc>
		<lastmod>2026-01-20T22:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mass-spam-attacks-leverage-zendesk-instances/</loc>
		<lastmod>2026-01-20T22:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-rolls-out-industry-framework-to-support-good-faith-ai-research/</loc>
		<lastmod>2026-01-20T22:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion-2/</loc>
		<lastmod>2026-01-20T22:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-smarter-enterprise-a-cios-blueprint-for-2030/</loc>
		<lastmod>2026-01-20T22:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-mcdonalds-india-breach-involving-customer-data/</loc>
		<lastmod>2026-01-20T23:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesota-agency-notifies-304000-of-vendor-breach/</loc>
		<lastmod>2026-01-20T23:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-check-point-has-built-its-ai-security-platform-with-ma/</loc>
		<lastmod>2026-01-20T23:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-and-israel-pledge-cybersecurity-alliance/</loc>
		<lastmod>2026-01-20T23:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acf-plugin-bug-gives-hackers-admin-on-50000-wordpress-sites/</loc>
		<lastmod>2026-01-20T23:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crashfix-scam-crashes-browsers-delivers-malware/</loc>
		<lastmod>2026-01-20T23:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-readiness-scorecard-2026-als-wegweiser-fur-it-fuhrungskrafte/</loc>
		<lastmod>2026-01-21T00:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-whacks-waf-bypass-bug-that-opened-side-door-for-attackers/</loc>
		<lastmod>2026-01-21T00:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-rolls-out-age-prediction-model-on-chatgpt-to-detect-your-age/</loc>
		<lastmod>2026-01-21T00:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-non-humans-identities-protected/</loc>
		<lastmod>2026-01-21T04:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-organizations-satisfied-with-ai-in-secrets-security/</loc>
		<lastmod>2026-01-21T04:16:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-organizations-satisfied-with-ai-in-secrets-security-2/</loc>
		<lastmod>2026-01-21T04:16:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-improve-system-security/</loc>
		<lastmod>2026-01-21T04:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-exciting-developments-are-coming-in-ai-driven-pam/</loc>
		<lastmod>2026-01-21T04:18:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrating-enzoic-alerts-into-microsoft-sentinel-with-azure-logic-apps/</loc>
		<lastmod>2026-01-21T04:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-mend-ios-ai-security-maturity-survey-compliance-checklist-available-today/</loc>
		<lastmod>2026-01-21T04:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-mend-ios-ai-security-maturity-survey-compliance-checklist-available-today-2/</loc>
		<lastmod>2026-01-21T04:21:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-chainlit-ai-dev-framework-expose-servers-to-compromise/</loc>
		<lastmod>2026-01-21T04:22:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dax-40-unternehmen-cybersicherheit-von-einer-randnotiz-zum-strategischen-kernthema/</loc>
		<lastmod>2026-01-21T04:23:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/majority-of-ceos-report-zero-payoff-from-ai-splurge/</loc>
		<lastmod>2026-01-21T04:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-chatgpt-atlas-browser-is-testing-actions-feature/</loc>
		<lastmod>2026-01-21T04:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-gemini-wont-have-ads-as-chatgpt-prepares-to-add-them/</loc>
		<lastmod>2026-01-21T04:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-fur-scam-mails-missbraucht/</loc>
		<lastmod>2026-01-21T05:17:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deep-observability-transparenz-schaffen-und-gestresste-sicherheitsteams-entlasten/</loc>
		<lastmod>2026-01-21T05:18:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-vulnerabilities-in-anthropic-git-mcp-server-could-let-attackers-tamper-with-llms/</loc>
		<lastmod>2026-01-21T05:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-security-impact-3/</loc>
		<lastmod>2026-01-21T05:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/common-issues-with-freeradius-in-passwordless-implementations/</loc>
		<lastmod>2026-01-21T06:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/curl-shutters-bug-bounty-program-to-remove-incentive-for-submitting-ai-slop/</loc>
		<lastmod>2026-01-21T06:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2026-state-of-pentesting-why-delivery-and-follow-through-matter-more-than-ever-2/</loc>
		<lastmod>2026-01-21T06:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2026-state-of-pentesting-why-delivery-and-follow-through-matter-more-than-ever/</loc>
		<lastmod>2026-01-21T06:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-leaders-push-for-continuous-controls-as-audits-stay-manual/</loc>
		<lastmod>2026-01-21T06:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-144-released-to-fix-high-severity-v8-javascript-engine-flaw/</loc>
		<lastmod>2026-01-21T06:24:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-144-released-to-fix-high-severity-v8-javascript-engine-flaw-2/</loc>
		<lastmod>2026-01-21T06:24:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-private-endpoint-deployments-expose-cloud-resources-to-dos-attacks/</loc>
		<lastmod>2026-01-21T06:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-group-allegedly-claims-breach-of-mcdonalds-india-systems/</loc>
		<lastmod>2026-01-21T06:27:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-group-allegedly-claims-breach-of-mcdonalds-india-systems-3/</loc>
		<lastmod>2026-01-21T06:27:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-group-allegedly-claims-breach-of-mcdonalds-india-systems-2/</loc>
		<lastmod>2026-01-21T06:27:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-linkedin-for-rat-delivery-in-enterprise-networks/</loc>
		<lastmod>2026-01-21T06:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stateful-hash-based-verification-for-contextual-data-integrity/</loc>
		<lastmod>2026-01-21T07:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-forrester-study-finds-airlock-digitals-app-control-cuts-breaches-to-zero-with-224-roi/</loc>
		<lastmod>2026-01-21T07:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-one-identity-launches-ai-powered-identity-manager-to-speed-threat-response/</loc>
		<lastmod>2026-01-21T07:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-a-year-of-dora-reveals-about-cyber-resilience/</loc>
		<lastmod>2026-01-21T07:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-planen-cyberkriminelle-fur-2026-2/</loc>
		<lastmod>2026-01-21T07:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/for-cyber-risk-assessments-frequency-is-essential/</loc>
		<lastmod>2026-01-21T07:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-slop-pushes-data-governance-towards-zero-trust-models/</loc>
		<lastmod>2026-01-21T07:41:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-public-sector-cni-in-russian-hacktivist-crosshairs-2/</loc>
		<lastmod>2026-01-21T07:42:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-public-sector-cni-in-russian-hacktivist-crosshairs/</loc>
		<lastmod>2026-01-21T07:42:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-public-sector-cni-in-russian-hacktivist-crosshairs-3/</loc>
		<lastmod>2026-01-21T07:42:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-speak-the-language-young-people-trust/</loc>
		<lastmod>2026-01-21T07:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bandit-open-source-tool-designed-to-find-security-issues-in-python-code/</loc>
		<lastmod>2026-01-21T07:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-visual-studio-code-to-deploy-malicious-payloads-on-victim-systems/</loc>
		<lastmod>2026-01-21T07:45:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlock-digital-announces-independent-tei-study-quantifying-measurable-roi-security-impact-4/</loc>
		<lastmod>2026-01-21T07:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-of-fake-maintenance-messages-targeting-users-master-passwords/</loc>
		<lastmod>2026-01-21T07:47:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-cc-warns-binary-parser-bug-allows-node-js-privilege-level-code-execution/</loc>
		<lastmod>2026-01-21T07:48:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-betrug-wissenschaft-und-industrie-gegen-die-deepfake-gefahr/</loc>
		<lastmod>2026-01-21T07:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umgehung-der-sandbox-ausfuhrung-beliebiger-befehle-in-n8n-python-code-node-moglich/</loc>
		<lastmod>2026-01-21T07:50:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attribute-based-access-control-abac-complete-guide-with-policy-examples/</loc>
		<lastmod>2026-01-21T08:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attribute-based-access-control-abac-complete-guide-with-policy-examples-2/</loc>
		<lastmod>2026-01-21T08:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bearer-tokens-explained-complete-guide-to-bearer-token-authentication-security/</loc>
		<lastmod>2026-01-21T08:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workforce-iam-vs-ciam-identity-management-models-explained/</loc>
		<lastmod>2026-01-21T08:16:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workforce-iam-vs-ciam-identity-management-models-explained-2/</loc>
		<lastmod>2026-01-21T08:16:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-cyber-questions-to-better-vet-it-vendors-and-reduce-third-party-risk/</loc>
		<lastmod>2026-01-21T08:17:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-cyber-questions-to-better-vet-it-vendors-and-reduce-third-party-risk-2/</loc>
		<lastmod>2026-01-21T08:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-eu-vulnerability-platform-gcve-goes-live-reducing-reliance-on-global-systems/</loc>
		<lastmod>2026-01-21T08:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalkommissarin-nutzer-sollen-den-ruckbau-von-huawei-im-5g-netz-bezahlen/</loc>
		<lastmod>2026-01-21T08:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-warnt-vor-ghost-pairing-so-wollen-kriminelle-euren-whatsapp-account-ubernehmen/</loc>
		<lastmod>2026-01-21T08:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jahresruckblick-von-cbl-datenrettung-gefalschte-und-als-neu-verkaufte-alt-datentrager-werden-zum-problem/</loc>
		<lastmod>2026-01-21T09:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jetzt-abschalten-zehn-jahre-alte-telnetd-lucke-macht-jeden-client-zum-root/</loc>
		<lastmod>2026-01-21T09:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-kommission-will-huawei-und-zte-aus-netzen-verbannen/</loc>
		<lastmod>2026-01-21T10:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-shows-how-one-developer-used-ai-to-build-a-powerful-linux-malware/</loc>
		<lastmod>2026-01-21T10:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-fraud-promises-to-streamline-fight-against-economic-crime/</loc>
		<lastmod>2026-01-21T10:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-erweitert-sein-portfolio-um-sophos-workspace-protection/</loc>
		<lastmod>2026-01-21T10:18:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-erweitert-sein-portfolio-um-sophos-workspace-protection-2/</loc>
		<lastmod>2026-01-21T10:18:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patchday-geht-schief-neue-windows-updates-lassen-allerhand-apps-einfrieren/</loc>
		<lastmod>2026-01-21T10:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-enters-the-global-top-tier-of-ddos-security-nsfocus-ddos-solutions-positioned-in-the-marketsandmarkets-star-quadrant/</loc>
		<lastmod>2026-01-21T11:15:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-prioritization-beyond-the-cvss-number/</loc>
		<lastmod>2026-01-21T11:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-users-targeted-by-crypto-thieves-via-hijacked-apps-on-snap-store/</loc>
		<lastmod>2026-01-21T11:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-intune-changes-to-start-biting-unprepared-admins/</loc>
		<lastmod>2026-01-21T11:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/</loc>
		<lastmod>2026-01-21T11:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-linux-malware-framework-built-with-ai-assistance-reaches-88000-lines-of-code/</loc>
		<lastmod>2026-01-21T11:20:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hacktivist-campaigns-continue-against-uk-organizations/</loc>
		<lastmod>2026-01-21T11:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hacktivist-campaigns-continue-against-uk-organizations-2/</loc>
		<lastmod>2026-01-21T11:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-welcome-global-cybersecurity-vulnerability-enumeration-launch/</loc>
		<lastmod>2026-01-21T11:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-welcome-global-cybersecurity-vulnerability-enumeration-launch-2/</loc>
		<lastmod>2026-01-21T11:23:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/out-of-control-so-halten-sie-ki-bots-in-schach/</loc>
		<lastmod>2026-01-21T11:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-china-warnt-vor-konsequenzen-wegen-eu-planen/</loc>
		<lastmod>2026-01-21T11:25:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-grade-identity-verification-for-ai-enhanced-workflows/</loc>
		<lastmod>2026-01-21T12:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shared-intel-qa-ai-retrieval-systems-can-still-hallucinate-deterministic-logic-offers-a-fix/</loc>
		<lastmod>2026-01-21T12:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-thin-line-between-saving-a-company-and-funding-a-crime/</loc>
		<lastmod>2026-01-21T12:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erbeuten-rund-42-000-datensatze-von-ingram-micro/</loc>
		<lastmod>2026-01-21T12:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-denial-of-service-attacks-target-uk-ncsc-warns/</loc>
		<lastmod>2026-01-21T12:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/carlsberg-event-wristband-leaked-pii-researcher-told-not-to-disclose/</loc>
		<lastmod>2026-01-21T12:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crooks-impersonate-lastpass-in-campaign-to-harvest-master-passwords/</loc>
		<lastmod>2026-01-21T12:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eus-new-cybersecurity-act-could-ban-high-risk-suppliers/</loc>
		<lastmod>2026-01-21T12:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposure-assessment-platforms-signal-a-shift-in-focus/</loc>
		<lastmod>2026-01-21T12:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierung-gezielt-steuern-statt-digitale-risiken-eingehen-wie-tk-anbieter-digitales-chaos-vermeiden/</loc>
		<lastmod>2026-01-21T12:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contagious-interview-turns-vs-code-into-an-attack-vector/</loc>
		<lastmod>2026-01-21T13:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prtg-im-siemens-industrial-edge-marketplace-verfugbar/</loc>
		<lastmod>2026-01-21T13:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-british-uks-infosec-envoys-include-cisco-palo-alto-and-accenture/</loc>
		<lastmod>2026-01-21T13:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomhub-claims-alleged-breach-of-apple-partner-luxshare/</loc>
		<lastmod>2026-01-21T13:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tesla-hacked-37-zero-days-demoed-at-pwn2own-automotive-2026/</loc>
		<lastmod>2026-01-21T13:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/</loc>
		<lastmod>2026-01-21T13:20:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-linux-malware-was-built-using-an-ai-agent-researchers-reveal/</loc>
		<lastmod>2026-01-21T13:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-unveils-cybersecurity-overhaul-with-proposed-update-to-cybersecurity-act/</loc>
		<lastmod>2026-01-21T13:23:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-praxisleitfaden-nis-2-fur-kmu-clever-umsetzen/</loc>
		<lastmod>2026-01-21T13:23:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investition-in-zensurapparat-russland-will-mit-ki-jagd-auf-vpn-traffic-machen/</loc>
		<lastmod>2026-01-21T13:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-exposes-critical-gap-64-of-third-party-applications-access-sensitive-data-without-authorization/</loc>
		<lastmod>2026-01-21T14:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-sicherheit-und-bessere-governance-fur-microsoft-365-tenants/</loc>
		<lastmod>2026-01-21T14:17:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/james-love-ist-neuer-chief-revenue-officer-von-claroty/</loc>
		<lastmod>2026-01-21T14:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-considers-whether-theres-huawei-of-axing-chinese-kit-from-networks-within-3-years/</loc>
		<lastmod>2026-01-21T14:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-wants-to-give-its-cops-spyware-ability-to-crack-encrypted-messages/</loc>
		<lastmod>2026-01-21T14:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/just-the-browser-claims-to-tame-the-bloat-without-forking/</loc>
		<lastmod>2026-01-21T14:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/just-the-browser-claims-to-tame-the-bloat-without-forking-2/</loc>
		<lastmod>2026-01-21T14:22:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-dns-behavior-can-turn-private-endpoints-into-dos-risks/</loc>
		<lastmod>2026-01-21T14:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-exposes-critical-gap-64-of-third-party-applications-access-sensitive-data-without-authorization-2/</loc>
		<lastmod>2026-01-21T14:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rust-package-registry-adds-security-tools-and-metrics-to-crates-io/</loc>
		<lastmod>2026-01-21T14:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-security-flaws-could-allow-two-factor-authentication-bypass-and-dos/</loc>
		<lastmod>2026-01-21T14:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-nsight-graphics-on-linux-exposed-to-code-execution-vulnerability/</loc>
		<lastmod>2026-01-21T14:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-adds-age-prediction-to-chatgpt-to-strengthen-teen-safety/</loc>
		<lastmod>2026-01-21T14:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-2500-security-tools-to-disable-endpoint-defenses-before-ransomware-attacks/</loc>
		<lastmod>2026-01-21T14:29:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-emerges-first-fully-ai-driven-malware-signals-a-new-era-of-cyber-threats/</loc>
		<lastmod>2026-01-21T14:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/errtraffic-exploits-visual-page-breaks-to-fuel-clickfix-attacks-rebranding-exploits-as-glitchfix/</loc>
		<lastmod>2026-01-21T14:32:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/errtraffic-exploits-visual-page-breaks-to-fuel-clickfix-attacks-rebranding-exploits-as-glitchfix-2/</loc>
		<lastmod>2026-01-21T14:32:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gnu-inetutils-vulnerability-exploited-via-f-root-to-achieve-full-system-control/</loc>
		<lastmod>2026-01-21T14:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zoom-vulnerability-enables-remote-code-execution-via-command-injection/</loc>
		<lastmod>2026-01-21T14:34:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purelogs-payload-hidden-in-weaponized-png-images-used-in-stealth-attacks/</loc>
		<lastmod>2026-01-21T14:34:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponized-shipping-documents-spread-remcos-rat-in-stealthy-malware-campaign/</loc>
		<lastmod>2026-01-21T14:35:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magecart-hack-injects-javascript-to-steal-online-payment-data/</loc>
		<lastmod>2026-01-21T14:36:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/souveranitats-washing-ein-kritischer-blick-auf-die-partnerschaft-zwischen-bsi-und-aws/</loc>
		<lastmod>2026-01-21T14:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investition-in-ki-tools-russland-will-noch-harter-gegen-vpn-anbieter-durchgreifen/</loc>
		<lastmod>2026-01-21T14:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-data-leaks-dont-look-like-breaches-the-instagram-exposure-explained/</loc>
		<lastmod>2026-01-21T15:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ci-cd-under-attack-what-the-aws-codebuild-codebreach-flaw-reveals-about-modern-supply-chain-risk/</loc>
		<lastmod>2026-01-21T15:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerability-in-advanced-custom-fields-extended-plugin-puts-100000-wordpress-sites-at-risk/</loc>
		<lastmod>2026-01-21T15:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-unveils-new-plans-to-tackle-huawei-zte-as-china-alleges-protectionism/</loc>
		<lastmod>2026-01-21T15:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkere-cybersecurity-fur-anbieter-kritischer-infrastrukturen/</loc>
		<lastmod>2026-01-21T15:19:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-tightens-cybersecurity-rules-for-tech-supply-chains/</loc>
		<lastmod>2026-01-21T15:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasas-artemis-ii-moon-rocket-arrives-at-the-launch-pad/</loc>
		<lastmod>2026-01-21T15:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasas-artemis-ii-moon-rocket-arrives-at-the-launch-pad-2/</loc>
		<lastmod>2026-01-21T15:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasas-artemis-ii-moon-rocket-arrives-at-the-launch-pad-3/</loc>
		<lastmod>2026-01-21T15:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasas-artemis-ii-moon-rocket-arrives-at-the-launch-pad-4/</loc>
		<lastmod>2026-01-21T15:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-got-phished-of-course-youre-human/</loc>
		<lastmod>2026-01-21T15:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/</loc>
		<lastmod>2026-01-21T15:24:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-warns-of-high-severity-2fa-bypass-denial-of-service-flaws/</loc>
		<lastmod>2026-01-21T15:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/damn-vulnerable-training-apps-leave-vendors-clouds-exposed/</loc>
		<lastmod>2026-01-21T15:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-research-im-gesprach-sandboxes-und-ki-basierte-cybersicherheit-2/</loc>
		<lastmod>2026-01-21T15:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-research-im-gesprach-sandboxes-und-ki-basierte-cybersicherheit/</loc>
		<lastmod>2026-01-21T15:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cfos-cisos-clash-over-cybersecurity-spending-as-threats-mount-expel/</loc>
		<lastmod>2026-01-21T16:22:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backup-request-is-actually-a-phishing-campaign-lastpass-warns/</loc>
		<lastmod>2026-01-21T16:23:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greek-police-arrest-scammers-using-fake-cell-tower-hidden-in-car-trunk/</loc>
		<lastmod>2026-01-21T16:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-der-knowbe4-threat-labs-cyberangreifer-missbrauchen-zunehmend-wechat/</loc>
		<lastmod>2026-01-21T16:24:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/</loc>
		<lastmod>2026-01-21T16:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-gang-said-to-be-sitting-on-mountain-of-under-armour-data/</loc>
		<lastmod>2026-01-21T16:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erp-isnt-dead-yet-but-most-execs-are-planning-the-wake/</loc>
		<lastmod>2026-01-21T16:27:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-abuses-dll-sideloading-for-persistent-access/</loc>
		<lastmod>2026-01-21T16:28:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shares-workaround-for-outlook-freezes-after-windows-update/</loc>
		<lastmod>2026-01-21T16:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/</loc>
		<lastmod>2026-01-21T16:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peruvian-loan-scam-harvests-cards-and-pins-via-fake-applications/</loc>
		<lastmod>2026-01-21T16:32:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/server-infrastruktur-in-deutschland-beschlagnahmt-cybercrime-dienst-redvds-abgeschaltet/</loc>
		<lastmod>2026-01-21T16:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elektronische-patientenakte-gesundheitsdaten-werden-vor-beschlagnahme-geschutzt/</loc>
		<lastmod>2026-01-21T16:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-als-zensurwerkzeug-russland-will-noch-harter-gegen-vpn-anbieter-durchgreifen/</loc>
		<lastmod>2026-01-21T16:34:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-idea-to-5m-how-ishir-texas-venture-studio-helps-founders-turn-thought-into-scalable-value/</loc>
		<lastmod>2026-01-21T17:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-backup-request-is-phishing-campaign-in-disguise/</loc>
		<lastmod>2026-01-21T17:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-backup-request-is-phishing-campaign-in-disguise-2/</loc>
		<lastmod>2026-01-21T17:42:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-bastas-alleged-ringleader-identified-as-authorities-raid-homes-of-other-members/</loc>
		<lastmod>2026-01-21T17:42:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/micron-finds-a-way-to-make-more-dram-with-1-8bn-chip-plant-purchase/</loc>
		<lastmod>2026-01-21T17:43:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acme-flaw-in-cloudflare-allowed-attackers-to-reach-origin-servers/</loc>
		<lastmod>2026-01-21T17:44:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-weblogic-proxy-bug-enables-unauthenticated-remote-compromise/</loc>
		<lastmod>2026-01-21T17:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/complex-voidlink-linux-malware-created-by-ai/</loc>
		<lastmod>2026-01-21T17:46:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/complex-voidlink-linux-malware-created-by-ai-2/</loc>
		<lastmod>2026-01-21T17:46:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-and-spoofed-sites-remain-primary-entry-points-for-olympics/</loc>
		<lastmod>2026-01-21T17:47:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-22794-changing-the-origin-header-to-take-over-appsmith-accounts/</loc>
		<lastmod>2026-01-21T18:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-click-on-the-lastpass-create-backup-link-its-a-scam/</loc>
		<lastmod>2026-01-21T18:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-notifications-in-europe-rise-while-fines-hold-steady/</loc>
		<lastmod>2026-01-21T18:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-and-ice-are-driving-patients-away-from-medical-care-report-warns/</loc>
		<lastmod>2026-01-21T18:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/</loc>
		<lastmod>2026-01-21T18:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-lastpass-emails-pose-as-password-vault-backup-alerts/</loc>
		<lastmod>2026-01-21T18:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/</loc>
		<lastmod>2026-01-21T18:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews-2/</loc>
		<lastmod>2026-01-21T18:42:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews-3/</loc>
		<lastmod>2026-01-21T18:42:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munchen-datenschutzer-gehen-fotografierende-falschparker-melder-an/</loc>
		<lastmod>2026-01-21T18:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-dissecting-payload-based-transaction-phishing-on-ethereum/</loc>
		<lastmod>2026-01-21T20:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coder-builds-malware-in-week-with-ai-help/</loc>
		<lastmod>2026-01-21T20:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-target-freshly-patched-critical-fortinet-flaws/</loc>
		<lastmod>2026-01-21T20:17:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-target-freshly-patched-critical-fortinet-flaws-2/</loc>
		<lastmod>2026-01-21T20:17:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rce-flaw-in-cisco-enterprise-communications-products-probed-by-attackers-cve-2026-20045/</loc>
		<lastmod>2026-01-21T20:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gsma-mobilfunkbetreiber-lehnen-huawei-verbot-in-eu-ab/</loc>
		<lastmod>2026-01-21T20:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-future-practical-approaches-to-digital-sovereignty-in-google-workspace/</loc>
		<lastmod>2026-01-22T08:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-microsoft-365-konfigurationen-geschutzt-werden-mussen/</loc>
		<lastmod>2026-01-22T08:33:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-cisco-unified-communications-products-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-22T08:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eingriffe-und-kabelschaden-globale-storungen-nehmen-zu-cloudflare-report-zeigt-das-internet-bleibt-anfallig/</loc>
		<lastmod>2026-01-22T08:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munchen-datenschutzamt-erschwert-burgerhinweise-auf-falschparker/</loc>
		<lastmod>2026-01-22T08:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-ki-paradox-in-der-softwareentwicklung/</loc>
		<lastmod>2026-01-22T09:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt-exploited-sitecore-zero-day-in-critical-infrastructure-intrusion/</loc>
		<lastmod>2026-01-22T09:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/support-mails-ohne-ende-riesige-spam-welle-von-zendesk-flutet-epostfacher/</loc>
		<lastmod>2026-01-22T09:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-space-agencys-cybersecurity-in-freefall-as-yet-another-breach-exposes-spacecraft-and-mission-data/</loc>
		<lastmod>2026-01-22T10:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-of-phishing-campaign-targeting-its-customers/</loc>
		<lastmod>2026-01-22T10:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-fortinet-sso-flaw-targets-firewalls-for-admin-takeover/</loc>
		<lastmod>2026-01-22T10:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-unified-communications-zero-day-rce-flaw-actively-exploited-for-root-shell-access/</loc>
		<lastmod>2026-01-22T10:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-campaign-exploits-fake-verification-pages-to-hijack-facebook-sessions/</loc>
		<lastmod>2026-01-22T10:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-package-impersonates-sympy-dev-targeting-millions-of-users/</loc>
		<lastmod>2026-01-22T10:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-multi-stage-windows-malware-disables-microsoft-defender-deploys-malicious-payloads/</loc>
		<lastmod>2026-01-22T10:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-powered-android-malware-automatically-clicks-ads-on-infected-devices/</loc>
		<lastmod>2026-01-22T10:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clearfake-malware-exploits-proxy-execution-to-run-malicious-powershell-commands-via-trusted-windows-feature/</loc>
		<lastmod>2026-01-22T10:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-lucke-in-sap-netweaver-von-der-lucke-zur-welle-was-cve-2025-31324-uber-erp-exploits-verrat/</loc>
		<lastmod>2026-01-22T10:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-automotive-hacker-hacken-tesla-ev-lader-und-mehr/</loc>
		<lastmod>2026-01-22T10:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-week-another-emergency-patch-as-cisco-plugs-unified-comms-zero-day/</loc>
		<lastmod>2026-01-22T11:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-detects-surge-in-automated-fortinet-fortigate-firewall-configuration-attacks/</loc>
		<lastmod>2026-01-22T11:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-begins-trials-of-digital-driving-licence/</loc>
		<lastmod>2026-01-22T11:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tesla-sony-and-alpine-systems-compromised-on-day-one-of-pwn2own-automotive-2026/</loc>
		<lastmod>2026-01-22T11:36:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openwrt-one-gains-support-for-running-debian/</loc>
		<lastmod>2026-01-22T11:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/</loc>
		<lastmod>2026-01-22T11:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/</loc>
		<lastmod>2026-01-22T11:39:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-160000-companies-notify-regulators-of-gdpr-breaches/</loc>
		<lastmod>2026-01-22T11:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-executives-warn-they-may-not-survive-a-major-cyber-attack-vodafone-survey-finds/</loc>
		<lastmod>2026-01-22T11:40:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zest-security-adds-ai-agents-to-identify-vulnerabilities-that-pose-no-actual-risk/</loc>
		<lastmod>2026-01-22T12:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-was-almost-entirely-made-by-ai/</loc>
		<lastmod>2026-01-22T12:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missing-on-ramp-why-cyber-careers-are-losing-entry-points/</loc>
		<lastmod>2026-01-22T12:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-and-gitlab-patch-rce-dos-and-2fa-bypass-vulnerabilities/</loc>
		<lastmod>2026-01-22T12:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs/</loc>
		<lastmod>2026-01-22T12:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filling-the-most-common-gaps-in-google-workspace-security/</loc>
		<lastmod>2026-01-22T12:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-of-phishing-campaign-attempting-to-steal-master-passwords/</loc>
		<lastmod>2026-01-22T12:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konsolidierte-update-architektur-fur-windows-umgebungen-windows-update-orchestration-platform/</loc>
		<lastmod>2026-01-22T12:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-hosted-github-actions-runner-werden-als-backdoors-missbraucht/</loc>
		<lastmod>2026-01-22T12:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unified-cm-und-mehr-hacker-attackieren-cisco-systeme-uber-zero-day-lucke/</loc>
		<lastmod>2026-01-22T12:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-im-cloud-computing-bsi-und-ionos-kooperieren-fur-sichere-cloud-infrastrukturen/</loc>
		<lastmod>2026-01-22T13:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dringend-patchen-hacker-attackieren-cisco-tools-uber-zero-day-lucke/</loc>
		<lastmod>2026-01-22T13:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-student-centered-learning-a-practical-guide-for-new-teachers/</loc>
		<lastmod>2026-01-22T13:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-legen-websites-von-conceptnet-kunden-lahm/</loc>
		<lastmod>2026-01-22T13:33:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/actively-exploited-cisco-uc-bug-requires-immediate-versionspecific-patching/</loc>
		<lastmod>2026-01-22T13:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jordan-used-cellebrite-phone-hacking-tools-against-activists-critical-of-gaza-war-report-finds/</loc>
		<lastmod>2026-01-22T13:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ancient-telnet-bug-happily-hands-out-root-to-attackers/</loc>
		<lastmod>2026-01-22T13:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-puts-cloud-systems-on-high-alert-with-custom-built-attacks/</loc>
		<lastmod>2026-01-22T13:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maintel-pipeline-remains-strong/</loc>
		<lastmod>2026-01-22T13:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mid-sized-customers-go-it-alone-with-security/</loc>
		<lastmod>2026-01-22T13:39:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mid-sized-customers-go-it-alone-with-security-2/</loc>
		<lastmod>2026-01-22T13:39:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-29-zero-days-on-second-day-of-pwn2own-automotive/</loc>
		<lastmod>2026-01-22T13:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-undermine-progress-in-browser-security/</loc>
		<lastmod>2026-01-22T13:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-exploits-surge-nearly-30-of-flaws-attacked-before-disclosure/</loc>
		<lastmod>2026-01-22T13:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-it-sicherheit-zum-standortfaktor-wird-2/</loc>
		<lastmod>2026-01-22T14:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-it-sicherheit-zum-standortfaktor-wird/</loc>
		<lastmod>2026-01-22T14:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-e-retailer-pccomponentes-denies-report-it-was-hacked/</loc>
		<lastmod>2026-01-22T14:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-hosted-github-actions-runner-werden-als-backdoor-missbraucht/</loc>
		<lastmod>2026-01-22T14:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-gut-sind-handwerksbetriebe-auf-cybervorfalle-vorbereitet/</loc>
		<lastmod>2026-01-22T14:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energy-sector-orgs-targeted-with-aitm-phishing-campaign/</loc>
		<lastmod>2026-01-22T14:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-infostealer-was-ist-ein-infostealer/</loc>
		<lastmod>2026-01-22T14:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foxit-epic-games-store-meddreams-vulnerabilities/</loc>
		<lastmod>2026-01-22T15:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-fuhrt-ki-getriebenes-exposure-management-zur-schliesung-des-cybersecurity-remediation-gap-ein/</loc>
		<lastmod>2026-01-22T15:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-kunstliche-intelligenz-unternehmen-infrastrukturen-und-arbeitsweisen-verandern-wird/</loc>
		<lastmod>2026-01-22T15:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-gdpr-cops-dished-out-euro1-2b-in-fines-last-year-as-data-breaches-piled-up/</loc>
		<lastmod>2026-01-22T15:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-of-england-financial-sector-failing-to-implement-basic-cybersecurity-controls/</loc>
		<lastmod>2026-01-22T15:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sportswear-firm-under-armour-falls-victim-to-data-breach/</loc>
		<lastmod>2026-01-22T15:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-active-directory-password-resets-are-surging-in-hybrid-work/</loc>
		<lastmod>2026-01-22T15:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-updates-notepad-and-paint-with-more-ai-features/</loc>
		<lastmod>2026-01-22T15:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-osiris-ransomware-leverages-living-off-the-land-and-dual-use-tools-in-attacks/</loc>
		<lastmod>2026-01-22T15:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vivotek-flaw-enables-remote-arbitrary-code-execution/</loc>
		<lastmod>2026-01-22T15:42:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-cuda-toolkit-flaw-allows-command-injection-arbitrary-code-execution/</loc>
		<lastmod>2026-01-22T15:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bind-9-flaw-lets-attackers-crash-servers-with-malicious-dns-records/</loc>
		<lastmod>2026-01-22T15:44:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pnb-metlife-phishing-attack-multi-stage-scheme-steals-data-triggers-upi-payments/</loc>
		<lastmod>2026-01-22T15:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pnb-metlife-phishing-attack-multi-stage-scheme-steals-data-triggers-upi-payments-2/</loc>
		<lastmod>2026-01-22T15:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-snap-domains-to-inject-malicious-code-into-linux-software-packages/</loc>
		<lastmod>2026-01-22T15:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ja3-fingerprinting-tool-exposes-attackers-infrastructure/</loc>
		<lastmod>2026-01-22T15:48:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-unified-cm-zero-day-rce-under-attack-cisa-issues-warning/</loc>
		<lastmod>2026-01-22T15:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-chainlit-ai-flaws-let-hackers-seize-control-of-cloud-environments/</loc>
		<lastmod>2026-01-22T15:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-binary-parser-library-flaw-enables-malicious-code-injection/</loc>
		<lastmod>2026-01-22T15:51:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-actors-deploy-vs-code-tunnels-for-remote-hacking/</loc>
		<lastmod>2026-01-22T15:52:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-pixel-zero-click-redis-rce-china-c2s-rat-ads-crypto-scams-15-stories/</loc>
		<lastmod>2026-01-22T15:53:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realhomes-crm-plugin-flaw-affected-30000-wordpress-sites/</loc>
		<lastmod>2026-01-22T15:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opentext-global-ransomware-survey-2025-studie-zeigt-trugerisches-selbstvertrauen-vor-ransomware-angriffen/</loc>
		<lastmod>2026-01-22T15:55:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-teams-arent-equipped-to-stop-rogue-ai-agents-2/</loc>
		<lastmod>2026-01-22T16:33:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-teams-arent-equipped-to-stop-rogue-ai-agents/</loc>
		<lastmod>2026-01-22T16:33:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claroty-raises-150m-in-new-funding-amid-acquisitions-of-rivals/</loc>
		<lastmod>2026-01-22T16:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/under-armour-says-its-aware-of-data-breach-claims-after-72m-customer-records-were-posted-online/</loc>
		<lastmod>2026-01-22T16:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-und-ibm-consulting-bringen-gemeinsame-losung-zur-beschleunigung-der-quantensicheren-transformation-von-unternehmen/</loc>
		<lastmod>2026-01-22T16:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortigate-firewalls-hit-by-silent-sso-intrusions-and-config-theft/</loc>
		<lastmod>2026-01-22T16:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dead-batteries-cough-up-lithium-after-a-bath-in-coa-and-water-boffins-say/</loc>
		<lastmod>2026-01-22T16:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-smartermail-vulnerability-under-attack-no-cve-yet/</loc>
		<lastmod>2026-01-22T16:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-banking-enterprises-as-non-human-identities-grow/</loc>
		<lastmod>2026-01-22T16:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/under-armour-ransomware-attack-exposes-72m-email-addresses/</loc>
		<lastmod>2026-01-22T16:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-appsmith-flaw-enables-account-takeovers/</loc>
		<lastmod>2026-01-22T16:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-introduces-instant-account-switching-and-passkey-improvements/</loc>
		<lastmod>2026-01-22T16:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obsidian-security-extends-reach-to-saas-application-integrations/</loc>
		<lastmod>2026-01-22T17:48:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weve-reached-the-customers-want-security-stage-and-ai-is-listening/</loc>
		<lastmod>2026-01-22T17:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-rethinking-trust-in-forge-based-git-security/</loc>
		<lastmod>2026-01-22T17:50:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-bot-auth-verifying-user-identity-ensuring-agent-trust-through-the-customer-journey/</loc>
		<lastmod>2026-01-22T17:51:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boards-focus-on-risk-resilience-and-operational-realities-where-nhi-governance-fits-in/</loc>
		<lastmod>2026-01-22T17:52:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-application-security-meets-ai-risk/</loc>
		<lastmod>2026-01-22T17:53:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-generative-ai-a-technical-guide-to-protecting-your-llm-infrastructure/</loc>
		<lastmod>2026-01-22T17:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-of-lords-backs-legislation-to-ban-social-media-for-children-under-16/</loc>
		<lastmod>2026-01-22T17:55:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-proposes-new-law-allowing-police-to-use-spyware/</loc>
		<lastmod>2026-01-22T17:56:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-generierte-malware-bedroht-entwickler-und-blockchain-okosysteme/</loc>
		<lastmod>2026-01-22T17:57:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claroty-sichert-sich-150-millionen-dollar-finanzierungsrunde-zum-weiteren-ausbau-des-schutzes-kritischer-infrastrukturen/</loc>
		<lastmod>2026-01-22T17:58:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-south-korea-busts-102m-laundering-ring-2/</loc>
		<lastmod>2026-01-22T17:59:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-south-korea-busts-102m-laundering-ring/</loc>
		<lastmod>2026-01-22T17:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-flaw-in-cisco-unified-communications-being-targeted/</loc>
		<lastmod>2026-01-22T18:00:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-add-brand-impersonation-warnings-to-calls/</loc>
		<lastmod>2026-01-22T18:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inc-ransomware-opsec-fail-allowed-data-recovery-for-12-us-orgs/</loc>
		<lastmod>2026-01-22T18:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latin-american-orgs-lack-confidence-in-cyber-defenses-skills/</loc>
		<lastmod>2026-01-22T18:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-gnu-inetutils-telnetd-flaw-lets-attackers-bypass-login-and-gain-root-access/</loc>
		<lastmod>2026-01-22T18:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-fuhrt-ki-getriebenes-exposure-management-ein/</loc>
		<lastmod>2026-01-22T18:05:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time-2/</loc>
		<lastmod>2026-01-22T18:43:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time/</loc>
		<lastmod>2026-01-22T18:43:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-the-data-lake-to-the-edge-why-universal-visibility-is-the-future-of-api-security/</loc>
		<lastmod>2026-01-22T18:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-jordan-government-used-cellebrite-phone-cracking-tech-against-activists/</loc>
		<lastmod>2026-01-22T18:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-using-linkedin-dms-and-pdf-tools-to-deploy-trojans/</loc>
		<lastmod>2026-01-22T18:47:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-agents-are-doxing-themselves/</loc>
		<lastmod>2026-01-22T18:47:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-judge-closes-nso-group-spyware-probe-due-to-lack-of-cooperation-from-israel/</loc>
		<lastmod>2026-01-22T19:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/i-scan-you-scan-we-all-scan-for-knowledge/</loc>
		<lastmod>2026-01-22T19:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-compromised-energy-firms-microsoft-accounts-sent-600-phishing-emails/</loc>
		<lastmod>2026-01-22T20:00:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/curl-ending-bug-bounty-program-after-flood-of-ai-slop-reports/</loc>
		<lastmod>2026-01-22T20:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/curl-ending-bug-bounty-program-after-flood-of-ai-slop-reports-2/</loc>
		<lastmod>2026-01-22T20:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartermail-auth-bypass-flaw-now-exploited-to-hijack-admin-accounts/</loc>
		<lastmod>2026-01-22T20:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-osiris-ransomware-emerges-as-new-strain-using-poortry-driver-in-byovd-attack/</loc>
		<lastmod>2026-01-22T20:03:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-is-making-attack-surface-management-mandatory/</loc>
		<lastmod>2026-01-22T20:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-is-adding-a-new-content-verification-feature-to-videos/</loc>
		<lastmod>2026-01-22T20:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/machine-learningpowered-android-trojans-bypass-script-based-ad-click-detection/</loc>
		<lastmod>2026-01-22T20:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jpmorgan-ceo-urges-slowdown-of-ai-roll-out-to-save-society/</loc>
		<lastmod>2026-01-22T20:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-a-whisper-to-a-scream-europe-frets-about-overreliance-on-us-tech/</loc>
		<lastmod>2026-01-22T20:46:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchdog-group-sues-for-tsa-data-sharing-agreement-with-ice/</loc>
		<lastmod>2026-01-22T21:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leader-of-ransomware-crew-pleads-guilty-to-four-year-crime-spree/</loc>
		<lastmod>2026-01-22T21:47:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/channel-women-in-security-a-conversation-with-fernanda-silva-on-ambition-trust-and-the-future-of-cybersecurity-sales/</loc>
		<lastmod>2026-01-22T22:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-plans-law-allowing-law-enforcement-to-use-spyware/</loc>
		<lastmod>2026-01-22T22:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-hit-by-outage-preventing-access-to-emails-and-files/</loc>
		<lastmod>2026-01-22T22:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-to-pay-8-25m-settlement-over-child-data-tracking-in-play-store/</loc>
		<lastmod>2026-01-22T22:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-doge-uploaded-social-security-data-to-cloud/</loc>
		<lastmod>2026-01-22T22:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-sso-accounts-targeted-in-vishing-based-data-theft-attacks/</loc>
		<lastmod>2026-01-22T22:37:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-firewalls-hit-with-malicious-configuration-changes/</loc>
		<lastmod>2026-01-22T22:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beschaffungsmarkt-europa-soll-usa-bei-kritischer-infrastruktur-ausschliesen/</loc>
		<lastmod>2026-01-22T22:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overrun-with-ai-slop-curl-scraps-bug-bounties-to-ensure-intact-mental-health/</loc>
		<lastmod>2026-01-22T23:31:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-who-stole-120000-bitcoins-wants-a-second-chance-and-a-security-job/</loc>
		<lastmod>2026-01-22T23:45:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivial-telnet-authentication-bypass-exposes-devices-to-complete-takeover/</loc>
		<lastmod>2026-01-22T23:46:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-hit-the-easy-button-for-scattered-spider-style-helpdesk-scams/</loc>
		<lastmod>2026-01-22T23:47:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-watchdog-urges-cyber-governance-overhaul/</loc>
		<lastmod>2026-01-22T23:48:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-officials-urge-congress-to-reauthorize-key-quantum-law/</loc>
		<lastmod>2026-01-22T23:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risky-chinese-electric-buses-spark-aussie-govt-review/</loc>
		<lastmod>2026-01-22T23:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesellschaft-fur-informatik-europa-soll-usa-bei-kritischer-infrastruktur-ausschliesen/</loc>
		<lastmod>2026-01-22T23:51:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-scale-nhis-safely-and-efficiently/</loc>
		<lastmod>2026-01-23T00:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-invest-in-advanced-nhis-management/</loc>
		<lastmod>2026-01-23T00:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-ai-in-cybersecurity-reliable/</loc>
		<lastmod>2026-01-23T00:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-ai-secrets-ensure-cloud-security-2/</loc>
		<lastmod>2026-01-23T00:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-ai-secrets-ensure-cloud-security/</loc>
		<lastmod>2026-01-23T00:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-jahrestag-im-kontext-digitaler-operationaler-resilienz/</loc>
		<lastmod>2026-01-23T00:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugsmaschen-florieren-in-anzeigen-feeds-und-videos/</loc>
		<lastmod>2026-01-23T04:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-slip-up-led-to-data-recovery-for-12-us-firms/</loc>
		<lastmod>2026-01-23T04:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiko-sparsamkeit-cybersicherheit-fur-viele-unternehmen-noch-immer-lastige-pflicht/</loc>
		<lastmod>2026-01-23T04:33:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-hasnt-delivered-the-profits-it-was-hyped-for-says-deloitte/</loc>
		<lastmod>2026-01-23T04:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time-3/</loc>
		<lastmod>2026-01-23T04:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-automotive-2026-researchers-score-516500-for-37-unique-zero-days/</loc>
		<lastmod>2026-01-23T04:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-january-23-2026/</loc>
		<lastmod>2026-01-23T05:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasada-launches-ai-agent-trust-to-secure-agentic-commerce/</loc>
		<lastmod>2026-01-23T06:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasada-launches-ai-agent-trust-to-secure-agentic-commerce-4/</loc>
		<lastmod>2026-01-23T06:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasada-launches-ai-agent-trust-to-secure-agentic-commerce-3/</loc>
		<lastmod>2026-01-23T06:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasada-launches-ai-agent-trust-to-secure-agentic-commerce-2/</loc>
		<lastmod>2026-01-23T06:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-ausfallsicherheit-die-zukunft-des-site-reliability-engineering/</loc>
		<lastmod>2026-01-23T06:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-employees-get-ai-tools-fewer-rely-on-them-at-work/</loc>
		<lastmod>2026-01-23T06:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-edges-closer-to-everyday-production-use/</loc>
		<lastmod>2026-01-23T06:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-edges-closer-to-everyday-production-use-2/</loc>
		<lastmod>2026-01-23T06:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-edges-closer-to-everyday-production-use-3/</loc>
		<lastmod>2026-01-23T06:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-edges-closer-to-everyday-production-use-4/</loc>
		<lastmod>2026-01-23T06:35:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-introduces-winapp-an-open-source-cli-for-building-windows-apps/</loc>
		<lastmod>2026-01-23T06:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stackwarp-neue-angriffsmethode-nutzt-sicherheitslucke-in-amd-prozessoren/</loc>
		<lastmod>2026-01-23T06:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-time-sms-links-that-never-expire-can-expose-personal-data-for-years/</loc>
		<lastmod>2026-01-23T07:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-access-service-edge-warum-es-bei-sase-auf-die-performance-ankommt/</loc>
		<lastmod>2026-01-23T07:34:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/someone-is-impersonating-me-on-instagram-and-meta-doesnt-give-a-sht/</loc>
		<lastmod>2026-01-23T08:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/someone-is-impersonating-me-on-instagram-and-meta-doesnt-give-a-sht-2/</loc>
		<lastmod>2026-01-23T08:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-guide-will-show-you-how-to-create-saml-identity-management/</loc>
		<lastmod>2026-01-23T09:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-saml-2-0-and-how-does-it-work/</loc>
		<lastmod>2026-01-23T09:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/architecting-enterprise-readiness-why-saml-still-wins-the-b2b-auth-war/</loc>
		<lastmod>2026-01-23T09:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/architecting-the-enterprise-saml-handshake-a-ctos-guide-to-service-provider-implementation/</loc>
		<lastmod>2026-01-23T09:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-sign-on-sso-your-ultimate-guide-to-openid-saml-oauth/</loc>
		<lastmod>2026-01-23T09:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-fur-cisos-widerstands-und-anpassungsfahigkeit-fur-ein-resilientes-unternehmen/</loc>
		<lastmod>2026-01-23T09:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-releases-critical-patch-updates-to-address-multiple-high-severity-vulnerabilities/</loc>
		<lastmod>2026-01-23T09:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manage-my-health-data-breach-sparks-warnings-over-impersonation-and-phishing-attempts/</loc>
		<lastmod>2026-01-23T09:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investigation-underway-after-72m-under-armour-records-surface-online/</loc>
		<lastmod>2026-01-23T09:40:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-debuts-worlds-first-governance-framework-for-agentic-ai/</loc>
		<lastmod>2026-01-23T09:41:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-flags-multi-stage-aitm-phishing-and-bec-attacks-targeting-energy-firms/</loc>
		<lastmod>2026-01-23T09:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stepstone-gehaltsreport-2026-was-verdient-deutschland/</loc>
		<lastmod>2026-01-23T09:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-missbrauchen-rmm-tools-als-backdoor/</loc>
		<lastmod>2026-01-23T09:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-warnt-81-prozent-aller-deutschen-exchange-server-sind-angreifbar/</loc>
		<lastmod>2026-01-23T09:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wird-das-iphone-fold-ein-hit-analyst-rechnet-mit-8-millionen-verkaufen-2026/</loc>
		<lastmod>2026-01-23T09:46:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-malware-notig-hacker-tricksen-googles-gemini-mit-einem-kalendereintrag-aus/</loc>
		<lastmod>2026-01-23T09:47:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-mobilfunk-bis-solaranlagen-warum-die-eu-jetzt-gegen-chinesische-technik-vorgeht/</loc>
		<lastmod>2026-01-23T09:48:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-halo-security-earns-soc-2-type-ii-certification-shows-sustained-operational-security/</loc>
		<lastmod>2026-01-23T10:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marching-orders-delayed-veterans-digital-id-off-to-a-slow-start/</loc>
		<lastmod>2026-01-23T10:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raspberry-pi-now-offers-a-branded-usb-flash-drive-starts-at-30/</loc>
		<lastmod>2026-01-23T10:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-now-lets-users-verify-whether-videos-have-been-altered/</loc>
		<lastmod>2026-01-23T10:36:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technische-hartung-identity-controls-und-detektion-fur-soc-betrieb-initiale-sicherheitskonfiguration-von-sap-s-4hana/</loc>
		<lastmod>2026-01-23T10:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-day-2026-datenschutz-durch-ki-so-relevant-wie-nie/</loc>
		<lastmod>2026-01-23T10:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-sicherheitslucken-in-autos-pwn2own-hacker-gewinnen-1-047-000-us-dollar/</loc>
		<lastmod>2026-01-23T10:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-boroughs-limping-back-online-months-after-cyberattack/</loc>
		<lastmod>2026-01-23T11:31:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149-million-usernames-and-passwords-exposed-by-unsecured-database/</loc>
		<lastmod>2026-01-23T11:33:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/</loc>
		<lastmod>2026-01-23T11:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-disable-windows-security-with-new-malware-attack/</loc>
		<lastmod>2026-01-23T11:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mass-data-mass-surveillance-and-the-erosion-of-particularity-the-fourth-amendment-in-the-age-of-geofence-warrants-and-artificial-intelligence/</loc>
		<lastmod>2026-01-23T12:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mass-data-mass-surveillance-and-the-erosion-of-particularity-the-fourth-amendment-in-the-age-of-geofence-warrants-and-artificial-intelligence-2/</loc>
		<lastmod>2026-01-23T12:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-questions-enterprise-leaders-should-ask-before-running-a-red-teaming-exercise/</loc>
		<lastmod>2026-01-23T12:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-identity-and-access-management-for-ai-agents/</loc>
		<lastmod>2026-01-23T12:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gnu-inetutils-telnetd-remote-authentication-bypass-vulnerability-cve-2026-24061-notice/</loc>
		<lastmod>2026-01-23T12:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unterschatztes-risiko-insider-bedrohungen-endlich-ernst-nehmen/</loc>
		<lastmod>2026-01-23T12:36:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-fortios-exploits-ransomware-hacktivist-surge-and-eu-telecom-rules/</loc>
		<lastmod>2026-01-23T12:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-targets-ai-driven-phishing-with-built-in-prevention/</loc>
		<lastmod>2026-01-23T12:38:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-prettier-eslint-config-prettier-vite-vitejs-versa-concerto-sd-wan-orchestration-platform-and-synacor-zimbra-collaboration-suite-flaws-to-its-known-exploited-vulnerabilities-cata/</loc>
		<lastmod>2026-01-23T12:39:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiktok-forms-u-s-joint-venture-to-continue-operations-under-2025-executive-order/</loc>
		<lastmod>2026-01-23T12:40:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-attack-uses-stolen-credentials-to-install-logmein-rmm-for-persistent-access/</loc>
		<lastmod>2026-01-23T12:41:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/under-armour-investigates-data-breach-after-72-million-records-allegedly-exposed/</loc>
		<lastmod>2026-01-23T12:42:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/berechtigungen-und-apps-mit-domanenbenutzer-steuern-active-directory-auf-qnap-nas-einrichten-und-verwalten/</loc>
		<lastmod>2026-01-23T12:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-und-ibm-consulting-beschleunigen-quantensichere-transformation-von-unternehmen/</loc>
		<lastmod>2026-01-23T12:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2025-phishing-surge-proved-one-thing-chasing-doesnt-work/</loc>
		<lastmod>2026-01-23T13:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-are-getting-better-at-finding-and-exploiting-internet-vulnerabilities/</loc>
		<lastmod>2026-01-23T13:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-aspm-protects-cloud-native-applications-from-misconfigurations-and-exploits/</loc>
		<lastmod>2026-01-23T13:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-expels-russian-diplomat-accused-of-spying-on-ukraine-war-effort/</loc>
		<lastmod>2026-01-23T13:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-drive-by-download-attacks/</loc>
		<lastmod>2026-01-23T13:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-admits-fortigate-sso-bug-still-exploitable-despite-december-patch/</loc>
		<lastmod>2026-01-23T13:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leak-alleged-data-of-millions-from-soundcloud-crunchbase-and-betterment/</loc>
		<lastmod>2026-01-23T13:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-users-under-attack-modern-phishing-kits-are-turbocharging-vishing-attacks/</loc>
		<lastmod>2026-01-23T13:39:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-half-of-former-uk-employees-still-have-access-to-company-spreadsheets-study-finds/</loc>
		<lastmod>2026-01-23T13:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-get-1047000-for-76-zero-days-at-pwn2own-automotive-2026/</loc>
		<lastmod>2026-01-23T13:41:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-active-forticloud-sso-bypass-on-fully-patched-fortigate-firewalls/</loc>
		<lastmod>2026-01-23T13:42:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-senior-cloud-engineer-gesucht-sieh-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-01-23T13:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-missbrauchen-tools-fur-remote-monitoring-und-management-als-backdoor/</loc>
		<lastmod>2026-01-23T14:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-28-januar-heist-es-wieder-den-datenschutz-kritisch-prufen-und-geeignete-sicherheitsmasnahmen-ergreifen/</loc>
		<lastmod>2026-01-23T14:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outlook-for-ios-crashes-freezes-due-to-coding-error/</loc>
		<lastmod>2026-01-23T14:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sharp-inspire-expo-2026-sharp-erweitert-sein-serviceangebot-um-cybersicherheitslosungen/</loc>
		<lastmod>2026-01-23T14:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-incident-to-insight-how-forensic-recovery-drives-adaptive-cyber-resilience/</loc>
		<lastmod>2026-01-23T15:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-identity-signals-power-ai-driven-crms-to-detect-risky-user-behavior/</loc>
		<lastmod>2026-01-23T15:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacke-auf-verkehrsgesellschaft-main-tauber/</loc>
		<lastmod>2026-01-23T15:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-disrupts-digital-systems-at-renowned-dresden-museum-network/</loc>
		<lastmod>2026-01-23T15:39:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-uncovers-custom-phishing-kits-built-for-vishing-callers/</loc>
		<lastmod>2026-01-23T15:41:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-uncovers-custom-phishing-kits-built-for-vishing-callers-2/</loc>
		<lastmod>2026-01-23T15:41:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-an-ai-written-honeypot-taught-us-about-trusting-machines/</loc>
		<lastmod>2026-01-23T15:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-active-exploitation-of-forticloud-sso-bypass-vulnerability/</loc>
		<lastmod>2026-01-23T15:42:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trustasia-pulls-143-certificates-following-critical-litessl-acme-vulnerability/</loc>
		<lastmod>2026-01-23T15:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-exploits-trusted-web-infrastructure-to-distribute-malware/</loc>
		<lastmod>2026-01-23T15:44:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/20000-wordpress-sites-compromised-by-backdoor-vulnerability-enabling-malicious-admin-access/</loc>
		<lastmod>2026-01-23T15:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-updates-kev-catalog-with-4-critical-vulnerabilities-following-ongoing-exploits/</loc>
		<lastmod>2026-01-23T15:46:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-sets-new-standard-for-hackerone-reports-demands-signal-of-1-0-or-higher-2/</loc>
		<lastmod>2026-01-23T15:48:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-sets-new-standard-for-hackerone-reports-demands-signal-of-1-0-or-higher/</loc>
		<lastmod>2026-01-23T15:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-lnk-files-to-deploy-moonpeak-malware-on-windows-systems/</loc>
		<lastmod>2026-01-23T15:48:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/76-zero-day-vulnerabilities-exposed-at-pwn2own-automotive-2026-by-hackers/</loc>
		<lastmod>2026-01-23T15:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macsync-macos-infostealer-exploits-clickfix-style-attack-to-trick-users-with-single-terminal-command/</loc>
		<lastmod>2026-01-23T15:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-introduces-brand-impersonation-protection-warning-for-teams-calls/</loc>
		<lastmod>2026-01-23T15:51:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-issues-open-letter-demanding-improved-cybersecurity-standards-from-suppliers/</loc>
		<lastmod>2026-01-23T15:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaspersky-security-bulletin-taglich-500-000-neue-bedrohungen-hauptsachlich-fur-windows-nutzer-2/</loc>
		<lastmod>2026-01-23T15:54:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaspersky-security-bulletin-taglich-500-000-neue-bedrohungen-hauptsachlich-fur-windows-nutzer/</loc>
		<lastmod>2026-01-23T15:54:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-rules-of-cyber-resilience-in-an-ai-driven-threat-landscape/</loc>
		<lastmod>2026-01-23T16:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-microsoft-mcp-server-flaws-shine-a-light-on-ai-security-risks/</loc>
		<lastmod>2026-01-23T16:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-is-rethinking-its-role-in-analyzing-software-vulnerabilities/</loc>
		<lastmod>2026-01-23T16:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/</loc>
		<lastmod>2026-01-23T16:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-writes-23000-word-constitution-for-claude-suggests-it-may-have-feelings/</loc>
		<lastmod>2026-01-23T16:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time-4/</loc>
		<lastmod>2026-01-23T16:42:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerabilities-and-phishing-campaigns-dominate-cybersecurity-headlines/</loc>
		<lastmod>2026-01-23T16:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities/</loc>
		<lastmod>2026-01-23T16:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-cybersecurity-trends-to-watch-in-2026/</loc>
		<lastmod>2026-01-23T17:39:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-cyberattack-kits-are-just-a-matter-of-time-warns-google-exec/</loc>
		<lastmod>2026-01-23T17:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/venezuelan-nationals-face-deportation-after-multi-state-atm-jackpotting-scheme/</loc>
		<lastmod>2026-01-23T17:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-reputation-risk-black-hat-europe-in-review-2026-in-view/</loc>
		<lastmod>2026-01-23T17:42:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cbp-wants-ai-powered-quantum-sensors-for-finding-fentanyl-in-cars/</loc>
		<lastmod>2026-01-23T17:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-to-deport-venezuelans-who-emptied-bank-atms-using-malware/</loc>
		<lastmod>2026-01-23T17:44:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/</loc>
		<lastmod>2026-01-23T17:45:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthy-security-cultures-thrive-on-risk-reporting/</loc>
		<lastmod>2026-01-23T17:46:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-truly-universal-outlet/</loc>
		<lastmod>2026-01-23T19:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-attributing-open-source-contributions-is-critical-but-difficult/</loc>
		<lastmod>2026-01-23T19:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corr-serve-strengthens-south-africas-cybersecurity-market-through-expanded-seceon-partnership/</loc>
		<lastmod>2026-01-23T19:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netscout-recognized-for-leadership-in-network-detection-and-response/</loc>
		<lastmod>2026-01-23T19:05:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarter-ddos-security-at-scale/</loc>
		<lastmod>2026-01-23T19:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini/</loc>
		<lastmod>2026-01-23T19:07:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-expands-universal-visibility/</loc>
		<lastmod>2026-01-23T19:08:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cybercrime-industry-continues-to-challenge-cisos-in-2026/</loc>
		<lastmod>2026-01-23T19:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cybercrime-industry-continues-to-challenge-cisos-in-2026-2/</loc>
		<lastmod>2026-01-23T19:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-okta-customer-breaches-leaks-data-belonging-to-3-orgs/</loc>
		<lastmod>2026-01-23T19:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-warns-of-active-forticloud-sso-bypass-affecting-updated-devices/</loc>
		<lastmod>2026-01-23T19:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-confirms-active-exploitation-of-four-enterprise-software-bugs/</loc>
		<lastmod>2026-01-23T19:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-reading-confidential-reviving-the-hacker-ethos-that-built-cybersecurity/</loc>
		<lastmod>2026-01-23T19:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/powershell-architect-retires-after-decades-at-the-prompt/</loc>
		<lastmod>2026-01-23T20:31:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhs-england-probe-suppliers-for-cybersecurity-controls/</loc>
		<lastmod>2026-01-23T20:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hackers-leak-under-armour-customer-data/</loc>
		<lastmod>2026-01-23T20:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-say-russian-government-hackers-were-behind-attempted-poland-power-outage/</loc>
		<lastmod>2026-01-23T21:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surrender-as-a-service-microsoft-unlocks-bitlocker-for-feds/</loc>
		<lastmod>2026-01-23T21:33:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voice-phishing-okta-customers-shinyhunters-claims-credit/</loc>
		<lastmod>2026-01-23T21:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-ai-extensions-on-vscode-marketplace-steal-developer-data/</loc>
		<lastmod>2026-01-23T21:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploited-zero-day-flaw-in-cisco-uc-could-affect-millions/</loc>
		<lastmod>2026-01-23T21:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-waven-webassembly-memory-virtualization-for-enclaves/</loc>
		<lastmod>2026-01-23T22:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browser-wars-continued-why-everyone-is-building-their-own-ai-browser/</loc>
		<lastmod>2026-01-23T22:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-or-die-vmware-vcenter-server-bug-fixed-in-2024-under-attack-today/</loc>
		<lastmod>2026-01-23T22:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-used-agents-to-write-a-browser-proving-ai-can-write-shoddy-code-at-scale/</loc>
		<lastmod>2026-01-23T22:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149m-logins-from-roblox-tiktok-netflix-crypto-wallets-found-online/</loc>
		<lastmod>2026-01-23T22:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-how-deepfakes-are-breaking-digital-trust/</loc>
		<lastmod>2026-01-23T22:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-exposure-management-platforms/</loc>
		<lastmod>2026-01-23T22:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-leak-exposes-149m-logins-including-gmail-facebook/</loc>
		<lastmod>2026-01-23T22:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swipe-plug-in-pwned-researchers-find-new-ways-to-hack-vehicles/</loc>
		<lastmod>2026-01-23T22:40:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-proactive-can-agentic-ai-be-in-threat-detection/</loc>
		<lastmod>2026-01-23T23:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-managing-nhis-keep-companies-ahead-in-cybersecurity/</loc>
		<lastmod>2026-01-23T23:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/audio-accessory-flaw-converts-headphones-into-spy-tool/</loc>
		<lastmod>2026-01-23T23:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-court-ordered-bitlocker-key-releases-2/</loc>
		<lastmod>2026-01-23T23:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-court-ordered-bitlocker-key-releases/</loc>
		<lastmod>2026-01-23T23:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-court-ordered-bitlocker-key-releases-3/</loc>
		<lastmod>2026-01-23T23:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-judge-rules-ice-raids-require-judicial-warrants-contradicting-secret-ice-memo/</loc>
		<lastmod>2026-01-23T23:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-new-zero-day-attacks-against-customer-devices/</loc>
		<lastmod>2026-01-23T23:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-empower-agile-cybersecurity-strategies/</loc>
		<lastmod>2026-01-23T23:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-manage-compliance-requirements-efficiently/</loc>
		<lastmod>2026-01-23T23:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/extended-detection-and-response-xdr-a-new-era-in-cybersecurity/</loc>
		<lastmod>2026-01-24T00:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huftgelenksarthrose-ki-vorhersage-des-erfolgs-einer-huft-op/</loc>
		<lastmod>2026-01-24T00:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huftgelenksarthrose-ki-vorhersage-des-erfolgs-einer-huft-op-2/</loc>
		<lastmod>2026-01-24T00:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-gerateverknupfung-missbrauch-durch-betruger-zum-ausspionieren-von-chats/</loc>
		<lastmod>2026-01-24T00:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-gerateverknupfung-missbrauch-durch-betruger-zum-ausspionieren-von-chats-2/</loc>
		<lastmod>2026-01-24T00:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-cycube-join-forces-to-better-train-ai-era-defenders/</loc>
		<lastmod>2026-01-24T00:34:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-to-be-behind-sso-account-data-theft-attacks/</loc>
		<lastmod>2026-01-24T00:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shift-left-qa-for-ai-systems-catching-model-risk-before-production/</loc>
		<lastmod>2026-01-24T04:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-outage-drags-on-for-nearly-10-hours-during-bad-night-for-north-american-infra/</loc>
		<lastmod>2026-01-24T04:33:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/11-year-old-critical-telnetd-flaw-found-in-gnu-inetutils-cve-2026-24061/</loc>
		<lastmod>2026-01-24T04:33:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-worlds-best-data-security-companies-in-2026/</loc>
		<lastmod>2026-01-24T04:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-punts-renewal-of-threat-data-sharing-law-to-september/</loc>
		<lastmod>2026-01-24T05:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-prepares-hybrid-cloud-twist-for-sovereign-ai/</loc>
		<lastmod>2026-01-24T05:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-prepares-hybrid-cloud-twist-for-sovereign-ai-2/</loc>
		<lastmod>2026-01-24T05:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-risiken-unzureichender-identitatsprufung-in-digitalen-geschaftsprozessen/</loc>
		<lastmod>2026-01-24T08:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-pay-im-visier-warum-betruger-nicht-ihr-handy-sondern-ihren-kopf-hacken/</loc>
		<lastmod>2026-01-24T09:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-pay-im-visier-warum-betruger-nicht-ihr-handy-sondern-ihren-kopf-hacken-2/</loc>
		<lastmod>2026-01-24T09:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-linkedin-so-attraktiv-fur-cyberkriminelle-macht-und-wie-nutzer-sich-schutzen/</loc>
		<lastmod>2026-01-24T09:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-approved-this-agent-rethinking-access-accountability-and-risk-in-the-age-of-ai-agents/</loc>
		<lastmod>2026-01-24T09:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-vmware-vcenter-flaw-cve-2024-37079-to-kev-catalog/</loc>
		<lastmod>2026-01-24T09:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-dynowiper-malware-used-in-attempted-sandworm-attack-on-polish-power-sector/</loc>
		<lastmod>2026-01-24T09:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-border-tech-budget-swells-by-100m-as-home-office-targets-small-boat-crossings/</loc>
		<lastmod>2026-01-24T10:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-24T11:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-270012013-vs-2022-a-quick-comparison-guide-2/</loc>
		<lastmod>2026-01-24T12:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-270012013-vs-2022-a-quick-comparison-guide/</loc>
		<lastmod>2026-01-24T12:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doge-may-have-misused-social-security-data-doj-admits/</loc>
		<lastmod>2026-01-24T12:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-stage-phishing-campaign-targets-russia-with-amnesia-rat-and-ransomware/</loc>
		<lastmod>2026-01-24T12:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gegenschlage-und-geheimdienst-reform-dobrindts-cyberabwehr-offensive/</loc>
		<lastmod>2026-01-24T13:33:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gegenschlage-und-geheimdienst-reform-dobrindts-cyberabwehr-offensive-2/</loc>
		<lastmod>2026-01-24T13:33:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-investigates-top-general-zhang-youxia-in-rare-purge-of-senior-military-leaders/</loc>
		<lastmod>2026-01-24T14:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-investigates-top-general-zhang-youxia-in-rare-purge-of-senior-military-leaders-2/</loc>
		<lastmod>2026-01-24T14:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutzdebatte-microsoft-gibt-bitlocker-schlussel-an-fbi-weiter/</loc>
		<lastmod>2026-01-24T14:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-begin-sharing-employee-location-with-employers-based-on-wi-fi-networks/</loc>
		<lastmod>2026-01-24T15:31:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-open-sources-winapp-a-new-cli-tool-for-streamlined-windows-app-development/</loc>
		<lastmod>2026-01-24T15:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shared-bitlocker-recovery-keys-with-the-fbi-to-unlock-encrypted-laptop-data/</loc>
		<lastmod>2026-01-24T15:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-multi-stage-aitm-attack-using-sharepoint-to-bypass-security-controls/</loc>
		<lastmod>2026-01-24T15:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-leveraging-telnetd-exploit-for-root-privileges-after-poc-goes-public/</loc>
		<lastmod>2026-01-24T15:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konni-hackers-target-blockchain-engineers-with-ai-built-malware/</loc>
		<lastmod>2026-01-24T16:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthy-security-cultures-want-people-to-report-risks/</loc>
		<lastmod>2026-01-24T17:31:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-oracle-loses-interest-in-mysql-devs-mull-future-options/</loc>
		<lastmod>2026-01-24T18:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-accessed-windows-laptops-after-microsoft-shared-bitlocker-recovery-keys/</loc>
		<lastmod>2026-01-24T18:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-doing-more-with-less-how-security-teams-escape-manual-work-with-efficient-workflows/</loc>
		<lastmod>2026-01-24T19:33:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dast-vs-penetration-testing-key-differences-in-2026/</loc>
		<lastmod>2026-01-24T19:34:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/osiris-ransomware-emerges-leveraging-byovd-technique-to-kill-security-tools/</loc>
		<lastmod>2026-01-24T19:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polands-energy-grid-was-targeted-by-never-before-seen-wiper-malware/</loc>
		<lastmod>2026-01-24T20:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-secure-data-analytics-2/</loc>
		<lastmod>2026-01-24T21:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-secure-data-analytics/</loc>
		<lastmod>2026-01-24T21:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-secure-data-analytics-3/</loc>
		<lastmod>2026-01-24T21:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm-hackers-linked-to-failed-wiper-attack-on-polands-energy-systems/</loc>
		<lastmod>2026-01-24T22:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-asks-companies-about-ad-tech-and-big-data-tools-it-could-use-in-investigations/</loc>
		<lastmod>2026-01-24T23:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-position-zu-regierungskonsultationen-deutschland-und-italien-gemeinsam-als-digitaler-stabilitatsanker-europas/</loc>
		<lastmod>2026-01-25T00:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-gcve-raises-concerns-over-fragmentation-in-vulnerability-databases/</loc>
		<lastmod>2026-01-25T00:32:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-gcve-raises-concerns-over-fragmentation-in-vulnerability-databases-2/</loc>
		<lastmod>2026-01-25T00:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-ai-security-evolving-for-better-protection-2/</loc>
		<lastmod>2026-01-25T04:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-ai-security-evolving-for-better-protection/</loc>
		<lastmod>2026-01-25T04:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-ai-security-evolving-for-better-protection-3/</loc>
		<lastmod>2026-01-25T04:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-you-trust-ai-with-your-digital-secrets-management/</loc>
		<lastmod>2026-01-25T04:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-deliver-value-in-digital-security-landscapes/</loc>
		<lastmod>2026-01-25T04:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/basis-fur-alarmketten-neues-drohnen-lagezentrum-in-bayern/</loc>
		<lastmod>2026-01-25T04:35:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-560-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-01-25T04:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-instant-smear-campaign-against-border-patrol-shooting-victim-alex-pretti/</loc>
		<lastmod>2026-01-25T04:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-emergency-oob-update-to-fix-outlook-freezes/</loc>
		<lastmod>2026-01-25T04:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-ensure-calm-in-cybersecurity-operations/</loc>
		<lastmod>2026-01-25T04:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-hacks-of-okta-microsoft-sso-accounts-for-data-theft/</loc>
		<lastmod>2026-01-25T04:40:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-was-a-wake-up-call-to-protect-human-decisions-not-just-systems/</loc>
		<lastmod>2026-01-25T04:41:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uberwachung-microsoft-hat-bitlocker-schlussel-heimlich-an-das-fbi-weitergegeben/</loc>
		<lastmod>2026-01-25T15:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-taps-raspberry-pi-to-turn-wi-fi-signals-into-wall-art/</loc>
		<lastmod>2026-01-25T15:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-81/</loc>
		<lastmod>2026-01-25T15:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-81-2/</loc>
		<lastmod>2026-01-25T15:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-fully-patched-fortigate-firewalls-are-getting-compromised-attackers-probe-cisco-rce-flaw/</loc>
		<lastmod>2026-01-25T15:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-investigates-windows-11-boot-failures-after-january-updates/</loc>
		<lastmod>2026-01-25T15:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-kritische-infrastrukturen-wie-real-ist-die-gefahr-fur-deutschland/</loc>
		<lastmod>2026-01-25T15:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-gegen-phishing-warum-ihr-schon-bald-einen-neuen-warnhinweis-seht/</loc>
		<lastmod>2026-01-25T15:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trade-republic-nutzer-werden-mit-phishing-mails-in-die-falle-gelockt-so-schutzt-ihr-euch/</loc>
		<lastmod>2026-01-25T15:27:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trade-republic-nutzer-werden-mit-phishing-mails-in-die-falle-gelockt-so-schutzt-ihr-euch-2/</loc>
		<lastmod>2026-01-25T15:27:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-is-investigating-a-possible-data-breach-after-worldleaks-claims/</loc>
		<lastmod>2026-01-25T15:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecuritys-new-business-case-fraud/</loc>
		<lastmod>2026-01-25T16:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-adds-pop-pup-warnings-for-suspected-phishing-sites/</loc>
		<lastmod>2026-01-25T16:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-why-organizations-dont-achieve-fedramp-ato-2/</loc>
		<lastmod>2026-01-25T17:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-reasons-why-organizations-dont-achieve-fedramp-ato/</loc>
		<lastmod>2026-01-25T17:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-rcontainer/</loc>
		<lastmod>2026-01-25T18:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-top-endpoint-security-platforms-for-2026/</loc>
		<lastmod>2026-01-25T19:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-adds-pop-up-warnings-for-suspected-phishing-sites/</loc>
		<lastmod>2026-01-25T19:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dna-der-europaischen-kommission-cybersicherheit-als-chefsache/</loc>
		<lastmod>2026-01-26T00:23:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-user-managed-access/</loc>
		<lastmod>2026-01-26T04:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-user-managed-access-3/</loc>
		<lastmod>2026-01-26T04:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-user-managed-access-2/</loc>
		<lastmod>2026-01-26T04:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-one-page-introduction-to-cardspace-technology/</loc>
		<lastmod>2026-01-26T04:23:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomaly-detection-in-post-quantum-ai-orchestration-workflows-2/</loc>
		<lastmod>2026-01-26T04:25:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomaly-detection-in-post-quantum-ai-orchestration-workflows/</loc>
		<lastmod>2026-01-26T04:25:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-developers-backdoor-north-korea-weaponizes-visual-studio-code/</loc>
		<lastmod>2026-01-26T04:25:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breaking-trust-with-words-prompt-injection-leading-to-simulated-etc-passwd-disclosure/</loc>
		<lastmod>2026-01-26T04:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-made-in-europe-basis-fur-digitale-souveranitat-deutschlands-und-europas/</loc>
		<lastmod>2026-01-26T04:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-temporary-chat-feature-is-getting-a-much-needed-upgrade/</loc>
		<lastmod>2026-01-26T04:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-releases-updated-pci-pin-compliance-report-for-payment-cryptography/</loc>
		<lastmod>2026-01-26T05:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-nhis-management-fit-within-tight-cybersecurity-budgets/</loc>
		<lastmod>2026-01-26T06:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-impenetrable-are-secrets-vaults-in-modern-cybersecurity/</loc>
		<lastmod>2026-01-26T06:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-cloud-native-ais-free-from-legacy-security-issues/</loc>
		<lastmod>2026-01-26T06:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-capabilities-should-ai-have-for-advanced-threat-detection/</loc>
		<lastmod>2026-01-26T06:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brakeman-open-source-vulnerability-scanner-for-ruby-on-rails-applications/</loc>
		<lastmod>2026-01-26T06:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incident-response-lessons-learned-the-hard-way/</loc>
		<lastmod>2026-01-26T06:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proof-of-concept-von-tenable-systemubernahme-bei-trend-micros-apex-central-moglich/</loc>
		<lastmod>2026-01-26T06:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-ato-playbook-session-hijacking-mfa-bypass-and-credential-abuse-trends-for-2026/</loc>
		<lastmod>2026-01-26T07:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wef-global-cybersecurity-outlook-2026-das-wettrusten-im-cyberraum-geht-in-die-nachste-runde/</loc>
		<lastmod>2026-01-26T07:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-predictions-for-2026/</loc>
		<lastmod>2026-01-26T08:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-microsofts-veterantech-workforce-pipeline/</loc>
		<lastmod>2026-01-26T08:23:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudstrategie-ki-angriffe-zielen-auf-unternehmens-clouds/</loc>
		<lastmod>2026-01-26T08:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-umfrage-beleuchtet-stand-der-cybersicherheit-im-handwerk/</loc>
		<lastmod>2026-01-26T08:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airdrop-security-in-ios-26-2-time-limits-codes-privacy-best-practices/</loc>
		<lastmod>2026-01-26T09:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airdrop-security-in-ios-26-2-time-limits-codes-privacy-best-practices-2/</loc>
		<lastmod>2026-01-26T09:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notfallplane-fur-den-kriegsfall/</loc>
		<lastmod>2026-01-26T09:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dobrindt-zu-cyberangriffen-wir-werden-zuruckschlagen/</loc>
		<lastmod>2026-01-26T09:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-sandworm-apt-implicated-in-major-cyber-attack-on-polands-power-grid/</loc>
		<lastmod>2026-01-26T09:25:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-sandworm-apt-implicated-in-major-cyber-attack-on-polands-power-grid-2/</loc>
		<lastmod>2026-01-26T09:25:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entra-id-will-auto-enable-passkey-profiles-synced-passkeys/</loc>
		<lastmod>2026-01-26T09:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ctem-2026-zum-fundament-moderner-ot-sicherheit-wird/</loc>
		<lastmod>2026-01-26T09:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-umfrage-beleuchtet-stand-der-cybersicherheit-im-handwerk-2/</loc>
		<lastmod>2026-01-26T09:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/januar-updates-losen-unter-windows-11-boot-fehler-aus/</loc>
		<lastmod>2026-01-26T09:29:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection-2/</loc>
		<lastmod>2026-01-26T10:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection/</loc>
		<lastmod>2026-01-26T10:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection-3/</loc>
		<lastmod>2026-01-26T10:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-3-factors-for-selecting-an-identity-access-management-tool/</loc>
		<lastmod>2026-01-26T10:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-sicherheit-ki-wie-sich-europas-it-strategien-neu-ausrichten/</loc>
		<lastmod>2026-01-26T10:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-digital-id-goes-in-house-government-swears-it-isnt-an-id-card/</loc>
		<lastmod>2026-01-26T10:25:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-ties-ai-search-to-gmail-and-photos-raising-new-privacy-questions/</loc>
		<lastmod>2026-01-26T10:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-spam-filter-breakdown-affects-1-8b-users/</loc>
		<lastmod>2026-01-26T10:27:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers/</loc>
		<lastmod>2026-01-26T10:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-data-erhoht-risiken-fur-die-datensicherheit-wer-daten-nicht-klassifiziert-kann-sie-auch-nicht-schutzen/</loc>
		<lastmod>2026-01-26T10:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nicht-konkurrenzfahig-sparkasse-stellt-passwortmanager-s-trust-ein/</loc>
		<lastmod>2026-01-26T10:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-zeigt-wie-man-account-takeover-angriffe-verhindern-kann/</loc>
		<lastmod>2026-01-26T10:31:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-ai-sailed-the-world-on-royal-navy-flagship-via-cloudthe-edge-kit/</loc>
		<lastmod>2026-01-26T11:22:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-ai-sailed-the-world-on-royal-navy-flagship-via-cloudthe-edge-kit/</loc>
		<lastmod>2026-01-26T11:22:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiper-attack-on-polish-power-grid-linked-to-russias-sandworm/</loc>
		<lastmod>2026-01-26T11:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-unsichtbare-it-held-mit-proaktivem-uem-und-dex-it-problemen-einen-schritt-voraus/</loc>
		<lastmod>2026-01-26T11:24:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brax-open-slate-modulares-dual-boot-tablet-mit-android-und-linux/</loc>
		<lastmod>2026-01-26T11:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-passkeys-be-exploited-for-account-access/</loc>
		<lastmod>2026-01-26T12:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bill-gates-backed-startup-aims-to-revive-moores-law-with-optical-transistors/</loc>
		<lastmod>2026-01-26T12:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moscow-likely-behind-wiper-attack-on-polands-power-grid-experts-say/</loc>
		<lastmod>2026-01-26T12:24:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emmabuntus-de-6-a-newbie-friendly-linux-to-help-those-in-need/</loc>
		<lastmod>2026-01-26T12:25:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/future-of-uks-multibillion-ajax-armored-vehicle-program-looks-shaky/</loc>
		<lastmod>2026-01-26T12:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fake-captcha-scam-abuses-microsoft-tools-to-install-amatera-stealer/</loc>
		<lastmod>2026-01-26T12:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6000-stanley-toolkit-sold-on-russian-forums-fakes-secure-urls-in-chrome/</loc>
		<lastmod>2026-01-26T12:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korealinked-konni-uses-ai-to-build-stealthy-malware-tooling/</loc>
		<lastmod>2026-01-26T12:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/</loc>
		<lastmod>2026-01-26T12:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winning-against-ai-based-attacks-requires-a-combined-defensive-approach/</loc>
		<lastmod>2026-01-26T12:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hide-me-vpn-transparenzbericht-2025-wenige-anfragen-keine-kunden-preisgegeben/</loc>
		<lastmod>2026-01-26T13:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-sich-die-cloud-fehler-bei-ki-nicht-wiederholen-durfen/</loc>
		<lastmod>2026-01-26T13:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/account-takeover-ubernahme-verhindern/</loc>
		<lastmod>2026-01-26T13:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-prioritaten-fur-unternehmen-in-2026-sollten-auf-informationssicherheit-compliance-und-datenschutz-liegen/</loc>
		<lastmod>2026-01-26T13:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-thieves-borrow-nikes-just-do-it-mantra-claim-they-ran-off-with-1-4tb/</loc>
		<lastmod>2026-01-26T13:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-repels-data-wiping-malware-attack-on-energy-systems/</loc>
		<lastmod>2026-01-26T13:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-firewall-flaws-ai-built-malware-browser-traps-critical-cves-more/</loc>
		<lastmod>2026-01-26T13:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-firm-investigates-coupang-security-failures-ahead-of-class-action-deadline/</loc>
		<lastmod>2026-01-26T13:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-flags-customised-reactive-vishing-attacks-which-bypass-mfa/</loc>
		<lastmod>2026-01-26T13:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/call-for-speakers-die-isx-sucht-nach-ihnen/</loc>
		<lastmod>2026-01-26T13:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-warnt-tausende-deutsche-vmware-instanzen-sind-angreifbar/</loc>
		<lastmod>2026-01-26T13:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forscher-warnen-windows-10-noch-auf-fast-jedem-zweiten-deutschen-privat-pc/</loc>
		<lastmod>2026-01-26T13:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nicht-konkurrenzfahig-sparkasse-stellt-eigenen-passwortmanager-ein/</loc>
		<lastmod>2026-01-26T13:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-launches-formal-investigation-into-x-and-grok-over-sexual-images/</loc>
		<lastmod>2026-01-26T14:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-looking-into-elon-musks-x-after-grok-produces-deepfake-sex-images/</loc>
		<lastmod>2026-01-26T14:24:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-data-breach-claims-surface-as-worldleaks-leaks-1-4tb-of-files-online/</loc>
		<lastmod>2026-01-26T14:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energy-sector-targeted-in-multi-stage-phishing-and-bec-campaign-using-sharepoint/</loc>
		<lastmod>2026-01-26T14:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energy-firms-targeted-in-sharepoint-aitm-session-hijacking/</loc>
		<lastmod>2026-01-26T14:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/20000-wordpress-sites-at-risk-from-plugin-admin-backdoor/</loc>
		<lastmod>2026-01-26T14:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-flags-customized-reactive-vishing-attacks-which-bypass-mfa/</loc>
		<lastmod>2026-01-26T14:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutsche-nutzer-klammern-auf-fast-jedem-zweiten-privat-pc-lauft-noch-windows-10/</loc>
		<lastmod>2026-01-26T14:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/s-trust-wird-eingestellt-passwortmanager-der-sparkasse-unterliegt-der-konkurrenz/</loc>
		<lastmod>2026-01-26T14:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-startup-upwind-lands-250m-funding-round-1-5b-valuation-2/</loc>
		<lastmod>2026-01-26T15:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-startup-upwind-lands-250m-funding-round-1-5b-valuation/</loc>
		<lastmod>2026-01-26T15:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romania-probes-two-suspects-over-alleged-hitmanhire-website/</loc>
		<lastmod>2026-01-26T15:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-government-nonprofits-weigh-voluntary-rules-for-commercial-hacking-tools/</loc>
		<lastmod>2026-01-26T15:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-opens-new-investigation-into-grok-on-x/</loc>
		<lastmod>2026-01-26T15:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-drives-com-availability-and-price-when-you-register-2/</loc>
		<lastmod>2026-01-26T15:27:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-drives-com-availability-and-price-when-you-register/</loc>
		<lastmod>2026-01-26T15:27:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/</loc>
		<lastmod>2026-01-26T15:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-hackers-target-european-drone-manufacturers-in-active-campaign/</loc>
		<lastmod>2026-01-26T15:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-released-for-gnu-inetutils-telnetd-rce-as-800k-exposed-instances-remain-online/</loc>
		<lastmod>2026-01-26T15:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-investigates-reported-vulnerability-allowing-access-to-private-content/</loc>
		<lastmod>2026-01-26T15:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-toolkit-redirects-victims-to-malicious-sites-without-changing-the-url/</loc>
		<lastmod>2026-01-26T15:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-dprk-interview-campaign-uses-fake-fonts-to-deliver-malware/</loc>
		<lastmod>2026-01-26T15:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-dprk-interview-campaign-uses-fake-fonts-to-deliver-malware-2/</loc>
		<lastmod>2026-01-26T15:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netsupport-manager-0-day-vulnerabilities-enable-remote-code-execution/</loc>
		<lastmod>2026-01-26T15:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-kb5078127-oob-patch-after-reports-of-outlook-freezing-and-file-system-instability/</loc>
		<lastmod>2026-01-26T15:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/syncfuture-campaign-abuses-enterprise-security-tools-to-deploy-malware/</loc>
		<lastmod>2026-01-26T15:35:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/syncfuture-campaign-abuses-enterprise-security-tools-to-deploy-malware/</loc>
		<lastmod>2026-01-26T15:35:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-hadoop-flaw-could-trigger-system-crashes-or-data-corruption/</loc>
		<lastmod>2026-01-26T15:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-attack-exploits-vercel-to-host-and-deliver-remote-access-malware/</loc>
		<lastmod>2026-01-26T15:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-haxor-seo-poisoning-marketplace/</loc>
		<lastmod>2026-01-26T15:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uber-42-000-betroffene-ingram-micro-meldet-ransomware-angriff/</loc>
		<lastmod>2026-01-26T15:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-handed-over-bitlocker-keys-to-law-enforcement-raising-enterprise-data-control-concerns/</loc>
		<lastmod>2026-01-26T16:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-handed-over-bitlocker-keys-to-law-enforcement-raising-enterprise-data-control-concerns-2/</loc>
		<lastmod>2026-01-26T16:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-key-ai-security-controls-for-2026/</loc>
		<lastmod>2026-01-26T16:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-state-hackers-likely-behind-wiper-malware-attack-on-polands-power-grid/</loc>
		<lastmod>2026-01-26T16:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-updates-airtag-with-expanded-range-and-improved-findability/</loc>
		<lastmod>2026-01-26T16:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-800000-telnet-servers-exposed-to-remote-attacks/</loc>
		<lastmod>2026-01-26T16:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-okta-security-settings-you-might-have-overlooked/</loc>
		<lastmod>2026-01-26T16:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-zeigt-neue-erkenntnisse-zur-linux-malware-voidlink/</loc>
		<lastmod>2026-01-26T16:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-group-claims-credit-for-voice-phishing-attacks/</loc>
		<lastmod>2026-01-26T17:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-agencies-abruptly-pull-out-of-rsac-after-organizer-hires-easterly/</loc>
		<lastmod>2026-01-26T17:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-integritat-warum-firewall-und-ids-nicht-reichen/</loc>
		<lastmod>2026-01-26T17:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-integritat-warum-firewall-und-ids-nicht-reichen-2/</loc>
		<lastmod>2026-01-26T17:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-awards-british-critic-of-saudis-4-1-million-finds-the-regime-hacked-his-devices/</loc>
		<lastmod>2026-01-26T17:27:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach/</loc>
		<lastmod>2026-01-26T17:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/continuous-identity-assurance-is-now-security-infrastructure/</loc>
		<lastmod>2026-01-26T17:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/continuous-identity-assurance-is-now-security-infrastructure-2/</loc>
		<lastmod>2026-01-26T17:30:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/charting-the-next-era-of-digital-identity-and-trust/</loc>
		<lastmod>2026-01-26T17:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-fraud-the-new-crimewave-targeting-remote-work/</loc>
		<lastmod>2026-01-26T17:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-fraud-the-new-crimewave-targeting-remote-work-2/</loc>
		<lastmod>2026-01-26T17:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shared-bitlocker-keys-with-fbi-raising-privacy-fears/</loc>
		<lastmod>2026-01-26T17:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprks-konni-targets-blockchain-developers-with-ai-generated-backdoor/</loc>
		<lastmod>2026-01-26T17:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-vs-code-ai-extensions-with-1-5-million-installs-steal-developer-source-code/</loc>
		<lastmod>2026-01-26T17:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-list-of-post-quantum-cryptography-product-categories/</loc>
		<lastmod>2026-01-26T17:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-erw-radar/</loc>
		<lastmod>2026-01-26T18:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-reliable-terraform-at-scale-with-sonatype-nexus-repository/</loc>
		<lastmod>2026-01-26T18:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saudi-satirist-hacked-with-pegasus-spyware-wins-damages-in-court-battle/</loc>
		<lastmod>2026-01-26T18:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiper-malware-targeting-polands-power-grid-tied-to-moscow/</loc>
		<lastmod>2026-01-26T18:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-nudify-technology-is-getting-darker-and-more-dangerous/</loc>
		<lastmod>2026-01-26T18:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-misconfiguration-behind-recent-bgp-route-leak/</loc>
		<lastmod>2026-01-26T18:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-launches-investigation-into-x-over-grok-generated-sexual-images/</loc>
		<lastmod>2026-01-26T18:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-users-targeted-in-tax-phishing-campaign-delivering-blackmoon-malware/</loc>
		<lastmod>2026-01-26T18:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/s-trust-nicht-konkurrenzfahig-sparkasse-stellt-eigenen-passwortmanager-ein/</loc>
		<lastmod>2026-01-26T18:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-universal-commerce-protocol-why-the-future-of-agentic-commerce-depends-on-security/</loc>
		<lastmod>2026-01-26T19:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-encrypt-your-pcs-disk-without-giving-the-keys-to-microsoft/</loc>
		<lastmod>2026-01-26T19:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supreme-court-to-hear-facebook-pixel-tracking-case/</loc>
		<lastmod>2026-01-26T19:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flexible-middleware-made-in-leipzig-sichere-digitale-behordenkommunikation-mit-procilon/</loc>
		<lastmod>2026-01-26T19:29:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-kommentar-zum-data-privacy-day-2026-datenschutz-im-ki-kontext-relevanter-als-je-zuvor/</loc>
		<lastmod>2026-01-26T19:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-microsoft-teams-billing-phishing-alerts-reach-6135-users-via-12866-emails/</loc>
		<lastmod>2026-01-26T19:30:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-microsoft-teams-billing-phishing-alerts-reach-6135-users-via-12866-emails-2/</loc>
		<lastmod>2026-01-26T19:30:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-actively-exploited-office-zero-day-vulnerability/</loc>
		<lastmod>2026-01-26T19:31:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-antivirus-supply-chain-breach-delivers-signed-malware/</loc>
		<lastmod>2026-01-26T19:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-antivirus-supply-chain-breach-delivers-signed-malware-2/</loc>
		<lastmod>2026-01-26T19:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-high-altitude-cooking-instructions/</loc>
		<lastmod>2026-01-26T20:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-high-altitude-cooking-instructions-2/</loc>
		<lastmod>2026-01-26T20:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-attacks-target-indian-government-using-gogitter-gitshellpad-and-goshell-part-1/</loc>
		<lastmod>2026-01-26T20:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-c-suite-leaders-should-know-from-davos-2026-about-ai-innovation-and-emerging-technology/</loc>
		<lastmod>2026-01-26T20:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/some-chatgpt-browser-extensions-are-stealing-your-data/</loc>
		<lastmod>2026-01-26T20:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-microsoft-update-fixes-inwild-office-zero-day/</loc>
		<lastmod>2026-01-26T20:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-cuts-ties-with-booz-allen-over-irs-data-leaks/</loc>
		<lastmod>2026-01-26T20:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-all-your-database-are-belong-to-us-characterizing-database-ransomware-attacks/</loc>
		<lastmod>2026-01-26T21:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claroty-gets-150m-to-lead-in-ai-for-infrastructure-security/</loc>
		<lastmod>2026-01-26T21:27:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-authentication-methods-for-preventing-data-breaches/</loc>
		<lastmod>2026-01-26T22:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imperva-customers-protected-against-cve-2026-21962-in-oracle-http-and-weblogic/</loc>
		<lastmod>2026-01-26T22:29:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-has-microsoft-been-routing-example-com-traffic-to-a-company-in-japan/</loc>
		<lastmod>2026-01-26T22:30:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/</loc>
		<lastmod>2026-01-26T22:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm-blamed-for-wiper-attack-on-poland-power-grid/</loc>
		<lastmod>2026-01-26T22:32:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12port-introduces-zero-trust-privileged-access-management-pam-for-managed-service-providers/</loc>
		<lastmod>2026-01-26T23:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-msps-should-add-privileged-access-management-pam-to-their-security-offerings/</loc>
		<lastmod>2026-01-26T23:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-agrees-to-pay-68-million-to-settle-voice-recording-lawsuit/</loc>
		<lastmod>2026-01-26T23:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omb-rescinds-burdensome-biden-era-secure-software-memo/</loc>
		<lastmod>2026-01-26T23:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canva-among-100-targets-of-shinyhunters-okta-identity-theft-campaign/</loc>
		<lastmod>2026-01-26T23:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-future-it-workers-would-sell-patient-data/</loc>
		<lastmod>2026-01-26T23:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/upwind-secures-250m-to-extend-cnapp-to-ai-data-security/</loc>
		<lastmod>2026-01-26T23:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-cybersecurity-in-a-platform-world/</loc>
		<lastmod>2026-01-26T23:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-delays-minnesota-ice-decision-while-weighing-whether-state-was-being-illegally-punished/</loc>
		<lastmod>2026-01-26T23:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mssps-can-help-clients-mitigate-shadow-it-and-data-sprawl-with-cavelo/</loc>
		<lastmod>2026-01-26T23:23:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mssps-can-help-clients-mitigate-shadow-it-and-data-sprawl-with-cavelo-2/</loc>
		<lastmod>2026-01-26T23:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-der-medizin-datenflut-schwemmt-auch-bosartige-dateien-in-systeme-des-gesundheitswesens-2/</loc>
		<lastmod>2026-01-27T00:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-der-medizin-datenflut-schwemmt-auch-bosartige-dateien-in-systeme-des-gesundheitswesens/</loc>
		<lastmod>2026-01-27T00:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-wave-of-vishing-attacks-is-breaking-into-sso-accounts-in-real-time/</loc>
		<lastmod>2026-01-27T00:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-expands-tool-connections-using-mcp/</loc>
		<lastmod>2026-01-27T00:24:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/</loc>
		<lastmod>2026-01-27T00:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawdbot-style-agentic-assistants-what-your-soc-should-monitor-triage-and-contain/</loc>
		<lastmod>2026-01-27T04:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawdbot-is-what-happens-when-ai-gets-root-access-a-security-experts-take-on-silicon-valleys-hottest-ai-agent/</loc>
		<lastmod>2026-01-27T04:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographically-agile-transport-security-for-ai-infrastructure/</loc>
		<lastmod>2026-01-27T04:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-7-essential-elements-of-a-compliance-framework-you-need-to-know/</loc>
		<lastmod>2026-01-27T04:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-operate-independently-in-high-stakes-areas/</loc>
		<lastmod>2026-01-27T04:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-can-nhis-be-in-complex-enterprise-environments/</loc>
		<lastmod>2026-01-27T04:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-be-optimistic-about-the-future-of-secrets-management/</loc>
		<lastmod>2026-01-27T04:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-exciting-new-developments-are-happening-in-nhis/</loc>
		<lastmod>2026-01-27T04:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unplugged-holes-in-the-npm-and-yarn-package-managers-could-let-attackers-bypass-defenses-against-shai-hulud/</loc>
		<lastmod>2026-01-27T04:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-in-script-peckbirdy/</loc>
		<lastmod>2026-01-27T04:31:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hijacking-the-hackers-researchers-sinkhole-kazakrat/</loc>
		<lastmod>2026-01-27T04:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hijacking-the-hackers-researchers-sinkhole-kazakrat-2/</loc>
		<lastmod>2026-01-27T04:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-publishes-a-post-quantum-shopping-list-for-agencies-security-professionals-arent-sold/</loc>
		<lastmod>2026-01-27T04:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-mehrheit-sieht-ubernahme-wichtiger-unternehmen-in-deutschland-kritisch/</loc>
		<lastmod>2026-01-27T04:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-delays-minnesota-ice-decision-while-weighing-whether-state-is-being-illegally-punished/</loc>
		<lastmod>2026-01-27T04:35:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-delays-minnesota-ice-decision-while-weighing-whether-state-is-being-illegally-punished-2/</loc>
		<lastmod>2026-01-27T04:35:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm-gruppe-steckt-hinter-cyberangriff-auf-polens-stromnetz-im-dezember-2025/</loc>
		<lastmod>2026-01-27T04:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/user-managed-access-uma-2-0-explained-2/</loc>
		<lastmod>2026-01-27T05:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/user-managed-access-uma-2-0-explained/</loc>
		<lastmod>2026-01-27T05:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-sign-on-account-management-in-app-stores/</loc>
		<lastmod>2026-01-27T05:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-appetite-for-data-is-testing-enterprise-guardrails/</loc>
		<lastmod>2026-01-27T06:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-appetite-for-data-is-testing-enterprise-guardrails-2/</loc>
		<lastmod>2026-01-27T06:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cert-in-advisories-january-2026-sap-microsoft-and-atlassian-vulnerabilities/</loc>
		<lastmod>2026-01-27T07:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-sicherheitsrisiken-die-cios-bei-der-nutzung-von-krypto-technologien-oft-unterschatzen/</loc>
		<lastmod>2026-01-27T07:22:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-open-science-meets-real-world-cybersecurity/</loc>
		<lastmod>2026-01-27T07:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waiting-for-ai-superintelligence-dont-hold-your-breath/</loc>
		<lastmod>2026-01-27T07:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-issues-holding-back-cisos-security-agendas/</loc>
		<lastmod>2026-01-27T08:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-probes-possible-cybersecurity-incident-following-dark-web-claims/</loc>
		<lastmod>2026-01-27T08:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dormakaba-flaws-allow-to-access-major-organizations-doors/</loc>
		<lastmod>2026-01-27T08:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landmark-legal-challenge-against-police-facial-recognition-begins/</loc>
		<lastmod>2026-01-27T08:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-bringt-notfallpatch-office-nutzer-werden-uber-zero-day-lucke-attackiert/</loc>
		<lastmod>2026-01-27T08:26:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cyber-fusion-centers-and-zero-trust-work-better-together/</loc>
		<lastmod>2026-01-27T09:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-office-zero-day-cve-2026-21509-emergency-patch-issued-for-active-exploitation/</loc>
		<lastmod>2026-01-27T09:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/he-who-controls-the-key-controls-the-world-microsoft-often-provides-bitlocker-keys-to-law-enforcement/</loc>
		<lastmod>2026-01-27T10:25:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-actively-exploited-vmware-vcenter-rce-flaw-in-kev-catalog/</loc>
		<lastmod>2026-01-27T10:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-reveals-actively-exploited-office-zero-day-provides-emergency-fix-cve-2026-21509/</loc>
		<lastmod>2026-01-27T10:27:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-leaks-ransomware-group-claims-1-4tb-nike-data-breach/</loc>
		<lastmod>2026-01-27T10:28:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-vor-missbrauch-schutzen-ki-willkur-3-risiken-und-ihre-losung/</loc>
		<lastmod>2026-01-27T10:29:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-server-vnext-mit-refs-boot-neuen-lizenzen-und-cluster-updates-so-viel-andert-sich-bei-windows-server-2028/</loc>
		<lastmod>2026-01-27T10:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/online-dienste-und-regierungsaccounts-149-millionen-passworter-in-offentlicher-datenbank-aufgetaucht/</loc>
		<lastmod>2026-01-27T10:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-im-ki-zeitalter-von-der-compliance-pflicht-zur-strategischen-security-governance/</loc>
		<lastmod>2026-01-27T10:33:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wegen-ki-spam-curl-stellt-bug-bounty-ein/</loc>
		<lastmod>2026-01-27T11:23:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/office-zero-day-exploited-in-the-wild-forces-microsoft-oob-patch/</loc>
		<lastmod>2026-01-27T11:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amnesia-rat-deployed-in-multi-stage-phishing-attacks-against-russian-users/</loc>
		<lastmod>2026-01-27T11:24:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/he-leaked-the-secrets-of-a-southeast-asian-scam-compound-then-he-had-to-get-out-alive/</loc>
		<lastmod>2026-01-27T11:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revealed-leaked-chats-expose-the-daily-life-of-a-scam-compounds-enslaved-workforce/</loc>
		<lastmod>2026-01-27T11:26:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-patch-for-office-zero-day-amid-evidence-of-exploitation/</loc>
		<lastmod>2026-01-27T11:27:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-braucht-vertrauen-und-vertrauen-braucht-kryptografie/</loc>
		<lastmod>2026-01-27T11:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacken-beobachtet-uralte-telnetd-lucke-gefahrdet-hunderttausende-systeme/</loc>
		<lastmod>2026-01-27T11:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-court-to-grill-london-cops-over-live-facial-recognition-creep/</loc>
		<lastmod>2026-01-27T12:22:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-thwarts-russian-wiper-malware-attack-on-power-plants/</loc>
		<lastmod>2026-01-27T12:23:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149-million-compromised-credentials-expose-growing-infostealer-malware-crisis/</loc>
		<lastmod>2026-01-27T12:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-grist-core-vulnerability-allows-rce-attacks-via-spreadsheet-formulas/</loc>
		<lastmod>2026-01-27T12:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-have-used-the-peckbirdy-javascript-c2-framework-since-2023/</loc>
		<lastmod>2026-01-27T12:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-practices-fur-monitoring-observability-wie-sich-warnmeldungen-sinnvoll-steuern-lassen/</loc>
		<lastmod>2026-01-27T12:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-frankreich-lost-sich-von-zoom-und-ms-teams/</loc>
		<lastmod>2026-01-27T12:28:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnet-spotlight-pressure-rises-on-botnets-but-the-fight-is-far-from-over/</loc>
		<lastmod>2026-01-27T13:23:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overcoming-ai-fatigue/</loc>
		<lastmod>2026-01-27T13:23:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-sweeping-overhaul-of-policing-amid-surge-in-online-crimes/</loc>
		<lastmod>2026-01-27T13:24:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-entdeckt-c2-kompilierte-kernel-rootkits-und-neue-tarnmechanismen-im-linuxframework-voidlink/</loc>
		<lastmod>2026-01-27T13:25:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tipps-zur-dataweek-von-knowbe4/</loc>
		<lastmod>2026-01-27T13:26:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkliste-fur-ein-sicheres-epostfach/</loc>
		<lastmod>2026-01-27T13:27:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-illegally-installed-cookies-on-schoolkids-tech-data-protection-ruling-finds/</loc>
		<lastmod>2026-01-27T13:28:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-charges-31-suspects-in-nationwide-atm-jackpotting-scam/</loc>
		<lastmod>2026-01-27T13:29:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-adds-ipv6-support-to-iam-identity-center-through-dual-stack-endpoints/</loc>
		<lastmod>2026-01-27T13:30:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-i-been-pwned-soundcloud-data-breach-impacts-29-8-million-accounts/</loc>
		<lastmod>2026-01-27T13:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hand-cve-over-to-the-private-sector/</loc>
		<lastmod>2026-01-27T13:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ctem-in-practice-prioritization-validation-and-outcomes-that-matter/</loc>
		<lastmod>2026-01-27T13:33:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-act-2-eu-kommission-plant-nisupdate/</loc>
		<lastmod>2026-01-27T13:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lucken-in-zugangskontrollsystemen-turschlosser-zahlreicher-unternehmen-gefahrdet/</loc>
		<lastmod>2026-01-27T13:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-see-an-email-ending-in-eu-org-must-be-legit-right/</loc>
		<lastmod>2026-01-27T14:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teleport-launches-framework-to-secure-identities-of-ai-agents/</loc>
		<lastmod>2026-01-27T14:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-releases-technology-readiness-list-for-post-quantum-cryptography/</loc>
		<lastmod>2026-01-27T14:24:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polen-russische-hackergruppe-greift-energieinfrastruktur-an/</loc>
		<lastmod>2026-01-27T14:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-security-systems-firm-delta-hit-by-cyberattack-services-disrupted/</loc>
		<lastmod>2026-01-27T14:26:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategische-prioritaten-fur-unternehmen-2026-informationssicherheit-compliance-und-datenschutz/</loc>
		<lastmod>2026-01-27T14:27:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-kits-imitieren-vermehrt-telefongesprache/</loc>
		<lastmod>2026-01-27T14:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149-millionen-gestohlenen-benutzernamen-es-reicht-nicht-passworter-zu-andern-vielmehr-muss-der-zugriff-kontrolliert-und-reduziert-werden/</loc>
		<lastmod>2026-01-27T14:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-to-replace-us-videoconferencing-wares-with-unfortunately-named-sovereign-alternative/</loc>
		<lastmod>2026-01-27T14:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-patch-for-active-office-zero-day/</loc>
		<lastmod>2026-01-27T14:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-brings-ai-powered-investigations-to-security-teams/</loc>
		<lastmod>2026-01-27T14:34:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beauty-in-destruction-exploring-malwares-impact-through-art/</loc>
		<lastmod>2026-01-27T14:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-80-of-ethical-hackers-now-use-ai/</loc>
		<lastmod>2026-01-27T14:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubernahme-im-cybersecurity-markt-servicenow-will-cyber-exposure-management-ausbauen/</loc>
		<lastmod>2026-01-27T14:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategic-reel-certificate-expiration-is-speeding-up-outpacing-legacy-management/</loc>
		<lastmod>2026-01-27T15:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-it-doxxing-how-it-happens-and-how-to-stay-safe/</loc>
		<lastmod>2026-01-27T15:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cohesity-studie-zur-cyberresilienz-deutscher-unternehmen/</loc>
		<lastmod>2026-01-27T15:25:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-windows-app-v-scripts-to-slip-infostealer-past-enterprise-defenses/</loc>
		<lastmod>2026-01-27T15:29:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-expands-its-zero-trust-privileged-access-controls-into-slack/</loc>
		<lastmod>2026-01-27T15:29:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-6000-smartermail-servers-exposed-to-automated-hijacking-attacks/</loc>
		<lastmod>2026-01-27T15:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-hijack-github-desktop-repo-to-spread-malware-via-official-installer/</loc>
		<lastmod>2026-01-27T15:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g_wagon-npm-package-exploits-users-to-steal-browser-credentials-with-obfuscated-payload/</loc>
		<lastmod>2026-01-27T15:32:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-public-to-stay-alert-against-rising-natural-disaster-scams/</loc>
		<lastmod>2026-01-27T15:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-group-targets-over-100-enterprises-including-canva-atlassian-and-epic-games/</loc>
		<lastmod>2026-01-27T15:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vm2-flaw-lets-attackers-bypass-sandbox-and-execute-arbitrary-code-in-node-js/</loc>
		<lastmod>2026-01-27T15:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-6000-smartermail-servers-exposed-to-actively-exploited-rce-vulnerability/</loc>
		<lastmod>2026-01-27T15:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-react2shell-vulnerability-to-target-it-sector-systems/</loc>
		<lastmod>2026-01-27T15:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-seo-poisoning-to-target-users-seeking-legitimate-tools/</loc>
		<lastmod>2026-01-27T15:38:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-faces-legal-action-over-claims-of-accessing-all-whatsapp-user-messages/</loc>
		<lastmod>2026-01-27T15:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attacks-expand-using-fake-captchas-microsoft-scripts-and-trusted-web-services/</loc>
		<lastmod>2026-01-27T15:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-dhcp-was-ist-das-dynamic-host-configuration-protocol/</loc>
		<lastmod>2026-01-27T15:41:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-deepfake-phishing-attack-targets-bitcoin-users-via-zoom-and-teams/</loc>
		<lastmod>2026-01-27T15:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-netflix-gmail-und-outlook-sicherheitsexperte-entdeckt-149-millionen-passworter-frei-im-netz/</loc>
		<lastmod>2026-01-27T15:44:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-meistgenutzten-passworter-2025-platz-1-erratst-du-leicht-so-geht-es-besser/</loc>
		<lastmod>2026-01-27T15:45:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-bei-gemini-ein-kalendereintrag-reicht-um-die-ki-zu-manipulieren/</loc>
		<lastmod>2026-01-27T15:46:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-pairing-bsi-warnt-vor-whatsapp-ubernahme/</loc>
		<lastmod>2026-01-27T15:47:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-booking-travel-how-businesses-can-enable-revenue-minimize-risk/</loc>
		<lastmod>2026-01-27T16:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-probleme-die-cisos-behindern/</loc>
		<lastmod>2026-01-27T16:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-probes-potential-cyber-incident-after-hackers-claim-data-leak/</loc>
		<lastmod>2026-01-27T16:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/levelblue-scoops-up-alert-logics-managed-services-from-fortra/</loc>
		<lastmod>2026-01-27T16:27:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-readiness-akuter-anspruch-fur-die-datensicherheit-der-zukunft/</loc>
		<lastmod>2026-01-27T16:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-group-accused-of-spying-on-phones-of-uk-prime-ministers-aides-for-years/</loc>
		<lastmod>2026-01-27T16:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-microsoft-office-gnu-inetutils-smartertools-smartermail-and-linux-kernel-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-27T16:30:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/living-off-the-web-how-fake-captcha-turned-trust-into-a-malware-delivery-channel/</loc>
		<lastmod>2026-01-27T16:32:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-cipher-to-fear-the-psychology-behind-modern-ransomware-extortion/</loc>
		<lastmod>2026-01-27T16:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-ransomware-survey-2025-von-crowdstrike-angreifer-ki-uberholt-moglichkeiten-von-unternehmen/</loc>
		<lastmod>2026-01-27T16:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interconnectedness-extortion-risk-make-cybersecurity-a-healthcare-c-suite-priority/</loc>
		<lastmod>2026-01-27T17:26:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-attacks-target-indian-government-using-sheetcreep-firepower-and-mailcreep-part-2/</loc>
		<lastmod>2026-01-27T17:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-hot-agentic-soc-tools-in-2026/</loc>
		<lastmod>2026-01-27T17:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-more-are-charged-in-ploutus-atm-jackpotting-conspiracy-2/</loc>
		<lastmod>2026-01-27T17:29:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-more-are-charged-in-ploutus-atm-jackpotting-conspiracy/</loc>
		<lastmod>2026-01-27T17:29:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-more-are-charged-in-ploutus-atm-jackpotting-conspiracy-3/</loc>
		<lastmod>2026-01-27T17:29:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowserver-finds-6000-likely-vulnerable-smartermail-servers-exposed-online/</loc>
		<lastmod>2026-01-27T17:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-investigates-data-breach-after-extortion-gang-leaks-files/</loc>
		<lastmod>2026-01-27T17:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-patch-fixes-are-breaking-windows-forcing-a-second-emergency-update/</loc>
		<lastmod>2026-01-27T17:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-charges-31-more-suspects-linked-to-atm-malware-attacks/</loc>
		<lastmod>2026-01-27T17:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sandbox-escape-flaw-discovered-in-popular-vm2-nodejs-library/</loc>
		<lastmod>2026-01-27T17:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldleaks-extortion-group-claims-it-stole-1-4tb-of-nike-data/</loc>
		<lastmod>2026-01-27T17:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peckbirdy-framework-tied-to-china-aligned-cyber-campaigns/</loc>
		<lastmod>2026-01-27T17:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pyodide-sandbox-escape-enables-remote-code-execution-in-grist-core/</loc>
		<lastmod>2026-01-27T17:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-allies-with-ibm-consulting-to-spur-pqc-adoption/</loc>
		<lastmod>2026-01-27T18:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-releases-account-feature-that-looks-to-combat-spyware/</loc>
		<lastmod>2026-01-27T18:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pig-butchering-als-service-wenn-betrug-kauflich-wird/</loc>
		<lastmod>2026-01-27T18:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amid-trump-attacks-and-weaponized-sanctions-europeans-look-to-rely-less-on-us-tech/</loc>
		<lastmod>2026-01-27T18:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-you-live-in-the-uk-you-probably-wont-be-able-to-visit-pornhub-anymore/</loc>
		<lastmod>2026-01-27T18:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/16-fake-chatgpt-extensions-caught-hijacking-user-accounts/</loc>
		<lastmod>2026-01-27T18:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-target-100-firms-using-phone-calls-to-bypass-sso-security/</loc>
		<lastmod>2026-01-27T18:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawsuit-claims-meta-can-access-whatsapp-messages-despite-encryption-promises/</loc>
		<lastmod>2026-01-27T18:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-adds-accountability-layer-to-third-party-apps/</loc>
		<lastmod>2026-01-27T18:31:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-the-next-evolution-of-email-threats-with-layered-ai-driven-security/</loc>
		<lastmod>2026-01-27T18:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sandbox-escape-flaw-found-in-popular-vm2-nodejs-library/</loc>
		<lastmod>2026-01-27T18:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-rolls-out-lockdown-style-security-mode-to-protect-targeted-users-from-spyware/</loc>
		<lastmod>2026-01-27T18:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-detect-pakistan-linked-cyber-campaigns-aimed-at-indian-government-entities/</loc>
		<lastmod>2026-01-27T18:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/layerx-discovers-malicious-chrome-extensions-stealing-chatgpt-accounts/</loc>
		<lastmod>2026-01-27T19:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-money-launderers-moved-more-than-16-billion-of-illicit-crypto-in-2025-report-finds/</loc>
		<lastmod>2026-01-27T19:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-latest-eu-country-to-ditch-us-tech/</loc>
		<lastmod>2026-01-27T19:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-and-the-growing-risk-to-enterprise-security/</loc>
		<lastmod>2026-01-27T19:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wave-of-shinyhunters-vishing-attacks-spreading-fast/</loc>
		<lastmod>2026-01-27T19:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saudi-arabia-ordered-to-pay-3m-to-uk-dissident-targeted-with-pegasus-spyware/</loc>
		<lastmod>2026-01-27T19:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broken-decryptor-leaves-sicarii-ransomware-victims-adrift/</loc>
		<lastmod>2026-01-27T19:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-security-flaws-put-thousands-of-systems-at-risk/</loc>
		<lastmod>2026-01-27T19:33:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/responding-to-exposed-secrets-an-sres-incident-response-playbook/</loc>
		<lastmod>2026-01-27T20:23:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-unveils-anti-spyware-lockdown-feature/</loc>
		<lastmod>2026-01-27T20:23:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/let-them-eat-sourdough-shinyhunters-claims-panera-bread-as-stolen-credentials-victim/</loc>
		<lastmod>2026-01-27T20:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nike-investigates-alleged-data-breach-tied-to-world-leaks/</loc>
		<lastmod>2026-01-27T20:26:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-urgent-software-fix-affecting-over-2-billion-iphones/</loc>
		<lastmod>2026-01-27T20:27:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-path-traversal-flaw-still-exploited-by-numerous-hackers/</loc>
		<lastmod>2026-01-27T20:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-on-the-robustness-of-ldp-protocols-for-numerical-attributes-under-data-poisoning-attacks/</loc>
		<lastmod>2026-01-27T21:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-now-default-enterprise-accelerator-takeaways-from-threatlabz-2026-ai-security-report/</loc>
		<lastmod>2026-01-27T21:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-ransomware-despite-i-o-overhead-a-practical-multi-staged-approach/</loc>
		<lastmod>2026-01-27T21:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-rolls-out-strict-account-settings-to-strengthen-protection-for-high-risk-users/</loc>
		<lastmod>2026-01-27T21:29:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telnet-flaw-800000-servers-at-risk-amid-active-attacks/</loc>
		<lastmod>2026-01-27T21:30:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-hospitals-go-dark-and-browsers-turn-rogue/</loc>
		<lastmod>2026-01-27T22:23:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judge-dismisses-case-alleging-use-of-flock-cameras-in-virginia-city-is-unconstitutional/</loc>
		<lastmod>2026-01-27T22:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rushes-emergency-patch-for-office-zero-day/</loc>
		<lastmod>2026-01-27T22:24:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stanley-toolkit-turns-chrome-into-undetectable-phishing-vector/</loc>
		<lastmod>2026-01-27T22:25:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ai-technology-cybersecurity-podcasts-to-follow-in-2026/</loc>
		<lastmod>2026-01-27T23:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address/</loc>
		<lastmod>2026-01-27T23:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paranoid-whatsapp-users-rejoice-encrypted-app-gets-one-click-privacy-toggle/</loc>
		<lastmod>2026-01-27T23:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-attacks-cascade-from-it-ot-to-patient-care/</loc>
		<lastmod>2026-01-27T23:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-patch-for-active-office-zero-day-2/</loc>
		<lastmod>2026-01-27T23:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-mustang-panda-hackers-deploy-infostealers-via-coolclient-backdoor/</loc>
		<lastmod>2026-01-27T23:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-the-death-of-accuracy-what-it-means-for-zero-trust/</loc>
		<lastmod>2026-01-27T23:28:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coded-sicarii-ransomware-cant-be-decrypted/</loc>
		<lastmod>2026-01-27T23:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-telnet-server-flaw-exposes-forgotten-attack-surface/</loc>
		<lastmod>2026-01-27T23:30:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fixes-released-for-a-serious-microsoft-office-zero-day-flaw/</loc>
		<lastmod>2026-01-28T00:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-and-nation-state-groups-are-exploiting-a-six-month-old-winrar-defect/</loc>
		<lastmod>2026-01-28T00:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-is-fueling-the-cios-ai-agenda/</loc>
		<lastmod>2026-01-28T00:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/memcyco-gets-37m-to-fight-ai-powered-impersonation-attacks/</loc>
		<lastmod>2026-01-28T00:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-it-buyers-told-to-plan-for-post-quantum-cryptography/</loc>
		<lastmod>2026-01-28T00:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/</loc>
		<lastmod>2026-01-28T00:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-improved-can-compliance-be-with-ai-integration/</loc>
		<lastmod>2026-01-28T04:23:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-enhance-visibility-in-secrets-management/</loc>
		<lastmod>2026-01-28T04:23:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-compliance-automation-keep-regulators-satisfied/</loc>
		<lastmod>2026-01-28T04:24:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-reduce-risks-in-digital-environments/</loc>
		<lastmod>2026-01-28T04:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeymyte-evolved-spies-use-pixeldrain-coolclient-for-real-time-surveillance/</loc>
		<lastmod>2026-01-28T04:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gopher-strike/</loc>
		<lastmod>2026-01-28T04:27:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-week-2026-datenschutz-ein-europaischer-wettbewerbsvorteil/</loc>
		<lastmod>2026-01-28T04:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-browser-isolation-schutz-vor-webbasierten-bedrohungen/</loc>
		<lastmod>2026-01-28T04:29:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-starts-patching-exploited-forticloud-sso-zero-day-cve-2026-24858/</loc>
		<lastmod>2026-01-28T04:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-chatgpt-ad-costs-are-on-par-with-live-nfl-broadcasts/</loc>
		<lastmod>2026-01-28T04:31:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographic-agility-for-contextual-ai-resource-governance/</loc>
		<lastmod>2026-01-28T05:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-data-masking-synthesis-support-zero-trust/</loc>
		<lastmod>2026-01-28T05:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transfer-learning-and-governance-help-bridge-healthcare-ai-divide/</loc>
		<lastmod>2026-01-28T05:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/audits-for-ai-systems-that-keep-changing/</loc>
		<lastmod>2026-01-28T05:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-patches-cve-2026-24858-after-active-fortios-sso-exploitation-detected/</loc>
		<lastmod>2026-01-28T05:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-prevention-first-secrets-security-will-define-enterprise-scale-learnings-from-a-leading-telecom/</loc>
		<lastmod>2026-01-28T06:22:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grammarly-and-quillbot-are-among-widely-used-chrome-extensions-facing-serious-privacy-questions/</loc>
		<lastmod>2026-01-28T06:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-21509-microsoft-schliest-zero-days-in-office-im-eiltempo/</loc>
		<lastmod>2026-01-28T06:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ebetrug-mit-ki-nun-innerhalb-von-sekunden/</loc>
		<lastmod>2026-01-28T07:23:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-react2shell-vulnerability-to-deploy-miners-and-botnets-worldwide/</loc>
		<lastmod>2026-01-28T07:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grunes-licht-fur-einfuhr-china-erteilt-freigabe-fur-hunderttausende-nvidia-h200/</loc>
		<lastmod>2026-01-28T07:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-uefi-parser-open-source-tool-exposes-uefi-architecture-to-uncover-vulnerabilities/</loc>
		<lastmod>2026-01-28T07:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzung-hinkt-2026-der-bedrohungslage-hinterher-warum-die-meisten-unternehmen-2026-bei-nis-2-scheitern-werden/</loc>
		<lastmod>2026-01-28T07:27:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-credential-leak-another-dollar-2/</loc>
		<lastmod>2026-01-28T08:23:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-credential-leak-another-dollar/</loc>
		<lastmod>2026-01-28T08:23:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-credential-leak-another-dollar-3/</loc>
		<lastmod>2026-01-28T08:23:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-prufen-blockchain-technologien-fur-sichere-zahlungs-und-identitatsprozesse/</loc>
		<lastmod>2026-01-28T08:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skills-cisos-need-to-master-in-2026/</loc>
		<lastmod>2026-01-28T08:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-just-got-smarter-at-stopping-snatchrun-phone-thefts/</loc>
		<lastmod>2026-01-28T08:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-cisos-den-sicheren-fernzugriff-in-den-blick-nehmen-sollten-2/</loc>
		<lastmod>2026-01-28T09:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-cisos-den-sicheren-fernzugriff-in-den-blick-nehmen-sollten/</loc>
		<lastmod>2026-01-28T09:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delegation-is-a-risk-decision-every-leader-makes-not-an-ops-choice/</loc>
		<lastmod>2026-01-28T09:23:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-rolls-out-new-security-feature-to-protect-users-from-sophisticated-attacks/</loc>
		<lastmod>2026-01-28T09:24:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speicherkarte-mit-integrierter-verschlusselung-sichere-daten-sichere-zukunft/</loc>
		<lastmod>2026-01-28T09:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-mehrere-hackergruppen-attackieren-winrar-nutzer-seit-monaten/</loc>
		<lastmod>2026-01-28T09:27:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/always-on-privileged-access-is-pervasive-and-fraught-with-risks/</loc>
		<lastmod>2026-01-28T10:23:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-fake-chatgpt-browser-extensions-are-stealing-your-login-credentials/</loc>
		<lastmod>2026-01-28T10:24:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aha-releases-new-guides-to-strengthen-hospital-emergency-and-cyber-preparedness/</loc>
		<lastmod>2026-01-28T10:24:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/packagegate-bugs-let-attackers-bypass-protections-in-npm-pnpm-vlt-and-bun/</loc>
		<lastmod>2026-01-28T10:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-phones-get-ai-powered-anti-theft-features/</loc>
		<lastmod>2026-01-28T10:27:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaischer-datenschutztag-2026-warum-datenschutz-zur-frage-digitaler-souveranitat-wird/</loc>
		<lastmod>2026-01-28T10:28:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-data-privacy-day-datenschutz-als-schlussel-fur-vertrauen-im-ki-zeitalter/</loc>
		<lastmod>2026-01-28T10:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alarmsystemhersteller-gehackt-cyberangriff-legt-zahlreiche-autos-in-russland-lahm/</loc>
		<lastmod>2026-01-28T10:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trade-republic-cyberkriminelle-verschicken-phishing-mails-so-schutzt-ihr-euch/</loc>
		<lastmod>2026-01-28T10:31:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/methods-for-authenticating-devices-on-a-network/</loc>
		<lastmod>2026-01-28T11:23:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-you-dont-control-your-keys-you-dont-control-your-data/</loc>
		<lastmod>2026-01-28T11:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantom-malware-in-android-game-mods-hijacks-devices-for-ad-fraud/</loc>
		<lastmod>2026-01-28T11:25:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-adds-chat-hub-to-centralize-ai-access-inside-automation-workflows/</loc>
		<lastmod>2026-01-28T11:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: e7cff01aa5c94dbe05ab0e03254f0046; Queries for sitemap: 3; Total queries: 88; Seconds: 6.18; Memory for sitemap: 1KB; Total memory: 48MB -->
