<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='16. April 2026 11:19 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/french-government-abandons-zoom-and-microsoft-teams-over-security-concerns/</loc>
		<lastmod>2026-01-28T11:27:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-reuse-in-disguise-an-often-missed-risky-workaround/</loc>
		<lastmod>2026-01-28T11:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-active-exploitation-of-winrar-vulnerability-cve-2025-8088/</loc>
		<lastmod>2026-01-28T11:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-python-spellchecker-packages-on-pypi-delivered-hidden-remote-access-trojan/</loc>
		<lastmod>2026-01-28T11:30:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-454000-malicious-open-source-packages/</loc>
		<lastmod>2026-01-28T11:31:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-money-launderers-drive-global-ecosystem-worth-82bn/</loc>
		<lastmod>2026-01-28T11:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wechselrichter-am-internet-europas-solaranlagen-brauchen-cyberschutz-warum-solaranlagen-zur-neuen-schwachstelle-im-stromnetz-werden/</loc>
		<lastmod>2026-01-28T11:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-nutzer-berichten-nach-update-von-problemen/</loc>
		<lastmod>2026-01-28T11:34:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-nutzer-berichten-nach-update-von-problemen/</loc>
		<lastmod>2026-01-28T11:34:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-bekommt-neue-sicherheitsfunktionen-gegen-diebstahl/</loc>
		<lastmod>2026-01-28T11:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-forticloud-sso-zeroday-forces-emergency-service-disablement-at-fortinet/</loc>
		<lastmod>2026-01-28T12:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicarii-ransomware-locks-your-data-and-throws-away-the-keys/</loc>
		<lastmod>2026-01-28T12:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-it-managed-services-for-large-enterprises/</loc>
		<lastmod>2026-01-28T12:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-acting-cyber-chief-allegedly-leaked-data-to-chatgpt/</loc>
		<lastmod>2026-01-28T12:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-whatsapp-lockdown-feature-protects-high-risk-users-from-hackers/</loc>
		<lastmod>2026-01-28T12:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alle-netzwerkgerate-finden-und-scannen-netzwerkanalyse-mit-sniffnet-und-whoisconnectedsniffer/</loc>
		<lastmod>2026-01-28T12:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kleinanzeigen-verlockende-immobilienangebote-mit-malware-im-schlepptau/</loc>
		<lastmod>2026-01-28T12:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-at-scale-the-commons-threats-and-ai-in-the-loop-sonatype/</loc>
		<lastmod>2026-01-28T13:26:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-platform-consolidation-often-increases-risk-instead-of-reducing-it/</loc>
		<lastmod>2026-01-28T13:27:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-rasche-einfuhrung-von-ki-schafft-kritische-sicherheitslucken-die-die-einfuhrung-einer-zero-trust-sicherheitsplattform-erforderlich-machen/</loc>
		<lastmod>2026-01-28T13:28:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/awss-inevitable-destiny-becoming-the-next-lumen/</loc>
		<lastmod>2026-01-28T13:29:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slovakian-man-pleads-guilty-to-operating-darknet-marketplace/</loc>
		<lastmod>2026-01-28T13:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-vpn-services-2026-tested-and-reviewed/</loc>
		<lastmod>2026-01-28T13:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-vpn-services-2026-tested-and-reviewed-3/</loc>
		<lastmod>2026-01-28T13:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-vpn-services-2026-tested-and-reviewed-2/</loc>
		<lastmod>2026-01-28T13:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emojis-in-purerats-code-point-to-ai-generated-malware-campaign/</loc>
		<lastmod>2026-01-28T13:34:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-threats-loom-as-enterprise-usage-jumps-91/</loc>
		<lastmod>2026-01-28T13:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugerische-immobilienangebote-bsi-warnt-vor-malware-bei-kleinanzeigen/</loc>
		<lastmod>2026-01-28T13:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ist-moltbot-der-erste-echte-ki-assistent-warum-das-tool-fur-wirbel-sorgt-aber-vorsicht-geboten-ist/</loc>
		<lastmod>2026-01-28T13:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-take-their-ball-and-go-home-from-rsac-conference/</loc>
		<lastmod>2026-01-28T14:22:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-polands-power-grid-hit-around-30-energy-facilities-new-report-says/</loc>
		<lastmod>2026-01-28T14:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-leaders-warned-country-risks-absorbing-cyber-and-hybrid-attacks-without-offensive-deterrence/</loc>
		<lastmod>2026-01-28T14:24:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-agent-systeme-werden-zum-neuen-betriebsmodell-fur-unternehmen/</loc>
		<lastmod>2026-01-28T14:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-schutz-personenbezogener-daten-ist-die-grundlage-fur-vertrauen-in-einer-ki-gesteuerten-welt/</loc>
		<lastmod>2026-01-28T14:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/old-windows-quirks-help-punch-through-new-admin-defenses/</loc>
		<lastmod>2026-01-28T14:27:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/goto-resolve-tools-background-activities-compared-to-ransomware-tactics/</loc>
		<lastmod>2026-01-28T14:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/</loc>
		<lastmod>2026-01-28T14:29:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation-2/</loc>
		<lastmod>2026-01-28T14:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation-3/</loc>
		<lastmod>2026-01-28T14:29:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surging-cyberattacks-boost-latin-america-to-riskiest-region/</loc>
		<lastmod>2026-01-28T14:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-high-severity-n8n-flaws-allow-authenticated-remote-code-execution/</loc>
		<lastmod>2026-01-28T14:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-triage-to-threat-hunts-how-ai-accelerates-secops/</loc>
		<lastmod>2026-01-28T14:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mustang-panda-deploys-updated-coolclient-backdoor-in-government-cyber-attacks/</loc>
		<lastmod>2026-01-28T14:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-fur-den-deutschen-staat-schutzschild-niedersachsen-investiert-30-millionen-euro/</loc>
		<lastmod>2026-01-28T14:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verbesserter-diebstahlschutz-fur-android-smartphones-welche-anderungen-google-jetzt-vornimmt/</loc>
		<lastmod>2026-01-28T14:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massives-datenleck-bedroht-rund-150-millionen-benutzer/</loc>
		<lastmod>2026-01-28T15:25:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-polands-power-grid-hit-around-30-facilities-new-report-says/</loc>
		<lastmod>2026-01-28T15:26:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-conference-where-founders-scale-techcrunch-founder-summit-2026-tickets-are-now-live-at-the-lowest-prices/</loc>
		<lastmod>2026-01-28T15:27:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149-millionen-gestohlene-benutzernamen-erneut-umfangreicher-datendiebstahl-aufgedeckt/</loc>
		<lastmod>2026-01-28T15:28:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/layerx-finds-malicious-chatgpt-extensions-hijack-user-accounts/</loc>
		<lastmod>2026-01-28T15:29:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winrar-vulnerability-still-a-go-to-tool-for-hackers-mandiant-warns/</loc>
		<lastmod>2026-01-28T15:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-day-and-change-your-password-day/</loc>
		<lastmod>2026-01-28T15:31:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarter-security-smaller-teams-building-resilience-with-limited-resources/</loc>
		<lastmod>2026-01-28T15:33:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/</loc>
		<lastmod>2026-01-28T15:33:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eskimming-attacks-surge-with-evolving-tactics-and-ongoing-recovery-challenges/</loc>
		<lastmod>2026-01-28T15:34:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cal-com-broken-access-controls-lead-to-account-takeover-and-data-exposure/</loc>
		<lastmod>2026-01-28T15:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-mcp-tool-0-day-vulnerability-exposes-systems-to-remote-code-execution/</loc>
		<lastmod>2026-01-28T15:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-leverage-ai-generated-malicious-job-offers-to-spread-purerat-malware/</loc>
		<lastmod>2026-01-28T15:37:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-idis-ip-camera-vulnerability-allows-full-computer-compromise-with-one-click-exploit/</loc>
		<lastmod>2026-01-28T15:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-archer-router-flaw-exposes-users-to-remote-attacks-and-full-device-control/</loc>
		<lastmod>2026-01-28T15:39:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-online-to-end-support-for-smtp-auth-basic-authentication/</loc>
		<lastmod>2026-01-28T15:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-canadians-dependence-on-digital-services-in-widespread-attacks/</loc>
		<lastmod>2026-01-28T15:41:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-national-sentenced-to-46-months-for-laundering-millions-stolen-from-u-s-investors/</loc>
		<lastmod>2026-01-28T15:42:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-introduces-new-strict-account-settings-to-protect-users-from-hackers/</loc>
		<lastmod>2026-01-28T15:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vm2-node-js-flaw-allows-sandbox-escape-and-arbitrary-code-execution/</loc>
		<lastmod>2026-01-28T15:44:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hinweis-war-zwei-wochen-online-datenschutzerklarung-gelesen-und-reise-gewonnen/</loc>
		<lastmod>2026-01-28T15:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-nutzer-berichten-nach-update-uber-probleme/</loc>
		<lastmod>2026-01-28T15:46:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-staring-at-json-how-genai-is-solving-the-api-context-crisis/</loc>
		<lastmod>2026-01-28T16:23:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/travel-and-leisure-customer-service-that-scales/</loc>
		<lastmod>2026-01-28T16:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/customer-identity-management-for-cruise-customer-experience/</loc>
		<lastmod>2026-01-28T16:25:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-engagement-strategies-powered-by-ciam/</loc>
		<lastmod>2026-01-28T16:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teen-swatting-suspects-arrested-in-hungary-and-romania/</loc>
		<lastmod>2026-01-28T16:27:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-und-it-sicherheit-zwei-seiten-einer-medaille/</loc>
		<lastmod>2026-01-28T16:28:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-acting-cybersecurity-chief-uploaded-sensitive-government-docs-to-chatgpt/</loc>
		<lastmod>2026-01-28T16:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ransomware-gruppen-ihre-opfer-auswahlen/</loc>
		<lastmod>2026-01-28T16:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-still-using-patched-winrar-flaw-for-malware-drops-warns-google/</loc>
		<lastmod>2026-01-28T16:31:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react-server-components-flaws-enable-dos-attacks/</loc>
		<lastmod>2026-01-28T16:33:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaynerx-engages-keeper-security-to-standardise-credential-security-globally/</loc>
		<lastmod>2026-01-28T16:33:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-rewriting-compliance-controls-and-cisos-must-take-notice/</loc>
		<lastmod>2026-01-28T16:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ashen-lepus-hamas-nahe-gruppe-greift-diplomatische-einrichtungen-an/</loc>
		<lastmod>2026-01-28T16:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-x-ops-untersucht-wie-ransomware-akteure-ihre-ziele-auswahlen/</loc>
		<lastmod>2026-01-28T16:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ai-report-2026-zeigt-anstieg-von-ki-aktivitaten-um-91-prozent/</loc>
		<lastmod>2026-01-28T16:37:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adac-zieht-punkte-bei-zu-viel-funktionen-per-touchscreen-ab/</loc>
		<lastmod>2026-01-28T16:39:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-iris-dynamic-privacy-preserving-search-in-authenticated-chord-peerpeer-networks/</loc>
		<lastmod>2026-01-28T17:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-workers-willing-to-use-shadow-ai-to-enhance-speed/</loc>
		<lastmod>2026-01-28T17:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tools-break-quickly-underscoring-need-for-governance/</loc>
		<lastmod>2026-01-28T17:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-autonomous-ai-cyberattacks-will-transform-security-experts/</loc>
		<lastmod>2026-01-28T17:25:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-unearths-another-critical-bug-as-sso-accounts-borked-post-patch/</loc>
		<lastmod>2026-01-28T17:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-cybercrime-platform-ramp-forum-seized-by-feds/</loc>
		<lastmod>2026-01-28T17:27:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-patches-actively-exploited-fortios-sso-auth-bypass-cve-2026-24858/</loc>
		<lastmod>2026-01-28T17:29:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-56005-python-ply-flaw-enables-remote-code-execution/</loc>
		<lastmod>2026-01-28T17:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-backed-peckbirdy-takes-flight-for-cross-platform-attacks/</loc>
		<lastmod>2026-01-28T17:30:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-system-uncovers-long-standing-openssl-flaws/</loc>
		<lastmod>2026-01-28T17:31:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-and-high-severity-n8n-sandbox-flaws-allow-rce/</loc>
		<lastmod>2026-01-28T17:32:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-workers-lean-on-shadow-ai-to-enhance-speed/</loc>
		<lastmod>2026-01-28T18:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-ceo-george-kurtz-2026-is-breakout-year-for-agentic-soc/</loc>
		<lastmod>2026-01-28T18:26:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-commissioner-says-online-age-verification-offers-a-better-way-to-protect-kids/</loc>
		<lastmod>2026-01-28T18:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-cybercrime-platform-ramp-forum-seized-by-fbi/</loc>
		<lastmod>2026-01-28T18:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-rams-software-is-becoming-essential-for-construction-safety-and-compliance/</loc>
		<lastmod>2026-01-28T18:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-locks-down-forticloud-sso-amid-zero-day-attacks/</loc>
		<lastmod>2026-01-28T18:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-cve-2026-24858-sso-flaw-under-active-attack/</loc>
		<lastmod>2026-01-28T18:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sandbox-escape-flaw-exposes-n8n-instances-to-rce-attacks/</loc>
		<lastmod>2026-01-28T18:32:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/</loc>
		<lastmod>2026-01-28T18:33:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empire-cybercrime-market-owner-pleads-guilty-to-drug-conspiracy/</loc>
		<lastmod>2026-01-28T18:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-electrum-tied-to-december-2025-cyber-attack-on-polish-power-grid/</loc>
		<lastmod>2026-01-28T18:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/31-more-charged-in-massive-atm-jackpotting-scheme-linked-to-tren-de-aragua-gang/</loc>
		<lastmod>2026-01-28T19:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everybody-is-winrar-phishing-dropping-rats-as-fast-as-lightning/</loc>
		<lastmod>2026-01-28T19:25:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-hackers-target-okta-single-sign-on/</loc>
		<lastmod>2026-01-28T19:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-moltbot-ai-coding-assistant-on-vs-code-marketplace-drops-malware/</loc>
		<lastmod>2026-01-28T19:27:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-surfaces-lots-of-room-for-devsecops-improvement/</loc>
		<lastmod>2026-01-28T20:25:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sso-vs-federated-identity-management-a-guide/</loc>
		<lastmod>2026-01-28T20:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/student-data-at-risk-what-the-victoria-education-breach-exposes-about-public-sector-security/</loc>
		<lastmod>2026-01-28T20:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-mfa-fails-quietly-inside-the-rise-of-aitm-phishing-attacks/</loc>
		<lastmod>2026-01-28T20:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-anyone-else-here/</loc>
		<lastmod>2026-01-28T20:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-service-accounts-and-why-are-they-a-security-risk/</loc>
		<lastmod>2026-01-28T20:30:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-dev-team-isnt-broken-just-misaligned/</loc>
		<lastmod>2026-01-28T20:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/95m-payout-apple-begins-compensating-users-in-siri-eavesdropping-case/</loc>
		<lastmod>2026-01-28T20:32:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-adds-one-tap-security-settings-for-added-privacy/</loc>
		<lastmod>2026-01-28T20:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radware-acquires-pynt-to-add-api-security-testing-tool/</loc>
		<lastmod>2026-01-28T21:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-nerdy-quest-puzzle-wednesday/</loc>
		<lastmod>2026-01-28T21:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governments-new-approach-to-software-security-oversight-could-complicate-things-for-vendors/</loc>
		<lastmod>2026-01-28T21:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bug-in-popular-vm2-node-js-sandboxing-library-puts-projects-at-risk/</loc>
		<lastmod>2026-01-28T21:30:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-arrested-in-crackdown-on-discord-based-swatting-and-doxing/</loc>
		<lastmod>2026-01-28T21:31:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/video-ki-europas-strengste-datenschutz-regeln-pragen-die-zukunft/</loc>
		<lastmod>2026-01-28T21:32:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idis-surveillance-management-software-vulnerable-to-hacking/</loc>
		<lastmod>2026-01-28T21:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssl-vulnerabilities-cause-risk-of-remote-code-execution/</loc>
		<lastmod>2026-01-28T21:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-the-company-that-sold-dhs-ices-notorious-face-recognition-app/</loc>
		<lastmod>2026-01-28T21:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-confirms-update-server-breached-to-push-malicious-update/</loc>
		<lastmod>2026-01-28T21:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viral-moltbot-ai-assistant-raises-concerns-over-data-security/</loc>
		<lastmod>2026-01-28T21:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-wonder-when-trump-administration-will-weigh-on-soon-expired-surveillance-powers/</loc>
		<lastmod>2026-01-28T22:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-wonder-when-trump-administration-will-weigh-on-soon-expired-surveillance-powers-2/</loc>
		<lastmod>2026-01-28T22:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/undressed-victims-file-class-action-lawsuit-against-xai-for-grok-deepfakes/</loc>
		<lastmod>2026-01-28T22:23:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-startup-outtake-raises-40m-from-iconiq-satya-nadella-bill-ackman-and-other-big-names/</loc>
		<lastmod>2026-01-28T22:24:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-crims-forced-to-take-off-ramp-as-fbi-seizes-forum/</loc>
		<lastmod>2026-01-28T22:25:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-services-firm-says-hack-affects-3-1m/</loc>
		<lastmod>2026-01-28T22:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aligning-substance-use-privacy-regs-with-hipaa-isnt-simple/</loc>
		<lastmod>2026-01-28T22:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-cyber-agencies-withdraw-from-rsac-raising-collaboration-concerns/</loc>
		<lastmod>2026-01-28T22:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-is-using-palantirs-ai-tools-to-sort-through-tips/</loc>
		<lastmod>2026-01-28T22:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-confirms-new-zero-day-behind-malicious-sso-logins/</loc>
		<lastmod>2026-01-28T22:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-masking-diy-internal-scripts-or-time-to-buy/</loc>
		<lastmod>2026-01-28T23:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/site-catering-to-online-criminals-has-been-seized-by-the-fbi/</loc>
		<lastmod>2026-01-28T23:24:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-may-gain-first-mover-advantage-on-quantum-readiness-analyst/</loc>
		<lastmod>2026-01-28T23:25:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinets-latest-zero-day-vulnerability-carries-frustrating-familiarities-for-customers/</loc>
		<lastmod>2026-01-28T23:26:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-use-by-cisa-chief-alarms-cyber-officials/</loc>
		<lastmod>2026-01-28T23:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-arizonas-push-to-modernize-and-secure-campus-it/</loc>
		<lastmod>2026-01-28T23:28:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-polish-energy-grid-impacted-around-30-facilities/</loc>
		<lastmod>2026-01-28T23:29:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consumers-reluctant-to-shop-at-stores-that-dont-take-security-seriously/</loc>
		<lastmod>2026-01-28T23:30:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keir-starmer-to-hold-talks-with-xi-to-bolster-economic-ties-with-china/</loc>
		<lastmod>2026-01-28T23:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-best-practices-for-nhi-management/</loc>
		<lastmod>2026-01-29T00:23:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-autonomous-agents-decide-in-secure-environments/</loc>
		<lastmod>2026-01-29T00:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-secrets-management-essential-for-businesses/</loc>
		<lastmod>2026-01-29T00:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-improve-platform-security/</loc>
		<lastmod>2026-01-29T00:26:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawdbot-sheds-skin-to-become-moltbot-cant-slough-off-security-issues/</loc>
		<lastmod>2026-01-29T00:27:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/succession-linux-kernel-community-gets-continuity-plan-for-post-linus-era/</loc>
		<lastmod>2026-01-29T00:29:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opnsense-26-1-brings-updates-to-open-source-firewall-management/</loc>
		<lastmod>2026-01-29T00:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/</loc>
		<lastmod>2026-01-29T00:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/months-after-patch-winrar-bug-poised-to-hit-smbs-hardest/</loc>
		<lastmod>2026-01-29T00:32:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-saml-and-how-does-saml-authentication-work/</loc>
		<lastmod>2026-01-29T04:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-sign-on-community-help-resources/</loc>
		<lastmod>2026-01-29T04:23:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pqc-hardened-model-context-protocol-transport-layers/</loc>
		<lastmod>2026-01-29T04:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-recurrent-private-set-intersection-for-unbalanced-databases-with-cuckoo-hashing/</loc>
		<lastmod>2026-01-29T04:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-again-critical-rce-bugs-reopen-old-wounds-for-enterprise-security-teams/</loc>
		<lastmod>2026-01-29T04:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crooks-are-hijacking-and-reselling-ai-infrastructure-report/</loc>
		<lastmod>2026-01-29T04:27:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spies-in-the-spreadsheet-sheet-attack/</loc>
		<lastmod>2026-01-29T04:28:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-452-the-dark-webs-worst-assassins-and-pegasus-in-the-dock/</loc>
		<lastmod>2026-01-29T04:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erc-proof-of-concept-grants-fur-tu-berlin-satellitendaten-fur-jeden-und-resiliente-kommunikationsnetze/</loc>
		<lastmod>2026-01-29T04:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-rolle-des-cfo-finanzchefs-werden-zu-digitalen-architekten-der-unternehmenszukunft/</loc>
		<lastmod>2026-01-29T04:31:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-fake-romance-turns-into-an-android-spyware-infection/</loc>
		<lastmod>2026-01-29T04:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/im-a-tech-savvy-zillennial-who-knows-how-to-safeguard-against-hacking-scammers-still-managed-to-get-me-caitlin-cassidy/</loc>
		<lastmod>2026-01-29T04:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keir-starmer-holds-talks-with-xi-to-bolster-economic-ties-with-china/</loc>
		<lastmod>2026-01-29T04:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einblicke-in-voidlink-c2-kompilierte-kernel-rootkits-und-tarnmechanismen/</loc>
		<lastmod>2026-01-29T05:23:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-anzeichen-fur-einen-schlechten-cso/</loc>
		<lastmod>2026-01-29T05:25:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-motivates-hackers-and-what-makes-them-walk-away/</loc>
		<lastmod>2026-01-29T05:27:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-motivates-hackers-and-what-makes-them-walk-away-2/</loc>
		<lastmod>2026-01-29T05:27:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-identitaten-auser-kontrolle-massive-governance-lucken-in-deutschen-unternehmen/</loc>
		<lastmod>2026-01-29T06:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hottest-cybersecurity-open-source-tools-of-the-month-january-2026/</loc>
		<lastmod>2026-01-29T06:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-practical-take-on-cyber-resilience-for-cisos/</loc>
		<lastmod>2026-01-29T06:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unified-communication-und-webex-betroffen-sicherheitslucke-erlaubt-root-zugriff-auf-cisco-systeme/</loc>
		<lastmod>2026-01-29T06:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-lack-of-spending-isnt-the-problem-with-cloud-security-structural-complexity-is/</loc>
		<lastmod>2026-01-29T07:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erneuter-massiver-datenklau-es-reicht-nicht-passworter-zu-andern/</loc>
		<lastmod>2026-01-29T07:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acting-cisa-chief-flagged-for-uploading-sensitive-government-files-into-chatgpt/</loc>
		<lastmod>2026-01-29T07:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-malware-zeroes-in-on-developer-environments/</loc>
		<lastmod>2026-01-29T07:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indurex-startet-neue-plattform-fur-sichere-und-resiliente-cyber-physische-systeme/</loc>
		<lastmod>2026-01-29T07:26:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-unveils-enhanced-ai-llm-risk-threat-matrix-for-holistic-ai-security-governance/</loc>
		<lastmod>2026-01-29T08:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ene-mene-muh-so-wahlen-ransomware-gruppen-ihre-opfer/</loc>
		<lastmod>2026-01-29T08:26:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nists-ai-guidance-pushes-cybersecurity-boundaries/</loc>
		<lastmod>2026-01-29T08:27:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/love-hacks-wie-eine-fake-app-ahnungslose-nutzer-in-die-falle-lockt/</loc>
		<lastmod>2026-01-29T08:30:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/love-hacks-wie-eine-fake-app-ahnungslose-nutzer-in-die-falle-lockt-2/</loc>
		<lastmod>2026-01-29T08:30:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-ipidea-one-of-the-worlds-largest-residential-proxy-networks/</loc>
		<lastmod>2026-01-29T08:31:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-sicherheit-und-berechtigungsmanagement-wie-cyberresilient-ist-sap-grc-wirklich/</loc>
		<lastmod>2026-01-29T08:33:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finanzaufsicht-bafin-rugt-schwere-mangel-bei-bitpanda/</loc>
		<lastmod>2026-01-29T08:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gestohlene-zugangsdaten-pravention-web-fruhwarnung-bevor-es-teuer-wird/</loc>
		<lastmod>2026-01-29T09:23:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritik-am-kritis-dachgesetz-flickenteppich-befurchtet/</loc>
		<lastmod>2026-01-29T10:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bumble-panera-bread-match-group-and-crunchbase-hit-by-new-wave-of-cyberattacks/</loc>
		<lastmod>2026-01-29T10:27:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssl-issued-security-updates-to-fix-12-flaws-including-remote-code-execution/</loc>
		<lastmod>2026-01-29T10:28:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-email-scams-highlight-need-for-employee-vigilance/</loc>
		<lastmod>2026-01-29T10:29:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-tackles-shoulder-surfing-on-galaxy-devices/</loc>
		<lastmod>2026-01-29T10:30:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-fixes-critical-web-help-desk-rce-vulnerabilities-upgrade-asap/</loc>
		<lastmod>2026-01-29T10:31:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/75-of-organisations-have-gaps-in-core-security-controls-research-finds/</loc>
		<lastmod>2026-01-29T10:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-fixes-four-critical-web-help-desk-flaws-with-unauthenticated-rce-and-auth-bypass/</loc>
		<lastmod>2026-01-29T10:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/number-of-cybersecurity-pros-surges-194-in-four-years/</loc>
		<lastmod>2026-01-29T10:34:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/number-of-cybersecurity-pros-surges-194-in-four-years-2/</loc>
		<lastmod>2026-01-29T10:34:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-teams-embrace-ai-just-not-at-the-scale-marketing-suggests/</loc>
		<lastmod>2026-01-29T10:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-wegen-virenschutz-malware-uber-update-server-von-antivirus-tool-verteilt/</loc>
		<lastmod>2026-01-29T10:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armoury-crate-windows-11-blockiert-software-fur-xbox-handheld/</loc>
		<lastmod>2026-01-29T10:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eus-answer-to-cve-solves-dependency-issue-adds-fragmentation-risks/</loc>
		<lastmod>2026-01-29T11:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dissecting-uat-8099-new-persistence-mechanisms-and-regional-focus/</loc>
		<lastmod>2026-01-29T11:23:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ir-trends-q4-2025-exploitation-remains-dominant-phishing-campaign-targets-native-american-tribal-organizations/</loc>
		<lastmod>2026-01-29T11:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-agrees-to-pay-135-million-over-android-data-harvesting-claims/</loc>
		<lastmod>2026-01-29T11:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-14m-panera-bread-records-exposed-in-data-breach/</loc>
		<lastmod>2026-01-29T11:27:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenzugang-trifft-auf-dsgvo-und-geschaftsgeheimnisse-rechte-und-pflichten-nach-dem-eu-data-act/</loc>
		<lastmod>2026-01-29T11:27:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-protecting-your-phone-number-matters-for-online-security/</loc>
		<lastmod>2026-01-29T12:25:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-blackhole-list-how-to-remove-an-ip-from-it/</loc>
		<lastmod>2026-01-29T12:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soundcloud-data-breach-nearly-30-million-accounts-confirmed-exposed/</loc>
		<lastmod>2026-01-29T12:27:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/long-running-north-korea-threat-group-splits-into-3-distinct-operations/</loc>
		<lastmod>2026-01-29T12:28:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-safer-internet-day-2026-dsin-talk-zu-medienkompetenzen-in-der-schule/</loc>
		<lastmod>2026-01-29T12:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-and-criminal-actors-leverage-winrar-flaw-in-attacks/</loc>
		<lastmod>2026-01-29T12:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conditional-access-enforcement-change-coming-to-microsoft-entra/</loc>
		<lastmod>2026-01-29T12:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qa-why-cybersecurity-is-now-a-core-business-risk-not-just-a-technical-problem/</loc>
		<lastmod>2026-01-29T12:32:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberasap-demo-day-exclusive-first-look-at-the-uks-next-generation-cyber-security-innovations/</loc>
		<lastmod>2026-01-29T12:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-rolls-out-android-theft-protection-feature-updates/</loc>
		<lastmod>2026-01-29T12:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-decisions-cisos-need-to-make-to-prevent-downtime-risk-in-2026/</loc>
		<lastmod>2026-01-29T12:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-verwaltung-und-souverane-cloud-wie-sichere-infrastrukturen-die-offentliche-verwaltung-transformieren/</loc>
		<lastmod>2026-01-29T12:36:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlag-gegen-ransomware-fbi-nimmt-cybergangstern-ihr-forum-weg/</loc>
		<lastmod>2026-01-29T12:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/virenschutz-ade-malware-uber-update-server-von-antivirus-tool-verteilt/</loc>
		<lastmod>2026-01-29T12:38:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-rce-bugs-expose-the-n8n-automation-platform-to-hostlevel-compromise/</loc>
		<lastmod>2026-01-29T13:26:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-chief-uploaded-sensitive-government-files-to-public-chatgpt/</loc>
		<lastmod>2026-01-29T13:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-polands-power-grid-could-have-turned-deadly-in-winter-cold/</loc>
		<lastmod>2026-01-29T13:28:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-google-ads-target-mac-users-with-fake-mac-cleaner-pages/</loc>
		<lastmod>2026-01-29T13:30:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-of-100-energy-systems-reveals-critical-ot-cybersecurity-gaps/</loc>
		<lastmod>2026-01-29T13:30:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-victim-numbers-rise-despite-drop-in-active-extortion-groups/</loc>
		<lastmod>2026-01-29T13:31:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-data-breaches-hit-record-high-but-victim-numbers-decline/</loc>
		<lastmod>2026-01-29T13:32:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-bedrohungslage-verscharft-sich-weiter-14-prozent-mehr-angriffe-in-deutschland/</loc>
		<lastmod>2026-01-29T13:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-extends-dlp-reach-to-ai-agents/</loc>
		<lastmod>2026-01-29T14:26:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-extends-dlp-reach-to-ai-agents-2/</loc>
		<lastmod>2026-01-29T14:26:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-extends-dlp-reach-to-ai-agents-3/</loc>
		<lastmod>2026-01-29T14:26:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notorious-russia-based-ramp-cybercrime-forum-apparently-seized-by-fbi/</loc>
		<lastmod>2026-01-29T14:27:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-or-perish-vulnerability-exploits-now-dominate-intrusions/</loc>
		<lastmod>2026-01-29T14:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nudify-app-proliferation-shows-naked-ambition-of-apple-and-google/</loc>
		<lastmod>2026-01-29T14:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-previews-windows-11-update-with-smarter-ai-and-phone-continuity/</loc>
		<lastmod>2026-01-29T14:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-fines-unemployment-agency-euro5-million-over-data-breach/</loc>
		<lastmod>2026-01-29T14:31:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-cisos-respond-to-ransomware-getting-more-violent/</loc>
		<lastmod>2026-01-29T14:33:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-new-rces-darknet-busts-kernel-bugs-25-more-stories/</loc>
		<lastmod>2026-01-29T14:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-takes-down-ramp-ransomware-forum/</loc>
		<lastmod>2026-01-29T14:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ticketverkauf-eingeschrankt-cyberangriff-schrankt-kunstsammlungen-dresden-ein/</loc>
		<lastmod>2026-01-29T14:35:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wi-fi-protected-setup-was-ist-wps/</loc>
		<lastmod>2026-01-29T14:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponized-vs-code-extension-clawdbot-agent-spreads-screenconnect-rat/</loc>
		<lastmod>2026-01-29T15:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-and-microsoft-teams-lose-french-government-trust-after-security-review/</loc>
		<lastmod>2026-01-29T15:48:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-based-pyrat-emerges-as-cross-platform-threat-with-advanced-remote-access-capabilities/</loc>
		<lastmod>2026-01-29T15:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matanbuchus-malware-evolves-to-bypass-av-defenses-by-swapping-core-components/</loc>
		<lastmod>2026-01-29T15:50:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-ics-ot-cybersecurity-2025-7-wichtige-erkenntnisse-fur-ics-und-ot-umgebungen/</loc>
		<lastmod>2026-01-29T15:51:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitaten-im-fokus-von-cyberkriminellen/</loc>
		<lastmod>2026-01-29T15:28:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-get-second-guilty-plea-in-takedown-of-dark-web-empire-market/</loc>
		<lastmod>2026-01-29T15:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latvia-says-russia-remains-its-top-cyber-threat-as-attacks-hit-record-high/</loc>
		<lastmod>2026-01-29T15:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-update-to-address-zero-day-vulnerability-in-microsoft-office/</loc>
		<lastmod>2026-01-29T15:31:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-new-iphone-and-ipad-security-feature-limits-cell-networks-from-collecting-precise-location-data/</loc>
		<lastmod>2026-01-29T15:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-swipes-right-on-10m-records-in-alleged-dating-app-data-grab/</loc>
		<lastmod>2026-01-29T15:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-knocks-on-ad-techs-data-door-to-see-what-it-knows-about-you/</loc>
		<lastmod>2026-01-29T15:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-startup-aims-to-solve-cryptos-broken-key-management-problem/</loc>
		<lastmod>2026-01-29T15:35:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sentences-chinese-national-for-role-in-36-9-million-crypto-scam/</loc>
		<lastmod>2026-01-29T15:36:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-av-supply-chain-compromise-users-targeted-with-malicious-updates/</loc>
		<lastmod>2026-01-29T15:38:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-travail-fined-euro5-million-for-failing-to-protect-job-seeker-data/</loc>
		<lastmod>2026-01-29T15:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-botnet-sets-new-record-with-31-4-tbps-ddos-attack/</loc>
		<lastmod>2026-01-29T15:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-teams-feature-will-let-you-report-suspicious-calls/</loc>
		<lastmod>2026-01-29T15:40:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-directory-exposure-leaks-byob-framework-across-windows-linux-and-macos/</loc>
		<lastmod>2026-01-29T15:41:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackice-introduced-as-container-based-red-teaming-toolkit-for-ai-security-testing/</loc>
		<lastmod>2026-01-29T15:42:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swarmer-tool-abuses-windows-registry-to-evade-detection-and-persist-on-systems/</loc>
		<lastmod>2026-01-29T15:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-mac-cleaner-campaign-uses-google-ads-to-redirect-users-to-malware/</loc>
		<lastmod>2026-01-29T15:44:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-antivirus-update-server-breached-to-deliver-malicious-software-updates/</loc>
		<lastmod>2026-01-29T15:45:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-semantic-chaining-attack-that-defeats-grok-4-gemini-ai-safeguards/</loc>
		<lastmod>2026-01-29T15:46:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-completes-3-3b-acquisition-of-chronosphere-for-ai-observability-push/</loc>
		<lastmod>2026-01-29T16:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-large-russian-bread-factory-disrupts-supply-deliveries/</loc>
		<lastmod>2026-01-29T16:29:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-threat-intelligence-platforms-software/</loc>
		<lastmod>2026-01-29T16:29:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cal-com-access-control-flaws-expose-millions-of-bookings/</loc>
		<lastmod>2026-01-29T16:30:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/not-a-kids-game-from-roblox-mod-to-compromising-your-company/</loc>
		<lastmod>2026-01-29T16:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cisa-guidance-targets-insider-threat-risks/</loc>
		<lastmod>2026-01-29T16:32:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-sieht-84-anstieg-bei-cyberangriffen-mit-ot-protokollen/</loc>
		<lastmod>2026-01-29T16:33:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-infrastruktur-bundestag-beschliest-kritis-dachgesetz/</loc>
		<lastmod>2026-01-29T16:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/employment-fraud-hiring-risk-when-access-becomes-risk/</loc>
		<lastmod>2026-01-29T17:27:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-agentic-ai-posture-score-a-new-metric-for-cisos/</loc>
		<lastmod>2026-01-29T17:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-security-researchers-warn-forticloud-sso-flaw-is-under-attack/</loc>
		<lastmod>2026-01-29T17:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/to-stop-crims-google-starts-dismantling-residential-proxy-network-they-use-to-hide/</loc>
		<lastmod>2026-01-29T17:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/av-vendor-goes-to-war-with-security-shop-over-update-server-scare/</loc>
		<lastmod>2026-01-29T17:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-targets-ipidea-in-crackdown-on-global-residential-proxy-networks/</loc>
		<lastmod>2026-01-29T17:32:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-proxy-network-used-by-550-threat-groups/</loc>
		<lastmod>2026-01-29T17:33:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ai-toy-exposed-50000-logs-of-its-chats-with-kids-to-anyone-with-a-gmail-account/</loc>
		<lastmod>2026-01-29T17:34:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-winter-shield-fbi-issues-call-to-arms-for-organizations-to-improve-cybersecurity/</loc>
		<lastmod>2026-01-29T17:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-fines-national-employment-agency-euro5m-over-2024-data-breach/</loc>
		<lastmod>2026-01-29T17:36:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybersicherheitsbehorde-vertrauliche-informationen-bei-chatgpt-hochgeladen/</loc>
		<lastmod>2026-01-29T17:37:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-security-debt-we-pretend-isnt-there/</loc>
		<lastmod>2026-01-29T18:23:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbot-personal-assistant-goes-viral-and-so-do-your-secrets/</loc>
		<lastmod>2026-01-29T18:24:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-trajdeleter-enabling-trajectory-forgetting-in-offline-reinforcement-learning-agents/</loc>
		<lastmod>2026-01-29T18:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/davos-reflections-on-ai-security-and-responsibility/</loc>
		<lastmod>2026-01-29T18:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thrm-2026-changing-security-training-and-human-behavior/</loc>
		<lastmod>2026-01-29T18:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/simplifying-k-12-technology-how-managedmethods-can-reduce-complexity-to-do-more-with-less/</loc>
		<lastmod>2026-01-29T18:28:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-pivot-on-software-security-oversight-could-complicate-vendor-strategies/</loc>
		<lastmod>2026-01-29T18:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-cool-agentic-security-startups-in-2026/</loc>
		<lastmod>2026-01-29T18:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-government-agency-fined-nearly-6-million-for-data-security-failings/</loc>
		<lastmod>2026-01-29T18:31:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/op-bizarre-bazaar-new-llmjacking-campaign-targets-unprotected-models/</loc>
		<lastmod>2026-01-29T18:32:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breaches-in-america-hit-all-time-record-high-in-2025/</loc>
		<lastmod>2026-01-29T18:33:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-major-residential-proxy-network-ipidea/</loc>
		<lastmod>2026-01-29T18:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/</loc>
		<lastmod>2026-01-29T18:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/semantic-chaining-jailbreak-dupes-gemini-nano-banana-grok-4/</loc>
		<lastmod>2026-01-29T18:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-extensive-residential-proxy-networks/</loc>
		<lastmod>2026-01-29T18:39:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quartalsbericht-nokia-kampft-weiter-mit-ruckgang-im-kerngeschaft/</loc>
		<lastmod>2026-01-29T18:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-commerce-readiness-checklist-a-starting-point-for-2026/</loc>
		<lastmod>2026-01-29T19:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-real-world-soc-detections-a-practical-view-of-modern-attack-patterns/</loc>
		<lastmod>2026-01-29T19:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/</loc>
		<lastmod>2026-01-29T19:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-pick-champions-foreign-spying-law-as-nomination-advances/</loc>
		<lastmod>2026-01-29T19:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/im-locked-in/</loc>
		<lastmod>2026-01-29T19:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/common-cloud-migration-security-mistakes-and-how-to-avoid-them/</loc>
		<lastmod>2026-01-29T19:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-probe-into-missing-seized-bitcoin/</loc>
		<lastmod>2026-01-29T19:30:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ramp-ransomware-forum-goes-dark-in-probable-fbi-sting/</loc>
		<lastmod>2026-01-29T19:31:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metropolitan-police-needs-effective-constraints-on-live-facial-recognition-use-court-hears/</loc>
		<lastmod>2026-01-29T19:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-now-one-of-the-uks-fastest-growing-career-paths/</loc>
		<lastmod>2026-01-29T19:35:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/westcon-comstor-and-bechtle-expand-global-reach/</loc>
		<lastmod>2026-01-29T19:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-pretends-its-a-military-force-its-tactics-would-get-real-soldiers-killed/</loc>
		<lastmod>2026-01-29T19:38:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-pretends-its-a-military-force-its-tactics-would-get-real-soldiers-killed-3/</loc>
		<lastmod>2026-01-29T19:38:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-pretends-its-a-military-force-its-tactics-would-get-real-soldiers-killed-2/</loc>
		<lastmod>2026-01-29T19:38:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-pretends-its-a-military-force-its-tactics-would-get-real-soldiers-killed-4/</loc>
		<lastmod>2026-01-29T19:38:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-pretends-its-a-military-force-its-tactics-would-get-real-soldiers-killed-5/</loc>
		<lastmod>2026-01-29T19:38:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-brings-plain-english/</loc>
		<lastmod>2026-01-29T19:38:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/match-group-breach-exposes-data-from-hinge-tinder-okcupid-and-match/</loc>
		<lastmod>2026-01-29T19:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opentext-names-ibm-veteran-ayman-antoun-as-new-ceo/</loc>
		<lastmod>2026-01-29T20:30:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-wants-to-push-its-view-of-ai-cybersecurity-standards-to-the-rest-of-the-world/</loc>
		<lastmod>2026-01-29T20:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-election-officials-blast-trump-administration-after-fulton-county-raid/</loc>
		<lastmod>2026-01-29T20:33:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ambulance-billing-firm-pays-515k-fine-to-2-states-in-hack/</loc>
		<lastmod>2026-01-29T20:34:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-ipidea-residential-proxy-networks-fueled-by-malware/</loc>
		<lastmod>2026-01-29T20:34:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-175000-publicly-exposed-ollama-ai-servers-across-130-countries/</loc>
		<lastmod>2026-01-29T20:36:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-open-source-malware-instances-increased-73-in-2025/</loc>
		<lastmod>2026-01-29T21:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apple-feature-will-block-cell-networks-from-capturing-precise-location-data/</loc>
		<lastmod>2026-01-29T21:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-firm-marquis-blames-hack-at-firewall-provider-sonicwall-for-its-data-breach/</loc>
		<lastmod>2026-01-29T21:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-addressed-four-critical-web-help-desk-flaws/</loc>
		<lastmod>2026-01-29T21:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-attack-leaves-russian-car-owners-locked-out-of-their-vehicles/</loc>
		<lastmod>2026-01-29T21:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/still-trying-to-reduce-technical-debt-manually/</loc>
		<lastmod>2026-01-29T22:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-staggering-cybersecurity-weakness-that-isnt-getting-enough-focus-according-to-a-top-secret-service-official/</loc>
		<lastmod>2026-01-29T22:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-android-rat-hides-behind-hugging-face/</loc>
		<lastmod>2026-01-29T22:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-deepfakes-are-top-risks-for-financial-crime-specialists/</loc>
		<lastmod>2026-01-29T22:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-codes-prying-ais-read-off-limits-secret-files/</loc>
		<lastmod>2026-01-29T23:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outtake-gets-40m-to-grow-automated-threat-response/</loc>
		<lastmod>2026-01-29T23:23:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mongodb-ransomware-is-still-actively-hitting-exposed-databases/</loc>
		<lastmod>2026-01-29T23:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hugging-face-abused-to-spread-thousands-of-android-malware-variants/</loc>
		<lastmod>2026-01-29T23:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks/</loc>
		<lastmod>2026-01-29T23:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-rescinds-biden-era-sbom-guidance/</loc>
		<lastmod>2026-01-29T23:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-critical-flaws-on-n8n-could-compromise-customer-security/</loc>
		<lastmod>2026-01-29T23:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-transparent-vs-opaque-edit-claudes-personalized-memory-or-trust-chatgpts-blindly/</loc>
		<lastmod>2026-01-30T00:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-transparent-vs-opaque-edit-claudes-personalized-memory-or-trust-chatgpts-blindly-2/</loc>
		<lastmod>2026-01-30T00:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-av-users-targeted-with-malicious-updates/</loc>
		<lastmod>2026-01-30T00:23:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-quantum-to-ai-risks-preparing-for-cybersecuritys-future/</loc>
		<lastmod>2026-01-30T00:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/measuring-agentic-ai-posture-a-new-metric-for-cisos/</loc>
		<lastmod>2026-01-30T04:23:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-scalable-ai-security-important-for-growth/</loc>
		<lastmod>2026-01-30T04:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-your-cloud-compliance-to-agentic-ai/</loc>
		<lastmod>2026-01-30T04:25:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-role-does-nhi-play-in-secure-tech-environments/</loc>
		<lastmod>2026-01-30T04:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-foster-innovation-in-tech/</loc>
		<lastmod>2026-01-30T04:27:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-reinforcement-unlearning/</loc>
		<lastmod>2026-01-30T04:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roughly-half-of-employees-are-using-unsanctioned-ai-tools-and-enterprise-leaders-are-major-culprits/</loc>
		<lastmod>2026-01-30T04:29:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-ramp-up-new-vishing-campaign-with-100s-in-crosshairs/</loc>
		<lastmod>2026-01-30T04:31:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-ramp-up-new-vishing-campaign-with-100s-in-crosshairs-2/</loc>
		<lastmod>2026-01-30T04:32:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meike-kamp-am-europaischen-datenschutztag-2026-eu-kommission-ruttelt-an-den-grundpfeilern-des-datenschutzes/</loc>
		<lastmod>2026-01-30T04:33:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/barrierefreie-ki-zehn-praxisnahe-schritte-fur-inklusive-innovation-am-arbeitsplatz/</loc>
		<lastmod>2026-01-30T04:34:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/java-developers-want-container-security-just-not-the-job-that-comes-with-it/</loc>
		<lastmod>2026-01-30T04:35:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seven-habits-that-help-security-teams-reduce-risk-without-slowing-delivery/</loc>
		<lastmod>2026-01-30T04:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-provides-temporary-patches-for-actively-exploited-epmm-zero-day-cve-2026-1281/</loc>
		<lastmod>2026-01-30T04:37:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-links-windows-11-boot-failures-to-failed-december-2025-update/</loc>
		<lastmod>2026-01-30T04:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apts-hacking-asian-orgs-with-high-end-malware/</loc>
		<lastmod>2026-01-30T04:39:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-2025-deutschland-besonders-betroffen-2/</loc>
		<lastmod>2026-01-30T05:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-2025-deutschland-besonders-betroffen/</loc>
		<lastmod>2026-01-30T05:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wearable-tech-adoption-continues-as-privacy-worries-grow/</loc>
		<lastmod>2026-01-30T05:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-month-january-2026/</loc>
		<lastmod>2026-01-30T05:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-ivanti-epmm-zero-day-rce-flaws-actively-exploited-security-updates-released/</loc>
		<lastmod>2026-01-30T05:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-work-keeps-expanding-even-with-ai-in-the-mix/</loc>
		<lastmod>2026-01-30T06:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-teams-are-carrying-more-tools-with-less-confidence/</loc>
		<lastmod>2026-01-30T06:23:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-pci-compliant-hosting-providers/</loc>
		<lastmod>2026-01-30T07:22:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacke-geheime-produktplane-von-apple-gestohlen/</loc>
		<lastmod>2026-01-30T07:23:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-risk-management-cisos-solution-to-the-security-awareness-training-paradox/</loc>
		<lastmod>2026-01-30T08:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-risk-management-cisos-solution-to-the-security-awareness-training-paradox-2/</loc>
		<lastmod>2026-01-30T08:22:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grunes-licht-fur-einfuhr-update-china-erteilt-freigabe-fur-hunderttausende-nvidia-h200/</loc>
		<lastmod>2026-01-30T08:23:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineer-convicted-for-stealing-2000-ai-trade-secrets-for-china-startup/</loc>
		<lastmod>2026-01-30T08:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartermail-fixes-critical-unauthenticated-rce-flaw-with-cvss-9-3-score/</loc>
		<lastmod>2026-01-30T08:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-governance-datensouveranitat-und-dynamic-trust-pragen-2026-vier-trends-machen-cybersicherheit-2026-zum-strategischen-faktor/</loc>
		<lastmod>2026-01-30T08:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/app-moderation-ki-nackt-apps-fluten-die-offiziellen-app-stores/</loc>
		<lastmod>2026-01-30T08:27:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyble-research-discovers-shadowhs-an-in-memory-linux-framework-for-long-term-access/</loc>
		<lastmod>2026-01-30T09:23:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-experts-arrested-during-courthouse-pen-test-reach-600k-settlement/</loc>
		<lastmod>2026-01-30T09:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eff-calls-out-major-tech-companies-on-encryption-promises/</loc>
		<lastmod>2026-01-30T09:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-new-privacy-feature-limits-how-precisely-carriers-track-your-location/</loc>
		<lastmod>2026-01-30T09:25:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-schwachstellen-und-personalmangel-warum-deutsche-kommunen-immer-ofter-hacker-opfer-werden/</loc>
		<lastmod>2026-01-30T09:26:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-verdacht-ransomware-panne-mundet-in-totalem-datenverlust/</loc>
		<lastmod>2026-01-30T09:27:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-for-test-workflows-why-our-qa-team-built-it-and-how-testing-changed-as-a-result/</loc>
		<lastmod>2026-01-30T10:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/helpdesk-impersonation-a-high-risk-social-engineering-attack/</loc>
		<lastmod>2026-01-30T10:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/systemd-daddy-quits-microsoft-to-prove-linux-can-be-trusted/</loc>
		<lastmod>2026-01-30T10:32:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empire-market-co-founder-faces-10-years-to-life-after-guilty-plea/</loc>
		<lastmod>2026-01-30T10:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comcast-to-pay-117m-in-security-breach-settlement/</loc>
		<lastmod>2026-01-30T10:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlag-gegen-globales-proxy-netzwerk-gtig-zerschlagt-zentrale-infrastruktur-von-ipidea/</loc>
		<lastmod>2026-01-30T10:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-grosbackerei-teilen-russlands-geht-das-brot-aus/</loc>
		<lastmod>2026-01-30T10:37:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-b2b-healthcare-saas-sso-solutions-in-2026/</loc>
		<lastmod>2026-01-30T11:23:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-passwordless-authentication-is-critical-for-online-learning-student-services/</loc>
		<lastmod>2026-01-30T11:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-resolve-invalid-security-token-issues/</loc>
		<lastmod>2026-01-30T11:25:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploring-identity-management-and-cardspace-technology/</loc>
		<lastmod>2026-01-30T11:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-passkeys-safely-synced-across-multiple-devices/</loc>
		<lastmod>2026-01-30T11:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wifi-7-als-triebfeder-fur-manufacturing-x-und-die-vernetzte-industrie-der-zukunft/</loc>
		<lastmod>2026-01-30T11:29:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-modernisiert-partnerportal-und-startet-neuen-partner-blog/</loc>
		<lastmod>2026-01-30T11:30:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-feiert-ein-jahrzehnt-ki-innovation-mit-sieben-aktiven-ki-agenten-auf-dem-markt/</loc>
		<lastmod>2026-01-30T11:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/online-hosting-dienst-hugging-face-als-provider-fur-fernzugangstrojaner/</loc>
		<lastmod>2026-01-30T11:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banker-claims-oracle-may-slash-up-to-30000-jobs-sell-health-unit-to-pay-for-ai-build-out/</loc>
		<lastmod>2026-01-30T11:35:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineer-found-guilty-of-stealing-ai-secrets/</loc>
		<lastmod>2026-01-30T11:37:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsarchitekturen-im-wandel-zero-trust-ist-gut-zero-gap-ist-besser/</loc>
		<lastmod>2026-01-30T11:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-109-so-bilden-sich-it-experten-praxisnah-weiter/</loc>
		<lastmod>2026-01-30T11:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-feiert-zehn-jahre-ki-innovation-mit-sieben-ai-defense-agents-im-einsatz/</loc>
		<lastmod>2026-01-30T11:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-can-be-americas-secret-weapon-in-the-ai-race/</loc>
		<lastmod>2026-01-30T12:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-ivanti-epmm-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-01-30T12:25:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sets-new-timeline-for-sentinel-transition-to-defender-portal/</loc>
		<lastmod>2026-01-30T12:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badges-bytes-and-blackmail/</loc>
		<lastmod>2026-01-30T12:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-developed-malware-campaign-targets-iranian-protests/</loc>
		<lastmod>2026-01-30T12:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-crime-agency-and-natwest-issue-joint-warning-over-invoice-fraud-threat/</loc>
		<lastmod>2026-01-30T12:29:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-it-safe-to-open-spam-emails-enterprise-risks/</loc>
		<lastmod>2026-01-30T13:25:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hugging-face-infra-abused-to-spread-android-rat-in-a-large-scale-malware-campaign/</loc>
		<lastmod>2026-01-30T13:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartertools-patches-critical-smartermail-flaw-allowing-code-execution/</loc>
		<lastmod>2026-01-30T13:27:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5074105-update-fixes-boot-sign-in-and-activation-issues/</loc>
		<lastmod>2026-01-30T13:29:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-uat-8099-targets-iis-servers-in-asia-with-badiis-seo-malware/</loc>
		<lastmod>2026-01-30T13:29:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwn2own-automotive-hacker-zocken-doom-auf-geknackter-eladesaule/</loc>
		<lastmod>2026-01-30T13:30:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-api-security-is-no-longer-an-appsec-problem-and-what-security-leaders-must-do-instead/</loc>
		<lastmod>2026-01-30T14:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-b2b-fintech-sso-solutions-in-2026/</loc>
		<lastmod>2026-01-30T14:30:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dating-app-giants-investigate-incidents-after-cybercriminals-claim-to-steal-data/</loc>
		<lastmod>2026-01-30T14:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geforce-582-28-ein-neuer-treiber-fur-geforce-die-eigentlich-leer-ausgehen/</loc>
		<lastmod>2026-01-30T14:32:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-6-data-breaches-of-january-2026/</loc>
		<lastmod>2026-01-30T15:24:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-6-data-breaches-of-january-2026-2/</loc>
		<lastmod>2026-01-30T15:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-security-how-to-prevent-prompt-injection-and-tool-poisoning-attacks/</loc>
		<lastmod>2026-01-30T15:24:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-lieferketten-als-risikofaktor/</loc>
		<lastmod>2026-01-30T15:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-outlook-bug-blocking-access-to-encrypted-emails/</loc>
		<lastmod>2026-01-30T15:26:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tamecat-powershell-backdoor-targets-edge-and-chrome-login-credentials-at-risk/</loc>
		<lastmod>2026-01-30T15:27:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-200-magento-stores-compromised-in-rootkit-rampage-via-zero-day-exploit/</loc>
		<lastmod>2026-01-30T15:28:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hugging-face-repositories-hijacked-for-android-rat-delivery-bypassing-traditional-defenses/</loc>
		<lastmod>2026-01-30T15:29:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostchat-spyware-targets-android-users-through-whatsapp-steals-sensitive-data/</loc>
		<lastmod>2026-01-30T15:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-hide-behind-school-themed-domains-in-newly-uncovered-bulletproof-infrastructure/</loc>
		<lastmod>2026-01-30T15:31:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophisticated-malware-lurks-in-open-vsx-extension-with-5066-downloads/</loc>
		<lastmod>2026-01-30T15:33:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-gpu-driver-vulnerability-opens-door-to-elevated-privileges/</loc>
		<lastmod>2026-01-30T15:33:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wireshark-4-6-3-release-patches-dissector-parser-stability-issues/</loc>
		<lastmod>2026-01-30T15:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-weaponize-microsoft-365-outlook-add-ins-to-quietly-exfiltrate-email-data/</loc>
		<lastmod>2026-01-30T15:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-chrome-extensions-abusing-affiliate-links-and-stealing-chatgpt-access/</loc>
		<lastmod>2026-01-30T15:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-endpoint-manager-vulnerability-allows-remote-code-execution/</loc>
		<lastmod>2026-01-30T15:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-head-start-on-emerging-vulnerabilities-with-the-pentest-tool-you-need/</loc>
		<lastmod>2026-01-30T16:24:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-granite-complied-with-new-federal-cyber-regs-before-a-critical-deadline/</loc>
		<lastmod>2026-01-30T16:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manufacturers-fortify-cyber-defenses-in-response-to-dramatic-surge-in-cyberattacks/</loc>
		<lastmod>2026-01-30T16:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mobile-management-vulnerabilities-seeing-exploitation/</loc>
		<lastmod>2026-01-30T16:27:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-disruption-rips-millions-out-of-devices-out-of-malicious-network/</loc>
		<lastmod>2026-01-30T16:28:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arsink-spyware-posing-as-whatsapp-youtube-instagram-tiktok-hits-143-countries/</loc>
		<lastmod>2026-01-30T16:29:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-exploits-data-breaches-and-ai-threats-define-this-week-in-cybersecurity/</loc>
		<lastmod>2026-01-30T16:30:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-gpu-driver-flaws-enable-privilege-escalation-across-platforms/</loc>
		<lastmod>2026-01-30T16:31:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-office-announces-sweeping-police-technology-plans/</loc>
		<lastmod>2026-01-30T16:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-office-announces-sweeping-police-technology-plans-2/</loc>
		<lastmod>2026-01-30T16:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hitachi-vantara-customers-looking-for-channel-help-with-ai/</loc>
		<lastmod>2026-01-30T16:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-acknowledges-windows-11-backlash-plans-major-improvements-in-2026/</loc>
		<lastmod>2026-01-30T16:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-rescinds-biden-era-software-guidance/</loc>
		<lastmod>2026-01-30T16:35:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/labyrinth-chollima-evolves-into-three-north-korean-hacking-groups/</loc>
		<lastmod>2026-01-30T16:36:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mithilfe-von-infostealern-fail-ermoglicht-riesigen-datendiebstahl-bei-50-unternehmen/</loc>
		<lastmod>2026-01-30T16:37:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russland-leere-brotregale-nach-cyberangriff-auf-grosbackerei/</loc>
		<lastmod>2026-01-30T16:38:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-senior-rpa-developer-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-01-30T16:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aluminium-os-leak-offenbart-ersten-blick-auf-den-windows-konkurrenten-von-google/</loc>
		<lastmod>2026-01-30T16:40:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/echte-microsoft-mailadresse-verschickt-spam-wie-cyberkriminelle-einen-dienst-fur-ihre-zwecke-missbrauchen/</loc>
		<lastmod>2026-01-30T16:41:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-are-getting-better-at-finding-and-exploiting-security-vulnerabilities/</loc>
		<lastmod>2026-01-30T17:23:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-sees-vulnerability-exploitation-top-phishing-in-q4/</loc>
		<lastmod>2026-01-30T17:23:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manufacturers-fortify-cyber-defenses-in-response-to-dramatic-surge-in-attacks/</loc>
		<lastmod>2026-01-30T17:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coupang-ceo-questioned-by-police-investigating-obstruction-of-probe-into-data-breach/</loc>
		<lastmod>2026-01-30T17:25:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-breached-polish-power-grid-thanks-to-bad-security-report-says/</loc>
		<lastmod>2026-01-30T17:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-google-engineer-convicted-in-ai-trade-secret-theft-case/</loc>
		<lastmod>2026-01-30T17:27:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soundcloud-data-breach-exposes-nearly-30m-user-accounts/</loc>
		<lastmod>2026-01-30T17:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-adds-new-iphone-privacy-setting-to-blur-location-data-shared-with-carriers/</loc>
		<lastmod>2026-01-30T17:29:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acumen-cyber-further-strengthens-board-with-appointment-of-derek-whigham/</loc>
		<lastmod>2026-01-30T17:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-switch-off-dismantles-major-pirate-tv-streaming-services/</loc>
		<lastmod>2026-01-30T17:31:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-complete-guide-to-authentication-implementation-for-modern-applications/</loc>
		<lastmod>2026-01-30T18:26:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-portal-leaves-kids-chats-with-ai-toy-open-to-anyone-with-gmail-account/</loc>
		<lastmod>2026-01-30T18:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-google-engineer-convicted-of-stealing-ai-secrets-for-china/</loc>
		<lastmod>2026-01-30T18:28:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/holiday-hits-hackers-love-to-strike-when-defenders-are-away/</loc>
		<lastmod>2026-01-30T18:29:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-fixes-actively-exploited-rce-flaws-in-endpoint-manager-mobile/</loc>
		<lastmod>2026-01-30T18:30:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-disable-ntlm-by-default-in-future-windows-releases/</loc>
		<lastmod>2026-01-30T18:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-round-of-critical-rce-bugs-in-n8n-spikes-corporate-risk/</loc>
		<lastmod>2026-01-30T18:33:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-compliance-tools-what-to-look-for-firetail-blog/</loc>
		<lastmod>2026-01-30T19:44:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-and-nonhuman-identities-demand-a-paradigm-shift-in-security-lessons-from-nhicon-2026/</loc>
		<lastmod>2026-01-30T19:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/department-of-justice-seizes-domains-for-bulgarian-piracy-sites/</loc>
		<lastmod>2026-01-30T19:46:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-seizes-piracy-sites-italian-police-dismantle-illegal-iptv-operation/</loc>
		<lastmod>2026-01-30T19:47:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-more-oregon-residents-learn-their-health-data-was-stolen-in-trizetto-breach/</loc>
		<lastmod>2026-01-30T19:48:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-more-oregon-residents-learn-their-health-data-was-stolen-in-trizetto-breach-2/</loc>
		<lastmod>2026-01-30T19:48:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/</loc>
		<lastmod>2026-01-30T19:49:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-runs-wild-in-business-environments/</loc>
		<lastmod>2026-01-30T19:50:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm-blamed-for-wiper-attack-on-polish-power-grid/</loc>
		<lastmod>2026-01-30T19:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawdbot-moltbot-openclaw-nach-rasanten-namensanderungen-unter-beschuss/</loc>
		<lastmod>2026-01-30T19:52:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-container-security-remains-a-challenge-for-developers-2/</loc>
		<lastmod>2026-01-31T20:52:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeffrey-epstein-had-a-personal-hacker-informant-claims/</loc>
		<lastmod>2026-01-31T20:53:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-film-ice/</loc>
		<lastmod>2026-01-31T20:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/</loc>
		<lastmod>2026-01-31T20:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/</loc>
		<lastmod>2026-01-31T20:56:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-details-how-shinyhunters-abuse-sso-to-steal-cloud-data/</loc>
		<lastmod>2026-01-31T20:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researcher-reveals-evidence-of-private-instagram-profiles-leaking-photos/</loc>
		<lastmod>2026-01-31T20:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scada-flaw-enables-dos-condition-impacting-availability-of-affected-systems/</loc>
		<lastmod>2026-01-31T20:59:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metasploit-update-introduces-7-exploit-modules-affecting-popular-enterprise-platforms/</loc>
		<lastmod>2026-01-31T21:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dynowiper-update-technische-analyse-und-neue-erkenntnisse/</loc>
		<lastmod>2026-01-31T21:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/torq-moves-socs-beyond-soar-with-ai-powered-hyper-automation/</loc>
		<lastmod>2026-01-31T21:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-the-year-agentic-ai-becomes-the-attack-surface-poster-child/</loc>
		<lastmod>2026-01-31T21:03:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outthe-box-expectations-for-2026-reveal-a-grab-bag-of-risk/</loc>
		<lastmod>2026-01-31T21:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-tackles-ai-governance-shadow-ai-risks-data-exposure/</loc>
		<lastmod>2026-01-31T21:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-redkitten-cyber-campaign-targets-human-rights-ngos-and-activists/</loc>
		<lastmod>2026-01-31T21:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-finds-shinyhunters-style-vishing-attacks-stealing-mfa-to-breach-saas-platforms/</loc>
		<lastmod>2026-01-31T21:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-polska-details-coordinated-cyber-attacks-on-30-wind-and-solar-farms/</loc>
		<lastmod>2026-01-31T21:08:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineer-convicted-for-stealing-ai-secrets-for-china-startup/</loc>
		<lastmod>2026-01-31T21:09:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-aligned-electrum-tied-to-december-2025-cyber-attack-on-polish-power-grid/</loc>
		<lastmod>2026-01-31T21:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-aligned-electrum-tied-to-december-2025-cyber-attack-on-polish-power-grid/</loc>
		<lastmod>2026-01-31T21:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gericht-tesla-aufnahme-schlagt-datenschutz/</loc>
		<lastmod>2026-01-31T21:11:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-propertygpt/</loc>
		<lastmod>2026-01-31T20:18:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-keep-hearing-the-same-question-morpheus-ai-soc-vs-traditional-soar/</loc>
		<lastmod>2026-01-31T20:19:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cmmc-enclave-strategy-vs-full-environment-compliance/</loc>
		<lastmod>2026-01-31T20:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/friday-squid-blogging-new-squid-species-discovered/</loc>
		<lastmod>2026-01-31T20:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-are-secrets-vaults-in-cloud-environments/</loc>
		<lastmod>2026-01-31T20:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-ensure-full-iam-compliance/</loc>
		<lastmod>2026-01-31T20:23:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-future-trends-will-define-agentic-ai-governance/</loc>
		<lastmod>2026-01-31T20:24:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-agentic-ai-changing-healthcare-security/</loc>
		<lastmod>2026-01-31T20:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-silence-false-alarms/</loc>
		<lastmod>2026-01-31T20:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-great-shift-cybersecurity-predictions-for-2026-and-the-new-era-of-threat-intelligence/</loc>
		<lastmod>2026-01-31T20:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-2026-ai-cisa-manufacturing-sector-all-in-the-hot-seat/</loc>
		<lastmod>2026-01-31T20:28:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionenschaden-durch-trickbetrug/</loc>
		<lastmod>2026-01-31T20:29:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-im-wandel-wie-jsceal-gezielt-krypto-nutzer-angreift/</loc>
		<lastmod>2026-01-31T20:30:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-zwischen-ki-gefahr-lieferketten-risiken-und-passkey-revolution/</loc>
		<lastmod>2026-01-31T20:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-patches-two-actively-exploited-critical-vulnerabilities-in-epmm/</loc>
		<lastmod>2026-01-31T20:32:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-amutable-plotting-linux-security-overhaul-to-counter-hacking-threats/</loc>
		<lastmod>2026-01-31T20:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-takes-notorious-ramp-ransomware-forum-offline/</loc>
		<lastmod>2026-01-31T20:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberversicherungen-compliance-zur-senkung-der-pramien/</loc>
		<lastmod>2026-01-31T20:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-sieht-pseudonymisierung-als-schlussel-um-datenschutz-und-datengetriebene-anwendungen-zusammenzubringen/</loc>
		<lastmod>2026-01-31T20:36:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/informant-told-fbi-that-jeffrey-epstein-had-a-personal-hacker/</loc>
		<lastmod>2026-01-31T20:37:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/january-blues-return-as-ivanti-coughs-up-exploited-epmm-zero-days/</loc>
		<lastmod>2026-01-31T20:38:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-cars-drones-cheerfully-obey-prompt-injection-by-road-sign/</loc>
		<lastmod>2026-01-31T20:39:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsis-it-car-crash-considers-cutting-legacy-links-to-stop-the-bleeding/</loc>
		<lastmod>2026-01-31T20:41:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-gives-chatgpt-models-the-chop-two-weeks-notice-take-it-or-leave-it/</loc>
		<lastmod>2026-01-31T20:41:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-malware-uses-pulsar-rat-for-live-chats-while-stealing-data/</loc>
		<lastmod>2026-01-31T20:42:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-seizes-400-million-linked-to-helix-dark-web-crypto-mixer/</loc>
		<lastmod>2026-01-31T20:43:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein/</loc>
		<lastmod>2026-01-31T20:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-disrupt-communications-at-wind-solar-and-heat-facilities-in-poland/</loc>
		<lastmod>2026-01-31T20:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-cio-group-seeks-federal-support-for-ai-cybersecurity/</loc>
		<lastmod>2026-01-31T20:46:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-real-time-vishing-is-breaking-mfa/</loc>
		<lastmod>2026-01-31T20:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/groups-warn-32b-google-wiz-deal-threatens-cloud-competition/</loc>
		<lastmod>2026-01-31T20:48:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-grid-hack-underlines-european-need-for-active-defense/</loc>
		<lastmod>2026-01-31T20:49:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-use-in-healthcare-requires-continuous-oversight/</loc>
		<lastmod>2026-01-31T20:50:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-case-for-a-ransom-payment-ban-and-when-it-might-happen/</loc>
		<lastmod>2026-01-31T20:51:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-container-security-remains-a-challenge-for-developers/</loc>
		<lastmod>2026-01-31T20:52:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blockchain-penetration-testing-definition-process-and-tools/</loc>
		<lastmod>2026-01-31T23:14:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-penetration-testing-definition-tools-and-process/</loc>
		<lastmod>2026-01-31T23:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-transform-devops-security/</loc>
		<lastmod>2026-02-01T04:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-disaster-recovery-vital-with-nhi/</loc>
		<lastmod>2026-02-01T04:16:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-impenetrable-is-secrets-encryption-in-financial-services/</loc>
		<lastmod>2026-02-01T04:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-least-privilege-essential-in-secure-cloud-operations/</loc>
		<lastmod>2026-02-01T04:18:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/andere-dein-passwort-tag-2026-least-privilege-und-zugangskontrolle-gilt-es-flankierend-zu-beachten/</loc>
		<lastmod>2026-02-01T04:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionagewerkzeug-ghostchat-gefalschte-dating-app-als-koder/</loc>
		<lastmod>2026-02-01T04:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-you-can-trust-chatgpt-answers-as-it-kicks-off-ads-rollout-preparation/</loc>
		<lastmod>2026-02-01T04:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-is-retiring-famous-gpt-4o-model-says-gpt-5-2-is-good-enough/</loc>
		<lastmod>2026-02-01T04:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-dns-filtering-solutions-2026/</loc>
		<lastmod>2026-02-01T04:24:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-e-signature-solutions-for-secure-digital-signing-in-2026/</loc>
		<lastmod>2026-02-01T04:25:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-malware-notig-so-leicht-lasst-sich-googles-gemini-uber-den-kalender-hacken/</loc>
		<lastmod>2026-02-01T06:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-bei-autonomen-autos-forscher-bringen-waymo-robotaxis-mit-simplen-schildern-vom-kurs-ab/</loc>
		<lastmod>2026-02-01T06:16:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diebstahlschutz-fur-android-diese-neuen-features-solltest-du-jetzt-kennen/</loc>
		<lastmod>2026-02-01T06:17:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-millionen-android-gerate-betroffen-google-macht-gigantisches-proxy-netzwerk-dicht/</loc>
		<lastmod>2026-02-01T06:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iot-penetration-testing-definition-process-tools-and-benefits/</loc>
		<lastmod>2026-02-01T07:15:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionagegefahr-verfassungsschutz-warnt-vor-e-autos-aus-china/</loc>
		<lastmod>2026-02-01T07:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stormshield-ist-tempest-klassifiziert-hochste-sicherheitsstufe-fur-verteidigungs-und-behordennetze/</loc>
		<lastmod>2026-02-01T09:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-microsoft-fixes-exploited-office-zero-day-fortinet-patches-forticloud-sso-flaw/</loc>
		<lastmod>2026-02-01T10:15:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-datenschutzmarchen-folge-3-rotkappchen-und-die-barendienste/</loc>
		<lastmod>2026-02-01T12:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-tiktok-navigating-the-complex-web-of-foreign-tech-bans/</loc>
		<lastmod>2026-02-01T14:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-googler-nailed-for-stealing-ai-secrets-for-chinese-startups/</loc>
		<lastmod>2026-02-01T14:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-seeks-to-build-bridges-with-mysql-developers/</loc>
		<lastmod>2026-02-01T14:19:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dezember-2025-191-prozent-mehr-malware-angriffe/</loc>
		<lastmod>2026-02-01T15:16:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-uberwachungsgesetz-e-evidence-neuer-datenzugriff-fur-ermittler-kritik-an-schwachem-rechtsschutz/</loc>
		<lastmod>2026-02-01T15:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-startup-ceo-posts-a-job-deepfake-candidate-applies-inner-turmoil-ensues/</loc>
		<lastmod>2026-02-01T15:18:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apple-privacy-feature-limits-location-tracking-on-iphones-ipads/</loc>
		<lastmod>2026-02-01T16:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-ki-agenten-bevolkern-eigenes-soziales-netzwerk/</loc>
		<lastmod>2026-02-01T16:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-mongodb-instances-still-targeted-in-data-extortion-attacks/</loc>
		<lastmod>2026-02-01T17:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-alba-the-dawn-of-scalable-bridges-for-blockchains/</loc>
		<lastmod>2026-02-01T18:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-new-technologies-are-boosting-agentic-ai-capabilities/</loc>
		<lastmod>2026-02-02T00:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-cloud-secrets-safe-with-automatic-rotation-systems/</loc>
		<lastmod>2026-02-02T00:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-handle-complex-cloud-native-security-tasks/</loc>
		<lastmod>2026-02-02T00:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-powerful-is-ai-in-managing-non-human-identities/</loc>
		<lastmod>2026-02-02T00:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-nachste-grose-security-schlachtfeld/</loc>
		<lastmod>2026-02-02T04:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iis-under-siege-uat-8099-deploys-region-locked-badiis/</loc>
		<lastmod>2026-02-02T04:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zunahme-deepfake-betrug-facebook-bevorzugt-im-visier-cyberkrimineller/</loc>
		<lastmod>2026-02-02T04:17:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-eco-begrust-verabschiedung-bundesweit-einheitlichen-rahmens-fur-den-schutz-kritischer-infrastrukturen/</loc>
		<lastmod>2026-02-02T04:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-user-managed-access-protocol-overview/</loc>
		<lastmod>2026-02-02T05:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-single-sign-on-with-ws-federation/</loc>
		<lastmod>2026-02-02T05:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-gen-z-is-ditching-smartphones-for-dumbphones/</loc>
		<lastmod>2026-02-02T06:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-compliance-fur-cyberversicherungen-erreichen-konnen/</loc>
		<lastmod>2026-02-02T06:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optionales-januar-windows-11-erhalt-kleinere-neuerungen-und-fehlerbehebungen/</loc>
		<lastmod>2026-02-02T06:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-boards-need-to-hear-about-cyber-risk-and-what-they-dont/</loc>
		<lastmod>2026-02-02T06:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-flooding-iam-systems-with-new-identities/</loc>
		<lastmod>2026-02-02T06:19:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-supply-chain-attack-used-compromised-dev-account-to-spread-glassworm/</loc>
		<lastmod>2026-02-02T06:20:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-ai-pentesting-tools-are-getting-uncomfortably-good/</loc>
		<lastmod>2026-02-02T07:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/where-nsa-zero-trust-guidance-aligns-with-enterprise-reality/</loc>
		<lastmod>2026-02-02T07:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pompelmi-open-source-secure-file-upload-scanning-for-node-js/</loc>
		<lastmod>2026-02-02T07:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escan-antivirus-update-servers-compromised-to-deliver-multi-stage-malware/</loc>
		<lastmod>2026-02-02T07:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/im-kev-katalog-der-cisa-17-jahre-alte-powerpoint-sicherheitslucke-taucht-wieder-auf/</loc>
		<lastmod>2026-02-02T07:20:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strongestlayer-top-trusted-platforms-are-key-attack-surfaces/</loc>
		<lastmod>2026-02-02T08:15:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-responsible-disclosure-becomes-unpaid-labor/</loc>
		<lastmod>2026-02-02T08:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crosscurve-bridge-hacked-for-3m-after-smart-contract-validation-vulnerability-exploited/</loc>
		<lastmod>2026-02-02T08:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-trends-2026-wenn-ein-bedrohungsakteur-wie-ein-nationalstaat-agiert/</loc>
		<lastmod>2026-02-02T08:18:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschte-strasenschilder-autos-lassen-sich-per-prompt-injection-fehlleiten/</loc>
		<lastmod>2026-02-02T08:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-und-israel-trainieren-abwehr-von-cyberangriff/</loc>
		<lastmod>2026-02-02T09:14:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-hijacked-state-sponsored-actors-poisoned-updates-for-months/</loc>
		<lastmod>2026-02-02T09:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partnerschaft-mit-nord-security-crowdstrike-erweitert-falcon-fur-kmu-markt/</loc>
		<lastmod>2026-02-02T09:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-panne-bei-microsoft-auch-windows-10-systeme-lassen-sich-nicht-runterfahren/</loc>
		<lastmod>2026-02-02T09:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachforums-breach-exposes-names-of-324k-cybercriminals-upends-the-threat-intel-game/</loc>
		<lastmod>2026-02-02T10:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-broadcom-wi-fi-chipsets-illuminates-importance-of-wireless-dependability-and-business-continuity/</loc>
		<lastmod>2026-02-02T10:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-mongodb-instances-to-delete-databases-and-plant-ransom-notes/</loc>
		<lastmod>2026-02-02T10:18:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peckbirdy-hackers-abuse-lolbins-across-environments-to-deploy-advanced-malware/</loc>
		<lastmod>2026-02-02T10:19:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peckbirdy-hackers-abuse-lolbins-across-environments-to-deploy-advanced-malware-2/</loc>
		<lastmod>2026-02-02T10:19:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-users-targeted-after-state-backed-attackers-hijack-update-servers/</loc>
		<lastmod>2026-02-02T10:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowhs-new-stealthy-fileless-linux-malware-spreads-automatically/</loc>
		<lastmod>2026-02-02T10:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-introduces-new-feature-to-block-unauthorized-access-to-system-files/</loc>
		<lastmod>2026-02-02T10:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arsink-rat-targets-android-devices-to-steal-sensitive-data-and-enable-remote-access/</loc>
		<lastmod>2026-02-02T10:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-click-flaw-in-clawdbot-allows-remote-code-execution/</loc>
		<lastmod>2026-02-02T10:25:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autopentestx-introduced-as-automated-penetration-testing-toolkit-for-linux-systems/</loc>
		<lastmod>2026-02-02T10:25:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-moltbook-ai-flaw-exposing-api-keys-and-login-credentials/</loc>
		<lastmod>2026-02-02T10:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-uncovers-major-expansion-in-shinyhunters-threat-activity-using-new-tactics/</loc>
		<lastmod>2026-02-02T10:27:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-official-update-mechanism-hijacked-to-deliver-malware-to-select-users/</loc>
		<lastmod>2026-02-02T10:28:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-google-engineer-found-guilty-of-stealing-ai-secrets/</loc>
		<lastmod>2026-02-02T10:29:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/andere-dein-passwort-tag-123456-als-passwort-ganz-vorn/</loc>
		<lastmod>2026-02-02T10:30:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/change-your-password-day-2026-schluss-mit-symbolpolitik/</loc>
		<lastmod>2026-02-02T10:31:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texteditor-notepad-server-gehackt-und-update-traffic-manipuliert/</loc>
		<lastmod>2026-02-02T10:32:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texteditor-notepad-server-gehackt-und-update-traffic-manipuliert-2/</loc>
		<lastmod>2026-02-02T10:32:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voice-channels-are-the-next-major-attack-vector-that-security-teams-cant-monitor/</loc>
		<lastmod>2026-02-02T11:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/britain-and-japan-join-forces-on-cybersecurity-and-strategic-minerals/</loc>
		<lastmod>2026-02-02T11:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hohe-nachfrage-nach-online-inhalten-und-wachsende-cyberbedrohungen-pragten-das-jahresende/</loc>
		<lastmod>2026-02-02T11:17:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-561-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-02-02T11:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nationstates-confirms-data-breach-shuts-down-game-site/</loc>
		<lastmod>2026-02-02T11:19:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-rat-uses-hugging-face-to-host-malware/</loc>
		<lastmod>2026-02-02T11:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endpoint-security-und-browser-leitplanken-sichern-autofill-ab-warum-autofill-trotz-clickjacking-sicherer-bleibt-als-copy-and-paste/</loc>
		<lastmod>2026-02-02T11:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muss-motorola-wirklich-keine-updates-fur-funf-jahre-bringen/</loc>
		<lastmod>2026-02-02T11:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-non-human-identities-are-your-biggest-security-blind-spot-in-2026/</loc>
		<lastmod>2026-02-02T12:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-moved-fast-and-broke-things-its-time-for-a-change/</loc>
		<lastmod>2026-02-02T12:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erreichen-durch-die-kombination-von-automatisierung-ki-und-social-engineering-uber-mehrere-kanale-hinweg-eine-hohere-angriffstaktung-denn-je/</loc>
		<lastmod>2026-02-02T12:17:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwerwiegende-schwachstelle-in-idis-videouberwachungssystemen-ermoglicht-spear-phishing-angriffe/</loc>
		<lastmod>2026-02-02T12:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sword-of-damocles-hangs-over-uk-militarys-ajax-as-minister-says-back-it-or-scrap-it/</loc>
		<lastmod>2026-02-02T12:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-taps-claude-to-conjure-mars-rovers-travel-plan/</loc>
		<lastmod>2026-02-02T12:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-82/</loc>
		<lastmod>2026-02-02T12:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hack-exploited-hosting-infrastructure-to-hijack-notepad-updates/</loc>
		<lastmod>2026-02-02T12:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sets-a-path-to-switch-off-ntlm-across-windows/</loc>
		<lastmod>2026-02-02T12:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-and-qatari-security-forces-at-the-winter-olympics-put-italians-on-edge/</loc>
		<lastmod>2026-02-02T12:25:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-bug-causing-password-sign-in-option-to-disappear/</loc>
		<lastmod>2026-02-02T12:27:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-wettbewerbsfahig-bleiben-endpoint-management-im-wandel-firmen-mussen-neue-wege-gehen/</loc>
		<lastmod>2026-02-02T12:28:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionen-nutzer-betroffen-groser-schlag-gegen-illegales-streaming/</loc>
		<lastmod>2026-02-02T12:28:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-stealthy-windows-rat-holds-live-conversations-with-its-operators/</loc>
		<lastmod>2026-02-02T13:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-staatliche-hacker-kapern-update-server-monatelang/</loc>
		<lastmod>2026-02-02T13:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitbucket-alternatives-in-2026/</loc>
		<lastmod>2026-02-02T13:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-cyber-risk-management-and-grc-companies-in-the-uk-and-globally/</loc>
		<lastmod>2026-02-02T13:18:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fancy-bear-exploits-microsoft-office-flaw-in-ukraine-eu-cyber-attacks/</loc>
		<lastmod>2026-02-02T13:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/physischer-schutz-kritischer-anlagen-grunes-licht-fur-kritis-dachgesetz/</loc>
		<lastmod>2026-02-02T13:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-risk-culture-turns-cyber-teams-predictive/</loc>
		<lastmod>2026-02-02T14:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-maker-is-hijacking-diplomatic-efforts-to-limit-commercial-hacking-civil-society-warns/</loc>
		<lastmod>2026-02-02T14:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drone-sightings-have-doubled-near-uk-military-bases-warns-british-government/</loc>
		<lastmod>2026-02-02T14:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-attempt-to-extort-parents-after-school-refuses-to-pay-ransom-fee/</loc>
		<lastmod>2026-02-02T14:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-update-service-hijacked-in-targeted-state-linked-attack/</loc>
		<lastmod>2026-02-02T14:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spotify-and-major-music-labels-sue-annas-archive-for-13-trillion/</loc>
		<lastmod>2026-02-02T14:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iconics-scada-vulnerability-can-render-systems-unbootable/</loc>
		<lastmod>2026-02-02T14:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-ad-blocker-caught-hijacking-amazon-affiliate-links/</loc>
		<lastmod>2026-02-02T14:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-state-sponsored-attackers-hijacked-notepad-updates/</loc>
		<lastmod>2026-02-02T14:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-state-sponsored-attackers-hijacked-notepad-updates-2/</loc>
		<lastmod>2026-02-02T14:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panera-bread-breach-impacts-5-1-million-accounts-not-14-million-customers/</loc>
		<lastmod>2026-02-02T14:24:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-proxy-botnet-office-zero-day-mongodb-ransoms-ai-hijacks-new-threats/</loc>
		<lastmod>2026-02-02T14:25:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-mid-market-across-the-complete-threat-lifecycle/</loc>
		<lastmod>2026-02-02T14:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-december-2025/</loc>
		<lastmod>2026-02-02T15:15:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-risk-management-das-paradoxon-der-sicherheitsschulungen/</loc>
		<lastmod>2026-02-02T15:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-hijacked-by-suspected-state-sponsored-hackers/</loc>
		<lastmod>2026-02-02T15:17:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-patches-one-click-rce-as-security-whac-a-mole-continues/</loc>
		<lastmod>2026-02-02T15:18:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-update-feature-hijacked-by-chinese-state-hackers-for-months/</loc>
		<lastmod>2026-02-02T15:19:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-orchestration-how-it-works-and-why-it-matters/</loc>
		<lastmod>2026-02-02T16:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomalous-prompt-injection-detection-in-quantum-encrypted-mcp-streams/</loc>
		<lastmod>2026-02-02T16:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-issues-urgent-fix-for-critical-zero-day-flaws-under-active-attack/</loc>
		<lastmod>2026-02-02T16:17:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-issues-urgent-fix-for-critical-zero-day-flaws-under-active-attack-2/</loc>
		<lastmod>2026-02-02T16:17:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-unsecured-mongodb-instances-to-wipe-data-and-demand-ransom/</loc>
		<lastmod>2026-02-02T16:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ctm360-report-warns-of-global-surge-in-fake-high-yield-investment-scams/</loc>
		<lastmod>2026-02-02T16:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-update-hijacking-linked-to-hosting-provider-compromise/</loc>
		<lastmod>2026-02-02T16:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-2-0-cyberkriminelle-steigern-ihre-effizienz-mit-agentic-ai/</loc>
		<lastmod>2026-02-02T16:21:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hugging-face-repositories-abused-in-new-android-malware-campaign/</loc>
		<lastmod>2026-02-02T16:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-angriff-eine-einzige-sicherheitslucke-kann-unzahlige-unternehmen-betreffen/</loc>
		<lastmod>2026-02-02T16:23:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erster-echter-ki-assistent-warum-moltbot-beeindruckt-aber-sicherheitsexperten-warnen/</loc>
		<lastmod>2026-02-02T16:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perfider-trick-cyberkriminelle-missbrauchen-echte-microsoft-adresse-fur-phishing-angriff/</loc>
		<lastmod>2026-02-02T16:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leads-surge-in-vishing-attacks-to-steal-saas-data/</loc>
		<lastmod>2026-02-02T17:15:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-urges-telecoms-to-boost-cybersecurity-amid-growing-ransomware-threat/</loc>
		<lastmod>2026-02-02T17:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-update-servers-hijacked-in-targeted-supply-chain-attack/</loc>
		<lastmod>2026-02-02T17:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-expands-scope-of-saas-extortion-attacks/</loc>
		<lastmod>2026-02-02T17:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-flip-the-script-on-mfa-in-new-data-theft-attacks/</loc>
		<lastmod>2026-02-02T17:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-begins-ntlm-phase-out-with-three-stage-plan-to-move-windows-to-kerberos/</loc>
		<lastmod>2026-02-02T17:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-publishes-new-zero-trust-implementation-guidelines/</loc>
		<lastmod>2026-02-02T17:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fosdem-2026-wo-das-herz-der-freien-welt-schlagt/</loc>
		<lastmod>2026-02-02T17:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-escalates-tactics-in-extortion-campaign-linked-to-okta-environments/</loc>
		<lastmod>2026-02-02T18:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-escalates-tactics-in-extortion-campaign-linked-to-okta-environments-2/</loc>
		<lastmod>2026-02-02T18:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-escalates-tactics-in-extortion-campaign-linked-to-okta-environments-3/</loc>
		<lastmod>2026-02-02T18:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exabeam-channel-chief-on-driving-highest-level-profitability-for-partners-new-ai-tool/</loc>
		<lastmod>2026-02-02T18:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcdonalds-is-not-lovin-your-bigmac-happymeal-and-mcnuggets-passwords/</loc>
		<lastmod>2026-02-02T18:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-native-cloud-security-falls-short/</loc>
		<lastmod>2026-02-02T18:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-updates-delivered-malware-after-hosting-provider-breach/</loc>
		<lastmod>2026-02-02T18:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-clawdbot-vs-code-extension-deploys-screenconnect-rat/</loc>
		<lastmod>2026-02-02T18:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cultureai-launches-global-partner-program/</loc>
		<lastmod>2026-02-02T18:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/january-update-shutdown-bug-affects-more-windows-pcs/</loc>
		<lastmod>2026-02-02T18:22:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outthe-box-expectations-for-2026-reveal-a-grab-bag-of-risk-2/</loc>
		<lastmod>2026-02-02T18:23:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-bug-enables-one-click-remote-code-execution-via-malicious-link/</loc>
		<lastmod>2026-02-02T18:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hanging-up-on-shinyhunters-experts-detail-vishing-defenses/</loc>
		<lastmod>2026-02-02T18:25:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-new-in-tenable-cloud-security-multi-cloud-risk-analysis-attack-surface-assessments-improved-iam-security-and-more/</loc>
		<lastmod>2026-02-02T19:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shift-left-is-dead-for-cloud-pam/</loc>
		<lastmod>2026-02-02T19:16:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-says-chinese-government-hackers-hijacked-its-software-updates-for-months/</loc>
		<lastmod>2026-02-02T19:17:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt28-attackers-already-abusing-new-microsoft-office-zero-day/</loc>
		<lastmod>2026-02-02T19:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-threats-in-2026-a-secops-playbook/</loc>
		<lastmod>2026-02-02T19:19:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-dating-app-delivers-android-spyware-in-targeted-campaign/</loc>
		<lastmod>2026-02-02T19:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canva-uses-1password-to-secure-id-during-growth-phase/</loc>
		<lastmod>2026-02-02T19:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sluggish-uk-security-growth-offset-elsewhere-in-europe/</loc>
		<lastmod>2026-02-02T19:22:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-why-identity-is-the-nucleus-for-cyber-security/</loc>
		<lastmod>2026-02-02T19:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-announces-switch-to-disable-all-firefox-ai-features/</loc>
		<lastmod>2026-02-02T19:24:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reorient-your-thinking-to-tackle-ai-security-risks/</loc>
		<lastmod>2026-02-02T20:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-datadome-stopped-millions-of-ticket-scalping-bots-targeting-a-global-sports-organization/</loc>
		<lastmod>2026-02-02T20:16:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netherlands-latest-european-country-to-mull-social-media-ban-for-children/</loc>
		<lastmod>2026-02-02T20:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stopice-hacked-to-send-alarming-text-messages-admins-accuse-border-patrol-agent-of-sabotage/</loc>
		<lastmod>2026-02-02T20:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-scam-uses-clean-emails-and-pdfs-to-steal-dropbox-logins/</loc>
		<lastmod>2026-02-02T20:19:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineer-convicted-of-stealing-ai-data-for-china/</loc>
		<lastmod>2026-02-02T20:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-moltbot-skills-used-to-push-password-stealing-malware/</loc>
		<lastmod>2026-02-02T20:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-341-malicious-clawhub-skills-stealing-data-from-openclaw-users/</loc>
		<lastmod>2026-02-02T20:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-341-malicious-clawhub-skills-stealing-data-from-openclaw-users-2/</loc>
		<lastmod>2026-02-02T20:22:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-growing-chinese-crime-networks-launder-20-of-illicit-crypto-chainalysis/</loc>
		<lastmod>2026-02-02T21:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-data-center-colocation-secure-what-cios-and-cisos-need-to-know/</loc>
		<lastmod>2026-02-02T21:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-users-take-note-its-time-to-check-if-youre-hacked/</loc>
		<lastmod>2026-02-02T21:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-based-espionage-group-compromised-notepad-for-six-months/</loc>
		<lastmod>2026-02-02T21:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/capital-health-to-pay-4-5m-in-lockbit-breach-settlement/</loc>
		<lastmod>2026-02-02T21:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaws-rapid-rise-exposes-thousands-of-ai-agents-to-the-public-internet/</loc>
		<lastmod>2026-02-02T21:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-verified-breach-data-changes-about-exposure-monitoring/</loc>
		<lastmod>2026-02-02T22:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panera-bread-breach-affected-5-1-million-accounts-hibp-confirms/</loc>
		<lastmod>2026-02-02T22:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparency-in-decline-as-data-breaches-hit-new-high/</loc>
		<lastmod>2026-02-02T22:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-exploit-recently-patched-microsoft-office-bug-in-attacks/</loc>
		<lastmod>2026-02-02T22:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coordinated-cyberattacks-hit-30-wind-and-solar-farms-across-poland/</loc>
		<lastmod>2026-02-02T22:20:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dynowiper-malware-targets-energy-firms-in-destructive-data-wiping-attacks/</loc>
		<lastmod>2026-02-02T22:20:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-21000-openclaw-ai-instances-leak-personal-configuration-data/</loc>
		<lastmod>2026-02-02T22:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-alliance-launches-large-scale-cyberattack-targeting-denmark/</loc>
		<lastmod>2026-02-02T22:22:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-punishing-owl-hacker-group-targets-networks-linked-to-russian-security-agency/</loc>
		<lastmod>2026-02-02T22:24:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-in-microsoft-office-enables-stealthy-malware-infections/</loc>
		<lastmod>2026-02-02T22:24:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pulsar-rat-targets-windows-systems-via-per-user-run-key-exfiltrates-sensitive-data/</loc>
		<lastmod>2026-02-02T22:25:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-enters-a-new-era-as-autonomous-ai-agents-take-center-stage/</loc>
		<lastmod>2026-02-02T22:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-hijack-notepad-updates-for-6-months/</loc>
		<lastmod>2026-02-02T22:27:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-veribin-adaptive-verification-of-patches-at-the-binary-level/</loc>
		<lastmod>2026-02-02T23:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-tensegrity/</loc>
		<lastmod>2026-02-02T23:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nitrogen-ransomware-esxi-malware-has-a-bug/</loc>
		<lastmod>2026-02-02T23:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-preventing-channel-depletion-via-universal-and-enhanced-multi-hop-payments/</loc>
		<lastmod>2026-02-02T23:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-waf-missed-it-the-danger-of-double-encoding-and-evasion-techniques-in-healthcare-security/</loc>
		<lastmod>2026-02-02T23:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbot-skills-exploited-to-distribute-400-malware-packages-in-days/</loc>
		<lastmod>2026-02-02T23:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/</loc>
		<lastmod>2026-02-02T23:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-harvest-dropbox-logins-via-fake-pdf-lures/</loc>
		<lastmod>2026-02-02T23:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/county-pays-600k-to-wrongfully-jailed-pen-testers/</loc>
		<lastmod>2026-02-02T23:24:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-feds-pull-back-states-look-inward-for-election-security-support/</loc>
		<lastmod>2026-02-03T00:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-hijacking-blamed-on-chinese-lotus-blossom-crew-behind-chrysalis-backdoor/</loc>
		<lastmod>2026-02-03T00:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-tells-feds-zero-trust-must-go-beyond-login/</loc>
		<lastmod>2026-02-03T00:17:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-the-online-account-service-still-available/</loc>
		<lastmod>2026-02-03T04:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/configuring-ws-federation-single-sign-on-for-resources/</loc>
		<lastmod>2026-02-03T04:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-policy-enforcement-via-kyber-encapsulated-context-windows/</loc>
		<lastmod>2026-02-03T04:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/njrat-runs-masslogger/</loc>
		<lastmod>2026-02-03T04:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security/</loc>
		<lastmod>2026-02-03T04:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-threat-intelligence/</loc>
		<lastmod>2026-02-03T04:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-attack-leverages-pdfs-and-dropbox/</loc>
		<lastmod>2026-02-03T04:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grid-sabotage-static-tundra/</loc>
		<lastmod>2026-02-03T04:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hydra-tactics-north-koreas-labyrinth-chollima-splits-to-hunt-crypto-secrets/</loc>
		<lastmod>2026-02-03T04:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fancy-bear-returns-apt28-exploits-office-flaw-in-operation-neusploit/</loc>
		<lastmod>2026-02-03T04:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-coded-oppression-redkitten/</loc>
		<lastmod>2026-02-03T04:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta584-cyberkriminelle-gruppe-nimmt-jetzt-deutsche-unternehmen-verstarkt-aufs-korn/</loc>
		<lastmod>2026-02-03T04:26:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bargeld-muss-bleiben-gemeinsamer-appell-von-14-verbraucherschutz-sozial-wohlfahrts-und-wirtschaftsverbanden-an-die-bundesregierung/</loc>
		<lastmod>2026-02-03T04:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberfox-lands-9-figure-backing-to-grow-smb-cybersecurity/</loc>
		<lastmod>2026-02-03T04:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-halfte-der-deutschen-dater-wurde-mit-einer-ki-ausgehen/</loc>
		<lastmod>2026-02-03T06:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-2fas-auth-free-open-source-2fa-for-ios/</loc>
		<lastmod>2026-02-03T06:17:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-hosting-breach-attributed-to-china-linked-lotus-blossom-hacking-group/</loc>
		<lastmod>2026-02-03T06:18:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-spreading-and-more-ai-companions-seven-takeaways-from-the-latest-artificial-intelligence-safety-report/</loc>
		<lastmod>2026-02-03T06:18:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-leverages-cve-2026-21509-in-operation-neusploit/</loc>
		<lastmod>2026-02-03T07:15:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-tun-wenn-die-erpresser-kommen/</loc>
		<lastmod>2026-02-03T07:16:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-boards-must-prioritize-non-human-identity-governance/</loc>
		<lastmod>2026-02-03T07:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-attacks-move-through-normal-development-workflows/</loc>
		<lastmod>2026-02-03T07:18:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-adds-one-click-option-to-disable-generative-ai-features-in-firefox/</loc>
		<lastmod>2026-02-03T07:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-kritische-schwachstelle-in-zwei-monaten-neue-sso-schwachstelle-in-forticloud-wird-aktiv-ausgenutzt/</loc>
		<lastmod>2026-02-03T07:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/organisatorische-defizite-gefahrden-compliance-mehr-als-technik-wie-vorlagen-compliance-hurden-meistern-und-audits-beschleunigen/</loc>
		<lastmod>2026-02-03T08:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-kaspersky-droht-bsi-mit-klage-in-millionenhohe/</loc>
		<lastmod>2026-02-03T08:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/think-agentic-ai-is-hard-to-secure-today-just-wait-a-few-months/</loc>
		<lastmod>2026-02-03T08:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-co-the-software-supply-chain-as-achilles-heel/</loc>
		<lastmod>2026-02-03T08:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ipidea-proxy-network-dismantled-global-cybercrime-and-botnet-risks-exposed/</loc>
		<lastmod>2026-02-03T08:17:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jan-recap-new-aws-privileged-permissions-and-services/</loc>
		<lastmod>2026-02-03T09:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-healing-ai-for-security-as-code-a-deep-dive-into-autonomy-and-reliability/</loc>
		<lastmod>2026-02-03T09:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ultimate-guide-to-single-sign-on-in-2025/</loc>
		<lastmod>2026-02-03T09:17:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-sign-on-with-external-security-token-services/</loc>
		<lastmod>2026-02-03T09:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-single-sign-on-insights-for-2025/</loc>
		<lastmod>2026-02-03T09:19:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/user-managed-access-overview/</loc>
		<lastmod>2026-02-03T09:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-identity-threat-detection-response-matters-in-2026/</loc>
		<lastmod>2026-02-03T09:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vllm-flaw-exposes-millions-of-ai-servers-to-remote-code-execution/</loc>
		<lastmod>2026-02-03T09:23:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starke-abhangigkeit-von-us-technologie-europa-ist-und-bleibt-erst-einmal-digital-erpressbar/</loc>
		<lastmod>2026-02-03T09:24:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-studie-warnt-vor-wachsendem-sicherheitsrisiko-durch-ki-agenten/</loc>
		<lastmod>2026-02-03T09:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iphone-air-und-16e-apple-modem-versteckt-genauen-standort-vor-netzbetreibern/</loc>
		<lastmod>2026-02-03T09:25:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-monaten-gefixt-verschwundener-passwortin-unter-windows-11/</loc>
		<lastmod>2026-02-03T09:27:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-military-to-get-legal-ok-to-swat-drones-near-bases/</loc>
		<lastmod>2026-02-03T10:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chollima-apt-hackers-weaponize-lnk-files-to-deploy-sophisticated-malware/</loc>
		<lastmod>2026-02-03T10:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-introduces-global-kill-switch-for-firefox-ai-capabilities/</loc>
		<lastmod>2026-02-03T10:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostchat-malware-locks-victims-devices-demands-passcodes-for-restoration/</loc>
		<lastmod>2026-02-03T10:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abuse-of-openclaw-ai-capabilities-enables-stealthy-malware-campaigns/</loc>
		<lastmod>2026-02-03T10:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-google-play-app-with-50k-downloads-spreads-anatsa-banking-trojan/</loc>
		<lastmod>2026-02-03T10:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hikvision-wireless-ap-flaw-could-let-attackers-run-arbitrary-commands/</loc>
		<lastmod>2026-02-03T10:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-exploits-active-microsoft-office-zero-day-to-deliver-malware/</loc>
		<lastmod>2026-02-03T10:22:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-in-kiloview-devices-enable-complete-admin-takeover/</loc>
		<lastmod>2026-02-03T10:23:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-vulnerability-allows-attackers-to-hijack-active-user-sessions/</loc>
		<lastmod>2026-02-03T10:25:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-attack-breakdown-reveals-sophisticated-malware-and-actionable-iocs/</loc>
		<lastmod>2026-02-03T10:26:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-uses-microsoft-office-cve-2026-21509-in-espionage-focused-malware-attacks/</loc>
		<lastmod>2026-02-03T10:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-kaspersky-droht-bsi-mit-rechtlichen-schritten/</loc>
		<lastmod>2026-02-03T10:28:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outages-happen-to-everyone-building-a-resilient-architecture-doesnt-have-to-be-hard/</loc>
		<lastmod>2026-02-03T11:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diy-ai-bot-farm-openclaw-is-a-security-dumpster-fire/</loc>
		<lastmod>2026-02-03T11:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-infrastructure-hack-likely-tied-to-china-nexus-apt-lotus-blossom/</loc>
		<lastmod>2026-02-03T11:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coded-moltbook-exposes-user-data-api-keys-and-more/</loc>
		<lastmod>2026-02-03T11:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-alternative-zu-wsus-fur-windows-linux-und-macos-nach-dem-wsus-ende-wird-opsi-zur-kostenlosen-alternative/</loc>
		<lastmod>2026-02-03T11:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcdonalds-warnt-bigmac-ist-kein-sicheres-passwort/</loc>
		<lastmod>2026-02-03T11:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/95-of-ai-projects-are-unproductive-and-not-breach-ready/</loc>
		<lastmod>2026-02-03T12:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-of-the-attack-surface-in-the-agent-skill-architecture-case-studies-and-ecosystem-research/</loc>
		<lastmod>2026-02-03T12:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-infrastructure-hijacked-by-chinese-apt-in-sophisticated-supply-chain-attack/</loc>
		<lastmod>2026-02-03T12:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lancom-zum-10-mal-vpn-champion/</loc>
		<lastmod>2026-02-03T12:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenfreier-microsoft-365-security-scanner/</loc>
		<lastmod>2026-02-03T12:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sichere-entwicklung-bereitstellung-und-nutzung-von-anwendungen-der-kunstlichen-intelligenz/</loc>
		<lastmod>2026-02-03T12:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-to-let-users-manage-and-block-ai-features/</loc>
		<lastmod>2026-02-03T12:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-releases-codex-macos-app-for-agent-based-software-development/</loc>
		<lastmod>2026-02-03T12:23:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-data-brokers-can-fuel-violence-against-public-servants/</loc>
		<lastmod>2026-02-03T12:24:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-password-stealing-phishing-campaign-targets-corporate-dropbox-credentials/</loc>
		<lastmod>2026-02-03T12:25:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-alexander-waldmann-applause-ki-agenten-und-it-sicherheit-neue-herausforderungen-fur-unternehmen/</loc>
		<lastmod>2026-02-03T12:25:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enabling-and-securing-basic-authentication-a-comprehensive-guide/</loc>
		<lastmod>2026-02-03T13:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-a-security-token-service/</loc>
		<lastmod>2026-02-03T13:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-moltbook-suggests-viral-ai-prompts-may-be-the-next-big-security-threat/</loc>
		<lastmod>2026-02-03T13:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-cops-bail-20-year-old-bedroom-botnet-operator/</loc>
		<lastmod>2026-02-03T13:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-claims-90gb-data-theft-involving-legacy-polycom-systems/</loc>
		<lastmod>2026-02-03T13:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-exploits-microsoft-office-flaw-in-operation-neusploit/</loc>
		<lastmod>2026-02-03T13:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandisk-brings-sprandom-to-open-source-for-large-ssd-testing/</loc>
		<lastmod>2026-02-03T13:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-prosecutors-raid-x-offices-summon-musk-over-grok-deepfakes/</loc>
		<lastmod>2026-02-03T13:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-cloud-outages-ripple-across-the-internet/</loc>
		<lastmod>2026-02-03T13:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-unit-of-paris-prosecutors-raid-elon-musks-x-offices-in-france/</loc>
		<lastmod>2026-02-03T13:24:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verteidigung-gegen-hybride-angriffe-dobrindt-zu-cyberangriffen-wir-werden-zuruckschlagen/</loc>
		<lastmod>2026-02-03T13:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-security-warum-kritische-infrastruktur-2026-unter-druck-steht/</loc>
		<lastmod>2026-02-03T13:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wrench-attacks-kryptodiebe-wenden-zunehmend-korperliche-gewalt-an/</loc>
		<lastmod>2026-02-03T13:27:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-raid-x-offices-in-paris-and-summon-musk-for-interview-over-child-abuse-material/</loc>
		<lastmod>2026-02-03T14:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-als-standortvorteil-wie-europa-den-spagat-zwischen-werten-und-innovation-meistert/</loc>
		<lastmod>2026-02-03T14:16:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offentliche-container-register-unterschatztes-risiko-in-der-software-supply-chain/</loc>
		<lastmod>2026-02-03T14:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-marks-the-raid-french-cops-swoop-on-musks-paris-ops/</loc>
		<lastmod>2026-02-03T14:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-finally-sends-tls-1-0-and-1-1-to-the-cloud-retirement-home/</loc>
		<lastmod>2026-02-03T14:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-supply-chain-attack-researchers-reveal-details-iocs-targets/</loc>
		<lastmod>2026-02-03T14:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-researchers-surface-vulnerabilities-in-ai-automation-platform-from-n8n/</loc>
		<lastmod>2026-02-03T15:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-hat-die-welt-verandert-openclaw-krempelt-sie-um/</loc>
		<lastmod>2026-02-03T15:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-zwillinge-als-wichtige-bausteine-moderner-ot-resilienz/</loc>
		<lastmod>2026-02-03T15:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-moltbook-the-social-platform-where-ai-agents-talk-and-humans-watch/</loc>
		<lastmod>2026-02-03T15:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banks-on-the-hook-for-173m-in-app-fraud-reimbursement/</loc>
		<lastmod>2026-02-03T15:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/download-tines-voice-of-security-2026-report/</loc>
		<lastmod>2026-02-03T15:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-privacy-watchdog-probes-grok-over-ai-generated-sexual-images/</loc>
		<lastmod>2026-02-03T15:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/</loc>
		<lastmod>2026-02-03T15:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-ico-launches-investigation-into-x-over-ai-generated-non-consensual-sexual-imagery/</loc>
		<lastmod>2026-02-03T15:23:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-of-new-vect-raas-variant/</loc>
		<lastmod>2026-02-03T15:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cybersecurity-strategies-depend-on-public-private-trust-report-warns/</loc>
		<lastmod>2026-02-03T16:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberrisiko-ruhestand/</loc>
		<lastmod>2026-02-03T16:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-credentials-to-cloud-admin-in-8-minutes-ai-supercharges-aws-attack-chain/</loc>
		<lastmod>2026-02-03T16:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-malicious-skills-found-in-openclaws-clawhub/</loc>
		<lastmod>2026-02-03T16:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-are-exploiting-recently-patched-microsoft-office-vulnerability-cve-2026-21509/</loc>
		<lastmod>2026-02-03T16:19:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-identity-management-a-new-security-control-plane-for-cisos/</loc>
		<lastmod>2026-02-03T16:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-the-smarter-soc-blueprint-learn-what-to-build-buy-and-automate/</loc>
		<lastmod>2026-02-03T16:21:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-metro4shell-rce-flaw-in-react-native-cli-npm-package/</loc>
		<lastmod>2026-02-03T16:23:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dockerdash-exposes-ai-supply-chain-weakness-in-dockers-ask-gordon/</loc>
		<lastmod>2026-02-03T16:24:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/initial-access-brokering-grose-angriffskampagne-auf-coldfusion-server/</loc>
		<lastmod>2026-02-03T16:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-raid-x-paris-office-summons-musk-over-grok-deepfakes/</loc>
		<lastmod>2026-02-03T17:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-agents-to-separate-real-risk-from-vulnerability-noise/</loc>
		<lastmod>2026-02-03T17:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-investigating-first-suspected-breach-of-cyber-sanctions/</loc>
		<lastmod>2026-02-03T17:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-state-hackers-exploit-new-microsoft-office-flaw-in-attacks-on-ukraine-eu/</loc>
		<lastmod>2026-02-03T17:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-search-x-office-in-paris-summons-elon-musk-for-questioning/</loc>
		<lastmod>2026-02-03T17:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abused-react-native-cli-flaw-to-deploy-rust-malware-before-public-disclosure/</loc>
		<lastmod>2026-02-03T17:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-raid-elon-musks-x-paris-office-in-criminal-probe/</loc>
		<lastmod>2026-02-03T17:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iron-mountain-data-breach-mostly-limited-to-marketing-materials/</loc>
		<lastmod>2026-02-03T17:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-malicious-crypto-trading-addons-found-in-moltbot-openclaw/</loc>
		<lastmod>2026-02-03T17:24:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sql-injection-flaw-affects-40000-wordpress-sites/</loc>
		<lastmod>2026-02-03T17:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-microsoft-365-security-2025-microsoft-365-ist-sicher-oder/</loc>
		<lastmod>2026-02-03T17:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offentliche-containerregister-bergen-ein-stilles-risiko-fur-die-lieferkette/</loc>
		<lastmod>2026-02-03T17:26:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-invisible-risk-1-5-million-unmonitored-ai-agents-threaten-corporate-security/</loc>
		<lastmod>2026-02-03T18:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-is-shifting-from-prevention-to-resilience/</loc>
		<lastmod>2026-02-03T18:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-raid-x-paris-office-summon-musk-over-grok-deepfakes/</loc>
		<lastmod>2026-02-03T18:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gaps-that-created-the-new-wave-of-siem-and-ai-soc-vendors/</loc>
		<lastmod>2026-02-03T18:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-in-cybersecurity-building-trust-and-resilience-in-the-age-of-intelligent-security/</loc>
		<lastmod>2026-02-03T18:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-in-ivanti-epmm-lead-to-fast-moving-exploitation-attempts/</loc>
		<lastmod>2026-02-03T18:20:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-cairncross-cybersecurity-agenda-less-regulation-more-cooperation/</loc>
		<lastmod>2026-02-03T18:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-search-x-office-in-paris-summon-elon-musk-for-questioning/</loc>
		<lastmod>2026-02-03T18:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-updated-ransomware-intel-on-59-bugs-last-year-without-telling-defenders/</loc>
		<lastmod>2026-02-03T18:23:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromise-of-notepad-equals-software-supply-chain-fallout/</loc>
		<lastmod>2026-02-03T18:24:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flare-report-infostealers-are-fueling-enterprise-identity-attacks/</loc>
		<lastmod>2026-02-03T18:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-europe-launches-cyber-security-startups-stream/</loc>
		<lastmod>2026-02-03T18:26:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-update-improves-windows-sign-in-experience/</loc>
		<lastmod>2026-02-03T18:27:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-patterns-undermine-security-one-click-at-a-time/</loc>
		<lastmod>2026-02-03T18:28:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-fixes-critical-ask-gordon-ai-flaw-allowing-code-execution-via-image-metadata/</loc>
		<lastmod>2026-02-03T18:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adversarial-exposure-validation-for-modern-environments/</loc>
		<lastmod>2026-02-03T19:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reimagining-security-operations/</loc>
		<lastmod>2026-02-03T19:17:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rising-risk-of-compromised-credentials-in-ad/</loc>
		<lastmod>2026-02-03T19:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frequently-asked-questions-about-notepad-supply-chain-compromise/</loc>
		<lastmod>2026-02-03T19:18:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-detains-defense-ministry-employee-on-suspicion-of-spying-for-russia/</loc>
		<lastmod>2026-02-03T19:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-city-turns-off-flock-cameras-after-company-shared-data-without-authorization/</loc>
		<lastmod>2026-02-03T19:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/homeland-security-is-trying-to-force-tech-companies-to-hand-over-data-about-trump-critics/</loc>
		<lastmod>2026-02-03T19:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/op-neusploit-russian-apt28-uses-microsoft-office-flaw-in-malware-attacks/</loc>
		<lastmod>2026-02-03T19:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medaillen-oder-malware-winter-olympiade-zieht-betruger-an/</loc>
		<lastmod>2026-02-03T19:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-minute-access-ai-accelerates-breach-of-aws-environment/</loc>
		<lastmod>2026-02-03T19:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-patterns-undermine-security-one-click-at-a-time-2/</loc>
		<lastmod>2026-02-03T19:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-malicious-crypto-trading-add-ons-found-in-moltbot-openclaw/</loc>
		<lastmod>2026-02-03T19:26:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-hacker-ubernehmen-notepad-was-nutzer-jetzt-tun-sollten/</loc>
		<lastmod>2026-02-03T19:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-bei-autonomen-autos-und-drohnen-wie-forscher-sie-durch-simple-schilder-uberlisteten/</loc>
		<lastmod>2026-02-03T19:28:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsexperten-warnen-open-source-ki-konnte-zu-gravierendem-security-problem-werden/</loc>
		<lastmod>2026-02-03T19:29:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-mitigate-the-risk-of-a-data-breach-in-non-production-environments/</loc>
		<lastmod>2026-02-03T20:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-will-ban-social-media-for-kids-under-16/</loc>
		<lastmod>2026-02-03T20:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-react-native-metro-dev-server-bug-under-attack-as-researchers-scream-into-the-void/</loc>
		<lastmod>2026-02-03T20:17:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-critical-solarwinds-rce-flaw-as-exploited-in-attacks/</loc>
		<lastmod>2026-02-03T20:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-deepfake-scams-are-fueling-a-new-wave-of-fraud/</loc>
		<lastmod>2026-02-03T21:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-24-success-rate-for-ai-agents-is-that-acceptable/</loc>
		<lastmod>2026-02-03T21:16:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-paramilitary-ice-and-cbp-units-at-the-center-of-minnesotas-killings/</loc>
		<lastmod>2026-02-03T21:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/</loc>
		<lastmod>2026-02-03T21:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-binenhance/</loc>
		<lastmod>2026-02-03T22:16:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-beyond-classification/</loc>
		<lastmod>2026-02-03T22:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-isac-inches-forward-under-trump-administration/</loc>
		<lastmod>2026-02-03T22:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-official-says-circia-cyber-reporting-update-is-weeks-away/</loc>
		<lastmod>2026-02-03T22:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-federal-agencies-to-patch-exploited-solarwinds-bug-by-friday/</loc>
		<lastmod>2026-02-03T22:21:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-next-for-dhss-forthcoming-replacement-critical-infrastructure-protection-panel-ai-information-sharing/</loc>
		<lastmod>2026-02-03T22:22:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivantis-epmm-is-under-active-attack-thanks-to-two-critical-zero-days/</loc>
		<lastmod>2026-02-03T22:24:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-die-stunde-der-verantwortung/</loc>
		<lastmod>2026-02-03T22:24:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-solarwinds-web-help-desk-sangoma-freepbx-and-gitlab-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-03T22:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-focus-on-winning-hearts-and-minds/</loc>
		<lastmod>2026-02-03T22:26:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/step-finance-says-compromised-execs-devices-led-to-40m-crypto-theft/</loc>
		<lastmod>2026-02-03T22:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-infiltrates-vsx-extensions-with-22000-downloads-to-target-developers/</loc>
		<lastmod>2026-02-03T22:28:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-attacks-hit-macos-abusing-python-and-trusted-platforms/</loc>
		<lastmod>2026-02-03T22:29:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-dropbox-phishing-campaign-targets-users-steals-login-credentials/</loc>
		<lastmod>2026-02-03T22:30:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-compliance-emails-weaponize-word-and-pdf-attachments-to-steal-sensitive-data/</loc>
		<lastmod>2026-02-03T22:31:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pdfly-variant-uses-custom-pyinstaller-tweaks-to-obfuscate-payload-thwarting-analysis/</loc>
		<lastmod>2026-02-03T22:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asus-discontinues-file-shredder-feature-to-patch-critical-vulnerability/</loc>
		<lastmod>2026-02-03T22:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-takes-major-security-step-by-disabling-ntlm-authentication-by-default/</loc>
		<lastmod>2026-02-03T22:34:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-party-invites-lure-victims-into-installing-malicious-remote-access-tools/</loc>
		<lastmod>2026-02-03T22:35:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeymyte-hacker-group-expands-coolclient-malware-with-new-advanced-toolset/</loc>
		<lastmod>2026-02-03T22:36:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-returns-to-shatter-developer-ecosystems/</loc>
		<lastmod>2026-02-03T22:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-breach-moltbook-in-record-time/</loc>
		<lastmod>2026-02-03T23:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-money-laundering-jargon-via-googles-gemini/</loc>
		<lastmod>2026-02-03T23:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-integrates-bot-protection-with-varnish-softwares-new-sovereign-cdn/</loc>
		<lastmod>2026-02-03T23:17:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-architecture-for-distributed-ai-model-contexts/</loc>
		<lastmod>2026-02-03T23:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cyber-director-solicits-industry-help-in-fixing-regulations-threat-information-sharing/</loc>
		<lastmod>2026-02-03T23:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-audit-flags-web-app-security-gaps-at-large-hospital/</loc>
		<lastmod>2026-02-03T23:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-nixes-biden-era-software-security-rules/</loc>
		<lastmod>2026-02-03T23:21:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-weaponize-microsoft-office-bug-in-just-3-days/</loc>
		<lastmod>2026-02-03T23:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-secrets-safe-from-cyber-threats/</loc>
		<lastmod>2026-02-04T00:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-advanced-agentic-ai-helps-you-stay-ahead-in-compliance/</loc>
		<lastmod>2026-02-04T00:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-ensures-nhi-are-protected-in-cloud-platforms/</loc>
		<lastmod>2026-02-04T00:17:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-innovation-in-agentic-ai-impact-financial-security/</loc>
		<lastmod>2026-02-04T00:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/full-spectrum-ai-security-firetails-platform-update-for-the-ai-enabled-workforce-firetail-blog/</loc>
		<lastmod>2026-02-04T00:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cantwell-claims-telecoms-blocked-release-of-salt-typhoon-report/</loc>
		<lastmod>2026-02-04T00:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/benutzerkonten-pauschaler-passwortwechsel-laut-bsi-keine-zeitgemase-schutzmasnahme-mehr/</loc>
		<lastmod>2026-02-04T00:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-verabschiedet-deutschland-muss-dringend-seine-kritischen-infrastrukturen-besser-schutzen/</loc>
		<lastmod>2026-02-04T00:22:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rapidfort-lands-42m-to-scale-software-supply-chain-security/</loc>
		<lastmod>2026-02-04T00:24:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/visa-application-process-costs-and-requirements/</loc>
		<lastmod>2026-02-04T04:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tamecat-exposed-apt42s-fileless-backdoor-targets-defense-chiefs/</loc>
		<lastmod>2026-02-04T04:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-cant-yet-pull-off-fully-autonomous-cyberattacks-but-they-are-already-very-helpful-to-crims/</loc>
		<lastmod>2026-02-04T04:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kinder-und-chatbots-was-eltern-wissen-sollten/</loc>
		<lastmod>2026-02-04T04:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-clawdbot-to-moltbot-to-openclaw-security-experts-detail-critical-vulnerabilities-and-6-immediate-hardening-steps-for-the-viral-ai-agent/</loc>
		<lastmod>2026-02-04T05:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer/</loc>
		<lastmod>2026-02-04T06:15:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clouds-rush-to-deliver-openclaw-as-a-service-offerings/</loc>
		<lastmod>2026-02-04T06:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer-2/</loc>
		<lastmod>2026-02-04T06:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-incident-response-breaks-down-when-it-matters-most/</loc>
		<lastmod>2026-02-04T06:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auto-finance-fraud-is-costing-dealers-up-to-20000-per-incident/</loc>
		<lastmod>2026-02-04T06:19:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-add-on-caught-stealing-amazon-commissions/</loc>
		<lastmod>2026-02-04T06:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploit-react-native-metro-server-to-target-software-developers/</loc>
		<lastmod>2026-02-04T06:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-angriffe-in-der-dach-region-steigen-deutlich/</loc>
		<lastmod>2026-02-04T07:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foxit-releases-security-updates-for-pdf-editor-cloud-xss-vulnerabilities/</loc>
		<lastmod>2026-02-04T07:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-threat-map-open-source-real-time-situational-awareness-platform/</loc>
		<lastmod>2026-02-04T07:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-by-design-helps-developers-build-secure-software/</loc>
		<lastmod>2026-02-04T07:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingress-nginx-flaw-enables-arbitrary-code-execution-attacks/</loc>
		<lastmod>2026-02-04T07:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-dns-operation-abuses-compromised-routers-to-manipulate-internet-traffic/</loc>
		<lastmod>2026-02-04T07:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-django-flaw-allows-dos-and-sql-injection-attacks/</loc>
		<lastmod>2026-02-04T07:21:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitsvorfalle-aktuelle-cyberangriffe-auf-deutsche-unternehmen-2026/</loc>
		<lastmod>2026-02-04T07:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-the-ai-revolution-in-cybersecurity-risks-rewards-and-evolving-roles/</loc>
		<lastmod>2026-02-04T08:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/should-i-stay-or-should-i-go/</loc>
		<lastmod>2026-02-04T08:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-flaws-enable-arbitrary-code-execution-and-system-crashes/</loc>
		<lastmod>2026-02-04T08:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-and-google-platforms-abused-in-new-enterprise-cyberattacks/</loc>
		<lastmod>2026-02-04T08:18:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eclipse-foundation-mandates-pre-publish-security-checks-for-open-vsx-extensions/</loc>
		<lastmod>2026-02-04T08:19:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-solarwinds-web-help-desk-rce-to-kev-catalog/</loc>
		<lastmod>2026-02-04T08:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-report-2026-ki-beschleunigt-angriffe-und-abwehr-warum-resilienz-2026-wichtiger-wird-als-reine-pravention/</loc>
		<lastmod>2026-02-04T08:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alert-fatigue-why-socs-are-fighting-the-wrong-battle/</loc>
		<lastmod>2026-02-04T09:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-zero-trust-framework-for-cloud-banking/</loc>
		<lastmod>2026-02-04T09:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-supercharging-work-and-your-attack-surface/</loc>
		<lastmod>2026-02-04T09:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lakelands-public-health-confirms-cyberattack-says-sensitive-data-unaffected/</loc>
		<lastmod>2026-02-04T09:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaigns-abuse-trusted-cloud-platforms-raising-new-risks-for-enterprises/</loc>
		<lastmod>2026-02-04T09:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-solarwinds-web-help-desk-rce-flaw-to-known-exploited-vulnerabilities-list/</loc>
		<lastmod>2026-02-04T09:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/valleyrat-masquerades-as-line-installer-to-target-users-and-harvest-login-credentials/</loc>
		<lastmod>2026-02-04T09:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-python-infostealers-target-macos-via-fake-ads-and-installers/</loc>
		<lastmod>2026-02-04T09:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-code-execution-routern/</loc>
		<lastmod>2026-02-04T09:24:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-die-finanzbranche-haben-sich-verdoppelt/</loc>
		<lastmod>2026-02-04T09:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verteidigung-neue-wege-in-der-drohnenabwehr/</loc>
		<lastmod>2026-02-04T09:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlussel-kaputt-weitere-ransomware-panne-fuhrt-zu-totalverlust/</loc>
		<lastmod>2026-02-04T09:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-zero-day-downstream-mass-data-extortion-campaigns-are-losing-their-bite/</loc>
		<lastmod>2026-02-04T10:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-beschlossen-was-betreiber-kritischer-infrastrukturen-jetzt-wissen-mussen/</loc>
		<lastmod>2026-02-04T10:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunstliche-intelligenz-in-der-ot-sicherheit-vertrauen-statt-verunsicherung/</loc>
		<lastmod>2026-02-04T10:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-xcode-26-3-adds-coding-agent-support-from-openai-and-anthropic/</loc>
		<lastmod>2026-02-04T10:18:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exfiltrate-ntds-dit-file-gain-full-control-of-active-directory-environments/</loc>
		<lastmod>2026-02-04T10:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-conduct-widespread-scanning-for-exposed-citrix-netscaler-login-pages/</loc>
		<lastmod>2026-02-04T10:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-cloud-attacke-erzielt-admin-zugang-in-nur-8-minuten/</loc>
		<lastmod>2026-02-04T10:21:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-we-are-bullish-on-grassroots-entrepreneurs-in-the-ai-agent-era/</loc>
		<lastmod>2026-02-04T11:15:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerangriff-auf-romina-mineralbrunnen/</loc>
		<lastmod>2026-02-04T11:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-in-practice-a-deep-technical-dive-into-going-fully-passwordless-in-hybrid-enterprise-environments/</loc>
		<lastmod>2026-02-04T11:17:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-cant-yet-pull-off-fully-autonomous-cyberattacks-but-they-are-already-very-helpful-to-crims-2/</loc>
		<lastmod>2026-02-04T11:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-aws-credentials-lead-to-ai-assisted-cloud-breach-in-8-minutes/</loc>
		<lastmod>2026-02-04T11:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-gihan-munasinghe-as-chief-technology-officer-3/</loc>
		<lastmod>2026-02-04T11:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-exploits-notepad-update-mechanism-to-push-targeted-malware/</loc>
		<lastmod>2026-02-04T11:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-exploited-gitlab-community-and-enterprise-ssrf-vulnerability/</loc>
		<lastmod>2026-02-04T11:24:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-web-help-desk-vulnerability-actively-exploited/</loc>
		<lastmod>2026-02-04T11:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-directory-ist-angriffsziel-nummer-eins-bei-ransomware-warum-die-meisten-unternehmen-ihr-active-directory-nicht-retten-konnen/</loc>
		<lastmod>2026-02-04T11:26:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-europa-russische-hacker-attackieren-office-nutzer/</loc>
		<lastmod>2026-02-04T11:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-hospitals-use-of-genai-is-putting-patients-at-risk-without-realizing-it/</loc>
		<lastmod>2026-02-04T12:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-explained-how-to-control-risk-stay-compliant-and-scale-ai-safely-in-2026/</loc>
		<lastmod>2026-02-04T12:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/easydmarc-partners-with-gradient-msp-to-streamline-client-billing-by-saving-time-and-improving-partner-profitability/</loc>
		<lastmod>2026-02-04T12:17:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-security-trends-in-der-finanzbranche/</loc>
		<lastmod>2026-02-04T12:19:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiederherstellbarkeit-von-backups-automatisiert-prufen-und-absichern/</loc>
		<lastmod>2026-02-04T12:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-cloud-attacke-verschafft-admin-zugang-in-rekordzeit/</loc>
		<lastmod>2026-02-04T12:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/universal-7500-payout-offered-to-psni-staff-over-major-data-breach/</loc>
		<lastmod>2026-02-04T12:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-outages-ripple-across-multiple-dependent-microsoft-services/</loc>
		<lastmod>2026-02-04T12:23:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-vulnerabilities-found-in-google-looker-putting-self-hosted-deployments-at-risk/</loc>
		<lastmod>2026-02-04T12:24:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-asustor-nas-security-flaw-enables-complete-device-takeover/</loc>
		<lastmod>2026-02-04T12:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-exploits-zero-day-in-gaming-anti-cheat-driver-to-disable-edr-av/</loc>
		<lastmod>2026-02-04T12:26:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-looker-bugs-allow-cross-tenant-rce-data-exfil/</loc>
		<lastmod>2026-02-04T12:27:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-first-90-seconds-how-early-decisions-shape-incident-response-investigations/</loc>
		<lastmod>2026-02-04T12:27:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grundlegend-die-backup-strategie-mit-verbesserter-resilienz-durch-ein-herausforderndes-jahr-2026/</loc>
		<lastmod>2026-02-04T12:28:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grosbritannien-weitere-ermittlungen-gegen-x-und-xai-wegen-grok-nacktbildern/</loc>
		<lastmod>2026-02-04T12:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owner-of-incognito-dark-web-drugs-market-gets-30-years-in-prison/</loc>
		<lastmod>2026-02-04T13:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-exploited-a-critical-office-bug-within-days-of-disclosure/</loc>
		<lastmod>2026-02-04T13:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coinbase-confirms-insider-breach-linked-to-leaked-support-tool-screenshots/</loc>
		<lastmod>2026-02-04T13:18:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/info-stealing-malware-expands-from-windows-to-macos/</loc>
		<lastmod>2026-02-04T13:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantomvai-custom-loader-abuses-runpe-utility-to-launch-stealthy-attacks-on-users/</loc>
		<lastmod>2026-02-04T13:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-als-standortvorteil-europa-im-spannungsfeld-ethik-vs-innovation/</loc>
		<lastmod>2026-02-04T13:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-introduces-continuous-identity-observability-for-enterprise-applications/</loc>
		<lastmod>2026-02-04T13:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50-euro-je-kind-gefordert-hacker-hacken-schul-it-und-erpressen-dann-die-eltern/</loc>
		<lastmod>2026-02-04T13:24:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/user-managed-access-uma-2-0-grant-for-oauth-protocols/</loc>
		<lastmod>2026-02-04T14:19:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/momentproof-deploys-patented-digital-asset-protection-2/</loc>
		<lastmod>2026-02-04T14:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nitrogen-ransomware-is-so-broken-even-the-crooks-cant-unlock-your-files/</loc>
		<lastmod>2026-02-04T14:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-powered-threat-allows-hackers-to-gain-aws-admin-access-in-minutes/</loc>
		<lastmod>2026-02-04T14:22:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rolls-out-native-sysmon-monitoring-in-windows-11/</loc>
		<lastmod>2026-02-04T14:23:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/extra-extra-announcing-dr-global-latin-america/</loc>
		<lastmod>2026-02-04T14:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-breach-or-nada-de-nada-mexican-govt-faces-leak-allegations/</loc>
		<lastmod>2026-02-04T14:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-critical-flaws-in-n8n-ai-workflow-automation-platform-allow-complete-takeover/</loc>
		<lastmod>2026-02-04T14:26:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eic-2026-digitale-identitaten-im-spannungsfeld-zwischen-governance-und-ki/</loc>
		<lastmod>2026-02-04T14:27:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eine-der-grosten-ki-fabriken-europas-geht-in-munchen-an-den-start/</loc>
		<lastmod>2026-02-04T14:28:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-may-supplant-pen-testers-but-oversight-trust-are-not-there-yet/</loc>
		<lastmod>2026-02-04T14:29:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/momentproof-deploys-patented-digital-asset-protection/</loc>
		<lastmod>2026-02-04T14:15:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/user-managed-access-uma-2-0-comprehensive-guide/</loc>
		<lastmod>2026-02-04T14:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saml-development-guide/</loc>
		<lastmod>2026-02-04T14:17:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-user-management-in-single-sign-on/</loc>
		<lastmod>2026-02-04T14:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/research-predator-spyware-can-turn-off-apple-indicators-showing-when-microphone-camera-are-in-use/</loc>
		<lastmod>2026-02-04T15:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-attacks-surge-as-threat-actors-embrace-cloud-and-ai-warns-forescout/</loc>
		<lastmod>2026-02-04T15:16:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edr-killer-tool-uses-signed-kernel-driver-from-forensic-software/</loc>
		<lastmod>2026-02-04T15:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-chatbot-why-nist-is-rewriting-the-rules-for-autonomous-ai/</loc>
		<lastmod>2026-02-04T15:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/extra-extra-announcing-dr-global-latin-america-2/</loc>
		<lastmod>2026-02-04T15:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/</loc>
		<lastmod>2026-02-04T15:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-vulnerabilities-let-hackers-take-full-control-of-devices/</loc>
		<lastmod>2026-02-04T15:21:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-breach-or-smooth-sailing-mexican-govt-faces-leak-allegations/</loc>
		<lastmod>2026-02-04T15:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-drives-doubling-of-phishing-attacks-in-a-year/</loc>
		<lastmod>2026-02-04T15:24:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-moltbook-changes-the-enterprise-security-conversation/</loc>
		<lastmod>2026-02-04T16:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disclosure-supportcandy-ticket-attachment-idor-cve-2026-1251/</loc>
		<lastmod>2026-02-04T16:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dmarc-alerts-in-slack/</loc>
		<lastmod>2026-02-04T16:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-mustang-panda-used-fake-diplomatic-briefings-to-spy-on-officials/</loc>
		<lastmod>2026-02-04T16:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greynoise-tracks-massive-citrix-gateway-recon-using-63k-residential-proxies-and-aws/</loc>
		<lastmod>2026-02-04T16:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-shutdown-bug-spreads-to-windows-10-microsoft-confirms/</loc>
		<lastmod>2026-02-04T16:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/</loc>
		<lastmod>2026-02-04T16:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-double-edged-sword-of-non-human-identities/</loc>
		<lastmod>2026-02-04T16:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/momentproof-deploys-patented-digital-asset-protection-3/</loc>
		<lastmod>2026-02-04T16:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-amaranth-dragon-exploits-winrar-flaw-in-espionage-campaigns/</loc>
		<lastmod>2026-02-04T16:24:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-technical-markers-reveal-expanding-shadowsyndicate-cybercriminal-infrastructure/</loc>
		<lastmod>2026-02-04T16:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missbrauch-von-group-policies-und-vielfaltige-tools-longnosedgoblin-spioniert-regierungen-in-asien-aus/</loc>
		<lastmod>2026-02-04T16:26:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marktwachstum-bei-boomi-durch-gesteigerte-nachfrage-bei-ki-gesteuerter-automatisierung/</loc>
		<lastmod>2026-02-04T16:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lookout-discovering-rce-and-internal-access-on-looker-google-cloud-on-prem/</loc>
		<lastmod>2026-02-04T17:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exclusive-us-used-cyber-weapons-to-disrupt-iranian-air-defenses-during-2025-strikes/</loc>
		<lastmod>2026-02-04T17:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-tightens-controls-on-starlink-terminals-to-counter-russian-drones/</loc>
		<lastmod>2026-02-04T17:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-get-your-first-job-in-cybersecurity/</loc>
		<lastmod>2026-02-04T17:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paris-raid-on-x-focuses-on-child-abuse-material-allegations/</loc>
		<lastmod>2026-02-04T17:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incognito-dark-web-drug-market-operator-gets-30-years-in-prison/</loc>
		<lastmod>2026-02-04T17:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-systembc-botnet-found-active-across-10000-infected-systems/</loc>
		<lastmod>2026-02-04T17:21:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-attacks-ushered-cybercrime-into-ai-era-in-2025/</loc>
		<lastmod>2026-02-04T18:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-exploitation-undergoes-significant-change-in-threat-activity/</loc>
		<lastmod>2026-02-04T18:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-attack-gains-aws-admin-privileges-in-under-10-minutes/</loc>
		<lastmod>2026-02-04T18:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-esxi-flaw-now-exploited-in-ransomware-attacks/</loc>
		<lastmod>2026-02-04T18:18:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managed-saas-threat-detection-appomni-scout/</loc>
		<lastmod>2026-02-04T19:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-publish-personal-information-stolen-during-harvard-upenn-data-breaches/</loc>
		<lastmod>2026-02-04T19:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-solarwinds-web-help-desk-bug-under-attack/</loc>
		<lastmod>2026-02-04T19:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-vulnerabilities-allow-code-execution-and-browser-crashes/</loc>
		<lastmod>2026-02-04T19:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-develops-scanner-to-detect-backdoors-in-open-weight-large-language-models/</loc>
		<lastmod>2026-02-04T19:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deadvax-malware-campaign-deploys-asyncrat-via-ipfs-hosted-vhd-phishing-files/</loc>
		<lastmod>2026-02-04T19:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-would-want-to-lead-the-british-fbi-letter/</loc>
		<lastmod>2026-02-04T19:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-absolute-nightmare-in-your-dms-openclaw-marries-extreme-utility-with-unacceptable-risk/</loc>
		<lastmod>2026-02-04T20:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acfw-firewall-test-prologue-still-failing-at-the-basics/</loc>
		<lastmod>2026-02-04T20:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-hires-ex-google-cloud-president-hayete-gallot-as-new-security-chief/</loc>
		<lastmod>2026-02-04T20:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/victims-are-rebuffing-ransomware-mass-data-theft-campaigns/</loc>
		<lastmod>2026-02-04T20:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/significant-ransomware-firewall-misconfiguration-breach/</loc>
		<lastmod>2026-02-04T21:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-documents-become-the-attack-vector-inside-apt28s-latest-microsoft-office-exploit/</loc>
		<lastmod>2026-02-04T21:16:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-bsimm16-report-what-todays-software-security-programs-are-really-doing-and-why-it-matters/</loc>
		<lastmod>2026-02-04T21:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwanese-national-sentenced-to-30-years-for-running-darknet-incognito-market/</loc>
		<lastmod>2026-02-04T21:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwanese-operator-of-incognito-market-sentenced-to-30-years-over-105m-darknet-drug-ring/</loc>
		<lastmod>2026-02-04T21:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvard-upenn-data-leaked-in-shinyhunters-shakedown/</loc>
		<lastmod>2026-02-04T21:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-cto-breaks-down-its-secure-ai-agent-design/</loc>
		<lastmod>2026-02-04T21:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingress-nginx-vulnerability-enables-code-execution-in-kubernetes/</loc>
		<lastmod>2026-02-04T21:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-users-you-may-have-been-hacked-by-china/</loc>
		<lastmod>2026-02-04T21:23:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-gives-security-takes-away-and-configuration-drift-is-the-hidden-cost/</loc>
		<lastmod>2026-02-04T22:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-intruder-achieved-admin-access-in-under-10-minutes-thanks-to-ai-assist-researchers-say/</loc>
		<lastmod>2026-02-04T22:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/semperis-buys-mightyid-to-expand-identity-security/</loc>
		<lastmod>2026-02-04T22:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/questions-loom-ahead-of-substance-abuse-privacy-rules-shift/</loc>
		<lastmod>2026-02-04T22:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-or-open-door-prompt-injection-creates-ai-backdoors/</loc>
		<lastmod>2026-02-04T22:19:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaws-disclosed-along-with-public-exploits/</loc>
		<lastmod>2026-02-04T22:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-windows-screensavers-to-drop-malware-rmm-tools/</loc>
		<lastmod>2026-02-04T22:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-22225-in-vmware-esxi-now-used-in-active-ransomware-attacks/</loc>
		<lastmod>2026-02-04T23:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trm-labs-raises-70m-series-c-for-ai-crime-fighting-push/</loc>
		<lastmod>2026-02-04T23:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-scsu-is-rebuilding-campus-technology-for-the-ai-era/</loc>
		<lastmod>2026-02-04T23:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-rce-bug-makes-cisa-list-as-exploitation-spreads/</loc>
		<lastmod>2026-02-04T23:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-must-get-its-hands-dirty-on-security-report-says/</loc>
		<lastmod>2026-02-04T23:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-goes-full-godfather-with-cartel/</loc>
		<lastmod>2026-02-04T23:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-makes-unpublicized-ransomware-updates-to-kev-catalog/</loc>
		<lastmod>2026-02-04T23:22:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-urgent-office-patch-russian-state-hackers-pounce/</loc>
		<lastmod>2026-02-05T00:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-defense-ausgebuchte-20-auflage-in-wurzburg-gestartet/</loc>
		<lastmod>2026-02-05T00:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-compromise-nginx-servers-to-redirect-user-traffic/</loc>
		<lastmod>2026-02-05T00:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-5-million-ai-agents-are-at-risk-of-going-rogue/</loc>
		<lastmod>2026-02-05T04:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-days-to-exploit-amaranth-dragon-weaponizes-winrar-flaw-to-spy-on-se-asia/</loc>
		<lastmod>2026-02-05T04:20:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-poison-lotus-blossom-hits-notepad-to-deploy-chrysalis-2/</loc>
		<lastmod>2026-02-05T04:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-poison-lotus-blossom-hits-notepad-to-deploy-chrysalis/</loc>
		<lastmod>2026-02-05T04:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-poison-lotus-blossom-hits-notepad-to-deploy-chrysalis-3/</loc>
		<lastmod>2026-02-05T04:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-poison-lotus-blossom-hits-notepad-to-deploy-chrysalis-4/</loc>
		<lastmod>2026-02-05T04:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-you-hear-me/</loc>
		<lastmod>2026-02-05T04:24:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-453-the-epstein-files-didnt-hide-this-hacker-very-well/</loc>
		<lastmod>2026-02-05T04:25:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moderner-ot-resilienz-digitale-zwillinge-als-wichtige-bausteine-2/</loc>
		<lastmod>2026-02-05T04:26:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moderner-ot-resilienz-digitale-zwillinge-als-wichtige-bausteine/</loc>
		<lastmod>2026-02-05T04:26:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-mittels-pravention-zuruckdrangen-ausfuhrungen-zur-zusammenarbeit-von-ermittlern-und-staatsanwaltschaft-auf-der-it-defense-2026/</loc>
		<lastmod>2026-02-05T04:27:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ai-tools-for-red-teaming-in-2026/</loc>
		<lastmod>2026-02-05T04:28:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/admin-zugriff-in-nur-8-minuten-ki-gestutzte-cyberangriffe-auf-aws/</loc>
		<lastmod>2026-02-05T05:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-meeting-management-flaw-enabling-arbitrary-file-upload-by-remote-attackers/</loc>
		<lastmod>2026-02-05T05:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-integrate-sysmon-threat-detection-natively-into-windows-11/</loc>
		<lastmod>2026-02-05T05:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-confirms-vmware-esxi-0-day-vulnerability-exploited-in-ransomware-operations/</loc>
		<lastmod>2026-02-05T05:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/satya-nadella-decides-microsoft-needs-an-engineering-quality-czar/</loc>
		<lastmod>2026-02-05T06:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-planning-keeps-moving-toward-wholesociety-models/</loc>
		<lastmod>2026-02-05T06:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-planning-keeps-moving-toward-wholesociety-models-2/</loc>
		<lastmod>2026-02-05T06:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-planning-keeps-moving-toward-wholesociety-models/</loc>
		<lastmod>2026-02-05T06:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/measuring-ai-use-becomes-a-business-requirement/</loc>
		<lastmod>2026-02-05T06:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-3-step-malvertising-chain-exploits-facebook-ads-to-promote-tech-support-scam-kit/</loc>
		<lastmod>2026-02-05T06:19:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-vpn-client-flaw-on-windows-enables-systemlevel-command-execution/</loc>
		<lastmod>2026-02-05T06:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattackers-exploit-dns-txt-records-in-clickfix-script-to-execute-malicious-powershell-commands/</loc>
		<lastmod>2026-02-05T06:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-react2shell-to-hijack-web-traffic-via-compromised-nginx-servers/</loc>
		<lastmod>2026-02-05T06:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weltweite-android-uberwachungskampagne/</loc>
		<lastmod>2026-02-05T07:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-glasses-are-back-privacy-issues-included/</loc>
		<lastmod>2026-02-05T07:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-driving-a-new-kind-of-phishing-at-scale/</loc>
		<lastmod>2026-02-05T07:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploiting-nginx-servers-to-redirect-web-traffic-to-malicious-sites/</loc>
		<lastmod>2026-02-05T07:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-desckvb-rat-unveiled-with-multi-stage-infection-chain-and-plugin-based-architecture/</loc>
		<lastmod>2026-02-05T07:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaw-cve-2026-25049-enables-system-command-execution-via-malicious-workflows/</loc>
		<lastmod>2026-02-05T07:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-nginx-configurations-enable-large-scale-web-traffic-hijacking-campaign/</loc>
		<lastmod>2026-02-05T07:22:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-40552-bis-cve-2025-40554-solardwind-schliest-vier-kritische-schwachstellen-im-web-help-desk/</loc>
		<lastmod>2026-02-05T07:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-supply-chain-risks-join-the-owasp-top-10-list-access-control-still-on-top/</loc>
		<lastmod>2026-02-05T08:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-clues-that-your-llm-may-be-poisoned-with-a-sleeper-agent-back-door/</loc>
		<lastmod>2026-02-05T08:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amaranth-dragon-exploits-winrar-vulnerability-for-persistent-access-to-victim-systems/</loc>
		<lastmod>2026-02-05T08:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protests-dont-impede-iranian-spying-on-expats-syrians-israelis/</loc>
		<lastmod>2026-02-05T08:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierte-angriffe-auf-fortigate-gerate-seit-januar-2026-neue-angriffswelle-trifft-fortinet-fortigate-uber-sso-schwachstelle/</loc>
		<lastmod>2026-02-05T08:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kurz-vor-olympia-italien-wehrt-russische-hacker-angriffe-ab/</loc>
		<lastmod>2026-02-05T09:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-hackers-exploit-microsoft-office-vulnerability-to-target-government-agencies/</loc>
		<lastmod>2026-02-05T09:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technologie-und-sicherheitspolitik-eu-plant-ausschluss-chinesischer-firmen-von-kritischer-infrastruktur/</loc>
		<lastmod>2026-02-05T09:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technologie-und-sicherheitspolitik-eu-plant-ausschluss-chinesischer-firmen-von-kritischer-infrastruktur-2/</loc>
		<lastmod>2026-02-05T09:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incognito-market-30-jahre-haft-fur-betrieb-eines-riesigen-drogen-marktplatzes/</loc>
		<lastmod>2026-02-05T09:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-vulnerability-cve-2026-25049-enables-remote-command-execution/</loc>
		<lastmod>2026-02-05T10:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-fda-reissues-cybersecurity-guidance-to-reflect-qmsr-transition-and-iso-13485-alignment/</loc>
		<lastmod>2026-02-05T10:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-brings-project-focused-ai-agents-into-onedrive/</loc>
		<lastmod>2026-02-05T10:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-launches-litebox-a-security-focused-open-source-library-os/</loc>
		<lastmod>2026-02-05T10:18:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/go%c2%af1-25-7-and-go%c2%af1-24-13-released-with-patches-for-multiple-security-vulnerabilities/</loc>
		<lastmod>2026-02-05T10:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponized-voicemail-hack-allows-remote-access-to-systems-experts-warn/</loc>
		<lastmod>2026-02-05T10:20:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-compliance-convergence-challenge-permission-sprawl-and-ai-regulations-in-hybrid-environments/</loc>
		<lastmod>2026-02-05T11:16:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experte-drohnenabwehr-fur-kritis-ein-muss/</loc>
		<lastmod>2026-02-05T11:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-kompromittiertes-system-kann-mit-einem-schritt-85-prozent-der-umgebung-erreichen/</loc>
		<lastmod>2026-02-05T11:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-agents-isnt-the-customers-job-its-the-platforms-2/</loc>
		<lastmod>2026-02-05T11:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-develops-a-new-scanner-to-detect-hidden-backdoors-in-llms/</loc>
		<lastmod>2026-02-05T11:20:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-with-the-board-through-evidence-based-proof/</loc>
		<lastmod>2026-02-05T11:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-enables-multi-agent-ai-coding-inside-repository-workflows/</loc>
		<lastmod>2026-02-05T11:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-amaranth-dragon-hackers-target-southeast-asian-governments-in-2025/</loc>
		<lastmod>2026-02-05T11:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zendesk-spam-wave-returns-floods-users-with-activate-account-emails/</loc>
		<lastmod>2026-02-05T11:24:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-shut-down-global-ddos-operation-arrest-20-year-old/</loc>
		<lastmod>2026-02-05T11:25:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-targets-critical-businesses-to-exfiltrate-sensitive-data/</loc>
		<lastmod>2026-02-05T11:26:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-cloud-instanzen-gefahrdet-kritische-lucke-lasst-angreifer-n8n-hosts-kapern/</loc>
		<lastmod>2026-02-05T11:27:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-enabled-voice-and-virtual-meeting-fraud-surges-1000/</loc>
		<lastmod>2026-02-05T11:29:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-angreifer-ki-systeme-austricksten-und-ransomware-durchschleusten-warum-ki-in-der-it-sicherheit-niemals-allein-entscheiden-darf/</loc>
		<lastmod>2026-02-05T11:29:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hdds-western-digital-plant-festplatten-mit-mehr-als-100-tbyte/</loc>
		<lastmod>2026-02-05T11:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-jahre-haft-darknet-marktplatz-betrieben-und-nutzer-abgezockt/</loc>
		<lastmod>2026-02-05T11:32:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asset-intelligence-as-context-engineering-for-cybersecurity-operations/</loc>
		<lastmod>2026-02-05T12:27:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacke-auf-buhlmann-group/</loc>
		<lastmod>2026-02-05T12:28:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-silent-security-gap-in-enterprise-ai-adoption/</loc>
		<lastmod>2026-02-05T12:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-boards-should-be-obsessed-with-their-most-boring-systems/</loc>
		<lastmod>2026-02-05T12:30:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knife-cutting-the-edge-disclosing-a-china-nexus-gateway-monitoring-aitm-framework/</loc>
		<lastmod>2026-02-05T12:32:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amaranth-dragon-zielgerichtete-cyberspionage-gegen-behorden-in-sudostasien/</loc>
		<lastmod>2026-02-05T12:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-den-openclaw-hype-fur-verbreitung-von-vb-skripten-und-malware/</loc>
		<lastmod>2026-02-05T12:33:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-ernennt-armin-muller-zum-regional-vice-president-for-central-europe-und-beschleunigt-damit-das-wachstum-von-data-resilience-und-channel/</loc>
		<lastmod>2026-02-05T12:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-mapping-und-netzwerk-monitoring-fur-transparentes-und-effizientes-it-management/</loc>
		<lastmod>2026-02-05T12:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-security-woes-roll-on-as-new-critical-flaws-bypass-december-fix/</loc>
		<lastmod>2026-02-05T12:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-decade-old-encase-driver-still-works-as-an-edr-killer/</loc>
		<lastmod>2026-02-05T12:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-sting-dismantles-illegal-streaming-empire-serving-millions/</loc>
		<lastmod>2026-02-05T12:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/varonis-acquires-alltrue-to-strengthen-ai-security-capabilities/</loc>
		<lastmod>2026-02-05T12:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-officials-warn-of-russian-satellites-intercepting-communications/</loc>
		<lastmod>2026-02-05T12:40:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-claims-cyberattacks-of-russian-origin-are-pelting-winter-olympics/</loc>
		<lastmod>2026-02-05T12:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-fintech-firm-betterment-exposes-1-4-million-accounts/</loc>
		<lastmod>2026-02-05T12:42:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-5-0-unveils-cross-platform-threats-for-windows-linux-esxi-systems/</loc>
		<lastmod>2026-02-05T12:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-buyers-guide-to-ai-usage-control/</loc>
		<lastmod>2026-02-05T12:44:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infy-hackers-resume-operations-with-new-c2-servers-after-iran-internet-blackout-ends/</loc>
		<lastmod>2026-02-05T12:45:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-hacking-campaign-exploits-microsoft-windows-winrar-vulnerability/</loc>
		<lastmod>2026-02-05T12:47:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quanten-kryptografie-fur-eine-sichere-verschlusselung-keine-angst-vorm-quantencomputer/</loc>
		<lastmod>2026-02-05T12:47:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucke-unzahlige-n8n-instanzen-sind-angreifbar/</loc>
		<lastmod>2026-02-05T12:49:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-jahre-haft-darknet-marktplatz-betrieben-und-drogenhandler-abgezockt/</loc>
		<lastmod>2026-02-05T12:50:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-decadeold-windows-driver-flaw-to-shut-down-modern-edr-defenses/</loc>
		<lastmod>2026-02-05T13:15:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moxa-switches-vulnerability-enables-unauthorized-access-through-authentication-bypass/</loc>
		<lastmod>2026-02-05T13:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-alert-fake-traffic-ticket-portals-target-personal-credit-card-data/</loc>
		<lastmod>2026-02-05T13:17:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darktrace-fuhrt-mit-secure-ai-neue-losung-fur-verhaltensbasierte-ki-sicherheit-ein/</loc>
		<lastmod>2026-02-05T13:18:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erhebliche-mangel-bundesnetzagentur-kassiert-millionen-illegaler-gerate-ein/</loc>
		<lastmod>2026-02-05T13:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-massenhaft-vms-auf-legitimen-hosting-plattformen/</loc>
		<lastmod>2026-02-05T13:21:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expertenstatements-zum/</loc>
		<lastmod>2026-02-05T13:22:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sanctioned-bulletproof-host-linked-to-hijacking-of-old-home-routers/</loc>
		<lastmod>2026-02-05T13:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newsletter-platform-substack-notifies-users-of-data-breach/</loc>
		<lastmod>2026-02-05T14:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattackers-use-fake-rto-challan-alerts-to-spread-android-malware/</loc>
		<lastmod>2026-02-05T14:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadowsyndicate-leverages-server-transition-technique-in-latest-ransomware-attacks/</loc>
		<lastmod>2026-02-05T14:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-vulnerability-allows-remote-attackers-to-hijack-systems-via-malicious-workflow-execution/</loc>
		<lastmod>2026-02-05T14:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-codespaces-rce-asyncrat-c2-byovd-abuse-ai-cloud-intrusions-15-stories/</loc>
		<lastmod>2026-02-05T14:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphones-now-involved-in-nearly-every-police-investigation/</loc>
		<lastmod>2026-02-05T14:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriff-auf-ticketportal-stadt-schorndorf-warnt-vor-datenklau/</loc>
		<lastmod>2026-02-05T14:23:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-google-oder-microsoft-arbeiten-eine-woche-nur-mit-europaischer-software/</loc>
		<lastmod>2026-02-05T14:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-check-in-chatgpt-ki-chatbot-integriert-malwarebytes-expertise/</loc>
		<lastmod>2026-02-05T14:26:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operant-ais-agent-protector-aims-to-secure-rising-tide-of-autonomous-ai/</loc>
		<lastmod>2026-02-05T15:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-launches-refreshed-channel-program-to-drive-partner-enablement-simplicity/</loc>
		<lastmod>2026-02-05T15:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-revamps-nextwave-program-5-biggest-updates/</loc>
		<lastmod>2026-02-05T15:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-vast-cyberespionage-operation-targeting-dozens-of-governments-worldwide/</loc>
		<lastmod>2026-02-05T15:19:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-blames-russia-linked-hackers-for-cyberattacks-ahead-of-winter-olympics/</loc>
		<lastmod>2026-02-05T15:21:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-confirms-data-breach-affects-users-email-addresses-and-phone-numbers/</loc>
		<lastmod>2026-02-05T15:22:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/common-crypto-scams-and-how-to-protect-your-funds-in-2026/</loc>
		<lastmod>2026-02-05T15:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-users-hit-by-python-infostealers-posing-as-ai-installers/</loc>
		<lastmod>2026-02-05T15:23:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-users-hit-by-python-infostealers-posing-as-ai-installers-2/</loc>
		<lastmod>2026-02-05T15:23:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-flaw-puts-hundreds-of-thousands-of-enterprise-ai-systems-at-risk/</loc>
		<lastmod>2026-02-05T15:24:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-success-trifecta-education-certifications-experience/</loc>
		<lastmod>2026-02-05T15:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-commands-in-github-codespaces-enable-rce/</loc>
		<lastmod>2026-02-05T15:26:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-warns-customers-of-data-breach-following-hackers-dark-web-claims/</loc>
		<lastmod>2026-02-05T16:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-govtech-giant-conduent-balloons-affecting-millions-more-americans/</loc>
		<lastmod>2026-02-05T16:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/godent-rolls-out-scanner-as-a-service-model-to-drive-digital-transformation-in-european-dentistry/</loc>
		<lastmod>2026-02-05T16:36:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-telemetry-is-the-backbone-of-production-ai/</loc>
		<lastmod>2026-02-05T16:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-frontier-organizes-ai-agents-under-one-system/</loc>
		<lastmod>2026-02-05T16:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-oil-pipeline-operator-conpet-discloses-cyberattack/</loc>
		<lastmod>2026-02-05T16:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-cloud-logs-fall-short-the-network-tells-the-truth/</loc>
		<lastmod>2026-02-05T16:40:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/model-confusion-vortrainierte-ki-modelle-lassen-sich-verwirren-und-angreifen/</loc>
		<lastmod>2026-02-05T16:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-adds-ability-to-audit-behaviors-by-identity/</loc>
		<lastmod>2026-02-05T17:23:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-solarwinds-web-help-desk-under-exploitation/</loc>
		<lastmod>2026-02-05T17:25:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asian-governments-espionage-campaign-breached-critical-infrastructure-in-37-countries/</loc>
		<lastmod>2026-02-05T17:25:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-attacking-european-maritime-and-transport-orgs-using-microsoft-office-exploit/</loc>
		<lastmod>2026-02-05T17:26:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-764-member-arrested-charged-with-csam-possession-in-new-york/</loc>
		<lastmod>2026-02-05T17:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-breach-may-expose-1-4m-users-after-social-engineering-attack/</loc>
		<lastmod>2026-02-05T17:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-group-noname05716-launched-ddos-attacks-on-milano-cortina-2026-winter-olympics/</loc>
		<lastmod>2026-02-05T17:29:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-step-finance-crosscurve-exploits/</loc>
		<lastmod>2026-02-05T17:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-and-the-growing-security-risks-of-agentic-ai/</loc>
		<lastmod>2026-02-05T17:32:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-confirms-exploitation-of-vmware-esxi-flaw-by-ransomware-attackers/</loc>
		<lastmod>2026-02-05T17:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harlan-parrott-appointed-as-knowbe4s-vp-of-ai-innovation/</loc>
		<lastmod>2026-02-05T17:34:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-warns-european-startups-no-one-is-too-small-to-be-targeted-by-hackers/</loc>
		<lastmod>2026-02-05T17:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-legitimate-forensic-driver-to-disable-endpoint-security-huntress-warns/</loc>
		<lastmod>2026-02-05T17:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-regulation-redefine-application-security-new-global-study-finds/</loc>
		<lastmod>2026-02-05T17:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-group-running-espionage-operations-against-dozens-of-governments/</loc>
		<lastmod>2026-02-05T18:31:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-warns-autonomous-ai-agents-are-the-next-major-security-blind-spot/</loc>
		<lastmod>2026-02-05T18:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-university-la-sapienza-goes-offline-after-cyberattack/</loc>
		<lastmod>2026-02-05T18:33:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/branchenexperten-kommentieren-den-safer-internet-day-2026/</loc>
		<lastmod>2026-02-05T18:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-remains-in-prime-position-amid-ai-software-apocalypse-analyst/</loc>
		<lastmod>2026-02-05T20:23:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-federal-agencies-one-year-to-rip-out-endlife-devices/</loc>
		<lastmod>2026-02-05T20:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-tells-agencies-to-stop-using-unsupported-edge-devices/</loc>
		<lastmod>2026-02-05T20:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-gas-no-brakes-time-to-come-to-ai-church/</loc>
		<lastmod>2026-02-05T20:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-of-europes-largest-universities-knocked-offline-for-days-after-cyberattack/</loc>
		<lastmod>2026-02-05T20:27:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-says-intruder-lifted-emails-phone-numbers-in-months-old-breach/</loc>
		<lastmod>2026-02-05T20:28:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asia-based-government-spies-quietly-broke-into-critical-networks-across-37-countries/</loc>
		<lastmod>2026-02-05T20:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-announces-2026-msp-partner-program/</loc>
		<lastmod>2026-02-05T20:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-shut-down-exchange-online-ews-in-april-2027/</loc>
		<lastmod>2026-02-05T20:31:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-kimwolf-botnet-launches-record-setting-31-4-tbps-ddos-attack/</loc>
		<lastmod>2026-02-05T20:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/incognito-market-admin-sentenced-to-30-years-for-running-105-million-dark-web-drug-empire/</loc>
		<lastmod>2026-02-05T20:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-agent-sparks-global-security-alarm/</loc>
		<lastmod>2026-02-05T20:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-urges-users-to-finally-ditch-ntlm-authentication/</loc>
		<lastmod>2026-02-05T21:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-and-cbps-face-recognition-app-cant-actually-verify-who-people-are/</loc>
		<lastmod>2026-02-05T21:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-overhauls-security-leadership-as-ai-expands-enterprise-attack-surface/</loc>
		<lastmod>2026-02-05T21:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-disconnect-unsupported-network-edge-devices/</loc>
		<lastmod>2026-02-05T21:30:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-brings-back-googles-hayete-gallot-to-run-security/</loc>
		<lastmod>2026-02-05T21:31:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-vulnerabilities-allow-code-execution-browser-crashes/</loc>
		<lastmod>2026-02-05T21:32:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-uses-ispsystem-vms-for-stealthy-payload-delivery/</loc>
		<lastmod>2026-02-05T21:33:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-claims-theft-of-data-from-700000-substack-users-company-confirms-breach/</loc>
		<lastmod>2026-02-05T22:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-directs-federal-agencies-to-update-edge-devices/</loc>
		<lastmod>2026-02-05T22:20:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10000-active-infections-traced-to-systembc-botnet/</loc>
		<lastmod>2026-02-05T22:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spains-ministry-of-science-shuts-down-systems-after-breach-claims/</loc>
		<lastmod>2026-02-05T22:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encase-driver-weaponized-as-edr-killers-persist/</loc>
		<lastmod>2026-02-05T23:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-site-moltbook-is-riddled-with-security-risks/</loc>
		<lastmod>2026-02-05T23:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-aims-to-boost-browser-security-with-acquisition-of-squarex/</loc>
		<lastmod>2026-02-05T23:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-team-malware-a-la-carte-allpacka-zur-simulation-hochst-befahigter-hacker-angriffe/</loc>
		<lastmod>2026-02-05T23:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-basierte-disruption-der-arbeitswelt-80-prozent-der-menschen-werden-ihren-job-verlieren/</loc>
		<lastmod>2026-02-05T23:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-actually-does-something-useful-adds-sysmon-to-windows/</loc>
		<lastmod>2026-02-05T23:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-breach-662752-user-records-leaked-on-cybercrime-forum/</loc>
		<lastmod>2026-02-05T23:21:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-nuance-it-worker-face-more-charges-in-geisinger-breach/</loc>
		<lastmod>2026-02-05T23:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-italy-thwarts-russian-olympic-hacks/</loc>
		<lastmod>2026-02-05T23:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-patch-critical-and-high-severity-vulnerabilities-now/</loc>
		<lastmod>2026-02-05T23:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-patch-critical-and-high-severity-vulnerabilities-now-2/</loc>
		<lastmod>2026-02-05T23:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apt-group-breached-gov-and-critical-infrastructure-orgs-in-37-countries/</loc>
		<lastmod>2026-02-06T00:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apt-group-breached-gov-and-critical-infrastructure-orgs-in-37-countries-2/</loc>
		<lastmod>2026-02-06T00:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-reveals-meaty-personal-information-after-simple-cracks/</loc>
		<lastmod>2026-02-06T00:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-good-cyber-defense-rarely-stops-attackers/</loc>
		<lastmod>2026-02-06T00:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/varonis-acquires-alltrue-ai-to-extend-security-for-ai-agents/</loc>
		<lastmod>2026-02-06T00:20:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-new-vulnerabilities-found-in-ingress-nginx/</loc>
		<lastmod>2026-02-06T04:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-is-only-leader-in-sovereign-sase-market-ceo-ken-xie/</loc>
		<lastmod>2026-02-06T04:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-verbesserung-durch-malewarebytes-erkennung-von-scams-malware-und-online-risiken/</loc>
		<lastmod>2026-02-06T04:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hilfreiche-analogie-das-ziel-der-cybersicherheit-gleicht-einem-fusballtor/</loc>
		<lastmod>2026-02-06T04:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ad-blocking-is-alive-and-well-despite-chromes-attempts-to-make-it-harder/</loc>
		<lastmod>2026-02-06T04:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-february-6-2026/</loc>
		<lastmod>2026-02-06T06:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-advisory-highlights-exploited-smartertools-vulnerability-in-recent-ransomware-attacks/</loc>
		<lastmod>2026-02-06T06:16:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-advisory-highlights-exploited-smartertools-vulnerability-in-recent-ransomware-attacks-2/</loc>
		<lastmod>2026-02-06T06:17:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spam-campaign-distributes-fake-pdfs-deploys-remote-monitoring-tools-for-ongoing-access/</loc>
		<lastmod>2026-02-06T06:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-data-breach-exposes-sensitive-information-of-1-4-million-customers/</loc>
		<lastmod>2026-02-06T06:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-als-strategische-notwendigkeit-die-drei-grundpfeiler-fur-europas-zukunft/</loc>
		<lastmod>2026-02-06T07:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-identifiziert-die-wichtigsten-cybersicherheitstrends-fur-2026-unbekanntes-terrain/</loc>
		<lastmod>2026-02-06T07:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-privacy-audits-are-getting-harder/</loc>
		<lastmod>2026-02-06T07:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-putting-off-security-decisions/</loc>
		<lastmod>2026-02-06T07:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/centos-9-security-flaw-enables-privilege-escalation-poc-released/</loc>
		<lastmod>2026-02-06T07:20:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-and-oauth-token-vulnerabilities-lead-to-full-microsoft-365-breach/</loc>
		<lastmod>2026-02-06T07:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-windows-screensaver-to-deploy-rmm-tools-gain-remote-access/</loc>
		<lastmod>2026-02-06T07:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-windows-screensaver-to-deploy-rmm-tools-gain-remote-access-2/</loc>
		<lastmod>2026-02-06T07:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-finds-500-high-severity-flaws-across-major-open-source-libraries/</loc>
		<lastmod>2026-02-06T07:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lateral-movement-und-rce-angriffe-uber-ivanti-endpoint-manager-mobile-laufen/</loc>
		<lastmod>2026-02-06T07:24:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-human-layer-of-security-why-people-are-still-the-weakest-link-in-2026/</loc>
		<lastmod>2026-02-06T08:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-pqc-pilot-might-fail-and-thats-okay/</loc>
		<lastmod>2026-02-06T08:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-other-offense-and-defense/</loc>
		<lastmod>2026-02-06T08:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-blind-spot-every-ciso-must-see-loyalty/</loc>
		<lastmod>2026-02-06T08:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-trusted-access-for-cyber-to-expand-ai-driven-defense-while-managing-risk/</loc>
		<lastmod>2026-02-06T08:19:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/february-2026-patch-tuesday-forecast-lots-of-oob-love-this-month/</loc>
		<lastmod>2026-02-06T08:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wave-of-odyssey-stealer-targets-macos-users-in-active-cyberattack-campaign/</loc>
		<lastmod>2026-02-06T08:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt27-launches-stealthy-attacks-on-corporate-networks-evades-detection/</loc>
		<lastmod>2026-02-06T08:22:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-exploited-react-native-community-security-flaw/</loc>
		<lastmod>2026-02-06T08:24:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tool-silos-und-schatten-ki-gefahrden-compliance-und-bilanz-it-wildwuchs-trifft-2026-auf-gesetzgeber-und-ki/</loc>
		<lastmod>2026-02-06T08:24:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrider-krieg-bka-registriert-rund-320-sabotage-verdachtsfalle/</loc>
		<lastmod>2026-02-06T08:25:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-attackers-no-longer-need-to-break-in-the-rise-of-identity-based-attacks/</loc>
		<lastmod>2026-02-06T09:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-als-aws-angriffsturbo/</loc>
		<lastmod>2026-02-06T09:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-federal-agencies-to-replace-endlife-edge-devices/</loc>
		<lastmod>2026-02-06T09:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-releases-urgent-security-fixes-for-critical-vulnerabilities-in-bigip-and-nginx/</loc>
		<lastmod>2026-02-06T09:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-integrates-squarex-to-deliver-stronger-browser-security-protections/</loc>
		<lastmod>2026-02-06T09:19:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cyber-startup-programme-to-debut-at-infosecurity-europe-2026/</loc>
		<lastmod>2026-02-06T09:20:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verantwortung-fur-die-operative-steuerung-myra-security-befordert-nils-schwerdfeger-zum-coo/</loc>
		<lastmod>2026-02-06T09:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-rekord-cloudflare-wehrt-beispiellose-ddos-datenflut-ab/</loc>
		<lastmod>2026-02-06T09:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/la-sapienza-cyberattack-forces-italys-largest-university-offline/</loc>
		<lastmod>2026-02-06T10:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-gen-spotlights-ai-assurance-for-autonomous-systems-qa-with-cybpass-ceo-pingchen-lin/</loc>
		<lastmod>2026-02-06T10:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-discloses-potential-data-breach-exposing-users-names-emails/</loc>
		<lastmod>2026-02-06T10:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/renengine-loader-deploys-stealthy-multi-stage-execution-to-bypass-security-measures/</loc>
		<lastmod>2026-02-06T10:19:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-trusted-access-to-strengthen-cybersecurity-protections/</loc>
		<lastmod>2026-02-06T10:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware/</loc>
		<lastmod>2026-02-06T10:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russische-hacker-greifen-an-microsoft-schliest-zero-day-in-office-im-eiltempo/</loc>
		<lastmod>2026-02-06T10:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keyfactor-kommentiert-neues-nist-cybersecurity-framework-fur-ki/</loc>
		<lastmod>2026-02-06T10:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-5-million-web-servers-found-exposing-git-metadata-study-reveals-widespread-risk-of-code-and-credential-leaks/</loc>
		<lastmod>2026-02-06T11:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-smartertools-smartermail-and-react-native-community-cli-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-06T11:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-nuance-it-worker-faces-more-charges-in-geisinger-breach/</loc>
		<lastmod>2026-02-06T11:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attackers-are-exploiting-critical-smartermail-vulnerability-cve-2026-24423/</loc>
		<lastmod>2026-02-06T11:19:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-improves-agentic-performance-and-model-safety/</loc>
		<lastmod>2026-02-06T11:20:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-hackers-target-linux-devices-to-redirect-traffic-and-deploy-malware/</loc>
		<lastmod>2026-02-06T11:21:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-samsung-knox-helps-stop-your-network-security-breach/</loc>
		<lastmod>2026-02-06T11:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-wird-zur-frage-digitaler-souveranitat-europas-warum-agentische-ki-angriffe-europas-infrastrukturen-bedrohen/</loc>
		<lastmod>2026-02-06T11:24:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-in-deutschland-mysteriose-spione-infiltrieren-infrastruktur-in-37-landern/</loc>
		<lastmod>2026-02-06T11:25:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-extends-zero-trust-security-to-browsers-with-squarex-acquisition/</loc>
		<lastmod>2026-02-06T12:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-global-cybersecurity-incidents-and-policy-shifts/</loc>
		<lastmod>2026-02-06T12:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fvncbot-targets-android-users-exploiting-accessibility-services-for-attacks/</loc>
		<lastmod>2026-02-06T12:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-vertrauensstellung-des-domain-name-system-wird-zum-risiko-tunneling-der-blinde-fleck-in-der-netzwerksicherheitsstrategie/</loc>
		<lastmod>2026-02-06T12:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-wie-deutschland-sich-von-us-software-lost/</loc>
		<lastmod>2026-02-06T12:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-in-deutschland-mysteriose-spione-infiltrieren-infrastrukturen-in-37-landern/</loc>
		<lastmod>2026-02-06T12:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ten-career-ending-mistakes-cisos-make-and-how-to-avoid-them/</loc>
		<lastmod>2026-02-06T13:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-federal-agencies-18-months-to-purge-unsupported-edge-devices/</loc>
		<lastmod>2026-02-06T13:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanias-oil-pipeline-operator-confirms-cyberattack-as-hackers-claim-data-theft/</loc>
		<lastmod>2026-02-06T13:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saferday-2026-knowbe4-experten-fordern-digitale-achtsamkeit-und-skepsis-angesichts-der-dominanz-von-ki/</loc>
		<lastmod>2026-02-06T13:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saferday-2026-knowbe4-experten-fordern-digitale-achtsamkeit-und-skepsis-angesichts-der-dominanz-von-ki/</loc>
		<lastmod>2026-02-06T13:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saferday-2026-knowbe4-experten-fordern-digitale-achtsamkeit-und-skepsis-angesichts-der-dominanz-von-ki-2/</loc>
		<lastmod>2026-02-06T13:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenloser-aichecker-von-bitdefender-hilft-bosartigen-payload-in-skills-zu-identifizieren/</loc>
		<lastmod>2026-02-06T13:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-us-federal-agencies-to-replace-unsupported-edge-devices/</loc>
		<lastmod>2026-02-06T13:23:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-pleads-guilty-to-hacking-nearly-600-womens-snapchat-accounts/</loc>
		<lastmod>2026-02-06T13:24:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bulletproof-hosting-providers-exploit-legitimate-isps-to-power-cybercrime-servers/</loc>
		<lastmod>2026-02-06T13:25:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-launches-enhanced-security-capabilities-to-validate-500-critical-vulnerabilities/</loc>
		<lastmod>2026-02-06T13:26:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asian-state-backed-group-tgr-sta-1030-breaches-70-government-infrastructure-entities/</loc>
		<lastmod>2026-02-06T13:27:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zendesk-supportsysteme-fluten-epostfacher-massenhaft-mit-spam/</loc>
		<lastmod>2026-02-06T13:27:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/17-of-3rd-party-add-ons-for-openclaw-used-in-crypto-theft-and-macos-malware/</loc>
		<lastmod>2026-02-06T14:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-says-tiktok-faces-large-fine-over-addictive-design/</loc>
		<lastmod>2026-02-06T14:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-hacker-group-targets-indias-startup-ecosystem-in-cyber-attack/</loc>
		<lastmod>2026-02-06T14:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-tool-to-triage-exploited-vulnerabilities-can-make-kev-more-useful/</loc>
		<lastmod>2026-02-06T14:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-removal-of-unsupported-edge-devices-to-reduce-federal-network-risk/</loc>
		<lastmod>2026-02-06T14:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-elektronische-kommunikation-cyberangriff-betrifft-it-der-beweisstuckstelle-der-polizei/</loc>
		<lastmod>2026-02-06T14:20:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-research-enttarnt-missbrauch-namhafter-saas-plattformen-fur-telefon-betrug/</loc>
		<lastmod>2026-02-06T14:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norwegian-intelligence-discloses-country-hit-by-salt-typhoon-campaign/</loc>
		<lastmod>2026-02-06T15:15:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-engineer-speedruns-raspberry-pi-magic-smoke-in-five-minutes/</loc>
		<lastmod>2026-02-06T15:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workday-reveals-around-400-staff-soon-wont-have-to-work-another-day/</loc>
		<lastmod>2026-02-06T15:17:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-backed-phishing-attacks-targeting-military-officials-and-journalists-on-signal/</loc>
		<lastmod>2026-02-06T15:19:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polands-energy-control-systems-were-breached-through-exposed-vpn-access/</loc>
		<lastmod>2026-02-06T15:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-prevention-is-a-latency-game-2/</loc>
		<lastmod>2026-02-06T16:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-prevention-is-a-latency-game/</loc>
		<lastmod>2026-02-06T16:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-against-education-sector-slow-worldwide/</loc>
		<lastmod>2026-02-06T16:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-salt-typhoon-hackers-broke-into-norwegian-companies/</loc>
		<lastmod>2026-02-06T16:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gosangelegter-missbrauch-namhafter-saas-plattformen-fur-telefon-betrug/</loc>
		<lastmod>2026-02-06T16:18:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-notifies-users-of-data-breach-after-external-partner-security-flaw/</loc>
		<lastmod>2026-02-06T16:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-breaking-31-4-tbps-ddos-attack-hits-in-november-2025-stopped-by-cloudflare/</loc>
		<lastmod>2026-02-06T16:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-threats-botnets-and-cloud-exploits-define-this-weeks-cyber-risks/</loc>
		<lastmod>2026-02-06T16:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-cutting-through-the-ai-hype-to-the-real-security-risks/</loc>
		<lastmod>2026-02-06T16:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edr-email-and-sase-miss-this-entire-class-of-browser-attacks/</loc>
		<lastmod>2026-02-06T16:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-malware-delivery/</loc>
		<lastmod>2026-02-06T16:25:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strenge-kontoeinstellungen-neue-whatsapp-einstellungen-sollen-vor-cybernagriffen-schutzen/</loc>
		<lastmod>2026-02-06T16:25:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-litebox-a-rust-based-approach-to-secure-sandboxing/</loc>
		<lastmod>2026-02-06T17:16:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-threatens-tiktok-with-massive-fine-over-addictive-design-features/</loc>
		<lastmod>2026-02-06T17:17:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illinois-man-pleads-guilty-to-hacking-hundreds-of-snapchat-accounts-to-steal-nude-photos/</loc>
		<lastmod>2026-02-06T17:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawdbot-moltbot-the-autonomous-ai-butler-that-could-expose-your-entire-digital-life/</loc>
		<lastmod>2026-02-06T17:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-deluge-brit-biz-battered-as-botnet-blitzes-break-records/</loc>
		<lastmod>2026-02-06T17:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-notepad-supply-chain-attack-raises-alarm/</loc>
		<lastmod>2026-02-06T17:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-the-hidden-cost-of-supply-chain-attacks/</loc>
		<lastmod>2026-02-06T17:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaws-gregarious-insecurities-make-safe-usage-difficult/</loc>
		<lastmod>2026-02-06T17:23:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-confirms-data-breach-limited-user-data-compromised/</loc>
		<lastmod>2026-02-06T17:24:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-vor-angriffen-bsi-erlautert-phishing-attacken-auf-signal/</loc>
		<lastmod>2026-02-06T17:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-used-ai-to-breach-an-aws-environment-in-8-minutes/</loc>
		<lastmod>2026-02-06T18:16:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-emails-users-about-data-breach-pins-it-on-3rd-party/</loc>
		<lastmod>2026-02-06T18:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whos-liable-when-embedded-ai-goes-wrong/</loc>
		<lastmod>2026-02-06T18:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-smartermail-rce-flaw-used-in-ransomware-attacks/</loc>
		<lastmod>2026-02-06T18:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-made-malware-kit-targets-chinese-based-routers-and-edge-devices/</loc>
		<lastmod>2026-02-06T18:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-who-has-repeatedly-warned-about-secret-u-s-government-surveillance-sounds-new-alarm-over-cia-activities/</loc>
		<lastmod>2026-02-06T19:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dknife-linux-toolkit-hijacks-router-traffic-to-spy-deliver-malware/</loc>
		<lastmod>2026-02-06T19:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encrypt-it-already-campaign-pushes-big-tech-to-prioritize-e2e-encryption/</loc>
		<lastmod>2026-02-06T19:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senator-who-has-repeatedly-warned-about-secret-us-government-surveillance-sounds-new-alarm-over-cia-activities/</loc>
		<lastmod>2026-02-06T20:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-hacked-the-polish-electricity-grid-now-what/</loc>
		<lastmod>2026-02-06T20:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-hunting-with-llms-expert-tool-seeks-more-true-flaws/</loc>
		<lastmod>2026-02-06T20:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-notifies-users-of-potential-third-party-data-exposure/</loc>
		<lastmod>2026-02-06T20:18:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-starts-testing-built-in-sysmon-monitoring-in-windows-11/</loc>
		<lastmod>2026-02-06T20:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encrypt-it-already-campaign-pushes-big-tech-to-prioritize-e2e-encryption-2/</loc>
		<lastmod>2026-02-06T20:20:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-warns-of-signal-account-hijacking-targeting-senior-figures/</loc>
		<lastmod>2026-02-06T21:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-more-vulnerabilities-found-in-n8n-automation-platform/</loc>
		<lastmod>2026-02-06T22:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nyc-explores-using-ai-cameras-to-spot-subway-fare-evaders/</loc>
		<lastmod>2026-02-06T22:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-envisions-military-data-sharing-sans-us-tech/</loc>
		<lastmod>2026-02-06T22:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-a-cardiac-pacemaker-help-find-a-missing-person/</loc>
		<lastmod>2026-02-06T22:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-and-the-rise-of-cloud-native-cybercrime/</loc>
		<lastmod>2026-02-06T22:20:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-packages-for-dydx-cryptocurrency-exchange-empties-user-wallets/</loc>
		<lastmod>2026-02-06T23:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-privacy-probe-will-focus-on-biometric-tracking-by-ice-obim/</loc>
		<lastmod>2026-02-06T23:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-ai-bug-lets-image-metadata-trigger-attacks/</loc>
		<lastmod>2026-02-06T23:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-purchases-squarex-to-secure-browsers-without-agents/</loc>
		<lastmod>2026-02-06T23:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/radicl-brings-in-31m-to-push-ai-driven-soc-toward-autonomy/</loc>
		<lastmod>2026-02-06T23:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-agents-dragging-case-may-help-expose-evidence-in-renee-good-shooting/</loc>
		<lastmod>2026-02-06T23:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asian-cyber-espionage-campaign-breached-37-countries/</loc>
		<lastmod>2026-02-06T23:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalisierung-im-gesundheitswesen-92-prozent-der-senioren-erkennen-chancen/</loc>
		<lastmod>2026-02-07T00:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-gave-everyone-control-of-every-ai-agent/</loc>
		<lastmod>2026-02-07T00:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banks-face-dual-authentication-crisis-from-ai-agents/</loc>
		<lastmod>2026-02-07T04:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/liebe-likes-und-lugen-cyberkriminelle-nutzen-unsere-emotionen-schamlos-aus/</loc>
		<lastmod>2026-02-07T06:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langzeitarchivierung-von-daten-herausforderungen-und-vielversprechende-ansatze/</loc>
		<lastmod>2026-02-07T06:16:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sets-copilot-agents-loose-on-your-onedrive-files/</loc>
		<lastmod>2026-02-07T06:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cybersquatting-tactics-to-spread-malware-and-steal-sensitive-information/</loc>
		<lastmod>2026-02-07T06:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-free-firebase-accounts-to-launch-phishing-campaigns/</loc>
		<lastmod>2026-02-07T08:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage-2/</loc>
		<lastmod>2026-02-07T10:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/</loc>
		<lastmod>2026-02-07T10:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ai-security-suite-sorgt-fur-mehr-uberblick-und-kontrolle-bei-ki-anwendungen/</loc>
		<lastmod>2026-02-07T10:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-worries-stall-enterprise-production-deployments/</loc>
		<lastmod>2026-02-07T11:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-pushes-federal-agencies-to-retire-endsupport-edge-devices/</loc>
		<lastmod>2026-02-07T12:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-the-social-network-for-ai-agents-exposed-real-humans-data/</loc>
		<lastmod>2026-02-07T12:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-backed-hackers-target-military-officials-and-journalists-on-signal-in-latest-cyberattack/</loc>
		<lastmod>2026-02-07T12:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-pay-users-targeted-by-phishing-attack-aimed-at-stealing-payment-details/</loc>
		<lastmod>2026-02-07T13:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-confirms-experience-beats-youthful-enthusiasm/</loc>
		<lastmod>2026-02-07T13:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-agencies-warn-of-signal-phishing-targeting-politicians-military-journalists/</loc>
		<lastmod>2026-02-07T13:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-dubai-crown-prince-tracked-to-nigerian-mansion-after-2-5m-romance-scam/</loc>
		<lastmod>2026-02-07T14:14:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-veo-3-bis-adobe-firefly-welche-ki-videogeneratoren-das-us-heimatschutzministerium-einsetzt/</loc>
		<lastmod>2026-02-07T15:16:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-digitale-achtsamkeit-und-skepsis-angesichts-der-ki-dominanz-geboten/</loc>
		<lastmod>2026-02-07T16:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/</loc>
		<lastmod>2026-02-07T16:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-will-give-users-an-ai-kill-switch-for-better-privacy/</loc>
		<lastmod>2026-02-07T18:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-university-la-sapienza-still-offline-to-mitigate-recent-cyber-attack/</loc>
		<lastmod>2026-02-07T19:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supermarket-sorry-after-facial-recognition-alert-flags-right-criminal-wrong-customer/</loc>
		<lastmod>2026-02-07T21:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bithumb-mistakenly-sends-620000-bitcoin-40b-to-customer-accounts/</loc>
		<lastmod>2026-02-07T21:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ruckblick-auf-die-2-auflage-zum-thema-data-act-und-dsgvo/</loc>
		<lastmod>2026-02-08T00:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-gut-50-000-jugendliche-werden-umgang-mit-ki-begleitern-am-10-februar-2026-diskutieren/</loc>
		<lastmod>2026-02-08T00:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-rail-workers-accused-of-bribery-turned-to-chatgpt-for-legal-tips/</loc>
		<lastmod>2026-02-08T04:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/summoning-the-spirit-of-the-bbc-micro-with-a-pi-500-and-a-can-of-spray-paint/</loc>
		<lastmod>2026-02-08T04:16:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-integrates-virustotal-scanning-to-detect-malicious-clawhub-skills/</loc>
		<lastmod>2026-02-08T08:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openreach-turns-up-the-heat-to-force-laggards-off-legacy-copper-lines/</loc>
		<lastmod>2026-02-08T09:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/i-fell-into-it-ex-criminal-hackers-urge-manchester-pupils-to-use-web-skills-for-good/</loc>
		<lastmod>2026-02-08T09:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-notepad-supply-chain-attack-details-and-targets-patch-tuesday-forecast/</loc>
		<lastmod>2026-02-08T10:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-braucht-menschen-human-in-the-loop/</loc>
		<lastmod>2026-02-08T11:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-cyberresilienz-durch-kunstliche-intelligenz-5-stufenplan-fur-unternehmen/</loc>
		<lastmod>2026-02-08T11:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-angriffe-hohere-lasten-bilanz-zur-ddos-lage-2025/</loc>
		<lastmod>2026-02-08T11:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dknife-toolkit-abuses-routers-to-spy-and-deliver-malware-since-2019/</loc>
		<lastmod>2026-02-08T11:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-video-company-arouses-fury-by-boasting-about-replacing-creative-jobs/</loc>
		<lastmod>2026-02-08T13:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-ki-findet-uber-500-zero-day-lucken-in-open-source-software/</loc>
		<lastmod>2026-02-08T13:17:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-83/</loc>
		<lastmod>2026-02-08T15:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-562-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-02-08T15:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-tool-blocks-imposter-attacks-disguised-as-safe-commands/</loc>
		<lastmod>2026-02-08T16:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-construction-firm-hit-by-prometei-botnet-hiding-in-windows-server/</loc>
		<lastmod>2026-02-08T17:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-top-mdr-providers-for-mid-market-companies/</loc>
		<lastmod>2026-02-08T18:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-ddos-protection-service-providers-for-2026/</loc>
		<lastmod>2026-02-08T18:16:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-allone/</loc>
		<lastmod>2026-02-09T04:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jackma/</loc>
		<lastmod>2026-02-09T04:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-weaponizes-office-flaw-to-spy-on-nato-military/</loc>
		<lastmod>2026-02-09T04:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unit-42-meldet-aufdeckung-weltweiter-cyberspionage-kampagne-gegen-regierungen/</loc>
		<lastmod>2026-02-09T04:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategische-notwendigkeit-die-drei-grundpfeiler-digitaler-souveranitat-europas/</loc>
		<lastmod>2026-02-09T04:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-moves-to-contain-data-exposure-warns-users-of-phishing/</loc>
		<lastmod>2026-02-09T04:21:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-rising-cybersecurity-spend-still-isnt-convincing-boards-on-roi-in-apac/</loc>
		<lastmod>2026-02-09T05:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-behave-like-users-but-dont-follow-the-same-rules/</loc>
		<lastmod>2026-02-09T06:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-5-million-misconfigured-git-web-servers-found-exposing-secrets-online/</loc>
		<lastmod>2026-02-09T06:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-telegram-phishing-scam-hijacks-login-flow-to-steal-fully-authorized-user-sessions/</loc>
		<lastmod>2026-02-09T06:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-remote-access-products-hit-by-0-day-rce-vulnerability/</loc>
		<lastmod>2026-02-09T06:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-backed-hackers-target-military-officials-journalists-via-signal/</loc>
		<lastmod>2026-02-09T06:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-taps-virustotal-to-safeguard-ai-agent-skill-ecosystem/</loc>
		<lastmod>2026-02-09T06:21:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-crypto-scanner-tool-helps-developers-identify-quantum-risks-before-q-day/</loc>
		<lastmod>2026-02-09T06:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/united-airlines-ciso-on-building-resilience-when-disruption-is-inevitable/</loc>
		<lastmod>2026-02-09T07:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allama-open-source-ai-security-automation/</loc>
		<lastmod>2026-02-09T07:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersquatting-attacks-exploit-trusted-brands-to-steal-customer-data-and-spread-malware/</loc>
		<lastmod>2026-02-09T07:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mindestens-30-gb-gestohlen-datenleck-bei-dating-app-bumble/</loc>
		<lastmod>2026-02-09T07:21:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mindestens-30-gb-gestohlen-datenleck-bei-dating-app-bumble-2/</loc>
		<lastmod>2026-02-09T07:21:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-amazon-co-als-koder-fur-telefon-betrug/</loc>
		<lastmod>2026-02-09T08:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-developers-prime-cyber-targets-and-a-rising-risk-vector-for-cisos/</loc>
		<lastmod>2026-02-09T08:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-launches-largest-ever-cyber-defense-operation-after-unc3886-targets-all-major-telcos/</loc>
		<lastmod>2026-02-09T08:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-basta-ransomware-integrates-byovd-technique-to-evade-defenses/</loc>
		<lastmod>2026-02-09T08:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instant-messaging-wird-zum-einfallstor-fur-cyberangriffe-sichere-kommunikation-wird-zur-strategischen-pflicht-fur-autobauer/</loc>
		<lastmod>2026-02-09T08:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instant-messaging-wird-zum-einfallstor-fur-cyberangriffe-sichere-kommunikation-wird-zur-strategischen-pflicht-fur-autobauer-2/</loc>
		<lastmod>2026-02-09T08:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behorden-warnen-vor-hackerangriffen-auf-politik-und-militar/</loc>
		<lastmod>2026-02-09T09:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uae-cyber-security-council-warns-stolen-logins-fuel-majority-of-financial-cyberattacks/</loc>
		<lastmod>2026-02-09T09:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/detecting-ransomware-using-windows-minifilters-to-intercept-file-change-events/</loc>
		<lastmod>2026-02-09T09:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-fixes-critical-pre-auth-rce-vulnerability-in-remote-support-and-pra/</loc>
		<lastmod>2026-02-09T09:18:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-netzwerktechnik-als-gefahr-eu-plane-zu-cybersicherheit-peking-warnt-vor-konsequenzen/</loc>
		<lastmod>2026-02-09T09:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenabfluss-moglich-cyberangriff-trifft-eu-kommission/</loc>
		<lastmod>2026-02-09T09:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-supply-chains-as-a-risk-factor/</loc>
		<lastmod>2026-02-09T10:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickr-emails-users-about-data-breach-pins-it-on-third-party/</loc>
		<lastmod>2026-02-09T10:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanias-national-oil-pipeline-firm-conpet-reports-cyberattack/</loc>
		<lastmod>2026-02-09T10:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-discloses-breach-that-exposed-staff-data/</loc>
		<lastmod>2026-02-09T10:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vortex-werewolf-targets-organizations-with-tor-enabled-rdp-smb-sftp-and-ssh-backdoors/</loc>
		<lastmod>2026-02-09T10:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlient-ems-vulnerability-allows-remote-code-execution/</loc>
		<lastmod>2026-02-09T10:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-worm-exploits-cloud-infrastructure-to-build-criminal-infrastructure/</loc>
		<lastmod>2026-02-09T10:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-40000-exposed-openclaw-instances/</loc>
		<lastmod>2026-02-09T10:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-agencies-told-to-scrap-end-of-support-edge-devices/</loc>
		<lastmod>2026-02-09T10:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firewalls-und-mehr-fast-4-000-deutsche-edge-devices-hangen-ohne-support-im-netz/</loc>
		<lastmod>2026-02-09T10:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenabfluss-vermutet-cyberangriff-trifft-eu-kommission/</loc>
		<lastmod>2026-02-09T10:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-3-big-challenges-facing-security-teams-and-how-to-overcome-them/</loc>
		<lastmod>2026-02-09T11:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schrodingers-cat-and-the-enterprise-security-paradox/</loc>
		<lastmod>2026-02-09T11:18:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schrodingers-cat-and-the-enterprise-security-paradox-2/</loc>
		<lastmod>2026-02-09T11:18:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-prognose-die-sechs-wichtigsten-cybersicherheits-trends-fur-2026/</loc>
		<lastmod>2026-02-09T11:18:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-probes-intrusion-into-staff-mobile-management-backend/</loc>
		<lastmod>2026-02-09T11:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linus-torvalds-keeps-his-fingers-and-toes-rule-by-decreeing-next-linux-will-be-version-7-0/</loc>
		<lastmod>2026-02-09T11:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-dknife-spyware-hijacking-internet-routers-since-2019/</loc>
		<lastmod>2026-02-09T11:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exchange-online-flags-legitimate-emails-as-phishing/</loc>
		<lastmod>2026-02-09T11:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-recoverit-tool-abuses-windows-service-failure-recovery-to-execute-malicious-payloads/</loc>
		<lastmod>2026-02-09T11:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-hackers-abuse-trusted-edge-services-to-stealthily-deploy-malware/</loc>
		<lastmod>2026-02-09T11:24:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-media-platforms-earn-billions-from-scam-ads/</loc>
		<lastmod>2026-02-09T11:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-pruft-tuv-nord-rechenzentren-als-gesamtsystem-rechenzentrum-und-sicherheit-diese-schwachstellen-treten-oft-auf/</loc>
		<lastmod>2026-02-09T11:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-ki-cluster-nehmen-zu-shadowray-2-0-nutzt-kritische-ray-schwachstelle/</loc>
		<lastmod>2026-02-09T11:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-als-einfallstor-neue-angriffskampagne-zielt-auf-fuhrungskrafte/</loc>
		<lastmod>2026-02-09T11:29:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-updates-europe-privacy-policy-adding-new-data-categories-2/</loc>
		<lastmod>2026-02-09T12:24:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-updates-europe-privacy-policy-adding-new-data-categories-3/</loc>
		<lastmod>2026-02-09T12:24:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiktok-under-eu-pressure-to-change-its-addictive-algorithm/</loc>
		<lastmod>2026-02-09T12:25:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-here-to-replace-nuclear-treaties-scared-yet/</loc>
		<lastmod>2026-02-09T12:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-digital-surveillance-machine-is-almost-complete/</loc>
		<lastmod>2026-02-09T12:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/men-charged-in-fanduel-scheme-fueled-by-thousands-of-stolen-identities/</loc>
		<lastmod>2026-02-09T12:28:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-clawhub-skills-to-evade-virustotal-via-social-engineering/</loc>
		<lastmod>2026-02-09T12:28:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-targets-uzbekistan-russia-using-netsupport-rat-in-spear-phishing-campaign/</loc>
		<lastmod>2026-02-09T12:29:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridgepay-confirms-ransomware-attack-no-card-data-compromised/</loc>
		<lastmod>2026-02-09T12:30:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwortsicherheit-ihr-passwort-bitte-kaffeetasse/</loc>
		<lastmod>2026-02-09T12:31:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-pro-home-so-nutzen-wir-bitlocker-ganz-ohne-microsoft-kontozwang/</loc>
		<lastmod>2026-02-09T12:33:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/never-settle-how-cisos-can-go-beyond-compliance-standards-to-better-protect-their-organizations/</loc>
		<lastmod>2026-02-09T12:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-sabotage-disrupts-trains-in-northern-italy-as-winter-games-begin/</loc>
		<lastmod>2026-02-09T12:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-securitys-great-wall-problem/</loc>
		<lastmod>2026-02-09T12:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/follow-the-money-switzerland-remains-europes-top-destination-for-tech-pay/</loc>
		<lastmod>2026-02-09T12:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-space-gets-crowded-cyber-threats-from-jamming-to-stalker-satellites-loom-large/</loc>
		<lastmod>2026-02-09T12:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-fixes-easyexploit-pre-auth-rce-vulnerability-in-remote-access-tools-cve-2026-1731/</loc>
		<lastmod>2026-02-09T12:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-kernel-6-19-reaches-stable-release-kernel-7-0-work-is-already-underway/</loc>
		<lastmod>2026-02-09T12:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-updates-europe-privacy-policy-adding-new-data-categories/</loc>
		<lastmod>2026-02-09T12:24:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-integrates-virustotal-malware-scanning-as-security-firms-flag-enterprise-risks/</loc>
		<lastmod>2026-02-09T13:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-integrates-virustotal-malware-scanning-as-security-firms-flag-enterprise-risks-2/</loc>
		<lastmod>2026-02-09T13:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dknife-targets-network-gateways-in-long-running-aitm-campaign/</loc>
		<lastmod>2026-02-09T13:18:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dknife-targets-network-gateways-in-long-running-aitm-campaign-2/</loc>
		<lastmod>2026-02-09T13:19:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-says-china-linked-hackers-targeted-telecom-providers-in-major-spying-campaign/</loc>
		<lastmod>2026-02-09T13:20:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saferday-2026-sichere-entscheidungen-in-einem-ki-gesteuerten-internet/</loc>
		<lastmod>2026-02-09T13:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-signal-qr-codes-to-spy-on-military-and-political-leaders/</loc>
		<lastmod>2026-02-09T13:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-solarwinds-web-help-desk-rce-used-to-drop-custom-malware/</loc>
		<lastmod>2026-02-09T13:24:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scarcruft-exploits-trusted-cloud-services-and-ole-documents-to-deliver-malware/</loc>
		<lastmod>2026-02-09T13:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-top-cisos-solve-burnout-and-speed-up-mttr-without-extra-hiring/</loc>
		<lastmod>2026-02-09T13:26:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-sicher-surfen-in-der-ki-welt-zwischen-chancen-und-gefahren/</loc>
		<lastmod>2026-02-09T13:27:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-pilotprojekten-zur-produktivitat-ki-richtig-einsetzen/</loc>
		<lastmod>2026-02-09T13:27:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-confer-im-test-wie-viel-ki-chatbot-bleibt-wenn-datenschutz-top-prio-hat/</loc>
		<lastmod>2026-02-09T13:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hunderte-frauen-betroffen-mann-kapert-snapchat-konten-und-klaut-nacktbilder/</loc>
		<lastmod>2026-02-09T13:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-dutch-government-announce-hacks-following-ivanti-zero-days-2/</loc>
		<lastmod>2026-02-09T14:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-dutch-government-announce-hacks-following-ivanti-zero-days/</loc>
		<lastmod>2026-02-09T14:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-dev-made-a-llama-with-three-inference-engines/</loc>
		<lastmod>2026-02-09T14:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-solarwinds-web-help-desk-to-install-zoho-agents-and-velociraptor/</loc>
		<lastmod>2026-02-09T14:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uaes-tii-challenges-big-tech-dominance-with-open-source-falcon-ai-models/</loc>
		<lastmod>2026-02-09T14:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-bid-for-dutch-id-infrastructure-raises-sovereignty-concerns/</loc>
		<lastmod>2026-02-09T14:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-targets-meta-over-whatsapp-ai-access-restrictions/</loc>
		<lastmod>2026-02-09T14:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/</loc>
		<lastmod>2026-02-09T14:24:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-apple-paypal-invoice-emails-in-dkim-replay-attack-campaign/</loc>
		<lastmod>2026-02-09T14:25:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-mitigates-cyberattack-aimed-at-employee-mobile-information/</loc>
		<lastmod>2026-02-09T14:25:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-ltx-stealer-emerges-as-new-threat-to-login-credentials/</loc>
		<lastmod>2026-02-09T14:26:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-the-hidden-costs-of-supply-chain-attacks/</loc>
		<lastmod>2026-02-09T14:27:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-ai-skill-malware-31tbps-ddos-notepad-hack-llm-backdoors-and-more/</loc>
		<lastmod>2026-02-09T14:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kurz-vor-olympia-italien-wehrt-russische-hackerangriffe-ab/</loc>
		<lastmod>2026-02-09T14:29:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/di-day-je-weniger-us-basierter-dreck-desto-besser/</loc>
		<lastmod>2026-02-09T14:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-grants-asylum-to-spanish-professor-wanted-for-alleged-pro-moscow-cyber-operations/</loc>
		<lastmod>2026-02-09T15:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payment-tech-provider-for-texas-florida-governments-working-with-fbi-to-resolve-ransomware-attack/</loc>
		<lastmod>2026-02-09T15:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-data-watchdog-snitches-on-itself-after-getting-caught-in-ivanti-zero-day-attacks/</loc>
		<lastmod>2026-02-09T15:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/taiwan-tells-uncle-sam-its-chip-ecosystem-aint-going-anywhere/</loc>
		<lastmod>2026-02-09T15:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-ip-integrates-with-ibm-qradar-to-deliver-real-time-threat-intelligence-across-siem-and-soar/</loc>
		<lastmod>2026-02-09T15:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-probes-cyberattack-on-mobile-device-management-system/</loc>
		<lastmod>2026-02-09T15:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridgepay-ransomware-causes-widespread-payment-outages/</loc>
		<lastmod>2026-02-09T15:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-exposes-hundreds-of-open-source-vulnerabilities/</loc>
		<lastmod>2026-02-09T15:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-adds-virustotal-scanning-to-ai-agent-marketplace/</loc>
		<lastmod>2026-02-09T15:24:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-vulnerability-allows-pre-auth-remote-code-execution/</loc>
		<lastmod>2026-02-09T15:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-hit-by-cyberattackers-targeting-mobile-management-platform/</loc>
		<lastmod>2026-02-09T15:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proaktiv-statt-reaktiv-durch-automatisierung-proaktiv-statt-reaktiv-durch-automatisierung/</loc>
		<lastmod>2026-02-09T15:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/40-prozent-der-android-smartphones-unsicher-was-du-uber-diese-google-statistik-wissen-musst/</loc>
		<lastmod>2026-02-09T15:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-hack-in-3-minuten-ki-netzwerk-offenbart-massive-sicherheitslucke-2/</loc>
		<lastmod>2026-02-09T15:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-hack-in-3-minuten-ki-netzwerk-offenbart-massive-sicherheitslucke/</loc>
		<lastmod>2026-02-09T15:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-hack-in-3-minuten-ki-netzwerk-offenbart-massive-sicherheitslucke-3/</loc>
		<lastmod>2026-02-09T15:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-aufgedeckt-ein-sprachbefehl-reicht-um-diesen-roboter-zu-ubernehmen/</loc>
		<lastmod>2026-02-09T15:31:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-anthropic-claude-extensions-can-lead-to-rce-in-google-calendar-layerx/</loc>
		<lastmod>2026-02-09T16:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-group-breached-smartertools-via-flaw-in-its-smartermail-deployment/</loc>
		<lastmod>2026-02-09T16:18:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flickrs-35m-users-affected-by-third-party-data-exposure/</loc>
		<lastmod>2026-02-09T16:18:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shortlist-most-inspiring-women-in-cyber-awards-2026/</loc>
		<lastmod>2026-02-09T16:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-guessing-without-ai-how-attackers-build-targeted-wordlists/</loc>
		<lastmod>2026-02-09T16:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-ip-integrates-with-ibm-qradar-to-deliver-real-time-threat-intelligence-across-siem-and-soar-2/</loc>
		<lastmod>2026-02-09T16:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-web-help-desk-exploited-for-rce-in-multi-stage-attacks-on-exposed-servers/</loc>
		<lastmod>2026-02-09T16:22:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-exhibits-multi-cloud-capabilities-and-ai-code/</loc>
		<lastmod>2026-02-09T16:24:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gobruteforcer-botnetz-nutzt-schwache-passworter-fur-angriffe-auf-webserver/</loc>
		<lastmod>2026-02-09T16:24:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-data-highlights-online-threats-to-consumers-and-businesses/</loc>
		<lastmod>2026-02-09T17:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-target-solarwinds-web-help-desk-flaw/</loc>
		<lastmod>2026-02-09T17:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/</loc>
		<lastmod>2026-02-09T17:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-connecticut-men-charged-in-alleged-3m-gambling-fraud-scheme/</loc>
		<lastmod>2026-02-09T17:19:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-revolution-reshapes-ciso-spending-for-2026-security-leaders-prioritize-defense-automation/</loc>
		<lastmod>2026-02-09T18:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-technical-documents-show-china-rehearsing-cyberattacks-on-neighbors-critical-infrastructure/</loc>
		<lastmod>2026-02-09T18:17:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-whatsapp-likely-broke-antitrust-law-by-blocking-rival-ai/</loc>
		<lastmod>2026-02-09T18:18:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-135000-openclaw-instances-exposed-to-internet-in-latest-vibe-coded-disaster/</loc>
		<lastmod>2026-02-09T18:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zero-click-flaw-in-claude-desktop-extensions-anthropic-declines-fix/</loc>
		<lastmod>2026-02-09T18:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-irgendwo-zwischen-idealismus-und-alltagstauglichkeit/</loc>
		<lastmod>2026-02-09T18:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attack-hits-european-commission-staff-mobile-systems/</loc>
		<lastmod>2026-02-09T19:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-zero-days-likely-deployed-in-eu-and-dutch-hacks/</loc>
		<lastmod>2026-02-09T19:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-banks-can-limit-losses-from-first-party-fraud/</loc>
		<lastmod>2026-02-09T19:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-unc3886-targets-singapore-telecom-sector-in-cyber-espionage-campaign/</loc>
		<lastmod>2026-02-09T19:18:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-bolsters-zero-trust-arsenal-with-acquisition-of-browser-security-firm-squarex-2/</loc>
		<lastmod>2026-02-09T20:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-bolsters-zero-trust-arsenal-with-acquisition-of-browser-security-firm-squarex/</loc>
		<lastmod>2026-02-09T20:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-bolsters-zero-trust-arsenal-with-acquisition-of-browser-security-firm-squarex-3/</loc>
		<lastmod>2026-02-09T20:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senegal-confirms-breach-of-national-id-card-department-after-ransomware-claims/</loc>
		<lastmod>2026-02-09T20:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orion-secures-32m-to-target-dlps-false-positive-problem/</loc>
		<lastmod>2026-02-09T20:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-creating-insider-security-threat-blind-spots-research-finds/</loc>
		<lastmod>2026-02-09T20:19:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-smartertools-network-using-flaw-in-its-own-software/</loc>
		<lastmod>2026-02-09T20:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-fixes-critical-pre-auth-bug-allowing-remote-code-execution/</loc>
		<lastmod>2026-02-09T21:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/admin-rights-are-a-vulnerability-not-an-enabler/</loc>
		<lastmod>2026-02-09T21:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/23andme-data-breach-settlement-deadline-is-near-heres-how-much-you-could-get/</loc>
		<lastmod>2026-02-09T21:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-over-1-billion-android-phones-are-now-at-risk/</loc>
		<lastmod>2026-02-09T21:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-solarwinds-whd-flaws-to-deploy-dfir-tool-in-attacks/</loc>
		<lastmod>2026-02-09T21:19:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-basta-bundles-byovd-with-ransomware-payload/</loc>
		<lastmod>2026-02-09T21:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-to-require-video-selfies-or-government-ids-to-verify-all-users-ages/</loc>
		<lastmod>2026-02-09T22:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-deliver-global-group-ransomware-offline-via-phishing-emails/</loc>
		<lastmod>2026-02-09T22:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlientems-flaw-allows-remote-code-execution/</loc>
		<lastmod>2026-02-09T22:18:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-transforming-the-chief-data-officer-role/</loc>
		<lastmod>2026-02-09T22:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mclaren-health-will-pay-14m-to-settle-lawsuits-in-2-attacks/</loc>
		<lastmod>2026-02-09T22:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10k-claude-desktop-users-exposed-by-zero-click-vulnerability/</loc>
		<lastmod>2026-02-09T22:21:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-cyber-attacks-on-polish-utilities-draws-ncsc-alert/</loc>
		<lastmod>2026-02-09T22:22:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-turns-cloud-infrastructure-into-crime-bots/</loc>
		<lastmod>2026-02-09T22:22:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fallout-from-latest-ivanti-zero-days-spreads-to-nearly-100-victims/</loc>
		<lastmod>2026-02-09T23:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/someones-attacking-solarwinds-whd-to-steal-highprivilege-credentials-but-we-dont-know-who-or-how/</loc>
		<lastmod>2026-02-09T23:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sanctioned-bulletproof-host-tied-to-dns-hijacking/</loc>
		<lastmod>2026-02-09T23:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norway-says-salt-typhoon-hackers-hit-vulnerable-systems/</loc>
		<lastmod>2026-02-09T23:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-cyberspies-breach-singapores-four-largest-telcos/</loc>
		<lastmod>2026-02-09T23:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warlock-gang-breaches-smartertools-via-smartermail-bugs/</loc>
		<lastmod>2026-02-09T23:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-plattform-privatheit-fordert-verbesserten-datenschutz-fur-kinder/</loc>
		<lastmod>2026-02-10T00:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-hit-by-mobile-management-data-breach/</loc>
		<lastmod>2026-02-10T00:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-dxt-poses-critical-rce-vulnerability-by-running-with-full-system-privileges/</loc>
		<lastmod>2026-02-10T04:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-dxt-poses-critical-rce-vulnerability-by-running-with-full-system-privileges-2/</loc>
		<lastmod>2026-02-10T04:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critics-warn-americas-move-fast-ai-strategy-could-cost-it-the-global-market/</loc>
		<lastmod>2026-02-10T04:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-makes-aadhaar-more-ubiquitous-but-critics-say-security-and-privacy-concerns-remain/</loc>
		<lastmod>2026-02-10T04:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reynolds-bundles-byovd-with-ransomware-payload/</loc>
		<lastmod>2026-02-10T04:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-using-ivanti-epmm-flaws-to-install-stealth-backdoors/</loc>
		<lastmod>2026-02-10T06:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-it-workers-use-stolen-linkedin-identities-to-secure-remote-employment/</loc>
		<lastmod>2026-02-10T06:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/0-click-rce-found-in-claude-desktop-extensions-putting-10000-users-at-risk/</loc>
		<lastmod>2026-02-10T06:17:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-wenn-bots-den-digitalen-alltag-dominieren/</loc>
		<lastmod>2026-02-10T07:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-moltbook-ki-agenten-die-handeln-und-die-hacker-die-zuschauen/</loc>
		<lastmod>2026-02-10T07:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/17-whatsapp-betrugsmaschen-die-sie-kennen-sollten-und-wie-sie-sich-schutzen/</loc>
		<lastmod>2026-02-10T07:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-mounts-largest-ever-cyber-operation-to-oust-apt-actor/</loc>
		<lastmod>2026-02-10T07:19:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-cybersecurity-knowledge-walks-out-the-door/</loc>
		<lastmod>2026-02-10T07:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-scams-are-eroding-trust-in-calls-messages-and-meetings/</loc>
		<lastmod>2026-02-10T07:22:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloody-wolf-cybercrime-group-uses-netsupport-rat-to-breach-organizations/</loc>
		<lastmod>2026-02-10T07:22:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-target-singapore-telecoms-in-edge-device-compromise-campaign/</loc>
		<lastmod>2026-02-10T07:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-acknowledges-exchange-online-spam-filter-mistakenly-blocks-valid-email/</loc>
		<lastmod>2026-02-10T07:24:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-patches-critical-sqli-flaw-enabling-unauthenticated-code-execution/</loc>
		<lastmod>2026-02-10T07:25:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/untersuchung-von-tenable-kritische-sicherheitslucken-in-business-intelligence-tool-google-looker/</loc>
		<lastmod>2026-02-10T07:26:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-govern-agentic-ai-so-as-not-to-lose-control/</loc>
		<lastmod>2026-02-10T08:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/69-of-cisos-open-to-career-move-including-leaving-role-entirely/</loc>
		<lastmod>2026-02-10T08:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25-million-users-affected-as-ai-chat-platform-leaks-300-million-messages/</loc>
		<lastmod>2026-02-10T08:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guloader-leverages-polymorphic-malware-and-trusted-cloud-infrastructure-to-evade-detection/</loc>
		<lastmod>2026-02-10T08:19:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-sponsored-hackers-targeting-defence-sector-employees-google-says/</loc>
		<lastmod>2026-02-10T08:20:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonome-ki-agenten-handeln-schneller-als-security-teams-reagieren-schatten-ki-und-maschinenidentitaten-uberfordern-unternehmen/</loc>
		<lastmod>2026-02-10T08:21:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-moltbook-ki-agenten-die-handeln-und-die-menschen-die-zuschauen/</loc>
		<lastmod>2026-02-10T09:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zentrales-it-thema-algorithmen-und-datenstrukturen-fur-dummies-neuerscheinung-zum-verstandlichen-einstieg/</loc>
		<lastmod>2026-02-10T09:16:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-is-reshaping-attack-path-analysis/</loc>
		<lastmod>2026-02-10T09:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/face-scans-and-id-checks-are-coming-to-discord/</loc>
		<lastmod>2026-02-10T09:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fugitive-behind-73m-pig-butchering-scheme-gets-20-years-in-prison/</loc>
		<lastmod>2026-02-10T09:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fancy-bear-exploits-microsoft-zero-day-to-deploy-backdoors-and-email-stealers/</loc>
		<lastmod>2026-02-10T09:21:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15200-openclaw-control-panels-exposed-online-with-full-system-access/</loc>
		<lastmod>2026-02-10T09:21:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-authorities-confirm-ivanti-zero-day-exploit-exposed-employee-contact-data/</loc>
		<lastmod>2026-02-10T09:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-und-langzeitarchivierung-s3-kompatible-archivspeicherlosung-fur-managedprovider/</loc>
		<lastmod>2026-02-10T09:24:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harmlose-mails-verschwunden-microsoft-gesteht-phishing-panne-bei-exchange-online/</loc>
		<lastmod>2026-02-10T09:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fiig-securities-fined-au2-5-million-following-prolonged-cybersecurity-failures/</loc>
		<lastmod>2026-02-10T10:16:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enisa-updates-its-international-strategy-to-strengthen-eus-cybersecurity-cooperation/</loc>
		<lastmod>2026-02-10T10:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-mica-a-practical-compliance-guide-for-european-casps/</loc>
		<lastmod>2026-02-10T10:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt-unc3886-targets-singapore-telcos/</loc>
		<lastmod>2026-02-10T10:19:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/artificial-intelligence-now-finance-sectors-connective-tissue/</loc>
		<lastmod>2026-02-10T10:21:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/duckduckgo-enables-ai-voice-chat-without-saving-voice-data/</loc>
		<lastmod>2026-02-10T10:21:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-weaponize-windows-shortcut-files-to-deploy-global-group-ransomware/</loc>
		<lastmod>2026-02-10T10:22:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-vulnerability-allows-attackers-to-trigger-dos-and-crash-node-js-servers/</loc>
		<lastmod>2026-02-10T10:24:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-governments-breached-in-zero-day-attacks-targeting-ivanti/</loc>
		<lastmod>2026-02-10T10:25:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-so-profitieren-anbieter-von-einer-sichereren-digitalen-welt/</loc>
		<lastmod>2026-02-10T10:25:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-legt-defizite-in-der-ki-sicherheit-offen/</loc>
		<lastmod>2026-02-10T10:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/podcast-besser-wissen-politische-radiopiraten-in-deutschland/</loc>
		<lastmod>2026-02-10T10:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-army-splashes-86m-on-ai-gear-to-speed-up-the-battlefield-kill-chain/</loc>
		<lastmod>2026-02-10T11:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-agencies-hit-by-ivanti-epmm-exploit-exposing-employee-contact-data/</loc>
		<lastmod>2026-02-10T11:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-error-reporting-flaw-allows-attackers-to-elevate-privileges/</loc>
		<lastmod>2026-02-10T11:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-lieferte-monatelang-backdoors-statt-updates-notepad-super-gau-wie-das-admin-tool-zur-apt-waffe-wurde/</loc>
		<lastmod>2026-02-10T11:18:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firemon-und-illumio-stellen-erste-zero-trust-control-plane-fur-hybride-unternehmen-vor/</loc>
		<lastmod>2026-02-10T11:19:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionenschaden-glucksspielportale-mit-3-000-geklauten-identitaten-betrogen/</loc>
		<lastmod>2026-02-10T11:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ist-ein-weckruf-fur-die-ki-sicherheit/</loc>
		<lastmod>2026-02-10T12:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saferday-zero-trust-prinzipien-ermoglichen-es-daten-souveran-zu-kontrollieren/</loc>
		<lastmod>2026-02-10T12:17:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ubernimmt-squarex-und-weitet-zero-trust-sicherheit-auf-den-browser-aus/</loc>
		<lastmod>2026-02-10T12:18:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ubernimmt-squarex-und-weitet-zero-trust-sicherheit-auf-den-browser-aus-2/</loc>
		<lastmod>2026-02-10T12:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-17000-volvo-staff-dinged-in-supplier-breach/</loc>
		<lastmod>2026-02-10T12:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1069-targets-financial-firms-with-new-tools-and-ai-driven-social-engineering-attacks/</loc>
		<lastmod>2026-02-10T12:22:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-linux-c2-uses-llm-generated-malware-with-kernel-level-stealth/</loc>
		<lastmod>2026-02-10T12:23:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warlock-ransomware-breaches-smartertools-through-unpatched-smartermail-server/</loc>
		<lastmod>2026-02-10T12:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-issues-warning-over-severe-cyber-attacks-targeting-critical-national-infrastructure/</loc>
		<lastmod>2026-02-10T12:24:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lucken-bei-der-datensicherheit-wo-unternehmen-beim-datenschutz-nachscharfen-mussen/</loc>
		<lastmod>2026-02-10T12:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lucken-bei-der-datensicherheit-wo-unternehmen-beim-datenschutz-nachscharfen-mussen-2/</loc>
		<lastmod>2026-02-10T12:26:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-shortcut-weaponized-in-phorpiex-linked-ransomware-campaign/</loc>
		<lastmod>2026-02-10T13:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-shortcut-weaponized-in-phorpiex-linked-ransomware-campaign-2/</loc>
		<lastmod>2026-02-10T13:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/single-prompt-breaks-ai-safety-in-15-major-language-models/</loc>
		<lastmod>2026-02-10T13:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pride-month-phishing-targets-employees-via-trusted-email-services/</loc>
		<lastmod>2026-02-10T13:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senegal-shuts-national-id-office-after-ransomware-attack/</loc>
		<lastmod>2026-02-10T13:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-solarwinds-whd-instances-under-active-attack/</loc>
		<lastmod>2026-02-10T13:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-turns-cloud-misconfigurations-into-a-self-propagating-cybercrime-platform/</loc>
		<lastmod>2026-02-10T13:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socelars-malware-targets-windows-systems-to-steal-sensitive-data/</loc>
		<lastmod>2026-02-10T13:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-targets-linux-systems-with-new-tools-designed-to-disrupt-services/</loc>
		<lastmod>2026-02-10T13:25:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponize-bing-ads-for-azure-tech-support-scams/</loc>
		<lastmod>2026-02-10T13:26:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zast-ai-raises-6m-pre-a-to-scale-zero-false-positive-ai-powered-code-security/</loc>
		<lastmod>2026-02-10T13:27:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-takes-down-chinese-hackers-targeting-telco-networks/</loc>
		<lastmod>2026-02-10T13:28:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-chinesische-cyberkriminelle-im-dienst-der-spionage/</loc>
		<lastmod>2026-02-10T13:29:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojaner-an-bord-mit-schadcode-verseuchte-7-zip-version-in-umlauf/</loc>
		<lastmod>2026-02-10T13:30:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-supreme-courts-third-party-subpoena-doctrine-empowers-governments-to-seize-sensitive-information-without-your-knowledge/</loc>
		<lastmod>2026-02-10T14:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-spent-11-months-booting-china-linked-snoops-out-of-telco-networks/</loc>
		<lastmod>2026-02-10T14:17:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bbc-bumps-telly-tax-to-180-as-netflix-lurks-with-cheaper-tiers/</loc>
		<lastmod>2026-02-10T14:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-announces-new-mobile-style-windows-security-controls/</loc>
		<lastmod>2026-02-10T14:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerodayrat-malware-grants-full-access-to-android-ios-devices/</loc>
		<lastmod>2026-02-10T14:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-7-zip-downloads-to-turn-home-pcs-into-proxy-nodes/</loc>
		<lastmod>2026-02-10T14:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-vulnerability-exploited-in-the-wild-analysts-warn/</loc>
		<lastmod>2026-02-10T14:24:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-security-patch-day-fixes-critical-code-injection-flaw-in-sap-crm-and-s-4hana/</loc>
		<lastmod>2026-02-10T14:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transunions-real-networks-deal-focuses-on-robocall-blocking/</loc>
		<lastmod>2026-02-10T14:26:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-organizations-need-to-change-when-managing-printers/</loc>
		<lastmod>2026-02-10T14:27:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/satellitendaten-abgefangen-frankreich-nimmt-vier-mutmasliche-chinesische-spione-fest/</loc>
		<lastmod>2026-02-10T14:28:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-sase-platform-now-prevents-sensitive-data-from-being-shared-with-ai/</loc>
		<lastmod>2026-02-10T15:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-eu-kommission/</loc>
		<lastmod>2026-02-10T15:19:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-crypto-scammer-sentenced-in-absentia-to-20-years-after-fleeing-us/</loc>
		<lastmod>2026-02-10T15:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-warns-of-state-linked-phishing-campaign-targeting-journalists-government-officials/</loc>
		<lastmod>2026-02-10T15:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-engagement-data-is-compromised-and-thats-a-major-security-problem/</loc>
		<lastmod>2026-02-10T15:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-7-zip-downloads-turn-home-computers-into-proxy-nodes/</loc>
		<lastmod>2026-02-10T15:23:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coming-soon-discord-to-roll-out-global-age-verification-using-facial-scans-id/</loc>
		<lastmod>2026-02-10T15:24:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-gen-spotlights-turning-behavioural-intelligence-into-a-powerful-tool-against-fraud-and-crime-qa-with-paddy-lawton-co-founder-of-fact360/</loc>
		<lastmod>2026-02-10T15:25:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-addressing-the-age-of-artificial-intelligence/</loc>
		<lastmod>2026-02-10T15:26:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-ransomware-to-residency-inside-the-rise-of-the-digital-parasite/</loc>
		<lastmod>2026-02-10T15:27:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-parasite-warning-as-attackers-favor-stealth-for-extortion/</loc>
		<lastmod>2026-02-10T15:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mobile-spyware-zerodayrat-targets-android-and-ios/</loc>
		<lastmod>2026-02-10T15:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/barracuda-ceo-rohit-ghai-on-accelerating-true-platform-in-security-for-msps/</loc>
		<lastmod>2026-02-10T16:19:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-targeted-crypto-exec-with-fake-zoom-meeting-clickfix-scam/</loc>
		<lastmod>2026-02-10T16:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-opus-4-6-spends-20k-trying-to-write-a-c-compiler/</loc>
		<lastmod>2026-02-10T16:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-opus-4-6-spends-20k-trying-to-write-a-c-compiler-2/</loc>
		<lastmod>2026-02-10T16:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cybercrime-group-0apt-accused-of-faking-hundreds-of-breach-claims/</loc>
		<lastmod>2026-02-10T16:23:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reco-secures-30m-as-enterprises-struggle-with-governing-ai/</loc>
		<lastmod>2026-02-10T16:25:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bing-ads-abused-to-deliver-azure-hosted-tech-support-scams/</loc>
		<lastmod>2026-02-10T16:26:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-telcos-breached-in-china-linked-cyber-espionage-campaign/</loc>
		<lastmod>2026-02-10T16:27:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tightens-windows-security-with-app-transparency-and-user-consent/</loc>
		<lastmod>2026-02-10T16:28:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-outage-takes-down-admin-center-in-north-america/</loc>
		<lastmod>2026-02-10T16:29:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-automate-aws-incident-investigation-with-tines-and-ai/</loc>
		<lastmod>2026-02-10T16:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-attacks-get-scary-with-livingthe-plant-techniques/</loc>
		<lastmod>2026-02-10T16:32:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools/</loc>
		<lastmod>2026-02-10T16:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools-2/</loc>
		<lastmod>2026-02-10T16:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acronis-cyberthreats-update-web-bedrohungen-legen-um-82-prozent-zu/</loc>
		<lastmod>2026-02-10T16:36:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-power-grid-hack-offers-lessons-for-critical-infrastructure-operators-cisa-says/</loc>
		<lastmod>2026-02-10T17:28:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-to-meet-with-gop-lawmakers-on-fisa-section-702-renewal/</loc>
		<lastmod>2026-02-10T17:29:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-major-poland-energy-grid-cyberattack-cisa-issues-warning-to-u-s-audience/</loc>
		<lastmod>2026-02-10T17:30:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safer-internet-day-2026-impuls-fur-sichere-entscheidungen-im-ki-gesteuerten-internet/</loc>
		<lastmod>2026-02-10T17:31:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-says-china-backed-hackers-targeted-its-four-largest-phone-companies/</loc>
		<lastmod>2026-02-10T17:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vega-raises-120m-series-b-to-rethink-how-enterprises-detect-cyber-threats/</loc>
		<lastmod>2026-02-10T17:33:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerodayrat-spyware-grants-attackers-total-access-to-mobile-devices/</loc>
		<lastmod>2026-02-10T17:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-ever-international-ai-safety-report-published/</loc>
		<lastmod>2026-02-10T17:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phorpiex-phishing-delivers-low-noise-global-group-ransomware/</loc>
		<lastmod>2026-02-10T17:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-fuhrt-armis-centrix-fur-application-security-ein/</loc>
		<lastmod>2026-02-10T17:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-prepares-to-refresh-secure-boots-digital-certificate/</loc>
		<lastmod>2026-02-10T18:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-epmm-exploitation-widespread-as-governments-others-targeted/</loc>
		<lastmod>2026-02-10T18:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-in-grosunternehmen-bessere-abwehr-sinkende-kosten-aber-weiterhin-konstanter-druck-auf-die-it/</loc>
		<lastmod>2026-02-10T18:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/picus-red-report-2026-shows-attackers-favor-stealth-over-disruption/</loc>
		<lastmod>2026-02-10T18:18:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/volvo-group-north-america-customer-data-exposed-in-conduent-hack/</loc>
		<lastmod>2026-02-10T18:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rolls-out-new-secure-boot-certificates-before-june-expiration/</loc>
		<lastmod>2026-02-10T18:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-operatives-impersonate-professionals-on-linkedin-to-infiltrate-companies/</loc>
		<lastmod>2026-02-10T18:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-studie-beleuchtet-ransomware-erfahrungen-in-grosunternehmen/</loc>
		<lastmod>2026-02-10T18:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/krypto-betrug-auf-rekordniveau-sicherheitsrisiken-im-digitalen-finanzmarkt/</loc>
		<lastmod>2026-02-10T18:23:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-original-secure-boot-certificates-expire-in-june-heres-what-you-need-to-do/</loc>
		<lastmod>2026-02-10T19:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-datensouveranitat-ohne-sovereign-sase-nicht-funktioniert/</loc>
		<lastmod>2026-02-10T19:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/messbare-wordpress-performancesteigerung-ttfb-core-web-vitals-und-wo-nvme-wirklich-hilft/</loc>
		<lastmod>2026-02-10T19:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-spill-secrets-just-by-previewing-malicious-links/</loc>
		<lastmod>2026-02-10T19:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/writing-ransomware-using-ai-to-get-rich-dont-bet-the-farm/</loc>
		<lastmod>2026-02-10T19:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/</loc>
		<lastmod>2026-02-10T19:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077181-kb5075941-cumulative-updates-released/</loc>
		<lastmod>2026-02-10T19:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077181-kb5075941-cumulative-updates-released-2/</loc>
		<lastmod>2026-02-10T19:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077181-kb5075941-cumulative-updates-released-3/</loc>
		<lastmod>2026-02-10T19:22:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10k-claude-desktop-users-exposed-by-zero-click-vulnerability-2/</loc>
		<lastmod>2026-02-10T20:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-7-zip-site-distributes-installer-laced-with-proxy-tool/</loc>
		<lastmod>2026-02-10T20:18:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-windows-10-kb5075912-extended-security-update/</loc>
		<lastmod>2026-02-10T20:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-helped-us-find-vulnerabilities-in-xeons-tdx-security-feature/</loc>
		<lastmod>2026-02-10T20:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortisandbox-xss-vulnerability-allows-remote-command-execution/</loc>
		<lastmod>2026-02-10T20:17:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-matches-last-years-zero-day-high-with-six-actively-exploited-vulnerabilities/</loc>
		<lastmod>2026-02-10T21:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sent-personal-and-financial-information-of-student-journalist-to-ice/</loc>
		<lastmod>2026-02-10T21:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-tools-for-test-data-management-to-accelerate-qa-teams-in-2026/</loc>
		<lastmod>2026-02-10T21:18:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/billing-services-firm-notifying-medical-lab-patients-of-hack/</loc>
		<lastmod>2026-02-10T21:19:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-out-0apt-data-leak-ransomware-group-branded-a-scam/</loc>
		<lastmod>2026-02-10T21:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortios-authentication-bypass-exposes-vpn-and-sso-deployments-2/</loc>
		<lastmod>2026-02-10T21:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortios-authentication-bypass-exposes-vpn-and-sso-deployments/</loc>
		<lastmod>2026-02-10T21:22:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-discloses-extraordinarily-high-number-of-zero-day-vulnerabilities-researcher/</loc>
		<lastmod>2026-02-10T22:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-command-nsa-nominee-rudd-advances-to-senate-floor/</loc>
		<lastmod>2026-02-10T22:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-approves-32b-google-wiz-purchase-after-antitrust-review/</loc>
		<lastmod>2026-02-10T22:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-expands-iphone-drivers-licenses-to-7-us-states/</loc>
		<lastmod>2026-02-10T22:18:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-bypassing-mfa-zerodayrat-is-textbook-stalkerware/</loc>
		<lastmod>2026-02-10T22:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-6-actively-exploited-zero-days/</loc>
		<lastmod>2026-02-10T22:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-sees-little-post-quantum-computing-encryption-progress/</loc>
		<lastmod>2026-02-10T23:15:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-valentines-gift-to-admins-6-exploited-zero-day-fixes/</loc>
		<lastmod>2026-02-10T23:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-beefs-up-runtime-security/</loc>
		<lastmod>2026-02-10T23:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-relentless-cyber-siege-on-defense-industry/</loc>
		<lastmod>2026-02-10T23:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks/</loc>
		<lastmod>2026-02-10T23:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-whd-attacks-highlight-risks-of-exposed-apps/</loc>
		<lastmod>2026-02-10T23:21:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-security-updates-for-february-2026-fix-six-actively-exploited-zero-days/</loc>
		<lastmod>2026-02-11T00:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/</loc>
		<lastmod>2026-02-11T00:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mission-baltic-sentry-reaktionszeit-bei-seekabelbruch-auf-eine-stunde-verkurzt/</loc>
		<lastmod>2026-02-11T00:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/majority-of-ivanti-epmm-threat-activity-linked-to-hidden-ip/</loc>
		<lastmod>2026-02-11T17:23:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lummastealer-infections-surge-after-castleloader-malware-campaigns/</loc>
		<lastmod>2026-02-11T17:24:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-fur-macos-versteckt-sich-in-den-google-suchergebnissen-so-schutzt-ihr-euch-davor/</loc>
		<lastmod>2026-02-11T17:25:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimwolf-botnet-swamps-anonymity-network-i2p/</loc>
		<lastmod>2026-02-11T18:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-10m-to-25m-conduent-breach-balloons-into-one-of-2025s-largest/</loc>
		<lastmod>2026-02-11T18:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-security-starter-kit-where-autonomous-systems-fail-and-how-to-defend-against-it/</loc>
		<lastmod>2026-02-11T19:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-awareness-4/</loc>
		<lastmod>2026-02-11T19:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-awareness-3/</loc>
		<lastmod>2026-02-11T19:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-awareness-2/</loc>
		<lastmod>2026-02-11T19:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-awareness/</loc>
		<lastmod>2026-02-11T19:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-to-start-assuming-all-users-are-underage-unless-they-prove-otherwise/</loc>
		<lastmod>2026-02-11T19:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-boffins-figured-out-how-to-break-llm-safety-guardrails-with-one-simple-prompt-2/</loc>
		<lastmod>2026-02-11T19:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-boffins-figured-out-how-to-break-llm-safety-guardrails-with-one-simple-prompt/</loc>
		<lastmod>2026-02-11T19:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-21514-actively-exploited-word-flaw-evades-ole-security/</loc>
		<lastmod>2026-02-11T19:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proactive-strategies-for-cyber-resilience-with-wazuh/</loc>
		<lastmod>2026-02-11T19:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-16-part-epoxy/</loc>
		<lastmod>2026-02-11T20:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-gitguardian-raises-50m-to-tackle-non-human-identities-crisis-ai-agent-security-gap/</loc>
		<lastmod>2026-02-11T20:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/georgia-healthcare-company-data-breach-impacts-more-than-620000/</loc>
		<lastmod>2026-02-11T20:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erecht24-startet-ki-day-2026-live-event-fur-rechtssichere-ki-nutzung-2/</loc>
		<lastmod>2026-02-11T20:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erecht24-startet-ki-day-2026-live-event-fur-rechtssichere-ki-nutzung/</loc>
		<lastmod>2026-02-11T20:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erecht24-startet-ki-day-2026-live-event-fur-rechtssichere-ki-nutzung-3/</loc>
		<lastmod>2026-02-11T20:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices/</loc>
		<lastmod>2026-02-11T20:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/posting-ai-generated-caricatures-on-social-media-is-risky-infosec-killjoys-warn/</loc>
		<lastmod>2026-02-11T20:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/posting-ai-generated-caricatures-on-social-media-is-risky-infosec-killjoys-warn-2/</loc>
		<lastmod>2026-02-11T20:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-malware-exploits-react2shell-for-tiny-profit/</loc>
		<lastmod>2026-02-11T20:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-25646-legacy-libpng-flaw-poses-rce-risk/</loc>
		<lastmod>2026-02-11T20:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/london-assembly-member-police-should-halt-facial-recognition-technology-use/</loc>
		<lastmod>2026-02-11T20:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-releases-vm-based-obfuscation-the-next-evolution-in-client-side-detection-security/</loc>
		<lastmod>2026-02-11T20:09:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-security-interviews-mick-baccio-splunk/</loc>
		<lastmod>2026-02-11T20:10:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alteryx-and-advania-share-ai-insights/</loc>
		<lastmod>2026-02-11T20:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cios-discuss-friction-between-legacy-it-and-innovation/</loc>
		<lastmod>2026-02-11T20:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-targets-mid-market-security-gap-in-apac/</loc>
		<lastmod>2026-02-11T20:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crazy-ransomware-gang-abuses-employee-monitoring-tool-in-attacks/</loc>
		<lastmod>2026-02-11T20:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrest-seller-of-jokerotp-mfa-passcode-capturing-tool/</loc>
		<lastmod>2026-02-11T20:15:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrest-seller-of-jokerotp-mfa-passcode-capturing-tool-2/</loc>
		<lastmod>2026-02-11T20:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stay-on-top-of-future-threats-with-a-cutting-edge-soc/</loc>
		<lastmod>2026-02-11T20:16:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-penetration-testing-definition-policy-tools-and-process/</loc>
		<lastmod>2026-02-11T21:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-penetration-testing-definition-policy-tools-and-process-2/</loc>
		<lastmod>2026-02-11T21:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/40-state-ags-warn-house-kosa-bill-falls-short-of-protecting-children-online/</loc>
		<lastmod>2026-02-11T21:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-ai-doctor-doesnt-have-to-follow-the-same-privacy-rules-as-your-real-one/</loc>
		<lastmod>2026-02-11T21:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/volvo-group-hit-in-massive-conduent-data-breach/</loc>
		<lastmod>2026-02-11T21:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/should-cisos-plan-for-government-as-an-adversary/</loc>
		<lastmod>2026-02-11T21:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automaker-secures-the-supply-chain-with-developer-friendly-platform/</loc>
		<lastmod>2026-02-11T21:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-vishing-attacks-targeting-okta-and-other-idps-2/</loc>
		<lastmod>2026-02-11T22:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-vishing-attacks-targeting-okta-and-other-idps/</loc>
		<lastmod>2026-02-11T22:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-widespread-adoption-of-ai-hasnt-yet-reduced-cybersecurity-burnout/</loc>
		<lastmod>2026-02-11T22:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-and-explaining-malware-promotion-via-app-promotion-graph/</loc>
		<lastmod>2026-02-11T22:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interim-cisa-chief-when-the-government-shuts-down-cyber-threats-do-not/</loc>
		<lastmod>2026-02-11T22:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interim-cisa-chief-when-the-government-shuts-down-cyber-threats-do-not-2/</loc>
		<lastmod>2026-02-11T22:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interim-cisa-chief-when-the-government-shuts-down-cyber-threats-do-not-3/</loc>
		<lastmod>2026-02-11T22:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-hackers-are-exploiting-critical-zero-day-bugs-to-target-windows-and-office-users/</loc>
		<lastmod>2026-02-11T22:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devilish-devs-spawn-287-chrome-extensions-to-flog-your-browser-history-to-data-brokers/</loc>
		<lastmod>2026-02-11T22:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-data-theft-gang-for-the-health-sector-to-lose-sleep-over/</loc>
		<lastmod>2026-02-11T22:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-is-crashing-the-us-court-system-in-minnesota/</loc>
		<lastmod>2026-02-11T22:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/once-hobbled-lumma-stealer-is-back-with-lures-that-are-hard-to-resist/</loc>
		<lastmod>2026-02-11T23:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/0apt-ransomware-group-rises-swiftly-with-bluster-along-with-genuine-threat-of-attack/</loc>
		<lastmod>2026-02-11T23:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acting-cisa-chief-says-dhs-funding-lapse-would-limit-halt-some-agency-work/</loc>
		<lastmod>2026-02-11T23:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-mounts-largest-ever-coordinated-cyber-defense/</loc>
		<lastmod>2026-02-11T23:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-targets-compliance-and-risk-with-arco-cyber-purchase/</loc>
		<lastmod>2026-02-11T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-windows-flaw-causing-vpn-disruptions/</loc>
		<lastmod>2026-02-11T23:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-store-outlook-add-in-hijacked-to-steal-4000-microsoft-accounts/</loc>
		<lastmod>2026-02-11T23:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-unc1069-hammers-crypto-firms-with-ai/</loc>
		<lastmod>2026-02-11T23:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-unc1069-hammers-crypto-firms-with-ai-2/</loc>
		<lastmod>2026-02-11T23:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-unc1069-hammers-crypto-firms-with-ai-3/</loc>
		<lastmod>2026-02-11T23:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-llm-to-create-react2shell-malware-the-latest-example-of-ai-generated-threat/</loc>
		<lastmod>2026-02-12T00:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-experts-optimistic-about-future-ai-security-technologies/</loc>
		<lastmod>2026-02-12T00:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-smart-algorithms-transforming-secrets-rotation-practices/</loc>
		<lastmod>2026-02-12T00:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-elements-ensure-stability-in-nhi-lifecycle-management/</loc>
		<lastmod>2026-02-12T00:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-ensure-agentic-ai-security-fits-your-budget/</loc>
		<lastmod>2026-02-12T00:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-and-compliance-what-it-is-and-why-it-matters-for-your-business/</loc>
		<lastmod>2026-02-12T00:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-siem-maturity-framework-workbook-v1-0-a-practical-scoring-tool-for-security-analytics-platforms/</loc>
		<lastmod>2026-02-12T00:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-funding-lapse-would-sideline-federal-cyber-staff/</loc>
		<lastmod>2026-02-12T00:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cios-are-navigating-the-ai-driven-software-market-crash-2/</loc>
		<lastmod>2026-02-12T00:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cios-are-navigating-the-ai-driven-software-market-crash/</loc>
		<lastmod>2026-02-12T00:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cios-are-navigating-the-ai-driven-software-market-crash-3/</loc>
		<lastmod>2026-02-12T00:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/</loc>
		<lastmod>2026-02-12T00:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-are-using-summarize-with-ai-to-manipulate-enterprise-chatbots/</loc>
		<lastmod>2026-02-12T01:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-454-ai-was-not-plotting-humanitys-demise-humans-were/</loc>
		<lastmod>2026-02-12T01:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-act-durchfuhrungsgesetz-beschlossen/</loc>
		<lastmod>2026-02-12T01:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-vom-tech-experiment-zum-enterprise-albtraum/</loc>
		<lastmod>2026-02-12T01:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vega-raises-125m-series-b-for-ai-native-security-operations/</loc>
		<lastmod>2026-02-12T01:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/first-malicious-outlook-add-in-found-stealing-4000-microsoft-credentials/</loc>
		<lastmod>2026-02-12T01:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guide-to-setting-up-openid-connect-for-enterprises/</loc>
		<lastmod>2026-02-12T05:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-sso-the-same-as-saml/</loc>
		<lastmod>2026-02-12T05:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-security-token-service/</loc>
		<lastmod>2026-02-12T05:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/login-instructions-for-various-platforms-2/</loc>
		<lastmod>2026-02-12T05:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/login-instructions-for-various-platforms/</loc>
		<lastmod>2026-02-12T05:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographically-agile-policy-enforcement-for-llm-tool-integration/</loc>
		<lastmod>2026-02-12T05:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-werden-zum-angriffsvektor/</loc>
		<lastmod>2026-02-12T05:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-werden-zum-angriffsvektor-2/</loc>
		<lastmod>2026-02-12T05:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-werden-zum-angriffsvektor-3/</loc>
		<lastmod>2026-02-12T05:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-werden-zum-angriffsvektor-4/</loc>
		<lastmod>2026-02-12T05:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sshstalker-botnet-brute-forces-its-way-onto-7000-linux-machines/</loc>
		<lastmod>2026-02-12T05:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-that-poisoned-ai-buttons-and-links-may-betray-your-trust/</loc>
		<lastmod>2026-02-12T05:08:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vega-raises-120m-series-b-for-ai-native-security-operations/</loc>
		<lastmod>2026-02-12T05:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-volumes-may-plausibly-reach-100000-this-year/</loc>
		<lastmod>2026-02-12T05:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-zero-day-flaw-used-in-extremely-sophisticated-attacks/</loc>
		<lastmod>2026-02-12T05:11:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-hygiene-for-high-profile-individuals/</loc>
		<lastmod>2026-02-12T06:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-teams-are-hitting-maturity-walls-in-governance-security-and-ai-use/</loc>
		<lastmod>2026-02-12T06:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/java-security-work-is-becoming-a-daily-operational-burden/</loc>
		<lastmod>2026-02-12T06:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/java-security-work-is-becoming-a-daily-operational-burden-2/</loc>
		<lastmod>2026-02-12T06:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-employee-monitoring-and-simplehelp-tools-in-ransomware-attacks/</loc>
		<lastmod>2026-02-12T06:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-0-day-flaw-actively-exploited-in-targeted-cyberattacks-on-individuals/</loc>
		<lastmod>2026-02-12T06:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-endpoint-manager-bugs-patched-by-ivanti-including-remote-auth-bypass/</loc>
		<lastmod>2026-02-12T07:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-scanner-open-source-tool-detects-autonomous-ai-agents/</loc>
		<lastmod>2026-02-12T07:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/picking-an-ai-red-teaming-vendor-is-getting-harder/</loc>
		<lastmod>2026-02-12T07:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlook-add-in-stolen-4000-accounts-and-credit-card-numbers-2/</loc>
		<lastmod>2026-02-12T07:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlook-add-in-stolen-4000-accounts-and-credit-card-numbers/</loc>
		<lastmod>2026-02-12T07:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlook-add-in-stolen-4000-accounts-and-credit-card-numbers-3/</loc>
		<lastmod>2026-02-12T07:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlook-add-in-stolen-4000-accounts-and-credit-card-numbers-4/</loc>
		<lastmod>2026-02-12T07:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-attacks-exploit-key-entry-point-for-lummastealer-malware/</loc>
		<lastmod>2026-02-12T07:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptware-hackers-exploit-google-calendar-invites-to-stealthily-stream-victims-camera-via-zoom/</loc>
		<lastmod>2026-02-12T07:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-der-nachste-ki-agent-mit-enormen-schwachstellen/</loc>
		<lastmod>2026-02-12T07:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-need-to-know-about-the-openclaw-security-nightmare/</loc>
		<lastmod>2026-02-12T08:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-apt31-used-gemini-to-plan-cyberattacks-against-us-orgs/</loc>
		<lastmod>2026-02-12T08:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-security-decisions-come-too-late-and-attackers-know-it/</loc>
		<lastmod>2026-02-12T08:02:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages/</loc>
		<lastmod>2026-02-12T08:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages-2/</loc>
		<lastmod>2026-02-12T08:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adblock-filters-expose-user-location-even-with-vpn-protection/</loc>
		<lastmod>2026-02-12T08:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-groups-graphalgo-fake-recruiter-campaign-targets-github-npm-and-pypi-to-spread-malware/</loc>
		<lastmod>2026-02-12T08:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-exploited-zero-day-affecting-ios-macos-and-apple-devices/</loc>
		<lastmod>2026-02-12T08:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/app-entwicklung-unter-zeitdruck-verschiebt-sicherheit-ans-prozessende-warum-mobile-apps-zum-gefahrlichsten-einfallstor-werden/</loc>
		<lastmod>2026-02-12T08:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-treibt-die-industrialisierung-von-romance-scams-voran/</loc>
		<lastmod>2026-02-12T08:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-click-rce-in-claude-desktop-cvss-score-von-10-10/</loc>
		<lastmod>2026-02-12T09:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-hacker-charged-seven-years-after-massive-morele-net-data-breach/</loc>
		<lastmod>2026-02-12T09:01:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-duer-js-npm-package-distributes-bada-stealer-malware-targeting-windows-and-discord-users/</loc>
		<lastmod>2026-02-12T09:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/83-of-ivanti-epmm-exploits-linked-to-single-ip-on-bulletproof-hosting-infrastructure/</loc>
		<lastmod>2026-02-12T09:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-bis-5-marz-2026-cpt-die-cybersecurity-konferenz/</loc>
		<lastmod>2026-02-12T09:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dank-microsofts-feature-wahn-sogar-notepad-bekommt-jetzt-schadcode-lucken/</loc>
		<lastmod>2026-02-12T09:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-bot-im-test-von-openclaw-nicht-begeistert-zu-sein-ist-schwer/</loc>
		<lastmod>2026-02-12T09:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-backs-deutschland-plant-cyber-gegenangriffe/</loc>
		<lastmod>2026-02-12T09:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-fbi-recovered-deleted-nest-cam-footage-heres-why-every-ciso-should-panic/</loc>
		<lastmod>2026-02-12T10:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminals-are-using-ai-website-builders-to-clone-major-brands/</loc>
		<lastmod>2026-02-12T10:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-language-of-the-cybersecurity-leaders/</loc>
		<lastmod>2026-02-12T10:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-brings-ai-generated-content-under-formal-regulation-with-it-rules-amendment/</loc>
		<lastmod>2026-02-12T10:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openvpn-releases-version-2-7-0-with-expanded-protocol-and-platform-updates/</loc>
		<lastmod>2026-02-12T10:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sms-and-otp-bombing-campaigns-found-abusing-api-ssl-and-cross-platform-automation/</loc>
		<lastmod>2026-02-12T10:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-security-update-released-to-address-code-execution-vulnerabilities/</loc>
		<lastmod>2026-02-12T10:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-backup-plugin-vulnerability-exposes-800000-sites-to-remote-code-execution-attacks/</loc>
		<lastmod>2026-02-12T10:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-firewall-vulnerability-lets-attackers-trigger-reboot-loops/</loc>
		<lastmod>2026-02-12T10:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senegalese-data-breaches-expose-lack-of-security-maturity/</loc>
		<lastmod>2026-02-12T10:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/time-to-exploit-plummets-as-n-day-flaws-dominate/</loc>
		<lastmod>2026-02-12T10:10:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-warnt-iphone-nutzer-uber-zero-day-lucke-attackiert/</loc>
		<lastmod>2026-02-12T10:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-networks-financial-regulators-and-industrial-systems-on-the-same-target-list/</loc>
		<lastmod>2026-02-12T11:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-rewriting-the-rules-of-risk-three-ways-cisos-can-lead-the-next-chapter/</loc>
		<lastmod>2026-02-12T11:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-sign-authenticode-files-with-signtool-using-ksp-library/</loc>
		<lastmod>2026-02-12T11:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-sign-authenticode-files-with-signtool-using-ksp-library-2/</loc>
		<lastmod>2026-02-12T11:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-dast-in-an-ai-first-world-why-runtime-security-testing-remains-critical/</loc>
		<lastmod>2026-02-12T11:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-openclaw-und-die-vorsicht/</loc>
		<lastmod>2026-02-12T11:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ephemeral-infrastructure-paradox-why-short-lived-systems-need-stronger-identity-governance/</loc>
		<lastmod>2026-02-12T11:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feeling-brave-ministry-of-defence-seeks-300k-digital-boss-to-manage-4-6b-spend/</loc>
		<lastmod>2026-02-12T11:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-store-updated-with-a-new-cli-analytics-and-web-installer-improvements/</loc>
		<lastmod>2026-02-12T11:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-security-im-fokus-lehren-aus-dem-npm-supply-chain-angriff/</loc>
		<lastmod>2026-02-12T11:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwerwiegende-sicherheitsanfalligkeiten-wie-sicher-ist-openclaw/</loc>
		<lastmod>2026-02-12T11:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/47day-ssl-tls-mandates-a-step-towards-transitioning-to-automation/</loc>
		<lastmod>2026-02-12T12:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/47day-ssl-tls-mandates-a-step-towards-transitioning-to-automation-2/</loc>
		<lastmod>2026-02-12T12:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-significance-of-passwordless-authentication-and-ekyc-in-simplifying-cross-border-banking-onboarding/</loc>
		<lastmod>2026-02-12T12:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-significance-of-passwordless-authentication-and-ekyc-in-simplifying-cross-border-banking-onboarding-2/</loc>
		<lastmod>2026-02-12T12:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-open-source-ai-agent-application-attack-surface-and-security-risk-system-analysis/</loc>
		<lastmod>2026-02-12T12:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-open-source-ai-agent-application-attack-surface-and-security-risk-system-analysis-2/</loc>
		<lastmod>2026-02-12T12:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-open-source-ai-agent-application-attack-surface-and-security-risk-system-analysis-3/</loc>
		<lastmod>2026-02-12T12:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kriminelle-ki-ist-ein-geschaftsmodell-kein-experiment-mehr/</loc>
		<lastmod>2026-02-12T12:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ryan-liles-master-of-technical-diplomacy/</loc>
		<lastmod>2026-02-12T12:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixed-first-actively-exploited-zero-day-in-2026/</loc>
		<lastmod>2026-02-12T12:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-zero-day-flaw-exploited-in-targeted-attacks-cve-2026-20700/</loc>
		<lastmod>2026-02-12T12:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogue-vm-linked-to-muddled-libra-in-vmware-vsphere-attack-exposing-critical-ttps/</loc>
		<lastmod>2026-02-12T12:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-aruba-flaw-exposes-networking-devices-to-privilege-escalation-and-dos-attacks/</loc>
		<lastmod>2026-02-12T12:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-aruba-flaw-exposes-networking-devices-to-privilege-escalation-and-dos-attacks-2/</loc>
		<lastmod>2026-02-12T12:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ctem-divide-why-84-of-security-programs-are-falling-behind/</loc>
		<lastmod>2026-02-12T12:10:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-skills-represent-dangerous-new-attack-surface-says-trendai/</loc>
		<lastmod>2026-02-12T12:11:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-microsoft-365-und-microsoft-netzwerke-automatisieren-praxisorientierte-automatisierung-mit-power-automate/</loc>
		<lastmod>2026-02-12T12:12:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-lucke-globaler-telnet-traffic-schlagartig-eingebrochen/</loc>
		<lastmod>2026-02-12T12:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-closes-privileged-access-gap-with-25b-cyberark-acquisition/</loc>
		<lastmod>2026-02-12T13:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaische-souveranitat-auch-bei-sozialen-medien-aktionsbundnis-aufruf-an-hochschulen/</loc>
		<lastmod>2026-02-12T13:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberbedrohungen-am-valentinstag/</loc>
		<lastmod>2026-02-12T13:02:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-treibt-die-industrialisierung-von-romance-scams-voran-2/</loc>
		<lastmod>2026-02-12T13:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lehren-aus-dem-substack-hack/</loc>
		<lastmod>2026-02-12T13:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swiss-cyber-security-days-coreview-starkt-tenant-resilienz-und-souveranitat/</loc>
		<lastmod>2026-02-12T13:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swiss-cyber-security-days-coreview-starkt-tenant-resilienz-und-souveranitat-2/</loc>
		<lastmod>2026-02-12T13:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 4f50f855de881d10254561842044e517; Queries for sitemap: 3; Total queries: 88; Seconds: 7.46; Memory for sitemap: 1KB; Total memory: 60MB -->
