<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='1. May 2026 2:07 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/ai-shocks-the-cybersecurity-market/</loc>
		<lastmod>2026-02-26T04:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-shocks-the-cybersecurity-market-2/</loc>
		<lastmod>2026-02-26T04:40:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/steaelite-rat-combines-data-theft-and-ransomware-management-capability-in-one-tool/</loc>
		<lastmod>2026-02-26T04:41:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-set-to-escalate-to-new-generation-warfare-against-nato/</loc>
		<lastmod>2026-02-26T04:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-456-how-to-lose-friends-and-ddos-people/</loc>
		<lastmod>2026-02-26T04:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-collaboration-tools-left-the-door-wide-open-to-remote-code-execution/</loc>
		<lastmod>2026-02-26T04:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hottest-cybersecurity-open-source-tools-of-the-month-february-2026/</loc>
		<lastmod>2026-02-26T05:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-sd-wan-0-day-exploited-for-root-access-in-active-cyberattacks/</loc>
		<lastmod>2026-02-26T05:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-sd-wan-0-day-exploited-for-root-access-in-active-cyberattacks-2/</loc>
		<lastmod>2026-02-26T05:40:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-wachst-schneller-als-it-security/</loc>
		<lastmod>2026-02-26T06:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/review-digital-forensics-investigation-and-response-5th-edition/</loc>
		<lastmod>2026-02-26T06:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-dast-reduces-manual-setup-and-surfaces-exploitable-vulnerabilities/</loc>
		<lastmod>2026-02-26T06:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-148-unveils-new-sanitizer-api-to-mitigate-xss-attacks-in-web-applications/</loc>
		<lastmod>2026-02-26T06:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/steaelite-rat-drives-surge-in-double-extortion-attacks-on-enterprises/</loc>
		<lastmod>2026-02-26T06:43:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-introduces-claude-ai-for-automated-penetration-testing-using-model-context-protocol/</loc>
		<lastmod>2026-02-26T06:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-chinese-hacker-network-behind-53-telecom-govt-breaches/</loc>
		<lastmod>2026-02-26T06:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/virtualbox-7-zero-day-schwachstellen-in-open-source-losung-von-oracle/</loc>
		<lastmod>2026-02-26T06:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/australian-poultry-giant-hazeldenes-faces-operational-disruption-after-cyberattack/</loc>
		<lastmod>2026-02-26T07:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-19-5-million-insider-risk-problem/</loc>
		<lastmod>2026-02-26T07:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-security-debt-grows-across-commercial-software/</loc>
		<lastmod>2026-02-26T07:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkcloud-infostealer-escalates-as-major-enterprise-threat-with-scalable-credential-theft/</loc>
		<lastmod>2026-02-26T07:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023-for-admin-access/</loc>
		<lastmod>2026-02-26T07:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-identity-prognostiziert-ersten-grosen-ki-sicherheitsvorfall-2026-autonome-ki-agenten-gefahrden-identitaten-und-berechtigungen/</loc>
		<lastmod>2026-02-26T07:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-appsec-program-truly-mature-2/</loc>
		<lastmod>2026-02-26T08:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-appsec-program-truly-mature/</loc>
		<lastmod>2026-02-26T08:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-an-east-west-north-south-thing-colortokens-and-netskope-have-you-covered-from-all-directions/</loc>
		<lastmod>2026-02-26T08:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-cyberangriffe-beschleunigt-diese-masnahmen-sollten-unternehmen-jetzt-fur-mehr-digitale-resilienz-ergreifen/</loc>
		<lastmod>2026-02-26T08:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-trends-that-should-top-cisos-rsa-2026-agendas/</loc>
		<lastmod>2026-02-26T08:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-lets-users-control-terminal-sessions-remotely-from-their-phones/</loc>
		<lastmod>2026-02-26T08:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerkverschlusselung-und-netzkopplung-quantensicheres-vpn-gateway-verbindet-standorte-mit-100-gbit-s/</loc>
		<lastmod>2026-02-26T08:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seit-2023-hacker-kapern-cisco-systeme-uber-kritische-zero-day-lucke/</loc>
		<lastmod>2026-02-26T08:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prepare-your-business-before-implementing-enterprise-sso/</loc>
		<lastmod>2026-02-26T09:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrielle-cyberangriffe-erreichen-neue-eskalationsstufe/</loc>
		<lastmod>2026-02-26T09:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-sds-identifies-top-cybersecurity-threats-of-2026-as-ai-risks-escalate/</loc>
		<lastmod>2026-02-26T09:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-touts-agentic-soc-to-tackle-security-woes/</loc>
		<lastmod>2026-02-26T09:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wireshark-4-6-4-resolves-dissector-flaws-plugin-compatibility-issue/</loc>
		<lastmod>2026-02-26T09:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-poc-for-windows-exploit-lets-low-privileged-users-crash-systems-with-bsod/</loc>
		<lastmod>2026-02-26T09:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-fuhrt-quantenresistente-verschlusselung-ein/</loc>
		<lastmod>2026-02-26T09:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-lucke-hacker-infiltrieren-seit-jahren-netzwerke-uber-cisco-lucke/</loc>
		<lastmod>2026-02-26T09:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-cisos-role-is-evolving-from-technologist-to-chief-educator/</loc>
		<lastmod>2026-02-26T10:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msp-vs-mssps-understanding-the-difference/</loc>
		<lastmod>2026-02-26T10:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-farmers-and-the-mercenaries-rethinking-the-human-layer-in-security/</loc>
		<lastmod>2026-02-26T10:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gtig-disrupted-china-linked-apt-unc2814-halting-attacks-on-53-orgs-in-42-countries/</loc>
		<lastmod>2026-02-26T10:41:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsungs-galaxy-s26-turns-privacy-into-a-visible-and-invisible-feature/</loc>
		<lastmod>2026-02-26T10:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/government-data-stolen-after-hacker-jailbreaks-claude-ai-to-write-malicious-exploit-code/</loc>
		<lastmod>2026-02-26T10:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-300-android-rat-boasts-automated-permission-bypass-and-hidden-remote-control/</loc>
		<lastmod>2026-02-26T10:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hydra-saiga-espionage-campaign-targets-critical-utilities-using-telegram-c2-for-data-theft/</loc>
		<lastmod>2026-02-26T10:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day/</loc>
		<lastmod>2026-02-26T10:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-ohne-vollzeit-ciso-und-teure-zertifizierung-minimum-viable-security-fur-kmu-schutz-mit-minimalen-ressourcen/</loc>
		<lastmod>2026-02-26T10:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-hacker-infiltrieren-uber-cisco-systeme-seit-jahren-netzwerke/</loc>
		<lastmod>2026-02-26T10:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/11-proven-ways-to-instantly-boost-your-mailchimp-open-rates/</loc>
		<lastmod>2026-02-26T11:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-zero-trust-perimeter-optimizing-otp-authentication-for-modern-identity-security/</loc>
		<lastmod>2026-02-26T11:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insights-into-claude-code-security-a-new-pattern-of-intelligent-attack-and-defense/</loc>
		<lastmod>2026-02-26T11:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-dohdoor-malware-campaign-targets-education-and-health-care/</loc>
		<lastmod>2026-02-26T11:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-artificial-intelligence-developers-accuse-chinese-firms-of-stealing-their-data/</loc>
		<lastmod>2026-02-26T11:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-ai-platform-vulnerability-allows-remote-code-execution/</loc>
		<lastmod>2026-02-26T11:43:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/residentbat-android-malware-grants-belarusian-kgb-ongoing-mobile-access/</loc>
		<lastmod>2026-02-26T11:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/residentbat-android-malware-grants-belarusian-kgb-ongoing-mobile-access-2/</loc>
		<lastmod>2026-02-26T11:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-developers-of-fake-next-js-job-repos-delivering-in-memory-malware/</loc>
		<lastmod>2026-02-26T11:45:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-stripeapi-nuget-package-mimicked-official-library-and-stole-api-tokens/</loc>
		<lastmod>2026-02-26T11:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rechtliche-vorgaben-zum-cloud-wechsel-sind-cloud-switching-und-data-portability-das-gleiche/</loc>
		<lastmod>2026-02-26T11:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-stellt-mit-vistaroai-eine-neue-losung-fur-proaktive-cybersicherheit-vor/</loc>
		<lastmod>2026-02-26T11:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airport-incident-response/</loc>
		<lastmod>2026-02-26T12:45:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airport-incident-response-2/</loc>
		<lastmod>2026-02-26T12:45:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-used-google-sheets-to-spy-on-telecoms-and-governments-across-42-countries/</loc>
		<lastmod>2026-02-26T12:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optionales-februar-update-fur-windows-11-update-speed-test-in-der-taskleiste-ist-eine-browser-weiterleitung/</loc>
		<lastmod>2026-02-26T12:47:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-eyes-warn-patch-your-cisco-sd-wan-or-risk-root-takeover/</loc>
		<lastmod>2026-02-26T12:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-sues-valve-for-promoting-illegal-gambling-via-game-loot-boxes/</loc>
		<lastmod>2026-02-26T12:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-ads-bypass-google-ads-screening-via-new-campaign-platform-exploit/</loc>
		<lastmod>2026-02-26T12:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zyxel-vulnerabilities-allow-remote-attackers-to-execute-commands-via-command-injection/</loc>
		<lastmod>2026-02-26T12:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-research-identifiziert-kritische-sicherheitslucken-in-anthropics-claude-code/</loc>
		<lastmod>2026-02-26T12:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-erfordert-ein-umdenken-bei-security-und-netzwerk/</loc>
		<lastmod>2026-02-26T12:53:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-mit-openclaw-ki-agent-leakt-interne-daten-einer-cybersecurityfirma/</loc>
		<lastmod>2026-02-26T12:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-confirms-chinese-hackers-used-chatgpt-in-cyberattack-campaign/</loc>
		<lastmod>2026-02-26T13:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expert-recommends-prepare-for-pqc-right-now/</loc>
		<lastmod>2026-02-26T13:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-prolific-and-elusive-china-linked-global-hacking-campaign/</loc>
		<lastmod>2026-02-26T13:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiken-fur-den-datenschutz-bodycams-in-zugen-brauchen-klare-bedingungen/</loc>
		<lastmod>2026-02-26T13:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-polymorphic-malware/</loc>
		<lastmod>2026-02-26T13:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-generate-predictable-passwords/</loc>
		<lastmod>2026-02-26T13:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-kompromittieren-immer-schneller/</loc>
		<lastmod>2026-02-26T13:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucken-in-anthropics-claude-code/</loc>
		<lastmod>2026-02-26T13:46:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucken-in-anthropics-claude-code-2/</loc>
		<lastmod>2026-02-26T13:46:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-sicherheitslucken-in-anthropics-claude-code-3/</loc>
		<lastmod>2026-02-26T13:46:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klas-research-zeichnet-claroty-als-top-performer-im-bereich-healthcare-iot-sicherheit-aus/</loc>
		<lastmod>2026-02-26T13:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-auditioning-female-voices-to-sharpen-social-engineering/</loc>
		<lastmod>2026-02-26T13:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abused-cisco-sd-wan-zero-day-since-2023-to-gain-full-admin-control/</loc>
		<lastmod>2026-02-26T13:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-lapsus-hunters-seeks-women-for-vishing-attacks/</loc>
		<lastmod>2026-02-26T13:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smbs-struggle-to-translate-cybersecurity-investment-into-real-world-resilience-study-finds/</loc>
		<lastmod>2026-02-26T13:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-expands-windows-restore-to-more-enterprise-devices/</loc>
		<lastmod>2026-02-26T13:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoom-update-scam-infects-1437-users-in-12-days-to-deploy-surveillance-tools/</loc>
		<lastmod>2026-02-26T13:53:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-takes-legal-action-against-sonicwall-over-ransomware-attack-from-backup-breach/</loc>
		<lastmod>2026-02-26T13:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wireshark-4-6-4-released-to-patch-multiple-security-vulnerabilities/</loc>
		<lastmod>2026-02-26T13:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accelerate-secure-releases-with-microsoft-copilot-and-sonatype-guide/</loc>
		<lastmod>2026-02-26T14:39:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accelerate-secure-releases-with-microsoft-copilot-and-sonatype-guide-2/</loc>
		<lastmod>2026-02-26T14:39:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shifting-security-left-for-ai-agents-enforcing-ai-generated-code-security-with-gitguardian-mcp/</loc>
		<lastmod>2026-02-26T14:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-report-suspicious-activity-to-spamhaus-with-all-the-right-info/</loc>
		<lastmod>2026-02-26T14:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-price-of-google-workspace-doubled-this-idaho-school-district-found-a-better-way-2/</loc>
		<lastmod>2026-02-26T14:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-the-price-of-google-workspace-doubled-this-idaho-school-district-found-a-better-way/</loc>
		<lastmod>2026-02-26T14:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-avr-contrast-security-better-together/</loc>
		<lastmod>2026-02-26T14:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-payment-data-becomes-the-weakest-link/</loc>
		<lastmod>2026-02-26T14:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-payments-dropped-in-2025-as-attack-numbers-reached-record-levels-chainalysis/</loc>
		<lastmod>2026-02-26T14:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notorious-ransomware-gang-allegedly-blackmailed-by-fake-fsb-officer/</loc>
		<lastmod>2026-02-26T14:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-fur-cybersicherheit-hintergrunde-zum-vorgehen/</loc>
		<lastmod>2026-02-26T14:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerkpfade-zu-wichtigen-ki-zielen-effizient-optimieren/</loc>
		<lastmod>2026-02-26T14:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordkoreanische-hacker-locken-entwickler-mit-fakeinterviews/</loc>
		<lastmod>2026-02-26T14:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-finds-just-1-of-security-flaws-drive-most-cyberattacks-in-2025/</loc>
		<lastmod>2026-02-26T14:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-cut-mttr-by-improving-threat-visibility-in-your-soc/</loc>
		<lastmod>2026-02-26T14:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudsters-integrate-chatgpt-into-global-scam-campaigns/</loc>
		<lastmod>2026-02-26T14:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-rises-to-top-spot-in-job-scam-activity/</loc>
		<lastmod>2026-02-26T14:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-development-fuels-surge-in-open-source-vulnerabilities-black-duck-finds/</loc>
		<lastmod>2026-02-26T14:53:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-payment-rate-drops-to-record-low-as-attacks-surge/</loc>
		<lastmod>2026-02-26T14:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishingled-agent-tesla-campaign-uses-process-hollowing-and-antianalysis-to-evade-detection/</loc>
		<lastmod>2026-02-26T14:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploitable-vulnerabilities-present-in-87-of-organizations/</loc>
		<lastmod>2026-02-26T14:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-data-watchdog-gets-a-makeover-to-match-growing-demands/</loc>
		<lastmod>2026-02-26T14:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-know-about-the-notepad-supply-chain-attack/</loc>
		<lastmod>2026-02-26T15:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-conduent-breach-from-10-million-to-25-million-and-counting/</loc>
		<lastmod>2026-02-26T15:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-breached-dozens-of-telecoms-government-agencies/</loc>
		<lastmod>2026-02-26T15:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-years-of-government-cyber-trouble-uk-turns-to-automated-scanning-to-speed-fixes/</loc>
		<lastmod>2026-02-26T15:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entra-id-oauth-consent-can-grant-chatgpt-access-to-emails/</loc>
		<lastmod>2026-02-26T15:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-and-netskope-deliver-universal-zero-trust-integration-across-managed-and-unmanaged-devices/</loc>
		<lastmod>2026-02-26T15:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-intensify/</loc>
		<lastmod>2026-02-26T15:46:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-intensify-2/</loc>
		<lastmod>2026-02-26T15:46:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-von-sophos-wie-gut-sind-handwerksbetriebe-auf-cybervorfalle-vorbereitet-2/</loc>
		<lastmod>2026-02-26T15:47:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-von-sophos-wie-gut-sind-handwerksbetriebe-auf-cybervorfalle-vorbereitet/</loc>
		<lastmod>2026-02-26T15:47:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-adds-new-capabilities-for-air-gapped-networks/</loc>
		<lastmod>2026-02-26T16:39:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-adds-new-capabilities-for-air-gapped-networks-2/</loc>
		<lastmod>2026-02-26T16:39:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-agent-identity-crisis-80-of-agents-dont-properly-identify-themselves-80-of-sites-dont-verify/</loc>
		<lastmod>2026-02-26T16:41:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-agent-identity-crisis-80-of-agents-dont-properly-identify-themselves-80-of-sites-dont-verify-2/</loc>
		<lastmod>2026-02-26T16:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-bring-zero-trust-to-the-data-stream-blog-menlo-security/</loc>
		<lastmod>2026-02-26T16:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-accelerates-lateral-movement-in-cyberattacks/</loc>
		<lastmod>2026-02-26T16:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/</loc>
		<lastmod>2026-02-26T16:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-says-hackers-have-been-exploiting-a-critical-bug-to-break-into-big-customer-networks-since-2023/</loc>
		<lastmod>2026-02-26T16:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-maker-sentenced-to-prison-in-greece-for-wiretapping-politicians-and-journalists/</loc>
		<lastmod>2026-02-26T16:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rapid-ai-driven-development-makes-security-unattainable-warns-veracode/</loc>
		<lastmod>2026-02-26T16:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogue-devs-of-sideloaded-android-apps-beg-for-freedom-from-googles-verification-regime/</loc>
		<lastmod>2026-02-26T16:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-cisco-sd-wan-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-02-26T16:50:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-cisco-sd-wan-flaws-to-its-known-exploited-vulnerabilities-catalog-3/</loc>
		<lastmod>2026-02-26T16:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-cisco-sd-wan-flaws-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2026-02-26T16:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-global-fight-over-who-controls-your-data-just-escalated-heres-what-the-numbers-say/</loc>
		<lastmod>2026-02-26T16:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/olympique-marseille-confirms-attempted-cyberattack-after-data-leak/</loc>
		<lastmod>2026-02-26T16:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor-2/</loc>
		<lastmod>2026-02-26T16:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor-3/</loc>
		<lastmod>2026-02-26T16:53:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor/</loc>
		<lastmod>2026-02-26T16:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor-4/</loc>
		<lastmod>2026-02-26T16:53:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15-stories/</loc>
		<lastmod>2026-02-26T16:55:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeternum-botnet-shifts-command-control-to-polygon-blockchain/</loc>
		<lastmod>2026-02-26T16:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-root-cause-of-most-security-incidents-traced-to-unpatched-firewalls/</loc>
		<lastmod>2026-02-26T17:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-root-cause-of-most-security-incidents-traced-to-unpatched-firewalls-3/</loc>
		<lastmod>2026-02-26T17:38:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-root-cause-of-most-security-incidents-traced-to-unpatched-firewalls-2/</loc>
		<lastmod>2026-02-26T17:38:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-translating-c-to-rust-lessons-from-a-user-study-2/</loc>
		<lastmod>2026-02-26T17:40:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-translating-c-to-rust-lessons-from-a-user-study/</loc>
		<lastmod>2026-02-26T17:40:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-translating-c-to-rust-lessons-from-a-user-study-3/</loc>
		<lastmod>2026-02-26T17:40:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-translating-c-to-rust-lessons-from-a-user-study-4/</loc>
		<lastmod>2026-02-26T17:40:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-digital-governance-building-cyber-resilience-for-the-public-sector/</loc>
		<lastmod>2026-02-26T17:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ufp-technologies-investigating-cyberattack-that-impacted-company-data/</loc>
		<lastmod>2026-02-26T17:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-disrupts-dhina-linked-cyberespionage-campaign-spanning-dozens-of-countries/</loc>
		<lastmod>2026-02-26T17:43:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-step-finance-shuts-down-after-exploit/</loc>
		<lastmod>2026-02-26T17:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/</loc>
		<lastmod>2026-02-26T17:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-security-risk-oauth-and-saas-identity/</loc>
		<lastmod>2026-02-26T18:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/early-2026-is-proving-kasadaiqs-ai-predictions/</loc>
		<lastmod>2026-02-26T18:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-bring-a-knife-to-a-gunfight-how-to-choose-the-right-microsegmentation-enforcement-for-your-enterprise/</loc>
		<lastmod>2026-02-26T18:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-bring-a-knife-to-a-gunfight-how-to-choose-the-right-microsegmentation-enforcement-for-your-enterprise-2/</loc>
		<lastmod>2026-02-26T18:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-analog-panic-button-what-the-pitt-gets-right-and-wrong-about-hospital-cyber-resilience/</loc>
		<lastmod>2026-02-26T18:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intellexa-founder-three-others-sentenced-to-8-years-in-prison-over-greek-spyware-scandal/</loc>
		<lastmod>2026-02-26T18:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-makers-sentenced-to-prison-in-greece-for-wiretapping-politicians-and-journalists/</loc>
		<lastmod>2026-02-26T18:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hubble-in-a-death-spiral-that-could-end-as-early-as-2028-without-a-reboost/</loc>
		<lastmod>2026-02-26T18:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-avast-website-targets-users-with-euro499-phishing-refund-scam/</loc>
		<lastmod>2026-02-26T18:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-chinese-cyberespionage-operation-hits-53-telecoms/</loc>
		<lastmod>2026-02-26T18:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-security-hub-extended-brings-enterprise-security-under-one-roof/</loc>
		<lastmod>2026-02-26T18:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-warns-of-critical-apex-one-code-execution-flaws/</loc>
		<lastmod>2026-02-26T18:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/</loc>
		<lastmod>2026-02-26T18:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/henry-iv-hotspur-hal-and-hallucinations-3/</loc>
		<lastmod>2026-02-26T19:38:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/henry-iv-hotspur-hal-and-hallucinations-2/</loc>
		<lastmod>2026-02-26T19:38:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/henry-iv-hotspur-hal-and-hallucinations/</loc>
		<lastmod>2026-02-26T19:38:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-target-violent-online-predators-incubated-by-the-com-2/</loc>
		<lastmod>2026-02-26T19:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-target-violent-online-predators-incubated-by-the-com/</loc>
		<lastmod>2026-02-26T19:40:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-repo-files-could-hijack-claude-code-sessions/</loc>
		<lastmod>2026-02-26T19:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-crew-continues-to-dominate-ransomware-ecosystem/</loc>
		<lastmod>2026-02-26T19:42:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeternum-c2-botnet-stores-encrypted-commands-on-polygon-blockchain-to-evade-takedown/</loc>
		<lastmod>2026-02-26T19:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preventing-breaches-mfa-on-remote-access-to-linux-unix-and-infrastructure-systems/</loc>
		<lastmod>2026-02-26T20:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-systematic-lokilocker-ransomware/</loc>
		<lastmod>2026-02-26T20:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-2026-ciso-mandate-proactive-passwordless-and-context-aware-identity-assurance/</loc>
		<lastmod>2026-02-26T20:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/msp-strategic-defense-building-compliance-on-dynamic-attack-surface-reduction/</loc>
		<lastmod>2026-02-26T20:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-dlp-bypass-a-data-trust-wake-up-call-for-ai-security/</loc>
		<lastmod>2026-02-26T20:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-aeternum-c2-botnet-evades-takedowns-via-polygon-blockchain/</loc>
		<lastmod>2026-02-26T20:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor/</loc>
		<lastmod>2026-02-26T20:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-buys-sevco-for-exposure-management-asset-depth/</loc>
		<lastmod>2026-02-26T20:46:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-buys-sevco-for-exposure-management-asset-depth-2/</loc>
		<lastmod>2026-02-26T20:46:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-buys-sevco-for-exposure-management-asset-depth-3/</loc>
		<lastmod>2026-02-26T20:46:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-agents-automate-cve-vulnerability-research-2/</loc>
		<lastmod>2026-02-26T21:40:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-agents-automate-cve-vulnerability-research/</loc>
		<lastmod>2026-02-26T21:40:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-agents-automate-cve-vulnerability-research-3/</loc>
		<lastmod>2026-02-26T21:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-retrofitting-xom-for-stripped-binaries-without-embedded-data-relocation/</loc>
		<lastmod>2026-02-26T21:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-understand-and-avoid-advanced-persistent-threats/</loc>
		<lastmod>2026-02-26T21:43:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wyden-blocks-rudd-confirmation-to-lead-cyber-command-nsa/</loc>
		<lastmod>2026-02-26T21:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-moves-one-step-closer-to-passing-health-care-cyber-reforms/</loc>
		<lastmod>2026-02-26T21:44:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-finnish-hacker-sentenced-to-nearly-7-years/</loc>
		<lastmod>2026-02-26T21:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-38-million-impacted-in-manomano-third-party-breach/</loc>
		<lastmod>2026-02-26T21:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-ai-agent-is-designed-to-not-go-rogue/</loc>
		<lastmod>2026-02-26T21:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/previously-harmless-google-api-keys-now-expose-gemini-ai-data/</loc>
		<lastmod>2026-02-26T21:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-air-force-officer-arrested-for-conspiring-with-hacker-to-provide-flight-training-to-chinese-military/</loc>
		<lastmod>2026-02-26T22:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-compass-is-europols-new-playbook-for-taking-on-the-com/</loc>
		<lastmod>2026-02-26T22:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-staff-are-your-biggest-security-risk-ai-is-making-it-worse/</loc>
		<lastmod>2026-02-26T22:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hegseths-anthropic-deadline-risks-severe-defense-ai-gaps/</loc>
		<lastmod>2026-02-26T22:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-seeks-sector-input-on-ai-for-fighting-healthcare-fraud/</loc>
		<lastmod>2026-02-26T22:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-ai-platform-vulnerability-enables-unauthenticated-rce/</loc>
		<lastmod>2026-02-26T22:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-sd-wan-zero-day-under-exploitation-for-3-years/</loc>
		<lastmod>2026-02-26T22:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-adds-ai-agent-to-validate-vulnerabilities/</loc>
		<lastmod>2026-02-26T23:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-have-been-exploiting-cisco-sd-wan-zero-day-flaw-since-2023/</loc>
		<lastmod>2026-02-26T23:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-risk-management-process-frameworks-and-5-mitigation-methods/</loc>
		<lastmod>2026-02-26T23:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-effectively-handle-enterprise-security-needs/</loc>
		<lastmod>2026-02-26T23:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/does-implementing-agentic-ai-fit-the-budget-of-smbs/</loc>
		<lastmod>2026-02-26T23:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-are-nhis-in-managing-complex-security-environments/</loc>
		<lastmod>2026-02-26T23:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-improve-digital-security-processes/</loc>
		<lastmod>2026-02-26T23:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-move-from-clusters-that-mostly-work-to-productionready-eks/</loc>
		<lastmod>2026-02-26T23:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iso-iec-42001-verantwortungsvolle-ki-ein-neuer-standard-fur-cybersicherheit/</loc>
		<lastmod>2026-02-26T23:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-fixes-two-critical-flaws-in-apex-one/</loc>
		<lastmod>2026-02-26T23:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-anthropics-claude-cowork-means-for-cios/</loc>
		<lastmod>2026-02-26T23:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-sd-wan-zero-day-actively-exploited-to-gain-root-access/</loc>
		<lastmod>2026-02-26T23:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-v-sonicwall-lawsuit-ups-the-breach-blame-game/</loc>
		<lastmod>2026-02-26T23:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hide-from-metas-spyglasses-with-this-new-android-app/</loc>
		<lastmod>2026-02-27T00:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-drug-formulas-clinical-trials-and-manufacturing-lines-are-under-attack-heres-how-to-fight-back/</loc>
		<lastmod>2026-02-27T04:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-policy-enforcement-for-quantum-secure-prompt-engineering/</loc>
		<lastmod>2026-02-27T04:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-key-components-of-a-vendor-relationship-management-framework/</loc>
		<lastmod>2026-02-27T04:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-and-google-meet-scams-install-teramind-a-technical-deep-dive/</loc>
		<lastmod>2026-02-27T04:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gottumukkala-out-andersen-in-as-acting-cisa-director/</loc>
		<lastmod>2026-02-27T04:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/framework-sootup-weiterentwicklung-zukunftssicherer-forschungssoftware-an-der-universitat-paderborn/</loc>
		<lastmod>2026-02-27T04:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-see-weekend-protests-against-dirty-datacentres/</loc>
		<lastmod>2026-02-27T04:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-zugangsdaten-2026-zum-grosten-cyberrisiko-werden/</loc>
		<lastmod>2026-02-27T05:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-month-february-2026/</loc>
		<lastmod>2026-02-27T05:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-api-keys-leak-sensitive-data-without-warning-via-gemini/</loc>
		<lastmod>2026-02-27T05:40:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-strenge-digitale-regulierungen-das-ausweichverhalten-der-nutzer-provozieren/</loc>
		<lastmod>2026-02-27T06:39:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-strenge-digitale-regulierungen-das-ausweichverhalten-der-nutzer-provozieren-2/</loc>
		<lastmod>2026-02-27T06:39:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-erneut-branchenfuhrer-und-outperformer-im-bereich-sase/</loc>
		<lastmod>2026-02-27T06:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-airsnitch-attack-bypasses-wi-fi-encryption-in-homes-offices-and-enterprises-2/</loc>
		<lastmod>2026-02-27T06:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-airsnitch-attack-bypasses-wi-fi-encryption-in-homes-offices-and-enterprises/</loc>
		<lastmod>2026-02-27T06:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrial-networks-continue-to-leak-onto-the-internet/</loc>
		<lastmod>2026-02-27T06:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-discovers-trojanized-gaming-utility-campaign-stealing-data-with-rats/</loc>
		<lastmod>2026-02-27T06:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/juniper-networks-ptx-vulnerability-allows-full-router-takeover-exposing-networks/</loc>
		<lastmod>2026-02-27T06:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apt37-unleashes-novel-malware-to-target-air-gapped-systems/</loc>
		<lastmod>2026-02-27T06:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ciso-role-keeps-getting-heavier/</loc>
		<lastmod>2026-02-27T06:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behauptung-im-darknet-27-000-mitarbeiterdaten-von-rtl-group-gestohlen/</loc>
		<lastmod>2026-02-27T06:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-insights-a-cisos-guide-to-safe-autonomous-agents-firetail-blog/</loc>
		<lastmod>2026-02-27T07:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-groups-switch-to-stealthy-attacks-and-long-term-access/</loc>
		<lastmod>2026-02-27T07:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-app-uses-bluetooth-signals-to-detect-nearby-smart-glasses/</loc>
		<lastmod>2026-02-27T07:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devry-universitys-ciso-on-higher-education-cybersecurity-risk/</loc>
		<lastmod>2026-02-27T07:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freebsd-vulnerabilities-enable-attackers-to-crash-entire-system/</loc>
		<lastmod>2026-02-27T07:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vshell-gains-popularity-among-cybercriminals-as-cobalt-strike-alternative/</loc>
		<lastmod>2026-02-27T07:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-enhances-security-with-url-click-alerts-for-microsoft-teams/</loc>
		<lastmod>2026-02-27T07:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bankmanager-uberweist-22-millionen-euro-an-deepfake-betruger-deepfakes-werden-zur-ernsthaften-bedrohung-fur-unternehmen/</loc>
		<lastmod>2026-02-27T07:46:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feedbacksoftware-im-securitycheck/</loc>
		<lastmod>2026-02-27T07:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-why-the-real-risk-lies-beyond-code/</loc>
		<lastmod>2026-02-27T08:39:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-why-the-real-risk-lies-beyond-code-2/</loc>
		<lastmod>2026-02-27T08:39:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-angriffe-usa-indien-und-deutschland-stark-betroffen/</loc>
		<lastmod>2026-02-27T08:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-vulnerability-exposes-how-an-open-source-ai-agent-can-be-hijacked/</loc>
		<lastmod>2026-02-27T08:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infostealers-drive-massive-brute-force-attacks-on-corporate-sso-gateways-with-stolen-credentials/</loc>
		<lastmod>2026-02-27T08:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-million-records-from-dutch-telco-odido-leaked-online-in-massive-data-breach/</loc>
		<lastmod>2026-02-27T08:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-scams/</loc>
		<lastmod>2026-02-27T08:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/serviceangebot-ciso-advantage-sophos-kauft-arco-cyber/</loc>
		<lastmod>2026-02-27T08:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-million-exposed-env-files-reveal-widespread-security-failures/</loc>
		<lastmod>2026-02-27T09:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manomano-data-breach-impacted-38-million-customer-accounts/</loc>
		<lastmod>2026-02-27T09:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-greenlights-iphone-and-ipad-for-classified-information-handling/</loc>
		<lastmod>2026-02-27T09:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor-in-developer-environments/</loc>
		<lastmod>2026-02-27T09:41:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenabfluss-noch-ungeklart-cyberangriff-auf-greifswalder-klinik/</loc>
		<lastmod>2026-02-27T09:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scrapling-und-openclaw-wenn-der-ki-agent-bewaffnet-wird/</loc>
		<lastmod>2026-02-27T09:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/log4j-am-limit-ki-schrott-lahmt-open-source-projekt/</loc>
		<lastmod>2026-02-27T09:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-sind-kein-ausnahmezustand-mehr/</loc>
		<lastmod>2026-02-27T10:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cyber-security-bill-and-nis2-senior-managements-compliance-guide/</loc>
		<lastmod>2026-02-27T10:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spacex-ipo-date-explained-key-insights-investors-need-to-know/</loc>
		<lastmod>2026-02-27T10:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-aids-incident-response-why-humans-alone-cannot-do-ir-efficiently/</loc>
		<lastmod>2026-02-27T10:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-aids-incident-response-why-humans-alone-cannot-do-ir-efficiently-3/</loc>
		<lastmod>2026-02-27T10:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-aids-incident-response-why-humans-alone-cannot-do-ir-efficiently-2/</loc>
		<lastmod>2026-02-27T10:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-activity-peaks-outside-business-hours/</loc>
		<lastmod>2026-02-27T10:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-broker-breaches-fueled-nearly-21-billion-in-identity-theft-losses/</loc>
		<lastmod>2026-02-27T10:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-manomano-hit-38m-customer-records-compromised-in-vendor-breach/</loc>
		<lastmod>2026-02-27T10:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-111-so-gelingt-der-einstieg-in-die-cybersecurity/</loc>
		<lastmod>2026-02-27T10:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-data-threat-report-zeigt-ki-als-neue-insider-bedrohung-fur-organisationen/</loc>
		<lastmod>2026-02-27T10:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-trend-micro-apex-one-vulnerabilities-allow-remote-malicious-code-execution-2/</loc>
		<lastmod>2026-02-27T10:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-trend-micro-apex-one-vulnerabilities-allow-remote-malicious-code-execution/</loc>
		<lastmod>2026-02-27T10:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iphone-und-ipad-bekommen-nato-sicherheitszertifizierung/</loc>
		<lastmod>2026-02-27T10:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-make-llms-a-defensive-advantage-without-creating-a-new-attack-surface/</loc>
		<lastmod>2026-02-27T11:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-taps-asus-and-dell-into-the-windows-365-cloud-pc-strategy/</loc>
		<lastmod>2026-02-27T11:40:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-gaming-tools-spread-java-based-rat-via-browser-and-chat-platforms/</loc>
		<lastmod>2026-02-27T11:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-compass-cracks-down-on-the-com-30-members-of-notorious-cybercrime-gang-arrested/</loc>
		<lastmod>2026-02-27T11:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommentar-von-trevor-dearing-illumio-agentic-ai-neues-sicherheitsrisiko-und-chance-fur-die-cybersicherheit/</loc>
		<lastmod>2026-02-27T11:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heimliches-fahrzeug-tracking-spionage-durch-das-reifendruckkontrollsystem/</loc>
		<lastmod>2026-02-27T11:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-geopolitics-and-the-cyberthreats-that-faced-the-2026-milancortina-winter-games/</loc>
		<lastmod>2026-02-27T12:39:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-geopolitics-and-the-cyberthreats-that-faced-the-2026-milancortina-winter-games-2/</loc>
		<lastmod>2026-02-27T12:39:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-seam-in-cybersecurity-defenses-that-nation-states-keep-exploiting/</loc>
		<lastmod>2026-02-27T12:40:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-personal-openclaw-agent-may-also-be-taking-orders-from-malicious-websites/</loc>
		<lastmod>2026-02-27T12:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-application-security-must-start-at-the-load-balancer/</loc>
		<lastmod>2026-02-27T12:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-1campaign-to-hide-malicious-ads-from-google-reviewers/</loc>
		<lastmod>2026-02-27T12:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-goes-after-the-coms-ransomware-and-extortion-networks/</loc>
		<lastmod>2026-02-27T12:45:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-second-beta-expands-privacy-controls-for-contacts-sms-and-local-networks/</loc>
		<lastmod>2026-02-27T12:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-taps-asus-and-dell-for-the-windows-365-cloud-pc-strategy/</loc>
		<lastmod>2026-02-27T12:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-finds-87-of-organizations-exposed-to-attacks-due-to-known-vulnerabilities/</loc>
		<lastmod>2026-02-27T12:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dohdoor-malware-targets-u-s-schools-and-healthcare-with-multi-stage-attack/</loc>
		<lastmod>2026-02-27T12:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-vulnerability-monitoring-service-cuts-unresolved-security-flaws-by-75/</loc>
		<lastmod>2026-02-27T12:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-cloud-scanner-for-vulnerabilities-in-2026/</loc>
		<lastmod>2026-02-27T13:39:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-cloud-scanner-for-vulnerabilities-in-2026-2/</loc>
		<lastmod>2026-02-27T13:39:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-space-security-malware-regulatory-alerts/</loc>
		<lastmod>2026-02-27T13:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunstliche-intelligenz-entwickelt-sich-zur-neuen-insider-bedrohung-fur-organisationen/</loc>
		<lastmod>2026-02-27T13:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-tehrans-two-tiered-internet-is-so-dangerous/</loc>
		<lastmod>2026-02-27T13:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/87-prozent-der-unternehmen-betreiben-software-mit-bekannten-sicherheitslucken/</loc>
		<lastmod>2026-02-27T13:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/juniper-issues-emergency-patch-for-critical-ptx-router-rce/</loc>
		<lastmod>2026-02-27T13:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/</loc>
		<lastmod>2026-02-27T13:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-unveil-aeternum-c2-infrastructure-with-advanced-evasion-and-persistence-tactics/</loc>
		<lastmod>2026-02-27T13:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stored-xss-vulnerability-in-rustfs-console-puts-s3-admin-credentials-at-risk/</loc>
		<lastmod>2026-02-27T13:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks/</loc>
		<lastmod>2026-02-27T13:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-resilienz-studie-zeigt-defizite-bei-der-cyber-resilienz-gegen-externe-bedrohungen/</loc>
		<lastmod>2026-02-27T13:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-beruchtigte-hackergruppe-sucht-frauen-furs-team/</loc>
		<lastmod>2026-02-27T13:51:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-beruchtigte-hackergruppe-sucht-frauen-furs-team-2/</loc>
		<lastmod>2026-02-27T13:51:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-sso-scim-providers-for-b2b-saas-selling-to-enterprise-2026-ranked-guide/</loc>
		<lastmod>2026-02-27T14:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-sso-scim-providers-for-b2b-saas-selling-to-enterprise-2026-ranked-guide-2/</loc>
		<lastmod>2026-02-27T14:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-the-differences-between-ws-federation-and-other-protocols/</loc>
		<lastmod>2026-02-27T14:53:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operationalizing-risk-automating-cyber-risk-processes/</loc>
		<lastmod>2026-02-27T14:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cops-back-dutch-telco-odido-after-second-wave-of-shinyhunters-leaks/</loc>
		<lastmod>2026-02-27T14:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-experiment-ports-most-of-next-js-api-in-one-week-with-ai/</loc>
		<lastmod>2026-02-27T14:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iphone-and-ipad-are-the-first-consumer-devices-cleared-for-nato-restricted-classification/</loc>
		<lastmod>2026-02-27T14:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-tightens-grip-on-scam-advertisers/</loc>
		<lastmod>2026-02-27T14:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-shows-promise-not-perfection/</loc>
		<lastmod>2026-02-27T14:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fur-vishing-calls-hackergruppe-sucht-frauen-die-auf-den-punkt-kommen/</loc>
		<lastmod>2026-02-27T15:00:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-diy-etailer-manomano-admits-customer-data-stolen/</loc>
		<lastmod>2026-02-27T15:39:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-diy-etailer-manomano-admits-customer-data-stolen-3/</loc>
		<lastmod>2026-02-27T15:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-diy-etailer-manomano-admits-customer-data-stolen-2/</loc>
		<lastmod>2026-02-27T15:39:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-boss-on-ai-content-nobody-wants-anything-that-is-sloppy/</loc>
		<lastmod>2026-02-27T15:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ironcurtain-an-open-source-safeguard-layer-for-autonomous-ai-assistants/</loc>
		<lastmod>2026-02-27T15:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-patching-and-the-business-footprint-we-all-share/</loc>
		<lastmod>2026-02-27T15:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-apt37-expands-toolkit-to-breach-air-gapped-networks/</loc>
		<lastmod>2026-02-27T15:43:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-sysdig-so-werden-self-hosted-github-actions-runner-als-backdoors-missbraucht/</loc>
		<lastmod>2026-02-27T15:44:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/promptspy-diese-schadsoftware-lasst-sich-von-googles-ki-erklaren-wie-sie-dein-handy-kapert/</loc>
		<lastmod>2026-02-27T15:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plant-apple-ein-budget-macbook-fur-700-dollar-fur-wen-sich-das-preiswerte-notebook-lohnen-konnte/</loc>
		<lastmod>2026-02-27T15:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-soll-bugs-aufspuren-warum-sicherheitsexperten-darin-ein-problem-sehen/</loc>
		<lastmod>2026-02-27T15:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scientists-intro-airsnitch-which-bypasses-wifi-isolation-to-launch-attacks-on-networks/</loc>
		<lastmod>2026-02-27T16:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-enterprise-browsers-against-ai-threats-blog-menlo-security/</loc>
		<lastmod>2026-02-27T16:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/public-google-api-keys-can-be-used-to-expose-gemini-ai-data/</loc>
		<lastmod>2026-02-27T16:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-lawmakers-propose-that-youth-under-16-be-barred-from-social-media-without-parental-consent/</loc>
		<lastmod>2026-02-27T16:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-replaces-acting-director-after-a-bumbling-year-on-the-job/</loc>
		<lastmod>2026-02-27T16:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-payments-cratered-in-2025-but-attacks-surged-to-record-highs/</loc>
		<lastmod>2026-02-27T16:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-at-risk-as-android-mental-health-apps-expose-sensitive-data/</loc>
		<lastmod>2026-02-27T16:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/</loc>
		<lastmod>2026-02-27T16:45:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-removes-controversial-acting-cisa-director/</loc>
		<lastmod>2026-02-27T17:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resurge-malware-can-remain-undetected-on-devices/</loc>
		<lastmod>2026-02-27T17:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-werden-zur-dauerbelastung/</loc>
		<lastmod>2026-02-27T17:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-to-start-alerting-parents-when-children-search-for-terms-relating-to-self-harm/</loc>
		<lastmod>2026-02-27T17:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-killed-the-privacy-star-we-cant-rewind-weve-gone-too-far/</loc>
		<lastmod>2026-02-27T17:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-vulnerability-in-openclaw-lets-websites-hijack-ai-agents/</loc>
		<lastmod>2026-02-27T17:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape/</loc>
		<lastmod>2026-02-27T17:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-case-for-why-better-breach-transparency-matters/</loc>
		<lastmod>2026-02-27T17:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor/</loc>
		<lastmod>2026-02-27T17:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-architecture-the-technical-blueprint/</loc>
		<lastmod>2026-02-27T17:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-enhancing-security-in-third-party-library-reuse/</loc>
		<lastmod>2026-02-27T17:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/catch-firetail-at-rsac-2026-firetail-blog/</loc>
		<lastmod>2026-02-27T17:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-70-of-ai-projects-fail-how-forward-deployed-engineers-change-the-equation/</loc>
		<lastmod>2026-02-27T18:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-updates-acr-privacy-practices-after-texas-sues-tv-manufacturers/</loc>
		<lastmod>2026-02-27T18:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-vulnerability-in-openclaw-could-let-websites-hijack-ai-agents/</loc>
		<lastmod>2026-02-27T18:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-nations-alert-critical-cisco-bug-used-in-global-espionage-campaign/</loc>
		<lastmod>2026-02-27T18:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/900-sangoma-freepbx-instances-compromised-in-ongoing-web-shell-attacks/</loc>
		<lastmod>2026-02-27T18:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-crashed-the-market-because-were-defending-the-wrong-thing/</loc>
		<lastmod>2026-02-27T19:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-proof-without-content/</loc>
		<lastmod>2026-02-27T19:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automating-more-security-decisions-key-to-keeping-up-with-ai-attacks-experts/</loc>
		<lastmod>2026-02-27T19:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/say-goodbye-to-budget-pcs-and-smartphones-memory-is-too-expensive-now/</loc>
		<lastmod>2026-02-27T19:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leak-2m-records-from-dutch-telecom-odido-claim-21m-stolen/</loc>
		<lastmod>2026-02-27T19:43:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-warns-of-threats-to-electronic-health-records/</loc>
		<lastmod>2026-02-27T19:44:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trend-micro-patches-critical-apex-one-rce-flaws/</loc>
		<lastmod>2026-02-27T19:44:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-led-crackdown-on-the-com-hackers-leads-to-30-arrests/</loc>
		<lastmod>2026-02-27T19:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emerging-global-threat-landscape-a-7-day-intelligence-analysis-for-modern-socs/</loc>
		<lastmod>2026-02-27T20:39:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strengthening-identity-security-real-world-credential-attack-detection-with-seceon-aisiem/</loc>
		<lastmod>2026-02-27T20:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-nork-digital-intruders-caught-breaking-into-us-healthcare-education-orgs/</loc>
		<lastmod>2026-02-27T20:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-leadership-shakeup-amid-dhs-shutdown/</loc>
		<lastmod>2026-02-27T20:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-testing-windows-11-batch-file-security-improvements/</loc>
		<lastmod>2026-02-27T20:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/</loc>
		<lastmod>2026-02-27T20:44:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-seizes-61-million-in-tether-linked-to-pig-butchering-crypto-scams/</loc>
		<lastmod>2026-02-27T20:45:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-caspr-context-aware-security-policy-recommendation/</loc>
		<lastmod>2026-02-27T21:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-cybersecurity-is-it-worth-the-effort-for-lean-security-teams/</loc>
		<lastmod>2026-02-27T21:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silent-google-api-key-change-exposed-gemini-ai-data/</loc>
		<lastmod>2026-02-27T21:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeternum-botnet-hides-commands-in-polygon-smart-contracts/</loc>
		<lastmod>2026-02-27T21:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-conference-expands-community-focus-in-2026/</loc>
		<lastmod>2026-02-27T21:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-claude-and-the-ai-cybersecurity-reckoning/</loc>
		<lastmod>2026-02-27T21:43:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freebsd-jail-escape-flaw-breaks-filesystem-isolation/</loc>
		<lastmod>2026-02-27T21:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/juniper-ptx-flaw-could-allow-full-router-takeover/</loc>
		<lastmod>2026-02-27T21:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/life-mirrors-art-ransomware-hits-hospitals-on-tv-irl/</loc>
		<lastmod>2026-02-27T21:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cities-hosting-major-events-need-more-focus-on-wireless-drone-defense/</loc>
		<lastmod>2026-02-27T21:48:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-do-email-analysis-complete-guide/</loc>
		<lastmod>2026-02-27T22:40:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-hole-could-let-hackers-take-over-juniper-networks-ptx-core-routers/</loc>
		<lastmod>2026-02-27T22:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senate-health-cyber-bill-clears-committee-hurdle/</loc>
		<lastmod>2026-02-27T22:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gambit-security-lands-61m-to-bolster-enterprise-resilience/</loc>
		<lastmod>2026-02-27T22:43:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-on-hospitals-cost-lives-heres-how-to-fight-back-at-machine-speed/</loc>
		<lastmod>2026-02-27T23:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/double-whammy-steaelite-rat-bundles-data-theft-ransomware-in-one-evil-tool/</loc>
		<lastmod>2026-02-27T23:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-menlo-security-ceo-eyes-agentic-ai-runtime-protection/</loc>
		<lastmod>2026-02-27T23:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-escalates-ai-clash-with-anthropic/</loc>
		<lastmod>2026-02-27T23:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-non-human-identities-in-ai-secure/</loc>
		<lastmod>2026-02-28T00:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-are-agentic-ai-solutions-in-managing-threats/</loc>
		<lastmod>2026-02-28T00:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-the-role-of-ai-in-driving-cybersecurity-innovation/</loc>
		<lastmod>2026-02-28T00:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stiftung-warentest-eset-home-security-essential-als-testsieger-unter-16-antiviren-programmen/</loc>
		<lastmod>2026-02-28T00:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eckhart-hilgenstock-ki-als-entscheidungshilfe-aber-niemals-ersatz-fur-menschliche-fuhrung/</loc>
		<lastmod>2026-02-28T00:43:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-leaders-ensure-ai-system-safety-and-compliance/</loc>
		<lastmod>2026-02-28T00:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-quantum-proofs-https-by-squeezing-2-5kb-of-data-into-64-byte-space/</loc>
		<lastmod>2026-02-28T04:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-disrupts-access-to-popular-developer-platform-supabase-with-blocking-order/</loc>
		<lastmod>2026-02-28T04:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lovable-hosted-app-littered-with-basic-flaws-exposed-18k-users-researcher-claims/</loc>
		<lastmod>2026-02-28T06:37:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-will-deploy-ai-in-us-military-classified-networks/</loc>
		<lastmod>2026-02-28T06:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-designates-anthropic-supply-chain-risk-over-ai-military-dispute/</loc>
		<lastmod>2026-02-28T06:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-bans-anthropic-ai-in-federal-agencies-amid-growing-security-concerns/</loc>
		<lastmod>2026-02-28T07:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wlan-sicherheitslucke-airsnitch-client-isolation-selbst-in-wpa3-enterprise-ausgehebelt/</loc>
		<lastmod>2026-02-28T09:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-rat-delivered-through-trojanized-gaming-utilities/</loc>
		<lastmod>2026-02-28T09:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-windows-file-explorer-and-webdav-to-distribute-malware/</loc>
		<lastmod>2026-02-28T09:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-erhalt-bei-den-g2-best-software-awards-erneut-auszeichnungen/</loc>
		<lastmod>2026-02-28T09:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ios-penetration-testing-definition-process-and-tools/</loc>
		<lastmod>2026-02-28T10:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-and-israel-launch-strikes-against-iran/</loc>
		<lastmod>2026-02-28T10:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-scrapling-und-openclaw-wenn-der-ki-agent-bewaffnet-wird/</loc>
		<lastmod>2026-02-28T10:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement/</loc>
		<lastmod>2026-02-28T11:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-vciso-services-reduce-cyber-risk-without-increasing-costs/</loc>
		<lastmod>2026-02-28T12:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-s-internet-near-totally-blacked-out-amid-us-israeli-strikes/</loc>
		<lastmod>2026-02-28T12:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-and-israel-launch-major-combat-operations-against-iran/</loc>
		<lastmod>2026-02-28T12:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/area-man-accidentally-hacks-6700-camera-enabled-robot-vacuums/</loc>
		<lastmod>2026-02-28T12:41:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/external-authentication-exploring-ws-trust-for-authentication/</loc>
		<lastmod>2026-02-28T13:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-auto-launch-copilot-in-edge-whenever-you-click-a-link-from-outlook/</loc>
		<lastmod>2026-02-28T13:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-iot-vulnerabilities-that-stop-projects-and-how-to-avoid-them/</loc>
		<lastmod>2026-02-28T13:40:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-liefert-nis2leitfaden-mit-checkliste/</loc>
		<lastmod>2026-02-28T13:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-an-ai-agent-for-adaptive-mfa-decisioning/</loc>
		<lastmod>2026-02-28T14:40:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sopra-steria-sues-uk-government-over-958m-capita-outsourcing-award/</loc>
		<lastmod>2026-02-28T15:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-is-the-system-that-intercepted-irans-missiles-over-the-uae/</loc>
		<lastmod>2026-02-28T15:38:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-jbomaudit-assessing-the-landscape-compliance-and-security-implications-of-java-sboms/</loc>
		<lastmod>2026-02-28T16:39:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/things-were-even-worse-at-cisa-than-we-thought/</loc>
		<lastmod>2026-02-28T16:40:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-has-one-card-left-its-pointed-at-your-network/</loc>
		<lastmod>2026-02-28T16:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jack-dorseys-fintech-outfit-block-announces-40-layoffs-blames-ai-gets-23-stock-bump/</loc>
		<lastmod>2026-02-28T16:42:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacked-prayer-app-sends-surrender-messages-to-iranians-amid-israeli-and-us-strikes/</loc>
		<lastmod>2026-02-28T16:43:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-8m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/</loc>
		<lastmod>2026-02-28T16:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-and-google-meet-phishing-campaigns-deploy-teramind-surveillance-software/</loc>
		<lastmod>2026-02-28T16:45:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-drohende-ende-klassischer-kryptographie-web-seminar-zur-it-sicherheit-vor-dem-quantenumbruch/</loc>
		<lastmod>2026-02-28T17:38:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-is-the-kimwolf-botmaster-dort/</loc>
		<lastmod>2026-02-28T18:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-quantum-proofs-https-by-squeezing-15kb-of-data-into-700-byte-space/</loc>
		<lastmod>2026-02-28T18:40:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websocket/</loc>
		<lastmod>2026-02-28T18:41:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-the-pentagon-punished-anthropic-for-red-lines-it-accepted-from-openai-hours-later/</loc>
		<lastmod>2026-02-28T19:38:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadian-tire-2025-data-breach-impacts-38-million-users/</loc>
		<lastmod>2026-02-28T19:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-easydmarc-is-the-best-enterprise-dmarc-solution/</loc>
		<lastmod>2026-02-28T20:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/</loc>
		<lastmod>2026-02-28T20:39:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-you-be-reassured-about-your-ais-security-integrity/</loc>
		<lastmod>2026-02-28T23:38:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-maintain-control-over-your-ai-and-its-actions/</loc>
		<lastmod>2026-02-28T23:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-ai-security-solution-scalable-for-future-challenges/</loc>
		<lastmod>2026-02-28T23:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-deliver-value-in-cybersecurity/</loc>
		<lastmod>2026-02-28T23:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-die-neue-insider-bedrohung-fur-organisationen/</loc>
		<lastmod>2026-03-01T00:39:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-to-pentagon-autonomous-weapons-could-hurt-us-troops-and-civilians/</loc>
		<lastmod>2026-03-01T04:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-565-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-03-01T04:40:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-enterprise-sso-platforms-for-startups-in-2026-technical-guide-comparison/</loc>
		<lastmod>2026-03-01T06:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-alle-unternehmen-betreiben-software-mit-bekannten-sicherheitslucken/</loc>
		<lastmod>2026-03-01T06:38:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cleaning-superstore-warning-over-missed-delivery-text-scam-on-whatsapp/</loc>
		<lastmod>2026-03-01T07:37:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-self-spreading-npm-malware-hits-developers-cisco-sd-wan-0-day-exploited-since-2023/</loc>
		<lastmod>2026-03-01T09:38:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illumio-plattform-bietet-agentenlose-visibilitat-und-breach-containment/</loc>
		<lastmod>2026-03-01T09:39:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tron-hacker-tod-zwischen-fakten-und-fragen/</loc>
		<lastmod>2026-03-01T09:40:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-copper-fired-after-faking-keyboard-taps-using-photo-frame/</loc>
		<lastmod>2026-03-01T10:40:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-blick-in-die-arbeitsweise-eines-managed-security-operations-centers-wo-cyberangriffe-ihr-ende-finden/</loc>
		<lastmod>2026-03-01T11:37:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2025-64328-exploitation-impacts-900-sangoma-freepbx-instances/</loc>
		<lastmod>2026-03-01T11:38:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jobbezogene-phishing-kampagnen-und-clickfix-angriffe-auf-entwickler/</loc>
		<lastmod>2026-03-01T11:39:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/positive-entwicklung-drei-viertel-der-geschaftsfuhrungen-fuhlen-sich-fur-it-sicherheit-zustandig/</loc>
		<lastmod>2026-03-02T06:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vietnam-announces-national-cybersecurity-firewall-plan-under-new-digital-governance-law/</loc>
		<lastmod>2026-03-02T06:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksmithai-open-source-ai-powered-penetration-testing-framework/</loc>
		<lastmod>2026-03-02T06:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-cyber-threats-start-thinking-for-themselves/</loc>
		<lastmod>2026-03-02T06:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prayer-app-used-by-millions-hacked-to-broadcast-defection-messages-amid-u-s-israel-strikes-on-iran/</loc>
		<lastmod>2026-03-02T06:53:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-perfect-browser-extension-exploited-for-stealth-script-injection-and-security-header-stripping/</loc>
		<lastmod>2026-03-02T06:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/26-lander-betroffen-ungeschutzte-datenbank-legt-eine-milliarde-kundendaten-offen/</loc>
		<lastmod>2026-03-02T06:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-the-ai-shockwave-hitting-cybersecurity/</loc>
		<lastmod>2026-03-02T07:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-can-build-a-resilient-workforce/</loc>
		<lastmod>2026-03-02T07:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mint-ec-camp-an-der-technischen-universitat-ilmenau-gestartet/</loc>
		<lastmod>2026-03-02T07:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leitfaden-zur-nis2-compliance-zero-networks-mit-5-punkte-checkliste-2/</loc>
		<lastmod>2026-03-02T07:52:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leitfaden-zur-nis2-compliance-zero-networks-mit-5-punkte-checkliste/</loc>
		<lastmod>2026-03-02T07:52:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leitfaden-zur-nis2-compliance-zero-networks-mit-5-punkte-checkliste-3/</loc>
		<lastmod>2026-03-02T07:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apac-firms-still-in-ai-test-mode-as-data-readiness-issues-persist/</loc>
		<lastmod>2026-03-02T07:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-dependencies-are-278-days-out-of-date-and-your-pipelines-arent-protected/</loc>
		<lastmod>2026-03-02T07:54:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-debt-is-becoming-a-governance-issue-for-cisos/</loc>
		<lastmod>2026-03-02T07:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/middle-east-aws-outage-sends-shockwaves-through-cloud-infrastructure-service/</loc>
		<lastmod>2026-03-02T07:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-resurge-malware-exploiting-ivanti-connect-secure-zero-days/</loc>
		<lastmod>2026-03-02T07:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-gastkommentar-von-max-rahner-tenable-wer-schwachstellen-zahlt-statt-risiken-zu-verstehen-betreibt-statistik/</loc>
		<lastmod>2026-03-02T07:58:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ocrfix-botnet-uses-clickfix-phishing-and-etherhiding-to-mask-blockchain-c2-infrastructure/</loc>
		<lastmod>2026-03-02T08:47:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-resiliente-cloud-und-ki-aus-europa-microsoft-eroffnet-erstes-studio-fur-souverane-cloud-und-ki-architekturen/</loc>
		<lastmod>2026-03-02T08:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionagesoftware-was-ist-spyware/</loc>
		<lastmod>2026-03-02T08:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/echtheitsnachweis-was-ist-ein-digitales-zertifikat/</loc>
		<lastmod>2026-03-02T08:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irankrieg-aws-ausfall-durch-auf-rechenzentrum-geflogene-objekte/</loc>
		<lastmod>2026-03-02T08:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purpose-built-ai-security-agent-detected-92-of-defi-contracts-vulnerabilities/</loc>
		<lastmod>2026-03-02T09:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erpressen-weniger-losegeld/</loc>
		<lastmod>2026-03-02T09:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-camera-doorbell-ad-triggers-privacy-concerns-and-public-criticism-in-america/</loc>
		<lastmod>2026-03-02T09:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-massive-sonicwall-firewall-attack-using-4000-ip-addresses/</loc>
		<lastmod>2026-03-02T09:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angular-ssr-flaw-enables-unauthorized-server-side-requests-in-web-apps/</loc>
		<lastmod>2026-03-02T09:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-data-sanitization-was-ist-data-sanitization/</loc>
		<lastmod>2026-03-02T09:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-post-incident-review-pir-was-ist-ein-post-incident-review/</loc>
		<lastmod>2026-03-02T09:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-initial-access-broker-iab-was-macht-ein-initial-access-broker/</loc>
		<lastmod>2026-03-02T09:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/link11-releases-european-cyber-report-2026-ddos-attacks-become-a-constant-threat/</loc>
		<lastmod>2026-03-02T10:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-real-cyber-risks-arise-when-small-flaws-combine-and-alerts-are-viewed-in-isolation/</loc>
		<lastmod>2026-03-02T10:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-overviews-rife-with-scam-phone-numbers/</loc>
		<lastmod>2026-03-02T10:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purchase-order-attachment-isnt-a-pdf-its-phishing-for-your-password/</loc>
		<lastmod>2026-03-02T10:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-february-23-march-1/</loc>
		<lastmod>2026-03-02T10:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resops-the-new-operating-model-bridging-security-identity-and-recovery/</loc>
		<lastmod>2026-03-02T10:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-risk-based-data-sanitization-strategy-when-to-use-cryptographic-erasure-vs-physical-destruction/</loc>
		<lastmod>2026-03-02T10:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-scorecard-for-cyber-and-risk-culture/</loc>
		<lastmod>2026-03-02T10:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/link11-releases-european-cyber-report-2026-ddos-attacks-become-a-constant-threat-2/</loc>
		<lastmod>2026-03-02T10:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-hacker-pleads-guilty-to-running-onlyfake-ai-id-scam-site/</loc>
		<lastmod>2026-03-02T10:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-compass-operation-cracks-down-on-the-com-cybercrime-collective-30-arrested-179-suspects-identified/</loc>
		<lastmod>2026-03-02T10:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-publish-26-npm-packages-hiding-pastebin-c2-for-cross-platform-rat/</loc>
		<lastmod>2026-03-02T11:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwortsicherheit-ist-der-neue-pentest-passwortsicherheit-braucht-dieselbe-prioritat-wie-penetrationstests/</loc>
		<lastmod>2026-03-02T11:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflight-veroffentlicht-umfassende-studie-zum-thema-ki-agenten/</loc>
		<lastmod>2026-03-02T11:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-will-gerate-mit-graphene-os-entwickeln/</loc>
		<lastmod>2026-03-02T11:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seed-phrase-geleakt-behordenpanne-fuhrt-zu-millionenschwerem-krypto-diebstahl/</loc>
		<lastmod>2026-03-02T11:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irankrieg-fliegende-objekte-setzen-aws-rechenzentrum-in-brand/</loc>
		<lastmod>2026-03-02T11:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/configuration-and-runtime-the-pbj-of-effective-security-operations/</loc>
		<lastmod>2026-03-02T11:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-briefly-disrupts-russian-internet-regulator-and-defense-ministry-websites/</loc>
		<lastmod>2026-03-02T11:51:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-fake-nudes-to-fake-quotes-ai-deepfakes-plagued-olympic-athletes/</loc>
		<lastmod>2026-03-02T11:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-silent-probing-can-make-your-security-playbook-a-liability/</loc>
		<lastmod>2026-03-02T11:53:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pakistans-top-news-channels-hacked-and-hijacked-with-anti-military-messages/</loc>
		<lastmod>2026-03-02T11:54:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europols-project-compass-nets-30-arrests-in-crackdown-on-the-com/</loc>
		<lastmod>2026-03-02T11:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-flaw-exposed-openclaw-users-to-data-theft/</loc>
		<lastmod>2026-03-02T11:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-flaw-exposed-openclaw-users-to-data-theft-2/</loc>
		<lastmod>2026-03-02T11:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-reduces-cyberattack-fix-times-from-two-months-to-eight-days/</loc>
		<lastmod>2026-03-02T11:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-turns-to-grapheneos-for-smartphone-security-upgrade-2/</loc>
		<lastmod>2026-03-02T11:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-turns-to-grapheneos-for-smartphone-security-upgrade/</loc>
		<lastmod>2026-03-02T11:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-turns-to-grapheneos-for-smartphone-security-upgrade-3/</loc>
		<lastmod>2026-03-02T11:58:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-tied-to-cve-2026-21513-mshtml-0-day-exploited-before-feb-2026-patch-tuesday/</loc>
		<lastmod>2026-03-02T11:58:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-payments-decline-8-as-attacks-surge-50/</loc>
		<lastmod>2026-03-02T11:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkom-studie-zu-datenschutz-und-cloud-nutzung-internationale-datentransfers-bleiben-fur-unternehmen-unverzichtbar/</loc>
		<lastmod>2026-03-02T12:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metacompliance-fuhrt-innovative-exposurefunktion-ein/</loc>
		<lastmod>2026-03-02T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metacompliance-fuhrt-innovative-exposurefunktion-ein/</loc>
		<lastmod>2026-03-02T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metacompliance-fuhrt-innovative-exposurefunktion-ein/</loc>
		<lastmod>2026-03-02T12:02:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maybe-its-time-to-do-the-opposite-lessons-from-george-costanza-on-data-management/</loc>
		<lastmod>2026-03-02T12:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/innovation-without-exposure-a-cisos-secure-by-design-framework-for-business-outcomes/</loc>
		<lastmod>2026-03-02T12:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-ways-agentic-ai-changes-how-systems-act-and-adapt/</loc>
		<lastmod>2026-03-02T12:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-confirms-claude-is-down-in-a-worldwide-outage/</loc>
		<lastmod>2026-03-02T12:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oneuptime-command-injection-vulnerability-poses-major-risk-of-full-system-takeover/</loc>
		<lastmod>2026-03-02T12:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gtfire-phishing-campaign-exploits-google-services-to-bypass-detection-and-harvest-credentials/</loc>
		<lastmod>2026-03-02T12:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langflow-csv-agent-flaw-could-let-attackers-execute-arbitrary-code/</loc>
		<lastmod>2026-03-02T12:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawjacked-bug-enables-covert-ai-agent-hijacking/</loc>
		<lastmod>2026-03-02T12:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brandenburg-setzt-auf-offenes-vergabeverfahren-innenminister-sieht-ausschluss-von-us-software-palantir-als-nicht-notwendig/</loc>
		<lastmod>2026-03-02T12:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pci-compliant-authentication-for-retail-enterprises/</loc>
		<lastmod>2026-03-02T13:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-passwordless-authentication-for-retail-brands/</loc>
		<lastmod>2026-03-02T13:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-outposts-evaluating-the-role-of-ddos-attacks-in-us-iran-conflict/</loc>
		<lastmod>2026-03-02T13:51:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-microsoft-partners-are-tackling-huge-huge-task-of-making-security-software-safer/</loc>
		<lastmod>2026-03-02T13:53:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proofconcept-released-for-windows-alpc-privilege-escalation-via-error-reporting/</loc>
		<lastmod>2026-03-02T13:55:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uxss-vulnerability-in-duckduckgo-browsers-autoconsent-js-bridge-allows-cross-origin-attacks/</loc>
		<lastmod>2026-03-02T13:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-googles-gemini-ai-panel-opens-door-to-hijacking-2/</loc>
		<lastmod>2026-03-02T13:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-googles-gemini-ai-panel-opens-door-to-hijacking/</loc>
		<lastmod>2026-03-02T13:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-in-googles-gemini-ai-panel-opens-door-to-hijacking-3/</loc>
		<lastmod>2026-03-02T13:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-your-saas-from-bot-attacks-with-safeline-waf/</loc>
		<lastmod>2026-03-02T13:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-iranische-cyberkriminelle-enge-verzahnung-von-cyberuntergrund-und-staat/</loc>
		<lastmod>2026-03-02T13:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerbot-claw-ki-agent-kapert-softwareprojekte-auf-github/</loc>
		<lastmod>2026-03-02T14:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feb-recap-new-aws-privileged-permissions-and-services/</loc>
		<lastmod>2026-03-02T14:49:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyone-knows-about-broken-authorization-so-why-does-it-still-work-for-attackers/</loc>
		<lastmod>2026-03-02T14:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-adoption-is-slowing-down-in-growing-companies-what-decision-makers-can-do-about-it/</loc>
		<lastmod>2026-03-02T14:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-court-convicts-alleged-mastermind-behind-global-investment-scam-network/</loc>
		<lastmod>2026-03-02T14:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/british-organizations-urged-to-be-alert-to-threat-of-iranian-cyberattacks/</loc>
		<lastmod>2026-03-02T14:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cispa-campus-bundelung-von-forschung-und-innovation-in-st-ingbert/</loc>
		<lastmod>2026-03-02T14:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-and-internet-outages-hit-iran-amid-u-s-air-strikes/</loc>
		<lastmod>2026-03-02T14:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/memory-scalpers-hunt-scarce-dram-with-bot-blitz/</loc>
		<lastmod>2026-03-02T14:57:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-try-to-sim-swap-dubai-citizens-hours-after-iranian-missile-strikes/</loc>
		<lastmod>2026-03-02T14:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/criminal-ip-to-present-decision-ready-threat-intelligence-at-rsac-2026/</loc>
		<lastmod>2026-03-02T14:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt37-combines-cloud-storage-and-usb-implants-to-infiltrate-air-gapped-systems/</loc>
		<lastmod>2026-03-02T14:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/link11-releases-european-cyber-report-2026-ddos-attacks-become-a-constant-threat-3/</loc>
		<lastmod>2026-03-02T15:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mshtml-zero-day-in-windows-exploited-by-apt28-prior-to-feb-2026-security-update/</loc>
		<lastmod>2026-03-02T15:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tpms-flaw-in-toyota-mercedes-and-other-major-brands-enables-covert-vehicle-tracking/</loc>
		<lastmod>2026-03-02T15:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more/</loc>
		<lastmod>2026-03-02T15:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-micropatch-was-ist-ein-micropatch/</loc>
		<lastmod>2026-03-02T15:04:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scarcity-in-ddr5-ram-fueled-by-ai-demand-sparks-massive-scalping-surge/</loc>
		<lastmod>2026-03-02T15:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/answering-your-webinar-questions-risk-free-dmarc-enforcement/</loc>
		<lastmod>2026-03-02T15:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/answering-your-webinar-questions-risk-free-dmarc-enforcement-2/</loc>
		<lastmod>2026-03-02T15:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-pages-for-zoom-and-google-meet-install-teramind-monitoring-tool/</loc>
		<lastmod>2026-03-02T15:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operator-of-ai-fake-id-platform-pleads-guilty/</loc>
		<lastmod>2026-03-02T15:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-operation-targets-online-network-exploiting-minors/</loc>
		<lastmod>2026-03-02T15:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korean-tax-agency-leak-leads-to-4-8m-crypto-theft/</loc>
		<lastmod>2026-03-02T15:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-hijacked-to-push-clickfix-malware/</loc>
		<lastmod>2026-03-02T15:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/byovd-turns-trusted-drivers-against-windows-security/</loc>
		<lastmod>2026-03-02T15:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-hit-by-widespread-service-outage/</loc>
		<lastmod>2026-03-02T15:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-deepfakes-and-injection-attacks-are-breaking-identity-verification/</loc>
		<lastmod>2026-03-02T16:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-deepfakes-and-injection-attacks-are-breaking-identity-verification-2/</loc>
		<lastmod>2026-03-02T16:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-deepfakes-and-injection-attacks-are-breaking-identity-verification-3/</loc>
		<lastmod>2026-03-02T16:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-middle-east-conflict-triggers-surge-in-global-cyber-activity/</loc>
		<lastmod>2026-03-02T16:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/psychische-belastung-curl-stoppt-bug-bounty-programm-wegen-ki-generierten-falschmeldungen/</loc>
		<lastmod>2026-03-02T16:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-data-breaches-of-february-2026/</loc>
		<lastmod>2026-03-02T16:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dust-specter-apt-targets-government-officials-in-iraq/</loc>
		<lastmod>2026-03-02T16:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-tvs-stop-spying-on-viewers-in-texas-heres-how-to-disable-acr-anywhere/</loc>
		<lastmod>2026-03-02T16:51:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-fake-filezilla-site-hosts-a-malicious-download/</loc>
		<lastmod>2026-03-02T16:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scalable-security-for-small-and-large-enterprises/</loc>
		<lastmod>2026-03-02T16:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/</loc>
		<lastmod>2026-03-02T16:55:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dringlichkeit-ist-wichtigstes-warnsignal-beim-erkennen-betrugerischer-e-mails/</loc>
		<lastmod>2026-03-02T16:55:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-india-linked-espionage-campaign-targeted-pakistan-bangladesh-sri-lanka/</loc>
		<lastmod>2026-03-02T16:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt28-exploited-mshtml-zero-day-cve-2026-21513-before-patch/</loc>
		<lastmod>2026-03-02T16:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ipfire-ships-its-200th-core-update-with-a-new-domain-blocklist-and-kernel-upgrade/</loc>
		<lastmod>2026-03-02T16:59:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-ai-in-whatsapp-organizes-chats-and-reopens-privacy-issues/</loc>
		<lastmod>2026-03-02T16:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-hit-by-widespread-service-outage-updated/</loc>
		<lastmod>2026-03-02T17:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/war-in-iran-spiked-oil-prices-trump-will-decide-how-high-they-go/</loc>
		<lastmod>2026-03-02T17:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/</loc>
		<lastmod>2026-03-02T17:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-unveils-plan-for-quantum-safe-https-certificates/</loc>
		<lastmod>2026-03-02T17:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expect-iran-to-launch-cyber-attacks-globally-warns-google-head-of-threat-intel/</loc>
		<lastmod>2026-03-02T17:04:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youre-optimizing-for-the-wrong-ai-engine-and-its-costing-you-enterprise-deals/</loc>
		<lastmod>2026-03-02T17:49:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-shaft-secure-handy-accurate-and-fast-transformer-inference/</loc>
		<lastmod>2026-03-02T17:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-mississippi-medical-center-reopens-clinics-after-ransomware-attack/</loc>
		<lastmod>2026-03-02T17:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-raise-threat-level-against-us-allies/</loc>
		<lastmod>2026-03-02T17:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2nd-march-threat-intelligence-report/</loc>
		<lastmod>2026-03-02T17:54:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-umsetzung-von-ki-agenten-in-deutschen-unternehmen-ist-viel-geringer-als-der-hype-vermuten-lasst/</loc>
		<lastmod>2026-03-02T17:55:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-and-internet-outages-hit-iran-amid-us-air-strikes/</loc>
		<lastmod>2026-03-02T17:55:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ignition-technology-sets-sights-on-increasing-business/</loc>
		<lastmod>2026-03-02T17:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemini-panel/</loc>
		<lastmod>2026-03-02T17:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-develops-merkle-tree-certificates-to-enable-quantum-resistant-https-in-chrome/</loc>
		<lastmod>2026-03-02T17:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omnichannel-identity-architecture-for-retail-enterprises/</loc>
		<lastmod>2026-03-02T18:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/upcoming-opportunities-in-space-investment-what-to-know-about-spacex/</loc>
		<lastmod>2026-03-02T18:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/florida-woman-imprisoned-for-massive-microsoft-license-fraud-scheme/</loc>
		<lastmod>2026-03-02T18:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/andres-andreu-named-a-finalist-for-the-2026-sc-awards-resilient-ciso-award/</loc>
		<lastmod>2026-03-02T19:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-is-ac-dc-the-agent-centric-development-cycle/</loc>
		<lastmod>2026-03-02T19:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-hawaiei-cancer-center-confirms-data-leak-following-ransomware-attack/</loc>
		<lastmod>2026-03-02T19:51:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-businesses-told-to-brace-cyber-defenses-amid-iran-conflict-risk/</loc>
		<lastmod>2026-03-02T19:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dark-side-of-luxury-brands-fraud-and-laundering/</loc>
		<lastmod>2026-03-02T19:54:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacks-on-gps-spike-amid-us-and-israeli-war-on-iran/</loc>
		<lastmod>2026-03-02T19:54:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alabama-man-pleads-guilty-to-hacking-extorting-hundreds-of-women/</loc>
		<lastmod>2026-03-02T19:56:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm_mode-the-rise-of-adaptive-supply-chain-worms/</loc>
		<lastmod>2026-03-02T20:49:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm_mode-the-rise-of-adaptive-supply-chain-worms-2/</loc>
		<lastmod>2026-03-02T20:50:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-siniel-distributed-privacy-preserving-zksnark/</loc>
		<lastmod>2026-03-02T20:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-siniel-distributed-privacy-preserving-zksnark-2/</loc>
		<lastmod>2026-03-02T20:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latest-openclaw-flaw-can-let-malicious-websites-hijack-local-ai-agents/</loc>
		<lastmod>2026-03-02T20:54:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-trusted-authentication-enables-privilege-escalation/</loc>
		<lastmod>2026-03-02T20:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-developers-through-npm-packages/</loc>
		<lastmod>2026-03-02T20:55:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/travel-tinted-glasses/</loc>
		<lastmod>2026-03-02T20:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-monitoring-service-secures-public-sector-websites-faster/</loc>
		<lastmod>2026-03-02T20:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-iranian-app-badesaba-was-hacked-to-send-help-is-on-the-way-alerts/</loc>
		<lastmod>2026-03-02T20:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-cyber-proxies-active-but-not-nation-state-hackers/</loc>
		<lastmod>2026-03-02T20:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/</loc>
		<lastmod>2026-03-02T21:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-command-disrupted-iranian-comms-sensors-top-general-says/</loc>
		<lastmod>2026-03-02T21:49:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-fbis-cyber-chief-is-using-winter-shield-to-accelerate-china-prep-threat-intelligence-sharing/</loc>
		<lastmod>2026-03-02T21:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-cyberwar-has-begun/</loc>
		<lastmod>2026-03-02T21:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantums-uncertain-arrival-leaves-cios-with-a-strategic-choice/</loc>
		<lastmod>2026-03-02T21:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-conflict-elevates-cyber-risk-for-healthcare/</loc>
		<lastmod>2026-03-02T21:54:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-nuance-it-worker-pleads-guilty-in-geisinger-health-case/</loc>
		<lastmod>2026-03-02T21:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-no-increase-in-cyber-threat-from-iran-but-be-prepared/</loc>
		<lastmod>2026-03-02T21:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-ddos-attacks-surge-75-in-2025-link11-says-attacks-now-sustained-not-sporadic/</loc>
		<lastmod>2026-03-02T22:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cyber-attackers-benefit-more-from-ai-technology-than-defenders/</loc>
		<lastmod>2026-03-02T22:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadas-data-sovereignty-question-answered-with-dedicated-data-center/</loc>
		<lastmod>2026-03-02T22:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-addresses-actively-exploited-qualcomm-zero-day-in-fresh-batch-of-129-android-vulnerabilities/</loc>
		<lastmod>2026-03-02T22:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-pages-for-zoom-and-google-meet-install-monitoring-tool/</loc>
		<lastmod>2026-03-02T22:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/middle-east-crisis-prompts-uk-ncsc-warning-on-potential-iranian-cyber-activity/</loc>
		<lastmod>2026-03-02T22:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zurich-to-acquire-beazley-in-11b-european-insurance-deal/</loc>
		<lastmod>2026-03-02T22:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-alleged-members-of-the-com-arrested-in-project-compass/</loc>
		<lastmod>2026-03-02T22:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-are-non-human-identities-from-cyber-threats/</loc>
		<lastmod>2026-03-02T23:48:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-certain-can-you-be-of-your-ai-driven-security/</loc>
		<lastmod>2026-03-02T23:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-an-ai-system-capable-of-self-protection/</loc>
		<lastmod>2026-03-02T23:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-contribute-to-cybersecurity-stability/</loc>
		<lastmod>2026-03-02T23:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-definitive-guide-to-migrating-from-cortex-xsoar-to-the-autonomous-soc/</loc>
		<lastmod>2026-03-02T23:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legit-security-named-2026-ai-code-innovator-in-appsec-leader-in-appsec-management/</loc>
		<lastmod>2026-03-02T23:54:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-the-wild-real-world-use-cases-you-should-know/</loc>
		<lastmod>2026-03-02T23:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-servers-and-the-return-of-the-service-account-problem-2/</loc>
		<lastmod>2026-03-02T23:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-servers-and-the-return-of-the-service-account-problem/</loc>
		<lastmod>2026-03-02T23:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-new-app-alerts-you-if-someone-nearby-is-wearing-smart-glasses/</loc>
		<lastmod>2026-03-02T23:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-openclaw-vulnerability-exposes-ai-agent-risks/</loc>
		<lastmod>2026-03-02T23:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/illegale-inhalte-verbraucherzentrale-moniert-verstose-beim-melden-gemas-dsa/</loc>
		<lastmod>2026-03-03T00:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-staat-2026-in-berlin-datenschutzbehorden-auf-dem-kongress-mit-gemeinschaftsstand-vertreten/</loc>
		<lastmod>2026-03-03T00:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/</loc>
		<lastmod>2026-03-03T00:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hardware-security-module-integration-for-post-quantum-key-encapsulation/</loc>
		<lastmod>2026-03-03T04:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-battlefield-ariomex-iran-based-crypto-exchange-suffers-data-leak/</loc>
		<lastmod>2026-03-03T04:51:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/talos-on-the-developing-situation-in-the-middle-east/</loc>
		<lastmod>2026-03-03T04:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phish-of-the-day-microsoft-oauth-scams-abuse-redirects-for-malware-delivery/</loc>
		<lastmod>2026-03-03T04:53:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phish-of-the-day-microsoft-oauth-scams-abuse-redirects-for-malware-delivery-2/</loc>
		<lastmod>2026-03-03T04:53:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tugwar-over-firewall-backlogs-in-the-ai-driven-development-era/</loc>
		<lastmod>2026-03-03T04:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aurastealer-infostealer-targeting-users-with-48-c2-domains-in-ongoing-campaigns/</loc>
		<lastmod>2026-03-03T05:49:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-gemini-vulnerability-lets-attackers-access-victims-camera-and-microphone-remotely/</loc>
		<lastmod>2026-03-03T05:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gamers-furious-as-brit-studio-cloud-imperium-quietly-admits-to-data-breach/</loc>
		<lastmod>2026-03-03T06:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-organizations-are-accepting-cyber-risk-to-cut-costs/</loc>
		<lastmod>2026-03-03T06:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-years-of-shifting-cybersecurity-behavior/</loc>
		<lastmod>2026-03-03T06:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angular-i18n-flaw-lets-hackers-execute-malicious-code-via-critical-xss-vulnerability/</loc>
		<lastmod>2026-03-03T06:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattackers-exploit-openvsx-aqua-trivy-with-malicious-ai-prompts-to-hijack-coding-tools/</loc>
		<lastmod>2026-03-03T06:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-security-update-fixes-129-flaws-and-tackles-actively-exploited-zero-day-flaw/</loc>
		<lastmod>2026-03-03T06:54:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recoverpoint-for-virtual-machines-chinesische-hacker-missbrauchen-dell-sicherheitslucke-seit-2024/</loc>
		<lastmod>2026-03-03T06:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-chain-your-ai-system-is-already-missing/</loc>
		<lastmod>2026-03-03T07:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-went-from-assistant-to-autonomous-actor-and-security-never-caught-up/</loc>
		<lastmod>2026-03-03T07:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-introduces-merkle-tree-certificates-to-protect-https-from-quantum-attacks/</loc>
		<lastmod>2026-03-03T07:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerbot-claw-bot-exploits-github-actions-ci-cd-flaw-to-attack-microsoft-and-datadog/</loc>
		<lastmod>2026-03-03T07:51:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-wirkungsvolle-schritte-nis2-scheitert-nicht-an-technik-sondern-an-umsetzung/</loc>
		<lastmod>2026-03-03T07:52:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-wirkungsvolle-schritte-nis2-scheitert-nicht-an-technik-sondern-an-umsetzung-2/</loc>
		<lastmod>2026-03-03T07:52:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-every-enterprise-needs-a-strong-api-security-strategy/</loc>
		<lastmod>2026-03-03T08:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-epic-fury-potential-iranian-cyber-counteroffensive-operations/</loc>
		<lastmod>2026-03-03T08:50:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-gets-patches-for-qualcomm-zero-day-exploited-in-attacks/</loc>
		<lastmod>2026-03-03T08:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-factors-impacting-the-cyber-skills-gap/</loc>
		<lastmod>2026-03-03T08:52:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-escalation-multi-vector-attacks-surge-following-operation-epic-fury/</loc>
		<lastmod>2026-03-03T08:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-agent-vulnerability-exposes-ai-agents-to-remote-hijacking-granting-full-system-control/</loc>
		<lastmod>2026-03-03T08:54:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sloppylemming-targets-pakistan-and-bangladesh-governments-using-dual-malware-chains/</loc>
		<lastmod>2026-03-03T08:55:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irankrieg-drohnenangriffe-legen-mehrere-aws-rechenzentren-lahm/</loc>
		<lastmod>2026-03-03T08:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzentwurf-zu-hackbacks-eco-warnt-vor-gesetzen-wie-in-russland-und-der-turkei/</loc>
		<lastmod>2026-03-03T08:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-confirms-cve-2026-21385-in-qualcomm-android-component-exploited/</loc>
		<lastmod>2026-03-03T08:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-campaign-spreads-amos-malext-macos-infostealer-via-fake-text-sharing-ads/</loc>
		<lastmod>2026-03-03T08:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/totung-des-anfuhrers-wie-israel-chamenei-jahrelang-verfolgt-hat/</loc>
		<lastmod>2026-03-03T09:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-security-reality-when-ai-accelerates-both-attack-and-defense/</loc>
		<lastmod>2026-03-03T09:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-anwendungsfalle-mit-microsoft-copilot-microsoft-ai-tour-souveranitat-as-a-service-und-use-cases/</loc>
		<lastmod>2026-03-03T09:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avalara-ubernimmt-versori-ki-native-integrationen/</loc>
		<lastmod>2026-03-03T09:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bayern-mehrere-zulassungsstellen-durch-it-panne-lahmgelegt/</loc>
		<lastmod>2026-03-03T09:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irankrieg-mehrere-aws-rechenzentren-durch-drohnen-beschadigt/</loc>
		<lastmod>2026-03-03T09:54:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-phishing-methode-uber-arpa/</loc>
		<lastmod>2026-03-03T10:48:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-hacker-legen-betrieb-bei-vielen-unternehmen-lahm/</loc>
		<lastmod>2026-03-03T10:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/epic-fury-introduces-new-layer-of-enterprise-risk/</loc>
		<lastmod>2026-03-03T10:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-routers-in-singapore-must-meet-higher-security-standards-by-2027/</loc>
		<lastmod>2026-03-03T10:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-security-flaw-enabled-spying-via-gemini-live-assistant/</loc>
		<lastmod>2026-03-03T10:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/androids-march-2026-security-patch-fixes-over-100-flaws-one-under-targeted-exploitation/</loc>
		<lastmod>2026-03-03T10:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-journalists-are-reporting-from-iran-with-no-internet/</loc>
		<lastmod>2026-03-03T10:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uh-cancer-center-data-breach-affects-nearly-1-2-million-people/</loc>
		<lastmod>2026-03-03T10:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/epic-fury-cyber-shock-irans-internet-down-hacktivists-hit-back/</loc>
		<lastmod>2026-03-03T10:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/212066-2/</loc>
		<lastmod>2026-03-03T10:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnsignal-bei-phishing-knowbe4-studie-zeigt-dringlichkeit-schlagt-rechtschreibfehler/</loc>
		<lastmod>2026-03-03T10:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrliche-sicherheitslucke-angriffe-auf-android-nutzer-beobachtet/</loc>
		<lastmod>2026-03-03T10:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-checkliste-fur-spam-anrufe-diese-nummern-sind-abzocke/</loc>
		<lastmod>2026-03-03T11:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-swipe-15-8m-medical-records-from-french-doctors-ministry/</loc>
		<lastmod>2026-03-03T11:50:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-devices-hit-by-exploited-qualcomm-flaw-cve-2026-21385/</loc>
		<lastmod>2026-03-03T11:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-poaches-users-from-rival-chatbots-with-easier-migration/</loc>
		<lastmod>2026-03-03T11:52:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/star-citizen-game-dev-discloses-breach-affecting-user-data/</loc>
		<lastmod>2026-03-03T11:54:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-stegabin-campaign-deploys-multi-stage-credential-stealer-via-26-malicious-npm-packages/</loc>
		<lastmod>2026-03-03T11:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortigate-devices-targeted-by-cyberstrikeai-allowing-hackers-to-bypass-security/</loc>
		<lastmod>2026-03-03T11:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-telegram-for-initial-access-to-corporate-vpn-rdp-and-cloud-systems/</loc>
		<lastmod>2026-03-03T11:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets/</loc>
		<lastmod>2026-03-03T11:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huge-shadow-layer-of-organizations-hit-by-supply-chain-attacks/</loc>
		<lastmod>2026-03-03T11:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-cyber-threat-actor-targets-iraqi-government-officials-in-ai-powered-campaign/</loc>
		<lastmod>2026-03-03T11:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-auf-speed-ist-die-grose-herausforderung-fur-cisos/</loc>
		<lastmod>2026-03-03T12:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-ai-risk-guidelines-and-capital-resilience-kovrr/</loc>
		<lastmod>2026-03-03T12:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-gemini-panel-became-privilege-escalator-for-rogue-extensions/</loc>
		<lastmod>2026-03-03T12:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lenovo-shows-off-snap-together-laptop-with-removable-keyboard-screen-and-ports/</loc>
		<lastmod>2026-03-03T12:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-defender-deployment-tool-streamlines-windows-device-onboarding-with-single-executable/</loc>
		<lastmod>2026-03-03T12:53:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-drone-strikes-damaged-aws-data-centers-in-middle-east/</loc>
		<lastmod>2026-03-03T12:54:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerobot-malware-exploits-tenda-command-injection-vulnerabilities-to-deploy-malicious-payloads/</loc>
		<lastmod>2026-03-03T12:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-autopass-vulnerability-allows-remote-attackers-to-bypass-authentication/</loc>
		<lastmod>2026-03-03T12:55:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/</loc>
		<lastmod>2026-03-03T12:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starkiller-phishing-suite-uses-aitm-reverse-proxy-to-bypass-multi-factor-authentication/</loc>
		<lastmod>2026-03-03T12:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-kommerzialisieren-ki-gestutzte-angriffe-ki-crimeware-als-service-fur-wenige-dollar-pro-monat/</loc>
		<lastmod>2026-03-03T12:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-kommerzialisieren-ki-gestutzte-angriffe-ki-crimeware-als-service-fur-wenige-dollar-pro-monat-2/</loc>
		<lastmod>2026-03-03T12:59:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grosstorung-bei-regio-it-stromausfall-legt-kommunalen-it-dienstleister-lahm/</loc>
		<lastmod>2026-03-03T12:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kyc-wasnt-built-for-this-lessons-from-the-opcopro-scam/</loc>
		<lastmod>2026-03-03T13:49:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkliste-fur-spam-anrufe-diese-nummern-sind-abzocke/</loc>
		<lastmod>2026-03-03T13:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/</loc>
		<lastmod>2026-03-03T13:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-auf-speed-ist-die-grose-herausforderung-fur-cisos-2/</loc>
		<lastmod>2026-03-03T13:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-phishers-make-check-where-the-link-points-advice-ineffective/</loc>
		<lastmod>2026-03-03T13:54:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysob-kickoff-im-fokus-cra-nis2-und-digitale-souveranitat/</loc>
		<lastmod>2026-03-03T13:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-compass-targets-764-network-as-30-arrested-and-victims-rescued/</loc>
		<lastmod>2026-03-03T13:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-data-centers-hit-drone-strikes-cripple-cloud/</loc>
		<lastmod>2026-03-03T13:57:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-starkiller-phishing-framework-uses-real-login-pages-to-bypass-mfa-security/</loc>
		<lastmod>2026-03-03T13:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-exploits-oauth-redirection-to-bypass-defenses/</loc>
		<lastmod>2026-03-03T13:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-actor-d-shortiez-exploits-webkit-back-button-hijack-in-forced-redirect-campaign/</loc>
		<lastmod>2026-03-03T13:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shannon-autonomous-ai-tool-with-nmap-integration-can-uncover-and-exploit-security-flaws/</loc>
		<lastmod>2026-03-03T14:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shannon-autonomous-ai-tool-with-nmap-integration-can-uncover-and-exploit-security-flaws-2/</loc>
		<lastmod>2026-03-03T14:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shannon-autonomous-ai-tool-with-nmap-integration-can-uncover-and-exploit-security-flaws-3/</loc>
		<lastmod>2026-03-03T14:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-overload-how-to-solve-the-workload-identity-crisis/</loc>
		<lastmod>2026-03-03T14:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-research-im-gesprach-mehr-awareness-durch-security-posture-management/</loc>
		<lastmod>2026-03-03T14:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-war-continues-pro-iranian-actors-launch-barrage-of-cyberattacks/</loc>
		<lastmod>2026-03-03T14:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-launches-enhanced-partner-program-built-for-depth/</loc>
		<lastmod>2026-03-03T14:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fingerprinting-is-broken-heres-how-we-fixed-it/</loc>
		<lastmod>2026-03-03T14:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-2-million-bank-accounts-exposed-in-financial-systems-breach/</loc>
		<lastmod>2026-03-03T14:52:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-flaw-let-extensions-hijack-geminis-camera-mic-and-file-access/</loc>
		<lastmod>2026-03-03T14:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/on-moltbook/</loc>
		<lastmod>2026-03-03T14:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/addressing-the-god-key-challenge-in-agentic-ai-for-mcp-servers-effective-solutions-explained/</loc>
		<lastmod>2026-03-03T14:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unite-ai-is-the-k-12-digital-environment-creating-the-next-generation-of-hackers/</loc>
		<lastmod>2026-03-03T14:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-is-now-less-about-malware-and-more-about-impersonation/</loc>
		<lastmod>2026-03-03T14:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jetzt-staats-ciso-werden-fur-unter-160-000-euro/</loc>
		<lastmod>2026-03-03T14:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-drone-strikes-hit-amazon-data-centers-in-gulf-disrupting-cloud-services/</loc>
		<lastmod>2026-03-03T14:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-angriffe-diesel-vortex-nimmt-us-und-eu-transport-und-logistikunternehmen-ins-visier/</loc>
		<lastmod>2026-03-03T15:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberspionage-kampagne-zielt-auf-staatliche-einrichtungen-und-kritische-infrastruktur/</loc>
		<lastmod>2026-03-03T15:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internationaler-weltfrauentag-cybercrime-kennt-kein-geschlecht-aber-oft-ein-ziel/</loc>
		<lastmod>2026-03-03T15:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rehau-gruppe-schutzt-uber-2-500-workloads-mit-veeam/</loc>
		<lastmod>2026-03-03T15:04:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/until-last-month-attackers-couldve-stolen-info-from-perplexity-comet-users-just-by-sending-a-calendar-invite/</loc>
		<lastmod>2026-03-03T15:05:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/until-last-month-attackers-couldve-stolen-info-from-perplexity-comet-users-just-by-sending-a-calendar-invite-2/</loc>
		<lastmod>2026-03-03T15:05:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-arpa-top-level-domain-to-host-phishing-scams/</loc>
		<lastmod>2026-03-03T15:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/archipelo-and-checkmarx-announce-partnership-connecting-appsec-detection-with-devspm/</loc>
		<lastmod>2026-03-03T15:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-building-security-in-at-the-beginning/</loc>
		<lastmod>2026-03-03T15:08:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-expands-ai-scam-protection-to-samsung-galaxy-s26/</loc>
		<lastmod>2026-03-03T15:08:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sloppylemming-espionage-campaign-targets-pakistan-bangladesh-with-burrowshell-backdoor-and-rust-rat/</loc>
		<lastmod>2026-03-03T15:09:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-data-diode-secures-sensitive-data-on-edge-devices-critical-systems/</loc>
		<lastmod>2026-03-03T15:10:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-of-us-cisos-work-the-equivalent-of-a-six-day-week-2/</loc>
		<lastmod>2026-03-03T15:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-of-us-cisos-work-the-equivalent-of-a-six-day-week/</loc>
		<lastmod>2026-03-03T15:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zenity-details-perplexity-ai-browser-vulnerability/</loc>
		<lastmod>2026-03-03T15:48:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-allies-form-6g-security-coalition-amid-tech-rivalry-with-china/</loc>
		<lastmod>2026-03-03T15:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/florida-woman-gets-2-year-sentence-for-trafficking-microsoft-software-labels/</loc>
		<lastmod>2026-03-03T15:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fig-security-emerges-from-stealth-with-38m-to-help-security-teams-deal-with-change/</loc>
		<lastmod>2026-03-03T15:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-kinetic-warfare-escalates-as-iran-us-and-israel-clash-across-military-and-digital-fronts/</loc>
		<lastmod>2026-03-03T15:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verhinderung-von-massenuberwachung-openai-will-vertrag-mit-pentagon-geandert-haben/</loc>
		<lastmod>2026-03-03T15:54:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turns-out-most-cybercriminals-are-old-enough-to-know-better/</loc>
		<lastmod>2026-03-03T15:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/100-radio-equipment-can-track-cars-through-their-tire-sensors/</loc>
		<lastmod>2026-03-03T15:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-site-management-panels-are-a-hot-item-in-cybercrime-markets/</loc>
		<lastmod>2026-03-03T15:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-high-impact-tier-1-the-3-steps-cisos-must-follow/</loc>
		<lastmod>2026-03-03T15:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaked-database-sheds-light-on-iranian-crypto-sanctions-evasion/</loc>
		<lastmod>2026-03-03T15:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-cyberstrikeai-deployed-in-ai-driven-fortigate-attacks-across-55-countries/</loc>
		<lastmod>2026-03-03T15:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-knowbe4-angreifer-missbrauchen-rmm-tools-als-backdoor/</loc>
		<lastmod>2026-03-03T16:01:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neu-gekauft-schon-infiziert-diese-android-tablets-kommen-ab-werk-mit-malware/</loc>
		<lastmod>2026-03-03T16:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwort-vom-chatbot-warum-das-keine-gute-idee-ist/</loc>
		<lastmod>2026-03-03T16:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sudkoreanische-steuerbehorde-verliert-krypto-millionen-weil-sie-das-passwort-verraten-hat/</loc>
		<lastmod>2026-03-03T16:04:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dji-staubsaugerroboter-gehackt-tuftler-erlangt-zugriff-auf-tausende-gerate-und-live-kameras/</loc>
		<lastmod>2026-03-03T16:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-evolution-of-oss-index-in-the-age-of-ai/</loc>
		<lastmod>2026-03-03T16:49:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-developers-means-protecting-their-secrets/</loc>
		<lastmod>2026-03-03T16:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tonic-structural-vs-informatica-which-is-better-for-test-data-management/</loc>
		<lastmod>2026-03-03T16:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finally-ctem-and-mitre-inform-without-the-jargon/</loc>
		<lastmod>2026-03-03T16:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/they-seized-4-8m-in-crypto-then-gave-the-master-key-to-the-internet/</loc>
		<lastmod>2026-03-03T16:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-dragon-targets-organizations-in-southeast-asia-and-europe/</loc>
		<lastmod>2026-03-03T16:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-dragon-targets-organizations-in-southeast-asia-and-europe-2/</loc>
		<lastmod>2026-03-03T16:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponize-oauth-redirection-logic-to-deliver-malware/</loc>
		<lastmod>2026-03-03T16:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponize-oauth-redirection-logic-to-deliver-malware-2/</loc>
		<lastmod>2026-03-03T16:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-tracked-230-billion-daily-threats-and-here-is-what-it-found/</loc>
		<lastmod>2026-03-03T16:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-exposure-assessment-platforms-eaps-to-watch-in-2026/</loc>
		<lastmod>2026-03-03T16:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/talion-expands-governance-aligned-agentic-soc-as-board-cyber-scrutiny-intensifies/</loc>
		<lastmod>2026-03-03T16:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surviving-ransomware-best-practices-to-safeguard-your-business/</loc>
		<lastmod>2026-03-03T16:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/</loc>
		<lastmod>2026-03-03T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/israel-redalert-spyware-campaign-exploits-wartime-panic-with-trojanized-app/</loc>
		<lastmod>2026-03-03T17:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-deepfakes-supercharge-sophisticated-cyber-attacks-says-cloudflare/</loc>
		<lastmod>2026-03-03T17:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-foothold-25-million-victims-the-risk-inside-modern-breaches/</loc>
		<lastmod>2026-03-03T17:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-be-careful-of-what-you-embed-demystifying-ole-vulnerabilities/</loc>
		<lastmod>2026-03-03T17:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-implementation-roadmap-5-stages-from-legacy-to-modern-security/</loc>
		<lastmod>2026-03-03T17:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-emerges-as-the-new-insider-threat-thales-releases-the-2026-data-threat-report/</loc>
		<lastmod>2026-03-03T17:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russia-actors-team-with-iran-linked-hackers-in-attacks/</loc>
		<lastmod>2026-03-03T17:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-ebs-2025-campaign-impacts-madison-square-garden-sensitive-data-leaked/</loc>
		<lastmod>2026-03-03T17:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacktivists-claim-dhs-breach-leak-6600-ice-contractor-records/</loc>
		<lastmod>2026-03-03T17:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/archipelo-and-checkmarx-announce-partnership-connecting-appsec-detection-with-devspm-2/</loc>
		<lastmod>2026-03-03T17:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-urges-supreme-court-to-strike-down-geofence-warrants-as-unconstitutional/</loc>
		<lastmod>2026-03-03T18:49:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/</loc>
		<lastmod>2026-03-03T18:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberwarriors-elevated-to-big-leagues-in-us-war-with-iran/</loc>
		<lastmod>2026-03-03T18:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-says-drone-strikes-disrupted-middle-east-data-centers/</loc>
		<lastmod>2026-03-03T18:52:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-warns-of-heightened-iranian-cyber-risk-as-middle-east-conflict-intensifies/</loc>
		<lastmod>2026-03-03T18:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5m-microsoft-activation-key-fraud-ends-in-prison-term/</loc>
		<lastmod>2026-03-03T18:54:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-blind-spots-fuel-modern-attacks/</loc>
		<lastmod>2026-03-03T18:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-shifts-to-two-week-release-cycle-for-increased-stability/</loc>
		<lastmod>2026-03-03T18:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/</loc>
		<lastmod>2026-03-03T18:58:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-threat-report-2026-ransomware-beginnt-mit-dem-login/</loc>
		<lastmod>2026-03-03T18:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emproof-beruft-marc-schieder-zum-ceo-und-schliest-finanzierungsrunde-ab/</loc>
		<lastmod>2026-03-03T18:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaparlament-innenausschuss-stimmt-gegen-freiwillige-chatkontrolle/</loc>
		<lastmod>2026-03-03T19:00:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fairwinds-insights-release-notes-kyverno-integration-gpu-metrics/</loc>
		<lastmod>2026-03-03T19:48:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-ditches-anthropic-ai-over-security-risk/</loc>
		<lastmod>2026-03-03T19:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-fines-national-high-school-ticketing-platform-1-1-million-for-privacy-violations/</loc>
		<lastmod>2026-03-03T19:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-says-hackers-accessed-legacy-data-in-contained-breach/</loc>
		<lastmod>2026-03-03T19:52:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-and-google-meet-pages-trick-users-into-installing-monitoring-tool/</loc>
		<lastmod>2026-03-03T19:52:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-spy-grade-ios-exploit-kit-powering-financial-crime/</loc>
		<lastmod>2026-03-03T19:53:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-possible-us-government-iphone-hacking-toolkit-is-now-in-the-hands-of-foreign-spies-and-criminals/</loc>
		<lastmod>2026-03-03T19:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-hijacked-to-deliver-malware-steal-crypto-wallets/</loc>
		<lastmod>2026-03-03T19:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-six-day-security-week-ai-adoption-ignites-leadership-crisis/</loc>
		<lastmod>2026-03-03T20:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-vs-ai-identity-why-ai-agents-are-breaking-identity/</loc>
		<lastmod>2026-03-03T20:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-partners-with-grapheneos-for-future-phones/</loc>
		<lastmod>2026-03-03T20:53:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ariomex-iran-based-crypto-exchange-suffers-data-leak/</loc>
		<lastmod>2026-03-03T20:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-leadership-identity-access-complexity/</loc>
		<lastmod>2026-03-03T20:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alabama-sextortion-case-involved-hundreds-of-victims/</loc>
		<lastmod>2026-03-03T20:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/motorola-plans-grapheneos-compatible-devices-as-early-as-2027/</loc>
		<lastmod>2026-03-03T20:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speakeasies-to-shadow-ai-banning-ai-browsers-will-fail/</loc>
		<lastmod>2026-03-03T20:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonarqube-agentic-analysis-verify-ai-code-as-it-is-generated/</loc>
		<lastmod>2026-03-03T21:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-discover-suite-of-agentic-ai-browser-vulnerabilities/</loc>
		<lastmod>2026-03-03T21:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-cio-robert-costello-exits-agency/</loc>
		<lastmod>2026-03-03T21:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chat-at-your-own-risk-data-brokers-are-selling-deeply-personal-bot-transcripts/</loc>
		<lastmod>2026-03-03T21:52:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-oauth-error-flows-to-spread-malware/</loc>
		<lastmod>2026-03-03T21:54:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vehicle-tire-pressure-sensors-enable-silent-tracking/</loc>
		<lastmod>2026-03-03T21:55:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualcomm-zero-day-exploited-in-targeted-android-attacks/</loc>
		<lastmod>2026-03-03T21:55:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-a-comparative-evaluation-of-large-language-models-in-vulnerability-detection/</loc>
		<lastmod>2026-03-03T22:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-accounts-unavailable-in-worldwide-outage/</loc>
		<lastmod>2026-03-04T00:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-effective-ai-security-make-it-teams-feel-relieved/</loc>
		<lastmod>2026-03-03T23:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-independent-can-your-ai-operate-securely/</loc>
		<lastmod>2026-03-03T23:50:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-advanced-ai-security-solutions-help-you-feel-more-relaxed/</loc>
		<lastmod>2026-03-03T23:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-ai-security-getting-better-over-the-years/</loc>
		<lastmod>2026-03-03T23:52:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-sovereignty-what-infrastructure-leaders-must-know/</loc>
		<lastmod>2026-03-03T23:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/possible-u-s-developed-exploits-linked-to-first-known-mass-ios-attack/</loc>
		<lastmod>2026-03-03T23:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-suite-of-government-hacking-tools-targeting-iphones-is-now-being-used-by-cybercriminals/</loc>
		<lastmod>2026-03-03T23:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dev-stunned-by-82k-gemini-bill-after-unknown-api-key-thief-goes-to-town/</loc>
		<lastmod>2026-03-03T23:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/juniper-ptx-routers-at-risk-critical-takeover-flaw-disclosed/</loc>
		<lastmod>2026-03-03T23:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-jetstream-secures-34m-seed-round-for-ai-governance/</loc>
		<lastmod>2026-03-03T23:59:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/groups-push-back-on-hhs-proposed-health-it-rollbacks/</loc>
		<lastmod>2026-03-03T23:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paint-maker-giant-akzonobel-confirms-cyberattack-on-u-s-site/</loc>
		<lastmod>2026-03-04T00:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-investigates-breach-customer-data-access/</loc>
		<lastmod>2026-03-04T00:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-burrowshell-threat-inside-sloppy-lemmings-stealthy-cyber-espionage-campaign-in-south-asia/</loc>
		<lastmod>2026-03-04T00:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-fur-dummies-neuauflage-soll-generative-kunstliche-intelligenz-verstandlich-erklaren/</loc>
		<lastmod>2026-03-04T00:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vier-saulen-der-cyber-resilienz/</loc>
		<lastmod>2026-03-04T00:53:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/facebook-is-experiencing-a-global-outage/</loc>
		<lastmod>2026-03-04T00:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/</loc>
		<lastmod>2026-03-04T00:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-reading-confidential-this-threat-hunter-helped-cops-bust-up-an-african-cybercrime-syndicate/</loc>
		<lastmod>2026-03-04T00:55:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-docusign-email-that-wasnt-a-three-redirect-credential-harvest/</loc>
		<lastmod>2026-03-04T04:48:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-docusign-email-that-wasnt-a-three-redirect-credential-harvest-2/</loc>
		<lastmod>2026-03-04T04:48:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-for-distributed-ai-inference-architectures/</loc>
		<lastmod>2026-03-04T04:49:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/n8n-shared-credentials-and-account-takeover/</loc>
		<lastmod>2026-03-04T04:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-uk-organisations-to-prepare-for-potential-iran-linked-cyber-activity/</loc>
		<lastmod>2026-03-04T04:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-uk-organisations-to-prepare-for-potential-iran-linked-cyber-activity/</loc>
		<lastmod>2026-03-04T04:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-uk-organisations-to-prepare-for-potential-iran-linked-cyber-activity-2/</loc>
		<lastmod>2026-03-04T04:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-attack-kits-go-open-source-and-cyberstrikeai-may-be-just-the-beginning/</loc>
		<lastmod>2026-03-04T04:54:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-turbo-charging-security-platform-growth-with-falcon-flex-ceo-george-kurtz/</loc>
		<lastmod>2026-03-04T04:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-retaliation-escalates-iranian-hacktivists-target-critical-infrastructure-following-military-strikes/</loc>
		<lastmod>2026-03-04T04:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/</loc>
		<lastmod>2026-03-04T04:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-feels-the-need-for-security-speed-so-will-ship-chrome-updates-every-two-weeks/</loc>
		<lastmod>2026-03-04T04:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-february-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</loc>
		<lastmod>2026-03-04T05:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-krieg-was-von-iranischen-hackern-jetzt-zu-erwarten-ist/</loc>
		<lastmod>2026-03-04T05:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gamers-furious-as-indie-studio-cloud-imperium-quietly-admits-to-data-breach/</loc>
		<lastmod>2026-03-04T05:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-is-now-the-price-of-admission-for-industrial-ai/</loc>
		<lastmod>2026-03-04T05:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-laravel-packages-deploy-php-rat-grant-remote-access-to-attackers/</loc>
		<lastmod>2026-03-04T05:54:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-iphones-compromised-in-massive-hack-via-coruna-exploit-kit-with-23-vulnerabilities/</loc>
		<lastmod>2026-03-04T05:54:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kunstliche-intelligenz-macht-angreifer-schneller-und-transformiert-die-angriffsflache/</loc>
		<lastmod>2026-03-04T06:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mquire-open-source-linux-memory-forensics-tool/</loc>
		<lastmod>2026-03-04T06:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-workforce-identity-is-still-a-vulnerability-and-what-to-do-about-it/</loc>
		<lastmod>2026-03-04T06:51:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-dragon-apt-group-exploits-google-drive-for-covert-attacks-on-europe-asia/</loc>
		<lastmod>2026-03-04T06:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-23h2-to-25h2-upgrade-reportedly-disrupts-internet-connectivity-for-users/</loc>
		<lastmod>2026-03-04T06:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-telefon-lugt-die-ki-am-besten-und-ihr-unternehmen-zahlt-die-rechnung/</loc>
		<lastmod>2026-03-04T06:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-vmware-aria-operations-flaw-cve-2026-22719-to-kev-catalog/</loc>
		<lastmod>2026-03-04T06:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaum-infos-doch-wahrscheinliche-ausnutzung-rechteausweitung-im-windows-admin-center-moglich/</loc>
		<lastmod>2026-03-04T06:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-worm-turns-when-the-hunter-becomes-the-hunted-mass-surveillance-and-the-weaponization-of-the-data-we-voluntarily-create/</loc>
		<lastmod>2026-03-04T07:49:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-know-youre-a-real-deal-cso-and-whether-that-job-opening-truly-seeks-one/</loc>
		<lastmod>2026-03-04T07:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-professionals-are-burning-out-on-extra-hours-every-week/</loc>
		<lastmod>2026-03-04T07:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-alerts-customers-to-new-phishing-attack-exploiting-oauth-in-entra-id-to-bypass-detection/</loc>
		<lastmod>2026-03-04T07:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnisches-resilienz-modell-vereint-staat-wirtschaft-und-gesellschaft-was-deutschland-vom-finnischen-resilienz-konzept-lernen-kann/</loc>
		<lastmod>2026-03-04T07:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-authentication-architecture-for-ecommerce-and-retail-platforms/</loc>
		<lastmod>2026-03-04T08:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-authentication-security-preventing-credential-stuffing-account-takeover-and-bot-attacks/</loc>
		<lastmod>2026-03-04T08:50:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/libreoffice-online-dragged-out-of-the-attic-dusted-off-for-another-go/</loc>
		<lastmod>2026-03-04T08:51:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/immutable-linux-distribution-nitrux-6-0-0-adds-gpu-passthrough-boot-level-recovery-c-update-system/</loc>
		<lastmod>2026-03-04T08:53:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/immutable-linux-distribution-nitrux-6-0-0-adds-gpu-passthrough-boot-level-recovery-c-update-system-2/</loc>
		<lastmod>2026-03-04T08:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-uses-google-cloud-to-host-malicious-redirects-via-gcs-bucket/</loc>
		<lastmod>2026-03-04T08:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-faces-data-breach-after-2-04-gb-of-data-allegedly-stolen/</loc>
		<lastmod>2026-03-04T08:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-identifiziert-cyberspionagekampagne/</loc>
		<lastmod>2026-03-04T08:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-imperium-games-hacker-erbeutet-daten-von-star-citizen-spielern/</loc>
		<lastmod>2026-03-04T08:57:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-vibe-hacking-bis-hin-zu-flat-pack-malware/</loc>
		<lastmod>2026-03-04T09:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-university-of-hawaiei-cancer-center-impacts-1-2-million-individuals/</loc>
		<lastmod>2026-03-04T09:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-speeds-up-chrome-updates-with-new-security-focused-release-cycle/</loc>
		<lastmod>2026-03-04T09:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-speeds-up-chrome-updates-with-new-security-focused-release-cycle-3/</loc>
		<lastmod>2026-03-04T09:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-speeds-up-chrome-updates-with-new-security-focused-release-cycle-2/</loc>
		<lastmod>2026-03-04T09:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ipvanish-vpn-for-macos-flaw-enables-privilege-escalation-and-code-execution/</loc>
		<lastmod>2026-03-04T09:51:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-vmware-aria-operations-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-04T09:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vivatech-confidence-barometer-2026-vertrauen-in-die-ki-aber-wenig-kontrolle-uber-die-eigenen-daten/</loc>
		<lastmod>2026-03-04T09:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-drive-c2/</loc>
		<lastmod>2026-03-04T09:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hp-wolf-security-report-ki-beschleunigt-low-quality-angriffe-durch-modulare-malware-und-automatisierung/</loc>
		<lastmod>2026-03-04T09:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/messenger-sicherheit-tiktok-verzichtet-aus-sicherheitsgrunden-auf-e2ee/</loc>
		<lastmod>2026-03-04T09:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ai-ultimatums-and-ip-theft-the-unspoken-risk/</loc>
		<lastmod>2026-03-04T10:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-increasingly-used-to-sell-access-malware-and-stolen-logs/</loc>
		<lastmod>2026-03-04T10:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-qualcomm-and-broadcom-vmware-aria-operations-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-04T10:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-vulnerability-that-turns-your-ai-agent-against-you/</loc>
		<lastmod>2026-03-04T10:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azcopy-utility-misused-for-data-exfiltration-in-ongoing-ransomware-attacks/</loc>
		<lastmod>2026-03-04T10:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux/</loc>
		<lastmod>2026-03-04T10:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux-2/</loc>
		<lastmod>2026-03-04T10:55:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nachhaltige-innovation-treibt-knowbe4-im-markt-fur-human-risk-management-voran/</loc>
		<lastmod>2026-03-04T10:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bei-entwicklerstudio-hacker-erbeutet-daten-von-star-citizen-spielern/</loc>
		<lastmod>2026-03-04T10:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-kit-coruna-massig-iphone-nutzer-mit-bis-zu-23-ios-exploits-attackiert/</loc>
		<lastmod>2026-03-04T10:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strukturierte-selbsteinschatzung-als-einstieg-in-nis2-checkliste-bringt-struktur-in-die-nis2-umsetzung/</loc>
		<lastmod>2026-03-04T10:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-vs-managed-ai-whats-the-difference-firetail-blog/</loc>
		<lastmod>2026-03-04T11:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-groups-intensify-cyberattacks-on-critical-infrastructure-amid-rising-geopolitical-tensions/</loc>
		<lastmod>2026-03-04T11:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/calls-for-global-digital-estate-standard-as-posthumous-deepfake-fraud-risk-grows/</loc>
		<lastmod>2026-03-04T11:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-pillars-of-hyperproductivity-for-msps/</loc>
		<lastmod>2026-03-04T12:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-auf-speed/</loc>
		<lastmod>2026-03-04T12:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/car-tyre-sensors-can-be-used-to-track-drivers-without-their-knowledge-3/</loc>
		<lastmod>2026-03-04T12:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/car-tyre-sensors-can-be-used-to-track-drivers-without-their-knowledge-2/</loc>
		<lastmod>2026-03-04T12:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/car-tyre-sensors-can-be-used-to-track-drivers-without-their-knowledge/</loc>
		<lastmod>2026-03-04T12:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/</loc>
		<lastmod>2026-03-04T12:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-threat-report-ai-accelerates-high-velocity-cyber-attacks/</loc>
		<lastmod>2026-03-04T12:53:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perplexitys-comet-browser-breached-through-calendar-invite-attack/</loc>
		<lastmod>2026-03-04T12:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-framework-targets-kubernetes-and-ai-workloads-in-new-cyber-attack-wave-2/</loc>
		<lastmod>2026-03-04T12:56:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-malware-framework-targets-kubernetes-and-ai-workloads-in-new-cyber-attack-wave/</loc>
		<lastmod>2026-03-04T12:56:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-rfp-template-for-ai-usage-control-and-ai-governance/</loc>
		<lastmod>2026-03-04T12:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-deep-dive-mit-mondoo-detection-und-remediation-von-supply-chain-angriffen/</loc>
		<lastmod>2026-03-04T12:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/baochip-1x-crowdfunding-von-open-source-mikrocontroller-startet/</loc>
		<lastmod>2026-03-04T12:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-kit-coruna-iphone-nutzer-mit-bis-zu-23-ios-exploits-attackiert/</loc>
		<lastmod>2026-03-04T12:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-when-everyone-becomes-a-data-leak-waiting-to-happen/</loc>
		<lastmod>2026-03-04T13:48:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-defense-magazine-a-new-bell-rings-for-k-12-cloud-security-after-the-illuminate-settlement/</loc>
		<lastmod>2026-03-04T13:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-und-ki-governance-direkt-im-browser/</loc>
		<lastmod>2026-03-04T13:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bootleg-windows-office-scheme-crashes-triggers-22-month-lockup-for-florida-woman/</loc>
		<lastmod>2026-03-04T13:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-in-2026-3-attack-tactics-that-beat-most-enterprise-defenses/</loc>
		<lastmod>2026-03-04T13:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-phishing-to-google-drive-c2-silver-dragon-expands-apt41-playbook/</loc>
		<lastmod>2026-03-04T13:54:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-qualcomm-chipsets-memory-corruption-vulnerability-is-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-04T13:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranlinked-dust-specter-apt-deploys-aiaided-malware-against-iraqi-officials/</loc>
		<lastmod>2026-03-04T13:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/honeywell-controllers-widely-exposed-without-authentication/</loc>
		<lastmod>2026-03-04T13:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-silver-dragon-razes-governments-in-eu-se-asia/</loc>
		<lastmod>2026-03-04T13:57:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-apt-sloppy-lemming-targets-defense-critical-infrastructure/</loc>
		<lastmod>2026-03-04T13:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-linke-fordert-mehr-transparenz-regierung-hat-intern-noch-redebedarf-zu-cyberpakt-mit-israel/</loc>
		<lastmod>2026-03-04T13:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gemini-geleakter-api-key-treibt-entwickler-in-den-ruin/</loc>
		<lastmod>2026-03-04T14:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-datensicherheit-wem-gehoren-die-daten-in-der-cloud/</loc>
		<lastmod>2026-03-04T14:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisible-threats-source-code-exfiltration-in-google-antigravity-firetail-blog/</loc>
		<lastmod>2026-03-04T14:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-oauths-built-in-redirects-to-launch-phishing-and-malware-attacks/</loc>
		<lastmod>2026-03-04T14:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-qualcomm-bug-hits-android-devices-in-targeted-attacks/</loc>
		<lastmod>2026-03-04T14:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-2026-global-threat-report-3-key-learnings-for-identity-security/</loc>
		<lastmod>2026-03-04T14:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-cyberattacks-fail-to-materialize-but-threat-remains-acute/</loc>
		<lastmod>2026-03-04T14:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-cyberspionage-gruppe-silver-dragon-hat-behorden-in-europa-und-asien-im-visier/</loc>
		<lastmod>2026-03-04T14:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-kriegsfuhrung-im-digitalen-zeitalter-warum-systeme-der-kunstlichen-intelligenz-und-lieferketten-zur-strategischen-angriffsflache-werden/</loc>
		<lastmod>2026-03-04T14:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hiscout-und-bearingpoint-starken-gemeinsam-die-resilienz-der-offentlichen-verwaltung/</loc>
		<lastmod>2026-03-04T14:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kaspersky-dismisses-claims-coruna-iphone-exploit-kit-is-connected-to-nsa-linked-operation/</loc>
		<lastmod>2026-03-04T14:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-the-true-state-of-security-2026/</loc>
		<lastmod>2026-03-04T15:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-the-true-state-of-security-2026-2/</loc>
		<lastmod>2026-03-04T15:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-1200-icewarp-servers-still-vulnerable-to-unauthenticated-rce-flaw-cve-2025-14500/</loc>
		<lastmod>2026-03-04T15:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-ios-exploit-kit-uses-23-exploits-across-five-chains-targeting-ios-1317-2-1/</loc>
		<lastmod>2026-03-04T15:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-chatgpt-sein-eigenes-passwort-gehackt-hat-und-was-das-fur-deine-sicherheit-bedeutet/</loc>
		<lastmod>2026-03-04T15:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-bei-kleinanzeigen-diese-betrugsmaschen-kosten-kaufer-und-verkaufer-bares-geld/</loc>
		<lastmod>2026-03-04T15:03:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-sicherheitslucke-eine-harmlose-kalendereinladung-reicht-um-private-daten-abzugreifen/</loc>
		<lastmod>2026-03-04T15:05:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-scim-providers-for-b2b-saas-apps-automated-user-provisioning-platforms/</loc>
		<lastmod>2026-03-04T15:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-deploy-new-malware-in-phishing-campaign-targeting-ukraine/</loc>
		<lastmod>2026-03-04T15:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-breach-at-university-of-hawaii-cancer-center-affects-1-2m-people/</loc>
		<lastmod>2026-03-04T15:51:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-breach-at-university-of-hawaii-cancer-center-affects-1-2m-people-2/</loc>
		<lastmod>2026-03-04T15:51:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-most-common-swap-scams-in-2026-and-how-to-avoid-them/</loc>
		<lastmod>2026-03-04T15:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reclaim-security-raises-26m-to-eliminate-the-27-day-remediation-gap/</loc>
		<lastmod>2026-03-04T15:53:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-brute-force-attack-unmasked-a-ransomware-infrastructure-network/</loc>
		<lastmod>2026-03-04T15:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-in-attacks-on-surveillance-cameras-linked-to-iranian-hackers/</loc>
		<lastmod>2026-03-04T15:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-stage-badpaw-malware-campaign-targets-ukraine/</loc>
		<lastmod>2026-03-04T15:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-gesponsert-von-iran-und-russland-die-lage-im-cyberraum-nach-dem-angriff-der-usa-und-israels-auf-den-iran/</loc>
		<lastmod>2026-03-04T15:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ctem-divide-why-84-of-security-programs-are-falling-behind-2/</loc>
		<lastmod>2026-03-04T16:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sprawling-fbi-european-operation-takes-down-leakbase-cybercriminal-forum/</loc>
		<lastmod>2026-03-04T16:51:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-using-your-network-against-you-according-to-cloudflare/</loc>
		<lastmod>2026-03-04T16:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-azubi-vor-gericht-uber-500-000-euro-schaden-durch-online-betrug/</loc>
		<lastmod>2026-03-04T16:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-confirms-data-breach-at-legal-professional-arm-some-customer-records-affected/</loc>
		<lastmod>2026-03-04T16:53:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-warns-of-spoofed-alerts-aimed-at-stealing-master-passwords/</loc>
		<lastmod>2026-03-04T16:55:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-microsoft-365-a-live-breakdown-of-modern-attack-paths-2/</loc>
		<lastmod>2026-03-04T16:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-microsoft-365-a-live-breakdown-of-modern-attack-paths/</loc>
		<lastmod>2026-03-04T16:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-microsoft-365-a-live-breakdown-of-modern-attack-paths-3/</loc>
		<lastmod>2026-03-04T16:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-launches-native-jira-integrations/</loc>
		<lastmod>2026-03-04T16:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exceptional-women-recognised-for-contribution-to-cyber-industry-at-most-inspiring-women-in-cyber-awards-2026/</loc>
		<lastmod>2026-03-04T16:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/</loc>
		<lastmod>2026-03-04T16:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-takedown-neutralizes-tycoon2fa-phishing-service/</loc>
		<lastmod>2026-03-04T16:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-phishing-zur-plugplay-dienstleistung-wird-das-kratos-kit-im-blick/</loc>
		<lastmod>2026-03-04T17:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-phishing-zur-plugplay-dienstleistung-wird-das-kratos-kit-im-blick-2/</loc>
		<lastmod>2026-03-04T17:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-chatgpt-is-turning-into-microsoft-office-and-power-users-are-paying-the-price/</loc>
		<lastmod>2026-03-04T17:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-chatgpt-is-turning-into-microsoft-office-and-power-users-are-paying-the-price-2/</loc>
		<lastmod>2026-03-04T17:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-detecting-server-induced-client-vulnerabilities-in-windows-remote-ipc/</loc>
		<lastmod>2026-03-04T17:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-u-s-israeli-hostilities-lead-to-increased-threat-landscape/</loc>
		<lastmod>2026-03-04T17:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/does-the-uk-really-want-to-ban-vpns-and-can-it-be-done/</loc>
		<lastmod>2026-03-04T17:57:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-nexus-hackers-target-flaws-in-surveillance-cameras/</loc>
		<lastmod>2026-03-04T17:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-reports-record-quarter-amid-investor-concerns-about-ai-impact/</loc>
		<lastmod>2026-03-04T17:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-deleteme-alternatives-2026-competitors-and-comparisons/</loc>
		<lastmod>2026-03-04T18:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-in-android-phone-chips-under-active-attack/</loc>
		<lastmod>2026-03-04T18:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-phishing-platform-dismantled-in-major-operation/</loc>
		<lastmod>2026-03-04T18:02:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landmark-legal-challenge-against-home-office-evisa-system-heard/</loc>
		<lastmod>2026-03-04T18:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-biggest-android-security-update-in-years-fixes-129-bugs-including-an-actively-exploited-zero-day/</loc>
		<lastmod>2026-03-04T18:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/</loc>
		<lastmod>2026-03-04T18:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coalition-of-western-countries-launches-6g-cybersecurity-guidelines/</loc>
		<lastmod>2026-03-04T18:06:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airtables-500k-row-limit-is-not-a-scalability-fix-its-a-signal-to-rethink-your-data-strategy/</loc>
		<lastmod>2026-03-04T18:52:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-threat-actors-turned-openclaw-into-a-scraping-botnet/</loc>
		<lastmod>2026-03-04T18:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-from-14-countries-shut-down-major-cybercrime-forum-leakbase/</loc>
		<lastmod>2026-03-04T18:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-says-cyber-operations-underpinned-assault-on-iran/</loc>
		<lastmod>2026-03-04T18:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hacktivists-muster-their-forces-but-state-apts-lay-low/</loc>
		<lastmod>2026-03-04T18:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-leakbase-cybercrime-forum-data-of-142000-members/</loc>
		<lastmod>2026-03-04T18:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stranger-things-meets-cybersecurity-lessons-from-the-hive-mind/</loc>
		<lastmod>2026-03-04T18:58:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle-east-conflict/</loc>
		<lastmod>2026-03-04T19:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-instagram-api-scraping-crisis-when-public-data-becomes-a-17-5-million-user-breach/</loc>
		<lastmod>2026-03-04T19:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-groundhog-day-meaning/</loc>
		<lastmod>2026-03-04T19:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-10-hour-problem-how-visibility-gaps-are-burning-out-the-soc/</loc>
		<lastmod>2026-03-04T19:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-and-eu-police-shut-down-leakbase-a-site-accused-of-sharing-stolen-passwords-and-hacking-tools/</loc>
		<lastmod>2026-03-04T19:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/users-fume-over-outlook-com-email-carnage/</loc>
		<lastmod>2026-03-04T19:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/</loc>
		<lastmod>2026-03-04T19:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-grade-coruna-ios-exploit-kit-now-used-in-crypto-theft-attacks/</loc>
		<lastmod>2026-03-04T19:59:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/</loc>
		<lastmod>2026-03-04T20:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-on-the-realism-of-lidar-spoofing-attacks-against-autonomous-driving-vehicle/</loc>
		<lastmod>2026-03-04T20:49:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-verification-imperative-how-one-framework-is-reshaping-trust-in-financial-code/</loc>
		<lastmod>2026-03-04T20:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-zero-trust-and-modern-security-require-deep-visibility/</loc>
		<lastmod>2026-03-04T20:52:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ot-incident-scoring-systems-inspired-by-natural-disasters/</loc>
		<lastmod>2026-03-04T20:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ms-agent-flaw-enables-remote-code-execution-via-ai-agents/</loc>
		<lastmod>2026-03-04T20:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perplexity-ai-browser-flaw-could-let-calendar-invites-access-local-files/</loc>
		<lastmod>2026-03-04T20:55:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llms-are-getting-better-at-unmasking-people-online/</loc>
		<lastmod>2026-03-04T21:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-laced-openclaw-installers-get-bing-ai-search-boost/</loc>
		<lastmod>2026-03-04T21:51:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accenture-down-to-buy-downdetector-as-part-of-1-2-billion-deal/</loc>
		<lastmod>2026-03-04T21:52:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-should-be-the-first-defense-for-stablecoin-payment-fraud/</loc>
		<lastmod>2026-03-04T21:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadian-manufacturers-confront-rising-ot-cyber-risk/</loc>
		<lastmod>2026-03-04T21:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automate-or-orchestrate-implementing-a-streamlined-remediation-program-to-shorten-mttr/</loc>
		<lastmod>2026-03-04T21:56:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-10-kb5075039-update-fixes-broken-recovery-environment/</loc>
		<lastmod>2026-03-04T21:57:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/</loc>
		<lastmod>2026-03-04T21:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-single-overprivileged-service-turned-the-lexisnexis-breach-into-a-keysthe-kingdom-moment/</loc>
		<lastmod>2026-03-04T22:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-minutes-and-a-prayer-the-math-your-soc-doesnt-want-you-to-see/</loc>
		<lastmod>2026-03-04T22:51:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-avoid-confidentiality-gaps-in-early-stage-startups/</loc>
		<lastmod>2026-03-04T22:54:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-zoom-teams-meeting-invites-use-compromised-certificates-to-drop-malware/</loc>
		<lastmod>2026-03-04T22:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fig-security-raises-30m-to-modernize-soc-infrastructure/</loc>
		<lastmod>2026-03-04T22:56:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ot-incident-scoring-system-inspired-by-natural-disasters/</loc>
		<lastmod>2026-03-04T22:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cancer-center-research-study-hack-affects-1-2m/</loc>
		<lastmod>2026-03-04T22:57:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/perplexity-comet-browser-bug-leaks-local-files-via-ai-prompt-injection/</loc>
		<lastmod>2026-03-04T22:59:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</loc>
		<lastmod>2026-03-04T23:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vmware-aria-operations-bug-exploited-cloud-resources-at-risk/</loc>
		<lastmod>2026-03-04T23:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-free-are-companies-to-choose-their-agentic-ai-security-solutions/</loc>
		<lastmod>2026-03-04T23:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-nhi-management-empower-proactive-security-measures/</loc>
		<lastmod>2026-03-04T23:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-investing-in-advanced-ai-cybersecurity-justified/</loc>
		<lastmod>2026-03-04T23:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-support-systems-are-in-place-for-managing-agentic-ai-risks/</loc>
		<lastmod>2026-03-04T23:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-coalition-dismantles-tycoon-2fa-phishing-kit/</loc>
		<lastmod>2026-03-04T23:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/institutional-defi-building-secure-bridges-between-decentralized-protocols-and-corporate-treasury/</loc>
		<lastmod>2026-03-04T23:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-fixes-maximum-severity-secure-fmc-bugs-threatening-firewall-security/</loc>
		<lastmod>2026-03-04T23:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-emerges-as-the-next-frontier-for-state-government-it/</loc>
		<lastmod>2026-03-04T23:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-adds-support-for-passkey-login-on-windows-11/</loc>
		<lastmod>2026-03-04T23:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-adds-support-for-passkey-login-on-windows-11-2/</loc>
		<lastmod>2026-03-04T23:59:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-expect-from-irans-digital-counterstrike/</loc>
		<lastmod>2026-03-05T00:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stealth-and-deception-transparent-tribes-multi-stage-assault-on-indian-government-entities/</loc>
		<lastmod>2026-03-05T00:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intelligence-compromised-data-abyss-report-details-chinas-exploitation-of-u-s-iarpa-research/</loc>
		<lastmod>2026-03-05T00:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kratos-neues-phishing-as-akit-ermoglicht-selbst-anfangern-ausfuhrung-hochkomplexer-angriffe/</loc>
		<lastmod>2026-03-05T00:54:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erkennen-betrugerischer-e-mails-dringlichkeit-als-wichtigstes-warnsignal/</loc>
		<lastmod>2026-03-05T00:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-iranian-hacking-attempts-have-hit-surveillance-cameras-since-the-missile-strikes/</loc>
		<lastmod>2026-03-05T00:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-iranian-hacking-attempts-have-hit-surveillance-cameras-since-the-missile-strikes-2/</loc>
		<lastmod>2026-03-05T00:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-mcp-resource-governance/</loc>
		<lastmod>2026-03-05T04:50:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-mcp-resource-governance-2/</loc>
		<lastmod>2026-03-05T04:50:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-mcp-resource-governance-3/</loc>
		<lastmod>2026-03-05T04:50:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-leads-takedown-of-tycoon2fa-phishing-service-infrastructure/</loc>
		<lastmod>2026-03-05T04:51:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-leads-takedown-of-tycoon2fa-phishing-service-infrastructure-2/</loc>
		<lastmod>2026-03-05T04:52:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badpaw-and-meowmeow-russian-cyber-offensive-targets-ukraine-with-novel-malware-duo/</loc>
		<lastmod>2026-03-05T04:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/badpaw-and-meowmeow-russian-cyber-offensive-targets-ukraine-with-novel-malware-duo-2/</loc>
		<lastmod>2026-03-05T04:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasking-silver-dragon-the-chinese-nexus-apt-haunting-southeast-asia-and-europe/</loc>
		<lastmod>2026-03-05T04:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee/</loc>
		<lastmod>2026-03-05T04:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-risiken-steigen-schneller-als-die-schutzmasnahmen-40-prozent-der-unternehmen-uberschatzen-den-reifegrad-ihres-datenschutzes/</loc>
		<lastmod>2026-03-05T05:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberverteidigung-souveranitat-ist-weit-mehr-als-eine-regulatorische-anforderung/</loc>
		<lastmod>2026-03-05T05:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-report-2026-ki-und-botnetze-treiben-die-industrialisierung-von-cyberangriffen/</loc>
		<lastmod>2026-03-05T05:51:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-lieferketten-entwickeln-sich-zur-weltweit-grosten-cyberbedrohung/</loc>
		<lastmod>2026-03-05T05:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-lieferketten-entwickeln-sich-zur-weltweit-grosten-cyberbedrohung-2/</loc>
		<lastmod>2026-03-05T05:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/engineering-trust-a-security-blueprint-for-autonomous-ai-agents/</loc>
		<lastmod>2026-03-05T05:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-leak-authorities-dismantle-leakbase-forum-secure-user-data-and-ip-logs/</loc>
		<lastmod>2026-03-05T05:56:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-alert-hackers-impersonate-lastpass-support-to-steal-vault-passwords/</loc>
		<lastmod>2026-03-05T05:57:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon-2fa-phishing-operation-dismantled-in-joint-raid-by-microsoft-and-europol/</loc>
		<lastmod>2026-03-05T05:58:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-lieferketten-werden-zur-weltweit-grosten-cyber-bedrohung/</loc>
		<lastmod>2026-03-05T06:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-ai-agents-start-making-purchases-security-teams-must-rethink-risk/</loc>
		<lastmod>2026-03-05T06:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workers-reviewing-meta-ray-ban-footage-encounter-users-intimate-moments/</loc>
		<lastmod>2026-03-05T06:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-catalyst-sd-wan-flaws-expose-devices-to-root-access-threatening-network-security/</loc>
		<lastmod>2026-03-05T06:54:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-catalyst-sd-wan-flaws-expose-devices-to-root-access-threatening-network-security-2/</loc>
		<lastmod>2026-03-05T06:54:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cvss-score-10-0-hacker-konnen-whatsapp-sitzungen-von-nanobot-nutzern-ubernehmen/</loc>
		<lastmod>2026-03-05T06:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2622-valid-certificates-exposed-a-google-gitguardian-study-maps-private-key-leaks-to-real-world-risk/</loc>
		<lastmod>2026-03-05T07:48:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-affiliated-hackers-set-up-for-critical-ot-attacks-that-operators-may-not-detect/</loc>
		<lastmod>2026-03-05T07:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-affiliated-hackers-set-up-for-critical-ot-attacks-that-operators-may-not-detect-2/</loc>
		<lastmod>2026-03-05T07:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-old-software-bugs-that-took-way-too-long-to-squash/</loc>
		<lastmod>2026-03-05T07:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-old-software-bugs-that-took-way-too-long-to-squash-2/</loc>
		<lastmod>2026-03-05T07:52:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-uncovers-coruna-ios-exploit-kit-targeting-ios-1317-2-1/</loc>
		<lastmod>2026-03-05T07:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-firewall-vulnerability-exposes-networks-to-authentication-bypass-attacks/</loc>
		<lastmod>2026-03-05T07:55:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-intensify-targeting-of-ip-cameras-across-the-middle-east-amid-ongoing-conflict/</loc>
		<lastmod>2026-03-05T07:56:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-led-operation-takes-down-tycoon-2fa-phishing-asservice-linked-to-64000-attacks/</loc>
		<lastmod>2026-03-05T07:57:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-and-europol-seize-leakbase-forum-used-to-trade-stolen-credentials/</loc>
		<lastmod>2026-03-05T07:58:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-ebook-zero-trust-und-identity-management-identitatssicherheit-ist-die-basis-von-zero-trust/</loc>
		<lastmod>2026-03-05T07:59:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-firewall-management-flaw-allows-remote-code-execution/</loc>
		<lastmod>2026-03-05T08:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reclaim-security-raises-26m-to-eliminate-the-27-day-remediation-gap-2/</loc>
		<lastmod>2026-03-05T08:50:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/redalert-mobile-espionage-campaign-exploits-trojanized-rocket-alert-app-to-spy-on-civilians/</loc>
		<lastmod>2026-03-05T08:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-ethical-hacker-erpresst-ungeschutzte-datenbank-legt-eine-milliarde-kundendaten-offen/</loc>
		<lastmod>2026-03-05T08:55:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-ethical-hacker-erpresst-ungeschutzte-datenbank-legt-eine-milliarde-kundendaten-offen/</loc>
		<lastmod>2026-03-05T08:55:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-monaten-gefixt-microsoft-gesteht-recovery-panne-unter-windows-10/</loc>
		<lastmod>2026-03-05T08:55:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phobos-ransomware-admin-pleads-guilty-to-wire-fraud-conspiracy/</loc>
		<lastmod>2026-03-05T09:52:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-rolls-out-emergency-chrome-update-to-patch-10-critical-security-vulnerabilities/</loc>
		<lastmod>2026-03-05T09:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-rolls-out-emergency-chrome-update-to-patch-10-critical-security-vulnerabilities-2/</loc>
		<lastmod>2026-03-05T09:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-datensicherung-notfall-kreditrahmen-15-minuten-check-fur-firmen-zur-krisen-resilienz/</loc>
		<lastmod>2026-03-05T09:55:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-greift-durch-eine-der-weltweit-grosten-phishing-plattformen-zerschlagen/</loc>
		<lastmod>2026-03-05T09:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-greift-durch-eine-der-weltweit-grosten-phishing-plattformen-zerschlagen-2/</loc>
		<lastmod>2026-03-05T09:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-greift-durch-eine-der-weltweit-grosten-phishing-plattformen-zerschlagen-3/</loc>
		<lastmod>2026-03-05T09:56:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/streit-mit-epic-google-senkt-gebuhren-fur-inkaufe/</loc>
		<lastmod>2026-03-05T09:58:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gerichtsurteil-bnd-darf-kontrolle-durch-datenschutzer-verweigern/</loc>
		<lastmod>2026-03-05T09:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakbase-cybercrime-forum-with-142000-users-taken-down-in-global-operation/</loc>
		<lastmod>2026-03-05T09:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-pull-plug-on-tycoon-2fa-phishing-as-a-service-platform/</loc>
		<lastmod>2026-03-05T09:51:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-music-streaming-ceo-built-an-open-source-global-threat-map-in-his-spare-time/</loc>
		<lastmod>2026-03-05T10:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-cybersecurity-marketing-agencies-to-watch-in-2026/</loc>
		<lastmod>2026-03-05T10:51:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-exploits-fake-linkedin-vcs-to-spread-malware-among-crypto-and-web3-experts/</loc>
		<lastmod>2026-03-05T10:52:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaign-exploits-fake-linkedin-vcs-to-spread-malware-among-crypto-and-web3-experts-2/</loc>
		<lastmod>2026-03-05T10:52:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-operation-seizes-leakbase-data-breach-site/</loc>
		<lastmod>2026-03-05T10:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/highvulnerabilities-betreffen-die-gesamte-it-landschaft-zehn-schwachstellen-die-unternehmen-2026-im-blick-haben-sollten/</loc>
		<lastmod>2026-03-05T10:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-gefalschten-google-sicherheitscheck-so-schutzt-du-dich-vor-der-masche/</loc>
		<lastmod>2026-03-05T10:58:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-vs-microsoft-entra-id-which-enterprise-sso-platform-is-better/</loc>
		<lastmod>2026-03-05T11:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-outlook-email-encryption-hipaa-compliant-a-complete-guide-for-2026/</loc>
		<lastmod>2026-03-05T11:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/62-people-indicted-by-taiwanese-prosecutors-over-ties-to-cyber-scam-company-prince-group/</loc>
		<lastmod>2026-03-05T11:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-9244-targets-south-american-telecommunication-providers-with-three-new-malware-implants/</loc>
		<lastmod>2026-03-05T11:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-leak-fbi-and-europol-dismantle-leakbase-cybercrime-forum/</loc>
		<lastmod>2026-03-05T11:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-leak-fbi-and-europol-dismantle-leakbase-cybercrime-forum-2/</loc>
		<lastmod>2026-03-05T11:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freescout-vulnerability-enables-unauthenticated-zero-click-rce-via-email-cve-2026-28289/</loc>
		<lastmod>2026-03-05T11:57:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/freescout-vulnerability-enables-unauthenticated-zero-click-rce-via-email-cve-2026-28289-2/</loc>
		<lastmod>2026-03-05T11:58:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-changes-play-store-policies-after-settling-epic-games-dispute/</loc>
		<lastmod>2026-03-05T11:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/next-gen-spotlights-preparing-for-a-post-quantum-world-qa-with-cavero-quantum/</loc>
		<lastmod>2026-03-05T12:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-05T12:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-pac4j-jwt-authentication-bypass-vulnerability-allows-attackers-to-impersonate-any-user/</loc>
		<lastmod>2026-03-05T12:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/where-multi-factor-authentication-stops-and-credential-abuse-starts/</loc>
		<lastmod>2026-03-05T12:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-linked-campaign-deploys-badpaw-loader-and-meowmeow-backdoor-in-ukraine/</loc>
		<lastmod>2026-03-05T12:05:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-click-freescout-bug-enables-remote-code-execution/</loc>
		<lastmod>2026-03-05T12:05:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-issues-patches-for-48-vulnerabilities-in-enterprise-networking-products/</loc>
		<lastmod>2026-03-05T12:07:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operational-technology-ot-penetration-testing-defining-process-and-tools/</loc>
		<lastmod>2026-03-05T12:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-watchdog-eyes-metas-smart-glasses-after-workers-say-they-see-everything/</loc>
		<lastmod>2026-03-05T12:51:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-hackers-target-crypto-firms-steal-keys-and-cloud-assets-in-coordinated-attacks/</loc>
		<lastmod>2026-03-05T12:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dust-specter-targets-iraqi-officials-with-new-splitdrop-and-ghostform-malware/</loc>
		<lastmod>2026-03-05T12:54:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-exploit-kit-targets-older-iphones-in-multi-stage-campaigns/</loc>
		<lastmod>2026-03-05T12:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionagekampagne-gegen-sudkorea-angriff-missbraucht-microsoft-vs-code-fur-spionage/</loc>
		<lastmod>2026-03-05T12:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-gruppe-bleibt-weiter-auf-blockchain-beutezug/</loc>
		<lastmod>2026-03-05T12:57:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asgoodasnew-datenklau-bei-deutschem-refurbished-handler/</loc>
		<lastmod>2026-03-05T12:58:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shift-left-has-shifted-wrong-why-appsec-teams-not-developers-must-lead-security-in-the-age-of-ai-coding/</loc>
		<lastmod>2026-03-05T13:48:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-in-classroom-manager-greater-google-classroom-management-built-on-what-customers-already-trust/</loc>
		<lastmod>2026-03-05T13:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-guide-principles-frameworks/</loc>
		<lastmod>2026-03-05T13:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-real-shadow-ai-problem-too-much-access/</loc>
		<lastmod>2026-03-05T13:51:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/should-cloud-be-classed-as-critical-infrastructure/</loc>
		<lastmod>2026-03-05T13:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discover-exposed-ai-infrastructure-with-indusface-was-2/</loc>
		<lastmod>2026-03-05T13:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discover-exposed-ai-infrastructure-with-indusface-was/</loc>
		<lastmod>2026-03-05T13:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-schliest-riesigen-markt-fur-gestohlene-daten/</loc>
		<lastmod>2026-03-05T13:55:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-dismantle-major-phishing-platform-blamed-for-attacks-on-hospitals-and-schools/</loc>
		<lastmod>2026-03-05T13:57:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-backs-open-vsx-as-rust-survey-shows-vs-code-decline/</loc>
		<lastmod>2026-03-05T13:58:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-shut-down-tycoon-2fa-phishing-platform-used-to-bypass-mfa/</loc>
		<lastmod>2026-03-05T13:58:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/that-attractive-online-ad-might-be-a-malware-trap/</loc>
		<lastmod>2026-03-05T14:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-dismantles-online-gambling-ring-exploiting-ukrainian-women/</loc>
		<lastmod>2026-03-05T14:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mongodb-vulnerability-allows-attackers-to-crash-servers-exposing-critical-data/</loc>
		<lastmod>2026-03-05T14:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-fake-claude-code-downloads-to-deploy-infostealer-malware/</loc>
		<lastmod>2026-03-05T14:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-for-cisco-sd-wan-0-day-vulnerability-now-released-actively-exploited-in-the-wild/</loc>
		<lastmod>2026-03-05T14:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ringh23-threat-actors-target-maccms-and-cdn-infrastructure-with-new-arsenal/</loc>
		<lastmod>2026-03-05T14:05:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-and-botify-partner-to-give-businesses-full-control-over-agentic-commerce-from-discovery-to-transaction/</loc>
		<lastmod>2026-03-05T14:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-and-botify-partner-to-give-businesses-full-control-over-agentic-commerce-from-discovery-to-transaction-2/</loc>
		<lastmod>2026-03-05T14:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-updated-ai-governance-suite-dashboard-kovrr/</loc>
		<lastmod>2026-03-05T14:52:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-gruppe-auf-blockchain-beutezug/</loc>
		<lastmod>2026-03-05T14:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europol-groser-markt-fur-gestohlene-daten-geschlossen/</loc>
		<lastmod>2026-03-05T14:55:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/were-not-trying-to-remake-the-economy-ftcs-mufarrige-charts-new-course-on-tech-enforcement/</loc>
		<lastmod>2026-03-05T14:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-gruppe-auf-blockchain-beutezug-wie-hacker-whitelists-als-zielscheiben-missbrauchen/</loc>
		<lastmod>2026-03-05T14:57:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kleine-und-mittelstandische-unternehmen-sind-nach-wie-vor-unzureichend-auf-die-realitat-der-heutigen-bedrohungslandschaft-vorbereitet/</loc>
		<lastmod>2026-03-05T14:58:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-von-cloud-datenbanken-schafft-transparenz-und-kontrolle/</loc>
		<lastmod>2026-03-05T14:59:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakbase-cybercrime-and-hacker-forum-seized/</loc>
		<lastmod>2026-03-05T15:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-sd-wan-manager-exploitation-fixes-48-firewall-vulnerabilities/</loc>
		<lastmod>2026-03-05T15:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latam-now-faces-2x-more-cyberattacks-than-us/</loc>
		<lastmod>2026-03-05T15:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-more/</loc>
		<lastmod>2026-03-05T15:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preparing-for-the-quantum-era-post-quantum-cryptography-webinar-for-security-leaders/</loc>
		<lastmod>2026-03-05T15:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contextcrush-flaw-exposes-ai-development-tools-to-attacks/</loc>
		<lastmod>2026-03-05T15:05:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contextcrush-flaw-exposes-ai-development-tools-to-attacks-2/</loc>
		<lastmod>2026-03-05T15:05:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-im-netz-wenn-ki-realitat-manipuliert-warum-neue-hilfsangebote-dringend-notig-sind/</loc>
		<lastmod>2026-03-05T15:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-de-identify-financial-documents-with-tonic-textual-2/</loc>
		<lastmod>2026-03-05T15:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-de-identify-financial-documents-with-tonic-textual/</loc>
		<lastmod>2026-03-05T15:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-de-identify-financial-documents-with-tonic-textual-3/</loc>
		<lastmod>2026-03-05T15:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ironscales-adds-three-ai-agents-trained-to-automate-cybersecurity-tasks/</loc>
		<lastmod>2026-03-05T15:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-threat-led-defense-should-be-on-every-cisos-priority-list-in-2026/</loc>
		<lastmod>2026-03-05T15:51:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-compartmentalisation-or-how-i-learned-to-stop-worrying-and-love-multiple-screens/</loc>
		<lastmod>2026-03-05T15:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-90-zero-days-exploited-in-2025-as-commercial-vendor-activity-grows/</loc>
		<lastmod>2026-03-05T15:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hohes-malware-risiko-mitarbeiter-installieren-in-unternehmen-raubkopierte-software-auf-arbeitsgeraten/</loc>
		<lastmod>2026-03-05T15:56:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/account-enumeration-in-the-wild-analyzing-a-real-world-spotify-enumeration-tool/</loc>
		<lastmod>2026-03-05T15:56:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/code-in-nischensprachen-hebelt-anomalieerkennung-aus/</loc>
		<lastmod>2026-03-05T15:58:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jedes-zweite-unternehmen-stoppt-projekte-mit-kunstlicher-intelligenz-wegen-sicherheits-und-governance-bedenken/</loc>
		<lastmod>2026-03-05T15:59:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-with-tom-howe-of-hydrolix-ai-bots-the-friends-foes-and-frenemies-of-online-shopping/</loc>
		<lastmod>2026-03-05T16:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-ios-exploit-kit-compromises-thousands-of-iphones/</loc>
		<lastmod>2026-03-05T16:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-suppliers-exploit-more-zero-days-than-nation-states/</loc>
		<lastmod>2026-03-05T16:02:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-suppliers-exploit-more-zero-days-than-nation-states-2/</loc>
		<lastmod>2026-03-05T16:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/government-wants-to-build-digital-id-system-in-house/</loc>
		<lastmod>2026-03-05T16:05:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-do-not-have-to-explain-to-lawyer-fahad-ansari-why-they-seized-his-phone-data-says-court/</loc>
		<lastmod>2026-03-05T16:06:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/codenotary-trust-delivers-autonomous-ai-security-for-linux-and-kubernetes/</loc>
		<lastmod>2026-03-05T16:07:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lastpass-review-features-pricing-security-and-who-its-best-for/</loc>
		<lastmod>2026-03-05T16:08:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-90-zero-days-were-exploited-in-attacks-last-year/</loc>
		<lastmod>2026-03-05T16:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-browser-data-reveals-major-enterprise-security-blind-spots/</loc>
		<lastmod>2026-03-05T16:09:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-palo-alto-hacker-erstellen-phishing-seiten-mit-llms-in-echtzeit/</loc>
		<lastmod>2026-03-05T16:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecuritys-fundamental-flaw-its-still-an-open-loop-system/</loc>
		<lastmod>2026-03-05T16:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisible-lifelines-dcim-empowers-healthcare-teams/</loc>
		<lastmod>2026-03-05T16:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invisible-lifelines-dcim-empowers-healthcare-teams-2/</loc>
		<lastmod>2026-03-05T16:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-data-based-shifts-defining-ai-native-cybersecurity-stacks/</loc>
		<lastmod>2026-03-05T16:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-data-based-shifts-defining-ai-native-cybersecurity-stacks-2/</loc>
		<lastmod>2026-03-05T16:54:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/common-ecommerce-security-vulnerabilities-and-testing-strategies/</loc>
		<lastmod>2026-03-05T16:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-europol-disrupt-global-phishing-platform-tycoon-2fa/</loc>
		<lastmod>2026-03-05T16:56:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plankeys-nomination-as-cisa-director-now-in-jeopardy/</loc>
		<lastmod>2026-03-05T16:56:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-reveals-2-max-severity-defects-in-firewall-management-software/</loc>
		<lastmod>2026-03-05T16:57:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-stellt-sase-as-alosung-aus-der-eu-fur-die-eu-vor/</loc>
		<lastmod>2026-03-05T16:59:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/users-fume-at-outlook-com-email-carnage/</loc>
		<lastmod>2026-03-05T17:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware/</loc>
		<lastmod>2026-03-05T17:01:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-hackers-play-the-vibes/</loc>
		<lastmod>2026-03-05T17:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabilities/</loc>
		<lastmod>2026-03-05T17:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabilities-2/</loc>
		<lastmod>2026-03-05T17:03:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-insider-risk-now-a-critical-business-threat-report-warns/</loc>
		<lastmod>2026-03-05T17:05:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-wege-fur-sicherheitsteams-armis-startet-digitalen-marketplace/</loc>
		<lastmod>2026-03-05T17:06:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-in-the-age-of-ai-why-the-classic-model-isnt-enough-anymore/</loc>
		<lastmod>2026-03-05T17:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-in-the-age-of-ai-why-the-classic-model-isnt-enough-anymore-2/</loc>
		<lastmod>2026-03-05T17:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-revisiting-physical-world-adversarial-attack-on-traffic-sign-recognition/</loc>
		<lastmod>2026-03-05T17:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-ariomex-leak-flags-iran-sanction-risks/</loc>
		<lastmod>2026-03-05T17:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-unveils-secure-ai-advisory-service-to-help-enterprises-govern-ai-adoption/</loc>
		<lastmod>2026-03-05T17:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-development-practices-help-enterprises-tackle-real-life-risks/</loc>
		<lastmod>2026-03-05T17:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-circus-at-cisa-continues/</loc>
		<lastmod>2026-03-05T18:50:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwordless-authentication-for-woocommerce-with-adaptive-mfa/</loc>
		<lastmod>2026-03-05T18:51:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/easyintegrate-passwordless-authentication-for-shopify-with-adaptive-mfa-and-private-instances/</loc>
		<lastmod>2026-03-05T18:52:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-issues-emergency-patches-for-critical-firewall-vulnerabilities/</loc>
		<lastmod>2026-03-05T18:54:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-issues-emergency-patches-for-critical-firewall-vulnerabilities-2/</loc>
		<lastmod>2026-03-05T18:54:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatlocker-unveils-zero-trust-network-and-cloud-access-5-things-to-know/</loc>
		<lastmod>2026-03-05T18:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatlocker-ceo-on-how-zero-trust-expansion-makes-it-much-harder-to-get-hacked/</loc>
		<lastmod>2026-03-05T18:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phobos-ransomware-leader-facing-20-years-in-prison-after-pleading-guilty-to-hacking-charges/</loc>
		<lastmod>2026-03-05T18:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phobos-ransomware-leader-pleads-guilty-faces-up-to-20-years-in-prison/</loc>
		<lastmod>2026-03-05T18:58:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-half-of-all-zero-days-it-tracked-in-2025-targeted-buggy-enterprise-tech/</loc>
		<lastmod>2026-03-05T18:58:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pleasefix-flaw-lets-hackers-access-1password-vault-via-comet-ai-browser/</loc>
		<lastmod>2026-03-05T19:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-firewall-management-flaw-enables-remote-code-execution/</loc>
		<lastmod>2026-03-05T19:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ceo-calls-openais-military-messaging-straight-up-lies/</loc>
		<lastmod>2026-03-05T19:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latest-openclaw-security-risk-fake-github-repositories-used-to-deploy-infostealers/</loc>
		<lastmod>2026-03-05T19:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-5-questions-how-dspm-illuminates-the-murky-world-of-multi-cloud-data-security/</loc>
		<lastmod>2026-03-05T19:51:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-women-fleeing-war-exploited-in-multimillion-dollar-gambling-fraud-scheme/</loc>
		<lastmod>2026-03-05T19:52:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-updates-a-free-risk-tool-to-help-hospitals-size-up-their-cybersecurity-exposure/</loc>
		<lastmod>2026-03-05T19:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-track-repeat-the-2025-cve-retrospective/</loc>
		<lastmod>2026-03-05T19:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fyi-impersonators-are-still-targeting-companies-with-fake-techcrunch-outreach/</loc>
		<lastmod>2026-03-05T19:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-intelligence-backdoored-us-bank-airport-software-outfit-networks/</loc>
		<lastmod>2026-03-05T19:56:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-best-next-gen-endpoint-protection-platforms-in-2026/</loc>
		<lastmod>2026-03-05T19:57:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-best-next-gen-endpoint-protection-platforms-in-2026-2/</loc>
		<lastmod>2026-03-05T19:57:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts/</loc>
		<lastmod>2026-03-05T19:58:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/</loc>
		<lastmod>2026-03-05T19:59:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-adoption-is-forcing-security-teams-to-rethink-browser-defense/</loc>
		<lastmod>2026-03-05T20:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phobos-ransomware-admin-faces-up-to-20-years-after-guilty-plea/</loc>
		<lastmod>2026-03-05T20:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-controversies-finally-caught-up-to-kristi-noem/</loc>
		<lastmod>2026-03-05T20:53:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ndss-2025-l-hawk-a-controllable-physical-adversarial-patch-against-a-long-distance-target/</loc>
		<lastmod>2026-03-05T21:49:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-jersey-county-says-malware-attack-took-down-phone-lines-it-systems/</loc>
		<lastmod>2026-03-05T21:50:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-targeted-with-suspicious-activity-on-its-networks/</loc>
		<lastmod>2026-03-05T21:51:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-prosecutors-confirm-journalist-was-hacked-with-paragon-spyware/</loc>
		<lastmod>2026-03-05T21:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pakistan-linked-apt36-floods-indian-govt-networks-with-ai-made-vibeware/</loc>
		<lastmod>2026-03-05T21:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-wont-fix-cybersecurity-burnout/</loc>
		<lastmod>2026-03-05T21:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-sd-wan-manager-vulnerabilities-actively-exploited/</loc>
		<lastmod>2026-03-05T21:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/</loc>
		<lastmod>2026-03-05T21:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-drops-48-new-firewall-vulnerabilities-2-critical/</loc>
		<lastmod>2026-03-05T21:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-woflow-breach-what-it-means-for-saas-supply-chain-security/</loc>
		<lastmod>2026-03-05T22:49:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/</loc>
		<lastmod>2026-03-05T22:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cyber-risks-of-remote-work-infrastructure/</loc>
		<lastmod>2026-03-05T22:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-patches-and-hacks-on-cisco-equipment/</loc>
		<lastmod>2026-03-05T22:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-patches-and-hacks-on-cisco-equipment-2/</loc>
		<lastmod>2026-03-05T22:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-onetrust-ceo-on-why-ai-governance-market-is-set-to-surge/</loc>
		<lastmod>2026-03-05T22:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-used-new-exploit-kit-to-compromise-thousands-of-iphones/</loc>
		<lastmod>2026-03-05T22:55:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-state-actor-embraces-ai-malware-assembly-line/</loc>
		<lastmod>2026-03-05T22:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon-2fa-goes-boom-as-europol-vendors-bust-phishing-platform/</loc>
		<lastmod>2026-03-05T22:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defending-against-iranian-cyber-threats-in-the-wake-of-operation-epic-fury/</loc>
		<lastmod>2026-03-05T23:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strengthening-californias-cyber-defenses-apply-now-for-ffy-2024-slcgp-grants/</loc>
		<lastmod>2026-03-05T23:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tech-giants-washington-rally-for-anthropic-in-pentagon-feud/</loc>
		<lastmod>2026-03-05T23:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trizetto-notifying-3-4m-of-2024-hack-detected-in-2025/</loc>
		<lastmod>2026-03-05T23:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-attackers-gain-speed-in-cybersecurity-race/</loc>
		<lastmod>2026-03-05T23:56:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-every-country-directly-impacted-by-the-war-on-iran/</loc>
		<lastmod>2026-03-05T23:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-state-hackers-target-telcos-with-new-malware-toolkit/</loc>
		<lastmod>2026-03-05T23:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/</loc>
		<lastmod>2026-03-05T23:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/audit-readiness-assessments-demystified-importance-and-relevance-for-your-business/</loc>
		<lastmod>2026-03-06T00:48:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-should-businesses-be-optimistic-about-ai-in-cybersecurity/</loc>
		<lastmod>2026-03-06T00:50:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-impenetrable-are-ai-powered-cybersecurity-defenses/</loc>
		<lastmod>2026-03-06T00:51:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-kriegsfuhrung-im-digitalzeitalter-ki-systeme-und-lieferketten-als-teil-der-strategischen-angriffsflache/</loc>
		<lastmod>2026-03-06T00:52:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-clients-truly-satisfied-with-ai-enhanced-security-measures/</loc>
		<lastmod>2026-03-06T00:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veranderung-mobiler-sicherheitsanforderungen-infolge-neuer-regulierungen-und-ki-technologien/</loc>
		<lastmod>2026-03-06T00:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-spyware-makers-and-china-linked-groups-dominated-zero-day-attacks-last-year/</loc>
		<lastmod>2026-03-06T00:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-spyware-makers-and-china-linked-groups-dominated-zero-day-attacks-last-year-2/</loc>
		<lastmod>2026-03-06T00:57:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-proofs-for-privacy-preserving-context-validation/</loc>
		<lastmod>2026-03-06T04:49:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-soc-analyst-role-is-going-up-and-it-was-never-going-away/</loc>
		<lastmod>2026-03-06T04:50:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-soc-doesnt-need-more-tools-it-needs-fewer/</loc>
		<lastmod>2026-03-06T04:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-data-protection-program-should-be-policy-based/</loc>
		<lastmod>2026-03-06T04:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-data-protection-program-should-be-policy-based-2/</loc>
		<lastmod>2026-03-06T04:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europa-im-visier-von-cyber-identitatsdieben/</loc>
		<lastmod>2026-03-06T04:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakbase-marketplace-unplugged-by-cops-in-14-countries/</loc>
		<lastmod>2026-03-06T04:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eyes-on-the-front-iranian-threat-actors-weaponize-ip-cameras-in-middle-east-conflict/</loc>
		<lastmod>2026-03-06T04:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-panel-marks-up-kids-digital-safety-act-amid-democrat-backlash/</loc>
		<lastmod>2026-03-06T04:57:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raubkopien-offnen-tur-fur-malware/</loc>
		<lastmod>2026-03-06T05:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/was-unternehmen-jetzt-zur-digitalen-verifizierung-wissen-mussen-identitatsbetrug-als-geschaftsrisiko/</loc>
		<lastmod>2026-03-06T05:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitelisting-im-unternehmen-wie-konsequentes-allow-listing-zero-day-angriffe-stoppt-und-die-angriffsflache-dauerhaft-reduziert-kontrolle-statt-reaktiver-abwehr/</loc>
		<lastmod>2026-03-06T05:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vier-saulen-der-cyberresilienz/</loc>
		<lastmod>2026-03-06T05:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vier-saulen-der-cyberresilienz-2/</loc>
		<lastmod>2026-03-06T05:53:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-risiken-steigen-schneller-als-die-schutzmasnahmen-unternehmen-uberschatzen-den-reifegrad-ihres-datenschutzes/</loc>
		<lastmod>2026-03-06T05:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-march-6-2026/</loc>
		<lastmod>2026-03-06T05:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-uncovers-90-zero-day-vulnerabilities-under-active-exploitation-in-2025/</loc>
		<lastmod>2026-03-06T05:57:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drei-hebel-gegen-spear-phishing/</loc>
		<lastmod>2026-03-06T06:49:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitelisting-im-unternehmen-wie-allow-listing-zero-day-angriffe-stoppt-und-die-angriffsflache-reduziert/</loc>
		<lastmod>2026-03-06T06:49:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/western-governments-lay-the-groundwork-for-secure-6g-networks/</loc>
		<lastmod>2026-03-06T06:51:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-ai-teams-compete-against-human-hackers-2/</loc>
		<lastmod>2026-03-06T06:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-ai-teams-compete-against-human-hackers/</loc>
		<lastmod>2026-03-06T06:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-membership-plugin-flaw-lets-attackers-create-admin-accounts/</loc>
		<lastmod>2026-03-06T06:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rund-100-000-server-betroffen-hacker-konnen-n8n-instanzen-ubernehmen/</loc>
		<lastmod>2026-03-06T06:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backup-strategies-are-working-and-ransomware-gangs-are-responding-with-data-theft/</loc>
		<lastmod>2026-03-06T07:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-phishing-still-works-today/</loc>
		<lastmod>2026-03-06T07:50:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-detains-u-s-government-contractor-in-massive-46-million-fraud-scheme/</loc>
		<lastmod>2026-03-06T07:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nginx-config-manipulation-ermoglicht-dauerhafte-traffic-kontrolle-react2shell-kampagne-missbraucht-nginx-konfigurationen/</loc>
		<lastmod>2026-03-06T07:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-palo-alto-networks-hacker-erstellen-phishing-seiten-mit-llms-in-echtzeit/</loc>
		<lastmod>2026-03-06T07:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-jedes-zweite-unternehmen-unterschatzt-nis-2-pflichten/</loc>
		<lastmod>2026-03-06T07:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-address-poisoning/</loc>
		<lastmod>2026-03-06T08:50:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-exploits-hit-enterprises-faster-and-harder/</loc>
		<lastmod>2026-03-06T08:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-2026-patch-tuesday-forecast-is-ai-security-an-oxymoron/</loc>
		<lastmod>2026-03-06T08:52:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-hackers-target-telecommunication-providers-with-new-malware-attack/</loc>
		<lastmod>2026-03-06T08:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog/</loc>
		<lastmod>2026-03-06T08:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-reveals-clickfix-campaign-using-windows-terminal-to-deploy-lumma-stealer/</loc>
		<lastmod>2026-03-06T09:00:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-das-fbi-hat-offenbar-hacker-im-netzwerk/</loc>
		<lastmod>2026-03-06T09:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/collaboration-critical-as-geopolitical-pressures-ai-reshape-cybersecurity/</loc>
		<lastmod>2026-03-06T09:51:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon-2fa-abgeschaltet-schlag-gegen-weltweites-aitm-phishing/</loc>
		<lastmod>2026-03-06T09:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teenage-hacker-myth-primed-for-a-middle-age-criminal-makeover/</loc>
		<lastmod>2026-03-06T09:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gtig-90-zero-day-flaws-exploited-in-2025-as-enterprise-targets-grow/</loc>
		<lastmod>2026-03-06T09:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/challenges-and-projects-for-the-ciso-in-2026/</loc>
		<lastmod>2026-03-06T09:55:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-warming-to-ai-pcs-growing-amid-cloud-costs/</loc>
		<lastmod>2026-03-06T09:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-gpt-5-4-doubles-down-on-safety-as-competition-heats-up/</loc>
		<lastmod>2026-03-06T09:57:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-lc-flaw-exposes-amazon-users-to-attacks-by-bypassing-certificate-chain-validation/</loc>
		<lastmod>2026-03-06T09:58:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigates-breach-of-surveillance-and-wiretap-systems/</loc>
		<lastmod>2026-03-06T10:00:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-rootkits-leverage-advanced-ebpf-and-io_uring-techniques-for-stealthy-attacks/</loc>
		<lastmod>2026-03-06T10:00:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-use-terndoor-peertime-bruteentry-in-south-american-telecom-attacks/</loc>
		<lastmod>2026-03-06T10:01:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-registrierung-frist-6-marz-2026-heute-ist-stichtag-fur-nis2-betroffene-unternehmen/</loc>
		<lastmod>2026-03-06T10:04:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weltfrauentag-2026-frauen-in-der-it-warum-der-wandel-gerade-jetzt-moglich-ist/</loc>
		<lastmod>2026-03-06T10:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-zero-trust-paradox-why-email-whitelists-are-undoing-millions-in-security-investment/</loc>
		<lastmod>2026-03-06T10:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-sind-das-ziel-nummer-eins/</loc>
		<lastmod>2026-03-06T10:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transport-for-london-says-2024-breach-affected-7m-customers-not-5000/</loc>
		<lastmod>2026-03-06T10:51:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-apple-rockwell-and-hikvision-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-06T10:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprises-warming-to-ai-pcs-amid-growing-cloud-costs/</loc>
		<lastmod>2026-03-06T10:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghanain-man-pleads-guilty-to-role-in-100-million-fraud-ring/</loc>
		<lastmod>2026-03-06T10:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-automations-turns-code-review-and-ops-into-background-tasks/</loc>
		<lastmod>2026-03-06T10:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-unternehmen-mehrere-gefahrliche-cisco-lucken-unter-beschuss/</loc>
		<lastmod>2026-03-06T10:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-silent-supply-chain-why-your-fourth-party-vendor-is-your-biggest-blindspot/</loc>
		<lastmod>2026-03-06T13:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-managed-pki-benefits-of-managed-pki-services-for-enterprises/</loc>
		<lastmod>2026-03-06T13:08:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-nexus-apt-dust-specter-targets-iraq-officials-with-new-malware/</loc>
		<lastmod>2026-03-06T13:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-activemq-flaw-enables-dos-attacks-via-malformed-network-packets/</loc>
		<lastmod>2026-03-06T13:10:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-msp-guide-to-using-ai-powered-risk-management-to-scale-cybersecurity/</loc>
		<lastmod>2026-03-06T13:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-muddywater-hackers-target-u-s-networks-with-new-dindoor-backdoor/</loc>
		<lastmod>2026-03-06T13:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-unternehmen-mehrere-gefahrliche-cisco-lucken-unter-beschuss/</loc>
		<lastmod>2026-03-06T13:24:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cleaning-up-active-directory-before-enabling-saml-based-sso-a-technical-playbook/</loc>
		<lastmod>2026-03-06T13:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cleaning-up-active-directory-before-enabling-saml-based-sso-a-technical-playbook/</loc>
		<lastmod>2026-03-06T13:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/son-of-government-contractor-arrested-after-alleged-46m-crypto-heist-from-us-marshals/</loc>
		<lastmod>2026-03-06T13:15:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-finally-gets-around-to-fixing-windows-10-recovery-environment-after-breaking-it-in-october/</loc>
		<lastmod>2026-03-06T13:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-48-firewall-vulnerabilities-with-two-cvss-10-flaws/</loc>
		<lastmod>2026-03-06T13:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordics-ally-with-baltics-to-accelerate-digital-wallet-roll-out/</loc>
		<lastmod>2026-03-06T13:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cyber-module-strengthens-risk-planning-for-health-organizations/</loc>
		<lastmod>2026-03-06T13:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-ukraine-to-iran-hacking-security-cameras-is-now-part-of-wars-playbook/</loc>
		<lastmod>2026-03-06T13:20:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avideo-platform-vulnerability-allows-hackers-to-hijack-streams-via-zero-click-command-injection/</loc>
		<lastmod>2026-03-06T13:20:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis-2-und-kritis-dachgesetz-verscharfen-anforderungen-neue-eu-regulierungen-uberfordern-internationale-konzerne/</loc>
		<lastmod>2026-03-06T13:22:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-geld-furs-gericht-millionenfach-genutzter-illegaler-streamingdienst-gibt-auf/</loc>
		<lastmod>2026-03-06T13:24:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-fake-openclaw-installers-even-if-bing-points-you-to-github/</loc>
		<lastmod>2026-03-06T13:52:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beware-of-fake-openclaw-installers-even-if-bing-points-you-to-github-2/</loc>
		<lastmod>2026-03-06T13:52:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets/</loc>
		<lastmod>2026-03-06T13:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-mail-half-dem-fbi-einen-demonstranten-zu-identifizieren/</loc>
		<lastmod>2026-03-06T13:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-working-on-teams-feature-to-help-admins-block-unauthorized-bots/</loc>
		<lastmod>2026-03-06T13:55:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rmm-tools-crucial-for-it-operations-but-growing-threat-as-attackers-weaponize-them/</loc>
		<lastmod>2026-03-06T13:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zeroday-attacks-on-enterprise-software-reach-record-high-google-warns/</loc>
		<lastmod>2026-03-06T13:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-your-own-crm-with-ai-when-it-works-when-it-fails-and-what-leaders-should-know/</loc>
		<lastmod>2026-03-06T15:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ai-security-top-security-risks-in-llm-applications/</loc>
		<lastmod>2026-03-06T15:10:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-looks-to-revive-critical-cyber-program-for-rural-electric-utilities/</loc>
		<lastmod>2026-03-06T15:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trizetto-confirms-3-4m-peoples-health-and-personal-data-was-stolen-during-breach/</loc>
		<lastmod>2026-03-06T15:12:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-spots-clickfix-campaign-getting-users-to-self-pwn-on-windows-terminal/</loc>
		<lastmod>2026-03-06T15:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-clickfix-campaign-exploiting-windows-terminal-to-deliver-lumma-stealer/</loc>
		<lastmod>2026-03-06T15:14:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norway-braced-for-foreign-ai-cyber-attacks-on-vital-petroleum-computing/</loc>
		<lastmod>2026-03-06T15:16:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-apt-targets-us-critical-sectors-with-new-backdoors/</loc>
		<lastmod>2026-03-06T15:17:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-working-on-teams-feature-to-keep-unauthorized-bots-at-bay/</loc>
		<lastmod>2026-03-06T15:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-backup-to-add-file-level-restore-for-faster-recovery/</loc>
		<lastmod>2026-03-06T15:18:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-cyber-kinetic-war-doctrine-takes-shape/</loc>
		<lastmod>2026-03-06T15:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-mexicos-govt-agencies-highlight-ai-threat/</loc>
		<lastmod>2026-03-06T15:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-epss-exploit-prediction-scoring-system-epss-score-was-ist-epss-und-was-ist-der-epss-score/</loc>
		<lastmod>2026-03-06T15:22:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-stellt-praktische-tipps-fur-eine-starkere-cyberabwehr-zur-verfugung/</loc>
		<lastmod>2026-03-06T15:23:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-reasons-to-visit-ironscales-at-rsa-conference-2026/</loc>
		<lastmod>2026-03-06T15:50:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-warns-of-two-more-sd-wan-bugs-under-active-attack/</loc>
		<lastmod>2026-03-06T15:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-to-hijack-your-browser-for-your-own-convenience/</loc>
		<lastmod>2026-03-06T15:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-ai-workforce-readiness-and-security-2/</loc>
		<lastmod>2026-03-06T15:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/</loc>
		<lastmod>2026-03-06T15:54:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-auto-rules-shift-gears-on-cybersecurity-standards/</loc>
		<lastmod>2026-03-06T15:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting-india/</loc>
		<lastmod>2026-03-06T15:56:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-stage-voidgeist-malware-delivering-xworm-asyncrat-and-xeno-rat/</loc>
		<lastmod>2026-03-06T15:57:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-muddywater-hackers-hit-us-firms-with-new-dindoor-backdoor/</loc>
		<lastmod>2026-03-06T15:58:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-kaspersky-hunderte-angriffe-mit-millionen-kompromittierter-accounts/</loc>
		<lastmod>2026-03-06T15:59:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-makers-in-2025-for-the-first-time-topped-googles-lists-of-zero-day-exploits/</loc>
		<lastmod>2026-03-06T16:48:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-still-struggles-to-retain-and-elevate-women%c2%a6why/</loc>
		<lastmod>2026-03-06T16:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breaches-up-number-of-victims-down-impact-stronger/</loc>
		<lastmod>2026-03-06T16:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-adds-cybersecurity-guidance-to-healthcare-sector-self-assessment-tool/</loc>
		<lastmod>2026-03-06T16:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-half-of-exploited-zero-day-flaws-target-enterprise-grade-technology/</loc>
		<lastmod>2026-03-06T16:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-die-lieferkette-betreffen-fast-jedes-dritte-unternehmen-in-deutschland/</loc>
		<lastmod>2026-03-06T16:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-flags-ongoing-exploitation-of-two-recently-patched-catalyst-sd-wan-flaws/</loc>
		<lastmod>2026-03-06T16:56:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-cyber-spillover-looms-in-iran-us-conflict/</loc>
		<lastmod>2026-03-06T16:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-apple-flaws-exploited-in-spyware-crypto-theft-attacks/</loc>
		<lastmod>2026-03-06T16:58:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenschutz-fbi-gelangt-an-zahlungsdaten-von-protonmail/</loc>
		<lastmod>2026-03-06T16:59:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-the-power-of-community-insights-and-opportunities/</loc>
		<lastmod>2026-03-06T17:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/900-certificates-used-by-fortune-500-governments-exposed-by-key-leaks/</loc>
		<lastmod>2026-03-06T17:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-attack-on-tfl-affected-10-million-people/</loc>
		<lastmod>2026-03-06T17:52:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-hack-exposes-3-9m-records-through-unpatched-react-vulnerability/</loc>
		<lastmod>2026-03-06T17:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lexisnexis-hack-exposes-3-9m-records-through-unpatched-react-vulnerability-2/</loc>
		<lastmod>2026-03-06T17:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-brings-passkey-logins-to-windows-11-expanding-passwordless-sign-ins/</loc>
		<lastmod>2026-03-06T17:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-feds-to-patch-ios-flaws-exploited-in-crypto-theft-attacks/</loc>
		<lastmod>2026-03-06T17:56:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-agents-using-ai-to-trick-western-firms-into-hiring-them-microsoft-says/</loc>
		<lastmod>2026-03-06T17:57:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-die-meisten-unternehmen-ignorieren-anmeldepflicht-beim-bsi/</loc>
		<lastmod>2026-03-06T17:58:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-bridges-breaking-pipelines-introducing-trajan/</loc>
		<lastmod>2026-03-06T18:52:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-makers-topped-googles-list-of-zero-day-exploits-for-the-first-time-in-2025/</loc>
		<lastmod>2026-03-06T18:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/only-30-minutes-per-quarter-on-cyber-risk-why-ciso-board-conversations-are-falling-short/</loc>
		<lastmod>2026-03-06T18:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-ciso-deputy-ciso-exit-amid-reported-it-leadership-overhaul/</loc>
		<lastmod>2026-03-06T18:55:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatlocker-driving-reimagined-zero-trust-consolidation-for-msps-partners/</loc>
		<lastmod>2026-03-06T18:56:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-hackers-bypassed-mfa-with-a-120-phishing-kit-until-a-global-takedown-shut-it-down/</loc>
		<lastmod>2026-03-06T18:58:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-hackers-bypassed-mfa-with-a-120-phishing-kit-until-a-global-takedown-shut-it-down/</loc>
		<lastmod>2026-03-06T18:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-and-unpredictable-targeting-remain-an-iran-risk/</loc>
		<lastmod>2026-03-06T18:59:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-apts-use-ai-to-enhance-it-worker-scams/</loc>
		<lastmod>2026-03-06T19:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analysis-blast-radius-for-third-party-breaches-bigger-than-reported/</loc>
		<lastmod>2026-03-06T19:50:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-actions-critical-for-cybersecurity-leadership-during-international-conflicts/</loc>
		<lastmod>2026-03-06T19:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-binary-star/</loc>
		<lastmod>2026-03-06T19:52:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-protection-officer-dpo-and-new-edps-rules/</loc>
		<lastmod>2026-03-06T19:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-and-the-pentagon/</loc>
		<lastmod>2026-03-06T19:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auth0-vendor-evaluation-authentication-sso-access-management-ciam-analysis-2026/</loc>
		<lastmod>2026-03-06T19:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-north-korean-threat-groups-are-scaling-up-fake-worker-schemes-with-generative-ai/</loc>
		<lastmod>2026-03-06T19:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-found-22-vulnerabilities-in-firefox-over-two-weeks/</loc>
		<lastmod>2026-03-06T19:57:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyware-disguised-as-emergency-alert-app-sent-to-israeli-smartphones/</loc>
		<lastmod>2026-03-06T19:58:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-the-panic-the-reality-of-claude-code-security/</loc>
		<lastmod>2026-03-06T19:59:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-urged-to-go-deep-in-ot-security-guidance/</loc>
		<lastmod>2026-03-06T20:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modernizing-hipaa-are-you-ready/</loc>
		<lastmod>2026-03-06T20:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-multi-billion-dollar-ai-bet-who-owns-the-outcome/</loc>
		<lastmod>2026-03-06T20:02:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-lc-flaws-could-bypass-certificate-verification/</loc>
		<lastmod>2026-03-06T20:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigates-suspicious-activity-in-surveillance-platform/</loc>
		<lastmod>2026-03-06T20:04:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberproof-2026-report-warns-of-rising-identity-and-ai-cyberattacks/</loc>
		<lastmod>2026-03-06T20:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/middle-east-conflict-fuels-opportunistic-cyber-attacks/</loc>
		<lastmod>2026-03-06T20:50:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-take-notice-of-ios-vulnerabilities-exploited-under-mysterious-circumstances/</loc>
		<lastmod>2026-03-06T20:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-tycoon-2fa-disrupting-a-global-phishing-operation/</loc>
		<lastmod>2026-03-06T20:52:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-irans-internet-is-more-uncertain-than-ever/</loc>
		<lastmod>2026-03-06T20:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cognizant-trizetto-breach-exposes-health-data-of-3-4-million-patients/</loc>
		<lastmod>2026-03-06T20:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-is-investigating-the-sophisticated-hack-of-its-surveillance-system/</loc>
		<lastmod>2026-03-06T21:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-please-dont-stop-the-music-adversarial-red-teaming-of-ai-music-generation-models/</loc>
		<lastmod>2026-03-06T21:50:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-taps-anthropic-ai-bug-hunter-but-rancid-ram-still-flipping-bits/</loc>
		<lastmod>2026-03-06T21:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-muddywater-deploys-dindoor-malware-against-u-s-organizations/</loc>
		<lastmod>2026-03-06T21:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-ocr-fines-firm-10k-in-breach-affecting-15-million/</loc>
		<lastmod>2026-03-06T21:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-flaw-lets-attackers-create-admin-accounts/</loc>
		<lastmod>2026-03-06T21:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-flaw-lets-attackers-create-admin-accounts-2/</loc>
		<lastmod>2026-03-06T21:55:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-arrests-suspect-in-46m-u-s-marshals-crypto-theft/</loc>
		<lastmod>2026-03-06T21:56:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-exploits-cloud-breaches-and-identity-gaps-define-this-weeks-cybersecurity-landscape/</loc>
		<lastmod>2026-03-06T21:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-chrome-extension-backdoor-how-productivity-tools-became-enterprise-attack-vectors/</loc>
		<lastmod>2026-03-06T22:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attackers-using-new-tactic-to-evade-detection-says-microsoft/</loc>
		<lastmod>2026-03-06T22:51:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-use-malware-trio-for-telecom-espionage/</loc>
		<lastmod>2026-03-06T22:52:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hhs-ocr-fines-firm-10k-in-breach-affecting-15m/</loc>
		<lastmod>2026-03-06T22:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-moves-to-cut-anthropic-from-defense-ai-work/</loc>
		<lastmod>2026-03-06T22:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-well-can-agentic-ai-handle-complex-security-needs/</loc>
		<lastmod>2026-03-06T23:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-security-solutions-fit-small-business-budgets/</loc>
		<lastmod>2026-03-06T23:50:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-agentic-ai-systems-enhance-security-frameworks/</loc>
		<lastmod>2026-03-06T23:52:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-defense-before-offense-leadership-risk-and-the-cost-of-bad-decisions-steven-elliott/</loc>
		<lastmod>2026-03-06T23:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-new-cybersecurity-strategy-makes-promises-but-lacks-details/</loc>
		<lastmod>2026-03-06T23:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-long-awaited-trump-cyber-strategy-has-arrived/</loc>
		<lastmod>2026-03-06T23:56:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-war-unlikely-to-disrupt-israeli-vendor-presence-at-rsac/</loc>
		<lastmod>2026-03-06T23:57:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-strategy-emphasizes-offensive-operations-deregulation-ai/</loc>
		<lastmod>2026-03-07T00:48:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-click-on-this-fake-google-meet-update-can-give-attackers-control-of-your-pc/</loc>
		<lastmod>2026-03-07T04:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-treffen-zunehmend-den-mittelstand/</loc>
		<lastmod>2026-03-07T04:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bverwg-urteil-erschwert-datenschutzrechtliche-kontrolle-des-bnd-durch-bfdi/</loc>
		<lastmod>2026-03-07T04:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isaca-veroffentlicht-update-des-it-audit-frameworks-itaf/</loc>
		<lastmod>2026-03-07T04:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-pledges-action-on-cybercrime-and-cyberspace-threats/</loc>
		<lastmod>2026-03-07T04:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigates-suspicious-activity-in-surveillance-platform-2/</loc>
		<lastmod>2026-03-07T04:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-ai-exposes-22-firefox-vulnerabilities-in-just-two-weeks/</loc>
		<lastmod>2026-03-07T04:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibeware-wie-gut-ist-vibe-code-malware/</loc>
		<lastmod>2026-03-07T05:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-der-login-zur-einfallstur-wird-neue-oauth-missbrauchskampagnen-im-fokus/</loc>
		<lastmod>2026-03-07T08:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-jedes-zweite-unternehmen-stoppt-ki-projekte/</loc>
		<lastmod>2026-03-07T09:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ai-in-deutschland-nicht-an-innovation-scheitert-sondern-am-betrieb/</loc>
		<lastmod>2026-03-07T09:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-auditability-why-leaders-must-prove-how-ai-makes-decisions/</loc>
		<lastmod>2026-03-07T11:50:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-auditability-why-leaders-must-prove-how-ai-makes-decisions-2/</loc>
		<lastmod>2026-03-07T11:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/system-audit-reports-in-the-banking-sector-key-expectations/</loc>
		<lastmod>2026-03-07T11:52:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/system-audit-reports-in-the-banking-sector-key-expectations-2/</loc>
		<lastmod>2026-03-07T11:52:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence/</loc>
		<lastmod>2026-03-07T11:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence-2/</loc>
		<lastmod>2026-03-07T11:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-each-gulf-country-is-intercepting-iranian-missiles-and-drones/</loc>
		<lastmod>2026-03-07T11:56:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-browser-addon-targets-imtoken-users-private-keys/</loc>
		<lastmod>2026-03-07T11:57:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-iran-to-ukraine-everyones-trying-to-hack-security-cameras/</loc>
		<lastmod>2026-03-07T12:50:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cbp-used-online-ad-data-to-track-phone-locations/</loc>
		<lastmod>2026-03-07T12:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-codex-security-built-to-automate-vulnerability-discovery-and-remediation/</loc>
		<lastmod>2026-03-07T12:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-jobs-als-it-governance-manager-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-03-07T12:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-jobs-als-it-governance-manager-gesucht-schau-dir-unsere-top-jobs-an-2/</loc>
		<lastmod>2026-03-07T12:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-gibt-deinen-status-bald-auch-fur-menschen-auserhalb-des-adressbuchs-frei-so-verhinderst-du-das/</loc>
		<lastmod>2026-03-07T12:55:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-state-laws-push-age-checks-into-the-operating-system/</loc>
		<lastmod>2026-03-07T13:49:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-state-laws-push-age-checks-into-the-operating-system-2/</loc>
		<lastmod>2026-03-07T13:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-spread-fake-red-alert-rocket-alert-app-to-spy-on-israeli-users/</loc>
		<lastmod>2026-03-07T13:50:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-4-6-ai-model-2/</loc>
		<lastmod>2026-03-07T13:51:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-4-6-ai-model/</loc>
		<lastmod>2026-03-07T13:51:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-news-service-claims-drone-strikes-on-aws-were-deliberate-to-probe-for-us-datacenter-dependencies/</loc>
		<lastmod>2026-03-07T15:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abusing-ai-at-every-stage-of-cyberattacks/</loc>
		<lastmod>2026-03-07T16:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-ai-red-teaming-and-automation-exploring-societal-risks-in-genai/</loc>
		<lastmod>2026-03-07T17:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheitsgesetz-im-entwurf-staatliche-eingriffe-in-netzinfrastrukturen-vorgesehen/</loc>
		<lastmod>2026-03-07T17:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-social-security-scam-emails-use-fake-tax-documents-to-hijack-pcs/</loc>
		<lastmod>2026-03-07T17:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/</loc>
		<lastmod>2026-03-07T17:52:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reading-white-house-president-trumps-cyber-strategy-for-america-march-2026/</loc>
		<lastmod>2026-03-07T18:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-codex-security-scanned-1-2-million-commits-and-found-10561-high-severity-issues/</loc>
		<lastmod>2026-03-07T18:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chardet-dispute-shows-how-ai-will-kill-software-licensing-argues-bruce-perens/</loc>
		<lastmod>2026-03-07T19:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-methods-ensure-nhis-are-fully-protected-online/</loc>
		<lastmod>2026-03-07T22:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-methods-ensure-nhis-are-fully-protected-online-2/</loc>
		<lastmod>2026-03-07T22:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-i-build-a-confident-nhi-lifecycle-strategy/</loc>
		<lastmod>2026-03-07T22:52:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-secrets-management-key-to-safe-agentic-ai-3/</loc>
		<lastmod>2026-03-07T22:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-secrets-management-key-to-safe-agentic-ai/</loc>
		<lastmod>2026-03-07T22:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-secrets-management-key-to-safe-agentic-ai-2/</loc>
		<lastmod>2026-03-07T22:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-probing-intrusion-into-a-system-managing-sensitive-surveillance-information/</loc>
		<lastmod>2026-03-07T23:48:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-small-and-mid-size-businesses-need-ciam-in-2026-and-why-the-cost-objection-no-longer-holds/</loc>
		<lastmod>2026-03-08T00:50:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-von-cloud-datenbanken-transparenz-und-kontrolle-in-dynamischen-it-umgebungen/</loc>
		<lastmod>2026-03-08T00:51:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-von-cloud-datenbanken-transparenz-und-kontrolle-in-dynamischen-it-umgebungen-2/</loc>
		<lastmod>2026-03-08T00:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/immer-mehr-daten-fur-us-behorden-online-diskussion-zum-glasernen-usa-reisenden/</loc>
		<lastmod>2026-03-08T00:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-dragon-chinesische-spionagekampagne-zielt-auf-europaische-behorden/</loc>
		<lastmod>2026-03-08T04:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-50-women-leaders-in-cybersecurity-to-watch-in-2026/</loc>
		<lastmod>2026-03-08T04:52:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-50-women-leaders-in-cybersecurity-to-watch-in-2026-2/</loc>
		<lastmod>2026-03-08T04:52:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberresilienz-beginnt-mit-backup-ein-rahmenwerk-fur-messbare-wiederherstellung/</loc>
		<lastmod>2026-03-08T06:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-360-grad-blick-auf-die-sicherheit-im-digitalen-raum/</loc>
		<lastmod>2026-03-08T06:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strategischer-mehrwert-intelligenter-co-piloten-in-der-cyberabwehr-warum-ki-die-xdr-mdr-strategie-neu-definiert/</loc>
		<lastmod>2026-03-08T06:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-identity-security-die-grundlage-jeder-cyberstrategie-ist-vertrauen-vor-dem-ernstfall/</loc>
		<lastmod>2026-03-08T06:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cylake-offers-ai-native-security-without-relying-on-cloud-services/</loc>
		<lastmod>2026-03-08T07:50:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fig-security-emerges-from-stealth-to-fix-broken-security-operations/</loc>
		<lastmod>2026-03-08T07:51:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-kicks-new-outlook-opt-out-deadline-down-the-road-to-2027/</loc>
		<lastmod>2026-03-08T08:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-developers-practical-guide-to-passwordless-authentication-in-2026/</loc>
		<lastmod>2026-03-08T09:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-ducklake-die-nachste-generation-der-datenarchitektur/</loc>
		<lastmod>2026-03-08T09:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-weaponized-oauth-redirection-logic-delivers-malware-patch-tuesday-forecast/</loc>
		<lastmod>2026-03-08T09:52:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-critical-infrastructure-in-a-time-of-war/</loc>
		<lastmod>2026-03-08T10:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-566-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-03-08T10:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romo-dji-staubsauger-hacker-bekommt-30-000-us-dollar/</loc>
		<lastmod>2026-03-08T10:52:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-kennt-kein-geschlecht-aber-oft-ein-ziel/</loc>
		<lastmod>2026-03-08T11:48:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-kennt-kein-geschlecht-aber-oft-ein-ziel-2/</loc>
		<lastmod>2026-03-08T11:48:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-87/</loc>
		<lastmod>2026-03-08T14:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/</loc>
		<lastmod>2026-03-08T14:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forcepoint-erweitert-data-security-cloud-mit-ki-assistent-aria/</loc>
		<lastmod>2026-03-08T14:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-cves-ki-findet-100-firefox-lucken-in-zwei-wochen/</loc>
		<lastmod>2026-03-08T14:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-lays-out-a-high-level-strategy-to-combat-cybercrime/</loc>
		<lastmod>2026-03-08T15:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-github-malware-operation-spreads-boryptgrab-stealer/</loc>
		<lastmod>2026-03-08T15:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-exploit-fur-30-dollar-im-darknet-so-konnen-hacker-dein-gerat-unbrauchbar-machen/</loc>
		<lastmod>2026-03-08T15:51:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschter-google-sicherheitscheck-diese-perfide-masche-raumt-dein-konto-leer/</loc>
		<lastmod>2026-03-08T15:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diese-schadsoftware-lasst-sich-von-googles-ki-erklaren-wie-sie-dein-smartphone-kapert/</loc>
		<lastmod>2026-03-08T15:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-trust-agility-in-an-era-of-transient-ties-rethinking-tls-trust-in-a-rapidly-evolving-ecosystem/</loc>
		<lastmod>2026-03-08T16:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/</loc>
		<lastmod>2026-03-08T16:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-nginx-ui-flaw-cve-2026-27944-exposes-server-backups/</loc>
		<lastmod>2026-03-08T20:50:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-ai-ethics-influence-trust-in-autonomous-systems/</loc>
		<lastmod>2026-03-08T23:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-nhis-driving-innovation-in-cybersecurity/</loc>
		<lastmod>2026-03-08T23:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-proactive-ai-agents-redefine-enterprise-security/</loc>
		<lastmod>2026-03-08T23:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-policy-enforcement-in-quantum-secure-discovery-services/</loc>
		<lastmod>2026-03-09T00:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-doorbells-wont-you-see-my-neighbor-lock-and-code-s07e05/</loc>
		<lastmod>2026-03-09T00:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-doorbells-wont-you-see-my-neighbor-lock-and-code-s07e05-2/</loc>
		<lastmod>2026-03-09T00:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-assistants-are-moving-the-security-goalposts/</loc>
		<lastmod>2026-03-09T00:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ring-doorbells-wont-you-see-my-neighbor-lock-and-code-s07e05-3/</loc>
		<lastmod>2026-03-09T00:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dust-specter-iran-linked-hackers-weaponize-iraqi-government-sites-in-new-cyber-espionage-campaign/</loc>
		<lastmod>2026-03-09T00:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diagnosen-bundesverwaltungsgericht-setzt-verarbeitung-durch-private-krankenversicherer-klare-grenzen/</loc>
		<lastmod>2026-03-09T00:55:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-bitkom-warnt-vor-kurzfristiger-absenkung-des-schwellenwertes/</loc>
		<lastmod>2026-03-09T00:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-chinese-hackers-reached-americas-surveillance-infrastructure/</loc>
		<lastmod>2026-03-09T04:49:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-moving-faster-than-security-controls/</loc>
		<lastmod>2026-03-09T04:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tarnung-als-taktik-warum-ransomware-angriffe-raffinierter-werden/</loc>
		<lastmod>2026-03-09T04:51:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/torrent-of-threats-china-nexus-apt-uat-9244-hijacks-south-american-telecoms-with-peertime-backdoor/</loc>
		<lastmod>2026-03-09T04:52:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escalation-in-the-shadows-iranian-apt-seedworm-deploys-dindoor-backdoor-in-new-cyberoffensive/</loc>
		<lastmod>2026-03-09T04:54:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-tolerance-for-malicious-intrusions-nsfocuss-full-chain-web-security-protection-system/</loc>
		<lastmod>2026-03-09T05:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rings-jamie-siminoff-has-been-trying-to-calm-privacy-fears-since-the-super-bowl-but-his-answers-may-not-help/</loc>
		<lastmod>2026-03-09T05:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/submarine-cables-move-to-the-center-of-critical-infrastructure-security-debate/</loc>
		<lastmod>2026-03-09T05:52:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wifi-signals-can-track-human-activity-through-walls-by-mapping-body-keypoints/</loc>
		<lastmod>2026-03-09T05:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-extensions-breached-chat-histories-in-20000-enterprise-tenants/</loc>
		<lastmod>2026-03-09T05:54:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-users-to-actively-exploited-vulnerabilities-impacting-macos-and-ios/</loc>
		<lastmod>2026-03-09T05:55:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiktok-says-no-to-endend-encryption-heres-why-thats-a-big-deal/</loc>
		<lastmod>2026-03-09T06:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-angriffe-unterschatzte-gefahr-fur-deutsche-unternehmen/</loc>
		<lastmod>2026-03-09T06:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-ddos-abwehr-heute-geschaftskritisch-ist-digitale-resilienz-starken/</loc>
		<lastmod>2026-03-09T06:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/globale-cyberangriffe-im-ki-zeitalter-warum-deutschland-im-fokus-steht-und-wie-sich-unternehmen-schutzen-konnen/</loc>
		<lastmod>2026-03-09T06:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-tool-sage-puts-a-security-layer-between-ai-agents-and-the-os/</loc>
		<lastmod>2026-03-09T06:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-fing-desktop-puts-network-visibility-on-your-screen/</loc>
		<lastmod>2026-03-09T06:55:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-exiftool-vulnerability-allows-malicious-images-to-execute-code-on-macos/</loc>
		<lastmod>2026-03-09T06:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-tribes-vibeware-move-points-to-ai-made-malware-at-scale/</loc>
		<lastmod>2026-03-09T06:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missbrauch-von-ki-regierungsdaten-mithilfe-von-llm-claude-gestohlen/</loc>
		<lastmod>2026-03-09T06:58:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pqc-roadmap-remains-hazy-as-vendors-race-for-early-advantage/</loc>
		<lastmod>2026-03-09T07:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-silence-how-deaf-and-hardhearing-pros-are-breaking-into-cybersecurity/</loc>
		<lastmod>2026-03-09T07:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-expertise-into-opportunity-for-women-in-cybersecurity/</loc>
		<lastmod>2026-03-09T07:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nginx-ui-vulnerabilities-let-attackers-download-full-system-backups-2/</loc>
		<lastmod>2026-03-09T07:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nginx-ui-vulnerabilities-let-attackers-download-full-system-backups/</loc>
		<lastmod>2026-03-09T07:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exiftool-vulnerability-lets-malicious-images-trigger-macos-code-execution/</loc>
		<lastmod>2026-03-09T07:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hikvision-multiple-product-vulnerability-could-let-attackers-escalate-privileges/</loc>
		<lastmod>2026-03-09T07:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jailbreaking-bedroht-ki-systeme-in-unternehmen-wie-unternehmen-ihre-ki-gegen-manipulation-absichern/</loc>
		<lastmod>2026-03-09T07:56:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-ways-to-prepare-your-soc-for-agentic-ai/</loc>
		<lastmod>2026-03-09T08:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clipxdaemon-malware-a-stealthy-cryptocurrency-clipboard-hijacker-on-linux-2/</loc>
		<lastmod>2026-03-09T08:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clipxdaemon-malware-a-stealthy-cryptocurrency-clipboard-hijacker-on-linux/</loc>
		<lastmod>2026-03-09T08:52:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/60-years-since-humanity-first-touched-the-surface-of-another-planet/</loc>
		<lastmod>2026-03-09T08:52:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brits-fear-ai-will-strip-the-human-touch-from-public-services/</loc>
		<lastmod>2026-03-09T08:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brits-fear-ai-will-strip-the-human-touch-from-public-services-2/</loc>
		<lastmod>2026-03-09T08:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bundle-of-human-neurons-hooked-to-silicon-learns-to-stumble-through-doom/</loc>
		<lastmod>2026-03-09T08:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-opus-ai-model-discovers-22-firefox-bugs/</loc>
		<lastmod>2026-03-09T08:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/web-server-exploits-and-mimikatz-used-in-attacks-targeting-asian-critical-infrastructure/</loc>
		<lastmod>2026-03-09T08:56:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intelligence-und-private-scanning-cohesity-integriert-google-funktionen-fur-die-sicherheit-von-backup-daten/</loc>
		<lastmod>2026-03-09T08:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-most-influential-women-in-cybersecurity-you-should-follow-in-2026/</loc>
		<lastmod>2026-03-09T09:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-march-2-march-8/</loc>
		<lastmod>2026-03-09T09:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-best-practices-to-get-iam-implementation-right-the-first-time/</loc>
		<lastmod>2026-03-09T09:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-will-impact-security-careers-and-what-leaders-should-do-about-it/</loc>
		<lastmod>2026-03-09T09:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-will-impact-security-careers-and-what-leaders-should-do-about-it-2/</loc>
		<lastmod>2026-03-09T09:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogues-gallery-15-worst-ransomware-groups-active-today/</loc>
		<lastmod>2026-03-09T09:54:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1-click-zitadel-vulnerability-could-allow-full-system-takeover/</loc>
		<lastmod>2026-03-09T09:55:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-generalanwalt-banken-sollen-phishing-opfer-immer-sofort-entschadigen/</loc>
		<lastmod>2026-03-09T09:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/112-or-22-to-2-who-moved-the-vulnerability-cheese-2/</loc>
		<lastmod>2026-03-09T10:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/112-or-22-to-2-who-moved-the-vulnerability-cheese/</loc>
		<lastmod>2026-03-09T10:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weve-seen-ransomware-cost-american-lives-heres-what-it-will-actually-take-to-stop-it/</loc>
		<lastmod>2026-03-09T10:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/royal-navy-races-to-arm-ships-against-drone-threat/</loc>
		<lastmod>2026-03-09T10:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-ai-tools-more-burnout-new-research-explains-why/</loc>
		<lastmod>2026-03-09T10:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-joins-the-race-in-ai-assisted-code-security/</loc>
		<lastmod>2026-03-09T10:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-group-in-vietnam-enables-massive-fraudulent-signups/</loc>
		<lastmod>2026-03-09T10:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghanaian-pleads-guilty-to-role-in-100m-romance-scam/</loc>
		<lastmod>2026-03-09T10:57:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/personliche-haftung-verandert-risikokultur-in-unternehmen-schwachstelle-governance-wo-die-nis2-umsetzung-wirklich-scheitert/</loc>
		<lastmod>2026-03-09T10:58:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-threat-report-zeigt-wandel-bei-zero-day-angriffen/</loc>
		<lastmod>2026-03-09T10:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-news-in-push-mitteilungen-stiftung-warentest-entdeckt-betrugsversuch-auf-xiaomi-handy/</loc>
		<lastmod>2026-03-09T11:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fur-220-000-us-dollar-exploit-fur-gefahrliche-windows-lucke-steht-zum-verkauf/</loc>
		<lastmod>2026-03-09T11:01:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-install-pages-highlight-rise-of-installfix/</loc>
		<lastmod>2026-03-09T11:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-install-pages-highlight-rise-of-installfix-2/</loc>
		<lastmod>2026-03-09T11:54:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-zookeeper-flaw-exposes-sensitive-data-to-attackers/</loc>
		<lastmod>2026-03-09T11:55:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maas-vip-keylogger-campaign-uses-steganography-to-steal-credentials-at-scale/</loc>
		<lastmod>2026-03-09T11:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clipxdaemon-malware-targets-crypto-users-in-linux-x11-sessions/</loc>
		<lastmod>2026-03-09T11:57:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-extension-turns-malicious-after-ownership-transfer-enabling-code-injection-and-data-theft/</loc>
		<lastmod>2026-03-09T11:58:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trizetto-provider-solutions-breach-hits-3-4-million-patients/</loc>
		<lastmod>2026-03-09T11:59:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-portland-timbers-expand-from-data-protection-to-cybersecurity-with-acronis/</loc>
		<lastmod>2026-03-09T11:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tausende-reisen-bsi-frist-und-riskieren-strafen/</loc>
		<lastmod>2026-03-09T11:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-nginx-ui-vulnerability-exposes-server-backups-and-sensitive-data/</loc>
		<lastmod>2026-03-09T11:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-governance-as-a-prerequisite-for-zero-trust-identity-architecture/</loc>
		<lastmod>2026-03-09T12:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-codex-security-found-11000-high-impact-bugs-in-a-month/</loc>
		<lastmod>2026-03-09T12:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-cto-set-claude-on-his-1986-apple-ii-code-says-it-found-vulns/</loc>
		<lastmod>2026-03-09T12:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-cto-set-claude-on-his-1986-apple-ii-code-says-it-found-vulns-2/</loc>
		<lastmod>2026-03-09T12:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-cto-set-claude-on-his-1986-apple-ii-code-says-it-found-vulns-3/</loc>
		<lastmod>2026-03-09T12:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-bot-hackerbot-claw-targets-microsoft-datadog-and-cncf-github-repos/</loc>
		<lastmod>2026-03-09T12:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cognizants-trizetto-provider-solutions-data-breach-impacted-over-3-4-million-patients/</loc>
		<lastmod>2026-03-09T12:55:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openwrt-25-12-0-ships-with-new-package-manager-built-in-upgrade-tool-support-for-2200-devices/</loc>
		<lastmod>2026-03-09T12:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-target-u-s-critical-infrastructure-amid-rising-cyber-threats/</loc>
		<lastmod>2026-03-09T12:57:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-espionage-group-cl-unk-1068-linked-to-china-targets-asian-infrastructure/</loc>
		<lastmod>2026-03-09T12:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vaultwarden-vulnerabilities-enable-privilege-escalation-and-data-exposure/</loc>
		<lastmod>2026-03-09T12:59:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-the-security-platform-finally-deliver-for-the-mid-market/</loc>
		<lastmod>2026-03-09T13:00:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-schwachstellen-auf-rekordniveau-der-blinde-fleck-bei-industriellen-steuerungssystemen-wird-groser/</loc>
		<lastmod>2026-03-09T13:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-effizienz-und-gefahr-chancen-und-risiken-von-openclaw/</loc>
		<lastmod>2026-03-09T13:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-einzelfall-dhl-kunde-verliert-600-euro-paket-in-packstation-2/</loc>
		<lastmod>2026-03-09T13:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-einzelfall-dhl-kunde-verliert-600-euro-paket-in-packstation/</loc>
		<lastmod>2026-03-09T13:03:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ai-powered-poly-crisis-is-here-and-it-is-rewriting-cyber-postures-are-you-breach-ready-yet/</loc>
		<lastmod>2026-03-09T13:49:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-attack-against-wi-fi/</loc>
		<lastmod>2026-03-09T13:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-komplexitat-zum-grosten-risikofaktor-wird/</loc>
		<lastmod>2026-03-09T13:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-reply-und-data-reply-legen-mit-cerebra-das-strategische-fundament-fur-ki-innovationen-bei-siemens-healthineers/</loc>
		<lastmod>2026-03-09T13:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierung-mit-ki-agenten-wie-openclaw-steigert-produktivitat-gleichzeitig-aber-auch-das-sicherheitsrisiko/</loc>
		<lastmod>2026-03-09T13:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-cops-warn-100-alleged-scammers-turn-yourselves-in-or-we-tell-grandma/</loc>
		<lastmod>2026-03-09T13:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-cybercrims-phish-their-way-into-officials-signal-and-whatsapp-accounts/</loc>
		<lastmod>2026-03-09T13:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-more-soft-play-president-trump-warns-in-new-cyber-strategy/</loc>
		<lastmod>2026-03-09T13:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boryptgrab-malware-abuses-github-to-steal-browser-and-crypto-wallet-data/</loc>
		<lastmod>2026-03-09T13:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-in-europa-sopra-steria-und-sap-kooperieren-bei-souveranen-cloud-losungen/</loc>
		<lastmod>2026-03-09T13:58:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-application-testing-from-traditional-methods-to-ai-powered-qa/</loc>
		<lastmod>2026-03-09T14:51:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-27739-angular-ssr-request-vulnerability-enabling-server-side-request-forgery/</loc>
		<lastmod>2026-03-09T14:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-attack-alert-analysis-strengthening-organizational-cyber-defense-through-early-detection/</loc>
		<lastmod>2026-03-09T14:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-angriffe-auf-basis-kunstlicher-intelligenz-gewinnen-rasant-an-bedeutung/</loc>
		<lastmod>2026-03-09T14:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-muddywater-hackers-target-us-firms-with-new-dindoor-backdoor/</loc>
		<lastmod>2026-03-09T14:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt36-unleashes-ai-generated-vibeware-to-flood-targets/</loc>
		<lastmod>2026-03-09T14:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/celebrating-international-womens-day-2026/</loc>
		<lastmod>2026-03-09T14:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-security-is-emerging-as-the-fourth-pillar-of-cybersecurity/</loc>
		<lastmod>2026-03-09T14:58:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-still-working-to-fix-windows-explorer-white-flashes/</loc>
		<lastmod>2026-03-09T14:59:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-cleanmymac-site-spreads-shub-stealer-targets-crypto-wallets/</loc>
		<lastmod>2026-03-09T15:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-we-ready-for-auto-remediation-with-agentic-ai/</loc>
		<lastmod>2026-03-09T15:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-launches-new-crackdown-unit-to-tackle-cyber-fraud-at-the-source/</loc>
		<lastmod>2026-03-09T15:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-startups-dominate-new-cyber-innovation-awards/</loc>
		<lastmod>2026-03-09T15:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-trusted-hardware-for-al-workloads-extending-confidential-computing-to-enable-al-adoption/</loc>
		<lastmod>2026-03-09T15:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-install-pages-hit-windows-and-mac-users-with-infostealers/</loc>
		<lastmod>2026-03-09T15:51:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quiz-sites-trick-users-into-enabling-unwanted-browser-notifications/</loc>
		<lastmod>2026-03-09T15:53:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quiz-sites-trick-users-into-enabling-unwanted-browser-notifications-2/</loc>
		<lastmod>2026-03-09T15:53:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quiz-sites-trick-users-into-enabling-unwanted-browser-notifications-3/</loc>
		<lastmod>2026-03-09T15:53:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kremlin-hackers-attempting-to-compromise-signal-whatsapp-accounts-globally/</loc>
		<lastmod>2026-03-09T15:54:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-internet-blackout-reaches-6th-day-as-rights-groups-call-for-end-to-digital-shutdown/</loc>
		<lastmod>2026-03-09T15:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indonesia-to-ban-children-under-16-from-social-media/</loc>
		<lastmod>2026-03-09T15:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigating-suspicious-activities-on-agency-network-following-february-incident/</loc>
		<lastmod>2026-03-09T15:57:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-raum-claudia-plattner-stellt-rundumblick-auf-die-sicherheit-mittels-wheel-of-motion-vor/</loc>
		<lastmod>2026-03-09T15:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsanalyse-mit-ki-anthropics-opus-4-6-findet-22-sicherheitslucken-in-firefox/</loc>
		<lastmod>2026-03-09T15:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-risk-advisors-releases-the-purple-perspective-2026-report/</loc>
		<lastmod>2026-03-09T16:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-crack-into-officials-signal-and-whatsapp-accounts/</loc>
		<lastmod>2026-03-09T16:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-password-audits-miss-the-accounts-attackers-actually-want/</loc>
		<lastmod>2026-03-09T16:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-cyber-threat-lurks-in-critical-asian-sectors-for-years/</loc>
		<lastmod>2026-03-09T16:03:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malware/</loc>
		<lastmod>2026-03-09T16:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-unveils-new-cyber-strategy-for-america/</loc>
		<lastmod>2026-03-09T16:05:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storung-des-satellitensystems-groser-nachrichtensender-in-pakistan-gehackt/</loc>
		<lastmod>2026-03-09T16:06:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forschungsprojekt-allhands-startet-fur-mehr-sicherheit-im-internet/</loc>
		<lastmod>2026-03-09T16:08:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrogs-repohunter-entdeckt-schwachstellen-in-ci-cd-workflows/</loc>
		<lastmod>2026-03-09T16:08:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/confoo-2026-guardrails-for-agentic-ai-prompts-and-supply-chains/</loc>
		<lastmod>2026-03-09T16:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-linked-actors-targeted-us-networks-in-lead-up-to-iran-war/</loc>
		<lastmod>2026-03-09T16:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn/</loc>
		<lastmod>2026-03-09T16:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-typhoon-is-hacking-the-worlds-phone-and-internet-giants-heres-everywhere-thats-been-hit/</loc>
		<lastmod>2026-03-09T16:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-hackers-target-signal-whatsapp-of-officials-globally/</loc>
		<lastmod>2026-03-09T16:55:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/</loc>
		<lastmod>2026-03-09T16:56:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-risk-advisors-releases-the-purple-perspective-2026-report-2/</loc>
		<lastmod>2026-03-09T16:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work-device/</loc>
		<lastmod>2026-03-09T16:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-exploits-flaws-and-uses-elastic-cloud-siem-to-manage-stolen-data/</loc>
		<lastmod>2026-03-09T16:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iranian-hacktivists-join-nation-state-groups-in-targeting-u-s-israel-others/</loc>
		<lastmod>2026-03-09T17:49:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-surfaces-higher-correlation-between-api-and-ai-security/</loc>
		<lastmod>2026-03-09T17:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-datadome-detects-intent-the-only-way-to-stop-fraud-in-the-ai-era/</loc>
		<lastmod>2026-03-09T17:51:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-zero-trust-security-in-saas-applications-a-practical-implementation-guide/</loc>
		<lastmod>2026-03-09T17:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-cybersecurity-monitoring/</loc>
		<lastmod>2026-03-09T17:54:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9th-march-threat-intelligence-report/</loc>
		<lastmod>2026-03-09T17:55:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-will-tag-third-party-bots-trying-to-join-meetings/</loc>
		<lastmod>2026-03-09T17:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/</loc>
		<lastmod>2026-03-09T17:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-crisis-global-firms-face-mounting-risks-amid-ai-surge-and-lack-of-recovery-testing/</loc>
		<lastmod>2026-03-09T18:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-dinosaurs-and-non-dinosaurs/</loc>
		<lastmod>2026-03-09T18:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/winning-the-ai-shortlist-geos-70-product-content-advantage/</loc>
		<lastmod>2026-03-09T18:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-named-a-challenger-in-the-2026-gartner-magic-quadrant-for-cps-protection-platforms/</loc>
		<lastmod>2026-03-09T18:54:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-named-a-challenger-in-the-2026-gartner-magic-quadrant-for-cps-protection-platforms-2/</loc>
		<lastmod>2026-03-09T18:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-program-funding-secured-easing-fears-of-repeat-crisis/</loc>
		<lastmod>2026-03-09T18:56:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sean-cairncross-lays-out-whats-coming-next-for-trumps-cyber-strategy/</loc>
		<lastmod>2026-03-09T18:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-acquires-promptfoo-to-secure-its-ai-agents/</loc>
		<lastmod>2026-03-09T18:57:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-cleanmymac-site-uses-clickfix-trick-to-install-shub-stealer-on-macos/</loc>
		<lastmod>2026-03-09T18:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metas-ai-safety-chief-couldnt-stop-her-own-agent-what-makes-you-think-you-can-stop-yours/</loc>
		<lastmod>2026-03-09T19:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-securing-metas-production-pki-credentials/</loc>
		<lastmod>2026-03-09T19:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-bets-on-ai-agent-security-with-promptfoo-acquisition/</loc>
		<lastmod>2026-03-09T19:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-typhoon-is-hacking-the-worlds-phone-and-internet-giants-heres-everywhere-thats-been-hit-2/</loc>
		<lastmod>2026-03-09T19:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-more-high-profile-victims-in-latest-salesforce-customers-data-heist/</loc>
		<lastmod>2026-03-09T19:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cleanmymac-imposter-site-installs-shub-stealer-on-macs/</loc>
		<lastmod>2026-03-09T19:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-launch-cyber-fraud-squad-in-april/</loc>
		<lastmod>2026-03-09T19:57:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-looks-to-power-up-post-quantum-ai-security/</loc>
		<lastmod>2026-03-09T19:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeams-agent-commander-bringing-guardrails-and-resilience-to-the-wild-west-of-ai/</loc>
		<lastmod>2026-03-09T19:59:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-us-discloses-data-breach-after-service-provider-hack/</loc>
		<lastmod>2026-03-09T20:00:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials/</loc>
		<lastmod>2026-03-09T20:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/x-suspends-800m-accounts-in-one-year-amid-massive-scale-of-manipulation-attempts/</loc>
		<lastmod>2026-03-09T20:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-cisos-continue-to-struggle-to-strike-right-risk-balance/</loc>
		<lastmod>2026-03-09T20:50:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sensor-level-access-control-a-game-changer-for-colocation-providers/</loc>
		<lastmod>2026-03-09T20:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conflicting-definitions-and-timelines-causing-cybersecurity-regulation-morass-industry-reps-say/</loc>
		<lastmod>2026-03-09T20:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-white-house-cyber-strategy-pledges-to-ease-regulations-impose-costs-on-bad-actors/</loc>
		<lastmod>2026-03-09T20:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/documentation-fraud-a-verification-architecture-failure/</loc>
		<lastmod>2026-03-09T20:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-freeall-over-cisco-sd-wan-flaw/</loc>
		<lastmod>2026-03-09T20:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-probe-critical-infrastructure-for-low-cost-entry/</loc>
		<lastmod>2026-03-09T20:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-security-report-data-extortion-ransomware-loses-steam/</loc>
		<lastmod>2026-03-09T20:57:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-organizational-walls/</loc>
		<lastmod>2026-03-09T20:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-chasing-threats-start-containing-them/</loc>
		<lastmod>2026-03-09T20:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-floats-victims-restoration-program-for-millions-affected-by-cyber-fraud/</loc>
		<lastmod>2026-03-09T21:51:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-phishing-refunds-should-be-easier-says-cjeu-advisor/</loc>
		<lastmod>2026-03-09T21:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/going-passwordless-in-healthcare-overcoming-hurdles/</loc>
		<lastmod>2026-03-09T21:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/avideo-zero-click-flaw-lets-attackers-hijack-live-streams/</loc>
		<lastmod>2026-03-09T21:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/installfix-attacks-spread-fake-claude-code-sites/</loc>
		<lastmod>2026-03-09T21:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aeo-vs-geo-vs-aio-what-these-terms-actually-mean-and-why-your-business-needs-to-care/</loc>
		<lastmod>2026-03-09T22:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/president-trumps-cyber-strategy-for-america-what-it-means-for-the-u-s-and-why-it-matters-globally/</loc>
		<lastmod>2026-03-09T22:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-will-test-infrastructure-cybersecurity-approaches-in-pilot-program/</loc>
		<lastmod>2026-03-09T22:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-vs-ai-agent-hacked-mckinseys-chatbot-and-gained-full-read-write-access-in-just-two-hours/</loc>
		<lastmod>2026-03-09T22:56:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-alert-scammers-target-zoning-permit-applicants/</loc>
		<lastmod>2026-03-09T22:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-sues-after-us-government-cuts-off-ai-contracts/</loc>
		<lastmod>2026-03-09T22:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-targets-imtoken-wallet-users/</loc>
		<lastmod>2026-03-09T22:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-attacks-exploit-flaws-more-than-weak-credentials/</loc>
		<lastmod>2026-03-09T23:00:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-govt-warns-of-signal-whatsapp-account-hijacking-attacks/</loc>
		<lastmod>2026-03-09T23:02:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-cyber-strategy-prioritizes-offense/</loc>
		<lastmod>2026-03-09T23:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-the-salesforce-graphql-exploit-and-what-you-should-do/</loc>
		<lastmod>2026-03-09T23:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escape-raises-18m-series-a-to-replace-legacy-scanners-with-ai-agent-driven-discovery-pentesting-and-remediation/</loc>
		<lastmod>2026-03-09T23:50:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-scalable-secrets-management-systems-more-effective-2/</loc>
		<lastmod>2026-03-09T23:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-scalable-secrets-management-systems-more-effective/</loc>
		<lastmod>2026-03-09T23:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-scalable-secrets-management-systems-more-effective-3/</loc>
		<lastmod>2026-03-09T23:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-assurances-do-ai-governance-frameworks-offer/</loc>
		<lastmod>2026-03-09T23:53:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-feel-empowered-by-your-nhis-and-ai/</loc>
		<lastmod>2026-03-09T23:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-identity-for-tak-atak-at-the-tactical-edge/</loc>
		<lastmod>2026-03-09T23:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-nominee-to-lead-cyber-command-nsa-clears-key-senate-hurdle/</loc>
		<lastmod>2026-03-09T23:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-intel-warns-of-russian-hackers-hijacking-signal-whatsapp-attacks/</loc>
		<lastmod>2026-03-09T23:57:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagons-anthropic-ban-is-a-wake-up-call-for-cios/</loc>
		<lastmod>2026-03-09T23:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-phishing-targets-employees-with-backdoors/</loc>
		<lastmod>2026-03-09T23:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomalous-prompt-injection-detection-in-quantum-secured-ai-pipelines/</loc>
		<lastmod>2026-03-10T00:50:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ambivalenz-malware-erkennungen-gesunken-blockierte-schadliche-urls-zugenommen/</loc>
		<lastmod>2026-03-10T00:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-abwagen-zwischen-produktivitat-und-sicherheitsrisiko/</loc>
		<lastmod>2026-03-10T00:52:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-phishing-targets-employees-with-a0backdoor-malware/</loc>
		<lastmod>2026-03-10T00:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-phishing-targets-employees-with-a0backdoor-malware-2/</loc>
		<lastmod>2026-03-10T00:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-really-fun-rsa-2026-presentations/</loc>
		<lastmod>2026-03-10T04:50:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-us-unit-reports-data-breach-tied-to-third-party-service-provider/</loc>
		<lastmod>2026-03-10T04:51:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-u-s-military-contractor/</loc>
		<lastmod>2026-03-10T04:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-microsoft-teams-to-manipulate-employees-into-allowing-remote-access/</loc>
		<lastmod>2026-03-10T05:49:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/third-party-risiken-im-fokus/</loc>
		<lastmod>2026-03-10T06:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasscom-calls-for-vigilance-as-firms-brace-for-impact-from-west-asia-conflict/</loc>
		<lastmod>2026-03-10T06:51:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-people-behind-cyber-extortion-are-often-in-their-forties/</loc>
		<lastmod>2026-03-10T06:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bug-bounties-are-broken-and-the-best-security-pros-are-moving-on/</loc>
		<lastmod>2026-03-10T06:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-files-lawsuit-against-u-s-government-over-claude-risk-designation/</loc>
		<lastmod>2026-03-10T06:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostclaw-masquerades-as-openclaw-in-bid-to-plunder-developer-data/</loc>
		<lastmod>2026-03-10T06:55:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-gerate-in-gefahr-zero-day-lucke-betrifft-235-qualcomm-chipsets/</loc>
		<lastmod>2026-03-10T06:56:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-piggybacking-attacks-threaten-organizational-security-3/</loc>
		<lastmod>2026-03-10T07:50:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-piggybacking-attacks-threaten-organizational-security-2/</loc>
		<lastmod>2026-03-10T07:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-piggybacking-attacks-threaten-organizational-security/</loc>
		<lastmod>2026-03-10T07:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-safety-constrains-defenders-more-than-attackers/</loc>
		<lastmod>2026-03-10T07:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-safety-constrains-defenders-more-than-attackers-2/</loc>
		<lastmod>2026-03-10T07:52:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploiting-the-crisis-chinese-apts-weaponize-middle-east-tensions-to-target-qatar-with-plugx/</loc>
		<lastmod>2026-03-10T07:53:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wa-auditor-general-flags-weak-microsoft-365-security-controls-across-state-entities/</loc>
		<lastmod>2026-03-10T07:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airbus-cso-on-supply-chain-blind-spots-space-threats-and-the-limits-of-ai-red-teaming/</loc>
		<lastmod>2026-03-10T07:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signed-malware-posing-as-teams-and-zoom-apps-drops-rmm-backdoors/</loc>
		<lastmod>2026-03-10T07:56:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-confirms-sophisticated-phishing-scheme-caused-account-compromises/</loc>
		<lastmod>2026-03-10T07:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-campaign-uses-middle-east-lures-to-target-qatar-with-plugx/</loc>
		<lastmod>2026-03-10T07:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-exploited/</loc>
		<lastmod>2026-03-10T07:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-malware-as-a-service-tarnt-sich-als-rmm-tool-malware-fur-300-dollar-im-monat-mieten/</loc>
		<lastmod>2026-03-10T08:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isc2-work-force-studie-stellenbesetzung-und-lage-der-cybersicherheitsexperten-bleibt-trotz-ki-angespannt-hochmotivierte-teams-sichern-am-besten/</loc>
		<lastmod>2026-03-10T08:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-unternehmen-sind-das-neue-hauptziel/</loc>
		<lastmod>2026-03-10T08:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-komplexitat-zum-grosten-risikofaktor-fur-die-cybersecurity-wird/</loc>
		<lastmod>2026-03-10T08:53:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pki-und-ot-vom-digitalen-zertifikat-zur-cyberresilienz-schwierige-gratwanderung/</loc>
		<lastmod>2026-03-10T08:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-im-iam-vorsicht-walten-lassen-und-mit-kontext-prompten/</loc>
		<lastmod>2026-03-10T08:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/i-replaced-manual-pen-tests-with-automation-heres-what-i-learned/</loc>
		<lastmod>2026-03-10T08:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-forces-polish-hospital-revert-to-paper-based-operations/</loc>
		<lastmod>2026-03-10T08:57:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surxrat-android-malware-uses-llms-for-phishing-and-data-theft/</loc>
		<lastmod>2026-03-10T08:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iphone-hacking-toolkit-tied-to-russian-espionage-may-have-originated-in-the-u-s/</loc>
		<lastmod>2026-03-10T09:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-tool/</loc>
		<lastmod>2026-03-10T09:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerksicherheit-und-regulierung-in-kritischen-infrastrukturen-blinde-flecken-beim-eu-vendor-ban/</loc>
		<lastmod>2026-03-10T09:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-heute-um-17-uhr-live-stell-deine-fragen-zur-digitalen-souveranitat/</loc>
		<lastmod>2026-03-10T09:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/separate-siem-edr-architektur-vs-integrierte-siem-xdr-plattform-traditionell-oder-integriert/</loc>
		<lastmod>2026-03-10T09:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-access-decisions-are-becoming-the-weakest-link-in-identity-security/</loc>
		<lastmod>2026-03-10T09:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leading-myanmar-fleet-management-company-yoma-fleet-selects-accuknox-siem-to-replace-legacy-tools/</loc>
		<lastmod>2026-03-10T09:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-disrupted-tycoon-2fa-phishing-as-a-service-platform/</loc>
		<lastmod>2026-03-10T09:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-campaign-spoofs-local-officials-to-steal-permit-fees/</loc>
		<lastmod>2026-03-10T09:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-to-acquire-promptfoo-to-address-vulnerabilities-in-ai-systems-2/</loc>
		<lastmod>2026-03-10T09:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-to-acquire-promptfoo-to-address-vulnerabilities-in-ai-systems/</loc>
		<lastmod>2026-03-10T09:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-telekommunikationsnetze-zum-top-ziel-fur-cyberangriffe-geworden-sind/</loc>
		<lastmod>2026-03-10T09:57:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geheimdienste-warnen-spione-kapern-reihenweise-signal-und-whatsapp-konten/</loc>
		<lastmod>2026-03-10T09:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mind-is-the-first-data-security-company-to-achieve-iso-42001-certification/</loc>
		<lastmod>2026-03-10T10:49:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-its-not-unnecessarily-burdensome-to-control-your-own-data/</loc>
		<lastmod>2026-03-10T10:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-us-confirms-breach-after-third-party-provider-attack/</loc>
		<lastmod>2026-03-10T10:51:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-chooses-nuclear-escalation-in-95-of-simulated-crises/</loc>
		<lastmod>2026-03-10T10:52:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-claude-tool-uses-ai-agents-to-find-bugs-in-pull-requests/</loc>
		<lastmod>2026-03-10T10:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/</loc>
		<lastmod>2026-03-10T10:54:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gogs-flaw-could-let-attackers-quietly-overwrite-large-file-storage-data/</loc>
		<lastmod>2026-03-10T10:56:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-pingora-flaws-enable-request-smuggling-and-cache-poisoning-attacks/</loc>
		<lastmod>2026-03-10T10:57:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-targets-hundreds-of-websites-in-new-salesforce-campaign/</loc>
		<lastmod>2026-03-10T10:57:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kurz-vor-fristende-am-6-marz-2026-run-auf-bsi-registrierungsportal/</loc>
		<lastmod>2026-03-10T10:58:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prevention-is-the-only-cloud-security-strategy-that-works/</loc>
		<lastmod>2026-03-10T11:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-just-made-executives-the-easiest-targets-on-the-internet/</loc>
		<lastmod>2026-03-10T11:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-download-and-install-safenet-authentication-client-for-sectigo-code-signing-certificates/</loc>
		<lastmod>2026-03-10T11:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telekommunikation-ist-die-konigsklasse-fur-die-cyberkriminalitat/</loc>
		<lastmod>2026-03-10T11:54:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ot-security-time-bomb-why-legacy-industrial-systems-are-the-biggest-cyber-risk-nobody-wants-to-fix/</loc>
		<lastmod>2026-03-10T11:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-ivanti-epm-solarwinds-and-omnissa-workspace-one-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-10T11:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teen-crew-caught-selling-ddos-attack-tools/</loc>
		<lastmod>2026-03-10T11:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-spy-tool-has-been-quietly-stealing-data-for-years/</loc>
		<lastmod>2026-03-10T11:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-enable-windows-hotpatch-security-updates-by-default/</loc>
		<lastmod>2026-03-10T11:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leading-myanmar-fleet-management-company-yoma-fleet-selects-accuknox-siem-to-replace-legacy-tools-2/</loc>
		<lastmod>2026-03-10T12:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-advisory-surge-highlights-blind-spot-between-github-and-cve-vulnerability-tracking/</loc>
		<lastmod>2026-03-10T12:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-ki-agent-zerstort-lernplattform-mit-25-jahren-an-inhalten/</loc>
		<lastmod>2026-03-10T12:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-target-whatsapp-and-signal-accounts-of-global-military-and-government-officials/</loc>
		<lastmod>2026-03-10T12:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-panda-technology-transformed-its-operations-with-acronis-integrations/</loc>
		<lastmod>2026-03-10T12:51:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/devs-looking-for-openclaw-get-served-a-ghostclaw-rat/</loc>
		<lastmod>2026-03-10T12:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-military-hackers-revive-advanced-malware-to-spy-on-ukraine-researchers-say/</loc>
		<lastmod>2026-03-10T12:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schneider-electric-modernisiert-videouberwachung-mit-geneteccenter/</loc>
		<lastmod>2026-03-10T12:54:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telekommunikation-ist-die-konigsklasse-fur-die-cyberkriminalitat-2/</loc>
		<lastmod>2026-03-10T12:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unterbrechungsfreie-stromversorgung-fur-unternehmenskritische-vorgange-in-anspruchsvollen-industriellen-umgebungen/</loc>
		<lastmod>2026-03-10T12:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerkverschlusseler-unterstutzt-bandbreiten-von-bis-zu-100-gbit-s/</loc>
		<lastmod>2026-03-10T12:57:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-gros-der-tech-entscheider-sieht-agentenbasierte-ki-als-alternative-zur-traditionellen-softwareentwicklung/</loc>
		<lastmod>2026-03-10T12:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-blames-vendor-vishing-slip-up-for-breach-exposing-thousands-of-records/</loc>
		<lastmod>2026-03-10T12:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polish-cops-bust-alleged-teen-ddos-kit-sellers-youngest-just-12/</loc>
		<lastmod>2026-03-10T13:00:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recently-patched-ivanti-epm-flaw-now-actively-exploited/</loc>
		<lastmod>2026-03-10T13:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-releases-patches-for-security-flaws-allowing-remote-code-execution/</loc>
		<lastmod>2026-03-10T13:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows/</loc>
		<lastmod>2026-03-10T13:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-zero-day-scramble-is-avoidable-a-guide-to-attack-surface-reduction/</loc>
		<lastmod>2026-03-10T13:04:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-uses-beardshell-and-covenant-malware-to-spy-on-ukrainian-military/</loc>
		<lastmod>2026-03-10T13:05:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragos-identifiziert-drei-neue-ot-angreifergruppen-otangriffe-stiegen-2025-um-64-prozent/</loc>
		<lastmod>2026-03-10T13:06:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-and-whatsapp-accounts-targeted-in-phishing-campaign/</loc>
		<lastmod>2026-03-10T13:51:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-may-have-breached-fbi-wiretap-network-via-supply-chain/</loc>
		<lastmod>2026-03-10T13:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakylooker-hacking-google-clouds-data-via-dangerous-looker-studio-vulnerabilities/</loc>
		<lastmod>2026-03-10T13:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brand-indicators-for-message-identification-fluch-und-segen-zugleich/</loc>
		<lastmod>2026-03-10T13:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/depot-empfehlungen-von-herbert-gronemeyer-und-hasso-plattners-krypto-tipps-sind-teil-globalen-malvertisings/</loc>
		<lastmod>2026-03-10T13:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-linkedin-interview-used-by-lazarus-hackers-to-target-allsecure-ceo/</loc>
		<lastmod>2026-03-10T13:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-use-custom-aurainspector-to-harvest-data-from-salesforce-systems/</loc>
		<lastmod>2026-03-10T13:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-aitm-phishing-kit-typosquatted-domains-to-hijack-aws-accounts/</loc>
		<lastmod>2026-03-10T13:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-on-ivanti-endpoint-manager-vulnerability-auth-bypass-exploited-in-the-wild/</loc>
		<lastmod>2026-03-10T13:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-malformed-zip-archives-to-evade-antivirus-and-edr-tools/</loc>
		<lastmod>2026-03-10T14:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-queries/</loc>
		<lastmod>2026-03-10T14:01:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lander-sind-unzufrieden-bundesrat-beschliest-kritis-dachgesetz/</loc>
		<lastmod>2026-03-10T14:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beim-training-ki-agent-umgeht-unerwartet-firewall-und-schurft-kryptos/</loc>
		<lastmod>2026-03-10T14:04:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-lernplattform-mit-jahren-an-inhalten-bei-ki-panne-geloscht/</loc>
		<lastmod>2026-03-10T14:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-impersonating-city-officials-to-steal-permit-payments-fbi-says/</loc>
		<lastmod>2026-03-10T15:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-to-shift-fraud-fight-onto-telecoms-tech-companies/</loc>
		<lastmod>2026-03-10T15:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-job-applications-pack-malware-that-kills-edr-before-stealing-data/</loc>
		<lastmod>2026-03-10T15:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/study-finds-rome-ai-agent-attempted-cryptomining-without-instructions/</loc>
		<lastmod>2026-03-10T15:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-install-pages-spread-infostealer-malware/</loc>
		<lastmod>2026-03-10T15:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-police-to-trial-handheld-facial-recognition-tech/</loc>
		<lastmod>2026-03-10T15:08:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hr-recruiters-targeted-in-year-long-malware-campaign/</loc>
		<lastmod>2026-03-10T15:09:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-flips-windows-autopatch-to-default-hotpatch-security-updates/</loc>
		<lastmod>2026-03-10T15:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-turing-test-how-threats-use-geometry-to-prove-humanness/</loc>
		<lastmod>2026-03-10T15:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-anti-phishing-tools-in-2026/</loc>
		<lastmod>2026-03-10T15:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-stille-bedrohung-wie-schatten-ki-die-unternehmen-gefahrdet/</loc>
		<lastmod>2026-03-10T15:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-stille-bedrohung-wie-schatten-ki-die-unternehmen-gefahrdet-2/</loc>
		<lastmod>2026-03-10T15:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banking-apps-und-custom-roms-grapheneos-wirft-volla-murena-und-iode-tauschung-vor/</loc>
		<lastmod>2026-03-10T15:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banking-apps-und-custom-roms-grapheneos-wirft-volla-murena-und-iode-tauschung-vor/</loc>
		<lastmod>2026-03-10T15:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inference-protection-for-llms-keeping-sensitive-data-out-of-ai-workflows/</loc>
		<lastmod>2026-03-10T14:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fighting-fire-with-fire-ai-assisted-microsegmentation-to-combat-ai-enabled-hackers/</loc>
		<lastmod>2026-03-10T14:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/before-the-breach-identity-persistence-through-stolen-credentials/</loc>
		<lastmod>2026-03-10T14:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-does-mitre-attck-coverage-really-mean/</loc>
		<lastmod>2026-03-10T14:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-system-prompt-hardening-production-ready-protection-for-system-prompts/</loc>
		<lastmod>2026-03-10T14:56:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-a-bot-operators-email-verification-infrastructure/</loc>
		<lastmod>2026-03-10T14:57:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-browser-session-not-just-the-login-blog-menlo-security/</loc>
		<lastmod>2026-03-10T14:58:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-economic-argument-the-real-cost-of-insecure-apis-in-the-ai-era/</loc>
		<lastmod>2026-03-10T14:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-doubles-down-on-vars-in-huge-partner-program-expansion/</loc>
		<lastmod>2026-03-10T15:00:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnish-intelligence-warns-of-persistent-cyber-espionage-from-russia-china/</loc>
		<lastmod>2026-03-10T15:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-shortens-patch-deadline-for-critical-ivanti-solarwinds-bugs/</loc>
		<lastmod>2026-03-10T15:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-scammers-impersonating-city-county-officials-demanding-payment-fbi/</loc>
		<lastmod>2026-03-10T15:49:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbekannte-telefonnummer-identifizieren-so-finden-sie-heraus-wer-sie-angerufen-hat/</loc>
		<lastmod>2026-03-10T15:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/messenger-can-warn-you-about-sketchy-links-without-knowing-what-you-clicked/</loc>
		<lastmod>2026-03-10T15:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gps-attacks-near-iran-are-wreaking-havoc-on-delivery-and-mapping-apps/</loc>
		<lastmod>2026-03-10T15:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-widens-partner-programme-to-reach-small-businesses-worldwide/</loc>
		<lastmod>2026-03-10T15:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network/</loc>
		<lastmod>2026-03-10T15:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksanta-edr-killer-targets-hr-workflows/</loc>
		<lastmod>2026-03-10T15:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-breach-exposes-data-of-15k-employees-and-customers/</loc>
		<lastmod>2026-03-10T15:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trotz-zerschlagung-im-mai-2025-lummastealer-hat-uberlebt/</loc>
		<lastmod>2026-03-10T15:58:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-acquires-security-startup-promptfoo-to-fortify-ai-agents/</loc>
		<lastmod>2026-03-10T16:51:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-security-theater-is-canceled-time-for-a-real-show/</loc>
		<lastmod>2026-03-10T16:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/closed-loop-security-zero-trust-c2c-ransomware-defense/</loc>
		<lastmod>2026-03-10T16:53:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omb-rolled-back-the-rules-security-did-not-get-easier/</loc>
		<lastmod>2026-03-10T16:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-kimwolf-traffic-how-residential-proxies-fuel-credential-stuffing-web-scraping-fraud/</loc>
		<lastmod>2026-03-10T16:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-entities-face-heightened-cyber-risk-related-to-iran-war/</loc>
		<lastmod>2026-03-10T16:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conflicting-definitions-and-timelines-cause-cybersecurity-regulation-morass-industry-reps-say/</loc>
		<lastmod>2026-03-10T16:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/twitter-suspended-800-million-accounts-last-year-so-why-does-manipulation-remain-so-rampant/</loc>
		<lastmod>2026-03-10T16:59:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-iphone-hacking-toolkit-used-by-russian-spies-likely-came-from-us-military-contractor/</loc>
		<lastmod>2026-03-10T17:00:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-transformation-im-unternehmensumfeld-wenn-ein-ki-tool-nicht-ausreicht/</loc>
		<lastmod>2026-03-10T17:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-basierte-risikoprognose-fur-sicherheitsupdates/</loc>
		<lastmod>2026-03-10T17:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt28-conducts-long-term-espionage-on-ukrainian-forces-using-custom-malware/</loc>
		<lastmod>2026-03-10T17:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitehall-launches-digital-id-consultation/</loc>
		<lastmod>2026-03-10T17:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-police-to-trial-handheld-facial-recognition-tech-2/</loc>
		<lastmod>2026-03-10T17:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-introduces-automated-security-controls-assessment-to-bring-continuous-compliance-visibility/</loc>
		<lastmod>2026-03-10T17:06:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-brings-phishing-resistant-windows-sign-ins-via-entra-passkeys/</loc>
		<lastmod>2026-03-10T17:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kadnap-malware-infects-14000-edge-devices-to-power-stealth-proxy-botnet/</loc>
		<lastmod>2026-03-10T17:08:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/only-24-of-organizations-test-identity-recovery-every-six-months/</loc>
		<lastmod>2026-03-10T17:09:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-attackers-now-prefer-vulnerability-exploits-over-credentials-google-cloud-finds/</loc>
		<lastmod>2026-03-10T17:10:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-phishing-plotzlich-perfekt-klingt-ki-hebt-social-engineering-auf-ein-neues-level/</loc>
		<lastmod>2026-03-10T17:11:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-ki-im-buro-warum-chatgpt-und-co-die-it-sicherheit-herausfordern/</loc>
		<lastmod>2026-03-10T17:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-for-b2b-saas-what-every-founder-and-cto-needs-to-know/</loc>
		<lastmod>2026-03-10T17:49:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rudd-confirmed-to-head-nsa-cyber-command-after-near-year-long-vacancy/</loc>
		<lastmod>2026-03-10T17:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-mois-actors-the-cyber-crime-connection-2/</loc>
		<lastmod>2026-03-10T17:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-mois-actors-the-cyber-crime-connection/</loc>
		<lastmod>2026-03-10T17:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/informationsfreiheit-und-datenschutzgesetz-in-berlin-meike-kamp-kritisiert-geplante-gesetzesanderungen/</loc>
		<lastmod>2026-03-10T17:54:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crooks-compromise-wordpress-sites-to-push-infostealers-via-fake-captcha-prompts/</loc>
		<lastmod>2026-03-10T17:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-gemini-ai-chatbot-promotes-google-coin-in-new-crypto-scam/</loc>
		<lastmod>2026-03-10T17:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-claude-code-spreads-malware-to-windows-macos-users/</loc>
		<lastmod>2026-03-10T17:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-promptfoo-deal-plugs-agentic-ai-testing-gap/</loc>
		<lastmod>2026-03-10T17:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wegen-spam-und-manipulation-x-hat-2024-800-millionen-nutzerkonten-gesperrt/</loc>
		<lastmod>2026-03-10T17:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-seit-17-uhr-live-stell-deine-fragen-zur-digitalen-souveranitat/</loc>
		<lastmod>2026-03-10T17:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-msps-bridge-the-gap-between-cloud-potential-and-daytoday-reality/</loc>
		<lastmod>2026-03-10T18:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-defect-in-java-security-engine-poses-serious-downstream-security-risks/</loc>
		<lastmod>2026-03-10T18:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiants-founder-just-raised-190m-for-his-autonomous-ai-agent-security-startup/</loc>
		<lastmod>2026-03-10T18:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/</loc>
		<lastmod>2026-03-10T18:56:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-isnt-just-a-cover-for-irans-government-goons-its-a-key-part-of-their-operations/</loc>
		<lastmod>2026-03-10T18:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-hit-qatar-with-backdoor-disguised-as-war-news/</loc>
		<lastmod>2026-03-10T18:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-ousts-cbp-privacy-officers-who-questioned-illegal-orders/</loc>
		<lastmod>2026-03-10T18:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-windows-10-kb5078885-extended-security-update/</loc>
		<lastmod>2026-03-10T18:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-march-2026-patch-tuesday-fixes-2-zero-days-79-flaws/</loc>
		<lastmod>2026-03-10T19:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5079473-kb5078883-cumulative-updates-released/</loc>
		<lastmod>2026-03-10T19:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/</loc>
		<lastmod>2026-03-10T19:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortigate-devices-exploited-to-breach-networks-and-steal-service-account-credentials/</loc>
		<lastmod>2026-03-10T19:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-risk-is-not-a-hammer-and-most-hazards-arent-nails/</loc>
		<lastmod>2026-03-10T19:49:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-see-your-google-search-history-and-delete-it/</loc>
		<lastmod>2026-03-10T19:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-judge-blocks-perplexitys-ai-browser-from-making-amazon-purchases/</loc>
		<lastmod>2026-03-10T19:51:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-hackers-threaten-400-firms-over-stolen-salesforce-data/</loc>
		<lastmod>2026-03-10T19:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-diodes-have-become-essential-to-modern-ot-cybersecurity/</loc>
		<lastmod>2026-03-10T19:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-32b-wiz-acquisition-set-to-become-israels-largest-tech-deal-ever/</loc>
		<lastmod>2026-03-10T19:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cloud-security-threat-horizons-report-13-h1-2026-is-out/</loc>
		<lastmod>2026-03-10T20:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intelligence-by-eset-is-a-game-changer/</loc>
		<lastmod>2026-03-10T20:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cso-role-is-evolving-fast-with-ai-in-cyber-defense-strategy/</loc>
		<lastmod>2026-03-10T20:54:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cso-role-is-evolving-fast-with-ai-in-cyber-defense-strategy-2/</loc>
		<lastmod>2026-03-10T20:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-monthly-patch-tuesday-is-first-in-6-months-with-no-actively-exploited-zero-days/</loc>
		<lastmod>2026-03-10T20:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-says-even-in-an-ai-powered-world-security-basics-still-matter/</loc>
		<lastmod>2026-03-10T20:55:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doge-employee-stole-social-security-data-and-put-it-on-a-thumb-drive-report-says/</loc>
		<lastmod>2026-03-10T20:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/</loc>
		<lastmod>2026-03-10T20:57:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-fortigate-devices-to-access-sensitive-network-information/</loc>
		<lastmod>2026-03-10T20:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-sounds-alarm-over-fresh-data-extortion-campaign/</loc>
		<lastmod>2026-03-10T20:59:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teams-social-engineering-campaign-drops-a0backdoor-malware/</loc>
		<lastmod>2026-03-10T21:00:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zombie-zip-technique-lets-malware-slip-past-security-tools/</loc>
		<lastmod>2026-03-10T21:01:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-threat-actor-sednit-resurfaces-with-sophisticated-toolkit/</loc>
		<lastmod>2026-03-10T21:02:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-threat-debrief-march-2026/</loc>
		<lastmod>2026-03-10T21:50:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127/</loc>
		<lastmod>2026-03-10T21:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-solarwinds-and-ivanti-vulnerabilities-are-actively-exploited/</loc>
		<lastmod>2026-03-10T21:52:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-apt-hack-targets-us-airport-bank-and-software-company/</loc>
		<lastmod>2026-03-10T21:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-march-10-talos-on-the-developing-situation-in-the-middle-east/</loc>
		<lastmod>2026-03-10T21:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-microsoft-excel-bug-weaponizes-copilot-agent-for-zero-click-information-disclosure-attack/</loc>
		<lastmod>2026-03-10T21:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-identity-resilience-against-deepfake-attacks/</loc>
		<lastmod>2026-03-10T21:56:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/groups-aim-to-strengthen-health-ecosystem-incident-response/</loc>
		<lastmod>2026-03-10T21:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-healthcare-can-get-started-addressing-post-quantum-risk/</loc>
		<lastmod>2026-03-10T21:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overly-permissive-salesforce-cloud-configs-in-the-crosshairs/</loc>
		<lastmod>2026-03-10T21:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-for-march-2026-snort-rules-and-prominent-vulnerabilities/</loc>
		<lastmod>2026-03-10T22:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cal-ai-new-owner-of-myfitnesspal-hit-by-alleged-breach-of-3-million-users/</loc>
		<lastmod>2026-03-10T22:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-startup-jazz-secures-61m-to-rethink-data-loss-prevention/</loc>
		<lastmod>2026-03-10T22:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-openclaw-npm-package-installs-ghostclaw-malware/</loc>
		<lastmod>2026-03-10T22:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-beatbanker-android-malware-poses-as-starlink-app-to-hijack-devices/</loc>
		<lastmod>2026-03-10T22:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-enterprises-be-reassured-by-advanced-ai-measures/</loc>
		<lastmod>2026-03-10T23:51:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-nhi-management-deliver-value-to-businesses/</loc>
		<lastmod>2026-03-10T23:51:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-driven-cloud-security-fully-protect-data/</loc>
		<lastmod>2026-03-10T23:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-zero-days-in-net-and-sql-server/</loc>
		<lastmod>2026-03-10T23:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-pose-as-it-staff-in-microsoft-teams-to-install-malware/</loc>
		<lastmod>2026-03-10T23:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-blacksanta-edr-killer-spotted-targeting-hr-departments/</loc>
		<lastmod>2026-03-10T23:55:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-patch-tuesday-three-high-severity-holes-in-microsoft-office/</loc>
		<lastmod>2026-03-11T00:50:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-security-updates-for-march-2026-fixed-84-bugs/</loc>
		<lastmod>2026-03-11T00:51:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-authentication-and-authorization-patterns/</loc>
		<lastmod>2026-03-11T04:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-march-2026-edition/</loc>
		<lastmod>2026-03-11T04:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-architecture-for-decentralized-mcp-tool-discovery/</loc>
		<lastmod>2026-03-11T04:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jack-jill-went-up-the-hill-and-an-ai-tried-to-hack-them/</loc>
		<lastmod>2026-03-11T04:54:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jack-jill-went-up-the-hill-and-an-ai-tried-to-hack-them-2/</loc>
		<lastmod>2026-03-11T04:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-der-bevolkerung-bbk-meldet-erfolgreichen-abschluss-des-bund-lander-projektes/</loc>
		<lastmod>2026-03-11T04:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/allhands-neues-forschungsprojekt-an-der-tud-soll-fur-mehr-sicherheit-im-internet-sorgen/</loc>
		<lastmod>2026-03-11T04:57:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-confirms-new-premium-tier-stuffed-with-ai-and-few-discounts/</loc>
		<lastmod>2026-03-11T04:58:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/middle-east-conflict-highlights-cloud-resilience-gaps/</loc>
		<lastmod>2026-03-11T04:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-83-cves-in-march-update/</loc>
		<lastmod>2026-03-11T05:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-security-issues-add-a-security-guardrail-to-your-ai-application/</loc>
		<lastmod>2026-03-11T05:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lage-der-cybersicherheitsexperten-bleibt-trotz-ki-angespannt-hochmotivierte-teams-sichern-am-besten/</loc>
		<lastmod>2026-03-11T05:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-vulnerabilities-push-credential-abuse-aside-in-cloud-intrusions/</loc>
		<lastmod>2026-03-11T05:52:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-fortimanager-fgtupdates-flaw-enables-attackers-to-execute-malicious-commands-remotely/</loc>
		<lastmod>2026-03-11T05:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantomraven-malware-resurfaces-targets-npm-supply-chain-to-steal-developer-secrets/</loc>
		<lastmod>2026-03-11T05:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantomraven-malware-resurfaces-targets-npm-supply-chain-to-steal-developer-secrets/</loc>
		<lastmod>2026-03-11T05:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 0dd70f285e475a6dfddc19c12018e879; Queries for sitemap: 3; Total queries: 88; Seconds: 5.65; Memory for sitemap: 1KB; Total memory: 62MB -->
