<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='10. April 2026 7:16 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/supply-chain-attacks-now-fuel-a-self-reinforcing-cybercrime-economy/</loc>
		<lastmod>2026-02-12T13:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feiniu-nas-devices-hit-in-massive-netdragon-botnet-attack-exploiting-unpatched-vulnerabilities/</loc>
		<lastmod>2026-02-12T13:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/44-evilmouse-malware-grants-attackers-full-control-of-systems-upon-connection/</loc>
		<lastmod>2026-02-12T13:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-ai-prompt-rce-claude-0-click-renengine-loader-auto-0-days-25-stories/</loc>
		<lastmod>2026-02-12T13:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zugangsdaten-geleakt-backdoor-zur-it-von-200-flughafen-entdeckt/</loc>
		<lastmod>2026-02-12T13:10:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-enterprise-sso-providers-for-edtech-education-saas-in-2026/</loc>
		<lastmod>2026-02-12T14:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/child-exploitation-grooming-and-social-media-addiction-claims-put-meta-on-trial/</loc>
		<lastmod>2026-02-12T14:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-zero-day-flaw-that-could-let-attackers-take-control-of-devices/</loc>
		<lastmod>2026-02-12T14:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-chains-old-office-flaw-with-fileless-xworm-rat-to-evade-detection-2/</loc>
		<lastmod>2026-02-12T14:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-chains-old-office-flaw-with-fileless-xworm-rat-to-evade-detection/</loc>
		<lastmod>2026-02-12T14:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-chains-old-office-flaw-with-fileless-xworm-rat-to-evade-detection-3/</loc>
		<lastmod>2026-02-12T14:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-says-russia-tried-to-fully-block-platform-push-users-to-state-app/</loc>
		<lastmod>2026-02-12T14:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-in-echtzeit-wie-daten-streaming-die-kunden-in-einer-ki-gesteuerten-welt-schutzt/</loc>
		<lastmod>2026-02-12T14:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-funded-human-trafficking-is-exploding/</loc>
		<lastmod>2026-02-12T14:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragonforce-ransomware-group-targets-363-companies-expands-cartel-like-operations-since-2023/</loc>
		<lastmod>2026-02-12T14:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ssh-worm-exploit-detected-by-dshield-sensor-using-credential-stuffing-and-multi-stage-malware/</loc>
		<lastmod>2026-02-12T14:08:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-leaks-ransomware-group-adds-stealthy-custom-malware-rustyrocket-to-attacks/</loc>
		<lastmod>2026-02-12T14:09:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-embrace-gemini-ai-for-malicious-campaigns-google-finds/</loc>
		<lastmod>2026-02-12T14:10:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-challenge-2026-die-hacker-sind-die-zukunft-der-it-security/</loc>
		<lastmod>2026-02-12T14:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-fake-webshops-co-cyber-bedrohungen-am-valentinstag/</loc>
		<lastmod>2026-02-12T14:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-fake-webshops-co-cyber-bedrohungen-am-valentinstag-2/</loc>
		<lastmod>2026-02-12T14:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-ramping-up-use-of-gemini-for-target-reconnaissance-malware-coding-google-says/</loc>
		<lastmod>2026-02-12T15:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-ramping-up-use-of-gemini-for-target-reconnaissance-malware-coding-google-says-2/</loc>
		<lastmod>2026-02-12T15:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-ramping-up-use-of-gemini-for-target-reconnaissance-malware-coding-google-says-3/</loc>
		<lastmod>2026-02-12T15:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-ramping-up-use-of-gemini-for-target-reconnaissance-malware-coding-google-says-4/</loc>
		<lastmod>2026-02-12T15:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-arrest-21-year-old-for-alleged-involvement-in-jokerotp-password-stealer/</loc>
		<lastmod>2026-02-12T15:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-decade-old-ios-zero-day-possibly-exploited-by-commercial-spyware/</loc>
		<lastmod>2026-02-12T15:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viral-ai-caricatures-highlight-shadow-ai-dangers/</loc>
		<lastmod>2026-02-12T15:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viral-ai-caricatures-highlight-shadow-ai-dangers-2/</loc>
		<lastmod>2026-02-12T15:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viral-ai-caricatures-highlight-shadow-ai-dangers-3/</loc>
		<lastmod>2026-02-12T15:04:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-open-sources-a-benchmark-to-stop-ai-agents-from-leaking-credentials/</loc>
		<lastmod>2026-02-12T15:05:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amos-infostealer-targets-macos-through-a-popular-ai-app/</loc>
		<lastmod>2026-02-12T15:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amos-infostealer-targets-macos-through-a-popular-ai-app-2/</loc>
		<lastmod>2026-02-12T15:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/</loc>
		<lastmod>2026-02-12T15:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orb-networks-leverages-compromised-iot-devices-and-soho-routers-to-mask-cyberattacks/</loc>
		<lastmod>2026-02-12T15:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/287-malicious-chrome-extensions-steal-browsing-data-from-37-4-million-users/</loc>
		<lastmod>2026-02-12T15:09:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omada-identity-governance-bericht-zeigt-sicherheitsbedenken-bei-ki-agenten/</loc>
		<lastmod>2026-02-12T16:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-setzt-beim-schutz-von-ki-transformationen-auf-neuen-vier-saulen-ansatz/</loc>
		<lastmod>2026-02-12T16:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-setzt-beim-schutz-von-ki-transformationen-auf-neuen-vier-saulen-ansatz-2/</loc>
		<lastmod>2026-02-12T16:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-supercharging-romance-scams-with-deepfakes-and-bots/</loc>
		<lastmod>2026-02-12T16:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outlook-add-in-goes-rogue-and-steals-4000-credentials-and-payment-data/</loc>
		<lastmod>2026-02-12T16:01:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-names-tenable-as-the-current-company-to-beat-for-ai-powered-exposure-assessment-in-a-2025-report/</loc>
		<lastmod>2026-02-12T16:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vier-saulen-eine-vision-check-point-stellt-neue-ki-sicherheitsstrategie-vor-und-starkt-plattform-durch-drei-strategische-akquisitionen/</loc>
		<lastmod>2026-02-12T16:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kelly-morgan-zum-chief-customer-officer-bei-knowbe4-ernannt-2/</loc>
		<lastmod>2026-02-12T16:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kelly-morgan-zum-chief-customer-officer-bei-knowbe4-ernannt/</loc>
		<lastmod>2026-02-12T16:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secureservice-edge-mit-neuen-funktionen-fur-sicheren-ki-einsatz-in-unternehmen/</loc>
		<lastmod>2026-02-12T16:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lummastealer-activity-spikes-post-law-enforcement-disruption/</loc>
		<lastmod>2026-02-12T16:07:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841-2/</loc>
		<lastmod>2026-02-12T16:08:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841/</loc>
		<lastmod>2026-02-12T16:08:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841-3/</loc>
		<lastmod>2026-02-12T16:08:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841-4/</loc>
		<lastmod>2026-02-12T16:09:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-commander-introduces-supershell/</loc>
		<lastmod>2026-02-12T16:10:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-pairing-so-schleichen-sich-angreifer-in-ihr-whatsapp/</loc>
		<lastmod>2026-02-12T16:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/42900-openclaw-exposed-control-panels-and-why-you-should-care/</loc>
		<lastmod>2026-02-12T17:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/42900-openclaw-exposed-control-panels-and-why-you-should-care-2/</loc>
		<lastmod>2026-02-12T17:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reducing-alert-fatigue-using-ai-from-overwhelmed-socs-to-autonomous-precision/</loc>
		<lastmod>2026-02-12T17:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-seeks-infrastructure-sector-consultation-on-incident-reporting-rule/</loc>
		<lastmod>2026-02-12T17:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-fines-disney-2-75-million-for-data-privacy-violations/</loc>
		<lastmod>2026-02-12T17:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-wants-cyber-partnerships-to-send-coordinated-strategic-message-to-adversaries/</loc>
		<lastmod>2026-02-12T17:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-actively-exploited-zero-day-flaw/</loc>
		<lastmod>2026-02-12T17:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-revisiting-concept-drift-in-windows-malware-detection/</loc>
		<lastmod>2026-02-12T18:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/constella-intelligence-unveils-2026-identity-breach-report-the-industrialization-of-identity/</loc>
		<lastmod>2026-02-12T18:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartermail-facing-widespread-attacks-targeting-critical-flaws/</loc>
		<lastmod>2026-02-12T18:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-hard-truth-in-munich-cyber-defense-runs-through-silicon-valley/</loc>
		<lastmod>2026-02-12T18:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-hard-truth-in-munich-cyber-defense-runs-through-silicon-valley-2/</loc>
		<lastmod>2026-02-12T18:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-push-for-age-verification-a-major-landmark-for-spread-of-the-tool/</loc>
		<lastmod>2026-02-12T18:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-to-host-industry-feedback-sessions-on-cyber-incident-reporting-regulation/</loc>
		<lastmod>2026-02-12T18:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-us-investors-sue-south-korean-government-over-handling-of-coupang-data-breach/</loc>
		<lastmod>2026-02-12T18:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-20-years-for-73-million-scam/</loc>
		<lastmod>2026-02-12T18:07:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-infostealers-fuel-growing-cybercrime-market/</loc>
		<lastmod>2026-02-12T18:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-infostealers-fuel-growing-cybercrime-market-2/</loc>
		<lastmod>2026-02-12T18:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-with-900k-installs-vulnerable-to-critical-rce-flaw/</loc>
		<lastmod>2026-02-12T18:09:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-prevents-deepfake-impersonation-at-the-it-service-desk-with-nametag-identity-verification/</loc>
		<lastmod>2026-02-12T19:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-acquires-three-startups-for-ai-security-msp-expansion/</loc>
		<lastmod>2026-02-12T19:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-mobile-phone-giant-odido-announces-data-breach/</loc>
		<lastmod>2026-02-12T19:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apollomd-data-breach-impacts-626540-people/</loc>
		<lastmod>2026-02-12T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-tiktoks-addictive-design-breaches-eu-law/</loc>
		<lastmod>2026-02-12T19:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-gen-spotlights-creating-quiet-in-moments-of-noise-qa-with-richard-allmendinger-ceo-and-co-founder-of-veribee/</loc>
		<lastmod>2026-02-12T19:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-data-breach-exposes-personal-info-of-6-2-million-customers/</loc>
		<lastmod>2026-02-12T19:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-support/</loc>
		<lastmod>2026-02-12T19:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-campaign-plants-malicious-packages-in-npm-and-pypi-ecosystems/</loc>
		<lastmod>2026-02-12T19:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-exploited-zero-day-affecting-ios-macos-and-other-devices/</loc>
		<lastmod>2026-02-12T19:09:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idc-market-note-surging-demand-for-eu-data-sovereignty-drives-new-cybersecurity-cloud-partnership/</loc>
		<lastmod>2026-02-12T19:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idc-market-note-surging-demand-for-eu-data-sovereignty-drives-new-cybersecurity-cloud-partnership-2/</loc>
		<lastmod>2026-02-12T19:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dead-outlook-add-in-hijacked-to-phish-4000-microsoft-office-store-users/</loc>
		<lastmod>2026-02-12T20:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-warn-app-fur-cybervorfalle-gestartet/</loc>
		<lastmod>2026-02-12T20:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-expands-ai-security-offerings-with-acuvity-acquisition/</loc>
		<lastmod>2026-02-12T20:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hand-over-the-keys-for-shannons-shenanigans/</loc>
		<lastmod>2026-02-12T20:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hand-over-the-keys-for-shannons-shenanigans-2/</loc>
		<lastmod>2026-02-12T20:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-linked-to-epstein-removed-from-black-hat-cyber-conference-website/</loc>
		<lastmod>2026-02-12T20:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-privacy-watchdogs-pan-digital-omnibus/</loc>
		<lastmod>2026-02-12T20:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-epstein-files-reveal-stunning-operational-security-fails/</loc>
		<lastmod>2026-02-12T20:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanias-oil-pipeline-operator-conpet-confirms-data-stolen-in-attack/</loc>
		<lastmod>2026-02-12T20:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roses-are-red-ai-is-wild-a-guide-to-ai-regulation/</loc>
		<lastmod>2026-02-12T21:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roses-are-red-ai-is-wild-a-guide-to-ai-regulation-2/</loc>
		<lastmod>2026-02-12T21:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-agentic-virus-how-ai-agents-become-self-spreading-malware/</loc>
		<lastmod>2026-02-12T21:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-pbp-post-training-backdoor-purification-for-malware-classifiers/</loc>
		<lastmod>2026-02-12T21:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-pbp-post-training-backdoor-purification-for-malware-classifiers-2/</loc>
		<lastmod>2026-02-12T21:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-tools-that-help-students-focus/</loc>
		<lastmod>2026-02-12T21:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-threat-detection-proactive-cyber-defense-capabilities/</loc>
		<lastmod>2026-02-12T21:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whos-the-bossware-ransomware-slingers-like-employee-monitoring-tools-too/</loc>
		<lastmod>2026-02-12T21:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-confirms-massive-breach-6-2-million-customers-impacted/</loc>
		<lastmod>2026-02-12T21:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msp-strategic-defense-where-prevention-meets-compliance/</loc>
		<lastmod>2026-02-12T22:00:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msp-strategic-defense-where-prevention-meets-compliance-2/</loc>
		<lastmod>2026-02-12T22:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-will-shutter-some-missions-to-prioritize-others/</loc>
		<lastmod>2026-02-12T22:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-finds-state-sponsored-hackers-use-ai-at-all-stages-of-attack-cycle/</loc>
		<lastmod>2026-02-12T22:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-finds-state-sponsored-hackers-use-ai-at-all-stages-of-attack-cycle-2/</loc>
		<lastmod>2026-02-12T22:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-february-patch-tuesday-fixes-6-zero-days-under-attack/</loc>
		<lastmod>2026-02-12T22:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now/</loc>
		<lastmod>2026-02-12T22:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-lnk-spoofing-issues-arent-vulnerabilities/</loc>
		<lastmod>2026-02-12T22:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/booz-allen-announces-general-availability-of-vellox-reverser-to-automate-malware-defense/</loc>
		<lastmod>2026-02-12T22:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/specterops-launches-bloodhound-scentry-to-accelerate-the-practice-of-identity-attack-path-management/</loc>
		<lastmod>2026-02-12T22:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gone-with-the-shame-one-in-two-americans-are-reluctant-to-talk-about-romance-scam-incidents/</loc>
		<lastmod>2026-02-12T22:09:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/those-summarize-with-ai-buttons-may-lying-to-you/</loc>
		<lastmod>2026-02-12T22:10:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-architecture-significantly-enhance-soc-team-efficiency/</loc>
		<lastmod>2026-02-12T23:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-agentic-ai-systems-ensure-robust-cloud-security/</loc>
		<lastmod>2026-02-12T23:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-role-do-nhis-play-in-privileged-access-management/</loc>
		<lastmod>2026-02-12T23:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-non-human-identities-safe-in-healthcare-data/</loc>
		<lastmod>2026-02-12T23:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/upgraded-custom-aspm-dashboards-build-security-views-that-match-how-your-teams-work/</loc>
		<lastmod>2026-02-12T23:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bretton-raises-75m-to-use-ai-for-financial-crime-compliance/</loc>
		<lastmod>2026-02-12T23:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-apple-flaw-exploited-in-sophisticated-attacks-company-urges-rapid-patching/</loc>
		<lastmod>2026-02-12T23:07:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-introduces-cupid-vault-for-secure-password-sharing/</loc>
		<lastmod>2026-02-12T23:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again-2/</loc>
		<lastmod>2026-02-12T23:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again/</loc>
		<lastmod>2026-02-12T23:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again-3/</loc>
		<lastmod>2026-02-12T23:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/those-summarize-with-ai-buttons-may-be-lying-to-you/</loc>
		<lastmod>2026-02-12T23:10:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-identity-recovery-is-now-central-to-cyber-resilience/</loc>
		<lastmod>2026-02-13T00:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-chrome-extensions-disguised-as-ai-chatbots-steal-users-api-keys-emails-other-sensitive-data/</loc>
		<lastmod>2026-02-13T00:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doctors-told-to-give-palantirs-nhs-data-platform-the-cold-shoulder/</loc>
		<lastmod>2026-02-13T00:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doctors-told-to-give-palantirs-nhs-data-platform-the-cold-shoulder-2/</loc>
		<lastmod>2026-02-13T00:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doctors-told-to-give-palantirs-nhs-data-platform-the-cold-shoulder-3/</loc>
		<lastmod>2026-02-13T00:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-cisa-flags-ot-risks-after-polish-grid-hack/</loc>
		<lastmod>2026-02-13T00:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-audit-finds-utah-child-welfare-health-data-at-risk/</loc>
		<lastmod>2026-02-13T00:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-cio-mandate-from-it-operator-to-strategy-architect/</loc>
		<lastmod>2026-02-13T00:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-tries-to-block-whatsapp-telegram-in-communication-blockade/</loc>
		<lastmod>2026-02-13T00:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dream-job-or-nightmare-lazarus-group-hunts-crypto-devs-with-graphalgo/</loc>
		<lastmod>2026-02-13T01:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-acquires-acuvity-to-tackle-the-security-risks-of-agentic-ai/</loc>
		<lastmod>2026-02-13T01:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-discloses-first-actively-exploited-zero-day-of-2026/</loc>
		<lastmod>2026-02-13T01:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-auch-in-privathaushalten-laut-bsi-mehr-als-eine-rein-technische-frage/</loc>
		<lastmod>2026-02-13T01:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-auch-in-privathaushalten-laut-bsi-mehr-als-eine-rein-technische-frage-3/</loc>
		<lastmod>2026-02-13T01:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-auch-in-privathaushalten-laut-bsi-mehr-als-eine-rein-technische-frage-2/</loc>
		<lastmod>2026-02-13T01:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-auch-in-privathaushalten-laut-bsi-mehr-als-eine-rein-technische-frage-4/</loc>
		<lastmod>2026-02-13T01:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-forderung-eu-sollte-als-einheit-auftreten-und-europas-digitale-wettbewerbsfahigkeit-starken/</loc>
		<lastmod>2026-02-13T01:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/examples-of-saml-providers/</loc>
		<lastmod>2026-02-13T05:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/demystifying-saml-the-basics-of-secure-single-sign-on/</loc>
		<lastmod>2026-02-13T05:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-authentication-methods/</loc>
		<lastmod>2026-02-13T05:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-ws-trust-a-guide-to-secure-token-exchange/</loc>
		<lastmod>2026-02-13T05:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-ws-trust-a-guide-to-secure-token-exchange-2/</loc>
		<lastmod>2026-02-13T05:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomaly-detection-in-post-quantum-encrypted-mcp-metadata-streams/</loc>
		<lastmod>2026-02-13T05:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rfc-4058-authentication-protocol-overview/</loc>
		<lastmod>2026-02-13T05:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-agentic-ai-connectivity/</loc>
		<lastmod>2026-02-13T05:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-turn-bossware-against-the-bosses/</loc>
		<lastmod>2026-02-13T05:07:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/esecurity-in-organisationen-mit-anforderungen-der-nationalen-sicherheit-und-rustung/</loc>
		<lastmod>2026-02-13T06:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-moving-at-machine-speed-defenders-are-still-in-meetings/</loc>
		<lastmod>2026-02-13T06:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-moving-at-machine-speed-defenders-are-still-in-meetings-2/</loc>
		<lastmod>2026-02-13T06:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-february-13-2026/</loc>
		<lastmod>2026-02-13T06:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-february-13-2026-2/</loc>
		<lastmod>2026-02-13T06:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badiis-malware-targets-over-1800-windows-servers-in-massive-seo-poisoning-attack/</loc>
		<lastmod>2026-02-13T06:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zimbra-issues-security-update-to-address-xss-xxe-and-ldap-injection-flaws/</loc>
		<lastmod>2026-02-13T06:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-rce-vulnerability-under-active-exploitation-urgent-patch-released/</loc>
		<lastmod>2026-02-13T06:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edge-computings-biggest-lie-well-patch-it-later/</loc>
		<lastmod>2026-02-13T07:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-risk-is-becoming-a-hold-period-problem-for-private-equity-firms/</loc>
		<lastmod>2026-02-13T07:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-wave-targets-windows-systems-to-deploy-stealc-stealer/</loc>
		<lastmod>2026-02-13T07:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-updates-seit-oktober-2025-bsi-stuft-linux-schwachstelle-als-kritisch-ein/</loc>
		<lastmod>2026-02-13T07:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-updates-seit-oktober-2025-bsi-stuft-linux-schwachstelle-als-kritisch-ein-2/</loc>
		<lastmod>2026-02-13T07:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-challenge-2026-diese-hacker-sind-die-zukunft-der-it-security/</loc>
		<lastmod>2026-02-13T07:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bis-2028-wird-fehlkonfigurierte-ki-die-kritische-infrastruktur-eines-g20-staates-lahmlegen/</loc>
		<lastmod>2026-02-13T07:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-key-trends-reshaping-the-siem-market/</loc>
		<lastmod>2026-02-13T08:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8000-chatgpt-api-keys-left-publicly-accessible/</loc>
		<lastmod>2026-02-13T08:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-24-04-4-lts-arrives-with-cumulative-security-and-bug-fixes/</loc>
		<lastmod>2026-02-13T08:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-phishing-and-qr-code-quishing-surge-in-2025-spam-and-phishing-report/</loc>
		<lastmod>2026-02-13T08:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-mdx-remote-vulnerability-allows-arbitrary-code-execution-in-react-ssr/</loc>
		<lastmod>2026-02-13T08:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-lage-der-physischen-sicherheit-2026-ki-und-cloud-verwandeln-physische-sicherheit-in-ein-business-asset/</loc>
		<lastmod>2026-02-13T08:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/150-key-compliance-statistics-ai-data-privacy-cybersecurity-regulatory-trends-to-know-in-2026/</loc>
		<lastmod>2026-02-13T09:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-1281-cve-2026-1340-actively-exploited-pre-authentication-rce-in-ivanti-epmm/</loc>
		<lastmod>2026-02-13T09:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-autosect-vmdr-tool-simplifies-vulnerability-management/</loc>
		<lastmod>2026-02-13T09:02:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-every-enterprise-needs-a-strong-identity-and-access-management-framework/</loc>
		<lastmod>2026-02-13T09:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-when-ai-becomes-an-identity/</loc>
		<lastmod>2026-02-13T09:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adversaries-exploiting-proprietary-ai-capabilities-api-traffic-to-scale-cyberattacks/</loc>
		<lastmod>2026-02-13T09:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oysterloader-evasion-tactics-exposed-advanced-obfuscation-and-rhysida-ransomware-ties-uncovered/</loc>
		<lastmod>2026-02-13T09:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-urgent-warning-on-microsoft-configuration-manager-sql-injection-vulnerability-under-active-exploitation/</loc>
		<lastmod>2026-02-13T09:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-sicherheitstechnologie-kommt-in-die-telekom-shops/</loc>
		<lastmod>2026-02-13T09:09:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-fokus-auf-kundenerlebnis-kelly-morgan-ubernimmt-cco-rolle-bei-knowbe4/</loc>
		<lastmod>2026-02-13T09:10:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-staatliche-hacker-nutzen-google-ki/</loc>
		<lastmod>2026-02-13T09:11:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-staatliche-hacker-nutzen-google-ki-2/</loc>
		<lastmod>2026-02-13T09:11:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/be-breach-ready-the-true-north-of-zero-trust-2-0-in-the-age-of-autonomous-cyberattacks/</loc>
		<lastmod>2026-02-13T10:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-solarwinds-web-help-desk-notepad-microsoft-configuration-manager-and-apple-devices-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-13T10:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-released-gpt-5-3-codex-spark-a-real-time-coding-model/</loc>
		<lastmod>2026-02-13T10:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-secure-ot-protocols-still-struggle-to-catch-on/</loc>
		<lastmod>2026-02-13T10:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-secure-ot-protocols-still-struggle-to-catch-on-2/</loc>
		<lastmod>2026-02-13T10:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-bug-that-blocked-google-chrome-from-launching/</loc>
		<lastmod>2026-02-13T10:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-users-to-notepad-flaw-allowing-code-execution/</loc>
		<lastmod>2026-02-13T10:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-xworm-rat-campaign-leverages-phishing-and-cve-2018-0802-excel-exploit-to-bypass-detection/</loc>
		<lastmod>2026-02-13T10:06:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-2026-2-12-released-to-patch-over-40-security-vulnerabilities/</loc>
		<lastmod>2026-02-13T10:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/add-in-kompromittiert-tausende-microsoft-konten-uber-outlook-gekapert/</loc>
		<lastmod>2026-02-13T10:08:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-law-of-cyberwar-is-pretty-discombobulated/</loc>
		<lastmod>2026-02-13T11:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/postquantum-authentication-how-consumer-apps-can-stay-secure-in-a-quantumready-world-2/</loc>
		<lastmod>2026-02-13T11:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/postquantum-authentication-how-consumer-apps-can-stay-secure-in-a-quantumready-world/</loc>
		<lastmod>2026-02-13T11:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-security-incidents-of-2025-the-emergence-of-the-chainedshark-apt-group/</loc>
		<lastmod>2026-02-13T11:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-key-management-becomes-the-weakest-link-in-a-post-quantum-and-ai-driven-security-world/</loc>
		<lastmod>2026-02-13T11:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-key-management-becomes-the-weakest-link-in-a-post-quantum-and-ai-driven-security-world-2/</loc>
		<lastmod>2026-02-13T11:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-key-management-becomes-the-weakest-link-in-a-post-quantum-and-ai-driven-security-world-3/</loc>
		<lastmod>2026-02-13T11:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/urgent-warnings-from-uk-and-us-cyber-agencies-after-polish-energy-grid-attack/</loc>
		<lastmod>2026-02-13T11:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brutus-open-source-credential-testing-tool-for-offensive-security/</loc>
		<lastmod>2026-02-13T11:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrests-distributor-of-jokerotp-password-stealing-bot/</loc>
		<lastmod>2026-02-13T11:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-sets-out-four-pillar-blueprint-for-securing-the-ai-driven-enterprise/</loc>
		<lastmod>2026-02-13T11:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-ai-extensions-target-260000-users-with-injected-iframes/</loc>
		<lastmod>2026-02-13T11:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-ai-extensions-target-260000-users-with-injected-iframes-2/</loc>
		<lastmod>2026-02-13T11:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-ai-extensions-target-260000-users-with-injected-iframes-3/</loc>
		<lastmod>2026-02-13T11:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-observe-inwild-exploitation-of-beyondtrust-cvss-9-9-vulnerability/</loc>
		<lastmod>2026-02-13T11:10:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-110-wer-haftet-bei-verstosen-gegen-nis2/</loc>
		<lastmod>2026-02-13T11:11:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt-3/</loc>
		<lastmod>2026-02-13T11:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt-2/</loc>
		<lastmod>2026-02-13T11:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt-4/</loc>
		<lastmod>2026-02-13T11:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/37-millionen-downloads-287-chrome-extensions-bei-der-spionage-erwischt/</loc>
		<lastmod>2026-02-13T11:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-saml-assertion-in-single-sign-on/</loc>
		<lastmod>2026-02-13T12:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-shops-target-winter-olympics-2026-fans/</loc>
		<lastmod>2026-02-13T12:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-shops-target-winter-olympics-2026-fans-2/</loc>
		<lastmod>2026-02-13T12:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-escalating-breaches-regulatory-crackdowns-and-global-cybercrime-developments/</loc>
		<lastmod>2026-02-13T12:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-17-billion-wake-up-call-securing-crypto-in-the-age-of-ai-scams/</loc>
		<lastmod>2026-02-13T12:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/static-design-to-adaptive-control-how-artificial-intelligence-improves-modern-material-handling-equipment-systems/</loc>
		<lastmod>2026-02-13T12:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-backed-hackers-exploit-gemini-ai-for-cyber-recon-and-attacks/</loc>
		<lastmod>2026-02-13T12:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-probe-exploit-newly-patched-beyondtrust-rce-flaw-cve-2026-1731/</loc>
		<lastmod>2026-02-13T12:07:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extensions-infect-500k-users-to-hijack-vkontakte-accounts/</loc>
		<lastmod>2026-02-13T12:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npms-update-to-harden-their-supply-chain-and-points-to-consider/</loc>
		<lastmod>2026-02-13T12:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-assistants-in-google-chrome-web-store-steal-passwords-and-spy-on-emails/</loc>
		<lastmod>2026-02-13T12:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gedanken-zum-europaischen-datenschutztag-warum-man-datenschutz-neu-denken-sollte/</loc>
		<lastmod>2026-02-13T12:11:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genai-nutzung-kann-aus-ahnungslosen-mitarbeitern-insider-bedrohungen-machen/</loc>
		<lastmod>2026-02-13T12:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-for-ai-agents-macht-schatten-ki-sichtbar-und-kontrollierbar/</loc>
		<lastmod>2026-02-13T12:14:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-das-perfekte-setup-fur-einen-sicherheitsalptraum/</loc>
		<lastmod>2026-02-13T12:15:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-das-perfekte-setup-fur-einen-sicherheitsalptraum/</loc>
		<lastmod>2026-02-13T12:15:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-das-perfekte-setup-fur-einen-sicherheitsalptraum-2/</loc>
		<lastmod>2026-02-13T12:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-hipaa-compliance-readiness-testing-in-healthcare-software-a-qa-leaders-guide-to-continuous-compliance/</loc>
		<lastmod>2026-02-13T12:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-foundation-problem-how-a-lack-of-accountability-is-destroying-cybersecurity/</loc>
		<lastmod>2026-02-13T13:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fears-massive-attempt-to-clone-gemini-ai-through-model-extraction/</loc>
		<lastmod>2026-02-13T13:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomes-fahren-waymo-ruft-an-deutschland-legt-auf/</loc>
		<lastmod>2026-02-13T13:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-dutch-telco-odido-admits-6-2m-customers-caught-in-contact-system-caper-2/</loc>
		<lastmod>2026-02-13T13:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-dutch-telco-odido-admits-6-2m-customers-caught-in-contact-system-caper/</loc>
		<lastmod>2026-02-13T13:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-dutch-telco-odido-admits-6-2m-customers-caught-in-contact-system-caper-3/</loc>
		<lastmod>2026-02-13T13:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-appoints-kelly-morgan-as-chief-customer-officer-to-drive-global-customer-lifecycle-strategy/</loc>
		<lastmod>2026-02-13T13:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-critical-microsoft-sccm-flaw-as-exploited-in-attacks/</loc>
		<lastmod>2026-02-13T13:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-64712-in-unstructured-io-puts-amazon-google-and-tech-giants-at-risk-of-remote-code-execution/</loc>
		<lastmod>2026-02-13T13:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-history/</loc>
		<lastmod>2026-02-13T13:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munich-security-conference-cyber-threats-lead-g7-risk-index-disinformation-ranks-third/</loc>
		<lastmod>2026-02-13T13:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munich-security-conference-cyber-threats-lead-g7-risk-index-disinformation-ranks-third-3/</loc>
		<lastmod>2026-02-13T13:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munich-security-conference-cyber-threats-lead-g7-risk-index-disinformation-ranks-third-2/</loc>
		<lastmod>2026-02-13T13:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flucht-vor-der-polizei-malware-entwickler-tauscht-eigenen-tod-vor/</loc>
		<lastmod>2026-02-13T13:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-must-adapt-to-permanent-cyber-and-hybrid-threats-sweden-warns/</loc>
		<lastmod>2026-02-13T14:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitcoin-trading-firm-ceo-gets-20-years-for-operating-200-million-ponzi-scheme/</loc>
		<lastmod>2026-02-13T14:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaigns-target-users-with-fake-meeting-invites-and-update-alerts-via-zoom-teams-and-google-meet/</loc>
		<lastmod>2026-02-13T14:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romance-scamming-der-neue-alltag-beim-online-dating/</loc>
		<lastmod>2026-02-13T14:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-needs-to-impose-real-costs-on-bad-actors-state-department-cyber-official-says/</loc>
		<lastmod>2026-02-13T15:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/16-prozent-mehr-cyber-angriffe-in-deutschland-im-januar/</loc>
		<lastmod>2026-02-13T15:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-crm-data-breach-exposes-6-2m-customer-records/</loc>
		<lastmod>2026-02-13T15:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senegalese-data-breaches-expose-lack-of-security-maturity-2/</loc>
		<lastmod>2026-02-13T15:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-find-and-remove-credential-stealing-chrome-extensions/</loc>
		<lastmod>2026-02-13T16:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-lautet-ende-der-klassischen-verschlusselung-ein/</loc>
		<lastmod>2026-02-13T16:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/estonia-spy-chief-calls-on-europe-to-invest-in-its-own-offensive-cyber-capabilities/</loc>
		<lastmod>2026-02-13T16:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-federal-agencies-to-patch-exploited-solarwinds-apple-microsoft-bugs-within-weeks/</loc>
		<lastmod>2026-02-13T16:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-federal-agencies-to-patch-exploited-solarwinds-apple-microsoft-bugs-within-weeks-2/</loc>
		<lastmod>2026-02-13T16:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/</loc>
		<lastmod>2026-02-13T16:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/valentinstag-knowbe4-warnt-vor-deepfakes-romantikbetrug/</loc>
		<lastmod>2026-02-13T16:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/41-prozent-der-spam-mails-zum-valentinstag-sind-digitaler-betrug/</loc>
		<lastmod>2026-02-13T16:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-beyondtrust-cve-2026-1731-within-hours-of-poc-release/</loc>
		<lastmod>2026-02-13T16:08:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-werden-zur-steigenden-gefahr-im-bereich-der-cybersecurity/</loc>
		<lastmod>2026-02-13T16:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-e-rupee-leads-the-secure-adoption-of-cbdcs/</loc>
		<lastmod>2026-02-13T16:10:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-e-rupee-leads-the-secure-adoption-of-cbdcs-2/</loc>
		<lastmod>2026-02-13T16:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bretton-ai-gets-75m-to-use-ai-for-financial-crime-compliance/</loc>
		<lastmod>2026-02-13T16:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-ibm-qradar-alerts-into-action-with-criminal-ip/</loc>
		<lastmod>2026-02-13T16:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-ibm-qradar-alerts-into-action-with-criminal-ip-2/</loc>
		<lastmod>2026-02-13T16:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-ibm-qradar-alerts-into-action-with-criminal-ip-3/</loc>
		<lastmod>2026-02-13T16:13:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-ist-offen-fur-andere-passwortmanager-so-funktionieren-passkeys-unter-windows-11/</loc>
		<lastmod>2026-02-13T16:14:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-density-boosts-everything/</loc>
		<lastmod>2026-02-13T17:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacks-increase-against-it-and-food-sectors/</loc>
		<lastmod>2026-02-13T17:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/four-new-reasons-why-windows-lnk-files-cannot-be-trusted/</loc>
		<lastmod>2026-02-13T17:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-must-impose-costs-on-russia-china-over-cyber-and-hybrid-attacks-says-deputy-chief/</loc>
		<lastmod>2026-02-13T17:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-must-impose-costs-on-russia-china-over-cyber-and-hybrid-attacks-says-deputy-chief-2/</loc>
		<lastmod>2026-02-13T17:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-may-be-rehearsing-a-digital-siege-taiwan-warns/</loc>
		<lastmod>2026-02-13T17:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wahlwerbung-per-post-kein-datenschutzverstos-widerspruch-gegen-datenweitergabe-moglich/</loc>
		<lastmod>2026-02-13T17:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wahlwerbung-per-post-kein-datenschutzverstos-widerspruch-gegen-datenweitergabe-moglich-2/</loc>
		<lastmod>2026-02-13T17:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-phone-giant-odido-says-millions-of-customers-affected-by-data-breach/</loc>
		<lastmod>2026-02-13T17:08:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fukushimas-radioactive-hybrid-terror-pig-boom-was-driven-by-amorous-mothers/</loc>
		<lastmod>2026-02-13T17:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/corporate-ai-use-shifts-from-hypothetical-risk-to-everyday-reality-new-research-shows/</loc>
		<lastmod>2026-02-13T17:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-9921-deploys-voidlink-malware-to-target-technology-and-financial-sectors/</loc>
		<lastmod>2026-02-13T17:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kleinanzeigen-tricks-an-diesen-warnsignalen-erkennst-du-die-meisten-betruger/</loc>
		<lastmod>2026-02-13T17:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-orgs/</loc>
		<lastmod>2026-02-13T18:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-links-china-iran-russia-north-korea-to-coordinated-defense-sector-cyber-operations/</loc>
		<lastmod>2026-02-13T18:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-unveils-a-new-security-strategy-for-enterprises-in-the-ai-age/</loc>
		<lastmod>2026-02-13T18:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-continuous-penetration-testing-as-a-service-ptaas/</loc>
		<lastmod>2026-02-13T18:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-continuous-penetration-testing-as-a-service-ptaas-2/</loc>
		<lastmod>2026-02-13T18:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-beyondtrust-remote-support-sees-early-signs-of-exploitation/</loc>
		<lastmod>2026-02-13T18:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-ends-partnership-plans-with-flock-days-after-privacy-blowback-from-super-bowl-ad/</loc>
		<lastmod>2026-02-13T18:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-cant-be-naive-about-enemies-shutting-down-critical-infrastructure-warns-tech-official/</loc>
		<lastmod>2026-02-13T18:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-interoperability-in-healthcare-really-means-for-security-and-privacy-2/</loc>
		<lastmod>2026-02-13T18:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-interoperability-in-healthcare-really-means-for-security-and-privacy/</loc>
		<lastmod>2026-02-13T18:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-interoperability-in-healthcare-really-means-for-security-and-privacy-4/</loc>
		<lastmod>2026-02-13T18:06:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-interoperability-in-healthcare-really-means-for-security-and-privacy-3/</loc>
		<lastmod>2026-02-13T18:06:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-predictions-ai-is-breaking-identity-data-security/</loc>
		<lastmod>2026-02-13T18:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-under-pressure-to-bolster-defenses-for-byovd-attacks/</loc>
		<lastmod>2026-02-13T18:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-under-pressure-to-bolster-defenses-for-byovd-attacks-2/</loc>
		<lastmod>2026-02-13T18:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-put-defense-industrial-base-under-siege/</loc>
		<lastmod>2026-02-13T18:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-swarm-security-complexity-follows-suit/</loc>
		<lastmod>2026-02-13T18:11:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-international-station/</loc>
		<lastmod>2026-02-13T19:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-unearth-30-year-old-vulnerability-in-libpng-library/</loc>
		<lastmod>2026-02-13T19:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/space-emerges-as-new-front-in-great-power-competition-officials-warn/</loc>
		<lastmod>2026-02-13T19:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-hackers-turn-google-ai-into-attack-acceleration-tool/</loc>
		<lastmod>2026-02-13T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-hackers-turn-google-ai-into-attack-acceleration-tool-2/</loc>
		<lastmod>2026-02-13T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-groups-claimed-2000-attacks-in-just-three-months/</loc>
		<lastmod>2026-02-13T19:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches/</loc>
		<lastmod>2026-02-13T19:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-pam-implementations-struggle/</loc>
		<lastmod>2026-02-13T20:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-finally-get-around-to-exploiting-critical-microsoft-bug-from-2024/</loc>
		<lastmod>2026-02-13T20:01:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alert-severe-cyberthreat-to-critical-infrastructure/</loc>
		<lastmod>2026-02-13T20:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ncsc-led-ot-security-guidance-for-nuclear-reactors/</loc>
		<lastmod>2026-02-13T20:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1800-windows-servers-hit-by-badiis-seo-malware/</loc>
		<lastmod>2026-02-13T20:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/valentines-day-cyber-experts-heed-caution-when-looking-for-love-and-gifts-online/</loc>
		<lastmod>2026-02-13T20:05:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munchner-sicherheitskonferenz-schwarz-digits-und-bsi-bauen-geheime-cloud/</loc>
		<lastmod>2026-02-13T20:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sex-toys-maker-tenga-says-hacker-stole-customer-information/</loc>
		<lastmod>2026-02-13T21:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-seemingly-tries-to-shame-open-source-developer-for-rejected-pull-request/</loc>
		<lastmod>2026-02-13T21:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extensions-hijack-500000-vk-accounts-in-stealth-campaign/</loc>
		<lastmod>2026-02-13T21:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack-2/</loc>
		<lastmod>2026-02-13T21:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/</loc>
		<lastmod>2026-02-13T21:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-most-security-incidents-involve-identity-attacks/</loc>
		<lastmod>2026-02-13T22:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-automated-mass-malware-factory/</loc>
		<lastmod>2026-02-13T22:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-lending-giant-figure-confirms-data-breach/</loc>
		<lastmod>2026-02-13T22:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-ads-pay-the-bills/</loc>
		<lastmod>2026-02-13T22:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-ads-pay-the-bills-2/</loc>
		<lastmod>2026-02-13T22:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/260k-users-exposed-in-ai-extension-scam/</loc>
		<lastmod>2026-02-13T22:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-days-shadow-ai-and-stealth-tactics-define-this-week-in-cybersecurity/</loc>
		<lastmod>2026-02-13T22:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-ransomware-trends-show-new-twists-to-old-game/</loc>
		<lastmod>2026-02-13T22:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-threat-actor-uat-9921-deploys-voidlink-against-enterprise-sectors/</loc>
		<lastmod>2026-02-13T23:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-ag-investigating-conduent-bcbs-texas-in-hack/</loc>
		<lastmod>2026-02-13T23:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-buys-3-startups-to-bolster-ai-security/</loc>
		<lastmod>2026-02-13T23:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-job-recruiters-hide-malware-in-developer-coding-challenges/</loc>
		<lastmod>2026-02-13T23:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-job-recruiters-hide-malware-in-developer-coding-challenges-2/</loc>
		<lastmod>2026-02-13T23:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-purchases-startup-acuvity-to-bolster-ai-security/</loc>
		<lastmod>2026-02-14T00:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-purchases-startup-acuvity-to-bolster-ai-security-2/</loc>
		<lastmod>2026-02-14T00:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-purchases-startup-acuvity-to-bolster-ai-security-3/</loc>
		<lastmod>2026-02-14T00:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-roi-reckoning-is-coming-for-ai/</loc>
		<lastmod>2026-02-14T00:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-add-value-to-cloud-compliance-auditing/</loc>
		<lastmod>2026-02-14T01:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-cloud-native-security-be-transformed-by-agentic-ai/</loc>
		<lastmod>2026-02-14T01:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-future-proof-methods-do-agentic-ais-use-in-data-protection/</loc>
		<lastmod>2026-02-14T01:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-agentic-ai-driven-security-scalable-for-large-enterprises/</loc>
		<lastmod>2026-02-14T01:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-beyondtrust-rs-vulnerability-exploited-in-active-attacks/</loc>
		<lastmod>2026-02-14T01:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaspersky-warnung-vor-cyberbetrug-rund-um-den-valentinstag-betruger-kodern-mit-vermeintlichen-geschenkkarten/</loc>
		<lastmod>2026-02-14T01:05:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheits-direktorentreffen-und-cyber-security-conference-in-munchen-automatisierte-verteidigung-im-fokus/</loc>
		<lastmod>2026-02-14T01:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crazy-hackers-strike-through-remote-monitoring-software/</loc>
		<lastmod>2026-02-14T01:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute/</loc>
		<lastmod>2026-02-14T05:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute-2/</loc>
		<lastmod>2026-02-14T05:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-pharmacy-chain-giant-exposed-customer-data-and-internal-systems/</loc>
		<lastmod>2026-02-14T05:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viral-ai-caricatures-highlight-shadow-ai-dangers-4/</loc>
		<lastmod>2026-02-14T05:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-nutzen-cyberkriminelle-unsere-emotionen-zur-manipulation/</loc>
		<lastmod>2026-02-14T06:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-human-element-turning-threat-actor-opsec-fails-into-investigative-breakthroughs/</loc>
		<lastmod>2026-02-14T07:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-frage-ist-worauf-ein-ki-agent-zugriff-hat/</loc>
		<lastmod>2026-02-14T07:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remnux-v8-linux-toolkit-released-with-ai-powered-malware-analysis-capabilities/</loc>
		<lastmod>2026-02-14T07:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-penetration-testing-companies-in-usa/</loc>
		<lastmod>2026-02-14T09:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-penetration-testing-companies-in-usa-2/</loc>
		<lastmod>2026-02-14T09:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robot-dogs-are-on-going-on-patrol-at-the-2026-world-cup-in-mexico/</loc>
		<lastmod>2026-02-14T11:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-braucht-starke-allianzen-bsi-und-schwarz-digits/</loc>
		<lastmod>2026-02-14T11:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-russian-hackers-deploy-canfail-malware-against-ukraine/</loc>
		<lastmod>2026-02-14T12:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-kills-flock-safety-deal-after-super-bowl-ad-uproar/</loc>
		<lastmod>2026-02-14T12:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romo-dji-staubsaugerroboter-gehackt/</loc>
		<lastmod>2026-02-14T12:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/memory-price-explosion-triggers-pc-buying-spree/</loc>
		<lastmod>2026-02-14T13:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-streicht-sicher-aus-seinem-leitbild/</loc>
		<lastmod>2026-02-14T13:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-relationship-tax-what-staying-with-your-seg-is-really-costing-your-msp/</loc>
		<lastmod>2026-02-14T13:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-squarex-deal-boosts-zero-trust-secure-browsing-capabilities/</loc>
		<lastmod>2026-02-14T14:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-squarex-deal-boosts-zero-trust-secure-browsing-capabilities-2/</loc>
		<lastmod>2026-02-14T14:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/</loc>
		<lastmod>2026-02-14T16:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-beyondtrust-rs-and-pra-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-14T16:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-beyondtrust-rs-and-pra-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2026-02-14T16:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-threat-actor-responsible-for-83-of-recent-ivanti-rce-attacks/</loc>
		<lastmod>2026-02-14T17:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-black-box-membership-inference-attacks-against-fine-tuned-diffusion-models/</loc>
		<lastmod>2026-02-14T17:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fintech-firm-figure-disclosed-data-breach-after-employee-phishing-attack/</loc>
		<lastmod>2026-02-14T18:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-risk-scoring-only-works-if-attribution-is-defensible/</loc>
		<lastmod>2026-02-14T22:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/homeland-security-reportedly-sent-hundreds-of-subpoenas-seeking-to-unmask-anti-ice-accounts/</loc>
		<lastmod>2026-02-14T22:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/homeland-security-reportedly-sent-hundreds-of-subpoenas-seeking-to-unmask-anti-ice-accounts-2/</loc>
		<lastmod>2026-02-14T22:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/287-chrome-extensions-caught-harvesting-browsing-data-from-37m-users/</loc>
		<lastmod>2026-02-14T23:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-should-it-managers-feel-relieved-by-advanced-secrets-management/</loc>
		<lastmod>2026-02-15T00:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-assured-is-identity-security-with-the-adoption-of-nhis/</loc>
		<lastmod>2026-02-15T00:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-there-guaranteed-cybersecurity-benefits-with-agentic-ai-implementation/</loc>
		<lastmod>2026-02-15T00:02:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-proactive-measures-can-be-taken-for-nhi-lifecycle-management/</loc>
		<lastmod>2026-02-15T00:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-turns-websites-into-faster-food-for-ai-agents/</loc>
		<lastmod>2026-02-15T00:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-webshops-und-dating-plattformen-verscharfung-der-cyberbedrohungen-rund-um-den-valentinstag/</loc>
		<lastmod>2026-02-15T00:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-statistik-zeigt-40-prozent-aller-android-smartphones-erhalten-keine-sicherheitsupdates-mehr/</loc>
		<lastmod>2026-02-15T07:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/36-millionen-euro-schaden-wie-ein-bankfehler-in-athiopien-zum-viralen-goldrausch-wurde/</loc>
		<lastmod>2026-02-15T08:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-it-application-engineer-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-02-15T08:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-verliert-beweis-festplatten-beweischaos-um-haftvideos/</loc>
		<lastmod>2026-02-15T09:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-exploited-newly-patched-beyondtrust-rce-united-airlines-ciso-on-building-resilience/</loc>
		<lastmod>2026-02-15T10:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welche-lander-sabotieren-die-russen-bevorzugt/</loc>
		<lastmod>2026-02-15T10:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-could-eat-itself-competitors-can-probe-models-to-steal-their-secrets-and-clone-them/</loc>
		<lastmod>2026-02-15T12:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deftech-startups-warnen-vor-verminderter-verteidigungsfahigkeit-deutschlands/</loc>
		<lastmod>2026-02-15T12:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-84/</loc>
		<lastmod>2026-02-15T14:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-563-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-02-15T15:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps/</loc>
		<lastmod>2026-02-15T16:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-staging/</loc>
		<lastmod>2026-02-15T16:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ctm360-lumma-stealer-and-ninja-browser-malware-campaign-abusing-google-groups/</loc>
		<lastmod>2026-02-15T17:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-diffence-fencing-membership-privacy-with-diffusion-models/</loc>
		<lastmod>2026-02-15T18:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-diffence-fencing-membership-privacy-with-diffusion-models-2/</loc>
		<lastmod>2026-02-15T18:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-and-pypi-packages-linked-to-lazarus-apt-fake-recruiter-campaign/</loc>
		<lastmod>2026-02-15T19:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-satisfied-are-companies-after-integrating-nhis-in-compliance-frameworks/</loc>
		<lastmod>2026-02-15T22:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-agentic-ai-system-safe-for-medical-records-management-2/</loc>
		<lastmod>2026-02-15T23:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-agentic-ai-system-safe-for-medical-records-management/</loc>
		<lastmod>2026-02-15T23:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-agentic-ai-system-safe-for-medical-records-management-3/</loc>
		<lastmod>2026-02-15T23:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-agentic-ai-system-safe-for-medical-records-management-4/</loc>
		<lastmod>2026-02-15T23:01:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-nhis-ensuring-protected-data-exchanges-in-financial-services/</loc>
		<lastmod>2026-02-15T23:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-businesses-truly-trust-agentic-ai-with-sensitive-data-handling-2/</loc>
		<lastmod>2026-02-15T23:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-businesses-truly-trust-agentic-ai-with-sensitive-data-handling/</loc>
		<lastmod>2026-02-15T23:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077181-fixes-boot-failures-linked-to-failed-updates/</loc>
		<lastmod>2026-02-15T23:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-ki-bot-im-test-von-openclaw-nicht-begeistert-zu-sein-ist-schwer/</loc>
		<lastmod>2026-02-15T23:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-proofs-for-verifiable-mcp-tool-execution/</loc>
		<lastmod>2026-02-16T01:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trusted-tool-weaponized-lotus-blossom-hijacks-notepad-updates/</loc>
		<lastmod>2026-02-16T01:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verteidigung-umfassende-resilienz-gehort-ins-zentrum-der-sicherheitspolitik/</loc>
		<lastmod>2026-02-16T01:02:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/</loc>
		<lastmod>2026-02-16T01:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rings-search-party-dystopia-debate-claude-zero-click-rce-vulnerability/</loc>
		<lastmod>2026-02-16T05:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-panic-over-cisas-kev-list-use-it-smarter/</loc>
		<lastmod>2026-02-16T06:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mos-open-source-modular-os-for-servers-and-homelabs/</loc>
		<lastmod>2026-02-16T06:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-goose-investigating-as-hackers-leak-600k-customer-records-3/</loc>
		<lastmod>2026-02-16T06:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-goose-investigating-as-hackers-leak-600k-customer-records-2/</loc>
		<lastmod>2026-02-16T06:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-goose-investigating-as-hackers-leak-600k-customer-records/</loc>
		<lastmod>2026-02-16T06:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-critical-beyondtrust-flaw-to-seize-full-active-directory-control/</loc>
		<lastmod>2026-02-16T06:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lotus-blossom-hackers-breach-official-notepad-hosting-infrastructure/</loc>
		<lastmod>2026-02-16T06:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-0-day-enables-remote-code-execution-in-ongoing-campaign/</loc>
		<lastmod>2026-02-16T06:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-privacy-labels-often-dont-match-what-chinese-smart-home-apps-do/</loc>
		<lastmod>2026-02-16T07:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-githubs-advisory-pipeline-some-advisories-move-faster-than-others/</loc>
		<lastmod>2026-02-16T07:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-zlan-ics-flaws-enabling-full-device-takeover/</loc>
		<lastmod>2026-02-16T07:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerodayrat-exploit-targets-android-ios-enabling-real-time-surveillance-and-massive-data-theft/</loc>
		<lastmod>2026-02-16T07:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dos-und-rce-forscher-entdecken-12-openssl-zero-days-mit-ki/</loc>
		<lastmod>2026-02-16T07:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-raas-alter-threat-landscape-new-ransomware-groups-grow-by-30/</loc>
		<lastmod>2026-02-16T07:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-raas-alter-threat-landscape-new-ransomware-groups-grow-by-30-2/</loc>
		<lastmod>2026-02-16T07:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-raas-alter-threat-landscape-new-ransomware-groups-grow-by-30-3/</loc>
		<lastmod>2026-02-16T07:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-years-later-bangladesh-bank-cyberheist-still-offers-cyber-resiliency-lessons/</loc>
		<lastmod>2026-02-16T08:00:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-fixes-actively-exploited-cve-2026-2441-bug/</loc>
		<lastmod>2026-02-16T08:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-at-ai-speed-the-new-ciso-reality/</loc>
		<lastmod>2026-02-16T08:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filezen-flaw-allows-attackers-to-execute-commands-remotely/</loc>
		<lastmod>2026-02-16T08:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filezen-flaw-allows-attackers-to-execute-commands-remotely-2/</loc>
		<lastmod>2026-02-16T08:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-5-0-emerges-cross-platform-ransomware-now-targeting-windows-linux-and-esxi-systems/</loc>
		<lastmod>2026-02-16T08:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chrome-zero-day-cve-2026-2441-under-active-attack-patch-released/</loc>
		<lastmod>2026-02-16T08:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-betrug-wird-2026-zur-reputationsgefahr-so-wappnen-sich-unternehmen-gegen-ki-gestutzte-cyberbedrohungen/</loc>
		<lastmod>2026-02-16T08:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firewall-penetration-testing-definition-process-and-tools/</loc>
		<lastmod>2026-02-16T09:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-smart-home-is-watching-you-privacy-in-the-age-of-ai-robots/</loc>
		<lastmod>2026-02-16T09:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-julie-chatman-wants-to-help-you-take-control-of-your-security-leadership-role/</loc>
		<lastmod>2026-02-16T09:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/</loc>
		<lastmod>2026-02-16T09:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matryoshka-clickfix-variant-targets-macos-users-deploys-new-stealer-malware/</loc>
		<lastmod>2026-02-16T09:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprache-als-angriffsflache-bsi-warnt-sprachmodelle-lassen-sich-gezielt-aushebeln/</loc>
		<lastmod>2026-02-16T09:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktiv-ausgenutzt-so-gefahrlich-ist-die-sicherheitslucke-im-microsoft-configuration-manager/</loc>
		<lastmod>2026-02-16T09:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktiv-ausgenutzt-so-gefahrlich-ist-die-sicherheitslucke-im-microsoft-configuration-manager/</loc>
		<lastmod>2026-02-16T09:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-kooperation-soll-souverane-cloud-losungen-bringen/</loc>
		<lastmod>2026-02-16T10:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-kooperation-soll-souverane-cloud-losungen-bringen-2/</loc>
		<lastmod>2026-02-16T10:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-kooperation-soll-souverane-cloud-losungen-bringen-3/</loc>
		<lastmod>2026-02-16T10:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-bots-targeting-websites-of-government-portals-paranormal-activity-blogs/</loc>
		<lastmod>2026-02-16T10:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-ads-and-claude-ai-abused-to-spread-macsync-malware-via-clickfix/</loc>
		<lastmod>2026-02-16T10:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-sex-toys-maker-tenga-discloses-data-breach/</loc>
		<lastmod>2026-02-16T10:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-sex-toys-maker-tenga-discloses-data-breach-2/</loc>
		<lastmod>2026-02-16T10:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-sex-toys-maker-tenga-discloses-data-breach-3/</loc>
		<lastmod>2026-02-16T10:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-beta-brings-privacy-security-and-performance-changes/</loc>
		<lastmod>2026-02-16T10:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-9-2-adds-scripting-updates-diff-improvements-and-experimental-wayland-support/</loc>
		<lastmod>2026-02-16T10:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-9-2-adds-scripting-updates-diff-improvements-and-experimental-wayland-support-3/</loc>
		<lastmod>2026-02-16T10:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-9-2-adds-scripting-updates-diff-improvements-and-experimental-wayland-support-2/</loc>
		<lastmod>2026-02-16T10:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-founder-peter-steinberger-joins-openai-to-strengthen-ai-research/</loc>
		<lastmod>2026-02-16T10:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-airleader-vulnerability-exposes-systems-to-exploitable-remote-attacks/</loc>
		<lastmod>2026-02-16T10:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-breach-impacts-millions-of-dutch-telco-users/</loc>
		<lastmod>2026-02-16T10:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-breach-impacts-millions-of-dutch-telco-users-2/</loc>
		<lastmod>2026-02-16T10:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-sicherheit-secure-boot-zertifikate-laufen-ab-juni-2026-aus-2/</loc>
		<lastmod>2026-02-16T10:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-sicherheit-secure-boot-zertifikate-laufen-ab-juni-2026-aus/</loc>
		<lastmod>2026-02-16T10:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-unabhangigkeit-die-nextcloud-fur-den-rest-von-uns/</loc>
		<lastmod>2026-02-16T10:11:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/configuration-manager-hacker-attackieren-verbreitetes-microsoft-admin-tool/</loc>
		<lastmod>2026-02-16T10:12:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-settle-for-an-ai-soar-the-case-for-autonomous-soc-operations/</loc>
		<lastmod>2026-02-16T11:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pim-login-security/</loc>
		<lastmod>2026-02-16T11:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-gemeinsam-gestalten-bsi-und-schwarz-digits-schliesen-strategische-partnerschaft/</loc>
		<lastmod>2026-02-16T11:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-gemeinsam-gestalten-bsi-und-schwarz-digits-schliesen-strategische-partnerschaft-2/</loc>
		<lastmod>2026-02-16T11:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trusted-tech-alliance-fur-einen-vertrauenswurdigen-technologie-stack/</loc>
		<lastmod>2026-02-16T11:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finding-a-common-language-around-risk/</loc>
		<lastmod>2026-02-16T11:05:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-first-actively-exploited-chrome-zero-day-of-2026/</loc>
		<lastmod>2026-02-16T11:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-gets-new-security-feature-to-fight-prompt-injection-attacks/</loc>
		<lastmod>2026-02-16T11:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-chrome-vulnerability-with-inwild-exploit-cve-2026-2441/</loc>
		<lastmod>2026-02-16T11:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-summarize-with-ai-feature-to-inject-malicious-prompts-into-ai-recommendations/</loc>
		<lastmod>2026-02-16T11:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-payments-to-human-traffickers-surges-85/</loc>
		<lastmod>2026-02-16T11:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-verlangt-erstmeldung-bei-cybervorfallen-in-wenigen-stunden-chinas-neue-cyberregeln-setzen-deutsche-firmen-unter-druck/</loc>
		<lastmod>2026-02-16T11:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutzer-klare-regeln-fur-bodycams-in-zugen-gefordert/</loc>
		<lastmod>2026-02-16T11:13:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-secure-authentication-faster-when-saas-teams-should-go-passwordless/</loc>
		<lastmod>2026-02-16T12:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-security-incidents-of-2025-lazarus-groups-cryptocurrency-heist/</loc>
		<lastmod>2026-02-16T12:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaky-chrome-extensions-with-37m-installs-caught-shipping-your-browsing-history/</loc>
		<lastmod>2026-02-16T12:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sets-course-for-stricter-ai-chatbot-regulation/</loc>
		<lastmod>2026-02-16T12:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-el-paso-no-fly-debacle-is-just-the-beginning-of-a-drone-defense-mess/</loc>
		<lastmod>2026-02-16T12:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zerodayrat-mobile-spyware-enables-real-time-surveillance-and-data-theft/</loc>
		<lastmod>2026-02-16T12:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-in-the-wild-exploit-as-it-patches-new-chrome-zero-day/</loc>
		<lastmod>2026-02-16T12:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitales-selbstaudit-schritt-fur-schritt-nis2-ready/</loc>
		<lastmod>2026-02-16T12:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-im-browser-attacken-auf-chrome-nutzer-beobachtet/</loc>
		<lastmod>2026-02-16T12:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaky-chrome-extensions-with-37m-installs-caught-divulging-your-browsing-history/</loc>
		<lastmod>2026-02-16T13:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-chrome-zero-day-as-in-the-wild-exploits-surface/</loc>
		<lastmod>2026-02-16T13:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-creator-peter-steinberger-joins-openai/</loc>
		<lastmod>2026-02-16T13:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw/</loc>
		<lastmod>2026-02-16T13:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/joomla-vulnerabilities-in-novarain-tassos-framework-expose-sql-injection-risks/</loc>
		<lastmod>2026-02-16T13:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-alert-fake-shops-target-winter-olympics-2026-fans-for-attacks/</loc>
		<lastmod>2026-02-16T13:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cleantalk-plugin-for-wordpress-exposes-sites-to-authorization-bypass-via-reverse-dns/</loc>
		<lastmod>2026-02-16T13:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safe-and-inclusive-esociety-how-lithuania-is-bracing-for-aidriven-cyber-fraud/</loc>
		<lastmod>2026-02-16T13:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutztes-phishing-wie-ki-phishing-webseiten-in-echtzeit-erzeugt/</loc>
		<lastmod>2026-02-16T13:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploited-react2shell-flaw-by-llm-generated-malware-foreshadows-shift-in-threat-landscape/</loc>
		<lastmod>2026-02-16T14:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-promptware-kill-chain/</loc>
		<lastmod>2026-02-16T14:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-microsoft-made-a-car-what-would-it-be/</loc>
		<lastmod>2026-02-16T14:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-alerts-on-dns-based-clickfix-variant-delivering-malware-via-nslookup/</loc>
		<lastmod>2026-02-16T14:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077181-update-triggers-infinite-restart-loop-on-some-devices/</loc>
		<lastmod>2026-02-16T14:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/noodlophile-malware-authors-use-fake-job-ads-and-phishing-schemes-to-evolve-tactics/</loc>
		<lastmod>2026-02-16T14:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idis-cloud-manager-viewer-click-schwachstelle-in-videouberwachungssystem/</loc>
		<lastmod>2026-02-16T14:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modernisierung-eines-schurken-dr-mabuse-kommt-als-cyberthriller-serie-zuruck/</loc>
		<lastmod>2026-02-16T14:08:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawbands-github-project-looks-to-put-human-controls-on-openclaw-ai-agents/</loc>
		<lastmod>2026-02-16T14:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-when-every-ai-agent-becomes-a-sox-risk/</loc>
		<lastmod>2026-02-16T15:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-uses-fake-captcha-pages-to-deliver-stealc-malware-on-windows/</loc>
		<lastmod>2026-02-16T15:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-business-admins-exposed-by-2fa-harvesting-chrome-extension/</loc>
		<lastmod>2026-02-16T15:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-business-admins-exposed-by-2fa-harvesting-chrome-extension-2/</loc>
		<lastmod>2026-02-16T15:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockbit-5-0-ransomware-expands-its-reach-across-windows-linux-and-esxi/</loc>
		<lastmod>2026-02-16T15:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-equips-cisos-and-ai-risk-leaders-with-a-new-security-tool/</loc>
		<lastmod>2026-02-16T15:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/260k-chrome-users-duped-by-fake-ai-browser-extensions/</loc>
		<lastmod>2026-02-16T15:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weekly-recap-outlook-add-ins-hijack-0-day-patches-wormable-botnet-ai-malware/</loc>
		<lastmod>2026-02-16T15:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitat-ist-die-erste-verteidigungslinie-cyberattacken-angreifer-brechen-nicht-mehr-ein-sie-loggen-sich-ein/</loc>
		<lastmod>2026-02-16T15:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-added-nslookup-commands-to-its-arsenal-for-downloading-rats/</loc>
		<lastmod>2026-02-16T15:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-february-9-february-15/</loc>
		<lastmod>2026-02-16T16:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-tries-to-hide-claudes-ai-actions-devs-hate-it/</loc>
		<lastmod>2026-02-16T16:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leaked-600k-canada-goose-customer-records-but-the-firm-denies-it-was-breached/</loc>
		<lastmod>2026-02-16T16:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-borderless-ai-is-coming-to-an-end/</loc>
		<lastmod>2026-02-16T16:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-to-passkeys-staying-iso-27001-compliant-in-a-passwordless-era/</loc>
		<lastmod>2026-02-16T16:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-von-isaca-datenschutzbudgets-werden-schrumpfen/</loc>
		<lastmod>2026-02-16T16:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-fehlende-sichtbarkeit-das-groste-risiko-in-it-und-ot-umgebungen-ist/</loc>
		<lastmod>2026-02-16T16:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-making-security-more-agile-highlights-from-chibrrcon-2026/</loc>
		<lastmod>2026-02-16T16:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-probably-cant-trust-your-password-manager-if-its-compromised/</loc>
		<lastmod>2026-02-16T17:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-evolves-into-multi-platform-fraud-systems/</loc>
		<lastmod>2026-02-16T17:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smes-wrong-to-assume-they-wont-be-hit-by-cyber-attacks-ncsc-boss-warns/</loc>
		<lastmod>2026-02-16T17:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oysterloader-evolves-with-new-c2-infrastructure-and-obfuscation/</loc>
		<lastmod>2026-02-16T17:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-doppelbrand-weaponizes-trusted-brands-for-credential-theft/</loc>
		<lastmod>2026-02-16T17:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-kommentar-zur-munchner-sicherheitskonferenz-2026-digitale-resilienz-auf-basis-europaischer-losungen/</loc>
		<lastmod>2026-02-16T17:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-cops-arrest-man-after-sending-him-confidential-files-by-mistake/</loc>
		<lastmod>2026-02-16T18:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-snags-openclaw-creator-for-agent-push/</loc>
		<lastmod>2026-02-16T18:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meeting-ncsc-msp-guidance-a-competitive-advantage/</loc>
		<lastmod>2026-02-16T18:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meeting-ncsc-msp-guidance-a-competitive-advantage-2/</loc>
		<lastmod>2026-02-16T18:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-antivirus-app-spreads-android-malware-steals-banking-credentials/</loc>
		<lastmod>2026-02-16T18:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/</loc>
		<lastmod>2026-02-16T18:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-malware-found-stealing-openclaw-secrets-for-first-time-2/</loc>
		<lastmod>2026-02-16T18:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-malware-found-stealing-openclaw-secrets-for-first-time-3/</loc>
		<lastmod>2026-02-16T18:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-doppelbrand-weaponizing-fortune-500-brands/</loc>
		<lastmod>2026-02-16T18:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerabilities-in-password-managers-allow-hackers-to-view-and-change-passwords/</loc>
		<lastmod>2026-02-16T18:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-aurora-coolness/</loc>
		<lastmod>2026-02-16T18:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-method-to-facilitate-membership-inference-attacks-in-deep-learning-models/</loc>
		<lastmod>2026-02-16T19:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-500000-vkontakte-accounts-hijacked-through-malicious-chrome-extensions/</loc>
		<lastmod>2026-02-16T19:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starlink-restrictions-hit-russian-forces-as-moscow-seeks-workarounds/</loc>
		<lastmod>2026-02-16T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/16th-february-threat-intelligence-report/</loc>
		<lastmod>2026-02-16T19:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-goose-ruffles-feathers-over-600k-record-dump-says-leak-is-old-news/</loc>
		<lastmod>2026-02-16T19:05:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-misconfigured-ai-could-trigger-infrastructure-collapse/</loc>
		<lastmod>2026-02-16T19:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-rce-exploited-for-domain-control/</loc>
		<lastmod>2026-02-16T19:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-sap-ericsson-und-nokia-us-konzerne-grunden-die-trusted-tech-alliance/</loc>
		<lastmod>2026-02-16T19:08:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-steals-openclaw-ai-agent-configuration-files-and-gateway-tokens/</loc>
		<lastmod>2026-02-16T20:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-uncovers-25-password-recovery-attacks-in-major-cloud-password-managers/</loc>
		<lastmod>2026-02-16T20:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-maintainers-being-targeted-by-ai-agent-as-part-of-reputation-farming/</loc>
		<lastmod>2026-02-16T19:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-security-flaw-at-davaindia-pharmacy-allowed-attackers-to-access-customers-data-and-more/</loc>
		<lastmod>2026-02-16T20:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-scam-tricks-windows-users-into-installing-malware/</loc>
		<lastmod>2026-02-16T20:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/</loc>
		<lastmod>2026-02-16T20:03:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web-2/</loc>
		<lastmod>2026-02-16T20:03:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-arrested-for-demanding-reward-after-accidental-police-data-leak/</loc>
		<lastmod>2026-02-16T20:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-siguard-guarding-secure-inference-with-post-data-privacy/</loc>
		<lastmod>2026-02-16T21:00:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-the-hidden-risks-lurking-beneath-legal-ai-permission-sprawl-governance-drift/</loc>
		<lastmod>2026-02-16T21:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-cisos-uber-openclaw-wissen-sollten/</loc>
		<lastmod>2026-02-16T21:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-winter-olympics-2026-stores-target-fans-with-data-theft-scams/</loc>
		<lastmod>2026-02-16T21:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-winter-olympics-2026-stores-target-fans-with-data-theft-scams-2/</loc>
		<lastmod>2026-02-16T21:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-winter-olympics-2026-stores-target-fans-with-data-theft-scams-3/</loc>
		<lastmod>2026-02-16T21:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-hotel-in-japan-discloses-ransomware-infection-incident/</loc>
		<lastmod>2026-02-16T22:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-stakeholders-reassured-by-enhanced-secrets-scanning-methodologies/</loc>
		<lastmod>2026-02-16T22:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-agentic-ai-systems-to-evolving-cyber-threats/</loc>
		<lastmod>2026-02-16T23:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-does-agentic-ai-provide-a-calm-approach-to-crisis-management-2/</loc>
		<lastmod>2026-02-16T23:02:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-does-agentic-ai-provide-a-calm-approach-to-crisis-management/</loc>
		<lastmod>2026-02-16T23:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-innovation-in-nhis-contribute-to-better-secrets-security/</loc>
		<lastmod>2026-02-16T23:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-innovation-in-nhis-contribute-to-better-secrets-security-2/</loc>
		<lastmod>2026-02-16T23:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploitable-flaws-found-in-cloud-based-password-managers/</loc>
		<lastmod>2026-02-16T23:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grundinstandsetzung-der-staatsbibliothek-in-berlin-rund-54-millionen-bucher-auf-vier-andere-standorte-zu-verteilen/</loc>
		<lastmod>2026-02-16T23:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grundinstandsetzung-der-staatsbibliothek-in-berlin-rund-54-millionen-bucher-auf-vier-andere-standorte-zu-verteilen-2/</loc>
		<lastmod>2026-02-16T23:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-stack-teletrust-kommentar-zur-gegenwartigen-konzeption-zeigt-handlungsbedarf-auf/</loc>
		<lastmod>2026-02-17T00:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-launch-portal-to-report-substance-use-disorder-breaches/</loc>
		<lastmod>2026-02-17T00:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hiding-in-plain-sight-apt28s-operation-macromaze/</loc>
		<lastmod>2026-02-17T00:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-safe-multi-party-computation-for-distributed-ai-datasets/</loc>
		<lastmod>2026-02-17T05:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-werkzeug-zur-waffe-ki-agenten-greifen-an/</loc>
		<lastmod>2026-02-17T05:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strenge-compliance-vs-user-experience-der-balanceakt-in-der-sicheren-it-architektur/</loc>
		<lastmod>2026-02-17T05:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-julie-chatman-offers-insights-for-you-to-take-control-of-your-security-leadership-role/</loc>
		<lastmod>2026-02-17T05:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-julie-chatman-offers-insights-for-you-to-take-control-of-your-security-leadership-role-2/</loc>
		<lastmod>2026-02-17T05:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-set-to-release-home-brew-hypervisor-as-a-vmware-alternative/</loc>
		<lastmod>2026-02-17T05:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-red-teaming-reduces-breach-risk/</loc>
		<lastmod>2026-02-17T05:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-unternehmen-bei-der-mitarbeiterprufung-jetzt-beachten-mussen/</loc>
		<lastmod>2026-02-17T06:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/token-exchange-identitaten-sicher-uber-domanengrenzen-hinweg-autorisieren/</loc>
		<lastmod>2026-02-17T06:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-screenconnect-to-hijack-pcs-via-fake-social-security-emails/</loc>
		<lastmod>2026-02-17T06:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-screenconnect-to-hijack-pcs-via-fake-social-security-emails-2/</loc>
		<lastmod>2026-02-17T06:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langchain-community-ssrf-bypass-vulnerability-exposes-internal-services-to-unauthorized-access/</loc>
		<lastmod>2026-02-17T06:04:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-target-openclaw-configurations-to-steal-login-credentials/</loc>
		<lastmod>2026-02-17T06:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25-vulnerabilities-found-in-cloud-password-managers-exposing-users-to-unauthorized-access-and-changes/</loc>
		<lastmod>2026-02-17T06:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strenger-als-der-rest-warum-deutsche-unternehmen-riskante-geschaftspartner-schneller-fallen-lassen/</loc>
		<lastmod>2026-02-17T07:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-encrypted-data-is-already-being-stolen/</loc>
		<lastmod>2026-02-17T07:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-encrypted-data-is-already-being-stolen-2/</loc>
		<lastmod>2026-02-17T07:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remnux-v8-brings-ai-integration-to-the-linux-malware-analysis-toolkit/</loc>
		<lastmod>2026-02-17T07:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/0apt-ransomware-group-claims-200-victims-fails-to-provide-proof/</loc>
		<lastmod>2026-02-17T07:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-schwachstellen-unter-verdacht-eu-kommission-bestatigt-schweren-cyberangriff/</loc>
		<lastmod>2026-02-17T07:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-1357-wordpress-plugin-rce-exposes-sites-to-full-takeover/</loc>
		<lastmod>2026-02-17T08:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrast-adr-for-google-security-operations/</loc>
		<lastmod>2026-02-17T08:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dss-files-charges-against-el-rufai-over-alleged-nsa-phone-interception/</loc>
		<lastmod>2026-02-17T08:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realmo-launches-location-intelligence-engine-to-match-vacant-properties-with-their-best-use/</loc>
		<lastmod>2026-02-17T08:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-nifi-vulnerabilities-expose-systems-to-authorization-bypass-attacks/</loc>
		<lastmod>2026-02-17T08:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-exposes-facebook-business-manager-accounts-to-2fa-and-analytics-theft/</loc>
		<lastmod>2026-02-17T08:06:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qr-codes-exploited-for-phishing-attacks-and-malware-spread-on-mobile-devices/</loc>
		<lastmod>2026-02-17T08:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-tests-endend-encrypted-rcs-messaging-in-ios-26-4-developer-beta/</loc>
		<lastmod>2026-02-17T08:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omnichannel-inbox-wird-ohne-zero-trust-zur-schwachstelle-vom-risiko-zum-enabler-zero-trust-in-der-kundenkommunikation/</loc>
		<lastmod>2026-02-17T08:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-wie-microsoft-mit-neuen-ki-funktionen-eine-sicherheitslucke-schuf/</loc>
		<lastmod>2026-02-17T08:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrug-auf-kleinanzeigen-diese-maschen-kosten-verkaufer-und-kaufer-bares-geld/</loc>
		<lastmod>2026-02-17T08:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-google-oder-microsoft-arbeiten-wie-gut-ist-europaische-software-im-alltag/</loc>
		<lastmod>2026-02-17T08:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-polish-your-coding-assignments-with-better-documentation/</loc>
		<lastmod>2026-02-17T08:59:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sso-simplifies-identity-management-for-deskless-and-frontline-workforces/</loc>
		<lastmod>2026-02-17T09:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-leverages-ai-workflows-with-microsoft-365-copilot-for-task-automation/</loc>
		<lastmod>2026-02-17T09:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-fork-of-legitimate-triton-app-discovered-on-github-exposing-new-malware-threat/</loc>
		<lastmod>2026-02-17T09:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-fork-of-legitimate-triton-app-discovered-on-github-exposing-new-malware-threat-2/</loc>
		<lastmod>2026-02-17T09:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobile-mitarbeiter-neue-tools-und-zugriffe-absichern-sophos-kundigt-workspace-protection-fur-hybrides-arbeiten-an/</loc>
		<lastmod>2026-02-17T09:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-interrail-und-discovereu-daten-von-bahnreisenden-kursieren-im-darknet/</loc>
		<lastmod>2026-02-17T09:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-interrail-und-discovereu-daten-von-bahnreisenden-kursieren-im-darknet-2/</loc>
		<lastmod>2026-02-17T09:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-interrail-und-discovereu-daten-von-bahnreisenden-kursieren-im-darknet-3/</loc>
		<lastmod>2026-02-17T09:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advancements-in-passkey-authentication-in-europe/</loc>
		<lastmod>2026-02-17T10:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-iso-certificate-truly-valid/</loc>
		<lastmod>2026-02-17T10:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mod-ticks-shopping-list-as-pm-considers-weapons-budget-boost/</loc>
		<lastmod>2026-02-17T10:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-sell-stolen-eurail-traveler-information-on-dark-web/</loc>
		<lastmod>2026-02-17T10:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitstealer-infostealer-targets-macos-revealing-critical-infrastructure-vulnerabilities/</loc>
		<lastmod>2026-02-17T10:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-v147-0-3-released-with-critical-fix-for-heap-buffer-overflow-vulnerability/</loc>
		<lastmod>2026-02-17T10:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-targets-openclaw-to-loot-victims-digital-life/</loc>
		<lastmod>2026-02-17T10:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-single-sign-on-sso-code/</loc>
		<lastmod>2026-02-17T11:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-security-research-finds-governance-determines-trust-in-ai/</loc>
		<lastmod>2026-02-17T11:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-agent-security-controls-are-enough-and-when-theyre-not/</loc>
		<lastmod>2026-02-17T11:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-cisos-stretched-thin-re-envisioning-enterprise-risk-may-be-the-only-fix/</loc>
		<lastmod>2026-02-17T11:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-2025s-agentic-ai-boom-is-a-cisos-worst-nightmare/</loc>
		<lastmod>2026-02-17T11:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-steal-openclaw-configuration-in-emerging-ai-agent-threat/</loc>
		<lastmod>2026-02-17T11:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phobos-ransomware-affiliate-arrested-in-poland/</loc>
		<lastmod>2026-02-17T11:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-now-also-investigating-x-over-grok-made-sexual-images/</loc>
		<lastmod>2026-02-17T11:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sophisticated-carding-as-a-service-marketplaces-fuel-surge-in-credit-card-fraud/</loc>
		<lastmod>2026-02-17T11:10:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-finds-summarize-with-ai-prompts-manipulating-chatbot-recommendations/</loc>
		<lastmod>2026-02-17T11:10:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zentrale-verarbeitung-von-ereignisdaten-in-serverumgebungen-und-event-management-mit-windows-ereignisweiterleitung/</loc>
		<lastmod>2026-02-17T11:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hausdurchsuchung-polizei-leakt-versehentlich-daten-und-verhaftet-empfanger/</loc>
		<lastmod>2026-02-17T11:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hobby-coder-accidentally-creates-vacuum-robot-army/</loc>
		<lastmod>2026-02-17T12:01:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/information-stored-in-european-passports/</loc>
		<lastmod>2026-02-17T12:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-links-cellebrite-to-the-hacking-of-a-kenyan-presidential-candidates-phone/</loc>
		<lastmod>2026-02-17T12:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-links-cellebrite-to-the-hacking-of-a-kenyan-presidential-candidates-phone-2/</loc>
		<lastmod>2026-02-17T12:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unit-42-nearly-two-thirds-of-breaches-now-start-with-identity-abuse/</loc>
		<lastmod>2026-02-17T12:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-secure-by-design-systems-are-non-negotiable-in-the-ai-era/</loc>
		<lastmod>2026-02-17T12:06:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-gov-launches-cyber-lockdown-campaign-as-80-of-orgs-still-leave-door-open/</loc>
		<lastmod>2026-02-17T12:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ireland-joins-regulator-smackdown-after-xs-grok-ai-accused-of-undressing-people/</loc>
		<lastmod>2026-02-17T12:08:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-securely-edit-and-redact-sensitive-pdfs-a-cybersecurity-guide/</loc>
		<lastmod>2026-02-17T12:09:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/encrypted-rcs-messaging-support-lands-in-apples-ios-26-4-developer-build/</loc>
		<lastmod>2026-02-17T12:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-duck-expands-polaris-integrations-to-streamline-enterprise-devsecops-across-major-scm-platforms/</loc>
		<lastmod>2026-02-17T12:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-arrests-suspect-linked-to-phobos-ransomware-operation/</loc>
		<lastmod>2026-02-17T12:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-malware-payload-targets-browser-cache-warns-cybersecurity-experts/</loc>
		<lastmod>2026-02-17T12:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-parliament-suspends-ai-integration-on-corporate-devices-over-cybersecurity-fears/</loc>
		<lastmod>2026-02-17T12:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/status-quo-und-ausblick-zur-cloud-security-trend-2026-wohin-sich-cloud-sicherheit-entwickeln-wird/</loc>
		<lastmod>2026-02-17T12:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-passworttresore-uber-kompromittierte-server-geknackt/</loc>
		<lastmod>2026-02-17T12:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erpressungsversuch-polizei-leakt-versehentlich-daten-und-verhaftet-empfanger/</loc>
		<lastmod>2026-02-17T12:17:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/80-of-attck-mitre-techniques-now-dedicated-to-evasion-and-persistence/</loc>
		<lastmod>2026-02-17T13:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptography-for-dkim-pgp-and-s-mime-quantum-threat-to-email-security/</loc>
		<lastmod>2026-02-17T13:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/large-language-model-llm-integration-risks-for-saas-and-enterprise/</loc>
		<lastmod>2026-02-17T13:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofpoint-boosts-deal-protection-profitability-with-launch-of-new-partner-program/</loc>
		<lastmod>2026-02-17T13:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korea-slaps-25m-fine-on-dior-louis-vuitton-tiffany-over-salesforce-breach/</loc>
		<lastmod>2026-02-17T13:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/government-wages-cyber-campaign-as-half-the-uks-smes-are-breached/</loc>
		<lastmod>2026-02-17T13:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-transport-police-start-using-live-facial-recognition/</loc>
		<lastmod>2026-02-17T13:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firmware-level-android-backdoor-found-on-tablets-from-multiple-manufacturers/</loc>
		<lastmod>2026-02-17T13:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-dora-goes-from-afterthought-to-commercial-imperative/</loc>
		<lastmod>2026-02-17T13:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-hotel-in-japan-hit-by-ransomware-attack/</loc>
		<lastmod>2026-02-17T13:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matanbuchus-3-0-unleashes-astarionrat-via-clickfix-social-engineering-and-silent-msi-installs/</loc>
		<lastmod>2026-02-17T13:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/matanbuchus-3-0-unleashes-astarionrat-via-clickfix-social-engineering-and-silent-msi-installs-2/</loc>
		<lastmod>2026-02-17T13:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indias-largest-pharmacy-exposes-customer-personal-data-and-internal-system-access/</loc>
		<lastmod>2026-02-17T13:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-modern-soc-teams-use-ai-and-context-to-investigate-cloud-breaches-faster/</loc>
		<lastmod>2026-02-17T13:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-day-getting-my-hands-dirty-with-an-ndr-system/</loc>
		<lastmod>2026-02-17T13:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-chrome-now-zero-day-bug-allows-code-execution-via-malicious-webpages/</loc>
		<lastmod>2026-02-17T14:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/side-channel-attacks-against-llms/</loc>
		<lastmod>2026-02-17T14:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerodayrat-spyware-targets-android-and-ios-devices-via-commercial-toolkit/</loc>
		<lastmod>2026-02-17T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-arrest-man-who-refused-to-delete-confidential-files-shared-by-mistake/</loc>
		<lastmod>2026-02-17T14:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-cops-nab-47-year-old-man-in-phobos-ransomware-raid/</loc>
		<lastmod>2026-02-17T14:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poorly-crafted-phishing-campaign-leverages-bogus-security-incident-report/</loc>
		<lastmod>2026-02-17T14:06:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pressure-builds-on-grok-ai-ireland-launches-investigation/</loc>
		<lastmod>2026-02-17T14:07:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-gen-spotlights-trailblazing-a-mindful-people-first-approach-to-cyber-qa-with-cyber-innovations-ltd/</loc>
		<lastmod>2026-02-17T14:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-atlassian-cloud-to-launch-spam-campaigns-promoting-fraudulent-investments/</loc>
		<lastmod>2026-02-17T14:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-set-to-block-telegram-access-nationwide-from-april-1/</loc>
		<lastmod>2026-02-17T14:10:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartloader-attack-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer/</loc>
		<lastmod>2026-02-17T14:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-privileged-ai-drives-4-5-times-higher-incident-rates/</loc>
		<lastmod>2026-02-17T14:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/significant-rise-in-ransomware-attacks-targeting-industrial-operations/</loc>
		<lastmod>2026-02-17T14:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-von-eset-fast-jeder-zweite-pc-nutzt-noch-veraltetes-windows-10/</loc>
		<lastmod>2026-02-17T14:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euer-blick-in-die-zukunft-der-it-senior-developer-werden-immer-wichtiger-werden/</loc>
		<lastmod>2026-02-17T14:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/murena-volla-tablet-mit-google-freiem-e-os-erhaltlich/</loc>
		<lastmod>2026-02-17T14:16:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-cisa-warnung-diese-schwachstellen-sollten-ganz-hoch-auf-die-patch-agenda/</loc>
		<lastmod>2026-02-17T14:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-excellence-awards-reveal-nomination-shift-from-ai-hype-to-governance-execution/</loc>
		<lastmod>2026-02-17T15:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-under-fire-why-openclaw-needs-ztna-and-aisecure-protection/</loc>
		<lastmod>2026-02-17T15:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ahead-of-the-curve-hickman-county-school-districts-proactive-approach-to-student-safety/</loc>
		<lastmod>2026-02-17T15:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-supporters-of-iran-protests-in-new-espionage-campaign/</loc>
		<lastmod>2026-02-17T15:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-the-middle-turning-web-based-ai-services-into-c2-proxies-the-future-of-ai-driven-attacks/</loc>
		<lastmod>2026-02-17T15:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lawyers-fire-up-privacy-class-action-accusing-lenovo-of-bulk-data-transfers-to-china/</loc>
		<lastmod>2026-02-17T15:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-excellence-awards-reveal-nomination-shift-from-ai-hype-to-governance-execution-2/</loc>
		<lastmod>2026-02-17T15:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-power-up-your-exam-prep/</loc>
		<lastmod>2026-02-17T15:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-teams-are-losing-the-time-advantage-against-industrial-threat-actors/</loc>
		<lastmod>2026-02-17T15:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-keenadu-backdoor-found-in-android-firmware-google-play-apps/</loc>
		<lastmod>2026-02-17T15:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-keenadu-backdoor-found-in-android-firmware-google-play-apps-2/</loc>
		<lastmod>2026-02-17T15:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/low-skilled-cybercriminals-use-ai-to-perform-vibe-extortion-attacks/</loc>
		<lastmod>2026-02-17T15:11:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-leads-owasp-smart-contract-top-10-2026-as-governance-and-access-failures-drive-onchain-risk/</loc>
		<lastmod>2026-02-17T16:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/previously-compromised-data-why-credential-exposure-never-expires/</loc>
		<lastmod>2026-02-17T16:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcsc-2026-politik-und-wirtschaft-mussen-zusammenarbeiten/</loc>
		<lastmod>2026-02-17T16:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2026-security-100/</loc>
		<lastmod>2026-02-17T16:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-coolest-endpoint-and-managed-security-companies-of-2026-the-security-100/</loc>
		<lastmod>2026-02-17T16:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-agentic-endpoint-security-startup-koi/</loc>
		<lastmod>2026-02-17T16:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-agentic-endpoint-security-startup-koi-2/</loc>
		<lastmod>2026-02-17T16:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-in-passwortgeschutzten-zip-dateien-blockieren/</loc>
		<lastmod>2026-02-17T16:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-contributes-to-owasps-2026-smart-contract-security-priorities/</loc>
		<lastmod>2026-02-17T16:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-cybercrime-police-arrest-man-linked-to-phobos-ransomware-operation/</loc>
		<lastmod>2026-02-17T16:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/design-weaknesses-in-major-password-managers-enable-vault-attacks-researchers-say/</loc>
		<lastmod>2026-02-17T16:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-outage-affects-users-in-united-states-europe/</loc>
		<lastmod>2026-02-17T16:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-5-million-apps-revealed-about-secrets-in-javascript/</loc>
		<lastmod>2026-02-17T16:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-excellence-awards-reveal-nomination-shift-from-ai-hype-to-governance-execution-3/</loc>
		<lastmod>2026-02-17T16:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-expands-rcs-encryption-and-memory-protections-in-ios-26-4/</loc>
		<lastmod>2026-02-17T16:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-von-dell-unternehmen-testen-ihre-notfallplane-zu-selten/</loc>
		<lastmod>2026-02-17T16:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-defending-against-membership-inference-attacks-on-iteratively-pruned-deep-neural-network/</loc>
		<lastmod>2026-02-17T17:00:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-learnings-from-the-2026-identity-breach-report/</loc>
		<lastmod>2026-02-17T17:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-modern-api-attacks-what-we-learn-from-the-2026-api-threatstats-report/</loc>
		<lastmod>2026-02-17T17:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-identified-hacking-groups-provide-access-to-ot-environments/</loc>
		<lastmod>2026-02-17T17:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-only-extortion-grows-as-ransomware-gangs-seek-better-profits/</loc>
		<lastmod>2026-02-17T17:04:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-parliament-blocks-ai-on-lawmakers-devices-citing-security-risks/</loc>
		<lastmod>2026-02-17T17:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mate-security-introduces-the-security-context-graph-an-approach-to-smarter-socs/</loc>
		<lastmod>2026-02-17T17:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-beta-introduces-secure-by-default-architecture/</loc>
		<lastmod>2026-02-17T17:07:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazons-ring-scraps-law-enforcement-integration-amid-surveillance-conflagrations/</loc>
		<lastmod>2026-02-17T18:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-healthcare-became-ransomwares-favorite-target-a-4-4m-lesson-every-ciso-needs/</loc>
		<lastmod>2026-02-17T18:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-guard-for-desktop-a-second-set-of-eyes-for-suspicious-moments-2/</loc>
		<lastmod>2026-02-17T18:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-guard-for-desktop-a-second-set-of-eyes-for-suspicious-moments/</loc>
		<lastmod>2026-02-17T18:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-coolest-identity-access-and-data-security-companies-of-2026-the-security-100/</loc>
		<lastmod>2026-02-17T18:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-koi-acquisition-is-all-about-keeping-ai-agents-in-check/</loc>
		<lastmod>2026-02-17T18:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verlangerung-des-drohnen-fuhrerscheins-notwendig-aber-langst-nicht-hinreichend/</loc>
		<lastmod>2026-02-17T18:06:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealers-target-openclaw-ai-configuration-files/</loc>
		<lastmod>2026-02-17T18:07:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isc2-webinar-power-up-your-exam-prep/</loc>
		<lastmod>2026-02-17T18:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-contributes-to-owasps-2026-smart-contract-security-priorities-2/</loc>
		<lastmod>2026-02-17T18:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates/</loc>
		<lastmod>2026-02-17T18:10:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-juno-uses-context-to-scale-secops/</loc>
		<lastmod>2026-02-17T19:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-goose-says-leaked-customer-transaction-data-did-not-come-from-company-systems/</loc>
		<lastmod>2026-02-17T19:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-kenyan-authorities-used-cellebrite-to-break-into-phone-of-dissident/</loc>
		<lastmod>2026-02-17T19:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-authorities-arrest-alleged-phobos-ransomware-affiliate/</loc>
		<lastmod>2026-02-17T19:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elon-musks-ai-bot-snared-in-new-irish-european-probes/</loc>
		<lastmod>2026-02-17T19:05:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-minimization-is-still-an-underrated-security-control/</loc>
		<lastmod>2026-02-17T19:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-boosts-update-security-with-double-lock-mechanism/</loc>
		<lastmod>2026-02-17T19:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-boosts-update-security-with-double-lock-mechanism-2/</loc>
		<lastmod>2026-02-17T19:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies/</loc>
		<lastmod>2026-02-17T19:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-preloading/</loc>
		<lastmod>2026-02-17T20:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-software-supply-chain-a-federal-imperative-for-2026/</loc>
		<lastmod>2026-02-17T20:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-police-detain-alleged-cybercriminal-with-phobos-ransomware-ties/</loc>
		<lastmod>2026-02-17T20:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartloader-hackers-clone-oura-mcp-project-to-spread-stealc-malware/</loc>
		<lastmod>2026-02-17T20:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatbots-it-outages-devices-top-2026-health-tech-hazards/</loc>
		<lastmod>2026-02-17T20:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-cyber-alliances-risk-fragmenting-in-new-world-order/</loc>
		<lastmod>2026-02-17T20:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/businesses-may-be-caught-by-government-proposals-to-restrict-vpn-use/</loc>
		<lastmod>2026-02-17T20:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-award-nominations-reveal-a-shift-from-ai-hype-to-a-sharper-focus-on-governing-agentic-ai/</loc>
		<lastmod>2026-02-17T21:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/context-based-attestation-a-practical-approach-to-high-confidence-identity-verification/</loc>
		<lastmod>2026-02-17T21:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-it-time-to-take-the-leap-migrate-from-heroku-to-kubernetes/</loc>
		<lastmod>2026-02-17T21:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kettering-health-notifying-patients-of-interlock-breach/</loc>
		<lastmod>2026-02-17T21:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fresh-cyberespionage-operation-tied-to-iranian-surveillance/</loc>
		<lastmod>2026-02-17T21:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-25903-impacts-apache-nifi-users/</loc>
		<lastmod>2026-02-17T21:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/</loc>
		<lastmod>2026-02-17T21:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attacks-abuses-dns-lookup-command-to-deliver-modelorat/</loc>
		<lastmod>2026-02-17T21:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-ladder-multi-objective-backdoor-attack-via-evolutionary-algorithm/</loc>
		<lastmod>2026-02-17T21:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/</loc>
		<lastmod>2026-02-17T22:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-enabled-by-basic-failings-palo-alto-analysis-finds/</loc>
		<lastmod>2026-02-17T22:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-startups-to-take-innovation-spotlight-at-rsac-2026/</loc>
		<lastmod>2026-02-17T22:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-grc-program-really-reducing-risk/</loc>
		<lastmod>2026-02-17T22:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-flaw-enables-ai-log-poisoning-risk/</loc>
		<lastmod>2026-02-17T22:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/</loc>
		<lastmod>2026-02-17T22:06:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rmm-abuse-explodes-as-hackers-ditch-malware/</loc>
		<lastmod>2026-02-17T22:07:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-remains-embedded-in-us-energy-networks-for-the-purpose-of-taking-it-down/</loc>
		<lastmod>2026-02-17T23:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japans-washington-hotel-reports-ransomware-attack/</loc>
		<lastmod>2026-02-17T23:02:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-embeds-malware-in-android-devices/</loc>
		<lastmod>2026-02-17T23:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-embeds-malware-in-android-devices-2/</loc>
		<lastmod>2026-02-17T23:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-energy-survives-attack-on-wind-solar-infrastructure/</loc>
		<lastmod>2026-02-17T23:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-the-investments-in-agentic-ai-security-systems-justified/</loc>
		<lastmod>2026-02-18T00:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-are-agentic-ai-driven-compliance-audits/</loc>
		<lastmod>2026-02-18T00:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-devops-teams-empowered-by-automated-secrets-rotation/</loc>
		<lastmod>2026-02-18T00:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-operate-independently-of-continuous-human-oversight/</loc>
		<lastmod>2026-02-18T00:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-user-managed-access/</loc>
		<lastmod>2026-02-18T00:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-new-control-plane-introducing-static-scanning-for-ai-agent-configurations/</loc>
		<lastmod>2026-02-18T00:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hsckers-exploit-zero-day-flaw-in-dell-recoverpoint-for-virtual-machines/</loc>
		<lastmod>2026-02-18T00:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-doubles-down-on-ai-agent-defense-with-50m-raise/</loc>
		<lastmod>2026-02-18T00:07:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/</loc>
		<lastmod>2026-02-18T00:09:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-zero-day-flaw-in-dell-recoverpoint-for-virtual-machines/</loc>
		<lastmod>2026-02-18T00:59:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-nics-secret-knocks-dell-zero-day-cvss-10-exploited-by-unc6201/</loc>
		<lastmod>2026-02-18T01:01:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-exploited-a-dell-zero-day-for-18-months-before-anyone-noticed/</loc>
		<lastmod>2026-02-18T01:02:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burnout-probleme-der-cybersicherheitsbranche-stress-und-erschopfung-beruhren-unternehmenskultur/</loc>
		<lastmod>2026-02-18T01:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burnout-probleme-der-cybersicherheitsbranche-stress-und-erschopfung-beruhren-unternehmenskultur-2/</loc>
		<lastmod>2026-02-18T01:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-wenn-eine-verzerrte-selbstwahrnehmung-zum-sicherheitsrisiko-wird/</loc>
		<lastmod>2026-02-18T01:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intellexas-predator-spyware-used-to-hack-iphone-of-journalist-in-angola-research-says/</loc>
		<lastmod>2026-02-18T01:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-snoops-have-been-exploiting-dell-0-day-since-mid-2024-using-ghost-nics-to-avoid-detection/</loc>
		<lastmod>2026-02-18T01:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-fines-disney-2-75-million-in-record-ccpa-case/</loc>
		<lastmod>2026-02-18T04:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-threat-detection-for-quantum-enabled-side-channel-attacks/</loc>
		<lastmod>2026-02-18T05:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-fragen-gegen-drittanbieterrisiken/</loc>
		<lastmod>2026-02-18T05:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-crescentharvest-malware-targets-iranian-dissidents/</loc>
		<lastmod>2026-02-18T05:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-crescentharvest-malware-targets-iranian-dissidents-2/</loc>
		<lastmod>2026-02-18T05:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-its-4-major-telcos-fend-off-chinese-hackers/</loc>
		<lastmod>2026-02-18T05:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-ceo-says-ai-isnt-great-for-business-yet/</loc>
		<lastmod>2026-02-18T06:00:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-cross-border-logistics-operations/</loc>
		<lastmod>2026-02-18T06:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secureclaw-dual-stack-open-source-security-plugin-and-skill-for-openclaw/</loc>
		<lastmod>2026-02-18T06:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-0-day-vulnerability-targeted-by-chinese-hackers-since-mid-2024-for-ongoing-malware-campaign-2/</loc>
		<lastmod>2026-02-18T06:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-0-day-vulnerability-targeted-by-chinese-hackers-since-mid-2024-for-ongoing-malware-campaign/</loc>
		<lastmod>2026-02-18T06:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/master-xdr-investigations-a-deep-dive-into-the-gravityzone-xdr-demo-incident/</loc>
		<lastmod>2026-02-18T07:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-hat-bei-cyberkriminellen-weiter-hochkonjunktur/</loc>
		<lastmod>2026-02-18T07:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banks-need-revocable-ai-identities-continuous-trust-models/</loc>
		<lastmod>2026-02-18T07:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-defense-industrial-base-is-a-prime-target-for-cyber-disruption/</loc>
		<lastmod>2026-02-18T07:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyone-uses-open-source-but-patching-still-moves-too-slowly/</loc>
		<lastmod>2026-02-18T07:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-windows-admin-center-exposes-systems-to-privilege-escalation-attacks/</loc>
		<lastmod>2026-02-18T07:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-windows-admin-center-exposes-systems-to-privilege-escalation-attacks-2/</loc>
		<lastmod>2026-02-18T07:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-exploits-booking-com-partners-targets-customers-in-multi-stage-fraud-scheme/</loc>
		<lastmod>2026-02-18T07:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-log-poisoning-flaw-enables-malicious-content-injection/</loc>
		<lastmod>2026-02-18T07:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crescentharvest-malware-campaign-uses-iran-protest-lures-to-deploy-infostealing-rat/</loc>
		<lastmod>2026-02-18T07:09:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemeldet-aber-nicht-behoben-gravierende-rce-schwachstelle-in-claude-desktop-extension/</loc>
		<lastmod>2026-02-18T07:10:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-coding-agents-gain-new-plugin-support-across-development-tools/</loc>
		<lastmod>2026-02-18T08:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-coding-agents-gain-new-plugin-support-across-development-tools-2/</loc>
		<lastmod>2026-02-18T08:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-actively-exploited-google-chromium-0day-vulnerability/</loc>
		<lastmod>2026-02-18T08:04:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foxveil-malware-loader-uses-cloudflare-netlify-and-discord-to-bypass-detection/</loc>
		<lastmod>2026-02-18T08:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update/</loc>
		<lastmod>2026-02-18T08:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nicht-menschliche-identitaten-brauchen-einen-kill-switch-warum-cyber-resilienz-2026-die-neue-cyber-recovery-wird/</loc>
		<lastmod>2026-02-18T08:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hype-oder-echte-losung-mcp-bringt-vielen-devs-kaum-vorteile-aber-sicherheitslucken/</loc>
		<lastmod>2026-02-18T08:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hype-oder-echte-losung-mcp-bringt-vielen-devs-kaum-vorteile-aber-sicherheitslucken-2/</loc>
		<lastmod>2026-02-18T08:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-paradigm-for-raising-up-secure-software-engineers/</loc>
		<lastmod>2026-02-18T08:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-in-dell-recoverpoint-exploited-by-chinese-hacker-group/</loc>
		<lastmod>2026-02-18T08:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-72-of-enterprises-are-rewriting-cyber-resilience-playbooks/</loc>
		<lastmod>2026-02-18T09:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-update-lets-soc-teams-manage-vet-response-tools/</loc>
		<lastmod>2026-02-18T09:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-update-lets-soc-teams-manage-vet-response-tools-3/</loc>
		<lastmod>2026-02-18T09:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-update-lets-soc-teams-manage-vet-response-tools-2/</loc>
		<lastmod>2026-02-18T09:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-update-lets-soc-teams-manage-vet-response-tools-4/</loc>
		<lastmod>2026-02-18T09:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-sonnet-4-6-launches-with-improved-coding-and-expanded-developer-tools/</loc>
		<lastmod>2026-02-18T09:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metamask-users-targeted-by-phishing-emails-with-fake-security-report-to-bypass-detection/</loc>
		<lastmod>2026-02-18T09:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-fixes-hijacked-update-mechanism-used-to-deliver-targeted-malware/</loc>
		<lastmod>2026-02-18T09:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-sicherheit-bleibt-eine-gefragte-schlusselkompetenz-weiterbildungszertifikat-fur-cloud-security/</loc>
		<lastmod>2026-02-18T09:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacken-auf-vms-hacker-nutzen-fest-kodierte-zugangsdaten-in-dell-tool-aus/</loc>
		<lastmod>2026-02-18T09:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-risks-report-2026-geopolitische-und-wirtschaftliche-risiken-nehmen-zu/</loc>
		<lastmod>2026-02-18T09:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suped-review-features-user-experience-pros-cons-2026/</loc>
		<lastmod>2026-02-18T10:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keenadu-backdoor-found-preinstalled-on-android-devices-powers-ad-fraud-campaign/</loc>
		<lastmod>2026-02-18T10:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-campaign-targets-crypto-users-with-fake-metamask-wallet-and-remote-access-backdoor/</loc>
		<lastmod>2026-02-18T10:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sysupdate-variant-malware-discovered-decryption-tool-for-linux-c2-traffic-released/</loc>
		<lastmod>2026-02-18T10:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonome-ki-als-neue-angriffsflache-in-der-it-sicherheit/</loc>
		<lastmod>2026-02-18T10:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-your-organization-take-the-quantum-leap-in-2026-read-this-first/</loc>
		<lastmod>2026-02-18T11:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-use-fake-gemini-ai-chatbot-to-sell-fake-google-coin/</loc>
		<lastmod>2026-02-18T11:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-metrics-that-actually-predict-a-breach/</loc>
		<lastmod>2026-02-18T11:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-security-incidents-of-2025-chrome-browser-0-day-vulnerability-exploitation/</loc>
		<lastmod>2026-02-18T11:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-approach-for-genai-risk-protection/</loc>
		<lastmod>2026-02-18T11:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-exploits-homebrew-workflow-to-deploy-cuckoo-stealer-for-macos-credential-theft/</loc>
		<lastmod>2026-02-18T11:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-to-acquire-koi-security-for-enhanced-agentic-endpoint-security/</loc>
		<lastmod>2026-02-18T11:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-group-exploits-dell-zero-day-for-two-years/</loc>
		<lastmod>2026-02-18T11:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-act-macht-cybersicherheit-zur-compliance-pflicht-ai-act-bringt-neue-cybersicherheitspflichten-fur-ki-systeme/</loc>
		<lastmod>2026-02-18T11:09:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riverty-group-wahlt-omada-fur-skalierbare-identity-security/</loc>
		<lastmod>2026-02-18T11:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eudi-wallet-ccc-gegen-social-media-verbot-fur-jugendliche-2/</loc>
		<lastmod>2026-02-18T11:11:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eudi-wallet-ccc-gegen-social-media-verbot-fur-jugendliche/</loc>
		<lastmod>2026-02-18T11:11:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eudi-wallet-ccc-gegen-social-media-verbot-fur-jugendliche-3/</loc>
		<lastmod>2026-02-18T11:12:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwort-manager-im-sicherheitscheck-studie-deckt-erhebliche-schwachstellen-auf/</loc>
		<lastmod>2026-02-18T11:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-mit-ki-wie-microsoft-einen-42-jahre-alten-editor-zum-sicherheitsrisiko-machte/</loc>
		<lastmod>2026-02-18T11:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-bei-saugrobotern-wie-ein-tuftler-versehentlich-zugriff-auf-tausende-gerate-bekam/</loc>
		<lastmod>2026-02-18T11:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-an-effective-incident-response-strategy-to-combat-cyberattacks/</loc>
		<lastmod>2026-02-18T12:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-control-is-the-new-front-door-of-application-security/</loc>
		<lastmod>2026-02-18T12:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-wandel-hin-zu-technologisch-verifizierbarem-vertrauen-in-digitalen-markten/</loc>
		<lastmod>2026-02-18T12:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-bahn-stort-auskunftssysteme/</loc>
		<lastmod>2026-02-18T12:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discipline-is-the-new-power-move-in-cybersecurity-leadership/</loc>
		<lastmod>2026-02-18T12:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-arrest-man-for-hacking/</loc>
		<lastmod>2026-02-18T12:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/good-enough-emulation-fuzzing-a-single-thread-to-uncover-vulnerabilities/</loc>
		<lastmod>2026-02-18T12:07:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/good-enough-emulation-fuzzing-a-single-thread-to-uncover-vulnerabilities-2/</loc>
		<lastmod>2026-02-18T12:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-updating-tscs-after-bug-hunters-question-if-theyre-training-ai/</loc>
		<lastmod>2026-02-18T12:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-google-chromium-css-microsoft-windows-teamt5-threatsonar-anti-ransomware-and-zimbra-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-18T12:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-secures-update-channel-in-wake-of-supply-chain-compromise/</loc>
		<lastmod>2026-02-18T12:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-stolen-credential-is-all-it-takes-to-compromise-everything/</loc>
		<lastmod>2026-02-18T12:11:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glendale-man-gets-5-years-in-prison-for-role-in-darknet-drug-ring/</loc>
		<lastmod>2026-02-18T12:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-attack-chain-triggers-enterprise-wide-malware-infection-in-organizations/</loc>
		<lastmod>2026-02-18T12:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-attack-chain-triggers-enterprise-wide-malware-infection-in-organizations-2/</loc>
		<lastmod>2026-02-18T12:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawhavoc-infects-openclaws-clawhub-with-1184-malicious-skills-exposing-data-theft-risks/</loc>
		<lastmod>2026-02-18T12:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024/</loc>
		<lastmod>2026-02-18T12:16:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-ways-to-start-your-intelligent-workflow-program/</loc>
		<lastmod>2026-02-18T12:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/record-number-of-ransomware-victims-and-groups-in-2025/</loc>
		<lastmod>2026-02-18T12:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-punkte-checkliste-fur-unternehmen-cybersicherheit-in-der-lieferkette/</loc>
		<lastmod>2026-02-18T12:19:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-shadow-apis-to-shadow-ai-how-the-api-threat-model-is-expanding-faster-than-most-defenses/</loc>
		<lastmod>2026-02-18T13:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-art-of-one-upmanship/</loc>
		<lastmod>2026-02-18T13:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keenadu-android-malware-that-comes-preinstalled-and-cant-be-removed-by-users/</loc>
		<lastmod>2026-02-18T13:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-can-jailbreak-an-f-35-just-like-an-iphone-says-dutch-defense-chief/</loc>
		<lastmod>2026-02-18T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-apt-weaponized-dell-recoverpoint-zero-day-since-2024/</loc>
		<lastmod>2026-02-18T13:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/</loc>
		<lastmod>2026-02-18T13:06:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-ivanti-epmm-zero-day-vulnerabilities-exploited-in-the-wild-targeting-corporate-networks/</loc>
		<lastmod>2026-02-18T13:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrliche-backdoor-android-malware-in-firmware-und-auf-google-play-entdeckt/</loc>
		<lastmod>2026-02-18T13:08:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ovhcloud-dns-integration-simplify-dmarc-deployment-across-all-your-domains/</loc>
		<lastmod>2026-02-18T14:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/job-scam-uses-fake-google-forms-site-to-harvest-google-logins/</loc>
		<lastmod>2026-02-18T14:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-found-twelve-new-vulnerabilities-in-openssl-2/</loc>
		<lastmod>2026-02-18T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-found-twelve-new-vulnerabilities-in-openssl/</loc>
		<lastmod>2026-02-18T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edtech-magazine-what-minimum-viable-cybersecurity-looks-like-for-k12-districts/</loc>
		<lastmod>2026-02-18T14:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-werkstatt-hacker-nehmen-das-handwerk-ins-visier/</loc>
		<lastmod>2026-02-18T14:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-four-popular-vs-code-extensions-left-128-million-installs-open-to-attack/</loc>
		<lastmod>2026-02-18T14:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-im-handwerk-60-prozent-der-betriebe-waren-im-vergangenen-jahr-betroffen/</loc>
		<lastmod>2026-02-18T14:07:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mull-als-datenquelle-thermische-abfallbehandlung-zur-energiegewinnung-mit-iot-datenauswertung/</loc>
		<lastmod>2026-02-18T14:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-declares-hardened-update-process-effectively-unexploitable/</loc>
		<lastmod>2026-02-18T14:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-exploit-trust-in-atlassian-jira-to-target-organizations/</loc>
		<lastmod>2026-02-18T14:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-framework-v2026-2-17-adds-anthropic-model-support-amid-credential-theft-bug-concerns/</loc>
		<lastmod>2026-02-18T14:11:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptocurrency-scams-in-asia-combine-malvertising-and-pig-butchering-causing-losses-up-to-%c2%a510-million/</loc>
		<lastmod>2026-02-18T14:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs/</loc>
		<lastmod>2026-02-18T14:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs/</loc>
		<lastmod>2026-02-18T14:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-instability/</loc>
		<lastmod>2026-02-18T14:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-instability-2/</loc>
		<lastmod>2026-02-18T14:14:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/helpdesk-chaos-oder-sicherer-self-service-warum-active-directory-passwort-resets-bei-hybrider-arbeit-explodieren/</loc>
		<lastmod>2026-02-18T14:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-verwaltungstool-gefahrliche-sicherheitslucke-in-windows-admin-center/</loc>
		<lastmod>2026-02-18T14:17:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-patch-behebt-probleme-im-austausch-fur-neue-bugs/</loc>
		<lastmod>2026-02-18T14:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-anthropics-bericht-uber-ki-hacker-keine-cve-id-didnt-happen/</loc>
		<lastmod>2026-02-18T14:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sumo-logic-extends-aws-data-center-reach-to-europe/</loc>
		<lastmod>2026-02-18T15:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-i-chose-to-join-attackiq-as-a-senior-advisor/</loc>
		<lastmod>2026-02-18T15:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-openclaw-againstclawhavoc/</loc>
		<lastmod>2026-02-18T15:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/carelessness-versus-craftsmanship-in-cryptography/</loc>
		<lastmod>2026-02-18T15:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/carelessness-versus-craftsmanship-in-cryptography-2/</loc>
		<lastmod>2026-02-18T15:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-ceo-ai-wont-replace-security-tools-any-time-soon/</loc>
		<lastmod>2026-02-18T15:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-bans-chinese-made-cars-from-entering-military-sites/</loc>
		<lastmod>2026-02-18T15:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-used-to-infect-phone-belonging-to-angolan-journalist-report-says/</loc>
		<lastmod>2026-02-18T15:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-ai-generated-password-isnt-random-it-just-looks-that-way/</loc>
		<lastmod>2026-02-18T15:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-edge-145-lands-with-major-enterprise-security-upgrades/</loc>
		<lastmod>2026-02-18T15:10:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-era-of-the-digital-parasite-why-stealth-has-replaced-ransomware/</loc>
		<lastmod>2026-02-18T15:11:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/</loc>
		<lastmod>2026-02-18T15:12:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bahn-de-und-db-navigator-hackerangriff-trifft-die-bahn/</loc>
		<lastmod>2026-02-18T15:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-coolest-security-operations-risk-and-threat-intelligence-companies-of-2026-the-security-100/</loc>
		<lastmod>2026-02-18T16:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-backdoor-found-in-android-tablets-targeting-users-in-russia-germany-and-japan/</loc>
		<lastmod>2026-02-18T16:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-former-microsoft-pm-thinks-she-can-unseat-cyberark-in-18-months/</loc>
		<lastmod>2026-02-18T16:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-former-microsoft-pm-thinks-she-can-unseat-cyberark-in-18-months-2/</loc>
		<lastmod>2026-02-18T16:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-office-bug-exposed-customers-confidential-emails-to-copilot-ai/</loc>
		<lastmod>2026-02-18T16:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gentoo-dumps-github-over-copilot-nagware/</loc>
		<lastmod>2026-02-18T16:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vs-code-extensions-with-125m-installs-expose-users-to-cyberattacks/</loc>
		<lastmod>2026-02-18T16:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-exploited-dell-zero-day-since-2024-cve-2026-22769/</loc>
		<lastmod>2026-02-18T16:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-assistants-used-as-covert-commandcontrol-relays/</loc>
		<lastmod>2026-02-18T16:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-betrug-und-unsichere-inhalte-2025-gab-es-346-ki-vorfalle-chatgpt-am-haufigsten-beteiligt/</loc>
		<lastmod>2026-02-18T16:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-grosere-kante-aws-kann-ddos-attacke-auf-die-bahn-nicht-abfangen/</loc>
		<lastmod>2026-02-18T16:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-admin-center-verbreitetes-microsoft-verwaltungstool-ist-angreifbar/</loc>
		<lastmod>2026-02-18T16:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-clibe-detecting-dynamic-backdoors-in-transformer-based-nlp-models/</loc>
		<lastmod>2026-02-18T17:01:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sre-playbook-a-guide-to-discover-and-catalog-non-human-identities-nhi/</loc>
		<lastmod>2026-02-18T17:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-synthetic-data-can-help-solve-ais-data-crisis/</loc>
		<lastmod>2026-02-18T17:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-and-supply-chain-need-more-attention-risk-intelligence-firm-says/</loc>
		<lastmod>2026-02-18T17:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-groups-using-ai-to-speed-up-and-scale-cyberattacks/</loc>
		<lastmod>2026-02-18T17:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionen-chrome-erweiterungen-geben-browserverlauf-preis/</loc>
		<lastmod>2026-02-18T17:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fulton-county-lawsuit-claims-feds-used-gross-mischaracterizations-to-justify-raid/</loc>
		<lastmod>2026-02-18T17:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-train-line-back-on-track-after-ddos-yanks-the-brakes/</loc>
		<lastmod>2026-02-18T17:08:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-admin-center-flaw-opens-door-to-privilege-escalation/</loc>
		<lastmod>2026-02-18T17:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/</loc>
		<lastmod>2026-02-18T17:10:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anti-phishing-rules-mistakenly-blocked-emails-teams-messages/</loc>
		<lastmod>2026-02-18T17:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptojacking-campaign-exploits-driver-to-boost-monero-mining/</loc>
		<lastmod>2026-02-18T17:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-alltagliche-dimension-aws-kann-ddos-attacke-auf-die-bahn-nicht-abfangen/</loc>
		<lastmod>2026-02-18T17:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-our-critical-infrastructure-with-zero-trust/</loc>
		<lastmod>2026-02-18T18:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-coolest-web-email-and-application-security-companies-of-2026-the-security-100/</loc>
		<lastmod>2026-02-18T18:02:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-alleging-it-allows-china-to-hack-into-routers/</loc>
		<lastmod>2026-02-18T18:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-alleging-it-allows-china-to-hack-into-routers-2/</loc>
		<lastmod>2026-02-18T18:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-over-china-links-and-security-vulnerabilities/</loc>
		<lastmod>2026-02-18T18:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-increasingly-prefer-fast-and-low-complexity-attacks/</loc>
		<lastmod>2026-02-18T18:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/booking-com-phishing-campaign-hijacks-hotel-accounts-to-defraud-guests/</loc>
		<lastmod>2026-02-18T18:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-affecting-the-world-of-the-soc/</loc>
		<lastmod>2026-02-18T18:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-vast-trove-of-exposed-social-security-numbers-may-put-millions-at-risk-of-identity-theft/</loc>
		<lastmod>2026-02-18T18:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grandstream-gxp1600-voip-phones-exposed-to-unauthenticated-remote-code-execution/</loc>
		<lastmod>2026-02-18T18:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forrester-wave-zeichnet-sysdig-als-fuhrend-im-bereich-cnapp-aus/</loc>
		<lastmod>2026-02-18T18:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-cost-savings/</loc>
		<lastmod>2026-02-18T19:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/engineering-for-the-inevitable-managing-downstream-failures-in-security-data-pipelines/</loc>
		<lastmod>2026-02-18T19:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-fintech-giant-figure-affects-close-to-a-million-customers/</loc>
		<lastmod>2026-02-18T19:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudster-hacked-hotel-system-paid-1-cent-for-luxury-rooms-spanish-cops-say/</loc>
		<lastmod>2026-02-18T19:04:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutsche-bahn-back-on-track-after-ddos-yanks-the-brakes/</loc>
		<lastmod>2026-02-18T19:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passive-rfids-can-now-stream-telemetry-data-from-sensors/</loc>
		<lastmod>2026-02-18T19:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firebase-misconfiguration-exposes-300m-messages-from-chat-ask-ai-users/</loc>
		<lastmod>2026-02-18T19:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pomptware-attacks-await-an-unprepared-ai-industry/</loc>
		<lastmod>2026-02-18T19:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pomptware-attacks-await-an-unprepared-ai-industry-2/</loc>
		<lastmod>2026-02-18T19:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/substack-breach-may-have-leaked-nearly-700000-user-details-online/</loc>
		<lastmod>2026-02-18T19:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-goes-corporate-huntress-report-reveals-rise-of-scalable-stealth-first-attacks/</loc>
		<lastmod>2026-02-18T19:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-finds-cellebrite-tool-used-on-kenyan-activists-phone-in-police-custody/</loc>
		<lastmod>2026-02-18T19:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-lock-not-the-alarm-how-palo-altos-koi-acquisition-rewrites-endpoint-security/</loc>
		<lastmod>2026-02-18T20:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msps-and-supporting-modern-compliance/</loc>
		<lastmod>2026-02-18T20:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptware-attacks-await-an-unprepared-ai-industry/</loc>
		<lastmod>2026-02-18T20:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xss-bug-in-vs-code-extension-exposed-local-files/</loc>
		<lastmod>2026-02-18T20:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-google-microsoft-products-added-to-cisa-catalogue/</loc>
		<lastmod>2026-02-18T20:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/0apt-ransomware-crew-makes-embarrassing-splash/</loc>
		<lastmod>2026-02-18T20:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-cisos-playbook-for-defending-data-assets-against-ai-scraping/</loc>
		<lastmod>2026-02-18T20:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-security-flaw-that-exposed-confidential-emails-to-ai-2/</loc>
		<lastmod>2026-02-18T21:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-security-flaw-that-exposed-confidential-emails-to-ai/</loc>
		<lastmod>2026-02-18T21:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-try-to-poison-my-deep-learning-data-nowhere-to-hide-your-trajectory-spectrum/</loc>
		<lastmod>2026-02-18T21:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterment-data-breach-might-be-worse-than-we-thought/</loc>
		<lastmod>2026-02-18T21:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-allegedly-drove-off-with-1-7m-cargurus-records/</loc>
		<lastmod>2026-02-18T21:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-patches-flaw-used-to-hijack-update-system/</loc>
		<lastmod>2026-02-18T21:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-commands-found-in-ai-summarize-buttons/</loc>
		<lastmod>2026-02-18T21:09:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-in-dell-recoverpoint-enables-grimbolt-backdoor/</loc>
		<lastmod>2026-02-18T21:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-platforms-can-be-abused-for-stealthy-malware-communication/</loc>
		<lastmod>2026-02-18T21:10:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moltbook-is-dangerous-but-scale-doesnt-match-the-hype-zenity/</loc>
		<lastmod>2026-02-18T22:03:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-moves-to-secure-agentic-endpoints-with-koi-deal/</loc>
		<lastmod>2026-02-18T22:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fed-agencies-ordered-to-patch-dell-bug-by-saturday-after-exploitation-warning/</loc>
		<lastmod>2026-02-18T22:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/</loc>
		<lastmod>2026-02-18T22:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dells-hard-coded-flaw-a-nation-state-goldmine/</loc>
		<lastmod>2026-02-18T22:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-cloud-environments-truly-protected-by-nhis/</loc>
		<lastmod>2026-02-18T23:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-cloud-environments-truly-protected-by-nhis-2/</loc>
		<lastmod>2026-02-18T23:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-secrets-sprawl-management-getting-better-with-ai/</loc>
		<lastmod>2026-02-18T23:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-techniques-in-nhi-management-offer-maximum-reassurance/</loc>
		<lastmod>2026-02-18T23:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-cybersecurity-professionals-confident-in-agentic-ai-defenses/</loc>
		<lastmod>2026-02-18T23:06:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/figure-breach-enters-new-phase-after-data-leak-claims/</loc>
		<lastmod>2026-02-18T23:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-exploited-zero-day-dell-recoverpoint-flaw-for-1-5-years/</loc>
		<lastmod>2026-02-18T23:08:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-conference-def-con-bans-three-people-linked-to-epstein/</loc>
		<lastmod>2026-02-18T23:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-ministry-confirms-data-access-to-1-2-million-bank-accounts/</loc>
		<lastmod>2026-02-18T23:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norton-healthcare-to-pay-11m-to-settle-blackcat-lawsuit/</loc>
		<lastmod>2026-02-18T23:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-abuses-gemini-chatbots-to-convince-people-to-buy-fake-crypto/</loc>
		<lastmod>2026-02-18T23:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-grandstream-voip-bug-highlights-smb-security-blind-spot/</loc>
		<lastmod>2026-02-18T23:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-i-finally-made-peace-with-the-term-zero-trust/</loc>
		<lastmod>2026-02-19T00:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-firewall-management-to-adaptive-security-what-idcs-2026-report-means-for-security-leaders/</loc>
		<lastmod>2026-02-19T00:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-agentic-top-10-agent-goal-hijack-firetail-blog/</loc>
		<lastmod>2026-02-19T00:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-author-says-fixes-make-update-mechanism-effectively-unexploitable/</loc>
		<lastmod>2026-02-19T00:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragos-cybersecurity-report-2026-zur-ot-bedrohung-ransomware-angreifer-erhohen-operativen-druck-auf-industrielle-infrastrukturen-und-kritis/</loc>
		<lastmod>2026-02-19T00:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-for-covering-up-chinese-manufacturing/</loc>
		<lastmod>2026-02-19T00:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chronosphere-deal-signals-security-observability-convergence/</loc>
		<lastmod>2026-02-19T00:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/koi-purchase-bolsters-palo-altos-ai-attack-surface-defense/</loc>
		<lastmod>2026-02-19T00:10:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-busy-week-for-cybersecurity-speaking-engagements/</loc>
		<lastmod>2026-02-19T04:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adaptive-heal-security-for-multi-agent-semantic-routing/</loc>
		<lastmod>2026-02-19T04:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-man-sentenced-to-8-years-in-prison-for-running-phony-tax-refund-scheme/</loc>
		<lastmod>2026-02-19T04:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-455-face-off-metas-glasses-and-americas-internet-kill-switch/</loc>
		<lastmod>2026-02-19T04:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eurail-und-interrail-gestohlene-passagier-daten-im-darknet-feilgeboten/</loc>
		<lastmod>2026-02-19T04:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-investigates-third-party-data-breach-after-criminals-claim-they-pwned-the-sportswear-giant/</loc>
		<lastmod>2026-02-19T04:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-windows-admin-center-flaw-allows-privilege-escalation/</loc>
		<lastmod>2026-02-19T04:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burnout-im-digitalen-schutzraum-die-stille-krise-der-cyberbranche-2/</loc>
		<lastmod>2026-02-19T05:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burnout-im-digitalen-schutzraum-die-stille-krise-der-cyberbranche/</loc>
		<lastmod>2026-02-19T05:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consumers-feel-less-judged-by-ai-debt-collectors/</loc>
		<lastmod>2026-02-19T06:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-keep-finding-the-same-gaps-in-security-programs/</loc>
		<lastmod>2026-02-19T06:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-mcp-server-enables-arbitrary-code-execution-and-sensitive-data-exfiltration/</loc>
		<lastmod>2026-02-19T06:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-copilot-vulnerability-exposes-sensitive-emails-through-ai-summaries/</loc>
		<lastmod>2026-02-19T06:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empowering-a-global-saas-workforce-from-identity-security-to-financial-access/</loc>
		<lastmod>2026-02-19T07:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empowering-a-global-saas-workforce-from-identity-security-to-financial-access-2/</loc>
		<lastmod>2026-02-19T07:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/empowering-a-global-saas-workforce-from-identity-security-to-financial-access-3/</loc>
		<lastmod>2026-02-19T07:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/90-prozent-der-ransomware-angriffe-umgehen-firewalls/</loc>
		<lastmod>2026-02-19T07:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advantest-cyberattack-triggers-ransomware-investigation-across-internal-network/</loc>
		<lastmod>2026-02-19T07:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-firefox-issues-emergency-patch-for-heap-buffer-overflow-in-firefox-v147/</loc>
		<lastmod>2026-02-19T07:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-bans-camera-packing-cars-made-in-china-cars-from-military-bases/</loc>
		<lastmod>2026-02-19T07:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-bans-camera-packing-cars-made-in-china-cars-from-military-bases-2/</loc>
		<lastmod>2026-02-19T07:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/public-mobile-networks-are-being-weaponized-for-combat-drone-operations/</loc>
		<lastmod>2026-02-19T07:09:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/public-mobile-networks-are-being-weaponized-for-combat-drone-operations-2/</loc>
		<lastmod>2026-02-19T07:09:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-evmbench-a-new-framework-to-detect-and-exploit-blockchain-vulnerabilities/</loc>
		<lastmod>2026-02-19T07:10:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-launches-evmbench-a-new-framework-to-detect-and-exploit-blockchain-vulnerabilities-2/</loc>
		<lastmod>2026-02-19T07:11:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-expose-digitstealer-c2-infrastructure-targeting-macos-users/</loc>
		<lastmod>2026-02-19T07:12:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-threat-emerges-as-attackers-leverage-grok-and-copilot-to-evade-security-monitoring/</loc>
		<lastmod>2026-02-19T07:14:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/buffer-overflow-und-usefree-schwachstellen-in-freerdp-bedrohen-windows-und-unix/</loc>
		<lastmod>2026-02-19T07:15:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-in-house-ciso-to-consultant-what-you-need-to-know-before-making-the-leap/</loc>
		<lastmod>2026-02-19T08:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-in-house-ciso-to-consultant-what-you-need-to-know-before-making-the-leap-2/</loc>
		<lastmod>2026-02-19T08:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-bans-camera-packing-cars-made-in-china-from-military-bases/</loc>
		<lastmod>2026-02-19T08:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealthy-crypto-mining-malware-jumps-air-gaps-spreads-via-external-drives/</loc>
		<lastmod>2026-02-19T08:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-40-of-south-africans-were-scammed-in-2025/</loc>
		<lastmod>2026-02-19T08:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-angriffe-zwischen-cloud-und-on-premises-warum-fragmentierte-sicherheit-gegen-hybride-angriffe-versagt/</loc>
		<lastmod>2026-02-19T08:08:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-useu-privacy-divide-still-matters-in-the-age-of-ai/</loc>
		<lastmod>2026-02-19T09:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-machines-the-non-human-identities-exposing-your-cloud-ai-stack/</loc>
		<lastmod>2026-02-19T09:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-security-flaws-discovered-in-four-vs-code-extensions-affecting-millions/</loc>
		<lastmod>2026-02-19T09:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intellexas-predator-spyware-infected-angolan-journalists-device-amnesty-reports/</loc>
		<lastmod>2026-02-19T09:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-benchmark-evmbench-tests-how-well-ai-agents-handle-smart-contract-exploits/</loc>
		<lastmod>2026-02-19T09:09:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/redpanda-brings-identity-policy-control-and-data-governance-to-ai-agents/</loc>
		<lastmod>2026-02-19T09:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hide-malware-in-emoji-based-code-to-bypass-security-defenses/</loc>
		<lastmod>2026-02-19T09:11:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hide-malware-in-emoji-based-code-to-bypass-security-defenses-2/</loc>
		<lastmod>2026-02-19T09:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-nslookup-exe-in-clickfix-campaign-to-deliver-malware-via-dns/</loc>
		<lastmod>2026-02-19T09:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-nslookup-exe-in-clickfix-campaign-to-deliver-malware-via-dns-2/</loc>
		<lastmod>2026-02-19T09:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-nslookup-exe-in-clickfix-campaign-to-deliver-malware-via-dns-3/</loc>
		<lastmod>2026-02-19T09:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware/</loc>
		<lastmod>2026-02-19T09:14:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-access-ohne-ip-zeroport-will-vpns-uberflussig-machen/</loc>
		<lastmod>2026-02-19T09:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storungen-bei-app-und-webseite-angriff-schrankt-buchungssystem-der-deutschen-bahn-massiv-ein/</loc>
		<lastmod>2026-02-19T09:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bei-microsoft-bug-lasst-copilot-vertrauliche-mails-lesen/</loc>
		<lastmod>2026-02-19T09:16:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-hype-oder-echte-losung-mcp-bringt-vielen-devs-kaum-vorteile-aber-sicherheitslucken/</loc>
		<lastmod>2026-02-19T09:18:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-attacke-auf-deutsche-bahn-verwundbarkeit-auf-offener-strecke/</loc>
		<lastmod>2026-02-19T10:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-attacke-auf-deutsche-bahn-verwundbarkeit-auf-offener-strecke-2/</loc>
		<lastmod>2026-02-19T10:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-signals-breakthrough-in-data-storage-that-can-last-for-generations/</loc>
		<lastmod>2026-02-19T10:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-introduces-centralized-script-library-powered-by-copilot-for-live-response/</loc>
		<lastmod>2026-02-19T10:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-organizations-to-honeywell-cctv-flaw-enabling-account-takeovers/</loc>
		<lastmod>2026-02-19T10:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-using-fake-google-forms-site-to-harvest-google-logins/</loc>
		<lastmod>2026-02-19T10:07:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/updates-fur-betagte-smartphones-das-iphone-5s-ist-gut-gealtert/</loc>
		<lastmod>2026-02-19T10:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-11-konnte-gesichtsentsperrung-wie-iphone-bekommen/</loc>
		<lastmod>2026-02-19T10:09:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-organize-safely-in-the-age-of-surveillance/</loc>
		<lastmod>2026-02-19T11:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-massiv-android-banking-malware-poses-as-an-iptv-app/</loc>
		<lastmod>2026-02-19T11:12:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users/</loc>
		<lastmod>2026-02-19T11:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-reveal-six-new-openclaw-vulnerabilities/</loc>
		<lastmod>2026-02-19T11:14:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isms-bildet-fundament-fur-nis2-umsetzung-wer-nis-2-als-it-projekt-behandelt-wird-scheitern/</loc>
		<lastmod>2026-02-19T11:16:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/buchungssystem-gehackt-hacker-ubernachtet-fur-nur-einen-cent-in-luxushotels/</loc>
		<lastmod>2026-02-19T11:17:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/must-have-investments-for-security-aware-productive-teams/</loc>
		<lastmod>2026-02-19T11:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitat-ist-der-zugangsweg-daten-sind-das-ziel/</loc>
		<lastmod>2026-02-19T11:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-can-turn-grok-copilot-into-covert-commandcontrol-channels-researchers-warn/</loc>
		<lastmod>2026-02-19T11:06:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-braucht-reife-und-keine-checklisten/</loc>
		<lastmod>2026-02-19T11:07:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealer-found-stealing-openclaw-ai-identity-and-memory-files/</loc>
		<lastmod>2026-02-19T11:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irish-regulator-probes-x-after-grok-allegedly-generated-sexual-images-of-children/</loc>
		<lastmod>2026-02-19T11:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massiv-attack-android-trojan-targets-iptv-users/</loc>
		<lastmod>2026-02-19T11:10:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spf-alignment-why-is-it-important-for-improving-dmarc/</loc>
		<lastmod>2026-02-19T12:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-signing-certificate-validity-changes-now-in-effect-from-february-2026/</loc>
		<lastmod>2026-02-19T12:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credshields-leads-owasp-smart-contract-top-10-2026-as-governance-and-access-failures-drive-onchain-risk-2/</loc>
		<lastmod>2026-02-19T12:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-caracas-operation-suggests-cyber-was-part-of-the-plan-just-not-the-whole-operation/</loc>
		<lastmod>2026-02-19T12:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-demand-social-platforms-take-down-abusive-intimate-images-within-48-hours-2/</loc>
		<lastmod>2026-02-19T12:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-demand-social-platforms-take-down-abusive-intimate-images-within-48-hours/</loc>
		<lastmod>2026-02-19T12:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/men-sentenced-to-8-years-in-1-3-million-computer-intrusion-and-tax-fraud-scheme/</loc>
		<lastmod>2026-02-19T12:10:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/men-sentenced-to-8-years-in-1-3-million-computer-intrusion-and-tax-fraud-scheme-2/</loc>
		<lastmod>2026-02-19T12:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sounds-alarm-on-rising-cyber-risks-to-businesses/</loc>
		<lastmod>2026-02-19T12:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sounds-alarm-on-rising-cyber-risks-to-businesses-2/</loc>
		<lastmod>2026-02-19T12:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sounds-alarm-on-rising-cyber-risks-to-businesses-3/</loc>
		<lastmod>2026-02-19T12:12:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrests-651-suspects-in-african-cybercrime-crackdown-2/</loc>
		<lastmod>2026-02-19T12:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrests-651-suspects-in-african-cybercrime-crackdown/</loc>
		<lastmod>2026-02-19T12:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrests-651-suspects-in-african-cybercrime-crackdown-3/</loc>
		<lastmod>2026-02-19T12:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citizen-lab-finds-evidence-of-mobile-data-extraction-from-detained-kenyan-activist/</loc>
		<lastmod>2026-02-19T12:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-dos-vulnerabilities-in-socomec-diris-m-70-iiot-power-meter-via-thread-emulation-fuzzing/</loc>
		<lastmod>2026-02-19T12:15:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-popular-software-development-app-extensions-allow-data-exfiltration/</loc>
		<lastmod>2026-02-19T12:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-first-security-last-warum-viele-migrationen-ein-gefahrliches-sicherheitsleck-reisen/</loc>
		<lastmod>2026-02-19T12:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fruhwarnsysteme-werden-im-finanzsektor-zwingend-notwendig/</loc>
		<lastmod>2026-02-19T12:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-agents-are-transforming-identity-verification-and-authentication-systems/</loc>
		<lastmod>2026-02-19T13:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-traitors-reveals-about-enterprise-identity-verification/</loc>
		<lastmod>2026-02-19T13:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-flaws-found-hiding-in-openclaws-plumbing/</loc>
		<lastmod>2026-02-19T13:06:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-flaws-found-hiding-in-openclaws-plumbing-2/</loc>
		<lastmod>2026-02-19T13:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servermonitoring-wie-man-logs-wirklich-versteht/</loc>
		<lastmod>2026-02-19T13:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/explosion-in-drei-stufen-die-folgen-der-ki-disruption/</loc>
		<lastmod>2026-02-19T13:09:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-to-critical-auth-bypass-cve-2026-1670-in-honeywell-cctvs/</loc>
		<lastmod>2026-02-19T13:10:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-to-critical-auth-bypass-cve-2026-1670-in-honeywell-cctvs-2/</loc>
		<lastmod>2026-02-19T13:11:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-google-and-microsoft-products-added-to-cisa-catalogue/</loc>
		<lastmod>2026-02-19T13:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-widely-used-voip-phones-allows-stealthy-network-footholds-call-interception-cve-2026-2329/</loc>
		<lastmod>2026-02-19T13:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-first-android-malware-to-use-generative-ai-in-its-execution-flow/</loc>
		<lastmod>2026-02-19T13:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/</loc>
		<lastmod>2026-02-19T13:16:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/</loc>
		<lastmod>2026-02-19T13:17:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-exposure-to-exploitation-how-ai-collapses-your-response-window/</loc>
		<lastmod>2026-02-19T13:17:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-new-commercial-grade-phishing-kit-bypasses-mfa/</loc>
		<lastmod>2026-02-19T13:19:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-new-commercial-grade-phishing-kit-bypasses-mfa-2/</loc>
		<lastmod>2026-02-19T13:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-angriffe-auf-vpn-und-fernzugange-warum-2026-zum-hartetest-fur-hybridarbeit-wird/</loc>
		<lastmod>2026-02-19T13:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-silica-datenspeicher-aus-glas-wird-praktischer/</loc>
		<lastmod>2026-02-19T13:22:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-modern-security-platforms-organize-rules/</loc>
		<lastmod>2026-02-19T14:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-white-label-msp-services-are-key-to-growing-businesses/</loc>
		<lastmod>2026-02-19T14:05:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/learner-engagement-in-the-classroom-5-strategies/</loc>
		<lastmod>2026-02-19T14:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-ssl-tls-certificate-changes-2026-every-website-owner-must-know/</loc>
		<lastmod>2026-02-19T14:07:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kvm-switch-fur-sicheren-fernzugriff-in-unternehmens-und-edge-rechenzentren/</loc>
		<lastmod>2026-02-19T14:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proaktive-bedrohungsaufklarung-und-einheitlicher-schutz-gewinnen-angesichts-wachsender-komplexitat-zunehmend-an-bedeutung/</loc>
		<lastmod>2026-02-19T14:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anteil-reiner-daten-exfiltrationsfalle-steigt-um-das-elffache/</loc>
		<lastmod>2026-02-19T14:10:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/def-con-bans-three-epstein-linked-men-from-future-events/</loc>
		<lastmod>2026-02-19T14:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-lies-to-user-about-health-info-says-it-wanted-to-make-him-feel-better/</loc>
		<lastmod>2026-02-19T14:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-parallel-cve-systems-expose-alternate-vulnerability-disclosure-timeline/</loc>
		<lastmod>2026-02-19T14:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intelligence-has-a-human-shaped-blind-spot/</loc>
		<lastmod>2026-02-19T14:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrial-control-system-vulnerabilities-hit-record-highs/</loc>
		<lastmod>2026-02-19T14:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategische-partnerschaft-fur-digitale-souveranitat-bsi-und-schwarz-digits-entwickeln-souverane-cloud-fur-verschlusssachen/</loc>
		<lastmod>2026-02-19T14:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-regulierung-wird-real-warum-dsgvo-und-ai-act-nur-gemeinsam-funktionieren/</loc>
		<lastmod>2026-02-19T14:16:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-gegen-cybercrime-651-festnahmen-bei-razzien-gegen-online-scammer/</loc>
		<lastmod>2026-02-19T14:17:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehlerhafte-exchange-regeln-verschoben-e-mails-in-quarantane/</loc>
		<lastmod>2026-02-19T14:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-under-control-link11-launches-ai-management-dashboard-for-clean-traffic/</loc>
		<lastmod>2026-02-19T15:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-software-erreicht-spitzenposition-als-leader-fast-mover-im-gigaom-radar-fur-cloud-netzwerksicherheit/</loc>
		<lastmod>2026-02-19T15:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-gegen-mac-nutzer-uber-evernote-links/</loc>
		<lastmod>2026-02-19T15:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-gegen-mac-nutzer-uber-evernote-links-2/</loc>
		<lastmod>2026-02-19T15:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-under-control-link11-launches-ai-management-dashboard-for-clean-traffic-2/</loc>
		<lastmod>2026-02-19T15:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-of-ireland-uk-fined-for-late-security-system-implementation/</loc>
		<lastmod>2026-02-19T15:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-on-1-2-million-french-bank-accounts-accessed-in-registry-breach/</loc>
		<lastmod>2026-02-19T15:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adidas-investigates-alleged-data-breach-affecting-815000-records/</loc>
		<lastmod>2026-02-19T15:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-research-points-to-record-number-of-ics-vulnerabilities-in-2025/</loc>
		<lastmod>2026-02-19T15:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/</loc>
		<lastmod>2026-02-19T15:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms-2/</loc>
		<lastmod>2026-02-19T15:15:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20-stories/</loc>
		<lastmod>2026-02-19T15:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-innovation-und-kontrollverlust-die-drei-stufen-der-ki-revolution/</loc>
		<lastmod>2026-02-19T15:17:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abstract-security-launches-ai-siem-platform-to-analyze-threats-in-real-time/</loc>
		<lastmod>2026-02-19T16:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-threatens-cheyenne-and-arapaho-tribes-after-shutting-down-schools/</loc>
		<lastmod>2026-02-19T16:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-breach-frances-national-bank-account-database/</loc>
		<lastmod>2026-02-19T16:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-student-admissions-website-exposed-childrens-personal-information/</loc>
		<lastmod>2026-02-19T16:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magenta-security-mobile-id-telekom-will-smartphone-zu-universellem-schlussel-machen/</loc>
		<lastmod>2026-02-19T16:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magenta-security-mobile-id-telekom-will-smartphone-zu-universellem-schlussel-machen-2/</loc>
		<lastmod>2026-02-19T16:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-deutschland-klafft-eine-lucke-zwischen-data-governance-und-ki-ertragen/</loc>
		<lastmod>2026-02-19T16:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-als-fuhrendes-unternehmen-im-bereich-cnapp-ausgezeichnet/</loc>
		<lastmod>2026-02-19T16:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dank-daten-in-die-zukunft-deutschlands-weg-zur-ki-transformation/</loc>
		<lastmod>2026-02-19T16:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-use-dell-recoverpoint-flaw-to-drop-grimbolt-malware/</loc>
		<lastmod>2026-02-19T16:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-dell-recoverpoint-and-gitlab-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-19T16:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ivanti-epmm-vulnerabilities-actively-exploited-in-the-wild/</loc>
		<lastmod>2026-02-19T16:15:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-restricts-chinese-made-cars-at-protected-military-sites/</loc>
		<lastmod>2026-02-19T16:17:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/</loc>
		<lastmod>2026-02-19T16:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-infostealers-turn-stolen-credentials-into-real-identities/</loc>
		<lastmod>2026-02-19T16:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrial-scale-fake-coretax-apps-drive-2m-fraud-in-indonesia/</loc>
		<lastmod>2026-02-19T16:21:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheimschutz-polen-sperrt-chinesische-autos-von-militaranlagen-aus/</loc>
		<lastmod>2026-02-19T16:23:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheimschutz-polen-sperrt-chinesische-autos-von-militaranlagen-aus-2/</loc>
		<lastmod>2026-02-19T16:23:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hunderte-online-betruger-verhaftet-und-server-beschlagnahmt/</loc>
		<lastmod>2026-02-19T16:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-microsoft-detail-the-continued-popularity-evolution-of-clickfix-attacks-2/</loc>
		<lastmod>2026-02-19T17:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-microsoft-detail-the-continued-popularity-evolution-of-clickfix-attacks/</loc>
		<lastmod>2026-02-19T17:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-defending-against-backdoor-attacks-on-graph-neural-networks-via-discrepancy-learning/</loc>
		<lastmod>2026-02-19T17:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cloud-and-ai-velocity-trap-why-governance-is-falling-behind-innovation/</loc>
		<lastmod>2026-02-19T17:06:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cloud-and-ai-velocity-trap-why-governance-is-falling-behind-innovation-2/</loc>
		<lastmod>2026-02-19T17:07:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-worlds-connective-tissue-is-woefully-insecure-cisco-warns/</loc>
		<lastmod>2026-02-19T17:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-palo-alto-networks-vs-everyone/</loc>
		<lastmod>2026-02-19T17:09:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-taps-gemini-to-navigate-infected-devices/</loc>
		<lastmod>2026-02-19T17:10:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-taps-gemini-to-navigate-infected-devices-2/</loc>
		<lastmod>2026-02-19T17:10:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-it-drove-off-with-1-7m-cargurus-records/</loc>
		<lastmod>2026-02-19T17:11:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-reveals-critical-windows-admin-center-vulnerability-cve-2026-26119/</loc>
		<lastmod>2026-02-19T17:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-under-control-link11-launches-ai-management-dashboard-for-clean-traffic-3/</loc>
		<lastmod>2026-02-19T17:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-under-control-link11-launches-ai-management-dashboard-for-clean-traffic-4/</loc>
		<lastmod>2026-02-19T17:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-under-control-link11-launches-ai-management-dashboard-for-clean-traffic-5/</loc>
		<lastmod>2026-02-19T17:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remcos-rat-expands-real-time-surveillance-capabilities/</loc>
		<lastmod>2026-02-19T17:14:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-chicken-littles-of-silicon-valley-why-ai-doomsayers-are-repeating-historys-greatest-mistake/</loc>
		<lastmod>2026-02-19T18:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-ads-are-coming-what-800-million-users-need-to-know-about-the-new-economics-of-free-ai/</loc>
		<lastmod>2026-02-19T18:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/findings-from-the-tidal-cyber-2025-threat-led-defense-report/</loc>
		<lastmod>2026-02-19T18:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-look-for-in-bot-agent-trust-management-software-7-key-capabilities/</loc>
		<lastmod>2026-02-19T18:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-passwords-are-a-security-risk/</loc>
		<lastmod>2026-02-19T18:08:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-ceo-sees-ai-as-demand-driver-not-a-threat/</loc>
		<lastmod>2026-02-19T18:08:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-connective-tissue-is-woefully-insecure-cisco-warns/</loc>
		<lastmod>2026-02-19T18:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-groups-use-ai-to-speed-up-and-scale-cyberattacks/</loc>
		<lastmod>2026-02-19T18:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zettelkataloge-der-staatsbibliothek-zu-berlin-sollen-der-forschung-weiter-zur-verfugung-stehen/</loc>
		<lastmod>2026-02-19T18:12:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-paxfuls-4m-penalty/</loc>
		<lastmod>2026-02-19T18:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-banks-need-ai-driven-segmentation-against-ransomware/</loc>
		<lastmod>2026-02-19T18:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/better-auth-flaw-allows-unauthenticated-api-key-creation/</loc>
		<lastmod>2026-02-19T18:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-android-malware-may-exploit-gemini-ai/</loc>
		<lastmod>2026-02-19T18:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/figure-data-breach-exposes-nearly-1-million-customers-online/</loc>
		<lastmod>2026-02-19T18:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping/</loc>
		<lastmod>2026-02-19T18:17:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-link11s-ai-management-dashboard-makes-ai-traffic-ai-access-policies-enforceable/</loc>
		<lastmod>2026-02-19T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-link11s-ai-management-dashboard-makes-ai-traffic-ai-access-policies-enforceable-2/</loc>
		<lastmod>2026-02-19T19:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-burrows-into-identifying-risks-to-health-sector-from-third-party-vendors/</loc>
		<lastmod>2026-02-19T19:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oncd-official-says-trump-administration-aims-to-bolster-ai-use-for-defense-without-increasing-risk/</loc>
		<lastmod>2026-02-19T19:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-hit-a-20m-jackpot-via-malware-stuffed-atms/</loc>
		<lastmod>2026-02-19T19:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-eyes-vpn-enabled-freedom-gov-to-skirt-eu-content-bans/</loc>
		<lastmod>2026-02-19T19:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-ernennt-erfahrenen-finanzmanager-yuneeb-khan-zum-cfo/</loc>
		<lastmod>2026-02-19T19:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konzern-volkswagen-zentrale-entscheidet-kunftig-uber-software/</loc>
		<lastmod>2026-02-19T19:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-llms-make-terrible-databases-and-why-that-matters-for-trusted-ai/</loc>
		<lastmod>2026-02-19T20:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-threat-indicators-beyond-the-firewall/</loc>
		<lastmod>2026-02-19T20:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disclosure-xwiki-css-injection-cve-2026-26000/</loc>
		<lastmod>2026-02-19T20:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disclosure-xwiki-css-injection-cve-2026-26000-2/</loc>
		<lastmod>2026-02-19T20:07:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-require-tech-firms-to-remove-nonconsensual-intimate-images-within-48-hours-or-face-fines/</loc>
		<lastmod>2026-02-19T20:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-threats-from-salt-typhoon-are-still-very-much-ongoing/</loc>
		<lastmod>2026-02-19T20:10:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-to-defeat-ai/</loc>
		<lastmod>2026-02-19T20:10:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germanys-national-rail-operator-deutsche-bahn-hit-by-a-ddos-attack/</loc>
		<lastmod>2026-02-19T20:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-close-to-imposing-hash-matching-for-revenge-porn/</loc>
		<lastmod>2026-02-19T20:13:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-close-to-imposing-hash-matching-for-revenge-porn-2/</loc>
		<lastmod>2026-02-19T20:13:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-servers-expose-a-hidden-ai-attack-surface-in-enterprise-environments/</loc>
		<lastmod>2026-02-19T20:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-blocked-over-1-75-million-play-store-app-submissions-in-2025/</loc>
		<lastmod>2026-02-19T20:16:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence/</loc>
		<lastmod>2026-02-19T20:17:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-operation-red-card-2-0-arrests-651-in-african-cybercrime-crackdown/</loc>
		<lastmod>2026-02-19T20:18:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center/</loc>
		<lastmod>2026-02-19T20:19:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-ndss-2025-barbie-robust-backdoor-detection-based-on-latent-separability/</loc>
		<lastmod>2026-02-19T21:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-ndss-2025-barbie-robust-backdoor-detection-based-on-latent-separability-2/</loc>
		<lastmod>2026-02-19T21:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/west-virginia-sues-apple-for-alleged-child-sexual-abuse-material-failures/</loc>
		<lastmod>2026-02-19T21:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-sues-tp-link-over-alleged-security-risks-and-supply-chain-deception/</loc>
		<lastmod>2026-02-19T21:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connected-and-compromised-when-iot-devices-turn-into-threats/</loc>
		<lastmod>2026-02-19T21:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-more-than-700-atm-jackpotting-incidents-with-losses-over-20-million-occurred-in-2025/</loc>
		<lastmod>2026-02-19T22:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-volt-typhoon-still-embedded-in-us-utilities-and-some-breaches-may-never-be-found/</loc>
		<lastmod>2026-02-19T22:05:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-dept-official-says-post-quantum-transition-plans-will-outlive-current-leadership/</loc>
		<lastmod>2026-02-19T22:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-its-ai-systems-helped-deter-play-store-malware-in-2025/</loc>
		<lastmod>2026-02-19T22:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-cambodia-scam-center-crackdown/</loc>
		<lastmod>2026-02-19T22:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cogent-security-gets-42m-to-boost-ai-vulnerability-defense/</loc>
		<lastmod>2026-02-19T22:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/audit-finds-security-weaknesses-at-va-spokane-medical-center/</loc>
		<lastmod>2026-02-19T22:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abu-dhabi-finance-week-exposed-vip-passport-details/</loc>
		<lastmod>2026-02-19T22:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-new-ai-secrets-vaulting-methods-empowering-better-security/</loc>
		<lastmod>2026-02-19T23:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-new-ai-secrets-vaulting-methods-empowering-better-security-2/</loc>
		<lastmod>2026-02-19T23:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-improve-cybersecurity-in-financial-services/</loc>
		<lastmod>2026-02-19T23:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-improve-cybersecurity-in-financial-services-2/</loc>
		<lastmod>2026-02-19T23:06:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-the-latest-advancements-in-non-human-identity-security/</loc>
		<lastmod>2026-02-19T23:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-must-healthcare-embrace-agentic-ai-for-data-protection/</loc>
		<lastmod>2026-02-19T23:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-dominance-of-agentic-ai-at-the-heart-of-new-nist-initiative/</loc>
		<lastmod>2026-02-19T23:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-says-atm-jackpotting-attacks-are-on-the-rise-and-netting-hackers-millions-in-stolen-cash/</loc>
		<lastmod>2026-02-19T23:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cellebrite-cut-off-serbia-citing-abuse-of-its-phone-unlocking-tools-why-not-others/</loc>
		<lastmod>2026-02-19T23:11:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mvp-development-in-the-age-of-ai-how-startups-can-build-smarter-faster-and-leaner/</loc>
		<lastmod>2026-02-19T23:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-becomes-critical-as-agentic-ai-moves-into-production/</loc>
		<lastmod>2026-02-19T23:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-is-the-first-android-malware-to-use-generative-ai-at-runtime/</loc>
		<lastmod>2026-02-19T23:14:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bestclass-starkiller-phishing-kit-bypasses-mfa/</loc>
		<lastmod>2026-02-19T23:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-most-dangerous-user-is-not-human-how-ai-agents-and-mcp-servers-broke-the-internal-api-walled-garden/</loc>
		<lastmod>2026-02-20T00:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leading-japanese-semiconductor-supplier-responding-to-ransomware-attack/</loc>
		<lastmod>2026-02-20T00:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-sentenced-to-5-years-in-prison-for-facilitating-north-korean-remote-worker-scheme/</loc>
		<lastmod>2026-02-20T00:06:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eco-digitalen-kinder-und-jugendschutz-weiterentwickeln-und-digitale-teilhabe-erhalten/</loc>
		<lastmod>2026-02-20T00:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6000-execs-struggle-to-find-the-ai-productivity-boom/</loc>
		<lastmod>2026-02-20T00:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-flags-for-ot-abound-in-dragos-review-of-2025/</loc>
		<lastmod>2026-02-20T00:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/univ-of-mississippi-medical-center-dealing-with-cyberattack/</loc>
		<lastmod>2026-02-20T00:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-ai-plan-faces-calls-for-enforceable-controls/</loc>
		<lastmod>2026-02-20T00:11:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-fbi-asset-helped-run-a-dark-web-site-that-sold-fentanyl-laced-drugs-for-years/</loc>
		<lastmod>2026-02-20T00:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/</loc>
		<lastmod>2026-02-20T00:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime-2/</loc>
		<lastmod>2026-02-20T00:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-secretly-installs-openclaw-for-cline-users/</loc>
		<lastmod>2026-02-20T00:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lattice-based-zero-trust-identity-verification-for-ai-agents/</loc>
		<lastmod>2026-02-20T04:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lattice-based-zero-trust-identity-verification-for-ai-agents-2/</loc>
		<lastmod>2026-02-20T04:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/esicherheit-ganzheitlich-denken-pravention-statt-schadenbegrenzung/</loc>
		<lastmod>2026-02-20T04:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-campaign-tricks-employees-into-bypassing-microsoft-365-mfa/</loc>
		<lastmod>2026-02-20T04:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphone-kaperung-promptspy-hacker-missbrauchen-google-ki/</loc>
		<lastmod>2026-02-20T04:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-abound-unbound-by-rules-or-safety-disclosures/</loc>
		<lastmod>2026-02-20T04:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ico-wins-appeal-over-data-protection-obligations-in-currys-cyber-attack/</loc>
		<lastmod>2026-02-20T04:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeffrey-epsteins-ties-to-cbp-agents-sparked-a-doj-probe/</loc>
		<lastmod>2026-02-20T04:10:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-10k-bounty-awaits-anyone-who-can-hack-ring-cameras-to-stop-sharing-data-with-amazon/</loc>
		<lastmod>2026-02-20T04:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crims-create-fake-remote-management-vendor-that-actually-sells-a-rat/</loc>
		<lastmod>2026-02-20T04:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chance-statt-risiko-wie-kunstliche-intelligenz-verantwortungsvoll-eingesetzt-wird/</loc>
		<lastmod>2026-02-20T05:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chance-statt-risiko-wie-kunstliche-intelligenz-verantwortungsvoll-eingesetzt-wird-2/</loc>
		<lastmod>2026-02-20T05:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/souverane-ki-braucht-souverane-infrastruktur/</loc>
		<lastmod>2026-02-20T05:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-passwordless-optionen-fur-unternehmen/</loc>
		<lastmod>2026-02-20T05:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-malware-trustconnect-fur-300-euro-im-monat-zu-mieten/</loc>
		<lastmod>2026-02-20T06:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snyk-ceo-bails-wants-someone-with-more-ai-experience-to-replace-him/</loc>
		<lastmod>2026-02-20T06:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uptime-kuma-open-source-monitoring-tool/</loc>
		<lastmod>2026-02-20T06:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-february-20-2026/</loc>
		<lastmod>2026-02-20T06:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-first-android-ai-malware-leverages-googles-gemini-for-decision-making/</loc>
		<lastmod>2026-02-20T06:07:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-ist-globaler-spitzenreiter/</loc>
		<lastmod>2026-02-20T07:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/applying-green-energy-tax-policies-to-improve-cybersecurity/</loc>
		<lastmod>2026-02-20T07:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-security-is-turning-into-a-supply-chain-problem/</loc>
		<lastmod>2026-02-20T07:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-quietly-redefining-enterprise-security-risk/</loc>
		<lastmod>2026-02-20T07:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ongoing-campaign-targets-microsoft-365-to-steal-oauth-tokens-for-persistent-access/</loc>
		<lastmod>2026-02-20T07:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-former-google-engineers-indicted-over-trade-secret-transfers-to-iran/</loc>
		<lastmod>2026-02-20T07:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-20700-apple-behebt-zero-day-in-allen-betriebssystemen/</loc>
		<lastmod>2026-02-20T07:10:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-aispm-isnt-enough-for-the-agentic-era/</loc>
		<lastmod>2026-02-20T08:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-launches-latest-struggle-to-get-rid-of-sms-for-mfa/</loc>
		<lastmod>2026-02-20T08:04:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ciso-view-of-fraud-risk-across-the-retail-payment-ecosystem/</loc>
		<lastmod>2026-02-20T08:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-rushes-out-critical-chrome-update-to-address-serious-pdfium-and-v8-vulnerabilities/</loc>
		<lastmod>2026-02-20T08:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-beyondtrust-vulnerability-to-deploy-vshell-and-sparkrat/</loc>
		<lastmod>2026-02-20T08:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-schatten-ki-und-das-ende-klassischer-verschlusselung-2026-wird-ein-wendepunkt-fur-die-cybersicherheit/</loc>
		<lastmod>2026-02-20T08:07:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-card-2-0-interpol-busts-scam-networks-across-africa-seizes-millions/</loc>
		<lastmod>2026-02-20T09:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-abuses-gemini-ai-to-gain-persistent-access-on-android/</loc>
		<lastmod>2026-02-20T09:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/651-arrested-4-3-million-recovered-in-african-cybercrime-sweep/</loc>
		<lastmod>2026-02-20T09:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-lautet-mit-genai-die-ara-der-android-bedrohungen-ein/</loc>
		<lastmod>2026-02-20T09:07:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-websites-das-druckmittel-der-ransomware-bande-von-heute/</loc>
		<lastmod>2026-02-20T09:08:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-governance-datenzugriff-studie-ki-treibt-datenschutz-investitionen/</loc>
		<lastmod>2026-02-20T09:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategien-zur-verhinderung-von-disruptiven-ransomware-angriffen/</loc>
		<lastmod>2026-02-20T09:09:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-hacker-will-daten-von-rtl-erbeutet-haben/</loc>
		<lastmod>2026-02-20T09:10:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-zero-day-cve-2026-2441-the-css-trap-blog-menlo-security/</loc>
		<lastmod>2026-02-20T10:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonderkommission-ermittelt-zu-cyberangriff-auf-kunstsammlungen-dresden/</loc>
		<lastmod>2026-02-20T10:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leak-check-im-alltag-wie-sich-feststellen-lasst-ob-personenbezogene-daten-im-umlauf-sind-ohne-in-panik-zu-verfallen/</loc>
		<lastmod>2026-02-20T10:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-petabytes-worth-data-of-israelis-siphoned-says-cyber-head/</loc>
		<lastmod>2026-02-20T10:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-forces-clinic-closures-surgery-cancellations-at-university-of-mississippi-medical-center/</loc>
		<lastmod>2026-02-20T10:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms/</loc>
		<lastmod>2026-02-20T10:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-generated-passwords-expose-security-risks-with-predictability-and-weakness/</loc>
		<lastmod>2026-02-20T10:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-reports-1900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025/</loc>
		<lastmod>2026-02-20T10:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-google-engineers-indicted-over-trade-secret-transfers-to-iran/</loc>
		<lastmod>2026-02-20T10:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-nike-breach-teaches-us-about-the-microsegmentation-imperative-of-integrating-with-edr/</loc>
		<lastmod>2026-02-20T11:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-risk-detection-with-automated-vulnerability-assessment-tools/</loc>
		<lastmod>2026-02-20T11:06:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-enthullt-unternehmen-verlieren-die-kontrolle-uber-ki/</loc>
		<lastmod>2026-02-20T11:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-have-16-digit-card-numbers-expiry-dates-but-not-names-should-org-get-500k-fine/</loc>
		<lastmod>2026-02-20T11:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-surge-in-atm-jackpotting-20-million-lost-in-2025/</loc>
		<lastmod>2026-02-20T11:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-it-takes-to-secure-agentic-commerce/</loc>
		<lastmod>2026-02-20T11:09:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-gets-five-years-for-aiding-north-korean-it-employment-scam/</loc>
		<lastmod>2026-02-20T11:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025/</loc>
		<lastmod>2026-02-20T11:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025-2/</loc>
		<lastmod>2026-02-20T11:12:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europas-cybersecurity-startups-erfinden-abwehr-neu-diese-cybersecurity-startups-pragen-europas-sicherheitszukunft/</loc>
		<lastmod>2026-02-20T11:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-empowered-cybersecurity-key-events-and-emerging-trends-in-2025/</loc>
		<lastmod>2026-02-20T12:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-blockchain-sandbox-bfdi-erneut-mit-most-innovative-regulator-award-ausgezeichnet/</loc>
		<lastmod>2026-02-20T12:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-ai-disruption-regulatory-pressure-and-the-evolving-cyber-threat-landscape/</loc>
		<lastmod>2026-02-20T12:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineers-accused-of-helping-themselves-to-chip-security-secrets/</loc>
		<lastmod>2026-02-20T12:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cleans-house-bans-80000-developer-accounts-from-the-play-store/</loc>
		<lastmod>2026-02-20T12:08:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-issues-emergency-alert-as-ploutus-malware-drains-u-s-atms-without-cards-or-accounts/</loc>
		<lastmod>2026-02-20T12:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026/</loc>
		<lastmod>2026-02-20T12:10:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-national-sentenced-to-5-years-in-north-korea-it-worker-fraud-case/</loc>
		<lastmod>2026-02-20T12:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-hijacks-google-gemini-to-stay-hidden/</loc>
		<lastmod>2026-02-20T12:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-sichern-reform-statt-aufweichung-dsgvo-praxistauglich-machen/</loc>
		<lastmod>2026-02-20T12:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-sichern-reform-statt-aufweichung-dsgvo-praxistauglich-machen-2/</loc>
		<lastmod>2026-02-20T12:15:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-data-automation-specialist-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-02-20T12:16:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copilot-bug-ki-liest-ohne-erlaubnis-vertrauliche-e-mails/</loc>
		<lastmod>2026-02-20T12:17:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwort-in-whatsapp-diese-neue-sicherheitsfunktion-soll-dich-noch-besser-schutzen/</loc>
		<lastmod>2026-02-20T12:18:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-cybersecurity-is-a-smarter-faster-path-to-resilience/</loc>
		<lastmod>2026-02-20T13:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-enterprise-cisos-design-their-cyber-risk-management-strategy/</loc>
		<lastmod>2026-02-20T13:06:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-most-breaches-happen-after-launch-saas-security-testing-best-practices/</loc>
		<lastmod>2026-02-20T13:08:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-ads-spread-fake-windows-11-downloads-that-steal-passwords-and-crypto-wallets/</loc>
		<lastmod>2026-02-20T13:09:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-contractor-linked-to-ukraines-central-bank-collectible-coin-store/</loc>
		<lastmod>2026-02-20T13:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-federal-agencies-three-days-to-patch-actively-exploited-dell-bug/</loc>
		<lastmod>2026-02-20T13:10:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-google-engineers-charged-with-orchestrating-high-tech-secrets-extraction/</loc>
		<lastmod>2026-02-20T13:11:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mississippi-medical-center-closes-all-clinics-after-ransomware-attack/</loc>
		<lastmod>2026-02-20T13:13:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/charliekirk-grabber-malware-targets-windows-systems-to-steal-login-credentials/</loc>
		<lastmod>2026-02-20T13:14:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dramatic-escalation-frequency-and-power-of-in-ddos-attacks/</loc>
		<lastmod>2026-02-20T13:16:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dramatic-escalation-frequency-and-power-of-in-ddos-attacks-2/</loc>
		<lastmod>2026-02-20T13:16:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriff-auf-deutsche-bahn-war-das-wirklich-russland/</loc>
		<lastmod>2026-02-20T13:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ready-to-move-on-how-to-evaluate-select-and-deploy-modern-email-security/</loc>
		<lastmod>2026-02-20T14:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-the-soc-why-complete-autonomy-is-the-wrong-goal/</loc>
		<lastmod>2026-02-20T14:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-the-soc-why-complete-autonomy-is-the-wrong-goal-2/</loc>
		<lastmod>2026-02-20T14:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-und-komplexitat-als-brandbeschleuniger-fur-cyberkriminelle/</loc>
		<lastmod>2026-02-20T14:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doge-bites-taxman/</loc>
		<lastmod>2026-02-20T14:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-it-worker-scam-nets-ukrainian-five-year-sentence-in-the-u-s/</loc>
		<lastmod>2026-02-20T14:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminals-create-business-website-to-sell-rat-disguised-as-rmm-tool/</loc>
		<lastmod>2026-02-20T14:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-extends-keeperpam/</loc>
		<lastmod>2026-02-20T14:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-discloses-data-breach-that-exposed-user-info-for-6-months-2/</loc>
		<lastmod>2026-02-20T14:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-discloses-data-breach-that-exposed-user-info-for-6-months/</loc>
		<lastmod>2026-02-20T14:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-discloses-data-breach-that-exposed-user-info-for-6-months-3/</loc>
		<lastmod>2026-02-20T14:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-blocks-1-75-million-malicious-apps-from-entering-play-store/</loc>
		<lastmod>2026-02-20T14:14:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grandstream-voip-phones-vulnerability-grants-attackers-root-privileges/</loc>
		<lastmod>2026-02-20T14:16:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-chiplet-designs-spark-fresh-cybersecurity-challenges/</loc>
		<lastmod>2026-02-20T14:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-rat/</loc>
		<lastmod>2026-02-20T14:18:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/age-verification-vendor-persona-left-frontend-exposed/</loc>
		<lastmod>2026-02-20T15:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partner-level-vulnerability-assessment-and-patch-management-for-msps-in-acronis-rmm/</loc>
		<lastmod>2026-02-20T15:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/musk-and-x-launch-legal-appeal-against-eus-record-euro120-million-fine/</loc>
		<lastmod>2026-02-20T15:07:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-stepping-up-hybrid-attacks-preparing-for-long-standoff-with-west-dutch-intelligence-warns/</loc>
		<lastmod>2026-02-20T15:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-threats-from-salt-typhoon-are-still-very-much-ongoing-2/</loc>
		<lastmod>2026-02-20T15:08:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-wie-vor-kurzem-auf-die-db-konnen-vertrauen-der-kunden-untergraben/</loc>
		<lastmod>2026-02-20T15:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-gets-five-years-for-helping-north-koreans-secure-us-tech-jobs/</loc>
		<lastmod>2026-02-20T15:10:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/founder-ditches-aws-for-euro-stack-finds-sovereignty-isnt-plugplay/</loc>
		<lastmod>2026-02-20T15:11:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-change-their-answers-based-on-whos-asking/</loc>
		<lastmod>2026-02-20T15:13:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latin-americas-cyber-maturity-lags-threat-landscape/</loc>
		<lastmod>2026-02-20T15:14:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cline-cli-2-3-0-supply-chain-attack-installed-openclaw-on-developer-systems/</loc>
		<lastmod>2026-02-20T15:15:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-malware/</loc>
		<lastmod>2026-02-20T15:16:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuartige-voicekits-hebeln-mfa-in-echtzeit-aus/</loc>
		<lastmod>2026-02-20T15:17:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dmarc-providers-in-2026-top-dmarc-services-and-enterprise-solutions/</loc>
		<lastmod>2026-02-20T16:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dmarc-providers-in-2026-top-dmarc-services-and-enterprise-solutions-2/</loc>
		<lastmod>2026-02-20T16:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asp-net-to-net-core-migration-what-cios-and-ctos-need-to-know/</loc>
		<lastmod>2026-02-20T16:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-security-alerts-into-actionable-defense/</loc>
		<lastmod>2026-02-20T16:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-the-shift-left-dream-has-become-a-nightmare-for-security-and-developers/</loc>
		<lastmod>2026-02-20T16:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-data-breach-6-months-of-users-data-leaked-online/</loc>
		<lastmod>2026-02-20T16:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silicon-valley-engineers-indicted-for-alleged-trade-secret-theft-from-google-and-tech-firms/</loc>
		<lastmod>2026-02-20T16:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-jenkins-flaw-exposes-build-environments-to-xss-attacks/</loc>
		<lastmod>2026-02-20T16:10:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-jenkins-flaw-exposes-build-environments-to-xss-attacks-2/</loc>
		<lastmod>2026-02-20T16:10:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-ki-schwachstelle-macht-kalendereinladungen-zum-einfallstor/</loc>
		<lastmod>2026-02-20T16:11:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-comprehensive-study-of-security-risks-in-deno-and-its-ecosystem/</loc>
		<lastmod>2026-02-20T17:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dynamic-objects-in-active-directory-the-stealthy-threat/</loc>
		<lastmod>2026-02-20T17:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-trust-trustconnect-this-fake-remote-support-tool-only-helps-hackers/</loc>
		<lastmod>2026-02-20T17:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-have-16-digit-card-numbers-expiry-dates-but-not-names-now-org-gets-500k-fine/</loc>
		<lastmod>2026-02-20T17:06:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copilot-spills-the-beans-summarizing-emails-its-not-supposed-to-read/</loc>
		<lastmod>2026-02-20T17:07:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-copilot-bug-circumvented-dlp-controls/</loc>
		<lastmod>2026-02-20T17:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-french-bank-registry-impacts-1-2-million-accounts/</loc>
		<lastmod>2026-02-20T17:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dramatic-escalation-in-frequency-and-power-of-ddos-attacks/</loc>
		<lastmod>2026-02-20T17:10:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-sicherheit-mit-tempo-warum-check-point-erneut-ganz-oben-steht/</loc>
		<lastmod>2026-02-20T17:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-threat-modeling-and-prompt-injection-to-audit-comet/</loc>
		<lastmod>2026-02-20T18:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-remote-support-exploitation-ramps-up-with-backdoors-remote-tools/</loc>
		<lastmod>2026-02-20T18:06:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-treasury-department-offers-secure-ai-advice-to-financial-services-firms/</loc>
		<lastmod>2026-02-20T18:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-national-gets-5-year-sentence-for-involvement-in-north-korea-it-worker-scheme/</loc>
		<lastmod>2026-02-20T18:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-kommentar-weitere-erhohung-des-rundfunkbeitrags-kontraproduktiv/</loc>
		<lastmod>2026-02-20T18:09:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-man-jailed-for-identity-theft-that-helped-north-koreans-get-jobs-at-us-companies/</loc>
		<lastmod>2026-02-20T18:10:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cashing-out-atm-jackpotting-attacks-surging-across-us/</loc>
		<lastmod>2026-02-20T18:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-use-fake-gemini-ai-chatbot-for-crypto-scam/</loc>
		<lastmod>2026-02-20T18:13:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-runway-to-centre-stage-how-plexal-is-accelerating-innovation-and-championing-women-leaders/</loc>
		<lastmod>2026-02-20T18:14:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/</loc>
		<lastmod>2026-02-20T18:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration/</loc>
		<lastmod>2026-02-20T18:17:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration-2/</loc>
		<lastmod>2026-02-20T18:17:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-double-pronged-extension-cord/</loc>
		<lastmod>2026-02-20T19:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-demands-1-5m-not-to-leak-vegas-casino-and-resort-chain-data/</loc>
		<lastmod>2026-02-20T19:06:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-no-honor-among-ransomware-thieves/</loc>
		<lastmod>2026-02-20T19:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-41-of-popular-openclaw-skills-found-to-contain-security-vulnerabilities/</loc>
		<lastmod>2026-02-20T19:07:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-ai-alignment-project-gets-openai-and-microsoft-boost/</loc>
		<lastmod>2026-02-20T19:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-6-microsoft-zero-days-and-a-warning-from-cisa/</loc>
		<lastmod>2026-02-20T19:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metadata-exposes-authors-of-ices-mega-detention-center-plans/</loc>
		<lastmod>2026-02-20T19:10:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-security-issue-found-in-windows-notepad/</loc>
		<lastmod>2026-02-20T19:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qa-organisations-are-spending-millions-on-cybersecurity-and-still-getting-it-wrong/</loc>
		<lastmod>2026-02-20T19:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-tech-giant-advantest-hit-by-ransomware-attack/</loc>
		<lastmod>2026-02-20T19:14:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/god-like-attack-machines-ai-agents-ignore-security-policies/</loc>
		<lastmod>2026-02-20T19:15:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lessons-from-ai-hacking-every-model-every-layer-is-risky/</loc>
		<lastmod>2026-02-20T19:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-016-speed-risk-and-responsibility-in-the-age-of-ai-rafael-ramirez/</loc>
		<lastmod>2026-02-20T20:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-zero-trust-security-a-plain-english-guide/</loc>
		<lastmod>2026-02-20T20:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-intelligence-paradox-why-claude-opus-4-6-requires-verification/</loc>
		<lastmod>2026-02-20T20:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-the-tricky-relationship-between-ai-and-code-security/</loc>
		<lastmod>2026-02-20T20:07:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-hacker-faces-up-to-7-years-for-breaching-oregon-emergency-management-department/</loc>
		<lastmod>2026-02-20T20:07:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-spot-a-north-korean-job-candidate/</loc>
		<lastmod>2026-02-20T20:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lasso-security-adds-ability-to-track-ai-agent-behavior/</loc>
		<lastmod>2026-02-20T21:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-nodemedic-fine-automatic-detection-and-exploit-synthesis-for-node-js-vulnerabilities/</loc>
		<lastmod>2026-02-20T21:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-coding-assistant-cline-compromised-to-create-more-openclaw-chaos/</loc>
		<lastmod>2026-02-20T21:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-taps-google-gemini-at-runtime/</loc>
		<lastmod>2026-02-20T21:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-tomcat-vulnerability-circumvents-access-rules/</loc>
		<lastmod>2026-02-20T21:08:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-wants-a-single-search-engine-to-flag-faces-and-fingerprints-across-agencies/</loc>
		<lastmod>2026-02-20T21:09:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-blocked-1-75m-harmful-apps-from-play-store-in-2025/</loc>
		<lastmod>2026-02-20T21:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-software-earns-leader-fast-mover-position-in-gigaom-radar-for-cloud-network-security/</loc>
		<lastmod>2026-02-20T21:11:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-that-works-for-you-exploring-the-new-enhancements-in-sonarqube/</loc>
		<lastmod>2026-02-20T22:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-things-to-know-on-anthropics-claude-code-security/</loc>
		<lastmod>2026-02-20T22:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-flaw-exposed-sensitive-data-in-lending-app-for-six-months/</loc>
		<lastmod>2026-02-20T22:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-new-tool-to-scan-for-react2shell-exposure/</loc>
		<lastmod>2026-02-20T22:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-improve-scalability-in-secrets-management/</loc>
		<lastmod>2026-02-20T23:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-assured-is-your-data-with-nhis-in-place/</loc>
		<lastmod>2026-02-20T23:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-enforce-cloud-compliance-in-real-time/</loc>
		<lastmod>2026-02-20T23:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-nhi-impact-innovation-in-cloud-native-security-solutions/</loc>
		<lastmod>2026-02-20T23:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-rolls-out-embedded-security-scanning-for-claude/</loc>
		<lastmod>2026-02-20T23:08:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-app-code-error-leaked-personal-info-and-a-few-unauthorized-transactions/</loc>
		<lastmod>2026-02-20T23:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-discloses-extended-data-leak-linked-to-loan-app-glitch/</loc>
		<lastmod>2026-02-20T23:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hospitals-at-risk-of-beyondtrust-ransomware-hacks/</loc>
		<lastmod>2026-02-20T23:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-police-say-they-have-arrested-hacker-who-booked-luxury-hotel-rooms-for-just-one-cent/</loc>
		<lastmod>2026-02-21T00:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/</loc>
		<lastmod>2026-02-21T00:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-legacy-software-modernization-is-critical-for-data-security/</loc>
		<lastmod>2026-02-21T04:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-npm-package-silently-installs-openclaw-on-developer-machines/</loc>
		<lastmod>2026-02-21T04:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vishing-gezielte-cyberangriffe-in-echtzeit-mittels-neuartiger-voicekits/</loc>
		<lastmod>2026-02-21T04:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/olympische-winterspiele-angriffe-auf-digitale-identitaten-als-grostes-cyberrisiko/</loc>
		<lastmod>2026-02-21T04:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-flaw-exposed-email-addresses-social-security-numbers-for-6-months/</loc>
		<lastmod>2026-02-21T05:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-android-malware-nutzt-gemini-als-gehirn/</loc>
		<lastmod>2026-02-21T06:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-cyber-security-consulting-companies/</loc>
		<lastmod>2026-02-21T09:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-und-die-wachsende-herausforderung-fur-die-cybersicherheit/</loc>
		<lastmod>2026-02-21T09:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-ticken-ki-agenten-fur-cybersicherheit-wirklich/</loc>
		<lastmod>2026-02-21T09:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning/</loc>
		<lastmod>2026-02-21T09:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog/</loc>
		<lastmod>2026-02-21T09:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-ai-workforce-readiness-and-security/</loc>
		<lastmod>2026-02-21T10:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/narco-submarine-carrying-4-tons-of-cocaine-captured-by-mexicos-navy/</loc>
		<lastmod>2026-02-21T11:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-phishing-service-proxies-real-login-pages-mfa/</loc>
		<lastmod>2026-02-21T12:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-roundcube-webmail-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-21T12:05:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-managers-share-a-hidden-weakness/</loc>
		<lastmod>2026-02-21T12:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-debuts-claude-code-security-ai-now-scan-vulnerabilities-in-your-entire-codebase/</loc>
		<lastmod>2026-02-21T12:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsbranche-claude-code-security-lasst-aktienkurse-absturzen/</loc>
		<lastmod>2026-02-21T13:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazons-vibe-coding-tool-kiro-reportedly-vibed-too-hard-and-brought-down-aws/</loc>
		<lastmod>2026-02-21T15:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/</loc>
		<lastmod>2026-02-21T15:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-malware-kampagne-fake-cloudflare-check-installiert-unbemerkt-mimicrat/</loc>
		<lastmod>2026-02-21T16:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-days-until-ticket-prices-rise-for-techcrunch-disrupt-2026/</loc>
		<lastmod>2026-02-21T16:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries/</loc>
		<lastmod>2026-02-21T16:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/</loc>
		<lastmod>2026-02-21T17:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-ai-assisted-hacker-breached-600-fortinet-firewalls-in-5-weeks/</loc>
		<lastmod>2026-02-21T17:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ungepatchte-firewalls-zum-grosten-einfallstor-fur-ransomware-werden/</loc>
		<lastmod>2026-02-21T17:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-dumpling-fine-grained-differential-javascript-engine-fuzzing/</loc>
		<lastmod>2026-02-21T18:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuv-rheinland-gibt-tipps-zur-absicherung-des-active-directory/</loc>
		<lastmod>2026-02-21T19:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-ernennt-erfahrenen-finanzmanager-yuneeb-khan-zum-cfo-2/</loc>
		<lastmod>2026-02-21T19:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/globale-spannungen-verscharfen-cyberrisiken/</loc>
		<lastmod>2026-02-21T19:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-als-erfolgsgrundlage-fur-startups/</loc>
		<lastmod>2026-02-21T19:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/buchungssystem-der-deutschen-bahn-war-durch-einen-cyberangriff-uber-mehrere-stunden-lahmgelegt/</loc>
		<lastmod>2026-02-21T19:07:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-targets-crypto-wallets-and-25-browsers-with-infostealer/</loc>
		<lastmod>2026-02-21T19:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wikipedia-blacklists-archive-today-after-alleged-ddos-attack/</loc>
		<lastmod>2026-02-21T21:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-role-does-agentic-ai-play-in-identity-and-access-management/</loc>
		<lastmod>2026-02-22T04:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-travel-data-safe-with-agentic-ai/</loc>
		<lastmod>2026-02-22T04:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-soc-teams-empowered-by-non-human-identities/</loc>
		<lastmod>2026-02-22T04:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-boost-confidence-in-privileged-access-management/</loc>
		<lastmod>2026-02-22T04:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rtl-group-hacker-abgriff-von-mitarbeiterdaten-aus-dem-intranet/</loc>
		<lastmod>2026-02-22T04:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paradoxon-des-deutschen-it-arbeitsmarktes-zunahme-arbeitsloser-fachkrafte-bei-abnahme-der-it-sicherheit-in-unternehmen/</loc>
		<lastmod>2026-02-22T04:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hochleistungstechnologien-cybersicherheit-in-der-formel-1/</loc>
		<lastmod>2026-02-22T06:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-2026-businesses-should-be-breach-ready-and-never-shut-down-their-core-business/</loc>
		<lastmod>2026-02-22T07:03:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-council-faces-data-breach-claim-after-mishandling-trans-complaints/</loc>
		<lastmod>2026-02-22T10:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-firmware-level-android-backdoor-found-on-tablets-dell-zero-day-exploited-since-2024/</loc>
		<lastmod>2026-02-22T10:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hard-drives-already-sold-out-for-this-year-ai-to-blame/</loc>
		<lastmod>2026-02-22T12:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passworter-per-chatgpt-erstellen-warum-du-das-lieber-lassen-solltest/</loc>
		<lastmod>2026-02-22T12:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hide-pulsar-rat-inside-png-images-in-new-npm-supply-chain-attack/</loc>
		<lastmod>2026-02-22T14:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-no-absolutely-not-you-may-not-use-third-party-harnesses-with-claude-subs/</loc>
		<lastmod>2026-02-22T15:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-564-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-02-22T15:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-days-left-to-lock-in-the-lowest-techcrunch-disrupt-2026-rates/</loc>
		<lastmod>2026-02-22T16:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-85/</loc>
		<lastmod>2026-02-22T16:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-the-midas-touch-triggering-the-capability-of-llms-for-rm-api-misuse-detection/</loc>
		<lastmod>2026-02-22T17:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-ohne-amazon-cloud-10-000-dollar-belohnung-fur-funktionierenden-hack/</loc>
		<lastmod>2026-02-22T17:05:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment/</loc>
		<lastmod>2026-02-22T17:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-ai-bug-hunter-jolts-cyber-stocks/</loc>
		<lastmod>2026-02-22T19:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-demonstrate-27-attacks-against-major-password-managers/</loc>
		<lastmod>2026-02-22T20:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/luxury-hotel-stays-for-just-euro0-01-spanish-police-arrest-hacker/</loc>
		<lastmod>2026-02-22T21:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mississippi-healthcare-system-shuts-down-clinics-after-ransomware-attack/</loc>
		<lastmod>2026-02-22T22:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-identity-and-access-management-in-model-contexts/</loc>
		<lastmod>2026-02-23T04:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cant-you-say-on-tiktok/</loc>
		<lastmod>2026-02-23T04:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-devops-teams-with-automated-nhi-lifecycle-management/</loc>
		<lastmod>2026-02-23T04:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-cybersecurity-experts-optimistic-about-nhidr/</loc>
		<lastmod>2026-02-23T04:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-secrets-protected-in-an-agentic-ai-driven-architecture/</loc>
		<lastmod>2026-02-23T04:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-nhi-reassured-stability-in-cybersecurity/</loc>
		<lastmod>2026-02-23T04:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/epa-grose-mehrheit-gesetzlich-versicherter-verwaltet-elektronische-patientenakte-nicht-aktiv/</loc>
		<lastmod>2026-02-23T04:10:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-whitepaper-zu-active-directory-tuv-rheinland-gibt-tipps-zur-absicherung/</loc>
		<lastmod>2026-02-23T04:11:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-unveils-claude-code-security-to-detect-and-fix-code-bugs/</loc>
		<lastmod>2026-02-23T04:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/128m-users-exposed-as-popular-vs-code-extensions-reveal-critical-flaws/</loc>
		<lastmod>2026-02-23T04:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cache-deception-flaw-in-sveltekit-and-vercel-stack-exposes-user-data/</loc>
		<lastmod>2026-02-23T04:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-semiconductor-supplier-hit-by-ransomware-multiple-systems-impacted/</loc>
		<lastmod>2026-02-23T04:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/splunk-enterprise-for-windows-flaw-enables-dll-hijacking-system-access/</loc>
		<lastmod>2026-02-23T04:16:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiktoks-new-u-s-deal-and-privacy-policy-what-users-dont-understand/</loc>
		<lastmod>2026-02-23T06:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacker-breached-600-fortigate-appliances-in-ai-assisted-campaign-amazon/</loc>
		<lastmod>2026-02-23T06:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coroot-open-source-observability-and-apm-tool/</loc>
		<lastmod>2026-02-23T06:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-verification-systems-are-struggling-with-synthetic-fraud/</loc>
		<lastmod>2026-02-23T06:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-apt-deploys-dll-sideloading-and-byovd-in-advanced-malware-campaign/</loc>
		<lastmod>2026-02-23T06:07:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-security-cost-of-treating-labs-like-data-centers/</loc>
		<lastmod>2026-02-23T07:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-are-racing-to-secure-agentic-ai-deployments/</loc>
		<lastmod>2026-02-23T07:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-linked-hackers-continue-aggressive-crypto-attacks-one-year-after-bybit-breach/</loc>
		<lastmod>2026-02-23T07:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jenkins-vulnerabilities-exposes-build-environments-to-xss-attacks/</loc>
		<lastmod>2026-02-23T07:05:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-code-execution-beyondtrust-remote-tools-unter-beschuss/</loc>
		<lastmod>2026-02-23T07:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-ways-attackers-use-generative-ai-to-exploit-your-systems/</loc>
		<lastmod>2026-02-23T08:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-ways-attackers-use-generative-ai-to-exploit-your-systems-2/</loc>
		<lastmod>2026-02-23T08:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-scans-verifies-and-patches-code-vulnerabilities/</loc>
		<lastmod>2026-02-23T08:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-exploit-fake-it-worker-schemes-and-malicious-interview-lures/</loc>
		<lastmod>2026-02-23T08:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/immutability-schutzt-backups-vor-ransomware-angriffen-96-prozent-der-ransomware-opfer-verlieren-auch-ihre-backups/</loc>
		<lastmod>2026-02-23T08:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-february-16-february-22/</loc>
		<lastmod>2026-02-23T09:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-unsichtbare-ki-revolution-die-risiken-von-schatten-ki/</loc>
		<lastmod>2026-02-23T09:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-crypto-agility-is-key-to-quantum-readiness/</loc>
		<lastmod>2026-02-23T09:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/muddywater-targets-mena-organizations-with-ghostfetch-char-and-http_vip/</loc>
		<lastmod>2026-02-23T09:07:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategischer-fahrplan-zum-kommenden-6g-mobilfunkstandard-6g-forschungsroadmap-2025-2030/</loc>
		<lastmod>2026-02-23T09:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-zur-tarnkappe-wird-wie-angreifer-intelligente-assistenten-missbrauchen/</loc>
		<lastmod>2026-02-23T09:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenleck-daten-einiger-paypal-nutzer-monatelang-geleakt/</loc>
		<lastmod>2026-02-23T09:10:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-didnt-kill-cybersecurity-it-just-reminded-us-there-are-two-doors/</loc>
		<lastmod>2026-02-23T10:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quality-assurance-for-fintech-risk-and-compliance-systems-in-the-age-of-ai/</loc>
		<lastmod>2026-02-23T10:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uber-1500-prozent-mehr-neue-malware/</loc>
		<lastmod>2026-02-23T10:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/23rd-february-threat-intelligence-report/</loc>
		<lastmod>2026-02-23T10:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/every-day-in-every-way-passwords-are-getting-worse-and-worse/</loc>
		<lastmod>2026-02-23T10:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perplexity-ai-lands-on-samsungs-next-galaxy-lineup/</loc>
		<lastmod>2026-02-23T10:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jspdf-flaw-exposes-millions-of-developers-to-object-injection/</loc>
		<lastmod>2026-02-23T10:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-telco-service-activator-vulnerability-allows-attackers-to-bypass-access-controls/</loc>
		<lastmod>2026-02-23T10:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-mississippi-medical-center-still-offline-after-ransomware-attack/</loc>
		<lastmod>2026-02-23T10:13:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-readiness-is-the-difference-between-a-bad-day-at-work-and-no-more-workplace/</loc>
		<lastmod>2026-02-23T11:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soar-is-costing-more-than-you-think/</loc>
		<lastmod>2026-02-23T11:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-vs-ai-why-cybersecuritys-new-front-line-is-behavioral-intelligence/</loc>
		<lastmod>2026-02-23T11:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-seize-100000-stolen-facebook-credentials-in-cybercrime-raid/</loc>
		<lastmod>2026-02-23T11:07:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-actively-exploited-roundcube-vulnerabilities/</loc>
		<lastmod>2026-02-23T11:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-actively-exploited-roundcube-vulnerabilities-2/</loc>
		<lastmod>2026-02-23T11:09:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jackpotting-surge-costs-banks-over-20m-warns-fbi/</loc>
		<lastmod>2026-02-23T11:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-ebook-die-quanten-bedrohung-der-q-day-kommt-jetzt-auf-quantensichere-verschlusselung-umsteigen/</loc>
		<lastmod>2026-02-23T11:11:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-unerfahrenem-hacker-hunderte-firewalls-mithilfe-von-ki-infiltriert/</loc>
		<lastmod>2026-02-23T11:12:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vpn-in-microsoft-edge-ist-kein-vpn/</loc>
		<lastmod>2026-02-23T11:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-knows-something-is-wrong-but-no-one-is-accountable/</loc>
		<lastmod>2026-02-23T12:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-ai-security-2025-hot-security-incident/</loc>
		<lastmod>2026-02-23T12:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-ivanti-epmm-zero-days-to-seize-control-of-mdm-servers/</loc>
		<lastmod>2026-02-23T12:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-says-cyberattacks-on-energy-grid-now-used-to-guide-missile-strikes/</loc>
		<lastmod>2026-02-23T12:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gangs-advancing-moscows-geopolitical-aims-romanian-cyber-chief-warns/</loc>
		<lastmod>2026-02-23T12:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-says-more-than-600-fortigate-firewalls-hit-in-ai-augmented-campaign/</loc>
		<lastmod>2026-02-23T12:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-campaign-compromises-600-fortigate-systems-worldwide/</loc>
		<lastmod>2026-02-23T12:11:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-backed-cyber-security-programme-alumni-raise-47-4m-in-follow-on-investment/</loc>
		<lastmod>2026-02-23T12:12:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-phishing-kit-clones-real-login-pages-to-evade-mfa-protections/</loc>
		<lastmod>2026-02-23T12:12:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens/</loc>
		<lastmod>2026-02-23T12:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leading-semiconductor-supplier-advantest-hit-by-ransomware-attack/</loc>
		<lastmod>2026-02-23T12:14:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-routing-regime-in-europa-der-digitale-eiserne-vorhang-fallt-europas-datenverkehr-ordnet-sich-neu/</loc>
		<lastmod>2026-02-23T12:15:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doxing-auf-x-grok-verrat-unbekannten-geburtsnamen-von-pornodarstellerin/</loc>
		<lastmod>2026-02-23T12:16:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-stiehlt-daten-von-tausenden-rtl-mitarbeitern/</loc>
		<lastmod>2026-02-23T13:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-arkanix-stealer-blends-rapid-python-harvesting-with-stealthier-c-payloads/</loc>
		<lastmod>2026-02-23T13:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bentopdf-und-stirling-pdf-im-privatsphare-check/</loc>
		<lastmod>2026-02-23T13:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-kampagne-umgeht-multi-faktor-authentifizierung-von-microsoft-365/</loc>
		<lastmod>2026-02-23T13:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-anonymous-members-detained-in-spain-over-post-flood-ddos-blitz/</loc>
		<lastmod>2026-02-23T13:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-excel-exploit-to-hide-xworm-7-2-in-jpeg-files-hijack-pcs/</loc>
		<lastmod>2026-02-23T13:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-1731-fuels-ongoing-attacks-on-beyondtrust-remote-access-products/</loc>
		<lastmod>2026-02-23T13:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-1731-fuels-ongoing-attacks-on-beyondtrust-remote-access-products-2/</loc>
		<lastmod>2026-02-23T13:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-is-adding-another-lock-to-your-account/</loc>
		<lastmod>2026-02-23T13:11:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recently-patched-roundcube-flaws-now-exploited-in-attacks/</loc>
		<lastmod>2026-02-23T13:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-exposed-endpoints-increase-risk-across-llm-infrastructure/</loc>
		<lastmod>2026-02-23T13:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-cyber-threat-actor-uses-genai-to-compromise-fortinet-firewalls/</loc>
		<lastmod>2026-02-23T13:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-kampagne-umgeht-mit-geratecode-hijacking-die-mfa-von-ms365/</loc>
		<lastmod>2026-02-23T13:15:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-in-javascript-projekten-neuer-wurm-frisst-sich-durch-die-npm-datenbank/</loc>
		<lastmod>2026-02-23T13:16:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linus-torvalds-someone-more-competent-who-isnt-afraid-of-numbers-past-the-teens-will-take-over-linux-one-day/</loc>
		<lastmod>2026-02-23T14:11:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japanese-chip-testing-toolmaker-advantest-suffers-ransomware-attack/</loc>
		<lastmod>2026-02-23T14:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/graycharlie-hacks-wordpress-sites-spreads-netsupport-rat-and-stealc-malware/</loc>
		<lastmod>2026-02-23T14:13:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-malware-more/</loc>
		<lastmod>2026-02-23T14:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-soc-is-blind-to-your-biggest-attack-surface-and-how-to-fix-it/</loc>
		<lastmod>2026-02-23T14:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-huorong-security-site-infects-users-with-valleyrat/</loc>
		<lastmod>2026-02-23T14:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschsprachiger-entwickler-hinter-arkanix-stealer/</loc>
		<lastmod>2026-02-23T14:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-angriffe-auf-deutsche-unternehmen-erreichen-neuen-hochststand/</loc>
		<lastmod>2026-02-23T14:08:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-5-grosten-fehler-bei-amazon-ppc-kampagnen/</loc>
		<lastmod>2026-02-23T14:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manageddefense-fur-managedprovider/</loc>
		<lastmod>2026-02-23T14:09:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-cardspace-as-a-secure-password-manager/</loc>
		<lastmod>2026-02-23T15:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-sso-for-wordpress-portals/</loc>
		<lastmod>2026-02-23T15:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modern-workplaces-demand-a-new-meaning-for-site-in-network-security/</loc>
		<lastmod>2026-02-23T15:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-ticken-ki-agenten-fur-cybersicherheit/</loc>
		<lastmod>2026-02-23T15:06:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunstliche-intelligenz-wird-zur-neuen-befehls-und-kontrollschicht/</loc>
		<lastmod>2026-02-23T15:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-technology-stacks-for-mvp-development-in-2026/</loc>
		<lastmod>2026-02-23T15:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-zero-days-and-data-breaches-shape-this-weeks-cybersecurity-landscape/</loc>
		<lastmod>2026-02-23T15:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-2-million-accounts-exposed-in-french-bank-registry-breach/</loc>
		<lastmod>2026-02-23T15:10:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confronting-vault-sprawl-and-the-risks-it-brings/</loc>
		<lastmod>2026-02-23T16:05:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smugmug-strengthened-email-authentication-and-deliverability-with-easydmarc/</loc>
		<lastmod>2026-02-23T16:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-managers-keep-your-passwords-safe-unless%c2%a6/</loc>
		<lastmod>2026-02-23T16:07:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/liminal-expands-to-msps-with-secure-multi-model-ai-platform/</loc>
		<lastmod>2026-02-23T16:08:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-the-untold-stories-of-check-point-research/</loc>
		<lastmod>2026-02-23T16:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-days-left-to-lock-in-the-lowest-techcrunch-disrupt-2026-ticket-rates/</loc>
		<lastmod>2026-02-23T16:10:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betriebliche-cybersicherheit-messbarer-einfluss-mangelnder-fahigkeiten/</loc>
		<lastmod>2026-02-23T16:11:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/break-free-of-rings-servers-earn-a-five-figure-bounty/</loc>
		<lastmod>2026-02-23T16:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-confirms-six-month-data-exposure-linked-to-loan-system-error/</loc>
		<lastmod>2026-02-23T16:14:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-hacker-pleads-guilty-to-selling-access-to-oregon-state-networks/</loc>
		<lastmod>2026-02-23T16:14:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/out-of-the-shadows-how-to-safely-migrate-data-for-ai-deployments/</loc>
		<lastmod>2026-02-23T16:15:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pure-storage-rebrands-to-everpure-as-storage-makers-business-expands-focus-to-data-management/</loc>
		<lastmod>2026-02-23T16:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-troubleshooting-tip-on-clawhub-leads-to-infostealer-infection/</loc>
		<lastmod>2026-02-23T16:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spanish-police-arrest-suspected-anonymous-members-over-ddos-attacks-on-government-sites/</loc>
		<lastmod>2026-02-23T16:18:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-identity-isnt-the-weak-link-access-still-is/</loc>
		<lastmod>2026-02-23T16:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraud-investigation-reveals-sophisticated-python-malware/</loc>
		<lastmod>2026-02-23T16:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pornodarstellerin-wirft-grok-doxing-vor/</loc>
		<lastmod>2026-02-23T16:21:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/als-app-und-im-web-warnapp-cyros-geht-an-den-start/</loc>
		<lastmod>2026-02-23T16:22:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-apple-google-ai-deal-what-1-billion-says-about-whos-really-winning-the-ai-race/</loc>
		<lastmod>2026-02-23T17:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cracks-in-the-bedrock-bypassing-scp-enforcement-with-long-lived-api-keys/</loc>
		<lastmod>2026-02-23T17:05:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-helps-novice-threat-actor-compromise-fortigate-devices-in-dozens-of-countries/</loc>
		<lastmod>2026-02-23T17:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-let-unsophisticated-hacker-breach-600-fortinet-firewalls-aws-says-as-ai-lowers-the-barrier-for-threat-actors/</loc>
		<lastmod>2026-02-23T17:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vpn-flaws-allowed-chinese-hackers-to-compromise-dozens-of-ivanti-customers-says-report/</loc>
		<lastmod>2026-02-23T17:09:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-regulators-say-ai-image-tools-dont-get-a-free-pass-on-privacy-rules/</loc>
		<lastmod>2026-02-23T17:09:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connected-compromised-when-iot-devices-turn-into-threats/</loc>
		<lastmod>2026-02-23T17:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-like-worm-targets-developers-via-npm-and-ai-tools/</loc>
		<lastmod>2026-02-23T17:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-vulnerabilities-in-roundcube-webmail/</loc>
		<lastmod>2026-02-23T18:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-generating-api-parameter-security-rules-with-llm-for-api-misuse-detection/</loc>
		<lastmod>2026-02-23T18:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-speaking-hackers-used-gen-ai-tools-to-compromise-600-firewalls-amazon-says/</loc>
		<lastmod>2026-02-23T18:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-cate-divoire-confirms-cyberattack-following-ransomware-claims/</loc>
		<lastmod>2026-02-23T18:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-data-protection-authorities-warn-generative-ai-companies-against-replicating-real-people/</loc>
		<lastmod>2026-02-23T18:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-zero-day-flaws-in-pdf-platforms-enable-xss-and-one-click-attacks/</loc>
		<lastmod>2026-02-23T18:10:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-200k-australian-drivers-licences-exposed-in-youx-cyber-breach/</loc>
		<lastmod>2026-02-23T18:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-setzt-neuen-standard-fur-sase-und-post-quanten-sicherheit/</loc>
		<lastmod>2026-02-23T18:12:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paypal-ties-small-data-breach-and-fraud-to-app-coding-error/</loc>
		<lastmod>2026-02-23T19:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-weight-ai-models-fail-the-jailbreak-test/</loc>
		<lastmod>2026-02-23T19:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-threat-intel-finds-600-fortigate-devices-hit/</loc>
		<lastmod>2026-02-23T19:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/</loc>
		<lastmod>2026-02-23T19:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb/</loc>
		<lastmod>2026-02-23T19:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-early-arthropods/</loc>
		<lastmod>2026-02-23T20:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-remediation-how-mitigation-controls-close-the-gap-in-segregation-of-duties-compliance/</loc>
		<lastmod>2026-02-23T20:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/americans-are-destroying-flock-surveillance-cameras/</loc>
		<lastmod>2026-02-23T20:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wormable-xmrig-campaign-leverages-byovd-and-timed-kill-switch-for-stealth/</loc>
		<lastmod>2026-02-23T20:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-danger-of-it-ot-medical-device-cyber-turf-wars/</loc>
		<lastmod>2026-02-23T20:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-chip-supplier-advantest-discloses-cyber-incident/</loc>
		<lastmod>2026-02-23T20:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/innovate-uk-cyber-startup-programme-gets-10m-funding-booster/</loc>
		<lastmod>2026-02-23T20:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-partners-with-e-isac-to-bring-threat-intelligence-and-research-to-north-american-utilities/</loc>
		<lastmod>2026-02-23T20:12:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-generating-api-specifications-for-bug-detection-via-specification-propagation-analysis/</loc>
		<lastmod>2026-02-23T21:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-regulator-fines-porn-company-1-8-million-for-failing-to-verify-user-ages/</loc>
		<lastmod>2026-02-23T21:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-bug-in-classic-outlook-hides-the-mouse-pointer/</loc>
		<lastmod>2026-02-23T21:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-what-is-it-and-can-you-use-it-safely/</loc>
		<lastmod>2026-02-23T22:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-attackers-defensive-funnel-how-sneaky-2fa-cloaks-itself-from-security-scanners-blog-menlo-security/</loc>
		<lastmod>2026-02-23T22:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-doubles-down-on-exposure-management-with-sevco-acquisition/</loc>
		<lastmod>2026-02-23T22:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-accuses-chinese-labs-of-trying-to-illicitly-take-claudes-capabilities/</loc>
		<lastmod>2026-02-23T22:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ad-tech-firm-optimizely-investigates-vishing-incident/</loc>
		<lastmod>2026-02-23T22:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-breach-surges-to-over-25m-could-be-largest-in-us-history/</loc>
		<lastmod>2026-02-23T22:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-muddywater-targets-orgs-with-fresh-malware-as-tensions-mount/</loc>
		<lastmod>2026-02-23T22:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enigma-cipher-device-still-holds-secrets-for-cyber-pros/</loc>
		<lastmod>2026-02-23T22:10:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-targeted-european-entities-using-webhook-based-macro-malware/</loc>
		<lastmod>2026-02-23T22:11:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-anthropics-claude-code-security-matters-and-what-it-means-for-mend-io-customers/</loc>
		<lastmod>2026-02-23T23:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moving-from-anomalies-to-connections-in-fraud-defense/</loc>
		<lastmod>2026-02-23T23:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-ignored-sensitivity-labels-processed-confidential-emails/</loc>
		<lastmod>2026-02-23T23:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-arrests-suspected-hacktivists-for-ddosing-govt-sites/</loc>
		<lastmod>2026-02-23T23:07:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-cloud-security-teams-supported-by-agentic-ai/</loc>
		<lastmod>2026-02-24T00:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-operate-independently-in-managing-machine-identities/</loc>
		<lastmod>2026-02-24T00:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-enterprises-satisfied-with-current-secrets-vaulting-solutions/</loc>
		<lastmod>2026-02-24T00:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-agentic-ai-capable-in-secrets-scanning/</loc>
		<lastmod>2026-02-24T00:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breaches-in-2026-whats-old-whats-new/</loc>
		<lastmod>2026-02-24T00:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-rolls-out-global-ai-initiatives/</loc>
		<lastmod>2026-02-24T00:09:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-mental-health-apps-with-14-7m-installs-filled-with-security-flaws/</loc>
		<lastmod>2026-02-24T00:10:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spitting-cash-atm-jackpotting-attacks-surged-in-2025/</loc>
		<lastmod>2026-02-24T00:12:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/600-fortigate-devices-hacked-by-ai-armed-amateur/</loc>
		<lastmod>2026-02-24T00:12:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-infrastructure-for-multi-llm-context-routing/</loc>
		<lastmod>2026-02-24T04:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-olalampo-muddywater-unleashes-ai-assisted-rust-malware-and-telegram-c2-in-mena-espionage-surge/</loc>
		<lastmod>2026-02-24T04:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/74-prozent-der-ransomware-vorfalle-beinhalten-datenexfiltration/</loc>
		<lastmod>2026-02-24T04:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regionale-datensouveranitat-im-zeitalter-der-ki-spannungsfeld-zwischen-freiheit-und-regulierung-mit-maximalem-mehrwert/</loc>
		<lastmod>2026-02-24T04:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-repurposes-mars-helicopters-ancient-snapdragon-soc-to-help-perseverance-rover-navigate/</loc>
		<lastmod>2026-02-24T04:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-claude-code-security-has-shaken-the-cybersecurity-market/</loc>
		<lastmod>2026-02-24T04:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-group-uses-ai-to-exploit-weakly-protected-fortinet-firewalls-says-amazon/</loc>
		<lastmod>2026-02-24T05:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/binding-operational-directive-26-02-sets-deadlines-for-edge-device-replacement/</loc>
		<lastmod>2026-02-24T06:03:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-rolls-out-optional-password-feature-to-strengthen-user-security/</loc>
		<lastmod>2026-02-24T06:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-deepseek-and-claude-ai-to-launch-global-attacks-on-fortigate-devices/</loc>
		<lastmod>2026-02-24T06:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-releases-emergency-chrome-patch-addressing-three-major-security-flaws/</loc>
		<lastmod>2026-02-24T06:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-the-evasive-adversary/</loc>
		<lastmod>2026-02-24T07:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-code-security-rollout-is-an-industry-wakeup-call/</loc>
		<lastmod>2026-02-24T07:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-socs-are-moving-toward-autonomous-security-operations-in-2026/</loc>
		<lastmod>2026-02-24T07:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-and-complexity-slow-the-next-phase-of-enterprise-ai-agent-adoption/</loc>
		<lastmod>2026-02-24T07:06:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-facing-allegations-from-musk-over-largescale-data-misuse/</loc>
		<lastmod>2026-02-24T07:08:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odido-faces-alleged-data-breach-as-shinyhunters-claims-21m-records-exposed/</loc>
		<lastmod>2026-02-24T07:09:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-infostealer-spreads-via-fake-captcha-traps-targeting-unsuspecting-users/</loc>
		<lastmod>2026-02-24T07:10:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-growing-risk-of-malicious-apps-in-a-mobile-first-workplace/</loc>
		<lastmod>2026-02-24T08:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisos-should-prioritize-continuous-controls-monitoring-in-2026/</loc>
		<lastmod>2026-02-24T08:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/so-you-think-you-have-cyber-insurance-the-breach-is-only-the-first-incident-the-claim-is-the-second/</loc>
		<lastmod>2026-02-24T08:06:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/model-inversion-attacks-growing-ai-business-risk/</loc>
		<lastmod>2026-02-24T08:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-time-to-rethink-ciso-reporting-lines/</loc>
		<lastmod>2026-02-24T08:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-becoming-part-of-everyday-criminal-workflows/</loc>
		<lastmod>2026-02-24T08:10:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-huorong-site-delivers-valleyrat-backdoor-in-targeted-malware-campaign/</loc>
		<lastmod>2026-02-24T08:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-funf-prozent-nutzen-ki-strategisch-in-der-cybersicherheit-ki-risiken-werden-uberschatzt-governance-versagen-unterschatzt/</loc>
		<lastmod>2026-02-24T08:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-says-chinese-ai-firms-used-16-million-claude-queries-to-copy-model/</loc>
		<lastmod>2026-02-24T08:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-verliert-vor-gericht-freunde-finder-funktion-von-facebook-ist-rechtswidrig/</loc>
		<lastmod>2026-02-24T08:14:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cve-treadmill-why-you-cant-patch-your-way-to-security/</loc>
		<lastmod>2026-02-24T09:04:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-analysis-paints-worsening-cybersecurity-picture/</loc>
		<lastmod>2026-02-24T09:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/master-your-passwordless-future-introducing-thales-authenticator-lifecycle-manager/</loc>
		<lastmod>2026-02-24T09:06:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-says-attackers-are-moving-through-networks-in-under-30-minutes/</loc>
		<lastmod>2026-02-24T09:06:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerodayrat-targets-android-and-ios-devices-for-surveillance-and-financial-data-theft/</loc>
		<lastmod>2026-02-24T09:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deserialization-flaw-in-ruby-workers-that-could-enable-full-compromise/</loc>
		<lastmod>2026-02-24T09:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/luks-encryption-compromised-on-linux-ics-devices-via-tpm-bus-sniffing-exploit/</loc>
		<lastmod>2026-02-24T09:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-steganographic-images-to-bypass-anti-malware-and-deploy-malware/</loc>
		<lastmod>2026-02-24T09:10:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-und-resilienter-staat-koalition-will-kritische-infrastruktur-besser-schutzen/</loc>
		<lastmod>2026-02-24T09:11:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-discord-can-expose-corporate-data/</loc>
		<lastmod>2026-02-24T10:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/refund-scam-impersonates-avast-to-harvest-credit-card-details/</loc>
		<lastmod>2026-02-24T10:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euro-allies-aiming-to-rapidly-build-low-cost-air-defense-weapons/</loc>
		<lastmod>2026-02-24T10:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-macromaze-apt28-exploits-webhooks-for-covert-data-exfiltration/</loc>
		<lastmod>2026-02-24T10:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everest-ransomware-hits-vikor-scientific-s-supplier-data-of-140000-patients-stolen/</loc>
		<lastmod>2026-02-24T10:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-extends-security-patching-for-three-windows-products-at-a-price/</loc>
		<lastmod>2026-02-24T10:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-openclaw-tactics-deceive-users-into-manual-password-entry-for-amos-infection/</loc>
		<lastmod>2026-02-24T10:10:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-funf-prozent-nutzen-ki-strategisch-in-der-cybersicherheit-ki-risiken-werden-falsch-eingeschatzt-governance-versagen-unterschatzt/</loc>
		<lastmod>2026-02-24T10:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accelerator-programm-fur-cybersecurity-esecurity-startup-conbool-zieht-ins-cyberlab-karlsruhe-ein/</loc>
		<lastmod>2026-02-24T10:12:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-act-und-iot-sicherheit-was-hersteller-jetzt-wissen-mussen/</loc>
		<lastmod>2026-02-24T10:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ki-agent-leert-unerwartet-ganzen-e-mail-posteingang/</loc>
		<lastmod>2026-02-24T10:14:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-on-life-support/</loc>
		<lastmod>2026-02-24T11:03:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spoofing-killt-umsatz-so-werden-transaktionale-e-mails-falschungssicher/</loc>
		<lastmod>2026-02-24T11:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realistische-einschatzung-2026-wie-erklarbare-ki-das-moderne-soc-neu-gestaltet/</loc>
		<lastmod>2026-02-24T11:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doppel-erpressung-ist-inzwischen-standard/</loc>
		<lastmod>2026-02-24T11:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitcoin-milliarden-von-raubkopie-portal-im-visier-der-justiz/</loc>
		<lastmod>2026-02-24T11:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-tech-hit-by-double-trouble-fewer-foreign-techies-amid-skills-squeeze/</loc>
		<lastmod>2026-02-24T11:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-arms-race-shrinks-breakout-time-to-29-minutes-as-adversaries-turn-genai-on-the-enterprise/</loc>
		<lastmod>2026-02-24T11:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-ai-labs-launch-massive-distillation-attacks-on-anthropic-claude-tracking-13m-exchanges/</loc>
		<lastmod>2026-02-24T11:11:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-cybercriminal-admits-guilt-in-scheme-selling-oregon-state-government-network-access/</loc>
		<lastmod>2026-02-24T11:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-backdoors/</loc>
		<lastmod>2026-02-24T11:12:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-cyber-attacks-up-significantly-in-the-last-year-warns-crowdstrike/</loc>
		<lastmod>2026-02-24T11:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/destitute-survivors-of-south-east-asias-cyberscam-farms-an-international-crisis/</loc>
		<lastmod>2026-02-24T11:14:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anonymes-live-system-mit-zwangsrouting-uber-tor-tails-7-so-funktioniert-das-anonyme-live-system-mit-tor-zwang/</loc>
		<lastmod>2026-02-24T11:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-meeting-update/</loc>
		<lastmod>2026-02-24T12:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-setup-credentials-for-windows-to-use-digicert-keylocker-smctl/</loc>
		<lastmod>2026-02-24T12:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-secure-saas-architecture-why-identity-must-be-designed-from-day-one/</loc>
		<lastmod>2026-02-24T12:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-state-hackers-seen-using-medusa-ransomware-in-attacks-on-us-middle-east/</loc>
		<lastmod>2026-02-24T12:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zerodayrat-malware-claims-full-monitoring-of-android-and-ios-devices/</loc>
		<lastmod>2026-02-24T12:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arkanix-stealer-ai-assisted-info-stealer-shuts-down-after-brief-campaign/</loc>
		<lastmod>2026-02-24T12:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-365-for-agents-brings-managed-cloud-pcs-to-autonomous-workflows/</loc>
		<lastmod>2026-02-24T12:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-operation-dismantles-fraud-network-euro400000-seized/</loc>
		<lastmod>2026-02-24T12:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/</loc>
		<lastmod>2026-02-24T12:12:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-conduent-data-breach-exfiltrates-8-tb-affects-over-25-million-americans/</loc>
		<lastmod>2026-02-24T12:14:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-nuget-packages-target-asp-net-developers-to-steal-login-credentials/</loc>
		<lastmod>2026-02-24T12:15:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-ai-firms-hit-claude-with-distillation-attacks-anthropic-warns/</loc>
		<lastmod>2026-02-24T12:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/website-admins-2026-wer-verantwortung-tragt-gewinnt-sichtbarkeit/</loc>
		<lastmod>2026-02-24T12:16:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/t-h-e-journal-why-web-security-has-become-core-infrastructure-for-k12/</loc>
		<lastmod>2026-02-24T13:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-ai-good-for-democracy/</loc>
		<lastmod>2026-02-24T13:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-style-npm-worm-hits-ci-pipelines-and-ai-coding-tools/</loc>
		<lastmod>2026-02-24T13:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/korean-cops-charge-teens-over-bike-hire-breach-that-exposed-data-on-4-62m-riders/</loc>
		<lastmod>2026-02-24T13:07:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romanian-hacker-extradited-to-us-admits-hacking-oregon-state-network/</loc>
		<lastmod>2026-02-24T13:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/</loc>
		<lastmod>2026-02-24T13:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-windows-management-instrumentation-wmi-to-maintain-stealthy-access-and-silent-control/</loc>
		<lastmod>2026-02-24T13:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-prioritization-isnt-a-backlog-problem-its-a-risk-math-problem/</loc>
		<lastmod>2026-02-24T13:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-group-uses-medusa-ransomware-in-middle-east-and-u-s-healthcare-attacks/</loc>
		<lastmod>2026-02-24T13:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluevoyant-deckt-neue-rift-brigantine-angriffskampagne-auf/</loc>
		<lastmod>2026-02-24T13:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neobank-ex-mitarbeiter-erpresst-offenbar-kunden-von-revolut/</loc>
		<lastmod>2026-02-24T13:14:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authenticate-users-with-ws-federation-in-web-applications/</loc>
		<lastmod>2026-02-24T14:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberstrong-update-4-11-4-13/</loc>
		<lastmod>2026-02-24T14:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-data-watchdog-fines-reddit-14-47m-for-letting-kids-slip-past-the-gate/</loc>
		<lastmod>2026-02-24T14:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-continue-to-target-us-healthcare/</loc>
		<lastmod>2026-02-24T14:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-expands-sovereign-cloud-security-with-governance-local-productivity-and-ai/</loc>
		<lastmod>2026-02-24T14:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-spreading-npm-malware-targets-developers-in-new-supply-chain-attack/</loc>
		<lastmod>2026-02-24T14:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/</loc>
		<lastmod>2026-02-24T14:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-aria-flaws-enable-attackers-to-execute-remote-code/</loc>
		<lastmod>2026-02-24T14:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-weaponized-ai-to-seize-full-domain-access-in-under-30-minutes/</loc>
		<lastmod>2026-02-24T14:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-cybersecurity-firms-chase-ai-vc-market-skyrockets/</loc>
		<lastmod>2026-02-24T14:14:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-than-dashboards-ai-decisions-must-be-provable/</loc>
		<lastmod>2026-02-24T14:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-accelerates-attacker-breakout-time-to-just-four-minutes/</loc>
		<lastmod>2026-02-24T14:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-gestohlenen-zugangsdaten-daten-von-12-millionen-bankkunden-in-frankreich-ausgespaht/</loc>
		<lastmod>2026-02-24T14:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-veroffentlicht-den-active-adversary-report-2026/</loc>
		<lastmod>2026-02-24T14:18:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uae-claims-it-stopped-terrorist-ransomware-attack/</loc>
		<lastmod>2026-02-24T15:03:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-pushes-tighter-telegram-regulation-citing-russian-recruitment-of-locals/</loc>
		<lastmod>2026-02-24T15:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-data-breach-grows-affecting-at-least-25m-people/</loc>
		<lastmod>2026-02-24T15:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwei-drittel-der-sicherheitsvorfalle-lassen-sich-auf-schwachstellen-im-zusammenhang-mit-identitaten-zuruckfuhren/</loc>
		<lastmod>2026-02-24T15:06:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-maximize-ddos-readiness-with-proactive-protection-strategies/</loc>
		<lastmod>2026-02-24T15:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-strengthen-app-performance-without-slowing-innovation/</loc>
		<lastmod>2026-02-24T15:08:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-lazarus-group-expands-ransomware-activity-with-medusa/</loc>
		<lastmod>2026-02-24T15:09:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sendmarc-releases-dmarcbis-fireside-chat-featuring-co-editor-todd-herr/</loc>
		<lastmod>2026-02-24T16:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-exposure-to-assurance-how-ctem-and-mitre-inform-enable-modern-cyber-defense/</loc>
		<lastmod>2026-02-24T16:06:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ip-lookup-for-enterprise-authentication-how-to-use-ip-reputation-vpn-proxy-detection-and-risk-based-mfa/</loc>
		<lastmod>2026-02-24T16:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-the-frontier-a-guide-to-establishing-ai-governance/</loc>
		<lastmod>2026-02-24T16:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-kampagne-missbraucht-google-tasks-fur-unternehmenszugange/</loc>
		<lastmod>2026-02-24T16:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reddit-fined-20-million-by-uk-for-not-effectively-checking-users-ages/</loc>
		<lastmod>2026-02-24T16:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-platform-step-finance-shutting-down-after-40-million-theft/</loc>
		<lastmod>2026-02-24T16:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomer-ki-agent-fur-das-human-risk-management/</loc>
		<lastmod>2026-02-24T16:13:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-lanciert-mit-agent-commander-die-erste-losung-gegen-agentenbasierte-ki-risiken-in-unternehmen/</loc>
		<lastmod>2026-02-24T16:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-low-skill-hacker-used-ai-tools-to-breach-fortigate-devices-globally/</loc>
		<lastmod>2026-02-24T16:16:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sendmarc-releases-dmarcbis-fireside-chat-featuring-co-editor-todd-herr-2/</loc>
		<lastmod>2026-02-24T16:16:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-aria-operations-flaws-could-enable-remote-attacks/</loc>
		<lastmod>2026-02-24T16:17:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teenagers-charged-over-public-bike-service-breach-that-exposed-4-62-million-records/</loc>
		<lastmod>2026-02-24T16:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-launches-vistaroai-to-help-security-teams-cut-through-ai-hype-and-act-faster-on-real-threats/</loc>
		<lastmod>2026-02-24T16:19:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-first-ai-security-why-cisos-must-add-intent-to-the-equation/</loc>
		<lastmod>2026-02-24T16:20:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-fines-reddit-19-million-for-using-childrens-data-unlawfully/</loc>
		<lastmod>2026-02-24T16:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sendmarc-releases-dmarcbis-fireside-chat-featuring-co-editor-todd-herr-3/</loc>
		<lastmod>2026-02-24T16:22:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zweite-konsultation-des-bmds-beendet-wie-geht-es-weiter-mit-dem-deutschland-stack/</loc>
		<lastmod>2026-02-24T16:23:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-radsee-see-your-handwriting-through-walls-using-fmcw-rada/</loc>
		<lastmod>2026-02-24T17:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reddit-porn-sites-fined-by-uk-regulators-over-childrens-safety-and-privacy/</loc>
		<lastmod>2026-02-24T17:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roblox-gives-predators-powerful-tools/</loc>
		<lastmod>2026-02-24T17:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-maximize-hedis-scores-with-synthetic-data/</loc>
		<lastmod>2026-02-24T17:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-inflated-metrics-to-trusted-data-how-a-premium-retail-brand-restored-analytics-integrity/</loc>
		<lastmod>2026-02-24T17:08:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepwatch-expands-siem-agnostic-guardian-mdr-platform-with-support-for-securonix/</loc>
		<lastmod>2026-02-24T17:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-coming-regulatory-wave-for-ai-agents-their-apis/</loc>
		<lastmod>2026-02-24T17:11:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-the-ai-era-cisos-worry-about-data-leaks-and-doubt-tech-will-solve-skills-gaps/</loc>
		<lastmod>2026-02-24T17:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-groups-moving-at-record-speeds-as-ai-helps-scale-attacks/</loc>
		<lastmod>2026-02-24T17:12:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-sues-firewall-provider-sonicwall-alleges-security-failings-with-its-firewall-backup-led-to-ransomware-attack/</loc>
		<lastmod>2026-02-24T17:13:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-cyberresilienz-zentraler-wettbewerbsfaktor-und-chefsache-ist/</loc>
		<lastmod>2026-02-24T17:14:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drei-jahrzehnte-watchguard-30-jahre-verlassliche-sicherheit/</loc>
		<lastmod>2026-02-24T17:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/go-library-maintainer-brands-githubs-dependabot-a-noise-machine/</loc>
		<lastmod>2026-02-24T17:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-antigravity-falls-to-earth-under-openclaw-fueled-compute-load/</loc>
		<lastmod>2026-02-24T17:17:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multifaceted-phishing-scheme-deceives-bitpanda-customers/</loc>
		<lastmod>2026-02-24T17:18:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agent-commander-von-veeam-bringt-transparenz-schutz-und-kontrolle-von-ki-in-echtzeit/</loc>
		<lastmod>2026-02-24T17:20:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-security-guide-flows-vulnerabilities-and-best-practices/</loc>
		<lastmod>2026-02-24T18:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-groups-move-at-record-speeds-as-ai-helps-scale-attacks/</loc>
		<lastmod>2026-02-24T18:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-committed-to-fighting-transnational-gangs-behind-southeast-asian-scam-compounds-fbi/</loc>
		<lastmod>2026-02-24T18:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-family-link-im-datenschutz-check-cloud-zwang-statt-digitaler-kindersicherung/</loc>
		<lastmod>2026-02-24T18:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claims-chinese-ai-firms-distilled-claude-to-train-their-models/</loc>
		<lastmod>2026-02-24T18:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-three-high-severity-chrome-flaws/</loc>
		<lastmod>2026-02-24T18:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-adds-copilot-data-controls-to-all-storage-locations/</loc>
		<lastmod>2026-02-24T18:10:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware/</loc>
		<lastmod>2026-02-24T18:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cost-of-insider-incidents-surges-20-to-nearly-20m/</loc>
		<lastmod>2026-02-24T18:12:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-sendmarc-highlights-impact-of-dmarc-update-on-evolving-email-security-standards/</loc>
		<lastmod>2026-02-24T19:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-lazarus-group-targets-healthcare-orgs-with-medusa-ransomware/</loc>
		<lastmod>2026-02-24T19:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-nation-state-hackers-active-on-the-global-stage/</loc>
		<lastmod>2026-02-24T19:06:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cargurus-data-breach-exposes-information-of-12-4-million-accounts/</loc>
		<lastmod>2026-02-24T19:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creating-unstructured-data-pipelines-for-retrieval-augmented-generation/</loc>
		<lastmod>2026-02-24T20:04:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-defense-from-reactive-to-proactive/</loc>
		<lastmod>2026-02-24T20:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-sanctions-russian-zero-day-broker-accused-of-buying-exploits-stolen-from-u-s-defense-contractor/</loc>
		<lastmod>2026-02-24T20:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-accuses-china-ai-firms-of-model-mining/</loc>
		<lastmod>2026-02-24T20:07:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-association-launches-code-of-conduct-for-security-pros/</loc>
		<lastmod>2026-02-24T20:08:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-brands-become-launchpads-for-phishing-crypto-fraud/</loc>
		<lastmod>2026-02-25T06:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-alerts-developers-of-malicious-next-js-repositories-used-in-ongoing-hacker-attacks/</loc>
		<lastmod>2026-02-25T06:07:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intelligence-supply-chain-is-full-of-weak-links-researchers-find/</loc>
		<lastmod>2026-02-25T06:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-adds-domain-libraries-and-copilot-integration-to-the-quantum-development-kit/</loc>
		<lastmod>2026-02-25T06:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-vulnerabilities-in-entra-id-could-exploit-chatgpt-to-breach-user-email-accounts/</loc>
		<lastmod>2026-02-25T06:41:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-confirms-active-exploitation-of-filezen-cve-2026-25108-vulnerability/</loc>
		<lastmod>2026-02-25T06:42:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-schwachstellen-unzureichende-autorisierung-bei-sap-s-4hana-und-netweaver/</loc>
		<lastmod>2026-02-25T06:43:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-beginnt-im-engineering-nicht-erst-am-fahrzeug-produktionssicherheit-entscheidet-sich-lange-vor-der-fertigung/</loc>
		<lastmod>2026-02-25T07:44:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-scam-assembly-lines-die-markenpiraterie-industrialisieren/</loc>
		<lastmod>2026-02-25T07:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wachsende-ki-exposure-lucke-durch-supply-chain-risiken-und-fehlende-identitatskontrollen/</loc>
		<lastmod>2026-02-25T07:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surxrat-a-trojans-llm-driven-expansion-in-android-malware/</loc>
		<lastmod>2026-02-25T07:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-firefox-148-browser-erhalt-zentrale-ki-steuerung-und-ki-deaktivierung/</loc>
		<lastmod>2026-02-25T07:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-valuations-climb-as-capital-concentrates-ai-security-expands/</loc>
		<lastmod>2026-02-25T07:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-apache-activemq-vulnerability-to-gain-rdp-access-deploy-lockbit-ransomware/</loc>
		<lastmod>2026-02-25T07:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boards-dont-need-cyber-metrics-they-need-risk-signals/</loc>
		<lastmod>2026-02-25T08:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5077241-update-improves-bitlocker-adds-sysmon-tool/</loc>
		<lastmod>2026-02-25T08:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-rat-surxrat-grants-hackers-full-device-control-and-data-exfiltration/</loc>
		<lastmod>2026-02-25T08:40:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-red-card-2-0-leads-to-651-arrests-in-africa/</loc>
		<lastmod>2026-02-25T08:41:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution/</loc>
		<lastmod>2026-02-25T08:42:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/q4-2025-internet-disruptions-report-von-cloudfare-weniger-politische-eingriffe-mehr-physische-schaden/</loc>
		<lastmod>2026-02-25T08:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwortmanager-1password-wird-teurer/</loc>
		<lastmod>2026-02-25T08:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/that-time-a-software-engineer-had-dominion-over-7000-robot-vacuums/</loc>
		<lastmod>2026-02-25T09:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-beschleunigt-cyberangriffe-unternehmen-mussen-sicherheit-neu-denken/</loc>
		<lastmod>2026-02-25T09:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-exponieren-unternehmen-ki-gesteuerte-angriffe-nehmen-zu/</loc>
		<lastmod>2026-02-25T09:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-apt-group-deployed-medusa-ransomware-against-middle-east-target/</loc>
		<lastmod>2026-02-25T09:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-l3harris-exec-jailed-for-selling-zero-days-to-russian-exploit-broker/</loc>
		<lastmod>2026-02-25T09:42:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-fake-avast-website-to-steal-users-credit-card-information/</loc>
		<lastmod>2026-02-25T09:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defense-contractor-employee-jailed-for-selling-8-zero-days-to-russian-broker/</loc>
		<lastmod>2026-02-25T09:44:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-developer-hub-offnet-armis-asset-intelligence-fur-integrationen/</loc>
		<lastmod>2026-02-25T09:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-first-unternehmen-hohere-kosten-und-langere-ausfallzeiten-durch-ki-integration/</loc>
		<lastmod>2026-02-25T09:46:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-phishing-framework-bypasses-defenses-with-reverse-proxies-takes-an-saas-approach/</loc>
		<lastmod>2026-02-25T10:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-groups-chatgpt-use-reveals-worldwide-harassment-campaign-against-critics/</loc>
		<lastmod>2026-02-25T10:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10000-bounty-offered-if-you-can-hack-ring-cameras-to-stop-them-sharing-your-data-with-amazon/</loc>
		<lastmod>2026-02-25T10:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-accuses-sonicwall-of-security-lapses-ties-it-to-ransomware-attack/</loc>
		<lastmod>2026-02-25T10:42:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optionales-februar-update-fur-windows-11-speed-test-in-der-taskleiste-ist-eine-browser-weiterleitung/</loc>
		<lastmod>2026-02-25T10:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-chinese-cops-used-chatgpt-to-plan-and-track-smear-ops-against-opponents/</loc>
		<lastmod>2026-02-25T10:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-soliton-systems-k-k-filezen-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-25T10:45:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocks-18-app-downloads-in-select-markets/</loc>
		<lastmod>2026-02-25T10:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mexicos-cjng-drug-cartel-embraced-ai-drones-and-social-media/</loc>
		<lastmod>2026-02-25T10:47:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/icos-14m-reddit-fine-highlights-age-check-privacy-concerns/</loc>
		<lastmod>2026-02-25T10:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-in-use-war-bisher-die-groste-sicherheitslucke-der-cloud-confidential-computing-macht-die-cloud-vertrauenswurdig/</loc>
		<lastmod>2026-02-25T10:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blue-teaming-construction-insights-from-2025-threat-landscape-observations/</loc>
		<lastmod>2026-02-25T11:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/across-party-lines-and-industry-the-verdict-is-the-same-cisa-is-in-trouble/</loc>
		<lastmod>2026-02-25T11:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/300-a-month-android-malware-oblivion-uses-fake-updates-to-hijack-phones/</loc>
		<lastmod>2026-02-25T11:41:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-u-s-defense-contractor-executive-sentenced-for-selling-zero-day-exploits-to-russian-broker-operation-zero/</loc>
		<lastmod>2026-02-25T11:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-l3harris-executive-sentenced-to-87-months-for-selling-stolen-cyber-exploit-trade-secrets/</loc>
		<lastmod>2026-02-25T11:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-exploited-filezen-command-injection-bug-patch-now-cve-2026-25108/</loc>
		<lastmod>2026-02-25T11:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-russian-broker-for-buying-stolen-zero-day-exploits/</loc>
		<lastmod>2026-02-25T11:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-solarwinds-serv-u-vulnerabilities-enable-remote-root-access/</loc>
		<lastmod>2026-02-25T11:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-defense-contractor-boss-gets-7-years-for-selling-zero-days/</loc>
		<lastmod>2026-02-25T11:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-infrastruktur-souveranitat-europaische-und-moderne-open-source-it-losungen/</loc>
		<lastmod>2026-02-25T11:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relevant-is-the-chief-ai-officer-caio-as-change-agent-orchestrating-ai-across-strategy-operations-and-culture/</loc>
		<lastmod>2026-02-25T12:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moscow-man-accused-of-posing-as-fsb-officer-to-extort-conti-ransomware-gang/</loc>
		<lastmod>2026-02-25T12:40:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-endpoint-management-isnt-just-efficiency-its-a-security-imperative/</loc>
		<lastmod>2026-02-25T12:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solarwinds-serv-u-hit-by-four-critical-rce-level-vulnerabilities/</loc>
		<lastmod>2026-02-25T12:42:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reddit-fined-19-5-million-for-failing-to-protect-childrens-personal-data/</loc>
		<lastmod>2026-02-25T12:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-active-exploitation-of-filezen-vulnerability/</loc>
		<lastmod>2026-02-25T12:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/richter-scale-model-measures-magnitude-of-ot-cyber-incidents/</loc>
		<lastmod>2026-02-25T12:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manual-processes-are-putting-national-security-at-risk/</loc>
		<lastmod>2026-02-25T12:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dkim-replay-manipulierte-online-formulare-tauschen-selbst-sicherheitslosungen/</loc>
		<lastmod>2026-02-25T12:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jetzt-patchen-immer-mehr-angriffe-auf-vmware-instanzen-beobachtet/</loc>
		<lastmod>2026-02-25T12:48:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/querying-the-free-dnsbls-via-oracle-move-to-spamhaus-technologys-free-data-query-service/</loc>
		<lastmod>2026-02-25T13:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-small-security-teams-scale-and-optimize-workflows-in-decentralized-environments/</loc>
		<lastmod>2026-02-25T13:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisoning-ai-training-data/</loc>
		<lastmod>2026-02-25T13:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/test-blog/</loc>
		<lastmod>2026-02-25T13:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/powerdmarc-vs-valimail-an-objective-comparison-guide/</loc>
		<lastmod>2026-02-25T13:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bei-erotikplattform-frivol-leakt-berufliche-eadressen/</loc>
		<lastmod>2026-02-25T13:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026forceintelligence-index-ki-gesteuerte-angriffe-nehmen-zu-da-grundlegende-sicherheitslucken-unternehmen-exponieren/</loc>
		<lastmod>2026-02-25T13:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akquisition-von-sevco-security-starkt-proaktive-sicherheitsstrategien-von-arctic-wolf-durch-integration-von-asset-intelligence-und-exposure-assessment/</loc>
		<lastmod>2026-02-25T13:46:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isc2-veroffentlicht-globalen-verhaltenskodex-fur-cybersicherheit/</loc>
		<lastmod>2026-02-25T13:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wynn-resorts-takes-attackers-word-for-it-that-stolen-staff-data-was-deleted/</loc>
		<lastmod>2026-02-25T13:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-cyberattack-on-cargurus-impacts-12-4-million-users/</loc>
		<lastmod>2026-02-25T13:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-remote-control-feature-brings-claude-code-to-mobile-devices/</loc>
		<lastmod>2026-02-25T13:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/</loc>
		<lastmod>2026-02-25T13:52:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cortex-xdr-live-terminal-for-c2-communications/</loc>
		<lastmod>2026-02-25T13:52:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonderabteilung-des-staatsschutzes-betroffen-hacker-aus-china-erbeuten-in-italien-geheimdaten/</loc>
		<lastmod>2026-02-25T13:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zusatzlicher-schutz-fur-deinen-whatsapp-account-bald-kannst-du-ein-passwort-einrichten/</loc>
		<lastmod>2026-02-25T13:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mquire-linux-memory-forensics-without-external-dependencies/</loc>
		<lastmod>2026-02-25T14:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerabilities-grew-like-weeds-in-2025-but-only-1-were-weaponized-in-attacks/</loc>
		<lastmod>2026-02-25T14:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/caught-in-the-hook-rce-and-api-token-exfiltration-through-claude-code-project-files-2025-59536/</loc>
		<lastmod>2026-02-25T14:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-l3harris-exec-jailed-7-years-for-selling-exploits-to-russia/</loc>
		<lastmod>2026-02-25T14:41:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-call-this-number-toad-emails-beat-gateways/</loc>
		<lastmod>2026-02-25T14:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-nuget-packages-stole-asp-net-data-npm-package-dropped-malware/</loc>
		<lastmod>2026-02-25T14:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-surfaces-increased-cybersecurity-risks-following-ai-adoption/</loc>
		<lastmod>2026-02-25T15:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-michael-henricks-as-chief-financial-and-operating-officer/</loc>
		<lastmod>2026-02-25T15:40:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-real-initial-access-vector-compromised-active-directory-credentials/</loc>
		<lastmod>2026-02-25T15:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-ws-federation-a-modern-primer/</loc>
		<lastmod>2026-02-25T15:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-browser-security-alone-will-not-protect-us-in-the-agentic-ai-era/</loc>
		<lastmod>2026-02-25T15:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tech-learning-awards-of-excellence-2025-winner/</loc>
		<lastmod>2026-02-25T15:44:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-prosecutors-raise-alarm-about-growth-of-domestic-ip-theft/</loc>
		<lastmod>2026-02-25T15:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/caught-in-the-hook-rce-and-api-token-exfiltration-through-claude-code-project-files-2025-59536-2026-21852/</loc>
		<lastmod>2026-02-25T15:46:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-michael-henricks-as-chief-financial-and-operating-officer-2/</loc>
		<lastmod>2026-02-25T15:47:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-4-million-accounts-exposed-in-cargurus-leak/</loc>
		<lastmod>2026-02-25T15:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-openclaw-hype-analysis-of-chatter-from-open-source-deep-and-dark-web/</loc>
		<lastmod>2026-02-25T15:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/44-surge-in-app-exploits-as-ai-speeds-up-cyber-attacks-ibm-finds/</loc>
		<lastmod>2026-02-25T15:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-nuget-package-targets-stripe-developers/</loc>
		<lastmod>2026-02-25T15:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/munich-cyber-security-conference-2026-cybersicherheit-muss-industrialisiert-werden/</loc>
		<lastmod>2026-02-25T15:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-breach-dozens-of-telecoms-government-agencies/</loc>
		<lastmod>2026-02-25T16:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-firm-ufp-says-backup-data-systems-deployed-following-cyberattack/</loc>
		<lastmod>2026-02-25T16:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-exploitation-of-cisco-catalyst-sd-wan-by-uat-8616/</loc>
		<lastmod>2026-02-25T16:40:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-execs-worry-ai-will-eat-entry-level-coding-jobs/</loc>
		<lastmod>2026-02-25T16:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/</loc>
		<lastmod>2026-02-25T16:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-appoints-michael-henricks-as-chief-financial-and-operating-officer-3/</loc>
		<lastmod>2026-02-25T16:43:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slh-offers-5001000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks/</loc>
		<lastmod>2026-02-25T16:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-ways-broken-triage-increases-business-risk-instead-of-reducing-it/</loc>
		<lastmod>2026-02-25T16:45:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modern-vulnerability-management-in-the-age-of-ai/</loc>
		<lastmod>2026-02-25T17:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-on-borrowed-time-preventing-static-side-channel-analysis/</loc>
		<lastmod>2026-02-25T17:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-vulnerabilities-are-being-weaponized-faster-than-ever/</loc>
		<lastmod>2026-02-25T17:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/powerschool-chicago-public-schools-to-settle-student-data-privacy-lawsuit-for-17-million/</loc>
		<lastmod>2026-02-25T17:41:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eset-warnung-gestohlene-zugangsdaten-langst-das-gefahrlichste-angriffswerkzeug/</loc>
		<lastmod>2026-02-25T17:43:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-interview-repos-lure-next-js-devs-into-running-secret-stealing-malware/</loc>
		<lastmod>2026-02-25T17:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-odido-nl-and-ben-nl-breach-as-company-confirms-cyberattack/</loc>
		<lastmod>2026-02-25T17:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-leveraged-cisco-sd-wan-zero-day-since-2023-cve-2026-20127/</loc>
		<lastmod>2026-02-25T17:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-meeting-leads-to-silent-install-of-surveillance-software/</loc>
		<lastmod>2026-02-25T17:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/</loc>
		<lastmod>2026-02-25T17:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-next-js-repos-target-developers-via-fake-job-interviews/</loc>
		<lastmod>2026-02-25T17:48:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-perimeter-anti-data-exfiltration-is-the-new-cybersecurity-standard/</loc>
		<lastmod>2026-02-25T18:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-one-identity-fills-cfo-coo-role-to-strengthen-operating-discipline-amid-expansion/</loc>
		<lastmod>2026-02-25T18:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-one-identity-fills-cfo-coo-role-to-strengthen-operating-discipline-amid-expansion-2/</loc>
		<lastmod>2026-02-25T18:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-one-identity-fills-cfo-coo-role-to-strengthen-operating-discipline-amid-expansion-3/</loc>
		<lastmod>2026-02-25T18:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-cve-research-winning-the-race-against-emerging-vulnerabilities/</loc>
		<lastmod>2026-02-25T18:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-rag-architecture-the-technical-foundation-of-effective-geo/</loc>
		<lastmod>2026-02-25T18:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-rag-architecture-the-technical-foundation-of-effective-geo-2/</loc>
		<lastmod>2026-02-25T18:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-agencies-to-patch-cisco-devices-now-under-attack/</loc>
		<lastmod>2026-02-25T18:45:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-puts-global-age-verification-policy-on-hold-after-backlash/</loc>
		<lastmod>2026-02-25T18:47:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-eyes-allies-warn-hackers-are-actively-exploiting-cisco-sd-wan-flaws/</loc>
		<lastmod>2026-02-25T18:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-windows-laggards-the-gift-of-time-wrapped-in-licensing-fees/</loc>
		<lastmod>2026-02-25T18:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investors-should-take-long-view-despite-anthropic-shock/</loc>
		<lastmod>2026-02-25T18:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-wynn-resorts-data-theft/</loc>
		<lastmod>2026-02-25T18:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-catalyst-sd-wan-users-targeted-in-series-of-cyber-attacks/</loc>
		<lastmod>2026-02-25T18:51:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-uks-proposed-social-media-ban-explained/</loc>
		<lastmod>2026-02-25T18:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-exploitation-back-in-vogue-says-ibm-cyber-unit/</loc>
		<lastmod>2026-02-25T18:53:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-created-intelligence-profile-of-bbc-journalist-subject-to-phone-surveillance/</loc>
		<lastmod>2026-02-25T18:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-code-generation-is-pushing-devsecops-to-machine-speed/</loc>
		<lastmod>2026-02-25T18:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/</loc>
		<lastmod>2026-02-25T18:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-flaws-allow-remote-code-execution-and-api-key-exfiltration/</loc>
		<lastmod>2026-02-25T18:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-mutative-blackbyte-ransomware/</loc>
		<lastmod>2026-02-25T19:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-chemical-formula/</loc>
		<lastmod>2026-02-25T19:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/developer-creates-app-to-detect-nearby-smart-glasses/</loc>
		<lastmod>2026-02-25T19:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-insurance-tech-provider-trizetto-says-more-than-3-million-impacted-by-2024-breach/</loc>
		<lastmod>2026-02-25T19:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries/</loc>
		<lastmod>2026-02-25T19:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/informatica-test-data-management-pros-and-cons-a-complete-guide/</loc>
		<lastmod>2026-02-25T20:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-story-of-the-us-defense-contractor-who-leaked-hacking-tools-to-russia/</loc>
		<lastmod>2026-02-25T20:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euro-hosting-giant-hiking-prices-by-up-to-50-from-april-fools-day/</loc>
		<lastmod>2026-02-25T20:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-intelligent-contract-solutions-are-replacing-traditional-clm-systems/</loc>
		<lastmod>2026-02-25T20:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-russian-exploit-broker-over-stolen-us-cyber-tools/</loc>
		<lastmod>2026-02-25T20:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-sanctions-russian-exploit-brokerage/</loc>
		<lastmod>2026-02-25T20:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-type-prohibiting-type-confusion-with-inline-type-information/</loc>
		<lastmod>2026-02-25T21:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-20127-cisco-catalyst-sd-wan-controller-manager-zero-day-authentication-bypass-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-02-25T21:41:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybersecurity-agency-cisa-reportedly-in-dire-shape-amid-trump-cuts-and-layoffs/</loc>
		<lastmod>2026-02-25T21:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-catches-beijing-spies-using-sheets-to-spread-espionage-across-4-continents/</loc>
		<lastmod>2026-02-25T21:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bcachefs-creator-insists-his-custom-llm-is-female-and-fully-conscious/</loc>
		<lastmod>2026-02-25T21:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-maker-reports-data-theft-hack-to-sec/</loc>
		<lastmod>2026-02-25T21:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-platform-targeting-trucking-and-logistics-disrupted/</loc>
		<lastmod>2026-02-25T21:45:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-says-it-wont-enforce-coppa-against-proper-use-of-age-verification-tools/</loc>
		<lastmod>2026-02-25T22:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zyxel-router-flaw-exposed-devices-to-remote-attacks/</loc>
		<lastmod>2026-02-25T22:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hammers-manufacturing-sector/</loc>
		<lastmod>2026-02-25T22:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leak-12-4-million-cargurus-records-in-massive-data-dump/</loc>
		<lastmod>2026-02-25T22:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-next-js-job-interview-tests-backdoor-developers-devices/</loc>
		<lastmod>2026-02-25T22:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ramp-forum-seizure-fractures-ransomware-ecosystem/</loc>
		<lastmod>2026-02-25T22:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pci-council-says-threats-to-payments-systems-are-speeding-up/</loc>
		<lastmod>2026-02-25T22:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-deliver-value-in-cloud-native-security/</loc>
		<lastmod>2026-02-25T23:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-tech-leaders-excited-about-nhi-in-cybersecurity/</loc>
		<lastmod>2026-02-25T23:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-help-you-stay-ahead-in-cybersecurity/</loc>
		<lastmod>2026-02-25T23:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-the-investment-in-agentic-ai-justified-by-its-cybersecurity-benefits/</loc>
		<lastmod>2026-02-25T23:41:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-eyes-issue-emergency-directive-on-exploited-cisco-sd-wan-zero-day/</loc>
		<lastmod>2026-02-25T23:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/untrusted-repositories-turn-claude-code-into-an-attack-vector/</loc>
		<lastmod>2026-02-25T23:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-sues-sonicwall-over-2025-firewall-data-breach/</loc>
		<lastmod>2026-02-25T23:44:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-scramble-amid-shutdown-to-secure-cisco-sd-wan-systems/</loc>
		<lastmod>2026-02-25T23:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conduent-says-hack-now-affects-at-least-25-million-patients/</loc>
		<lastmod>2026-02-25T23:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/</loc>
		<lastmod>2026-02-25T23:47:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaws-in-claude-code-put-developers-machines-at-risk/</loc>
		<lastmod>2026-02-25T23:48:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governments-issue-warning-over-cisco-zero-day-attacks-dating-back-to-2023/</loc>
		<lastmod>2026-02-26T00:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-ambivalenz-check-point-warnt-vor-neuer-befehls-und-kontrollschicht/</loc>
		<lastmod>2026-02-26T00:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberrisiko-vibe-coding/</loc>
		<lastmod>2026-02-26T00:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-police-use-chatgpt-to-smear-japan-pm-takaichi/</loc>
		<lastmod>2026-02-26T00:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-behavioral-heuristics-for-quantum-era-threat-detection/</loc>
		<lastmod>2026-02-26T04:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: ba745834c96697e773ab0538c209c2dd; Queries for sitemap: 3; Total queries: 88; Seconds: 4.33; Memory for sitemap: 1KB; Total memory: 44MB -->
