<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='1. May 2026 2:09 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/phantomraven-malware-resurfaces-targets-npm-supply-chain-to-steal-developer-secrets-2/</loc>
		<lastmod>2026-03-11T05:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sql-server-zero-day-exposes-privilege-escalation-risk-for-users/</loc>
		<lastmod>2026-03-11T05:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malvertising-herbert-gronemeyer-und-hasso-plattner-werden-missbraucht/</loc>
		<lastmod>2026-03-11T06:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-audit-fast-open-source-aws-security-scanner/</loc>
		<lastmod>2026-03-11T06:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-zero-buzzwords-heres-what-it-means/</loc>
		<lastmod>2026-03-11T06:52:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hr-departments-targeted-by-multi-layered-blacksanta-edr-killer-malware/</loc>
		<lastmod>2026-03-11T06:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-79-vulnerabilities-in-march-2026-patch-tuesday-mitigating-two-exploited-0-days/</loc>
		<lastmod>2026-03-11T06:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-malicious-rust-crates-and-ai-bot-exploit-ci-cd-pipelines-to-steal-developer-secrets/</loc>
		<lastmod>2026-03-11T06:55:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-ways-attackers-abuse-cloud-services-to-hack-your-enterprise/</loc>
		<lastmod>2026-03-11T07:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-active-directory-flaw-allows-attackers-to-escalate-privileges/</loc>
		<lastmod>2026-03-11T07:51:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-net-0-day-flaw-opens-doors-for-denial-of-service-attacks/</loc>
		<lastmod>2026-03-11T07:52:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-red-alert-app-targets-israeli-users-in-sms-scam-to-steal-sensitive-data/</loc>
		<lastmod>2026-03-11T07:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patchday-marz-2026-93-schwachstellen-in-windows-office-azure-und-serverkomponenten/</loc>
		<lastmod>2026-03-11T07:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritis-dachgesetz-fordert-belastbare-risikoanalysen-digitale-informationszwillinge-fur-kritische-infrastrukturen/</loc>
		<lastmod>2026-03-11T07:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-erweitert-aida-suite-um-individuellen-sapa-agenten/</loc>
		<lastmod>2026-03-11T07:56:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-an-exposure-assessment-platform-and-why-your-website-is-the-blind-spot/</loc>
		<lastmod>2026-03-11T08:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-otp-magic-link-endpoints-from-abuse-ip-reputation-rate-limiting-and-suspicious-ip-throttling/</loc>
		<lastmod>2026-03-11T08:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/libreoffice-learns-to-speak-markdown-in-version-26-2/</loc>
		<lastmod>2026-03-11T08:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beatbanker-trojan-spreads-via-phishing-deploys-crypto-miner-and-rat-on-targeted-devices/</loc>
		<lastmod>2026-03-11T08:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patchday-gefahrliche-excel-lucke-ermoglicht-datenklau-mit-copilot/</loc>
		<lastmod>2026-03-11T08:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sso-reduces-helpdesk-load-in-mid-sized-organizations/</loc>
		<lastmod>2026-03-11T09:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sso-reduces-helpdesk-load-in-mid-sized-organizations-2/</loc>
		<lastmod>2026-03-11T09:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-actually-owns-this-service-account/</loc>
		<lastmod>2026-03-11T09:49:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-innovation-sandbox-2026-realm-labs/</loc>
		<lastmod>2026-03-11T09:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-tuesday-march-2026-two-zero-days-and-critical-rce-bugs-fixed/</loc>
		<lastmod>2026-03-11T09:51:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-data-lake-is-turning-into-a-junk-drawer-heres-how-to-clean-it-up/</loc>
		<lastmod>2026-03-11T09:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6426-exploits-nx-npm-supply-chain-attack-to-gain-aws-admin-access-in-72-hours/</loc>
		<lastmod>2026-03-11T09:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-two-publicly-disclosed-zero-days/</loc>
		<lastmod>2026-03-11T09:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-sind-die-lieblingsbranchen-von-hackern/</loc>
		<lastmod>2026-03-11T10:50:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-the-2026-cso-hall-of-fame-honorees/</loc>
		<lastmod>2026-03-11T10:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cso-awards-2026-celebrates-world-class-security-strategies/</loc>
		<lastmod>2026-03-11T10:52:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-consequences-matter-they-should-apply-to-vendors-too/</loc>
		<lastmod>2026-03-11T10:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-security-why-you-need-to-know-about-autonomous-agents-now/</loc>
		<lastmod>2026-03-11T10:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spinning-complex-ideas-into-clear-docs-with-kri-dontje/</loc>
		<lastmod>2026-03-11T10:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-der-formel-1-saison-bluhen-auch-die-streaming-anbieter-auf/</loc>
		<lastmod>2026-03-11T10:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-79-flaws-in-march-patch-tuesday-including-two-0-days/</loc>
		<lastmod>2026-03-11T10:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kadnap-bot-compromises-14000-devices-to-route-malicious-traffic/</loc>
		<lastmod>2026-03-11T10:58:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youtube-draws-a-line-on-deepfakes-involving-politicians-and-journalists/</loc>
		<lastmod>2026-03-11T10:59:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-aidriven-adaptive-malware-rewriting-its-own-code/</loc>
		<lastmod>2026-03-11T11:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days/</loc>
		<lastmod>2026-03-11T11:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umsetzung-von-nis-2-cra-und-co-funf-tipps-zur-cybersecurity-compliance/</loc>
		<lastmod>2026-03-11T11:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-report-zeigt-wie-man-mit-praventiver-cybersecurity-den-roi-maximiert/</loc>
		<lastmod>2026-03-11T11:03:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-bis-16-jahre-jung-minderjahrige-beim-handel-mit-ddos-tools-erwischt/</loc>
		<lastmod>2026-03-11T11:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-verkauft-exploit-fur-gefahrliche-windows-lucke-was-du-jetzt-tun-kannst/</loc>
		<lastmod>2026-03-11T11:05:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-gutachten-zu-phishing-warum-banken-opfern-ihr-geld-immer-sofort-zuruckzahlen-sollen/</loc>
		<lastmod>2026-03-11T11:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-update-so-verhinderst-du-dass-fremde-deinen-status-sehen-konnen/</loc>
		<lastmod>2026-03-11T11:07:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-eu-regulations-are-reshaping-soc-operations/</loc>
		<lastmod>2026-03-11T11:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-eu-regulations-are-reshaping-soc-operations-2/</loc>
		<lastmod>2026-03-11T11:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/did-cybersecurity-recently-have-its-gatling-gun-moment/</loc>
		<lastmod>2026-03-11T11:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-zero-trust-breaks-down-in-iot-and-ot-environments/</loc>
		<lastmod>2026-03-11T11:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-hpe-aruba-cx-switches-lets-attackers-seize-admin-control-without-credentials/</loc>
		<lastmod>2026-03-11T11:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-5-step-approach-to-taming-shadow-ai/</loc>
		<lastmod>2026-03-11T11:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marz-patchday-fur-windows-11-update-beinhaltet-den-browser-speedtest-und-schliest-sicherheitslucken/</loc>
		<lastmod>2026-03-11T11:57:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-80-vulnerabilities-six-flagged-as-more-likely/</loc>
		<lastmod>2026-03-11T11:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-old-cybersecurity-models-are-breaking/</loc>
		<lastmod>2026-03-11T11:59:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-launches-global-campaign-highlighting-identity-first-cybersecurity-with-atlassian-williams-f1-team/</loc>
		<lastmod>2026-03-11T12:00:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-down-global-outage-prevents-users-from-posting-and-messaging/</loc>
		<lastmod>2026-03-11T12:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-on-uk-firms-increase-at-four-times-global-rate/</loc>
		<lastmod>2026-03-11T12:02:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-cyberangriffe-auf-deutsche-firmen-februar-bringt-plus-von-elf-prozent/</loc>
		<lastmod>2026-03-11T12:04:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heracles-chip-intel-beschleunigt-rechnen-mit-verschlusselten-daten/</loc>
		<lastmod>2026-03-11T12:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentagent-attacks-are-coming-what-api-security-teaches-us-about-securing-ai-systems/</loc>
		<lastmod>2026-03-11T12:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentagent-attacks-are-coming-what-api-security-teaches-us-about-securing-ai-systems-2/</loc>
		<lastmod>2026-03-11T12:52:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/monitoring-legitimate-bot-traffic-is-now-a-cybersecurity-requirement/</loc>
		<lastmod>2026-03-11T12:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-india-a-preferred-destination-for-software-development-innovation-and-ai-in-2026/</loc>
		<lastmod>2026-03-11T12:54:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-needs-nationalized-public-ai/</loc>
		<lastmod>2026-03-11T12:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities/</loc>
		<lastmod>2026-03-11T12:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities-2/</loc>
		<lastmod>2026-03-11T12:57:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-2026-patch-tuesday-fixes-two-zero-day-vulnerabilities-3/</loc>
		<lastmod>2026-03-11T12:58:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/overly-permissive-guest-settings-put-salesforce-customers-at-risk/</loc>
		<lastmod>2026-03-11T12:59:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-says-it-culled-millions-of-scam-ads-amid-accusations-that-it-profits-from-them/</loc>
		<lastmod>2026-03-11T13:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marz-patchday-fur-windows-11-update-mit-browser-speedtest-patcht-auch-sicherheitslucken/</loc>
		<lastmod>2026-03-11T13:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrliche-easter-eggs-im-postfach-phishingangriffe-an-feiertagen/</loc>
		<lastmod>2026-03-11T13:02:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/89-prozent-der-deutschen-cisos-furchten-dass-agentic-ai-social-engineering-angriffe-gefahrlicher-macht/</loc>
		<lastmod>2026-03-11T13:04:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/11-prozent-mehr-cyber-angriffe-auf-deutsche-unternehmen-im-februar/</loc>
		<lastmod>2026-03-11T13:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-cops-bust-teen-suspected-of-posing-as-bank-staff-to-steal-cards/</loc>
		<lastmod>2026-03-11T13:06:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksanta-malware-targets-hr-staff-with-fake-cv-downloads/</loc>
		<lastmod>2026-03-11T13:07:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hewlett-packard-enterprise-fixes-critical-authentication-bypass-in-aruba-aos-cx/</loc>
		<lastmod>2026-03-11T13:08:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-forms-institute-to-study-long-term-ai-risks-facing-society/</loc>
		<lastmod>2026-03-11T13:09:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-ramps-up-efforts-to-disrupt-industrialized-scamming/</loc>
		<lastmod>2026-03-11T13:10:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/65-of-organisations-still-detect-unauthorised-shadow-ai-despite-visibility-optimism/</loc>
		<lastmod>2026-03-11T13:11:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-launches-ai-agent-to-tailor-security-awareness-assessments/</loc>
		<lastmod>2026-03-11T13:12:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerability-in-microsoft-office-allows-malicious-code-to-run-remotely/</loc>
		<lastmod>2026-03-11T13:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dozens-of-vendors-patch-security-flaws-across-enterprise-software-and-network-devices/</loc>
		<lastmod>2026-03-11T13:15:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-boards-must-demand-in-the-age-of-ai-automated-exploitation/</loc>
		<lastmod>2026-03-11T13:16:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mittelstand-setzt-bei-der-it-sicherheit-oft-auf-falsche-masnahmen-deutsche-kmu-geraten-verstarkt-ins-visier-von-ransomware/</loc>
		<lastmod>2026-03-11T13:16:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/header-manipulationstechnik-zombie-zip-trickst-fast-alle-antivirus-tools-aus/</loc>
		<lastmod>2026-03-11T13:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-mistakes-in-erc-4337-smart-accounts/</loc>
		<lastmod>2026-03-11T13:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-expands-security-hub-for-multicloud-security-operations/</loc>
		<lastmod>2026-03-11T13:52:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/235000-affected-by-cyberattack-on-largest-ambulance-provider-in-wisconsin/</loc>
		<lastmod>2026-03-11T13:53:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-influence-operation-using-fake-personas-to-deceive-us-instagram-users-disrupted-meta-says/</loc>
		<lastmod>2026-03-11T13:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-wraps-up-32b-acquisition-of-cloud-cybersecurity-startup-wiz/</loc>
		<lastmod>2026-03-11T13:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swiss-e-voting-pilot-cant-count-2048-ballots-after-usb-keys-fail-to-decrypt-them/</loc>
		<lastmod>2026-03-11T13:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/channel-momentum-continues-at-avepoint/</loc>
		<lastmod>2026-03-11T13:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-on-alert-strengthening-cyber-resilience-amid-geopolitical-tensions-in-the-middle-east/</loc>
		<lastmod>2026-03-11T13:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-turns-to-ai-to-sniff-out-scams-on-facebook-messenger-and-whatsapp/</loc>
		<lastmod>2026-03-11T14:00:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6426-hackers-exploit-npm-package-to-gain-aws-admin-access-in-72-hours/</loc>
		<lastmod>2026-03-11T14:01:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crackdown/</loc>
		<lastmod>2026-03-11T14:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foreign-hacker-reportedly-breached-fbi-servers-holding-epstein-files-in-2023/</loc>
		<lastmod>2026-03-11T14:02:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prepare-protect-perform-das-speaker-lineup-der-isx-2026-steht/</loc>
		<lastmod>2026-03-11T14:03:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/souverane-notfallplane-der-blinde-fleck-der-cyberresilienz/</loc>
		<lastmod>2026-03-11T14:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-nis-2-in-deutschland-warum-viele-unternehmen-noch-nicht-startklar-sind/</loc>
		<lastmod>2026-03-11T14:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/niederlandische-geheimdienste-warnen-russische-hacker-zielen-auf-whatsapp-und-signal-nutzer/</loc>
		<lastmod>2026-03-11T14:06:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-issues-new-security-alert-tied-to-third-customer-attack-spree-in-six-months/</loc>
		<lastmod>2026-03-11T14:49:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ico-fines-police-scotland-over-data-sharing-debacle-in-gross-misconduct-case/</loc>
		<lastmod>2026-03-11T14:50:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-the-uks-next-generation-of-cyber-talent/</loc>
		<lastmod>2026-03-11T14:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-job-applications-pack-malware-that-kills-endpoint-detection-before-stealing-data/</loc>
		<lastmod>2026-03-11T14:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-adds-new-whatsapp-facebook-and-messenger-anti-scam-tools/</loc>
		<lastmod>2026-03-11T14:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-discover-major-security-gaps-in-llm-guardrails/</loc>
		<lastmod>2026-03-11T14:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erbeuten-kundendaten-cyberangriff-auf-einkaufszentren/</loc>
		<lastmod>2026-03-11T14:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watch-out-for-tax-season-robocalls-pushing-fake-relief-programs/</loc>
		<lastmod>2026-03-11T15:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-2026s-converged-threats-insights-from-flashpoints-global-threat-intelligence-report/</loc>
		<lastmod>2026-03-11T15:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/februar-2026-cyberangriffe-bleiben-auf-hohem-niveau/</loc>
		<lastmod>2026-03-11T15:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-claim-cyberattack-on-albanias-parliament-email-systems/</loc>
		<lastmod>2026-03-11T15:55:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palantirs-lethal-ai-weaponry-deployed-to-find-chairs-for-us-government-staff/</loc>
		<lastmod>2026-03-11T15:55:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salesforce-tracks-possible-shinyhunters-campaign-targeting-its-users/</loc>
		<lastmod>2026-03-11T15:56:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/child-rapist-could-have-profiled-victims-through-unaudited-access-to-nhs-databases/</loc>
		<lastmod>2026-03-11T15:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-nexus-actors-shift-focus-to-qatar-amid-iranian-conflict/</loc>
		<lastmod>2026-03-11T15:58:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credentials/</loc>
		<lastmod>2026-03-11T15:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-wordpress-sites-deliver-clickfix-attacks-in-global-infostealer-campaign/</loc>
		<lastmod>2026-03-11T16:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksanta-edr-killer-targets-hr-teams-in-cv-themed-campaign/</loc>
		<lastmod>2026-03-11T16:02:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-bei-bitwarden-lastpass-und-dashlane-machen-passwortmanager-falsche-sicherheitsversprechen/</loc>
		<lastmod>2026-03-11T16:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonome-gladiatoren-mord-und-verrat-unter-ki-agenten/</loc>
		<lastmod>2026-03-11T16:04:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-industry-welcomes-women-but-challenges-persist/</loc>
		<lastmod>2026-03-11T17:00:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infosecurity-europe-announces-2026-keynote-line-up/</loc>
		<lastmod>2026-03-11T17:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-leakylooker-vulnerabilities-in-google-looker-studio/</loc>
		<lastmod>2026-03-11T17:02:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/e-voting-basel-stadt-kann-elektronische-urne-nicht-entschlusseln/</loc>
		<lastmod>2026-03-11T17:04:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-everything-old-is-new-again-legal-restrictions-on-vulnerability-disclosure-on-bug-bounty-platforms/</loc>
		<lastmod>2026-03-11T16:51:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-completes-32b-acquisition-of-wiz/</loc>
		<lastmod>2026-03-11T16:52:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industry-to-nist-keep-agentic-ai-standards-flexible-and-voluntary/</loc>
		<lastmod>2026-03-11T16:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-erweiterungen-konnen-nutzer-ausforschen/</loc>
		<lastmod>2026-03-11T16:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schutzlosung-fur-das-gesamte-ki-okosystem/</loc>
		<lastmod>2026-03-11T16:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-netzwerk-mit-millionen-fake-accounts-enttarnt/</loc>
		<lastmod>2026-03-11T16:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vermeintlich-von-google-gesponserte-online-anzeigen-fur-anthropics-claude-code-bereiten-den-weg-fur-malware/</loc>
		<lastmod>2026-03-11T16:57:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-concerns-for-a-post-quantum-world/</loc>
		<lastmod>2026-03-11T16:58:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stretching-cyber-resources-in-rural-healthcare/</loc>
		<lastmod>2026-03-11T16:59:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sextortion-i-recorded-you/</loc>
		<lastmod>2026-03-11T17:51:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soar-cybersecurity/</loc>
		<lastmod>2026-03-11T17:52:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-automation-platform/</loc>
		<lastmod>2026-03-11T17:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-for-msps-and-mssps-securing-client-environments-in-an-era-of-expanding-threat-surfaces/</loc>
		<lastmod>2026-03-11T17:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/</loc>
		<lastmod>2026-03-11T17:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-international-cops-use-handcuffs-and-ai-to-stop-scammers/</loc>
		<lastmod>2026-03-11T17:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-to-nuke-entra-creds-on-rooted-and-jailbroken-phones/</loc>
		<lastmod>2026-03-11T17:57:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beatbanker-android-trojan-uses-silent-audio-loop-to-steal-crypto/</loc>
		<lastmod>2026-03-11T17:58:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-us-ransomware-policy-aims-to-break-global-crime-networks/</loc>
		<lastmod>2026-03-11T17:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-ai-powered-vishing-platform/</loc>
		<lastmod>2026-03-11T18:00:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/</loc>
		<lastmod>2026-03-11T18:01:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages/</loc>
		<lastmod>2026-03-11T18:02:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-national-cybersecurity-agency-reports-ransomware-attack-drop-in-2025/</loc>
		<lastmod>2026-03-11T18:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kindesmissbrauch-europaparlament-stimmt-fur-stark-abgespeckte-chatkontrolle/</loc>
		<lastmod>2026-03-11T18:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blacksanta-malware-shuts-down-protections-targets-hr-and-recruiting-operations/</loc>
		<lastmod>2026-03-11T18:50:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-carbon-dating/</loc>
		<lastmod>2026-03-11T18:51:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtech-firm-stryker-disrupted-by-pro-iran-hackers/</loc>
		<lastmod>2026-03-11T18:52:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plugplay-ai-is-a-myth-for-enterprises/</loc>
		<lastmod>2026-03-11T18:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-war-a-melting-pot-for-other-cyber-threats/</loc>
		<lastmod>2026-03-11T18:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/welsh-government-boosts-funding-for-cyber-education/</loc>
		<lastmod>2026-03-11T18:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-new-campaign-targeting-salesforce-experience-cloud-sites/</loc>
		<lastmod>2026-03-11T18:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/</loc>
		<lastmod>2026-03-11T18:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four-minutes/</loc>
		<lastmod>2026-03-11T18:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-digital-product-safety-rejecting-software-as-magic/</loc>
		<lastmod>2026-03-11T19:50:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishers-hide-scam-links-with-ipv6-trick-in-free-toothbrush-emails/</loc>
		<lastmod>2026-03-11T19:51:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/</loc>
		<lastmod>2026-03-11T19:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-cyber-resilience-agenda-inside-the-european-central-banks-20262028-priorities/</loc>
		<lastmod>2026-03-11T19:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-giant-stryker-confirms-cyberattack-as-employees-say-devices-were-wiped/</loc>
		<lastmod>2026-03-11T19:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iran-hacktivist-group-says-it-is-behind-attack-on-medical-tech-giant-stryker/</loc>
		<lastmod>2026-03-11T19:55:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-strikes-on-iran-put-cybersecurity-teams-on-alert/</loc>
		<lastmod>2026-03-11T19:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-multi-location-networks-with-centralized-identity-controls/</loc>
		<lastmod>2026-03-12T09:11:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-cosxy-to-genai-hallucinations-why-zero-trust-needs-a-progressive-refinement-loop/</loc>
		<lastmod>2026-03-12T09:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-glide-identity-building-a-next-generation-ai-passwordless-authentication-platform/</loc>
		<lastmod>2026-03-12T09:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-in-mediatek-chips-could-impact-25-android-smartphones/</loc>
		<lastmod>2026-03-12T09:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-in-mediatek-chips-could-impact-25-android-smartphones-2/</loc>
		<lastmod>2026-03-12T09:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-us-hit-by-cyber-attack-hackers-steal-personal-data-of-employees-and-customers/</loc>
		<lastmod>2026-03-12T09:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ericsson-us-hit-by-cyber-attack-hackers-steal-personal-data-of-employees-and-customers-2/</loc>
		<lastmod>2026-03-12T09:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/air-gap-schutz-und-application-recovery-commvault-erweitert-cyber-resilienz-funktionen-fur-google-cloud/</loc>
		<lastmod>2026-03-12T09:19:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-dienstleister-sva-erhalt-auszeichnung-von-omada-identity/</loc>
		<lastmod>2026-03-12T09:20:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tausende-server-gefahrdet-n8n-instanzen-werden-attackiert/</loc>
		<lastmod>2026-03-12T09:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kindesmissbrauch-europaparlament-stimmt-fur-stark-reduzierte-chatkontrolle/</loc>
		<lastmod>2026-03-12T09:22:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dnssec-validation-for-ssl-certificates-ca-b-forum-ballot-sc-085-changes-in-march-2026/</loc>
		<lastmod>2026-03-12T10:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-sovereign-search-plan-is-really-a-security-strategy/</loc>
		<lastmod>2026-03-12T10:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-fake-it-worker-tradecraft-exposed/</loc>
		<lastmod>2026-03-12T10:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-fake-it-worker-tradecraft-exposed-2/</loc>
		<lastmod>2026-03-12T10:15:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dr-dos-rises-again-rebuilt-from-scratch-not-open-source/</loc>
		<lastmod>2026-03-12T10:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enisa-technical-advisory-on-secure-package-managers-essential-devsecops-guidance/</loc>
		<lastmod>2026-03-12T10:17:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-n8n-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-12T10:18:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-cortex-xdr-broker-vulnerability-exposes-systems-to-sensitive-information-theft-and-modification/</loc>
		<lastmod>2026-03-12T10:19:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-cortex-xdr-broker-vulnerability-exposes-systems-to-sensitive-information-theft-and-modification-2/</loc>
		<lastmod>2026-03-12T10:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets/</loc>
		<lastmod>2026-03-12T10:21:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets-2/</loc>
		<lastmod>2026-03-12T10:22:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-claim-massive-cyber-attack-on-medtech-firm-stryker/</loc>
		<lastmod>2026-03-12T10:28:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wipe-attacke-hackergruppe-legt-medizintechnik-konzern-stryker-lahm/</loc>
		<lastmod>2026-03-12T10:29:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-nis-2-in-deutschland-wo-viele-unternehmen-jetzt-nacharbeiten-mussen/</loc>
		<lastmod>2026-03-12T10:29:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-verteilen-malware-uber-github-wie-du-die-angriffe-erkennst-und-dich-davor-schutzt/</loc>
		<lastmod>2026-03-12T10:30:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-rolls-out-anti-scam-tools-across-whatsapp-facebook-and-messenger/</loc>
		<lastmod>2026-03-12T11:12:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-2026-wenn-technologie-vertrauen-und-mensch-aufeinanderprallen/</loc>
		<lastmod>2026-03-12T11:14:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-uk-governments-digital-identity-scheme-dystopian-nightmare-or-modernised-public-services/</loc>
		<lastmod>2026-03-12T11:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/war-spreads-into-cyberspace-after-iran-linked-hackers-hit-medtech-giant-stryker/</loc>
		<lastmod>2026-03-12T11:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cloudflare-anti-security-to-steal-microsoft-365-login-credentials/</loc>
		<lastmod>2026-03-12T11:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cloudflare-anti-security-to-steal-microsoft-365-login-credentials-2/</loc>
		<lastmod>2026-03-12T11:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-scotland-fined-after-sharing-victims-phone-data/</loc>
		<lastmod>2026-03-12T11:19:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-wer-seine-supply-chain-kennt-kann-sie-auch-schutzen-flut-tauscht-uber-reale-gefahren-in-der-software-lieferkette-hinweg/</loc>
		<lastmod>2026-03-12T11:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-exploit/</loc>
		<lastmod>2026-03-12T11:21:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vollzugriff-in-zwei-stunden-ki-agent-hackt-eigenstandig-ki-plattform-von-mckinsey/</loc>
		<lastmod>2026-03-12T11:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-den-code-schreibt-wie-vibe-coding-neue-cyberrisiken-schafft/</loc>
		<lastmod>2026-03-12T11:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-den-code-schreibt-wie-vibe-coding-neue-cyberrisiken-schafft-2/</loc>
		<lastmod>2026-03-12T11:24:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iphone-und-ipad-apple-veroffentlicht-coruna-fix/</loc>
		<lastmod>2026-03-12T11:25:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/factors-that-complicate-pricing-when-using-microsoft-intune-for-authentication/</loc>
		<lastmod>2026-03-12T12:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maintaining-security-and-protecting-smart-home-devices-from-hackers/</loc>
		<lastmod>2026-03-12T12:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pixrevolution-malware-steals-brazils-pix-transfers-in-real-time/</loc>
		<lastmod>2026-03-12T12:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks/</loc>
		<lastmod>2026-03-12T12:14:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attacks-target-macos-users-with-macsync-infostealer/</loc>
		<lastmod>2026-03-12T12:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attacks-target-macos-users-with-macsync-infostealer-2/</loc>
		<lastmod>2026-03-12T12:16:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-remote-management-tools-to-gain-initial-access-to-corporate-networks/</loc>
		<lastmod>2026-03-12T12:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-remote-management-tools-to-gain-initial-access-to-corporate-networks-2/</loc>
		<lastmod>2026-03-12T12:18:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-group-says-it-hacked-us-company-in-retaliation-for-minab-school-bombing/</loc>
		<lastmod>2026-03-12T12:19:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/83-of-cloud-breaches-start-with-identity-ai-agents-are-about-to-make-it-worse/</loc>
		<lastmod>2026-03-12T13:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/83-of-cloud-breaches-start-with-identity-ai-agents-are-about-to-make-it-worse-2/</loc>
		<lastmod>2026-03-12T13:14:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-dilemma-how-to-scale-ai-securely/</loc>
		<lastmod>2026-03-12T13:15:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-white-house-got-the-cyber-strategy-right-by-knowing-what-not-to-do/</loc>
		<lastmod>2026-03-12T13:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-could-leak-login-codes-update-your-app-now/</loc>
		<lastmod>2026-03-12T13:17:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantomraven-returns-to-npm-with-88-bad-packages/</loc>
		<lastmod>2026-03-12T13:18:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-signal-account-is-safe-unless-you-fall-for-this-trick/</loc>
		<lastmod>2026-03-12T13:19:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4000-routers-compromised-by-kadnap-malware-exploiting-vulnerabilities/</loc>
		<lastmod>2026-03-12T13:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload/</loc>
		<lastmod>2026-03-12T13:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drei-ansatze-fur-sichere-ki-nutzung-im-vergleich-ki-sicherheit-welcher-ansatz-schutzt-wirklich/</loc>
		<lastmod>2026-03-12T13:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-cyber-warfare-in-2026-nation-state-attacks-ai-weapons-and-the-new-digital-battlefield/</loc>
		<lastmod>2026-03-12T13:24:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-emergency-directive-over-exploited-cisco-sd-wan-flaws/</loc>
		<lastmod>2026-03-12T13:24:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cyber-risk-management-builds-resilience-kovrr/</loc>
		<lastmod>2026-03-12T14:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cyber-risk-management-builds-resilience-kovrr-2/</loc>
		<lastmod>2026-03-12T14:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/83-of-cloud-breaches-start-with-identity-ai-agents-are-about-to-make-it-worse-3/</loc>
		<lastmod>2026-03-12T14:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eset-expands-threat-intelligence-offering-for-mssps-with-new-ecrime-reports/</loc>
		<lastmod>2026-03-12T14:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-government-and-starlink-apps-used-in-malware-campaign-targeting-brazil/</loc>
		<lastmod>2026-03-12T14:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-say-another-digitalmint-negotiator-ran-ransomware-attacks-and-extorted-75-million/</loc>
		<lastmod>2026-03-12T14:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/distributedhub-fur-vereinfachte-und-sichere-ki-infrastruktur-in-unternehmen/</loc>
		<lastmod>2026-03-12T14:18:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-nutzer-verstarkt-im-visier-von-social-engineering-attacken/</loc>
		<lastmod>2026-03-12T14:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-sql-injection-bug-in-ally-plugin-threatens-400000-wordpress-sites/</loc>
		<lastmod>2026-03-12T14:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-is-giving-parents-peace-of-mind-over-their-kids-privacy/</loc>
		<lastmod>2026-03-12T14:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-older-iphones-and-ipads-against-coruna-exploits/</loc>
		<lastmod>2026-03-12T14:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-phishing-attacks-bypass-email-filters-land-in-inboxes/</loc>
		<lastmod>2026-03-12T14:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaische-datenverarbeitung-crowdstrike-falcon-uber-stackit-verfugbar/</loc>
		<lastmod>2026-03-12T14:24:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild/</loc>
		<lastmod>2026-03-12T14:25:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-x-ops-analysiert-clickfix-und-macos-infostealer-kampagnen/</loc>
		<lastmod>2026-03-12T14:26:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enisa-advisory-examines-package-manager-security-risks/</loc>
		<lastmod>2026-03-12T14:27:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptography-for-authentication-the-enterprise-migration-guide-2026/</loc>
		<lastmod>2026-03-12T15:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-android-vulnerability-can-break-your-lock-screen-in-under-60-seconds/</loc>
		<lastmod>2026-03-12T15:13:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-ways-to-protect-manufacturing-companies-from-cyberattacks/</loc>
		<lastmod>2026-03-12T15:14:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-tells-sec-that-timeline-for-recovery-from-cyberattack-unknown/</loc>
		<lastmod>2026-03-12T15:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-medizintechnikunternehmen-als-cyberwarfare-opfer/</loc>
		<lastmod>2026-03-12T15:17:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hacktivists-claim-wiper-attack-on-stryker-systems/</loc>
		<lastmod>2026-03-12T15:18:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/</loc>
		<lastmod>2026-03-12T15:20:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/going-the-extra-mile-travel-rewards-turn-into-underground-currency/</loc>
		<lastmod>2026-03-12T15:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos/</loc>
		<lastmod>2026-03-12T15:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/musk-admits-starship-v3-launch-date-has-slipped-as-super-heavy-booster-rolls-into-place/</loc>
		<lastmod>2026-03-12T15:22:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euro1-million-online-fraud-scheme-uncovered-three-suspects-arrested/</loc>
		<lastmod>2026-03-12T15:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-cnapp-cloud-native-application-protection-platform-was-ist-eine-cloud-native-application-protection-platform/</loc>
		<lastmod>2026-03-12T15:24:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platform-hack-more/</loc>
		<lastmod>2026-03-12T15:25:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-threats-targeting-high-profile-individuals/</loc>
		<lastmod>2026-03-12T16:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-agentic-fraud-how-ai-agents-are-reshaping-security/</loc>
		<lastmod>2026-03-12T16:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nametag-granted-additional-patents-for-verifying-the-human-behind-enterprise-accounts/</loc>
		<lastmod>2026-03-12T16:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-defensive-coverage-doesnt-equal-detection-effectiveness/</loc>
		<lastmod>2026-03-12T16:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coalition-of-information-sharing-groups-warns-of-cyber-physical-attacks/</loc>
		<lastmod>2026-03-12T16:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-investigating-cyberattack-that-caused-widespread-outage/</loc>
		<lastmod>2026-03-12T16:18:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/officials-worry-salt-typhoon-apathy-is-killing-momentum-for-tougher-telecom-security-rules/</loc>
		<lastmod>2026-03-12T16:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bell-ambulance-confirms-data-breach-affecting-237830-individuals/</loc>
		<lastmod>2026-03-12T16:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bell-ambulance-confirms-data-breach-affecting-237830-individuals-2/</loc>
		<lastmod>2026-03-12T16:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-emergency-fixes-for-coruna-flaws-in-older-ios-versions/</loc>
		<lastmod>2026-03-12T16:22:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ai-soc-analyst-platforms-in-2026/</loc>
		<lastmod>2026-03-12T16:23:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-paid-17-1-million-for-vulnerability-reports-in-2025/</loc>
		<lastmod>2026-03-12T16:24:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-zero-click-flaw-in-n8n-allows-full-server-compromise/</loc>
		<lastmod>2026-03-12T16:25:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infrastrukturausfall-durck-ki-bis-2028-fehlkonfigurierte-ki-wird-zerstorungskraft-gegen-g20-richten/</loc>
		<lastmod>2026-03-12T16:27:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/professionelles-spear-phishing-setzt-zunehmend-auf-messenger-dienste/</loc>
		<lastmod>2026-03-12T16:28:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-cimtrak-integrity-driven-zero-trust-for-c2c/</loc>
		<lastmod>2026-03-12T17:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-regulators-demand-social-media-platforms-make-it-harder-for-kids-under-13-to-access-sites/</loc>
		<lastmod>2026-03-12T17:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-national-mission-force-to-get-new-commander-amid-broader-leadership-turnover/</loc>
		<lastmod>2026-03-12T17:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-takedown-global-proxy-network-socksescort/</loc>
		<lastmod>2026-03-12T17:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-say-another-digitalmint-negotiator-ran-ransomware-attacks-and-helped-extort-75-million/</loc>
		<lastmod>2026-03-12T17:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-say-another-digitalmint-negotiator-ran-ransomware-attacks-and-helped-extort-75-million-2/</loc>
		<lastmod>2026-03-12T17:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-say-another-digitalmint-negotiator-ran-ransomware-attacks-and-helped-extort-75-million-3/</loc>
		<lastmod>2026-03-12T17:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-shuts-down-botnet-made-of-tens-of-thousands-of-hacked-routers/</loc>
		<lastmod>2026-03-12T17:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operating-lightning-takes-down-socksescort-proxy-network-blamed-for-tens-of-millions-in-fraud/</loc>
		<lastmod>2026-03-12T17:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ig-nobel-prize-flees-us-for-switzerland-after-35-years-over-safety-concerns/</loc>
		<lastmod>2026-03-12T17:21:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payment-giant-verifone-disputes-iranian-hacking-group-hit/</loc>
		<lastmod>2026-03-12T17:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/400k-wordpress-sites-exposed-by-elementor-ally-plugin-sql-flaw/</loc>
		<lastmod>2026-03-12T17:23:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-handala-became-the-face-of-irans-hacker-counterattacks/</loc>
		<lastmod>2026-03-12T17:24:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hacktivists-hit-stryker-knocking-employees-offline-across-multiple-countries/</loc>
		<lastmod>2026-03-12T17:25:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-rolls-out-new-scam-alerts-across-facebook-whatsapp-and-messenger/</loc>
		<lastmod>2026-03-12T17:26:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/</loc>
		<lastmod>2026-03-12T17:27:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixrevolution-malware-hijacks-brazils-pix-transfers-in-real-time/</loc>
		<lastmod>2026-03-12T17:28:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onlinebanking-bankkunden-konnten-transaktionen-anderer-konten-einsehen/</loc>
		<lastmod>2026-03-12T17:29:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/destructive-activity-targeting-stryker-highlights-emerging-supply-chain-risks/</loc>
		<lastmod>2026-03-12T18:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enzoic-expands-protection-against-dark-web-credential-exposure/</loc>
		<lastmod>2026-03-12T18:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reuse-reward-how-banks-can-safely-unlock-the-value-of-their-data/</loc>
		<lastmod>2026-03-12T18:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-threat-within-how-intelligent-detection-prevented-a-potential-internal-malware-incident/</loc>
		<lastmod>2026-03-12T18:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hack-unveiling-groups-modus-operandi/</loc>
		<lastmod>2026-03-12T18:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-cloudflare-human-check-to-hide-microsoft-365-phishing-pages/</loc>
		<lastmod>2026-03-12T18:18:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-govern-ai-agents-before-they-go-rogue/</loc>
		<lastmod>2026-03-12T18:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-can-no-longer-be-treated-as-an-it-problem/</loc>
		<lastmod>2026-03-12T18:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-suspect-arrested-in-a-46m-theft-case/</loc>
		<lastmod>2026-03-12T18:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/</loc>
		<lastmod>2026-03-12T18:22:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-north-korea-it-worker-networks-in-laos-vietnam/</loc>
		<lastmod>2026-03-12T19:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-ones-for-you-mom/</loc>
		<lastmod>2026-03-12T19:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-medical-device-cyber-challenges-could-become-easier/</loc>
		<lastmod>2026-03-12T19:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/systemic-risk-stalks-healthcare-sector/</loc>
		<lastmod>2026-03-12T19:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-safety-checklist/</loc>
		<lastmod>2026-03-12T19:16:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/active-directory-flaw-enables-system-privilege-escalation/</loc>
		<lastmod>2026-03-12T19:17:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lawmakers-move-to-kill-the-fbis-warrantless-wiretap-access/</loc>
		<lastmod>2026-03-12T19:18:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-strykers-outage-is-a-disaster-recovery-wake-up-call/</loc>
		<lastmod>2026-03-12T19:19:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays/</loc>
		<lastmod>2026-03-12T19:20:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-attacks/</loc>
		<lastmod>2026-03-12T19:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-prompt-injection-peril-and-why-ai-agents-are-your-networks-newest-vulnerability/</loc>
		<lastmod>2026-03-12T20:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-essential-guide-to-access-control/</loc>
		<lastmod>2026-03-12T20:14:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-giant-stryker-crippled-after-iranian-hackers-remotely-wipe-computers/</loc>
		<lastmod>2026-03-12T20:15:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-takes-down-socksescort-proxy-network-used-in-global-fraud-schemes/</loc>
		<lastmod>2026-03-12T20:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-tehran-linked-faketivist-hacking-group-handala/</loc>
		<lastmod>2026-03-12T20:18:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-tehran-linked-faketivist-hacking-group-handala-2/</loc>
		<lastmod>2026-03-12T20:18:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/concepts-of-a-cyberplan/</loc>
		<lastmod>2026-03-12T21:12:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/io-river-embraces-wasm-to-enable-any-waf-to-run-on-any-cdn/</loc>
		<lastmod>2026-03-12T21:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-%c2%a2-inside-out-security-designed-with-not-for/</loc>
		<lastmod>2026-03-12T21:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exclusive-new-data-shows-increase-in-fbi-searches-of-americans-data-last-year/</loc>
		<lastmod>2026-03-12T21:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-lightning-takes-down-socksescort-proxy-network-blamed-for-tens-of-millions-in-fraud/</loc>
		<lastmod>2026-03-12T21:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/england-hockey-investigating-ransomware-data-breach/</loc>
		<lastmod>2026-03-12T21:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/</loc>
		<lastmod>2026-03-12T21:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-proxies-become-the-attack-vectors-in-web-architectures/</loc>
		<lastmod>2026-03-12T22:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-europol-disrupt-socksescort-network-that-exploited-thousands-of-residential-routers/</loc>
		<lastmod>2026-03-12T22:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-attack-highlights-nebulous-nature-of-iranian-cyber-activity-amid-joint-u-s-israel-conflict/</loc>
		<lastmod>2026-03-12T22:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophisticated-surveillance-rat-marketed-for-global-buyers/</loc>
		<lastmod>2026-03-12T22:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-russian-state-actors-target-signal-whatsapp/</loc>
		<lastmod>2026-03-12T22:16:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-flaw-in-wordpress-plugin-puts-400000-websites-at-risk/</loc>
		<lastmod>2026-03-12T22:17:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/</loc>
		<lastmod>2026-03-12T22:18:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-mois-colludes-with-criminals-to-boost-cyberattacks/</loc>
		<lastmod>2026-03-12T22:19:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/commercial-spyware-opponents-fear-us-policy-shifting/</loc>
		<lastmod>2026-03-12T22:21:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/commercial-spyware-opponents-fear-us-policy-shifting-2/</loc>
		<lastmod>2026-03-12T22:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-coruna-exploit-kit-flaws-for-older-ios-versions/</loc>
		<lastmod>2026-03-12T23:12:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-who-what-and-why-of-the-attack-that-has-shut-down-strykers-windows-network/</loc>
		<lastmod>2026-03-12T23:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-seeks-court-stay-of-pentagon-risk-designation/</loc>
		<lastmod>2026-03-12T23:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-can-agentic-ai-become-in-protecting-assets/</loc>
		<lastmod>2026-03-13T00:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-optimization-can-be-expected-from-ai-driven-audits/</loc>
		<lastmod>2026-03-13T00:13:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-scalable-cloud-native-security-solutions-the-future/</loc>
		<lastmod>2026-03-13T00:14:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-threat-actor-targets-persian-gulf-region-with-plugx/</loc>
		<lastmod>2026-03-13T00:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rogue-ai-agents-can-work-together-to-hack-systems-and-steal-secrets/</loc>
		<lastmod>2026-03-13T00:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographic-agility-in-model-context-protocol-implementations/</loc>
		<lastmod>2026-03-13T04:11:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-trust-in-ai-soc-analyst-solutions-a-uk-and-eu-ciso-perspective/</loc>
		<lastmod>2026-03-13T04:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telus-digital-hit-with-massive-data-breach/</loc>
		<lastmod>2026-03-13T04:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telus-digital-hit-with-massive-data-breach-2/</loc>
		<lastmod>2026-03-13T04:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-partners-rapidly-expanding-beyond-the-endpoint-ceo-tomer-weingarten/</loc>
		<lastmod>2026-03-13T04:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unit-42-unmasks-cl1087s-years-long-cyber-espionage-against-asian-militaries/</loc>
		<lastmod>2026-03-13T04:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-absicherung-mobiler-iot-und-ot-systeme/</loc>
		<lastmod>2026-03-13T04:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-grenzen-des-pentestings-simulierter-angriff-echte-schwache/</loc>
		<lastmod>2026-03-13T05:12:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-copilot-email-and-teams-summarization-flaw-opens-door-to-phishing-attacks/</loc>
		<lastmod>2026-03-13T05:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delineas-strongdm-acquisition-highlights-the-changing-role-of-pam/</loc>
		<lastmod>2026-03-13T05:15:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delineas-strongdm-acquisition-highlights-the-changing-role-of-pam-2/</loc>
		<lastmod>2026-03-13T05:15:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/im-visier-der-hacker-welche-branchen-am-starksten-gefahrdet-sind/</loc>
		<lastmod>2026-03-13T06:11:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-trends-2026-was-fur-europaische-unternehmen-wirklich-zahlt-realismus-statt-hype/</loc>
		<lastmod>2026-03-13T06:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwords-mfa-and-why-neither-is-enough/</loc>
		<lastmod>2026-03-13T06:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-march-13-2026/</loc>
		<lastmod>2026-03-13T06:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssh-gssapi-flaw-can-be-exploited-to-crash-ssh-child-processes/</loc>
		<lastmod>2026-03-13T06:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fileless-remcos-rat-attack-uses-javascript-and-powershell-to-slip-past-detection/</loc>
		<lastmod>2026-03-13T06:16:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution/</loc>
		<lastmod>2026-03-13T06:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-innovation-sandbox-token-securityi%c2%bcs-advocate-of-the-machine-first-identity-security-concept/</loc>
		<lastmod>2026-03-13T07:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-innovation-sandbox-token-securityi%c2%bcs-advocate-of-the-machine-first-identity-security-concept-2/</loc>
		<lastmod>2026-03-13T07:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-may-redefine-risk-in-industrial-operations/</loc>
		<lastmod>2026-03-13T07:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-coding-agents-keep-repeating-decade-old-security-mistakes/</loc>
		<lastmod>2026-03-13T07:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/six-packagist-packages-linked-to-trojanized-jquery-campaign/</loc>
		<lastmod>2026-03-13T07:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-critical-mediatek-vulnerability-exposes-android-phone-pins-to-theft-in-45-seconds/</loc>
		<lastmod>2026-03-13T07:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-handala-ramps-up-wiper-attacks-on-israeli-western-targets/</loc>
		<lastmod>2026-03-13T07:20:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-disrupt-socksescort-proxy-botnet-exploiting-369000-ips-across-163-countries/</loc>
		<lastmod>2026-03-13T07:21:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speicherfehler-google-stopft-3-kritische-sicherheitslucken-in-chrome/</loc>
		<lastmod>2026-03-13T07:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-legacy-logins-to-federated-identity-a-step-by-step-modernization-framework/</loc>
		<lastmod>2026-03-13T08:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-perimeter-was-never-dead-we-just-abandoned-it/</loc>
		<lastmod>2026-03-13T08:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-perimeter-was-never-dead-we-just-abandoned-it-4/</loc>
		<lastmod>2026-03-13T08:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-perimeter-was-never-dead-we-just-abandoned-it-3/</loc>
		<lastmod>2026-03-13T08:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-perimeter-was-never-dead-we-just-abandoned-it-2/</loc>
		<lastmod>2026-03-13T08:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-perimeter-was-never-dead-we-just-abandoned-it-5/</loc>
		<lastmod>2026-03-13T08:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hive0163-ransomware-operators-use-ai-generated-slopoly-malware/</loc>
		<lastmod>2026-03-13T08:16:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-two-new-chrome-zero-days-exploited-in-attacks/</loc>
		<lastmod>2026-03-13T08:17:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/psexec-and-renamed-backup-tools-enabled-data-theft-before-inc-ransomware-attack/</loc>
		<lastmod>2026-03-13T08:18:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-newly-discovered-chrome-zero-days-exploited-in-the-wild-to-run-malicious-code/</loc>
		<lastmod>2026-03-13T08:19:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-crackarmor-vulnerabilities-expose-12-6-million-linux-servers-to-full-root-takeover/</loc>
		<lastmod>2026-03-13T08:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-andreas-gaetje-ciso-bei-korber-ki-im-soc-effizienz-steigt-autonomie-bleibt-begrenzt/</loc>
		<lastmod>2026-03-13T08:21:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starbucks-discloses-data-breach-affecting-hundreds-of-employees/</loc>
		<lastmod>2026-03-13T09:13:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-nutzen-gefalschte-claude-code-downloads/</loc>
		<lastmod>2026-03-13T09:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-sicherheit-und-datensouveranitat-fur-kmu-th-koln-traumt-von-dezentralisierung-in-der-cloud/</loc>
		<lastmod>2026-03-13T09:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ein-falscher-klick-genugt-chrome-nutzer-werden-attackiert/</loc>
		<lastmod>2026-03-13T09:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-targets-enterprise-vpn-users-with-seo-poisoning-fake-clients/</loc>
		<lastmod>2026-03-13T10:18:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-targets-enterprise-vpn-users-with-seo-poisoning-fake-clients-2/</loc>
		<lastmod>2026-03-13T10:19:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plattform-privatheit-ladt-nach-frankfurt-am-main-ein-ki-freundin-versus-datenkrake/</loc>
		<lastmod>2026-03-13T10:20:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-healthtech-innovator-humata-health-partners-with-accuknox-for-zero-trust-cnapp/</loc>
		<lastmod>2026-03-13T10:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-file-servers-securing-unstructured-data-in-the-era-of-ai/</loc>
		<lastmod>2026-03-13T10:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-war-bait-fuels-ta453-ta473-phishing-campaigns/</loc>
		<lastmod>2026-03-13T10:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8/</loc>
		<lastmod>2026-03-13T10:25:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-isolation/</loc>
		<lastmod>2026-03-13T10:26:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-resilience-designing-incident-response-across-on-prem-cloud-and-saas-without-losing-your-mind/</loc>
		<lastmod>2026-03-13T10:27:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-resilience-designing-incident-response-across-on-prem-cloud-and-saas-without-losing-your-mind-2/</loc>
		<lastmod>2026-03-13T10:28:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefahrliche-sicherheitslucke-warum-nutzer-alterer-iphones-sofort-updaten-sollten/</loc>
		<lastmod>2026-03-13T10:29:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kleinanzeigen-betrug-geschicktes-social-engineering-statt-was-letzte-preis-so-schutzt-man-sich/</loc>
		<lastmod>2026-03-13T10:30:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-nur-45-sekunden-sicherheitsforscher-knacken-android-smartphone-warum-das-millionen-gerate-betrifft/</loc>
		<lastmod>2026-03-13T10:31:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-app-developer-android-kmp-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-03-13T10:33:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-app-developer-android-kmp-gesucht-schau-dir-unsere-top-jobs-an-2/</loc>
		<lastmod>2026-03-13T10:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-threat-research-unit-entdeckt-crackarmor/</loc>
		<lastmod>2026-03-13T10:34:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proxy-netzwerk-zerschlagen-370-000-router-und-iot-gerate-von-hackern-missbraucht/</loc>
		<lastmod>2026-03-13T10:34:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-releases-emergency-ios-15-8-7-update-to-block-coruna-exploit-kit/</loc>
		<lastmod>2026-03-13T10:35:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/making-the-internet-safer-for-children-the-case-for-automated-privacy-preserving-solutions/</loc>
		<lastmod>2026-03-13T10:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-threat-intelligence-protects-player-experience-for-betting-and-gaming-customers/</loc>
		<lastmod>2026-03-13T10:14:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-threat-intelligence-protects-player-experience-for-betting-and-gaming-customers-2/</loc>
		<lastmod>2026-03-13T10:15:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-the-soc-why-explainability-is-the-new-security-control/</loc>
		<lastmod>2026-03-13T10:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-staatliche-cyberangriffe-auf-europaische-und-nahostliche-regierungen/</loc>
		<lastmod>2026-03-13T10:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-soc-2-controls-for-saas-providers/</loc>
		<lastmod>2026-03-13T11:12:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-the-white-house-cyber-strategy-why-resilience-matters-now/</loc>
		<lastmod>2026-03-13T11:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-breach-focused-microsegmentation-could-have-contained-awss-ai-agent-outages/</loc>
		<lastmod>2026-03-13T11:15:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rechenzentren-in-holzbauweise-von-schweden-bis-deutschland-wird-vermehrt-auf-brettsperrholz-statt-stahlbeton-gesetzt/</loc>
		<lastmod>2026-03-13T11:16:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-temu-coin-airdrop-uses-clickfix-trick-to-install-stealthy-malware/</loc>
		<lastmod>2026-03-13T11:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-fixes-rce-bugs-in-critical-backup-replication-platform/</loc>
		<lastmod>2026-03-13T11:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixed-two-new-actively-exploited-flaws-in-the-chrome-browser/</loc>
		<lastmod>2026-03-13T11:19:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-dismantle-socksescort-proxy-network-behind-millions-in-fraud/</loc>
		<lastmod>2026-03-13T11:20:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-dismantles-socksescort-proxy-network-in-operation-lightning/</loc>
		<lastmod>2026-03-13T11:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-global-cyberattacks-espionage-malware-and-critical-security-updates/</loc>
		<lastmod>2026-03-13T11:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-112-nis-2-braucht-im-mittelstand-pragmatische-ansatze/</loc>
		<lastmod>2026-03-13T11:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-modeling-with-ai-a-developer-driven-boon-for-enterprise-security/</loc>
		<lastmod>2026-03-13T12:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/academia-and-the-ai-brain-drain/</loc>
		<lastmod>2026-03-13T12:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-customer-acquisition-cost-is-rising-faster-than-revenue-for-many-saas-companies/</loc>
		<lastmod>2026-03-13T12:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-rushes-chrome-update-fixing-two-zero-days-already-under-attack/</loc>
		<lastmod>2026-03-13T12:14:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-agencies-face-cisa-deadline-over-critical-cisco-sd-wan-flaw/</loc>
		<lastmod>2026-03-13T12:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-healthtech-innovator-humata-health-partners-with-accuknox-for-zero-trust-cnapp-2/</loc>
		<lastmod>2026-03-13T12:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-healthtech-innovator-humata-health-partners-with-accuknox-for-zero-trust-cnapp-2/</loc>
		<lastmod>2026-03-13T12:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-shut-down-proxy-service-linked-to-malware-campaign-targeting-thousands-of-users/</loc>
		<lastmod>2026-03-13T12:17:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starbucks-data-breach-exposes-personal-data-of-hundreds-of-users/</loc>
		<lastmod>2026-03-13T12:18:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-uses-seo-poisoning-fake-signed-vpn-apps-to-steal-enterprise-credentials/</loc>
		<lastmod>2026-03-13T12:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlag-gegen-cybercrime-interpol-nimmt-mehr-als-45-000-systeme-vom-netz/</loc>
		<lastmod>2026-03-13T12:20:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-warns-admins-to-patch-now-as-critical-rce-flaws-hit-backup-replication/</loc>
		<lastmod>2026-03-13T13:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-warns-admins-to-patch-now-as-critical-rce-flaws-hit-backup-replication-2/</loc>
		<lastmod>2026-03-13T13:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/veeam-warns-admins-to-patch-now-as-critical-rce-flaws-hit-backup-replication-3/</loc>
		<lastmod>2026-03-13T13:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsmodul-im-linux-kernel-weist-neun-sicherheitslucken-auf/</loc>
		<lastmod>2026-03-13T13:15:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-cybercrime-crackdown-leads-to-94-arrests-45000-ip-takedowns/</loc>
		<lastmod>2026-03-13T13:16:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-assisted-slopoly-malware-powers-hive0163s-ransomware-campaigns/</loc>
		<lastmod>2026-03-13T13:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-parliament-backs-extension-of-csam-detection-rules-until-2027/</loc>
		<lastmod>2026-03-13T13:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-critical-adguard-home-flaw-lets-attackers-bypass-authentication/</loc>
		<lastmod>2026-03-13T13:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acht-jahre-dsgvo-aber-lucken-bleiben-bestehen-datenschutz-zwischen-regeln-und-realitat/</loc>
		<lastmod>2026-03-13T13:19:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-iam-platforms-with-device-aware-access-control-for-enterprise-sso-2026/</loc>
		<lastmod>2026-03-13T14:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-unternehmen-die-tickende-compliance-zeitbombe-der-schatten-ki-stoppen-konnen/</loc>
		<lastmod>2026-03-13T14:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschte-kierweiterungen-gefahrden-unternehmens-chats/</loc>
		<lastmod>2026-03-13T14:13:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sql-injection-vulnerability-in-ally-wordpress-plugin-exposes-200k-sites/</loc>
		<lastmod>2026-03-13T14:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hacktivists-claim-destructive-cyberattack-on-medtech-firm-stryker/</loc>
		<lastmod>2026-03-13T14:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-sinkholes-45000-ip-addresses-in-cybercrime-crackdown/</loc>
		<lastmod>2026-03-13T14:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-enterprise-vpn-downloads-used-to-steal-company-credentials/</loc>
		<lastmod>2026-03-13T14:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-banking-trojan-strikes-brazils-pix-users/</loc>
		<lastmod>2026-03-13T14:18:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/investigating-a-new-click-fix-variant/</loc>
		<lastmod>2026-03-13T14:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alex-karp-palantir-ceo-skizziert-trump-freundliche-agenda-2/</loc>
		<lastmod>2026-03-13T14:21:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alex-karp-palantir-ceo-skizziert-trump-freundliche-agenda/</loc>
		<lastmod>2026-03-13T14:21:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/users-protest-as-google-antigravity-price-floats-upward/</loc>
		<lastmod>2026-03-13T15:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-vmware-to-whats-next-protecting-data-during-hypervisor-migration/</loc>
		<lastmod>2026-03-13T15:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/will-ai-save-consumers-from-smartphone-based-phishing-attacks/</loc>
		<lastmod>2026-03-13T15:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-google-cloud-attacks-start-with-bug-exploitation/</loc>
		<lastmod>2026-03-13T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-google-cloud-attacks-start-with-bug-exploitation-2/</loc>
		<lastmod>2026-03-13T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-google-cloud-attacks-start-with-bug-exploitation-3/</loc>
		<lastmod>2026-03-13T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-orgs-can-learn-from-olympics-world-cup-ir-plans/</loc>
		<lastmod>2026-03-13T15:16:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials/</loc>
		<lastmod>2026-03-13T15:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-claims-massive-cyber-attack-on-medtech-firm-stryker/</loc>
		<lastmod>2026-03-13T15:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-networks-prasentiert-erste-echtzeit-netzwerkabbildung/</loc>
		<lastmod>2026-03-13T15:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-threat-research-unit-entdeckt-crackarmor-sicherheitslucken-in-apparmor/</loc>
		<lastmod>2026-03-13T15:20:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-act-ai-automated-verification/</loc>
		<lastmod>2026-03-13T16:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-act-ai-automated-verification-2/</loc>
		<lastmod>2026-03-13T16:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-authorization-for-multi-agent-systems-when-ai-agents-call-other-ai-agents/</loc>
		<lastmod>2026-03-13T16:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/loveholidays-protects-its-apis-improves-conversions-with-real-time-bot-defense/</loc>
		<lastmod>2026-03-13T16:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-two-chrome-zero-days-under-active-attack-update-now/</loc>
		<lastmod>2026-03-13T16:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/even-primitive-ai-coded-malware-helps-hackers-move-faster-thwart-attribution/</loc>
		<lastmod>2026-03-13T16:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-incident-responder-gave-info-to-blackcat-cybercriminals-during-negotiations-doj-alleges/</loc>
		<lastmod>2026-03-13T16:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-fbi-is-investigating-malware-hidden-inside-games-hosted-on-steam/</loc>
		<lastmod>2026-03-13T16:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-and-european-authorities-disrupt-socksescort-proxy-service-tied-to-avrecon-botnet/</loc>
		<lastmod>2026-03-13T16:21:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-agent-hacked-mckinseys-ai-in-2-hours/</loc>
		<lastmod>2026-03-13T16:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-agent-hacked-mckinseys-ai-in-2-hours-2/</loc>
		<lastmod>2026-03-13T16:22:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starbucks-discloses-data-breach-affecting-hundreds-of-employees-2/</loc>
		<lastmod>2026-03-13T16:24:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-dismantles-45000-malicious-ips-arrests-94-in-global-cybercrime/</loc>
		<lastmod>2026-03-13T16:25:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-sophos-so-wahlen-ransomware-gruppen-ihre-opfer-aus/</loc>
		<lastmod>2026-03-13T16:26:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-gegen-cybercrime-systeme-hinter-45-000-ip-adressen-vom-netz-genommen/</loc>
		<lastmod>2026-03-13T16:27:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-building-a-voting-machine-everyone-can-trust/</loc>
		<lastmod>2026-03-13T17:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-changes-the-role-of-privileged-access-in-cybersecurity/</loc>
		<lastmod>2026-03-13T17:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strykers-manufacturing-shipping-disrupted-after-cyberattack/</loc>
		<lastmod>2026-03-13T17:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-council-includes-ban-on-nudification-tools-in-its-proposal-for-amending-ai-act/</loc>
		<lastmod>2026-03-13T17:16:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-liability-turns-the-ciso-into-the-fall-guy/</loc>
		<lastmod>2026-03-13T17:17:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hack-the-ai-brain-langsmith-vulnerability-could-expose-sensitive-ai-data/</loc>
		<lastmod>2026-03-13T17:18:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-falls-behind-on-supercomputing-amid-slow-investment-nao-warns/</loc>
		<lastmod>2026-03-13T17:19:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpols-operation-synergia-iii-nets-94-arrests-in-major-cybercrime-sweep/</loc>
		<lastmod>2026-03-13T17:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unkontrollierbares-fehlverhalten-ki-agenten-werden-zu-immer-groserem-insider-risiko/</loc>
		<lastmod>2026-03-13T17:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federated-governance-for-ai-identities-closing-the-92-visibility-gap/</loc>
		<lastmod>2026-03-13T18:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-installation/</loc>
		<lastmod>2026-03-13T18:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watch-out-for-fake-malwarebytes-renewal-notices-in-your-calendar/</loc>
		<lastmod>2026-03-13T18:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/application-level-encryption-enable-applications-to-interact-with-encrypted-files/</loc>
		<lastmod>2026-03-13T18:16:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/credential-stealing-crew-spoofs-vpn-clients-from-cisco-fortinet-and-others/</loc>
		<lastmod>2026-03-13T18:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crackarmor-vulnerability-in-apparmor-impacts-12-6m-linux-systems/</loc>
		<lastmod>2026-03-13T18:18:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conducting-a-security-risk-analysis-under-legal-privilege/</loc>
		<lastmod>2026-03-13T18:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-cybersecurity-obstacles-in-rural-healthcare/</loc>
		<lastmod>2026-03-13T18:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-obliterates-cyber-criminal-infrastructure/</loc>
		<lastmod>2026-03-13T18:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polands-nuclear-research-centre-targeted-by-cyberattack/</loc>
		<lastmod>2026-03-13T18:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-investigates-classic-outlook-sync-and-connection-issues/</loc>
		<lastmod>2026-03-13T18:24:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-enterprise-vpn-sites-used-to-steal-company-credentials/</loc>
		<lastmod>2026-03-13T18:26:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-enterprise-vpn-sites-used-to-steal-company-credentials-2/</loc>
		<lastmod>2026-03-13T18:26:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mapping-the-unknown-introducing-pius-for-organizational-asset-discovery/</loc>
		<lastmod>2026-03-13T19:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-cyber-regulations-for-water-organizations-to-take-effect-in-2027-2/</loc>
		<lastmod>2026-03-13T19:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-york-cyber-regulations-for-water-organizations-to-take-effect-in-2027/</loc>
		<lastmod>2026-03-13T19:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-european-emissions-regs-include-cybersecurity-rules/</loc>
		<lastmod>2026-03-13T19:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-two-chrome-zero-day-vulnerabilities-actively-exploited-in-the-wild/</loc>
		<lastmod>2026-03-13T19:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-security-the-new-attack-surface-of-ai-powered-robots/</loc>
		<lastmod>2026-03-13T19:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-risks-critical-vulnerabilities-and-data-breaches-define-this-week-in-cybersecurity/</loc>
		<lastmod>2026-03-13T19:18:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-risks-critical-vulnerabilities-and-data-breaches-define-this-week-in-cybersecurity-2/</loc>
		<lastmod>2026-03-13T19:18:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-malware/</loc>
		<lastmod>2026-03-13T19:19:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-to-shut-down-instagram-endend-encrypted-chat-support-starting-may-2026/</loc>
		<lastmod>2026-03-13T19:20:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-present-insider-threat-as-rogue-behaviors-bypass-cyber-defenses-study/</loc>
		<lastmod>2026-03-13T20:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smbs-can-proactively-strengthen-cybersecurity/</loc>
		<lastmod>2026-03-13T20:14:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-has-given-you-two-new-problems-and-identity-governance-is-the-only-place-they-meet/</loc>
		<lastmod>2026-03-13T20:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-ai-access-risks-for-cisos-and-how-ai-governance-closes-the-gaps/</loc>
		<lastmod>2026-03-13T20:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-govern-ai-access-to-erp-and-financial-systems/</loc>
		<lastmod>2026-03-13T20:17:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-govern-ai-access-to-erp-and-financial-systems-2/</loc>
		<lastmod>2026-03-13T20:18:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-govern-ai-access-to-erp-and-financial-systems-3/</loc>
		<lastmod>2026-03-13T20:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-main-line-health-secures-devices-with-microsegmentation/</loc>
		<lastmod>2026-03-13T20:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-authenticator-flaw-on-android-ios-could-leak-login-codes-for-millions/</loc>
		<lastmod>2026-03-13T20:19:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-pocs-misunderstood-risks-cause-cisco-sd-wan-chaos/</loc>
		<lastmod>2026-03-13T20:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-pocs-misunderstood-risks-cause-cisco-sd-wan-chaos-2/</loc>
		<lastmod>2026-03-13T20:20:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/et-tu-rdp-detecting-sticky-keys-backdoors-with-brutus-and-webassembly/</loc>
		<lastmod>2026-03-13T21:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-securing-packages-in-npm-homebrew-pypi-maven-central-and-rubygems/</loc>
		<lastmod>2026-03-13T21:14:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/</loc>
		<lastmod>2026-03-13T21:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-operation-synergia-iii-shuts-down-45000-malicious-ips-94-arrested/</loc>
		<lastmod>2026-03-13T21:16:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-targeted-polands-national-centre-for-nuclear-research/</loc>
		<lastmod>2026-03-13T21:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bold-launches-with-40m-to-target-ai-risks-on-endpoints/</loc>
		<lastmod>2026-03-13T21:18:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-iran-conflict-expands-into-cyber-warfare/</loc>
		<lastmod>2026-03-13T21:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modern-applications-outgrow-role-based-access-control/</loc>
		<lastmod>2026-03-13T21:20:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-facial-recognition-error-jails-tennessee-grandmother-for-months/</loc>
		<lastmod>2026-03-13T21:21:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-chrome-security-flaws-threaten-billions-of-users-worldwide/</loc>
		<lastmod>2026-03-13T21:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-what-to-expect-from-bitdefender/</loc>
		<lastmod>2026-03-13T22:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-what-to-expect-from-bitdefender-2/</loc>
		<lastmod>2026-03-13T22:14:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-what-to-expect-from-bitdefender-3/</loc>
		<lastmod>2026-03-13T22:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-what-to-expect-from-bitdefender-4/</loc>
		<lastmod>2026-03-13T22:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/update-march-13-talos-on-the-developing-situation-in-the-middle-east/</loc>
		<lastmod>2026-03-13T22:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cyber-strategy-puts-private-sector-on-the-offensive/</loc>
		<lastmod>2026-03-13T22:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seeks-victims-of-steam-games-used-to-spread-malware/</loc>
		<lastmod>2026-03-13T22:19:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-data-gap-why-nonprofit-cyber-incidents-go-underreported/</loc>
		<lastmod>2026-03-13T22:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-data-gap-why-nonprofit-cyber-incidents-go-underreported-2/</loc>
		<lastmod>2026-03-13T22:21:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-data-gap-why-nonprofit-cyber-incidents-go-underreported-3/</loc>
		<lastmod>2026-03-13T22:21:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattackers-dont-care-about-good-causes/</loc>
		<lastmod>2026-03-13T22:22:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-teams-with-managed-machine-identities/</loc>
		<lastmod>2026-03-13T23:13:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-is-agentic-ai-innovating-financial-sector-practices/</loc>
		<lastmod>2026-03-13T23:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-businesses-free-to-choose-their-ai-driven-solutions/</loc>
		<lastmod>2026-03-13T23:14:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ironscales-winter-26-release-preemptive-email-security/</loc>
		<lastmod>2026-03-13T23:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-google-chrome-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-13T23:16:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ailock-ransomware-claims-england-hockey-data-breach/</loc>
		<lastmod>2026-03-13T23:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starbucks-hr-portal-breach-exposes-employee-information/</loc>
		<lastmod>2026-03-13T23:18:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-users-cant-access-c-drive-on-some-samsung-pcs/</loc>
		<lastmod>2026-03-13T23:19:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-post-quantum-cryptography-cant-wait/</loc>
		<lastmod>2026-03-13T23:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-post-quantum-cryptography-cant-wait-2/</loc>
		<lastmod>2026-03-13T23:21:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-guy-who-wrote-the-code-died-in-2005-i-still-have-to-secure-it/</loc>
		<lastmod>2026-03-13T23:21:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ai-agent-didnt-hack-mckinsey-its-exposed-apis-did/</loc>
		<lastmod>2026-03-14T00:11:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-anlass-zur-neubewertung-eigener-cyberresilienz-als-chefsache/</loc>
		<lastmod>2026-03-14T00:12:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crackarmor-neun-sicherheitslucken-in-millionen-von-linux-systemen-entdeckt/</loc>
		<lastmod>2026-03-14T00:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/d3-morpheus-for-your-microsoft-security-environment/</loc>
		<lastmod>2026-03-14T04:13:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-rooms-props-and-a-script-to-lure-victims-inside-an-abandoned-cambodia-scam-centre/</loc>
		<lastmod>2026-03-14T04:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-authorities-take-down-45000-malicious-ips-used-in-ransomware-campaigns/</loc>
		<lastmod>2026-03-14T05:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-5-ai-pentesting-tools-in-2026/</loc>
		<lastmod>2026-03-14T07:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-spreads-via-72-malicious-open-vsx-extensions-hidden-in-transitive-dependencies/</loc>
		<lastmod>2026-03-14T08:12:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-grunde-warum-unternehmen-auf-eine-data-mesh-architektur-setzen-sollten-data-mesh-vs-data-lake-vs-data-fabric/</loc>
		<lastmod>2026-03-14T09:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mikrosegmentierung-neue-strategie-fur-pravention-resilienz-und-sicherheit/</loc>
		<lastmod>2026-03-14T09:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whitehall-seeks-lone-c-coder-to-keep-airport-passenger-model-flying/</loc>
		<lastmod>2026-03-14T09:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-operation-synergia-iii-leads-to-45000-malicious-ips-dismantled-and-94-arrests-worldwide/</loc>
		<lastmod>2026-03-14T09:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-hacker-accidentally-broke-into-the-fbis-epstein-files/</loc>
		<lastmod>2026-03-14T11:11:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dotnettojscript-execute-c-from-jscript/</loc>
		<lastmod>2026-03-14T12:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dotnettojscript-execute-c-from-jscript-2/</loc>
		<lastmod>2026-03-14T12:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-checklist/</loc>
		<lastmod>2026-03-14T12:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-iam-updateloginprofile-abuse-2/</loc>
		<lastmod>2026-03-14T12:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-iam-updateloginprofile-abuse/</loc>
		<lastmod>2026-03-14T12:16:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-iam-updateloginprofile-abuse-3/</loc>
		<lastmod>2026-03-14T12:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-iam-updateloginprofile-abuse-4/</loc>
		<lastmod>2026-03-14T12:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-cover-your-tracks/</loc>
		<lastmod>2026-03-14T12:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-mobile-graphene-os-setup-3/</loc>
		<lastmod>2026-03-14T12:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-mobile-graphene-os-setup/</loc>
		<lastmod>2026-03-14T12:19:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-mobile-graphene-os-setup-2/</loc>
		<lastmod>2026-03-14T12:19:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-mobile-graphene-os-setup-4/</loc>
		<lastmod>2026-03-14T12:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-mobile-graphene-os-installation-part-1/</loc>
		<lastmod>2026-03-14T12:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netexec-for-pentester-file-transfer/</loc>
		<lastmod>2026-03-14T12:22:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-metadata-cleaner/</loc>
		<lastmod>2026-03-14T12:23:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-iam-createloginprofile-abuse/</loc>
		<lastmod>2026-03-14T12:24:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-protection-encrypted-dns/</loc>
		<lastmod>2026-03-14T12:25:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/district-denies-enrollment-to-child-based-on-license-plate-reader-data/</loc>
		<lastmod>2026-03-14T13:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/district-denies-enrollment-to-child-based-on-license-plate-reader-data-2/</loc>
		<lastmod>2026-03-14T13:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-1-petabyte-data-theft-from-telecom-giant-telus/</loc>
		<lastmod>2026-03-14T13:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-lures-victims-to-spoofed-vpn-sites-to-harvest-corporate-logins/</loc>
		<lastmod>2026-03-14T13:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitales-vertrauen-wird-strategisch-wie-keyfactor-unternehmen-auf-neue-krypto-realitaten-vorbereitet/</loc>
		<lastmod>2026-03-14T13:16:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-supply-chain-attack-abuses-72-open-vsx-extensions-to-target-developers/</loc>
		<lastmod>2026-03-14T14:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/</loc>
		<lastmod>2026-03-14T15:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-zombie-devices-are-running-amuck/</loc>
		<lastmod>2026-03-14T16:14:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appsflyer-web-sdk-hijacked-to-spread-crypto-stealing-javascript-code/</loc>
		<lastmod>2026-03-14T16:15:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-000-router-infiziert-wie-die-gerate-von-kriminellen-als-botnetz-genutzt-werden/</loc>
		<lastmod>2026-03-14T16:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aktiv-ausgenutzte-sicherheitslucken-entdeckt-dieses-update-fur-google-chrome-musst-du-jetzt-installieren/</loc>
		<lastmod>2026-03-14T17:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/starbucks-data-breach-impacts-889-employees/</loc>
		<lastmod>2026-03-14T18:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-agent-flaws-could-enable-prompt-injection-and-data-exfiltration/</loc>
		<lastmod>2026-03-14T18:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-the-ai-magic-is-back-whether-it-endured-depends-on-amazons-next-moves/</loc>
		<lastmod>2026-03-14T22:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-the-ai-magic-is-back-whether-it-endured-depends-on-amazons-next-moves-2/</loc>
		<lastmod>2026-03-14T22:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ram-is-getting-expensive-so-squeeze-the-most-from-it/</loc>
		<lastmod>2026-03-14T23:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-windows-11-oob-hotpatch-to-fix-rras-rce-flaw/</loc>
		<lastmod>2026-03-14T23:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-reassured-can-we-be-with-our-current-cloud-security-strategies/</loc>
		<lastmod>2026-03-15T00:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-reassured-can-we-be-with-our-current-cloud-security-strategies-2/</loc>
		<lastmod>2026-03-15T00:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-healthcare-data-systems-supported-by-nhis-effectively/</loc>
		<lastmod>2026-03-15T00:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-ai-in-travel-industry-security-powerful/</loc>
		<lastmod>2026-03-15T00:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-angriffe-zu-feiertagen-ostern-droht-wieder-ein-saisonaler-hohepunkt/</loc>
		<lastmod>2026-03-15T04:11:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geschwindigkeit-sowie-sicherheit-in-einklang-bringen-und-dabei-digitale-innovation-nachhaltig-im-unternehmen-verankern/</loc>
		<lastmod>2026-03-15T04:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-cyberangriffe-skaliert-4/</loc>
		<lastmod>2026-03-15T05:13:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-cyberangriffe-skaliert-2/</loc>
		<lastmod>2026-03-15T05:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-cyberangriffe-skaliert/</loc>
		<lastmod>2026-03-15T05:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-cyberangriffe-skaliert-3/</loc>
		<lastmod>2026-03-15T05:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-von-10-cisos-furchten-dass-agentic-ai-social-engineering-angriffe-gefahrlicher-macht/</loc>
		<lastmod>2026-03-15T06:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-aitm-phishing-kit-used-to-hijack-aws-accounts-year-long-malware-campaign-targets-hr/</loc>
		<lastmod>2026-03-15T10:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-vergiftete-pdfs-und-bilder-wie-prompt-injections-und-data-poisoning-funktionieren/</loc>
		<lastmod>2026-03-15T10:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-federal-strategies-rising-risk-from-iran-top-cyber-themes/</loc>
		<lastmod>2026-03-15T11:13:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-allianz-fur-digitale-sicherheit-epam-wird-misa-mitglied/</loc>
		<lastmod>2026-03-15T12:11:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abo-falle-nahrungserganzungsmittel-verbraucherschutzer-warnen-vor-inkasso-karussell/</loc>
		<lastmod>2026-03-15T14:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-567-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-03-15T14:14:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-88/</loc>
		<lastmod>2026-03-15T15:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks/</loc>
		<lastmod>2026-03-15T15:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enorme-gebuhr-us-regierung-verschafft-sich-10-milliarden-bei-tiktok-deal/</loc>
		<lastmod>2026-03-15T15:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-banking-group-investigates-mobile-app-data-exposure-affecting-multiple-uk-banks/</loc>
		<lastmod>2026-03-15T16:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-investor-unpacks-googles-32b-acquisition/</loc>
		<lastmod>2026-03-15T16:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital/</loc>
		<lastmod>2026-03-15T16:16:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/usenix-security-25-enigma-track-usernames-passwords-and-security/</loc>
		<lastmod>2026-03-15T17:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pdf-phishing-how-cybercriminals-exploit-pdf-documents-in-modern-email-attacks/</loc>
		<lastmod>2026-03-15T19:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-most-ddos-protection-fails-solving-for-continuity-and-resilience/</loc>
		<lastmod>2026-03-15T20:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-u-s-israeli-hostilities-lead-to-increased-threat-landscape-2/</loc>
		<lastmod>2026-03-15T21:12:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gaming-clans-become-growth-engine-for-playnance-ecosystem-2/</loc>
		<lastmod>2026-03-15T23:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gaming-clans-become-growth-engine-for-playnance-ecosystem/</loc>
		<lastmod>2026-03-15T23:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenrettung-bei-maschinen-und-anlagen-wiederherstellung-von-maschinensteuerungen-immer-einen-versuch-wert/</loc>
		<lastmod>2026-03-16T00:14:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-says-chatgpt-ads-are-not-rolling-out-globally-for-now/</loc>
		<lastmod>2026-03-16T00:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-insider-risk-is-a-wellbeing-issue-not-just-a-disciplinary-one/</loc>
		<lastmod>2026-03-16T04:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-insider-risk-is-a-wellbeing-issue-not-just-a-disciplinary-one-2/</loc>
		<lastmod>2026-03-16T04:12:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographic-agility-in-mcp-resource-server-orchestration/</loc>
		<lastmod>2026-03-16T04:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-must-businesses-be-certain-about-ai-driven-operational-decisions/</loc>
		<lastmod>2026-03-16T04:15:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-ai-driven-solutions-fit-upscale-budgets/</loc>
		<lastmod>2026-03-16T04:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-independent-can-ai-ethics-governance-become/</loc>
		<lastmod>2026-03-16T04:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualifizierung-deutschlands-schwachstelle-der-ki-offensive/</loc>
		<lastmod>2026-03-16T04:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-wahrheiten-uber-digitale-resilienz-in-der-sales-saison/</loc>
		<lastmod>2026-03-16T05:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulhunt-open-source-vulnerability-detection-framework/</loc>
		<lastmod>2026-03-16T06:12:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-scandal-clips-on-facebook-bait-victims-into-investment-scams/</loc>
		<lastmod>2026-03-16T06:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-outband-patch-for-critical-windows-11-rras-rce-flaws/</loc>
		<lastmod>2026-03-16T06:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-permanently-disables-endend-encryption-for-instagram-dms/</loc>
		<lastmod>2026-03-16T06:16:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-ai-agents-vulnerable-to-indirect-prompt-injection-causing-data-leaks/</loc>
		<lastmod>2026-03-16T07:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortigate-firewall-exploitation-fuels-network-breaches-in-new-attack-wave/</loc>
		<lastmod>2026-03-16T07:18:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-teams-quick-assist-to-deploy-stealthy-a0backdoor/</loc>
		<lastmod>2026-03-16T07:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-blocks-non-accessibility-apps-from-accessibility-api-to-prevent-malware-abuse/</loc>
		<lastmod>2026-03-16T07:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-bypass-hpe-autopass-license-server-lasst-zugriff-ohne-anmeldung-zu/</loc>
		<lastmod>2026-03-16T07:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-privacy-problem-with-metas-ray-ban-smart-glasses/</loc>
		<lastmod>2026-03-16T07:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-techniques-evolve-in-new-infostealer-campaigns/</loc>
		<lastmod>2026-03-16T07:13:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/certificate-lifespans-are-shrinking-and-most-organizations-arent-ready/</loc>
		<lastmod>2026-03-16T07:14:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-smart-factories-keep-getting-wrong-about-cybersecurity/</loc>
		<lastmod>2026-03-16T07:15:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konni-hijacks-kakaotalk-accounts-in-spear-phishing-malware-campaign/</loc>
		<lastmod>2026-03-16T07:16:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-are-your-ddos-testing-options-in-2026/</loc>
		<lastmod>2026-03-16T08:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-it-takes-to-win-that-cso-role/</loc>
		<lastmod>2026-03-16T08:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-it-takes-to-win-that-cso-role-2/</loc>
		<lastmod>2026-03-16T08:14:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-demands-proof-after-costa-rica-blames-unc2814-for-ice-cyberattack/</loc>
		<lastmod>2026-03-16T08:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acrstealer-variant-deploys-syscall-evasion-tls-c2-secondary-payloads/</loc>
		<lastmod>2026-03-16T08:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-march-9-march-15/</loc>
		<lastmod>2026-03-16T09:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-face-of-destruction-inside-void-manticores-handala-hack-ai-assisted-wiping-operations/</loc>
		<lastmod>2026-03-16T09:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unprivileged-users-could-exploit-apparmor-bugs-to-gain-root-access/</loc>
		<lastmod>2026-03-16T09:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsmanagement-und-ki-sicherheit-okta-erweitert-identity-security-posture-management-um-agent-discovery/</loc>
		<lastmod>2026-03-16T09:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-sicherheit-cyberangriffe-kosten-autosektor-uber-20-milliarden-dollar/</loc>
		<lastmod>2026-03-16T09:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/45000-malicious-ip-addresses-taken-down-94-suspects-arrested/</loc>
		<lastmod>2026-03-16T09:18:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warnt-samsung-app-macht-windows-pcs-unbrauchbar/</loc>
		<lastmod>2026-03-16T09:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-recent-paypal-breach-says-about-modern-web-risk/</loc>
		<lastmod>2026-03-16T10:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weaponizing-conflict-threatlabz-exposes-mustang-pandas-rapid-plugx-campaign-in-the-middle-east/</loc>
		<lastmod>2026-03-16T10:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-tried-to-breach-polands-nuclear-research-centre/</loc>
		<lastmod>2026-03-16T10:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-for-one-group-erhalt-globalen-sap-partner-award-2026/</loc>
		<lastmod>2026-03-16T10:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/100-video-calls-per-day-models-are-applying-to-be-the-face-of-ai-scams/</loc>
		<lastmod>2026-03-16T10:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-filezilla-downloads-spread-rat-via-stealthy-multi-stage-loader/</loc>
		<lastmod>2026-03-16T10:18:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecuritys-maginot-line-is-crumbling-the-future-belongs-to-integrated-microsegmented-digital-fortresses/</loc>
		<lastmod>2026-03-16T11:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-nutzer-geraten-starker-ins-visier-von-cyberkriminellen/</loc>
		<lastmod>2026-03-16T11:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eine-itstrategie-fur-komplexe-landschaften-zu-entwickeln-sollte-zu-jahresbeginn-ganz-oben-auf-der-agenda-stehen-warum-zero-trust-und-one-identity-jetzt-unverzichtbar-sind/</loc>
		<lastmod>2026-03-16T11:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/washington-is-right-cybercrime-is-organized-crime-now-we-need-to-shut-down-the-business-model/</loc>
		<lastmod>2026-03-16T11:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-exploiting-ai-faster-than-defenders-can-keep-up-new-report-warns/</loc>
		<lastmod>2026-03-16T11:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ransomware-economy-is-shifting-toward-straight-up-data-extortion/</loc>
		<lastmod>2026-03-16T11:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kevuru-games-outlines-the-shift-toward-flexible-art-production-in-the-games-industry/</loc>
		<lastmod>2026-03-16T11:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/advanced-protection-mode-in-android-17-prevents-apps-from-misusing-accessibility-services/</loc>
		<lastmod>2026-03-16T11:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-edge-146-adds-ip-privacy-and-local-network-access-controls/</loc>
		<lastmod>2026-03-16T11:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unveils-android-17-advanced-protection-mode-to-stop-malicious-services/</loc>
		<lastmod>2026-03-16T11:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unveils-android-17-advanced-protection-mode-to-stop-malicious-services-2/</loc>
		<lastmod>2026-03-16T11:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-looker-studio-vulnerabilities-allow-attackers-to-exfiltrate-data-from-google-services/</loc>
		<lastmod>2026-03-16T11:25:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-discovers-slopoly-ai-generated-malware-linked-to-hive0163-ransomware/</loc>
		<lastmod>2026-03-16T11:26:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-espionage/</loc>
		<lastmod>2026-03-16T11:27:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-house-web-glitch-exposes-corporate-details-to-fraudsters/</loc>
		<lastmod>2026-03-16T11:28:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notfall-onboarding-scheitert-ohne-die-richtige-vorbereitung-ddos-resilienz-entscheidet-sich-schon-lange-vor-dem-angriff/</loc>
		<lastmod>2026-03-16T11:29:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-extensions-hijacked-glassworm-malware-spreads-via-dependency-abuse/</loc>
		<lastmod>2026-03-16T12:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-extensions-hijacked-glassworm-malware-spreads-via-dependency-abuse-2/</loc>
		<lastmod>2026-03-16T12:14:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-critical-vulnerabilities-in-linux-apparmor-put-over-12m-enterprise-systems-at-risk/</loc>
		<lastmod>2026-03-16T12:15:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nine-critical-vulnerabilities-in-linux-apparmor-put-over-12m-enterprise-systems-at-risk-2/</loc>
		<lastmod>2026-03-16T12:16:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-xworm-7-1-and-remcos-rat-attacks-abuse-windows-tools-to-evade-detection/</loc>
		<lastmod>2026-03-16T12:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mea-shipment-phishing-scams-surge-stealing-banking-data-in-real-time/</loc>
		<lastmod>2026-03-16T12:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-calls-for-help-to-track-steam-malware-campaign/</loc>
		<lastmod>2026-03-16T12:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-erweitert-funktionen-zum-monitoring-der-datensouveranitat-auf-zero-trust-exchange/</loc>
		<lastmod>2026-03-16T12:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-hacker-attackieren-polnischen-kernreaktor-betreiber/</loc>
		<lastmod>2026-03-16T12:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-fig-security-guardian-of-the-reliability-of-security-detection-systems-2/</loc>
		<lastmod>2026-03-16T13:11:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-fig-security-guardian-of-the-reliability-of-security-detection-systems/</loc>
		<lastmod>2026-03-16T13:11:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschte-kierweiterungen-gefahrden-unternehmens-chats-2/</loc>
		<lastmod>2026-03-16T13:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/postgresql-penetration-testing/</loc>
		<lastmod>2026-03-16T13:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-campaign-expands-through-malicious-open-vsx-extensions/</loc>
		<lastmod>2026-03-16T13:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-im-ki-zeitalter/</loc>
		<lastmod>2026-03-16T13:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-erweitert-die-globale-souveranitat-auf-der-zero-trust-exchange-plattform-2/</loc>
		<lastmod>2026-03-16T13:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-erweitert-die-globale-souveranitat-auf-der-zero-trust-exchange-plattform/</loc>
		<lastmod>2026-03-16T13:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-erweitert-die-globale-souveranitat-auf-der-zero-trust-exchange-plattform-3/</loc>
		<lastmod>2026-03-16T13:20:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flaw-in-uks-corporate-registry-let-directors-rummage-through-rival-records/</loc>
		<lastmod>2026-03-16T13:21:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/those-who-circle-back-and-synergize-also-tend-to-be-crap-at-their-jobs/</loc>
		<lastmod>2026-03-16T13:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jury-out-on-whether-americans-approve-or-disapprove-of-datacenters/</loc>
		<lastmod>2026-03-16T13:23:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/repopulate-repopulate-two-lost-doctor-who-episodes-turn-up-in-private-collection/</loc>
		<lastmod>2026-03-16T13:24:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-ditches-endend-encrypted-messaging-on-instagram/</loc>
		<lastmod>2026-03-16T13:25:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/justin-fulcher-on-ais-role-in-modernizing-government-operations/</loc>
		<lastmod>2026-03-16T13:26:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterleaks-launches-as-open-source-tool-for-scanning-files-directories-and-git-repositories/</loc>
		<lastmod>2026-03-16T13:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-scales-up-exploiting-174-vulnerabilities-via-residential-ips/</loc>
		<lastmod>2026-03-16T13:28:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-security-validation-is-becoming-agentic/</loc>
		<lastmod>2026-03-16T13:30:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-campaigns-spread-macsync-macos-infostealer-via-fake-ai-tool-installers/</loc>
		<lastmod>2026-03-16T13:31:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-23-prozent-der-unternehmen-haben-ki-regeln-schatten-ki-durch-governance-beherrschbar-machen/</loc>
		<lastmod>2026-03-16T13:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/models-are-applying-to-be-the-face-of-ai-scams/</loc>
		<lastmod>2026-03-16T14:13:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-pulls-samsung-app-blocking-windows-c-drive-from-store/</loc>
		<lastmod>2026-03-16T14:14:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-polands-nuclear-research-center/</loc>
		<lastmod>2026-03-16T14:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/camelclone-uses-public-file-sharing-sites-in-government-cyberattacks/</loc>
		<lastmod>2026-03-16T14:16:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-flaw-in-aws-bedrock-code-interpreter-raises-alarms/</loc>
		<lastmod>2026-03-16T14:17:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/livechat-abuse-how-phishers-are-exploiting-saas-support-tools-to-steal-sensitive-data/</loc>
		<lastmod>2026-03-16T14:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reform-furs-bka-was-ermittler-kunftig-im-netz-durfen-sollen/</loc>
		<lastmod>2026-03-16T14:20:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reform-furs-bka-was-ermittler-kunftig-im-netz-durfen-sollen-2/</loc>
		<lastmod>2026-03-16T14:20:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-espionage-campaign-targeting-ukraine-using-starlink-and-charity-lures/</loc>
		<lastmod>2026-03-16T14:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hackers-exploit-rdp-and-netbird-in-coordinated-wiper-attacks/</loc>
		<lastmod>2026-03-16T14:23:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hackers-exploit-rdp-and-netbird-in-coordinated-wiper-attacks-2/</loc>
		<lastmod>2026-03-16T14:23:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-confuse-asset-inventory-with-exposure-management/</loc>
		<lastmod>2026-03-16T15:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-confuse-asset-inventory-with-exposure-management-2/</loc>
		<lastmod>2026-03-16T15:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-confuse-asset-inventory-with-exposure-management-3/</loc>
		<lastmod>2026-03-16T15:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/migrating-sql-server-to-aurora-postgresql-solving-the-real-challenges-of-cloud-database-modernization/</loc>
		<lastmod>2026-03-16T15:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robotics-firm-intuitive-surgical-says-cyberattack-compromised-business-customer-data/</loc>
		<lastmod>2026-03-16T15:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adobe-to-pay-150-million-over-hidden-fees-and-hardcancel-subscriptions/</loc>
		<lastmod>2026-03-16T15:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-germanys-foreign-intelligence-vp-hit-in-signal-account-takeover-campaign/</loc>
		<lastmod>2026-03-16T15:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/875-million-android-phones-face-risk-due-to-hidden-chip-flaw/</loc>
		<lastmod>2026-03-16T15:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-is-everywhere-heres-how-to-find-and-secure-it/</loc>
		<lastmod>2026-03-16T15:21:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-of-global-surge-in-fake-shipment-tracking-scams/</loc>
		<lastmod>2026-03-16T15:22:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crackarmor-flaws-expose-linux-systems-to-privilege-escalation/</loc>
		<lastmod>2026-03-16T15:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crackarmor-flaws-expose-linux-systems-to-privilege-escalation-2/</loc>
		<lastmod>2026-03-16T15:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/golem-karrierewelt-smtp-basicauth-in-exchange-online-umstieg-vor-dem-aus/</loc>
		<lastmod>2026-03-16T15:25:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-keynote-the-ai-cyber-war-inside-the-ai-race-between-attackers-and-hunters/</loc>
		<lastmod>2026-03-16T16:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-security-leaders-need-to-know-about-zero-trust-identity-management-in-2026/</loc>
		<lastmod>2026-03-16T16:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-dmarcian-supports-dmarc-adoption-across-emea/</loc>
		<lastmod>2026-03-16T16:14:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadome-report-finds-most-organizations-flying-blind-as-agentic-traffic-surges/</loc>
		<lastmod>2026-03-16T16:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-traffic-report-high-volume-low-visibility-and-a-growing-risk/</loc>
		<lastmod>2026-03-16T16:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/16th-march-threat-intelligence-report/</loc>
		<lastmod>2026-03-16T16:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-launches-inquiry-into-steam-games-spreading-malware/</loc>
		<lastmod>2026-03-16T16:18:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-livechat-to-phish-credit-card-personal-data/</loc>
		<lastmod>2026-03-16T16:19:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-more/</loc>
		<lastmod>2026-03-16T16:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-threat-report-2026-von-crowdstrike-schnellster-ki-angriff-2025-dauerte-nur-27-sekunden/</loc>
		<lastmod>2026-03-16T16:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-threat-report-2026-von-crowdstrike-schnellster-ki-angriff-2025-dauerte-nur-27-sekunden-2/</loc>
		<lastmod>2026-03-16T16:21:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-zeichnet-all-for-one-group-in-der-kategorie-sap-business-suite-success-aus/</loc>
		<lastmod>2026-03-16T16:22:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-it-worker-fraud-hiring-an-insider-threat/</loc>
		<lastmod>2026-03-16T17:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realm-security-rolls-out-ai-ready-security-data-for-the-modern-soc-ahead-of-rsa-conference/</loc>
		<lastmod>2026-03-16T17:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/realm-security-rolls-out-ai-ready-security-data-for-the-modern-soc-ahead-of-rsa-conference-2/</loc>
		<lastmod>2026-03-16T17:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delete-doesnt-mean-gone-heres-how-file-shredder-fixes-that/</loc>
		<lastmod>2026-03-16T17:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telus-digital-confirms-hack-as-shinyhunters-claims-credit-for-massive-data-theft/</loc>
		<lastmod>2026-03-16T17:17:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-attack-raises-concerns-about-role-of-device-management-tool/</loc>
		<lastmod>2026-03-16T17:18:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-disrupts-parking-payments-in-russian-city/</loc>
		<lastmod>2026-03-16T17:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-finally-delivers-those-elusive-productivity-gains-for-cybercriminals/</loc>
		<lastmod>2026-03-16T17:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-house-restores-webfiling-after-flaw-exposed-director-details/</loc>
		<lastmod>2026-03-16T17:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-agency-exposed-corporate-executive-data/</loc>
		<lastmod>2026-03-16T17:22:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revealed-how-hmrc-has-been-quietly-building-surveillance-capabilities/</loc>
		<lastmod>2026-03-16T17:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/revealed-how-hmrc-has-been-quietly-building-surveillance-capabilities-2/</loc>
		<lastmod>2026-03-16T17:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-online-outage-blocks-access-to-mailboxes/</loc>
		<lastmod>2026-03-16T17:24:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/luxembourg-court-overturns-858-million-privacy-fine-against-amazon/</loc>
		<lastmod>2026-03-16T18:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-says-hospital-tools-are-safe-but-digital-ordering-systems-still-down-after-cyberattack/</loc>
		<lastmod>2026-03-16T18:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-companies-house-confirms-security-flaw-exposed-business-data/</loc>
		<lastmod>2026-03-16T18:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14-000-router-infiziert-wie-vor-allem-asus-gerate-von-hackern-als-botnetz-genutzt-werden/</loc>
		<lastmod>2026-03-16T18:16:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-und-signal-geheimdienste-warnen-vor-gros-angelegter-hacking-attacke-aus-russland/</loc>
		<lastmod>2026-03-16T18:17:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-app-stiehlt-einmalpassworter-und-krypto-wallets-so-schutzt-du-dich-vor-dem-google-betrug/</loc>
		<lastmod>2026-03-16T18:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacked-sites-deliver-vidar-infostealer-to-windows-users/</loc>
		<lastmod>2026-03-16T19:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-bad-map-projection-zero-declination/</loc>
		<lastmod>2026-03-16T19:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zombie-zip-method-can-fool-antivirus-during-the-first-scan/</loc>
		<lastmod>2026-03-16T19:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-has-skyrocketed-245-since-the-start-of-the-iran-war/</loc>
		<lastmod>2026-03-16T19:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-scam-uses-livechat-to-pose-as-amazon-and-paypal-in-real-time/</loc>
		<lastmod>2026-03-16T19:16:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-exposes-hidden-risks-in-agentic-ai/</loc>
		<lastmod>2026-03-16T19:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poland-suspects-iranian-actors-are-behind-attack-on-its-nuclear-power-center/</loc>
		<lastmod>2026-03-16T19:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-hotpatch-for-windows-11-rras-rce-bugs/</loc>
		<lastmod>2026-03-16T19:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-microsoft-amazon-and-others-unite-under-new-anti-scam-pact/</loc>
		<lastmod>2026-03-16T19:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-16T19:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kindesmissbrauch-freiwillige-chatkontrolle-wird-doch-nicht-verlangert/</loc>
		<lastmod>2026-03-16T19:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-house-restarts-online-services-following-cyber-breach-2/</loc>
		<lastmod>2026-03-16T20:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-house-restarts-online-services-following-cyber-breach/</loc>
		<lastmod>2026-03-16T20:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/</loc>
		<lastmod>2026-03-16T20:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-repos/</loc>
		<lastmod>2026-03-16T20:16:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-extends-agentic-ai-alliance-with-nvidia/</loc>
		<lastmod>2026-03-16T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-extends-agentic-ai-alliance-with-nvidia-2/</loc>
		<lastmod>2026-03-16T21:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decentralized-identity-and-verifiable-credentials-the-enterprise-playbook-2026/</loc>
		<lastmod>2026-03-16T21:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-tech-unites-industry-giants-sign-global-accord-to-combat-ai-driven-scams/</loc>
		<lastmod>2026-03-16T21:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/augustus-v0-0-9-multi-turn-attacks-for-llms-that-fight-back/</loc>
		<lastmod>2026-03-16T21:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-how-to-infosec-conference/</loc>
		<lastmod>2026-03-16T21:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-security-new-governance-framework-shows-progress-but-critical-gaps-remain/</loc>
		<lastmod>2026-03-16T21:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robotics-surgical-biz-intuitive-discloses-phishing-attack/</loc>
		<lastmod>2026-03-16T21:19:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robotics-surgical-biz-intuitive-discloses-phishing-attack-2/</loc>
		<lastmod>2026-03-16T21:19:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-uses-drillapp-backdoor-to-spy-on-ukrainian-targets/</loc>
		<lastmod>2026-03-16T21:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-cvss-ot-security-looks-for-its-risk-methodology/</loc>
		<lastmod>2026-03-16T21:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-enterprise-resource-planning-access-gaps-fuel-fraud-risk/</loc>
		<lastmod>2026-03-16T21:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrial-systems-under-siege-77-of-ot-environments-suffer-cyber-breaches/</loc>
		<lastmod>2026-03-16T21:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-olympic-cybersecurity-lessons-from-paris-2024-to-milan-cortina-2026/</loc>
		<lastmod>2026-03-16T21:24:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-lessons-learned-convicted-scammer-allegedly-ran-another-athlete-focused-phishing-scam-from-federal-prison/</loc>
		<lastmod>2026-03-16T22:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-wing-ftp-server-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-16T22:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-sector-braces-for-stryker-hack-supply-chain-shock/</loc>
		<lastmod>2026-03-16T22:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-leaks-reveal-major-redesign-ai-features-and-privacy-upgrades/</loc>
		<lastmod>2026-03-16T22:16:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-evolves-to-hide-in-dependencies/</loc>
		<lastmod>2026-03-16T22:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-advanced-ai-make-soc-teams-more-relaxed/</loc>
		<lastmod>2026-03-16T23:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-advanced-ai-make-soc-teams-more-relaxed-2/</loc>
		<lastmod>2026-03-16T23:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-advanced-ai-make-soc-teams-more-relaxed-3/</loc>
		<lastmod>2026-03-16T23:12:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-ensure-safe-data-handling-2/</loc>
		<lastmod>2026-03-16T23:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-ensure-safe-data-handling/</loc>
		<lastmod>2026-03-16T23:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-should-your-secrets-rotation-technology-be/</loc>
		<lastmod>2026-03-16T23:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-investigates-steam-games-linked-to-malware-and-crypto-wallet-theft/</loc>
		<lastmod>2026-03-16T23:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lawmakers-call-for-cisa-polygraph-probe/</loc>
		<lastmod>2026-03-16T23:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ny-sets-firstnation-cyber-mandates-for-water-sector/</loc>
		<lastmod>2026-03-16T23:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-nevadas-push-for-secure-digital-government/</loc>
		<lastmod>2026-03-16T23:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-email-summaries-create-a-new-phishing-attack-surface/</loc>
		<lastmod>2026-03-16T23:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/instagram-users-urged-to-save-encrypted-dms-before-feature-disappears/</loc>
		<lastmod>2026-03-16T23:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-patch-for-critical-windows-11-rras-vulnerabilities/</loc>
		<lastmod>2026-03-16T23:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kmu-sicherheitslucke-beim-drucken-drucksicherheit-fur-62-prozent-von-geringer-prioritat-2/</loc>
		<lastmod>2026-03-17T00:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kmu-sicherheitslucke-beim-drucken-drucksicherheit-fur-62-prozent-von-geringer-prioritat/</loc>
		<lastmod>2026-03-17T00:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-data-leak-risk-in-aws-bedrock-ai-code-interpreter/</loc>
		<lastmod>2026-03-17T00:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-policy-enforcement-for-quantum-secure-prompt-engineering/</loc>
		<lastmod>2026-03-17T04:14:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-policy-enforcement-for-quantum-secure-prompt-engineering-2/</loc>
		<lastmod>2026-03-17T04:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/simply-offensive-podcast-the-future-of-pentesting-ai-automation-and-better-reporting-with-dan-decloss-2/</loc>
		<lastmod>2026-03-17T04:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/simply-offensive-podcast-the-future-of-pentesting-ai-automation-and-better-reporting-with-dan-decloss/</loc>
		<lastmod>2026-03-17T04:15:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-built-its-own-threat-hunting-agent-because-vendors-cant-keep-pace-with-new-threats/</loc>
		<lastmod>2026-03-17T04:16:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-points-at-samsung-after-galaxy-app-bug-locks-users-out-of-c/</loc>
		<lastmod>2026-03-17T04:17:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-nexus-hackers-skulk-in-southeast-asian-military-orgs-for-years/</loc>
		<lastmod>2026-03-17T04:18:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-suggests-friday-afternoon-copilot-ban-because-users-may-be-too-lazy-to-check-its-mistakes/</loc>
		<lastmod>2026-03-17T05:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-do-in-the-first-24-hours-of-a-breach/</loc>
		<lastmod>2026-03-17T06:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-do-in-the-first-24-hours-of-a-breach-2/</loc>
		<lastmod>2026-03-17T06:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/livechat-support-tools-abused-in-saas-phishing-scheme/</loc>
		<lastmod>2026-03-17T06:15:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-condibot-variant-and-monaco-miner-target-more-network-devices/</loc>
		<lastmod>2026-03-17T06:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-users-to-exploited-chrome-0-day-flaws/</loc>
		<lastmod>2026-03-17T06:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-targeted-by-large-scale-wiper-attack-tens-of-thousands-of-devices-lost/</loc>
		<lastmod>2026-03-17T06:18:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-suggests-friday-afternoon-copilot-ban-because-tired-users-may-be-too-lazy-to-check-its-mistakes/</loc>
		<lastmod>2026-03-17T07:13:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-suggests-friday-afternoon-copilot-ban-because-tired-users-may-be-too-lazy-to-check-its-mistakes-2/</loc>
		<lastmod>2026-03-17T07:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hidden-instructions-in-readme-files-can-make-ai-agents-leak-data/</loc>
		<lastmod>2026-03-17T07:14:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-packages-spread-pylangghost-rat-in-supply-chain-attack/</loc>
		<lastmod>2026-03-17T07:15:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-trusted-websites-in-new-attacks-on-microsoft-teams-users/</loc>
		<lastmod>2026-03-17T07:16:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths/</loc>
		<lastmod>2026-03-17T07:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-tomcat-und-tomcat-native-bsi-warnt-vor-drei-kritischen-apache-schwachstellen/</loc>
		<lastmod>2026-03-17T07:18:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pci-dss-compliance-framework-for-global-payment-security/</loc>
		<lastmod>2026-03-17T08:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-crash-override-from-passive-scanning-to-active-traceability-reshaping-the-software-supply-chain-security-foundation/</loc>
		<lastmod>2026-03-17T08:14:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/runtime-the-new-frontier-of-ai-agent-security/</loc>
		<lastmod>2026-03-17T08:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payload-ransomware-hits-windows-and-esxi-with-babuk-style-encryption/</loc>
		<lastmod>2026-03-17T08:16:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-ways-to-decrypt-palo-alto-cortex-xdr-bioc-rules-for-evasion/</loc>
		<lastmod>2026-03-17T08:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-x-force-threat-intelligence-index-2026-schwachstellen-sind-einfallstor-nummer-1/</loc>
		<lastmod>2026-03-17T08:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heading-to-rsa-conference-2026-mark-your-calendar-and-meet-thales/</loc>
		<lastmod>2026-03-17T09:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itstrategie-warum-zero-trust-und-one-identity-jetzt-unverzichtbar-sind/</loc>
		<lastmod>2026-03-17T09:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-points-at-samsung-after-galaxy-app-bug-locks-users-out-of-c-2/</loc>
		<lastmod>2026-03-17T09:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-on-strykers-microsoft-environment-wiped-employee-devices-without-malware/</loc>
		<lastmod>2026-03-17T09:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webfiling-flaw-at-uk-companies-house-exposed-director-data-for-months/</loc>
		<lastmod>2026-03-17T09:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-leverage-safe-links-and-url-rewriting-to-evade-detection/</loc>
		<lastmod>2026-03-17T09:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auslesen-der-speicherchips-vollig-zerstorter-pcmcia-karten-cbl-datenrettung-rettet-meeresforschungsdaten/</loc>
		<lastmod>2026-03-17T09:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/api-statt-kompromiss-mimecast-startet-nachsten-generation-fur-esicherheit/</loc>
		<lastmod>2026-03-17T09:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-warnt-ki-macht-doch-deutlich-produktiver-betruger-zumindest/</loc>
		<lastmod>2026-03-17T09:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wettplattform-israelischer-reporter-wird-wegen-onlinewette-massiv-bedroht/</loc>
		<lastmod>2026-03-17T09:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-in-technology-finding-balance-in-the-age-of-surveillance-2/</loc>
		<lastmod>2026-03-17T10:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-in-technology-finding-balance-in-the-age-of-surveillance/</loc>
		<lastmod>2026-03-17T10:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-quiet-security-risk-hiding-inside-your-saas-stack/</loc>
		<lastmod>2026-03-17T10:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-crunch-increased-email-deliverability-and-prevented-domain-spoofing-with-easydmarc/</loc>
		<lastmod>2026-03-17T10:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-iot-security-best-practices-to-prevent-cyber-attacks-in-2026/</loc>
		<lastmod>2026-03-17T10:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-seit-iran-krieg-um-245-prozent-gestiegen/</loc>
		<lastmod>2026-03-17T10:17:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intuitives-certain-business-employee-corporate-data-accessed-in-recent-breach/</loc>
		<lastmod>2026-03-17T10:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-phishing-campaign-uses-browser-permissions-to-harvest-sensitive-data/</loc>
		<lastmod>2026-03-17T10:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-windows-to-macos-clickfix-attacks-shift-tactics-with-chatgpt-based-lures/</loc>
		<lastmod>2026-03-17T10:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-uk-firms-on-alert-after-companies-house-data-exposure/</loc>
		<lastmod>2026-03-17T10:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-wing-ftp-server-vulnerability-used-in-attacks/</loc>
		<lastmod>2026-03-17T10:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-analysiert-neue-malware-kampagne-cyberangreifer-nutzen-den-nahost-konflikt/</loc>
		<lastmod>2026-03-17T10:24:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saas-sprawl-has-become-the-new-shadow-it-why-traditional-security-struggles-to-see-and-stop-it/</loc>
		<lastmod>2026-03-17T11:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cracks-down-on-android-apps-abusing-accessibility/</loc>
		<lastmod>2026-03-17T11:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cracks-down-on-android-apps-abusing-accessibility-2/</loc>
		<lastmod>2026-03-17T11:15:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cmc-providers-compare-the-best-common-mark-certificate-services/</loc>
		<lastmod>2026-03-17T11:16:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-verified-vs-google-verified-whats-the-difference/</loc>
		<lastmod>2026-03-17T11:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-broadway-gaming-achieved-pci-dss-4-0-1-compliance/</loc>
		<lastmod>2026-03-17T11:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-time-to-get-serious-about-post-quantum-security-heres-where-to-start/</loc>
		<lastmod>2026-03-17T11:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-parking-in-russia-after-distributed-denialservice-attack-knocks-citys-parking-system-offline/</loc>
		<lastmod>2026-03-17T11:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fraudsters-are-using-public-planning-records-to-target-permit-applicants/</loc>
		<lastmod>2026-03-17T11:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claroty-erneut-als-leader-im-gartner-magic-quadrant-for-cps-protection-platforms-ausgezeichnet/</loc>
		<lastmod>2026-03-17T11:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jury-out-on-whether-americans-love-or-hate-datacenters/</loc>
		<lastmod>2026-03-17T11:23:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-zeroes-in-on-ai-driven-data-risks-in-fabric/</loc>
		<lastmod>2026-03-17T11:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/</loc>
		<lastmod>2026-03-17T11:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enabling-teams-meeting-add-in-breaks-outlook-classic/</loc>
		<lastmod>2026-03-17T11:26:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angular-xss-vulnerability-threatens-thousands-of-web-applications/</loc>
		<lastmod>2026-03-17T11:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-infects-popular-react-native-npm-packages/</loc>
		<lastmod>2026-03-17T11:28:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-infects-popular-react-native-npm-packages-2/</loc>
		<lastmod>2026-03-17T11:28:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/packagist-themes-deliver-trojanized-jquery-in-ophimcms-supply-chain-attack/</loc>
		<lastmod>2026-03-17T11:29:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware/</loc>
		<lastmod>2026-03-17T11:30:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/average-number-of-daily-api-attacks-up-113-annually/</loc>
		<lastmod>2026-03-17T11:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyber-monitoring-centre-sets-its-sights-on-us-expansion-one-year-after-launch/</loc>
		<lastmod>2026-03-17T11:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-everywhere-but-cisos-are-still-securing-it-with-yesterdays-skills-and-tools-study-finds/</loc>
		<lastmod>2026-03-17T12:22:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mysteriose-malware-angreifer-kapern-github-projekte-und-verbreiten-schadcode/</loc>
		<lastmod>2026-03-17T12:24:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-sign-clickonce-manifests-with-visual-studio-using-the-ksp-library/</loc>
		<lastmod>2026-03-17T12:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-hygiene-safeguarding-your-digital-life-in-a-cyber-threat-landscape/</loc>
		<lastmod>2026-03-17T12:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-hygiene-safeguarding-your-digital-life-in-a-cyber-threat-landscape-2/</loc>
		<lastmod>2026-03-17T12:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-bedrocks-isolated-sandbox-comes-with-a-dns-escape-hatch/</loc>
		<lastmod>2026-03-17T12:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/georgian-charged-for-running-phishing-scam-targeting-nba-nfl-players-while-in-federal-custody/</loc>
		<lastmod>2026-03-17T12:15:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-funktionen-fur-dokumentenaustausch-unterstutzen-digitalisierung-und-digitale-souveranitat-im-gesundheitswesen/</loc>
		<lastmod>2026-03-17T12:16:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-apt-gruppe-camaro-dragon-nutzt-nahost-konflikt-fur-malware-kampagne-gegen-katar-aus/</loc>
		<lastmod>2026-03-17T12:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehr-befugnisse-mehr-verantwortung-was-aktive-cyberabwehr-technisch-bedeutet/</loc>
		<lastmod>2026-03-17T12:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-vidar-2-0-infostealer-spreads-via-fake-game-cheats-on-github-reddit/</loc>
		<lastmod>2026-03-17T12:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-11-hotpatch-fixes-bluetooth-device-visibility-issue/</loc>
		<lastmod>2026-03-17T12:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-launches-ai-driven-troubleshooting-for-purview-data-lifecycle-tools/</loc>
		<lastmod>2026-03-17T12:21:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-launches-ai-driven-troubleshooting-for-purview-data-lifecycle-tools-2/</loc>
		<lastmod>2026-03-17T12:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-github/</loc>
		<lastmod>2026-03-17T13:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-secrets-sprawl-2026-ai-service-leaks-surge-81-and-29m-secrets-hit-public-github/</loc>
		<lastmod>2026-03-17T13:14:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-in-the-soc-the-governance-layer-you-need-before-you-let-automation-execute/</loc>
		<lastmod>2026-03-17T13:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-searching-for-a-vpn-could-mean-handing-over-your-work-login-details/</loc>
		<lastmod>2026-03-17T13:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rapid7-boosts-profitability-simplification-in-refreshed-partner-program/</loc>
		<lastmod>2026-03-17T13:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesichtserkennungs-app-der-polizei-soll-straftater-uberfuhren/</loc>
		<lastmod>2026-03-17T13:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-github-2/</loc>
		<lastmod>2026-03-17T13:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cl1087-targets-military-capabilities-since-2020/</loc>
		<lastmod>2026-03-17T13:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surf-raises-57m-to-automate-security-hygiene-with-ai-agents/</loc>
		<lastmod>2026-03-17T13:21:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-d360-bank-redefines-cyber-security-for-saudi-arabias-cashless-future/</loc>
		<lastmod>2026-03-17T13:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-workers-call-for-palantir-to-be-booted-from-nhs-contracts-2/</loc>
		<lastmod>2026-03-17T13:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-workers-call-for-palantir-to-be-booted-from-nhs-contracts/</loc>
		<lastmod>2026-03-17T13:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-workers-call-for-palantir-to-be-booted-from-nhs-contracts-3/</loc>
		<lastmod>2026-03-17T13:23:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-sanctions-chinese-company-behind-65000-device-hack/</loc>
		<lastmod>2026-03-17T13:24:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaknet-ransomware-uses-clickfix-deno-runtime-in-stealthy-attacks/</loc>
		<lastmod>2026-03-17T13:25:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shares-fix-for-windows-c-drive-access-issues-on-samsung-pcs/</loc>
		<lastmod>2026-03-17T13:26:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-25h2-24h2-update-addresses-bluetooth-device-visibility-issues/</loc>
		<lastmod>2026-03-17T13:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-ransomware-groups-shift-to-data-theft-as-profits-decline/</loc>
		<lastmod>2026-03-17T13:28:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-in-nation-state-attacks-on-uk-firms-amid-cyber-warfare-fears/</loc>
		<lastmod>2026-03-17T13:29:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fertigungsindustrie-ist-top-ziel-fur-cyberangriffe-ot-angriffe-kommen-meist-uber-kompromittierte-it-systeme/</loc>
		<lastmod>2026-03-17T13:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anwendung-sturzt-ab-teams-add-in-macht-outlook-classic-kaputt/</loc>
		<lastmod>2026-03-17T13:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-recognized-by-gartner-as-a-representative-vendor-of-guardian-agents/</loc>
		<lastmod>2026-03-17T14:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-management-for-multi-tenant-saas-applications/</loc>
		<lastmod>2026-03-17T14:15:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacken-fluten-eon-netz-angriffe-verzehnfacht/</loc>
		<lastmod>2026-03-17T14:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securitytrainings-messbar-machen/</loc>
		<lastmod>2026-03-17T14:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-cloud-network-solutions-for-multi-cloud-environments-top-platforms/</loc>
		<lastmod>2026-03-17T14:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-use-compromised-cameras-for-regional-surveillance/</loc>
		<lastmod>2026-03-17T14:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-recognized-by-gartner-as-a-representative-vendor-of-guardian-agents-2/</loc>
		<lastmod>2026-03-17T14:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-recognized-by-gartner-as-a-representative-vendor-of-guardian-agents-3/</loc>
		<lastmod>2026-03-17T14:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-recognized-by-gartner-as-a-representative-vendor-of-guardian-agents-4/</loc>
		<lastmod>2026-03-17T14:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesundheitliche-grunde-bundesdatenschutzbeauftragte-tritt-unerwartet-zuruck/</loc>
		<lastmod>2026-03-17T14:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiken-durch-copilot-mindern-analyst-schlagt-ki-verbot-am-freitagnachmittag-vor/</loc>
		<lastmod>2026-03-17T14:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interpol-warnt-ki-macht-deutlich-produktiver-zumindest-kriminelle/</loc>
		<lastmod>2026-03-17T14:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fim-test-a-method-for-distinguishing-true-fim-capabilities-in-a-crowd-of-claims/</loc>
		<lastmod>2026-03-17T15:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-ai-powered-contextual-project-classification-from-severity-scores-to-business-risk/</loc>
		<lastmod>2026-03-17T15:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/90-of-people-dont-trust-ai-with-their-data/</loc>
		<lastmod>2026-03-17T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergence/</loc>
		<lastmod>2026-03-17T15:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keine-trilog-einigung-der-chatkontrolle-konnte-ihr-ende-bevorstehen/</loc>
		<lastmod>2026-03-17T15:18:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-things-cisos-need-to-do-today-to-secure-ai-agents/</loc>
		<lastmod>2026-03-17T15:19:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-font-rendering-trick-hides-malicious-commands-from-ai-tools/</loc>
		<lastmod>2026-03-17T15:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-stops-force-installing-the-microsoft-365-copilot-app/</loc>
		<lastmod>2026-03-17T15:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orchid-security-recognized-by-gartner-as-a-representative-vendor-of-guardian-agents-5/</loc>
		<lastmod>2026-03-17T15:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-github-3/</loc>
		<lastmod>2026-03-17T15:23:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstellen-bei-bitwarden-lastpass-und-dashlane-machen-passwortmanager-falsche-sicherheitsversprechen-2/</loc>
		<lastmod>2026-03-17T15:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aus-gesundheitlichen-grunden-bundesdatenschutzbeauftragte-kundigt-ruckzug-an/</loc>
		<lastmod>2026-03-17T15:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prepare-for-nerc-cip-compliance-deadlines-in-2026-and-beyond/</loc>
		<lastmod>2026-03-17T16:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prepare-for-nerc-cip-compliance-deadlines-in-2026-and-beyond-2/</loc>
		<lastmod>2026-03-17T16:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-hackers-dont-break-in-they-log-in/</loc>
		<lastmod>2026-03-17T16:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-teams-might-be-overlooking-wider-threat-to-cisco-sd-wan/</loc>
		<lastmod>2026-03-17T16:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-targets-devs-with-macsync-malware-via-fake-claude-tools/</loc>
		<lastmod>2026-03-17T16:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rondodox-botnet-expands-arsenal-targeting-174-flaws-and-hits-15000-daily-exploit-attempts/</loc>
		<lastmod>2026-03-17T16:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-windows-11-bug-crippling-pcs-blocking-access-to-core-drive/</loc>
		<lastmod>2026-03-17T16:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader/</loc>
		<lastmod>2026-03-17T16:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursorjack-attack-path-exposes-code-execution-risk-in-ai-development-environment/</loc>
		<lastmod>2026-03-17T16:20:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geopolitische-konflikte-google-untersucht-risiken-fur-rustungsunternehmen/</loc>
		<lastmod>2026-03-17T16:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haken-dran-warum-cybersecurity-mehr-mit-tabellen-als-mit-hollywood-asthetik-zu-tun-hat/</loc>
		<lastmod>2026-03-17T16:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dank-googles-system-update-neue-praktische-funktion-auf-allen-android-geraten/</loc>
		<lastmod>2026-03-17T16:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/professionelle-ansprache-gefalschte-screenshots-so-lauft-kleinanzeigen-betrug-heute-ab/</loc>
		<lastmod>2026-03-17T16:24:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infizierte-steam-spiele-fbi-bittet-opfer-um-mithilfe-bei-ermittlungen/</loc>
		<lastmod>2026-03-17T16:25:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-cloud-firewall-vendors-for-2026/</loc>
		<lastmod>2026-03-17T17:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-cloud-firewall-vendors-for-2026-2/</loc>
		<lastmod>2026-03-17T17:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cyber-director-expands-on-trump-administrations-vision-for-ai-security-industry-collaboration/</loc>
		<lastmod>2026-03-17T17:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/</loc>
		<lastmod>2026-03-17T17:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-sanctions-iranian-cyber-front-over-election-meddling-charlie-hebdo-breach/</loc>
		<lastmod>2026-03-17T17:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warlock-ransomware-group-augments-post-exploitation-activities/</loc>
		<lastmod>2026-03-17T17:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-os-level-attack-bypasses-mobile-payment-security/</loc>
		<lastmod>2026-03-17T17:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-pudgy-world-site-steals-your-crypto-passwords/</loc>
		<lastmod>2026-03-17T18:13:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-native-mcp-server-in-sonarqube-cloud/</loc>
		<lastmod>2026-03-17T18:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/georgia-man-charged-for-robbing-nba-nfl-players-through-stolen-apple-account-details/</loc>
		<lastmod>2026-03-17T18:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/energy-department-set-to-release-its-first-ever-cyber-strategy/</loc>
		<lastmod>2026-03-17T18:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-probe-how-a-fake-fitness-tracker-became-an-ai-top-pick-3/</loc>
		<lastmod>2026-03-17T18:17:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-probe-how-a-fake-fitness-tracker-became-an-ai-top-pick-2/</loc>
		<lastmod>2026-03-17T18:17:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-probe-how-a-fake-fitness-tracker-became-an-ai-top-pick/</loc>
		<lastmod>2026-03-17T18:17:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-disclose-vulnerabilities-in-ip-kvms-from-four-manufacturers/</loc>
		<lastmod>2026-03-17T18:18:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce/</loc>
		<lastmod>2026-03-17T18:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/colortokens-once-again-named-a-leader-and-outperformer-in-the-2026-gigaom-radar-for-microsegmentation/</loc>
		<lastmod>2026-03-17T19:14:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomwares-opening-play-target-identity-first/</loc>
		<lastmod>2026-03-17T19:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surfshark-vs-nordvpn-2026-which-vpn-wins-full-breakdown/</loc>
		<lastmod>2026-03-17T19:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-open-source-vulnerability-scanners-that-actually-work-in-2026/</loc>
		<lastmod>2026-03-17T19:17:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-launches-two-new-security-posture-tools-as-cyber-threats-surge/</loc>
		<lastmod>2026-03-17T19:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-launches-two-new-security-posture-tools-as-cyber-threats-surge-2/</loc>
		<lastmod>2026-03-17T19:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-launches-two-new-security-posture-tools-as-cyber-threats-surge-3/</loc>
		<lastmod>2026-03-17T19:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks/</loc>
		<lastmod>2026-03-17T19:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-from-law-enforcement-to-cybersecurity-building-skills-that-matter/</loc>
		<lastmod>2026-03-17T20:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cheap-and-dangerous-ip-kvms-carry-flaws/</loc>
		<lastmod>2026-03-17T20:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-data-security-standards-in-cancer-innovation-matter/</loc>
		<lastmod>2026-03-17T20:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-ids-edge-closer-to-practical-reality-for-uk-businesses/</loc>
		<lastmod>2026-03-17T20:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technology-accelerating-crime-boosts-case-for-national-police-service-says-nca-chief/</loc>
		<lastmod>2026-03-17T20:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contactless-payment-limit-removal-will-happen-overnight-but-change-wont/</loc>
		<lastmod>2026-03-17T20:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-already-in-your-database-the-real-risk-is-how-you-govern-change-liquibase/</loc>
		<lastmod>2026-03-17T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-now-new-and-next-in-data-center-infrastructure-management/</loc>
		<lastmod>2026-03-17T21:14:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smarter-greener-data-centers-start-here-why-spring-is-the-best-time-to-upgrade-with-hyperview/</loc>
		<lastmod>2026-03-17T21:15:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-nemoclaw-promises-to-run-openclaw-agents-securely/</loc>
		<lastmod>2026-03-17T21:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medusa-ransomware-gang-claims-attacks-on-prominent-mississippi-hospital-new-jersey-county/</loc>
		<lastmod>2026-03-17T21:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-isnt-pushing-companies-to-conduct-cyber-offense-national-cyber-director-says/</loc>
		<lastmod>2026-03-17T21:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appeals-court-temporarily-pauses-order-blocking-perplexitys-ai-shopping-agent-on-amazon/</loc>
		<lastmod>2026-03-17T21:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-rolls-out-first-background-security-update-for-iphones-ipads-and-macs-to-fix-safari-bug/</loc>
		<lastmod>2026-03-17T21:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldcoins-newest-pitch-scan-your-eyeballs-to-prove-ai-agents-really-represent-you/</loc>
		<lastmod>2026-03-17T21:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-2561-uses-fake-fortinet-ivanti-vpn-sites-to-drop-hyrax-infostealer/</loc>
		<lastmod>2026-03-17T21:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telehealth-firm-to-be-barred-from-data-exchanges/</loc>
		<lastmod>2026-03-17T21:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-the-fastest-adopted-software-ever-is-also-a-security-blind-spot/</loc>
		<lastmod>2026-03-17T21:24:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-cybersecurity-firm-outpost24-in-7-stage-phish/</loc>
		<lastmod>2026-03-17T21:25:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-world-id-wants-to-put-a-unique-human-identity-on-every-ai-agent/</loc>
		<lastmod>2026-03-17T22:13:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-official-advises-agencies-not-to-get-too-hung-up-on-who-takes-lead-in-critical-infrastructure-sectors/</loc>
		<lastmod>2026-03-17T22:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-new-phishing-risk-hidden-inside-microsoft-copilot/</loc>
		<lastmod>2026-03-17T22:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-hits-400-code-repos-on-github-npm-vscode-openvsx/</loc>
		<lastmod>2026-03-17T22:16:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-stay-protected-against-cyber-threats/</loc>
		<lastmod>2026-03-17T23:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-stay-protected-against-cyber-threats-2/</loc>
		<lastmod>2026-03-17T23:14:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-nhis-crucial-for-secure-cloud-environments/</loc>
		<lastmod>2026-03-17T23:15:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-companys-nhis-meticulously-managed/</loc>
		<lastmod>2026-03-17T23:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hijacked-npm-packages-deliver-malware-via-solana-linked-to-glassworm/</loc>
		<lastmod>2026-03-17T23:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/antons-vibe-coding-experience-a-reflection-on-risk-decisions/</loc>
		<lastmod>2026-03-17T23:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-sanctions-chinese-and-iranian-actors-over-cyberattacks-on-critical-infrastructure/</loc>
		<lastmod>2026-03-17T23:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-belatedly-sanctions-chinese-and-iranian-hackers/</loc>
		<lastmod>2026-03-17T23:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-panel-warns-of-chinese-ai-robotics-threat/</loc>
		<lastmod>2026-03-17T23:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/native-launches-with-42m-for-multi-cloud-security-push/</loc>
		<lastmod>2026-03-17T23:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-dell-is-building-the-secure-agentic-enterprise/</loc>
		<lastmod>2026-03-17T23:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-dell-is-building-the-secure-agentic-enterprise-2/</loc>
		<lastmod>2026-03-17T23:24:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-attackers-are-logging-in-not-breaking-in/</loc>
		<lastmod>2026-03-17T23:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/less-lucrative-ransomware-market-makes-attackers-alter-methods/</loc>
		<lastmod>2026-03-17T23:26:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-gitguardian-study-shows-ai-coding-tools-double-leak-rates-as-29m-credentials-hit-github/</loc>
		<lastmod>2026-03-18T04:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-gitguardian-study-shows-ai-coding-tools-double-leak-rates-as-29m-credentials-hit-github-2/</loc>
		<lastmod>2026-03-18T04:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-gitguardian-study-shows-ai-coding-tools-double-leak-rates-as-29m-credentials-hit-github-3/</loc>
		<lastmod>2026-03-18T04:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lattice-based-identity-and-access-management-for-ai-agents/</loc>
		<lastmod>2026-03-18T04:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-key-insights-from-the-ai-security-practitioners-conference-firetail-blog/</loc>
		<lastmod>2026-03-18T04:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-key-insights-from-the-ai-security-practitioners-conference-firetail-blog-2/</loc>
		<lastmod>2026-03-18T04:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faq-on-cve-2026-21514-ole-bypass-n-day-in-microsoft-word/</loc>
		<lastmod>2026-03-18T04:19:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faq-on-cve-2026-21514-ole-bypass-n-day-in-microsoft-word-2/</loc>
		<lastmod>2026-03-18T04:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-epic-fury-why-exposure-data-changes-everything-about-irans-cyber-kinetic-campaign/</loc>
		<lastmod>2026-03-18T04:21:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-epic-fury-why-exposure-data-changes-everything-about-irans-cyber-kinetic-campaign-2/</loc>
		<lastmod>2026-03-18T04:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-e-commerce-platform-bitrefill-accuses-north-korea-of-stealing-18500-purchase-records-2/</loc>
		<lastmod>2026-03-18T04:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-e-commerce-platform-bitrefill-accuses-north-korea-of-stealing-18500-purchase-records/</loc>
		<lastmod>2026-03-18T04:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seeks-victims-of-steam-games-used-to-spread-malware-2/</loc>
		<lastmod>2026-03-18T04:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/japan-to-allow-proactive-cyber-defense-from-october-1st/</loc>
		<lastmod>2026-03-18T04:26:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-pushes-first-background-security-improvements-update-to-fix-webkit-flaw/</loc>
		<lastmod>2026-03-18T04:27:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-spike-245-in-the-two-weeks-after-the-start-of-war-with-iran/</loc>
		<lastmod>2026-03-18T05:13:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-foundation-kicks-off-effort-to-shield-foss-maintainers-from-ai-slop-bug-reports/</loc>
		<lastmod>2026-03-18T05:14:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-foundation-kicks-off-effort-to-shield-foss-maintainers-from-ai-slop-bug-reports-2/</loc>
		<lastmod>2026-03-18T05:14:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/too-big-to-ignore-too-small-to-be-served-the-midmarket-security-gap/</loc>
		<lastmod>2026-03-18T05:15:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-orchid-security-brings-zero-trust-to-ai-agent-identities-earns-gartner-recognition/</loc>
		<lastmod>2026-03-18T06:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-bedrock-agentcore-sandbox-bypass-enables-stealthy-c2-and-data-exfiltration/</loc>
		<lastmod>2026-03-18T06:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/judicial-targets-hit-by-covert-rat-via-court-docs-and-github-payloads/</loc>
		<lastmod>2026-03-18T06:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-via-port-23/</loc>
		<lastmod>2026-03-18T06:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-charm-security-ai-anti-fraud-platform-for-new-types-of-fraud/</loc>
		<lastmod>2026-03-18T07:12:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-gruppe-camaro-dragon-schlagt-in-katar-zu/</loc>
		<lastmod>2026-03-18T07:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-gruppe-camaro-dragon-schlagt-in-katar-zu-2/</loc>
		<lastmod>2026-03-18T07:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apt-gruppe-camaro-dragon-schlagt-in-katar-zu-3/</loc>
		<lastmod>2026-03-18T07:13:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-building-security-goals-around-controls/</loc>
		<lastmod>2026-03-18T07:14:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-fraud-losses-climb-to-442-billion/</loc>
		<lastmod>2026-03-18T07:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-disclose-regpwn-a-windows-registry-weakness-allowing-system-access/</loc>
		<lastmod>2026-03-18T07:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-telegram-download-site-delivers-stealthy-in-memory-malware-loader/</loc>
		<lastmod>2026-03-18T07:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forticlient-hit-by-severe-sql-injection-vulnerability-enabling-database-intrusion/</loc>
		<lastmod>2026-03-18T07:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-macos-ios-ipados-7-zero-days-bei-apple-3-davon-aktiv-ausgenutzt/</loc>
		<lastmod>2026-03-18T07:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-ollama-servers-security-risks-of-publicly-accessible-llm-infrastructure-2/</loc>
		<lastmod>2026-03-18T08:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-ollama-servers-security-risks-of-publicly-accessible-llm-infrastructure/</loc>
		<lastmod>2026-03-18T08:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-rethink-their-data-protection-strategies/</loc>
		<lastmod>2026-03-18T08:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bfdi-prof-dr-louisa-specht-riemenschneider-hat-ruckzug-angekundigt/</loc>
		<lastmod>2026-03-18T08:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umwalzung-der-weltordnung-europa-benotigt-sichere-und-souverane-losungen-zur-selbstbestimmten-verteidigung/</loc>
		<lastmod>2026-03-18T08:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-intensifies-crackdown-on-thai-scam-centers-targeting-americans/</loc>
		<lastmod>2026-03-18T08:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-cyberattack-against-med-tech-firm-is-just-the-beginning/</loc>
		<lastmod>2026-03-18T08:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-scale-up-government-sector-hit-hardest/</loc>
		<lastmod>2026-03-18T08:20:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boggy-serpens-hits-diplomats-critical-infrastructure-in-espionage-waves/</loc>
		<lastmod>2026-03-18T08:21:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-kubernetes-nfs-csi-vulnerability-enables-unauthorized-directory-deletion-and-changes/</loc>
		<lastmod>2026-03-18T08:22:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-macos/</loc>
		<lastmod>2026-03-18T08:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartphone-ersetzt-zugangskarten-und-badges-smartphone-ersetzt-zugangskarten-und-badges/</loc>
		<lastmod>2026-03-18T08:24:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/es-fehlen-grundlagen-um-ki-sicher-in-finanzprozesse-zu-integrieren/</loc>
		<lastmod>2026-03-18T09:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-beschleunigt-die-unkontrollierte-verbreitung-von-zugangsdaten-um-ein-vielfaches/</loc>
		<lastmod>2026-03-18T09:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-nachste-angrifsswelle-ist-intelligent/</loc>
		<lastmod>2026-03-18T09:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cortex-xdr-bioc-rules-could-become-an-attack-surface/</loc>
		<lastmod>2026-03-18T09:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manageengine-expands-endpoint-central-with-edr-and-secure-access/</loc>
		<lastmod>2026-03-18T09:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-based-vishing-attack-tricks-victims-into-quick-assist-takeover/</loc>
		<lastmod>2026-03-18T09:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-stealer-2-0-spreads-via-fake-game-cheats-shared-on-github-and-reddit/</loc>
		<lastmod>2026-03-18T09:18:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hp-wolf-security-threat-report-schnell-statt-ausgefeilt-ki-macht-cyberangriffe-zur-massenware/</loc>
		<lastmod>2026-03-18T09:19:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sofort-abschalten-kritische-telnetd-lucke-verleiht-angreifern-root-zugriff-2/</loc>
		<lastmod>2026-03-18T09:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sofort-abschalten-kritische-telnetd-lucke-verleiht-angreifern-root-zugriff/</loc>
		<lastmod>2026-03-18T09:20:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-rollout-microsoft-stoppt-automatische-copilot-installation/</loc>
		<lastmod>2026-03-18T09:21:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-wix-secure-enough-understanding-the-next-layer-of-protection-for-growing-websites/</loc>
		<lastmod>2026-03-18T10:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-treibt-neue-infostealer-kampagnen-an/</loc>
		<lastmod>2026-03-18T10:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-and-privacy-priorities-for-2026-the-legal-risk-map/</loc>
		<lastmod>2026-03-18T10:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robotic-surgery-firm-intuitive-reports-data-breach-after-targeted-phishing-attack/</loc>
		<lastmod>2026-03-18T10:18:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tracking-the-iran-war-a-month-of-escalation-and-regional-impact/</loc>
		<lastmod>2026-03-18T10:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-tech-companies-step-in-to-support-the-open-source-security-ecosystem/</loc>
		<lastmod>2026-03-18T10:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-cyber-ops-merge-with-psyops-and-ew-amid-escalating-conflict/</loc>
		<lastmod>2026-03-18T10:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-desktop-vulnerability-lets-attackers-escalate-privileges-to-full-root-access/</loc>
		<lastmod>2026-03-18T10:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exploit/</loc>
		<lastmod>2026-03-18T10:23:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exploit-2/</loc>
		<lastmod>2026-03-18T10:23:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-issues-will-drive-half-of-incident-response-efforts-by-2028-says-gartner/</loc>
		<lastmod>2026-03-18T10:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionenschaden-ermittler-nehmen-computer-betruger-fest/</loc>
		<lastmod>2026-03-18T10:26:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-und-nvidia-dsx-air-beschleunigen-den-start-sicherer-ki-rechenzentren/</loc>
		<lastmod>2026-03-18T10:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/weniger-sicherheitsvorfalle-mit-datenabfluss-dafur-steigen-die-risiken-durch-ki/</loc>
		<lastmod>2026-03-18T10:28:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesundheitssoftware-fallt-bei-penetrationstests-durch/</loc>
		<lastmod>2026-03-18T10:29:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-a-network-of-20000-fake-shops/</loc>
		<lastmod>2026-03-18T11:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberwarfare-im-aufwind-unternehmen-unterschatzen-digitale-bedrohungslage/</loc>
		<lastmod>2026-03-18T11:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-you-prove-the-person-on-the-other-side-is-real/</loc>
		<lastmod>2026-03-18T11:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparent-com-instrumentation-for-malware-analysis/</loc>
		<lastmod>2026-03-18T11:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-scam-tricks-users-into-mapping-hacker-controlled-drives/</loc>
		<lastmod>2026-03-18T11:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/join-our-next-livestream-the-war-machine/</loc>
		<lastmod>2026-03-18T11:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-introduces-gpt-5-4-mini-and-nano-for-faster-lightweight-ai-performance/</loc>
		<lastmod>2026-03-18T11:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfakes-und-ki-malware-verandern-bedrohungslage-sieben-strategien-gegen-ki-gesteuerte-cyberangriffe/</loc>
		<lastmod>2026-03-18T11:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-und-ki-fordergelder-allein-werden-das-problem-nicht-losen/</loc>
		<lastmod>2026-03-18T11:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adaptability-not-novelty-the-next-evolution-of-malware/</loc>
		<lastmod>2026-03-18T12:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-moniert-software-sicherheit-im-gesundheitswesen/</loc>
		<lastmod>2026-03-18T12:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-moniert-software-sicherheit-im-gesundheitswesen-2/</loc>
		<lastmod>2026-03-18T12:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-ermoglicht-root-zugriff-uber-snap-mechanismus-in-ubuntu/</loc>
		<lastmod>2026-03-18T12:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-3888-ubuntu-desktop-24-04-vulnerable-to-root-exploit/</loc>
		<lastmod>2026-03-18T12:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-starts-issuing-lightweight-security-updates-between-software-releases/</loc>
		<lastmod>2026-03-18T12:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaknet-boosts-ransomware-with-clickfix-lures-stealthy-deno-loader/</loc>
		<lastmod>2026-03-18T12:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forcememo-hijacks-github-accounts-backdoors-python-repos/</loc>
		<lastmod>2026-03-18T12:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-telnetd-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-03-18T12:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewels/</loc>
		<lastmod>2026-03-18T12:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-stealer-2-0-exploits-github-reddit-to-deliver-malware-via-fake-game-cheats/</loc>
		<lastmod>2026-03-18T12:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutsche-unternehmen-unterschatzen-die-bedrohung-durch-cyberwarfare-armis-warnt-vor-steigenden-risiken/</loc>
		<lastmod>2026-03-18T12:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/root-zugriff-und-mehr-millionen-linux-systeme-uber-sicherheitslucken-angreifbar/</loc>
		<lastmod>2026-03-18T12:24:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hunderttausende-server-gefahrdet-kritische-telnetd-lucke-verleiht-root-zugriff/</loc>
		<lastmod>2026-03-18T12:25:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-all-oauth-the-same-for-mcp/</loc>
		<lastmod>2026-03-18T13:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-cyber-awareness-from-blame-to-belonging/</loc>
		<lastmod>2026-03-18T13:14:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-ai-is-failing-in-production-and-how-strategic-qa-fixes-it/</loc>
		<lastmod>2026-03-18T13:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-starts-with-access-not-models-saas-ai/</loc>
		<lastmod>2026-03-18T13:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-webkit-bug-that-could-let-sites-access-your-data/</loc>
		<lastmod>2026-03-18T13:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reco-targets-ai-agent-blind-spots-with-new-security-capability/</loc>
		<lastmod>2026-03-18T13:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moscow-seeks-to-limit-internet-to-state-approved-websites-amid-ongoing-outages/</loc>
		<lastmod>2026-03-18T13:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-beschleunigt-die-einfuhrung-sicherer-ki-rechenzentren-mit-nvidia-dsx-air/</loc>
		<lastmod>2026-03-18T13:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-change-management-warum-monitoring-bei-konfigurationsanderungen-im-netzwerk-so-wichtig-ist/</loc>
		<lastmod>2026-03-18T13:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/britains-satellite-watching-gap-to-be-plugged-with-17-5m-eyeball-in-cyprus/</loc>
		<lastmod>2026-03-18T13:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-net-aot-malware-hides-code-as-a-black-box-to-evade-detection/</loc>
		<lastmod>2026-03-18T13:23:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-6-network-access-control-nac-solutions-in-2026/</loc>
		<lastmod>2026-03-18T13:24:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technology-accelerating-crime-boosts-case-for-national-police-service-says-nca-chief-2/</loc>
		<lastmod>2026-03-18T13:25:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-webkit-security-flaw-exposes-ios-and-macos-users-to-content-based-bypass-attacks/</loc>
		<lastmod>2026-03-18T13:26:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce/</loc>
		<lastmod>2026-03-18T13:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-security-and-magecart-getting-the-threat-model-right/</loc>
		<lastmod>2026-03-18T13:28:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-critical-ip-kvm-flaws-enable-unauthenticated-root-access-across-four-vendors/</loc>
		<lastmod>2026-03-18T13:29:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clouduntersuchung-dauert-3-5-tage-langer-cloud-vorfalle-90-prozent-erleiden-schaden-vor-eindammug/</loc>
		<lastmod>2026-03-18T13:30:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mondoo-fuhrt-agentic-managed-vulnerability-service-ein/</loc>
		<lastmod>2026-03-18T13:31:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-ai-agent-governance-a-layered-approach-build-deployment-and-runtime/</loc>
		<lastmod>2026-03-18T14:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-is-getting-a-free-built-in-vpn/</loc>
		<lastmod>2026-03-18T14:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fancybear-server-leak-exposes-stolen-credentials-2fa-secrets-nato-targets/</loc>
		<lastmod>2026-03-18T14:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uidai-introduces-bug-bounty-program-to-strengthen-aadhaar-defenses/</loc>
		<lastmod>2026-03-18T14:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sidewinder-espionage-campaign-expands-across-southeast-asia/</loc>
		<lastmod>2026-03-18T14:17:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-tiktok-steal-users-sensitive-pii-when-they-click-on-ads/</loc>
		<lastmod>2026-03-18T14:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-enabled-adversaries-compress-time-to-exploit-following-vulnerability-disclosure/</loc>
		<lastmod>2026-03-18T14:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdachtiger-verhaftet-falscher-prinz-von-dubai-von-reportern-uberfuhrt/</loc>
		<lastmod>2026-03-18T14:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rootsystemen/</loc>
		<lastmod>2026-03-18T14:21:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inkrafttreten-am-17-marz-2026-bundesrat-beschliest-kritis-dachgesetz/</loc>
		<lastmod>2026-03-18T14:22:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/</loc>
		<lastmod>2026-03-18T15:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-tiktok-steal-personal-financial-info-when-users-click-ads/</loc>
		<lastmod>2026-03-18T15:24:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-scam-shieldguard-dismantled-after-malware-discovery/</loc>
		<lastmod>2026-03-18T15:25:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verwaltungs-und-dokumentationssystemen-bsi-bemangelt-sicherheit-von-gesundheitssoftware/</loc>
		<lastmod>2026-03-18T15:26:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-snap-und-systemd-neue-kritische-schwachstelle-in-ubuntu-systemen/</loc>
		<lastmod>2026-03-18T15:27:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-official-says-agency-has-not-seen-uptick-in-cyber-threats-amid-iran-war/</loc>
		<lastmod>2026-03-18T15:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-ios-exploit-kit-emerges-from-suspected-russian-hackers-using-possible-u-s-government-developed-tools/</loc>
		<lastmod>2026-03-18T15:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-says-over-672000-people-had-personal-and-financial-data-stolen-in-ransomware-attack/</loc>
		<lastmod>2026-03-18T15:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russians-caught-stealing-personal-data-from-ukrainians-with-new-advanced-iphone-hacking-tools/</loc>
		<lastmod>2026-03-18T15:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-100000-strong-fake-it-worker-army-rake-in-500m-a-year-for-kim-jong-un/</loc>
		<lastmod>2026-03-18T15:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-full-disk-encryption-software-solutions-in-2026/</loc>
		<lastmod>2026-03-18T15:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-governance-risk-compliance-grc-tools-in-2026/</loc>
		<lastmod>2026-03-18T15:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/</loc>
		<lastmod>2026-03-18T15:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-refund-fraud-economy-exploiting-major-retailers-and-payment-platforms/</loc>
		<lastmod>2026-03-18T15:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones/</loc>
		<lastmod>2026-03-18T15:22:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones-2/</loc>
		<lastmod>2026-03-18T15:22:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-new-insider-threat-autonomous-systems-with-excessive-permissions/</loc>
		<lastmod>2026-03-18T16:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-sso-user-provisioning/</loc>
		<lastmod>2026-03-18T16:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-begins-restoring-ordering-shipping-systems-after-cyberattack/</loc>
		<lastmod>2026-03-18T16:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-research-unpacks-north-koreas-stealthy-sophisticated-remote-it-worker-schemes/</loc>
		<lastmod>2026-03-18T16:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-ios-exploit-kit-now-in-use-by-suspected-russian-hackers/</loc>
		<lastmod>2026-03-18T16:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-kampagne-gegen-entwickler-umgebungen/</loc>
		<lastmod>2026-03-18T16:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-cristie-data-cleanroom-recovery/</loc>
		<lastmod>2026-03-18T16:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-of-unpatched-critical-telnetd-flaw-affecting-all-versions/</loc>
		<lastmod>2026-03-18T16:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-risk-of-iran-backed-cyberattacks-rising-in-u-s/</loc>
		<lastmod>2026-03-18T16:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/marquis-ransomware-gang-stole-data-of-672k-people-in-cyberattack/</loc>
		<lastmod>2026-03-18T16:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ubuntu-flaw-enables-local-attackers-to-gain-root-access/</loc>
		<lastmod>2026-03-18T16:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ubuntu-flaw-enables-local-attackers-to-gain-root-access/</loc>
		<lastmod>2026-03-18T16:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ubuntu-flaw-enables-local-attackers-to-gain-root-access/</loc>
		<lastmod>2026-03-18T16:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ubuntu-flaw-enables-local-attackers-to-gain-root-access/</loc>
		<lastmod>2026-03-18T16:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-risiko-duo-instabile-stromnetze-und-digitale-einfallstore/</loc>
		<lastmod>2026-03-18T16:24:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyone-is-deploying-ai-agents-almost-nobody-knows-what-theyre-doing/</loc>
		<lastmod>2026-03-18T17:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyone-is-deploying-ai-agents-almost-nobody-knows-what-theyre-doing-2/</loc>
		<lastmod>2026-03-18T17:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-32b-wiz-bet-why-security-consolidation-means-youre-losing-negotiating-power/</loc>
		<lastmod>2026-03-18T17:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-groups-target-cyber-physical-systems-to-disrupt-critical-infrastructure-providers/</loc>
		<lastmod>2026-03-18T17:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recht-auf-leben-ohne-digitalzwang-digitalcourage-petition-im-endspurt/</loc>
		<lastmod>2026-03-18T17:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opentelemetry-adoption-a-strategic-blueprint/</loc>
		<lastmod>2026-03-18T17:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-the-2026-cybersecurity-startups-beating-hackers-at-their-own-game/</loc>
		<lastmod>2026-03-18T17:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-best-application-firewall-waf-solutions-for-2026/</loc>
		<lastmod>2026-03-18T17:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protect-your-privacy-best-secure-messaging-apps-in-2026/</loc>
		<lastmod>2026-03-18T17:21:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claudy-day-trio-of-flaws-exposes-claude-users-to-data-theft/</loc>
		<lastmod>2026-03-18T17:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access/</loc>
		<lastmod>2026-03-18T17:23:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/menlo-security-adds-platform-to-secure-ai-agents/</loc>
		<lastmod>2026-03-18T18:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-snews/</loc>
		<lastmod>2026-03-18T18:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technical-analysis-of-snappyclient/</loc>
		<lastmod>2026-03-18T18:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-scale-code-review-when-ai-writes-code-faster-than-you-can-understand-it/</loc>
		<lastmod>2026-03-18T18:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-ai-can-write-java-25-right-with-sonarqube/</loc>
		<lastmod>2026-03-18T18:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-al-agents-in-the-sdlc-productivity-security-the-developer-paradox/</loc>
		<lastmod>2026-03-18T18:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-identity-security-trends-shaping-2026-passwordless-adoption-reactive-security-and-the-rise-of-identity-verification/</loc>
		<lastmod>2026-03-18T18:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-identity-security-trends-shaping-2026-passwordless-adoption-reactive-security-and-the-rise-of-identity-verification-2/</loc>
		<lastmod>2026-03-18T18:19:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-software-vendor-marquis-says-more-than-670000-impacted-by-august-breach/</loc>
		<lastmod>2026-03-18T18:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-security-boss-says-crims-abused-max-security-cisco-firewall-flaw-weeks-before-disclosure/</loc>
		<lastmod>2026-03-18T18:21:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claudy-day-flaws-allow-data-theft-via-fake-claude-ai-ads-report/</loc>
		<lastmod>2026-03-18T18:22:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claudy-day-forecast-chat-data-theft/</loc>
		<lastmod>2026-03-18T18:23:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-rolls-out-real-time-security-fixes-across-iphone-ipad-and-mac/</loc>
		<lastmod>2026-03-18T18:24:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-exploits-cisco-flaw-in-zero-day-attacks-since-january/</loc>
		<lastmod>2026-03-18T18:25:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote-jobs/</loc>
		<lastmod>2026-03-18T18:26:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-intelligence-chief-grilled-on-absence-of-election-threats-in-security-assessment/</loc>
		<lastmod>2026-03-18T19:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-is-buying-location-data-to-track-us-citizens-director-confirms/</loc>
		<lastmod>2026-03-18T19:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-antivirus-software-face-off-which-one-protects-best-in-2026/</loc>
		<lastmod>2026-03-18T19:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/</loc>
		<lastmod>2026-03-18T19:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-soar-ceiling-why-playbook-automation-has-hit-its-structural-limits/</loc>
		<lastmod>2026-03-18T20:13:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-how-to-hide-in-plain-sight-next-level-digital-privacy/</loc>
		<lastmod>2026-03-18T20:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-implement-justtime-jit-user-provisioning-with-sso-and-scim/</loc>
		<lastmod>2026-03-18T20:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-hackers-use-advanced-iphone-exploit-to-target-ukrainians/</loc>
		<lastmod>2026-03-18T20:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dhs-nominee-mullin-pressed-on-restoring-cisa-staffing/</loc>
		<lastmod>2026-03-18T20:17:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-robotics-companies-want-federal-help-to-keep-chinese-robots-out-of-americas-networks/</loc>
		<lastmod>2026-03-18T20:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-wiper-attack-hackers-boast-as-lawsuits-pile-up/</loc>
		<lastmod>2026-03-18T20:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-exploited-cisco-firewall-flaw-for-weeks/</loc>
		<lastmod>2026-03-18T20:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-meta-tiktok-steal-personal-financial-info-when-users-click-ads/</loc>
		<lastmod>2026-03-18T20:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-golden-dome-requires-from-federal-devsecops-teams-2/</loc>
		<lastmod>2026-03-18T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-golden-dome-requires-from-federal-devsecops-teams/</loc>
		<lastmod>2026-03-18T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-found-font-rendering-trick-to-hide-malicious-commands/</loc>
		<lastmod>2026-03-18T21:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-digital-forensics-tools-used-in-2026/</loc>
		<lastmod>2026-03-18T21:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clear-communication-the-missing-link-in-cybersecurity-success/</loc>
		<lastmod>2026-03-18T21:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/</loc>
		<lastmod>2026-03-18T21:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-travel-ai-amplifies-the-intermediary/</loc>
		<lastmod>2026-03-18T22:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciscos-latest-vulnerability-spree-has-a-more-troubling-pattern-underneath/</loc>
		<lastmod>2026-03-18T22:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-snoops-and-spyware-vendors-planting-info-stealing-malware-on-iphones-google-warns/</loc>
		<lastmod>2026-03-18T22:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/computer-vision-frameworks-features-and-future-trends/</loc>
		<lastmod>2026-03-18T22:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-microsoft-sharepoint-and-zimbra-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-18T22:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-aml-for-real-time-payments/</loc>
		<lastmod>2026-03-18T22:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitsubishi-deal-gives-nozomi-broader-ot-security-reach/</loc>
		<lastmod>2026-03-18T22:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-national-cyber-strategy-leaves-industry-role-unclear/</loc>
		<lastmod>2026-03-18T22:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-iphone-exploit-kit-serves-spies-thieves-alike/</loc>
		<lastmod>2026-03-18T22:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/c2-implant-snappyclient-targets-crypto-wallets/</loc>
		<lastmod>2026-03-18T22:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-8-endpoint-detection-response-edr-solutions-in-2026/</loc>
		<lastmod>2026-03-18T23:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/okta-made-a-nightmare-micromanager-for-your-ai-agents/</loc>
		<lastmod>2026-03-19T00:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lawmakers-quiz-meta-over-dangerous-facial-recognition-plans-for-smart-glasses/</loc>
		<lastmod>2026-03-19T00:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-mod-awards-more-than-two-dozen-contracts-for-ai-targeting-systems/</loc>
		<lastmod>2026-03-19T00:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aura-confirms-data-breach-exposing-900000-marketing-contacts/</loc>
		<lastmod>2026-03-19T00:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-guide-to-agentic-ai-risks-in-2026-2/</loc>
		<lastmod>2026-03-19T04:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-guide-to-agentic-ai-risks-in-2026/</loc>
		<lastmod>2026-03-19T04:14:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anomalous-prompt-detection-via-quantum-safe-neural-telemetry/</loc>
		<lastmod>2026-03-19T04:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/colorado-moves-to-revise-its-landmark-ai-law-after-industry-pushback/</loc>
		<lastmod>2026-03-19T04:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-drive-innovation-in-cybersecurity/</loc>
		<lastmod>2026-03-19T04:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-secrets-management-solution-scalable/</loc>
		<lastmod>2026-03-19T04:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-ai-automation-make-cybersecurity-more-confident/</loc>
		<lastmod>2026-03-19T04:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/connectwise-releases-screenconnect-26-1-patch-for-critical-vulnerability/</loc>
		<lastmod>2026-03-19T04:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-459-this-clever-scam-nearly-hijacked-a-tech-ceos-apple-id/</loc>
		<lastmod>2026-03-19T04:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wo-cyberangriffe-ihr-ende-finden-ein-blick-in-die-arbeitsweise-eines-managed-security-operations-centers-2/</loc>
		<lastmod>2026-03-19T05:14:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wo-cyberangriffe-ihr-ende-finden-ein-blick-in-die-arbeitsweise-eines-managed-security-operations-centers/</loc>
		<lastmod>2026-03-19T05:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-funktionen-fur-dokumentenaustausch-unterstutzen-digitalisierung-und-digitale-souveranitat-im-gesundheitswesen-2/</loc>
		<lastmod>2026-03-19T05:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ultimate-guide-to-mcp-security-vulnerabilities/</loc>
		<lastmod>2026-03-19T06:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outband-getting-out-of-hand-as-microsoft-pushes-hotpatch-for-bluetooth/</loc>
		<lastmod>2026-03-19T06:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-moves-in-linux-filesystems-as-new-bcachefs-lands-and-kde-adds-support-for-apples-apfs/</loc>
		<lastmod>2026-03-19T06:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elite-members-of-north-korean-society-fake-their-way-into-western-paychecks/</loc>
		<lastmod>2026-03-19T06:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-apis-are-under-siege-and-attackers-are-just-getting-warmed-up/</loc>
		<lastmod>2026-03-19T06:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ios-exploit-uses-advanced-iphone-hacking-tools-to-steal-personal-data/</loc>
		<lastmod>2026-03-19T06:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-firewall-zero-day-actively-exploited-to-deliver-interlock-ransomware/</loc>
		<lastmod>2026-03-19T06:20:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-firewall-zero-day-actively-exploited-to-deliver-interlock-ransomware-2/</loc>
		<lastmod>2026-03-19T06:20:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-clearly-ai-automated-software-security-platform-empowered-by-ai/</loc>
		<lastmod>2026-03-19T07:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-clearly-ai-automated-software-security-platform-empowered-by-ai-2/</loc>
		<lastmod>2026-03-19T07:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betterleaks-open-source-secrets-scanner/</loc>
		<lastmod>2026-03-19T07:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-got-it-wrong-with-high-confidence-now-what/</loc>
		<lastmod>2026-03-19T07:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aura-confirms-data-breach-exposing-900000-customer-records/</loc>
		<lastmod>2026-03-19T07:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/waterplum-unleashes-stoatwaffle-malware-in-vscode-supply-chain-attack/</loc>
		<lastmod>2026-03-19T07:18:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/screenconnect-flaw-lets-hackers-steal-machine-keys-and-hijack-sessions/</loc>
		<lastmod>2026-03-19T07:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snappyclient-implant-blends-remote-access-data-theft-and-stealth-evasion/</loc>
		<lastmod>2026-03-19T07:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snappyclient-implant-blends-remote-access-data-theft-and-stealth-evasion/</loc>
		<lastmod>2026-03-19T07:20:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snappyclient-implant-blends-remote-access-data-theft-and-stealth-evasion/</loc>
		<lastmod>2026-03-19T07:20:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-attacks/</loc>
		<lastmod>2026-03-19T07:21:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-willkur-claude-loscht-live-datenbank-und-verursacht-ausfall/</loc>
		<lastmod>2026-03-19T07:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-3630-critical-buffer-overflow-in-delta-electronics-commgr2-enables-remote-code-execution-2/</loc>
		<lastmod>2026-03-19T08:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-3630-critical-buffer-overflow-in-delta-electronics-commgr2-enables-remote-code-execution/</loc>
		<lastmod>2026-03-19T08:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-3342-critical-outbounds-write-vulnerability-in-watchguard-fireware-os/</loc>
		<lastmod>2026-03-19T08:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ban-heralds-new-era-of-supply-chain-risk-with-no-clear-playbook/</loc>
		<lastmod>2026-03-19T08:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ban-heralds-new-era-of-supply-chain-risk-with-no-clear-playbook-2/</loc>
		<lastmod>2026-03-19T08:16:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-botnet-exposed-after-open-directory-leak-reveals-15-node-relay-network/</loc>
		<lastmod>2026-03-19T08:17:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-sanctions-companies-in-china-iran-for-cyberattacks/</loc>
		<lastmod>2026-03-19T08:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilienz-braucht-blick-auf-die-ganze-systemarchitektur-funf-schichten-fur-effektive-cyber-resilienz/</loc>
		<lastmod>2026-03-19T08:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitstheater-microsoft-erhalt-fedramp-zulassung-trotz-massiver-mangel/</loc>
		<lastmod>2026-03-19T08:20:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/viele-aufzuge-sind-nicht-vor-cyberangriffen-geschutzt-warum-das-laut-tuv-ein-problem-ist/</loc>
		<lastmod>2026-03-19T08:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/haken-dran-wie-automatisierung-die-cybersecurity-arbeit-vereinfacht/</loc>
		<lastmod>2026-03-19T08:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dormant-accounts-leave-manufacturing-orgs-open-to-attack/</loc>
		<lastmod>2026-03-19T09:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dormant-accounts-leave-manufacturing-orgs-open-to-attack-2/</loc>
		<lastmod>2026-03-19T09:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ende-der-freiwilligen-chatkontrolle-voraus-eco-pladiert-gegen-suchpflicht-im-rahmen-der-csam-verordnung/</loc>
		<lastmod>2026-03-19T09:14:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-establishes-vienna-as-key-western-spy-hub-targeting-nato/</loc>
		<lastmod>2026-03-19T09:15:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-neue-linux-sicherheitslucke-ermoglicht-root-zugriff-uber-snap-mechanismus/</loc>
		<lastmod>2026-03-19T09:16:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samba-4-24-0-ships-kerberos-hardening-and-a-cve-fix-for-domain-encryption-defaults/</loc>
		<lastmod>2026-03-19T09:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/java-26-ships-with-new-cryptography-api-and-http-3-support/</loc>
		<lastmod>2026-03-19T09:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-exploited-zimbra-collaboration-suite-flaw-to-warning-list/</loc>
		<lastmod>2026-03-19T09:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-extension-delivers-rat-and-stealer-via-github-downloader/</loc>
		<lastmod>2026-03-19T09:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufrechterhaltung-des-betriebs-dachgesetz-starkt-anlagenresilienz/</loc>
		<lastmod>2026-03-19T09:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-kette-entdeckt-hacker-infiltrieren-iphones-durch-nur-einen-klick/</loc>
		<lastmod>2026-03-19T09:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-knackt-sein-eigenes-passwort-was-das-fur-deine-sicherheit-bedeutet/</loc>
		<lastmod>2026-03-19T09:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-knackt-sein-eigenes-passwort-was-das-fur-deine-sicherheit-bedeutet-2/</loc>
		<lastmod>2026-03-19T09:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regulierung-als-ki-skalierungsbooster/</loc>
		<lastmod>2026-03-19T10:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-brauchen-cybersecurity-nachhilfe-dringend/</loc>
		<lastmod>2026-03-19T10:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-brauchen-cybersecurity-nachhilfe-dringend-3/</loc>
		<lastmod>2026-03-19T10:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-brauchen-cybersecurity-nachhilfe-dringend-2/</loc>
		<lastmod>2026-03-19T10:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-mfa-isnt-broken-its-being-bypassed-and-your-employees-cant-tell-the-difference/</loc>
		<lastmod>2026-03-19T10:14:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-mfa-isnt-broken-its-being-bypassed-and-your-employees-cant-tell-the-difference-2/</loc>
		<lastmod>2026-03-19T10:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-giveth-with-its-right-hand-and-breaketh-with-its-left/</loc>
		<lastmod>2026-03-19T10:16:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-group-exploiting-the-cisco-fmc-flaw-cve-2026-20131-36-days-before-disclosure/</loc>
		<lastmod>2026-03-19T10:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/horabot-returns-in-mexico-spreading-via-phishing-and-email-worm-attacks/</loc>
		<lastmod>2026-03-19T10:18:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover/</loc>
		<lastmod>2026-03-19T10:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regulation-drives-cyber-spending-for-critical-infrastructure-orgs/</loc>
		<lastmod>2026-03-19T10:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrungswechsel-bei-omada-identity-kraglund-wird-neuer-ceo-2/</loc>
		<lastmod>2026-03-19T10:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrungswechsel-bei-omada-identity-kraglund-wird-neuer-ceo-3/</loc>
		<lastmod>2026-03-19T10:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrungswechsel-bei-omada-identity-kraglund-wird-neuer-ceo-4/</loc>
		<lastmod>2026-03-19T10:21:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuhrungswechsel-bei-omada-identity-kraglund-wird-neuer-ceo/</loc>
		<lastmod>2026-03-19T10:21:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-itler-nordkoreanische-it-agenten-machen-500-millionen-usd/</loc>
		<lastmod>2026-03-19T10:22:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-security-risks-in-open-source-dependencies-nobody-talks-about/</loc>
		<lastmod>2026-03-19T11:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-security-risks-in-open-source-dependencies-nobody-talks-about-2/</loc>
		<lastmod>2026-03-19T11:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-key-priorities-for-your-rsac-2026-agenda/</loc>
		<lastmod>2026-03-19T11:15:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-multi-billion-dollar-mistake-why-cloud-misconfigurations-are-your-biggest-security-threat/</loc>
		<lastmod>2026-03-19T11:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-multi-billion-dollar-mistake-why-cloud-misconfigurations-are-your-biggest-security-threat-2/</loc>
		<lastmod>2026-03-19T11:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everyday-tools-extraordinary-crimes-the-ransomware-exfiltration-playbook/</loc>
		<lastmod>2026-03-19T11:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-first-background-patch-for-webkit-browser-flaw/</loc>
		<lastmod>2026-03-19T11:19:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-limits-android-accessibility-api-to-curb-malware-abuse/</loc>
		<lastmod>2026-03-19T11:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/900000-contact-records-exposed-in-aura-data-breach/</loc>
		<lastmod>2026-03-19T11:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/edr-killers-are-now-standard-equipment-in-ransomware-attacks/</loc>
		<lastmod>2026-03-19T11:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-perseus-android-malware-checks-user-notes-for-secrets/</loc>
		<lastmod>2026-03-19T11:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-perseus-android-malware-checks-user-notes-for-secrets-2/</loc>
		<lastmod>2026-03-19T11:24:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-microsoft-sharepoint-flaw-now-exploited-in-attacks/</loc>
		<lastmod>2026-03-19T11:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pyronut-package-backdoors-telegram-bots-with-rce/</loc>
		<lastmod>2026-03-19T11:26:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openwebui-servers-targeted-in-attacks-using-ai-payloads-to-steal-data/</loc>
		<lastmod>2026-03-19T11:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fca-updates-cyber-incident-and-third-party-reporting-rules-2/</loc>
		<lastmod>2026-03-19T11:28:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fca-updates-cyber-incident-and-third-party-reporting-rules/</loc>
		<lastmod>2026-03-19T11:28:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-warns-hackers-have-abused-cisco-firewall-zero-day-since-january/</loc>
		<lastmod>2026-03-19T11:29:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberversicherung-vs-incident-response-retainer-welche-incident-response-strategie-passt-zu-ihrem-unternehmen/</loc>
		<lastmod>2026-03-19T11:30:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-nutzen-microsoft-teams-und-quick-assist-als-einfallstor-fur-angriffe/</loc>
		<lastmod>2026-03-19T11:31:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-nutzen-microsoft-teams-und-quick-assist-als-einfallstor-fur-angriffe-2/</loc>
		<lastmod>2026-03-19T11:32:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-nutzen-microsoft-teams-und-quick-assist-als-einfallstor-fur-angriffe-3/</loc>
		<lastmod>2026-03-19T11:32:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-nutzen-microsoft-teams-und-quick-assist-als-einfallstor-fur-angriffe-4/</loc>
		<lastmod>2026-03-19T11:32:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-30-tagige-snap-hack-root-lucke-in-ubuntu-wartet-auf-die-mullabfuhr/</loc>
		<lastmod>2026-03-19T11:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/der-30-tagige-snap-hack-root-lucke-in-ubuntu-wartet-auf-die-mullabfuhr-2/</loc>
		<lastmod>2026-03-19T11:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-architecture-for-hybrid-work-enterprise-guide/</loc>
		<lastmod>2026-03-19T12:14:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-centric-security-strategies-for-hybrid-workforces/</loc>
		<lastmod>2026-03-19T12:15:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-leveraged-cisco-fmc-zero-day-36-days-before-patch/</loc>
		<lastmod>2026-03-19T12:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-webkit-vulnerability-cve-2026-20643-across-ios-macos/</loc>
		<lastmod>2026-03-19T12:17:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-windsurf-ide-extension-uses-solana-blockchain-to-steal-developer-data/</loc>
		<lastmod>2026-03-19T12:18:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-active-exploitation-of-microsoft-sharepoint-vulnerability-cve-2026-20963/</loc>
		<lastmod>2026-03-19T12:19:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-us-orgs-to-secure-microsoft-intune-systems-after-stryker-breach/</loc>
		<lastmod>2026-03-19T12:20:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ceros-gives-security-teams-visibility-and-control-in-claude-code/</loc>
		<lastmod>2026-03-19T12:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-mehr-angriffe-politische-motive-jungere-tater/</loc>
		<lastmod>2026-03-19T12:22:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dringend-patchen-attacken-auf-microsoft-sharepoint-beobachtet/</loc>
		<lastmod>2026-03-19T12:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dringend-patchen-attacken-auf-microsoft-sharepoint-beobachtet-2/</loc>
		<lastmod>2026-03-19T12:23:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/golem-karrierewelt-heute-im-livestream-smtp-basicauth-vor-dem-aus/</loc>
		<lastmod>2026-03-19T12:24:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snap-hack-dauert-bis-zu-30-tage-root-lucke-in-ubuntu-wartet-auf-die-mullabfuhr/</loc>
		<lastmod>2026-03-19T12:25:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snap-hack-dauert-bis-zu-30-tage-root-lucke-in-ubuntu-wartet-auf-die-mullabfuhr-2/</loc>
		<lastmod>2026-03-19T12:26:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tackling-the-uncontrolled-growth-of-ai-agents-in-modern-saas-environments/</loc>
		<lastmod>2026-03-19T13:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governing-tens-of-thousands-of-ai-agents-why-policy-chaining-matters/</loc>
		<lastmod>2026-03-19T13:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-tax-forms-sell-for-20-on-the-dark-web/</loc>
		<lastmod>2026-03-19T13:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prevent-a-brute-force-attack-with-these-5-powerful-strategies/</loc>
		<lastmod>2026-03-19T13:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-true-cost-of-cyber-downtime-a-uk-board-level-briefing/</loc>
		<lastmod>2026-03-19T13:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-exploit-zimbra-flaw-to-breach-ukrainian-maritime-agency/</loc>
		<lastmod>2026-03-19T13:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-endpoint-management-systems-immediately-cisa-urges/</loc>
		<lastmod>2026-03-19T13:20:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-vulnerabilities-allow-data-exfiltration-and-malicious-redirect-attacks/</loc>
		<lastmod>2026-03-19T13:21:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tools-and-cdns-power-new-vibe-coded-malware-campaign/</loc>
		<lastmod>2026-03-19T13:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tool-overload-uberfordert-soc-analysten-zeitfaktor-entscheidet-uber-schadensbegrenzung-bei-cyberangriffen/</loc>
		<lastmod>2026-03-19T13:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tool-overload-uberfordert-soc-analysten-zeitfaktor-entscheidet-uber-schadensbegrenzung-bei-cyberangriffen-2/</loc>
		<lastmod>2026-03-19T13:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stille-schwachstelle-prompt-injection-und-die-risiken-sprachbasierter-angriffe-auf-ki/</loc>
		<lastmod>2026-03-19T13:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unzahlige-linux-systeme-gefahrdet-root-lucke-in-ubuntu-wartet-auf-die-mullabfuhr/</loc>
		<lastmod>2026-03-19T13:26:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitspanne-bei-meta-ki-agent-legt-sensible-nutzerdaten-fur-mitarbeiter-offen/</loc>
		<lastmod>2026-03-19T13:27:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft-2/</loc>
		<lastmod>2026-03-19T14:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft/</loc>
		<lastmod>2026-03-19T14:12:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft-3/</loc>
		<lastmod>2026-03-19T14:12:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consumer-focused-privacy-company-cloaked-raises-375m-as-it-expands-to-enterprise-3/</loc>
		<lastmod>2026-03-19T14:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consumer-focused-privacy-company-cloaked-raises-375m-as-it-expands-to-enterprise/</loc>
		<lastmod>2026-03-19T14:14:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/consumer-focused-privacy-company-cloaked-raises-375m-as-it-expands-to-enterprise-2/</loc>
		<lastmod>2026-03-19T14:14:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-whisperer-names-11-vendors-leading-the-shift-from-tools-to-outcomes-at-rsa-conference-2026/</loc>
		<lastmod>2026-03-19T14:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft-4/</loc>
		<lastmod>2026-03-19T14:16:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-lawmakers-quiz-meta-over-dangerous-facial-recognition-plans-for-smart-glasses-2/</loc>
		<lastmod>2026-03-19T14:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-ubiquiti-unifi-flaw-may-allow-account-takeover-2/</loc>
		<lastmod>2026-03-19T14:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-ubiquiti-unifi-flaw-may-allow-account-takeover/</loc>
		<lastmod>2026-03-19T14:18:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-ubiquiti-unifi-flaw-may-allow-account-takeover-3/</loc>
		<lastmod>2026-03-19T14:18:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-calls-on-organizations-to-strengthen-microsoft-intune-security-after-stryker-incident/</loc>
		<lastmod>2026-03-19T14:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-data/</loc>
		<lastmod>2026-03-19T14:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minderjahrig-und-teil-eines-wachsenden-ddos-geschafts/</loc>
		<lastmod>2026-03-19T14:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-data-mapping-and-why-it-matters-for-gdpr/</loc>
		<lastmod>2026-03-19T15:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-data-mapping-and-why-it-matters-for-gdpr-2/</loc>
		<lastmod>2026-03-19T15:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mapping-your-defenses-to-what-you-need-not-what-you-inherited/</loc>
		<lastmod>2026-03-19T15:14:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-darksword-hangs-over-unpatched-iphones-2/</loc>
		<lastmod>2026-03-19T15:15:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-darksword-hangs-over-unpatched-iphones/</loc>
		<lastmod>2026-03-19T15:15:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nametag-location-integrity-verified-physical-presence-tied-to-verified-workforce-identity/</loc>
		<lastmod>2026-03-19T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-gang-exploited-cisco-firewall-zero-day-weeks-before-disclosure-amazon/</loc>
		<lastmod>2026-03-19T15:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-emerges-as-powerful-ios-exploit-tool-in-global-attacks/</loc>
		<lastmod>2026-03-19T15:18:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-best-rootkit-scanners-and-removers-anti-rootkit-tools-in-2026/</loc>
		<lastmod>2026-03-19T15:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ditch-big-transformation-cyber-strategies-for-continuous-improvement/</loc>
		<lastmod>2026-03-19T15:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-researchers-uncover-another-ios-exploit-kit/</loc>
		<lastmod>2026-03-19T15:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4chan-shrugs-off-uk-regulator-refuses-to-pay-520000-in-fines-over-online-safety-violations/</loc>
		<lastmod>2026-03-19T15:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signals-creator-is-helping-encrypt-meta-ai-2/</loc>
		<lastmod>2026-03-19T15:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signals-creator-is-helping-encrypt-meta-ai/</loc>
		<lastmod>2026-03-19T15:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signals-creator-is-helping-encrypt-meta-ai-3/</loc>
		<lastmod>2026-03-19T15:24:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-ways-to-prevent-privilege-escalation-via-password-resets/</loc>
		<lastmod>2026-03-19T15:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-whisperer-names-11-vendors-leading-the-shift-from-tools-to-outcomes-at-rsa-conference-2026-2/</loc>
		<lastmod>2026-03-19T15:26:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more/</loc>
		<lastmod>2026-03-19T15:27:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more-2/</loc>
		<lastmod>2026-03-19T15:28:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/financial-brands-targeted-in-global-mobile-banking-malware-surge/</loc>
		<lastmod>2026-03-19T15:29:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/</loc>
		<lastmod>2026-03-19T16:27:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omnissa-workspace-one-uem-sicherheitslucke-von-2021-heute-aktiv-ausgenutzt/</loc>
		<lastmod>2026-03-19T16:28:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omnissa-workspace-one-uem-sicherheitslucke-von-2021-heute-aktiv-ausgenutzt-2/</loc>
		<lastmod>2026-03-19T16:28:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tgr1030-palo-alto-networks-enttarnt-neue-cyberspionage-gruppe/</loc>
		<lastmod>2026-03-19T16:29:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tgr1030-palo-alto-networks-enttarnt-neue-cyberspionage-gruppe-2/</loc>
		<lastmod>2026-03-19T16:29:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tgr1030-palo-alto-networks-enttarnt-neue-cyberspionage-gruppe-3/</loc>
		<lastmod>2026-03-19T16:30:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-mcp-registry-von-jfrog-starkt-sicherheit-in-der-ki-gestutzten-software-supply-chain/</loc>
		<lastmod>2026-03-19T16:31:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/president-trumps-cyber-strategy-for-america-why-integrity-is-the-foundation-of-modern-cyber-defense/</loc>
		<lastmod>2026-03-19T16:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/president-trumps-cyber-strategy-for-america-why-integrity-is-the-foundation-of-modern-cyber-defense-2/</loc>
		<lastmod>2026-03-19T16:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/president-trumps-cyber-strategy-for-america-why-integrity-is-the-foundation-of-modern-cyber-defense-3/</loc>
		<lastmod>2026-03-19T16:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-adaptive-authentication-and-behavioral-biometrics-the-enterprise-guide-2026/</loc>
		<lastmod>2026-03-19T16:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/password-retirement-is-premature/</loc>
		<lastmod>2026-03-19T16:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-things-to-look-for-in-cloud-based-web-content-filtering-solutions/</loc>
		<lastmod>2026-03-19T16:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/water-utilities-need-hands-on-cybersecurity-help-not-just-free-guidance-pilot-program-finds/</loc>
		<lastmod>2026-03-19T16:18:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-organizations-to-harden-endpoint-security-following-stryker-attack/</loc>
		<lastmod>2026-03-19T16:19:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-check-point-channel-chief-theres-no-platformization-without-partners/</loc>
		<lastmod>2026-03-19T16:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-pours-cold-water-on-cyber-letters-of-marque-speculation/</loc>
		<lastmod>2026-03-19T16:21:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-pro-iranian-hacking-groups-websites-after-destructive-stryker-hack/</loc>
		<lastmod>2026-03-19T16:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-companies-to-secure-microsoft-intune-systems-after-hackers-mass-wipe-stryker-devices/</loc>
		<lastmod>2026-03-19T16:23:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-apt-targets-ukraine-via-zimbra-xss-flaw-cve-2025-66376/</loc>
		<lastmod>2026-03-19T16:24:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-recall-again-spills-secrets/</loc>
		<lastmod>2026-03-19T16:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apple-hack-up-to-270m-iphones-vulnerable-to-darksword-exploit/</loc>
		<lastmod>2026-03-19T16:26:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeremy-snyder-talks-ai-governance-on-security-weekly-firetail-blog-2/</loc>
		<lastmod>2026-03-19T17:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeremy-snyder-talks-ai-governance-on-security-weekly-firetail-blog/</loc>
		<lastmod>2026-03-19T17:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeremy-snyder-talks-ai-governance-on-security-weekly-firetail-blog-3/</loc>
		<lastmod>2026-03-19T17:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidescache-2025-oh-the-places-your-packets-will-go/</loc>
		<lastmod>2026-03-19T17:15:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/siem-is-not-dead-it-just-stopped-moving-fast-enough/</loc>
		<lastmod>2026-03-19T17:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/siem-is-not-dead-it-just-stopped-moving-fast-enough-2/</loc>
		<lastmod>2026-03-19T17:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-code-assistants-change-application-security/</loc>
		<lastmod>2026-03-19T17:18:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bolster-your-defenses-and-close-the-codecloud-gap-with-tenable-and-ox/</loc>
		<lastmod>2026-03-19T17:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-malware-hiding-in-streaming-apps-to-spy-on-users-personal-notes/</loc>
		<lastmod>2026-03-19T17:20:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-on-microsoft-intune-risks-after-iran-linked-cyberattack-on-stryker-2/</loc>
		<lastmod>2026-03-19T17:21:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-on-microsoft-intune-risks-after-iran-linked-cyberattack-on-stryker/</loc>
		<lastmod>2026-03-19T17:21:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-on-microsoft-intune-risks-after-iran-linked-cyberattack-on-stryker-3/</loc>
		<lastmod>2026-03-19T17:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lock-down-microsoft-intune-feds-warn-after-stryker-attack-2/</loc>
		<lastmod>2026-03-19T17:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lock-down-microsoft-intune-feds-warn-after-stryker-attack/</loc>
		<lastmod>2026-03-19T17:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-25-cybersecurity-companies-in-2026/</loc>
		<lastmod>2026-03-19T17:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-6-xdr-solutions-vendors-in-2026/</loc>
		<lastmod>2026-03-19T17:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-tells-us-organisations-to-harden-endpoint-management-after-stryker-attack/</loc>
		<lastmod>2026-03-19T17:26:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-makes-debut-in-bridewell-cyber-security-in-cni-report/</loc>
		<lastmod>2026-03-19T17:27:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack/</loc>
		<lastmod>2026-03-19T17:28:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-affiliate-exposes-details-of-the-gentlemen-operation/</loc>
		<lastmod>2026-03-19T17:29:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-data-purchases-ignite-new-clash-over-privacy-and-surveillance/</loc>
		<lastmod>2026-03-19T18:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-data-purchases-ignite-new-clash-over-privacy-and-surveillance-3/</loc>
		<lastmod>2026-03-19T18:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-data-purchases-ignite-new-clash-over-privacy-and-surveillance-2/</loc>
		<lastmod>2026-03-19T18:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-data-the-engine-of-efficient-sustainable-data-centers/</loc>
		<lastmod>2026-03-19T18:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/powershell-is-a-security-risk-heres-how-to-fix-it/</loc>
		<lastmod>2026-03-19T18:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-change-control-why-provisioning-falls-short-3/</loc>
		<lastmod>2026-03-19T18:16:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-change-control-why-provisioning-falls-short-2/</loc>
		<lastmod>2026-03-19T18:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-change-control-why-provisioning-falls-short/</loc>
		<lastmod>2026-03-19T18:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-details-new-24-hour-process-to-sideload-unverified-android-apps/</loc>
		<lastmod>2026-03-19T18:17:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-details-new-24-hour-process-to-sideload-unverified-android-apps-2/</loc>
		<lastmod>2026-03-19T18:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-details-new-24-hour-process-to-sideload-unverified-android-apps-3/</loc>
		<lastmod>2026-03-19T18:17:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beijing-wants-its-own-quantum-resistant-encryption-standards-rather-than-adopt-nists/</loc>
		<lastmod>2026-03-19T18:18:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-intel-chiefs-urge-lawmakers-to-extend-section-702-surveillance-power-without-changes/</loc>
		<lastmod>2026-03-19T18:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-crims-abused-cisco-0-day-weeks-before-disclosure-says-amazon-security-boss/</loc>
		<lastmod>2026-03-19T18:20:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-cisco-fmc-and-cisco-scc-firewall-management-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-19T18:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-cisco-fmc-and-cisco-scc-firewall-management-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2026-03-19T18:21:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-cisco-fmc-and-cisco-scc-firewall-management-to-its-known-exploited-vulnerabilities-catalog-3/</loc>
		<lastmod>2026-03-19T18:21:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/</loc>
		<lastmod>2026-03-19T18:22:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-spycloud-study-reveal-stolen-tokens-session-data-fuel-surge-in-non-human-identity-attacks/</loc>
		<lastmod>2026-03-19T19:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-keep-eyes-peeled-for-iran-cyberattacks-respond-to-stryker-breach/</loc>
		<lastmod>2026-03-19T19:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-have-to-invite-them-in/</loc>
		<lastmod>2026-03-19T19:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohender-flickenteppich-bei-ki-regeln-nach-abstimmung-im-eu-parlament/</loc>
		<lastmod>2026-03-19T19:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massive-telegram-razzien/</loc>
		<lastmod>2026-03-19T19:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gives-android-users-a-way-to-install-unverified-apps-if-they-prove-they-really-really-want-to/</loc>
		<lastmod>2026-03-19T19:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-best-next-generation-firewall-ngfw-solutions-in-2026/</loc>
		<lastmod>2026-03-19T19:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-sonia-kumar-senior-director-cyber-defence-and-cyber-testing-at-analog-devices/</loc>
		<lastmod>2026-03-19T19:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/salt-security-launches-agentic-security-platform-for-the-ai-stack-across-llms-mcp-servers-and-apis/</loc>
		<lastmod>2026-03-19T19:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-hit-93-of-uk-critical-infrastructure-as-ai-threats-accelerate/</loc>
		<lastmod>2026-03-19T19:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-hit-93-of-uk-critical-infrastructure-as-ai-threats-accelerate-2/</loc>
		<lastmod>2026-03-19T19:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-hit-93-of-uk-critical-infrastructure-as-ai-threats-accelerate-3/</loc>
		<lastmod>2026-03-19T19:23:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keeper-security-launches-keeperdb-zero-trust-database-access-now-incorporated-into-keeperpam/</loc>
		<lastmod>2026-03-19T19:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucke-hacker-greifen-microsoft-sharepoint-instanzen-an/</loc>
		<lastmod>2026-03-19T19:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mend-io-expands-its-global-infrastructure-with-a-dedicated-cloud-region-in-india/</loc>
		<lastmod>2026-03-19T20:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mend-io-expands-its-global-infrastructure-with-a-dedicated-cloud-region-in-india-2/</loc>
		<lastmod>2026-03-19T20:13:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-group-exploited-cisco-firewall-vulnerability-as-a-zero-day-weeks-before-a-patch-appeared/</loc>
		<lastmod>2026-03-19T20:14:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angreifer-umgehen-nlp-basierte-e-mail-erkennung/</loc>
		<lastmod>2026-03-19T20:15:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffe-auf-kritische-infrastruktur-erfolgen-immer-haufiger-uber-cyberphysische-systeme/</loc>
		<lastmod>2026-03-19T20:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unknown-attackers-exploit-yet-another-critical-sharepoint-bug/</loc>
		<lastmod>2026-03-19T20:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/questions-raised-about-instagram-memorialisation-in-noah-donohoe-inquest/</loc>
		<lastmod>2026-03-19T20:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/54-edr-killers-use-byovd-to-exploit-34-signed-vulnerable-drivers-and-disable-security/</loc>
		<lastmod>2026-03-19T20:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-two-websites-linked-to-pro-iranian-group-handala/</loc>
		<lastmod>2026-03-19T21:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-do-we-actually-need-a-kubernetes-platform-team/</loc>
		<lastmod>2026-03-19T21:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-bsidesslc-2025-opening-ceremonies-kickoff-from-sandy-utah/</loc>
		<lastmod>2026-03-19T21:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild-2/</loc>
		<lastmod>2026-03-19T21:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-publishes-a-workaround-for-samsungs-c-drive-woes/</loc>
		<lastmod>2026-03-19T21:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-intune-mdm-gains-notoriety-after-stryker-hack-2/</loc>
		<lastmod>2026-03-19T21:18:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-intune-mdm-gains-notoriety-after-stryker-hack/</loc>
		<lastmod>2026-03-19T21:18:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navia-discloses-data-breach-impacting-2-7-million-people/</loc>
		<lastmod>2026-03-19T21:19:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores/</loc>
		<lastmod>2026-03-19T21:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers/</loc>
		<lastmod>2026-03-19T21:21:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/antons-security-blog-quarterly-q1-2026/</loc>
		<lastmod>2026-03-19T22:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/antons-security-blog-quarterly-q1-2026-2/</loc>
		<lastmod>2026-03-19T22:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/antons-security-blog-quarterly-q1-2026-3/</loc>
		<lastmod>2026-03-19T22:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/</loc>
		<lastmod>2026-03-19T22:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-zero-trust-survive-the-ai-era/</loc>
		<lastmod>2026-03-19T22:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-ubiquiti-unifi-unifi-security-flaw-allows-potential-account-hijacking/</loc>
		<lastmod>2026-03-19T22:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worker-benefits-administrator-notifying-2-7m-of-hack/</loc>
		<lastmod>2026-03-19T22:18:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worker-benefits-administrator-notifying-2-7m-of-hack-2/</loc>
		<lastmod>2026-03-19T22:18:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-nhi-lifecycle-management-important-3/</loc>
		<lastmod>2026-03-19T23:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-nhi-lifecycle-management-important/</loc>
		<lastmod>2026-03-19T23:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-nhi-lifecycle-management-important-2/</loc>
		<lastmod>2026-03-19T23:13:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-nhi-lifecycle-management-important-4/</loc>
		<lastmod>2026-03-19T23:14:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-help-your-business-stay-ahead/</loc>
		<lastmod>2026-03-19T23:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fda-issues-recall-for-some-ge-imaging-products-due-to-cyber/</loc>
		<lastmod>2026-03-19T23:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-fancy-bear-in-schmancy-opsec-failure/</loc>
		<lastmod>2026-03-19T23:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-fancy-bear-in-schmancy-opsec-failure-2/</loc>
		<lastmod>2026-03-19T23:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xbow-raises-120m-series-c-to-scale-autonomous-ai-hacking/</loc>
		<lastmod>2026-03-19T23:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-warns-anthropic-could-subvert-defense-ai-systems/</loc>
		<lastmod>2026-03-19T23:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-conundrum-why-mcp-security-cant-be-patched-away/</loc>
		<lastmod>2026-03-19T23:20:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-conundrum-why-mcp-security-cant-be-patched-away-3/</loc>
		<lastmod>2026-03-19T23:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-conundrum-why-mcp-security-cant-be-patched-away-2/</loc>
		<lastmod>2026-03-19T23:20:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonatype-discovers-two-malicious-npm-packages/</loc>
		<lastmod>2026-03-20T00:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonatype-discovers-two-malicious-npm-packages-2/</loc>
		<lastmod>2026-03-20T00:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-are-winning-with-ai/</loc>
		<lastmod>2026-03-20T00:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/that-cheap-kvm-device-could-expose-your-network-to-remote-compromise/</loc>
		<lastmod>2026-03-20T00:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-aspects-of-easa-certification-and-compliance-2/</loc>
		<lastmod>2026-03-20T04:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-aspects-of-easa-certification-and-compliance/</loc>
		<lastmod>2026-03-20T04:13:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-aspects-of-easa-certification-and-compliance-3/</loc>
		<lastmod>2026-03-20T04:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-threat-detection-for-quantum-enabled-adversarial-attacks-on-ai-context/</loc>
		<lastmod>2026-03-20T04:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-threat-detection-for-quantum-enabled-adversarial-attacks-on-ai-context-2/</loc>
		<lastmod>2026-03-20T04:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-is-your-secrets-scanning-system-4/</loc>
		<lastmod>2026-03-20T04:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-is-your-secrets-scanning-system-2/</loc>
		<lastmod>2026-03-20T04:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-is-your-secrets-scanning-system/</loc>
		<lastmod>2026-03-20T04:17:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-is-your-secrets-scanning-system-3/</loc>
		<lastmod>2026-03-20T04:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-is-your-secrets-scanning-system-5/</loc>
		<lastmod>2026-03-20T04:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-it-to-harden-endpoint-management-systems-after-cyberattack-by-pro-iranian-group/</loc>
		<lastmod>2026-03-20T04:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-it-to-harden-endpoint-management-systems-after-cyberattack-by-pro-iranian-group-2/</loc>
		<lastmod>2026-03-20T04:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-carolina-tech-worker-found-guilty-of-insider-attack-netting-2-5m-ransom/</loc>
		<lastmod>2026-03-20T04:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ibm-ceo-pay-pack-jumps-51-for-2025-in-target-smash-and-grab/</loc>
		<lastmod>2026-03-20T04:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-aircraft-carrier-charles-de-gaulle-tracked-via-strava-activity-in-opsec-failure/</loc>
		<lastmod>2026-03-20T04:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-best-encryption-software-tools-in-2026/</loc>
		<lastmod>2026-03-20T04:23:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-takes-down-botnets-used-in-record-breaking-cyberattacks/</loc>
		<lastmod>2026-03-20T04:24:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-langchain-textual-pii-redaction-and-synthesis-for-langchain-on-tonic-textual/</loc>
		<lastmod>2026-03-20T05:13:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-langchain-textual-pii-redaction-and-synthesis-for-langchain-on-tonic-textual-2/</loc>
		<lastmod>2026-03-20T05:14:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/announcing-the-tonic-textual-mcp-server-pii-redaction-meets-ai-agents/</loc>
		<lastmod>2026-03-20T05:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft-5/</loc>
		<lastmod>2026-03-20T05:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity-theft-6/</loc>
		<lastmod>2026-03-20T05:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-week-march-20-2026/</loc>
		<lastmod>2026-03-20T06:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llamafile-mozillas-portable-llm-runner-gets-gpu-support-and-a-rebuilt-core/</loc>
		<lastmod>2026-03-20T06:15:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-dismantle-iot-botnet-linked-to-record-shattering-30-tbps-ddos-campaigns/</loc>
		<lastmod>2026-03-20T06:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-dismantle-iot-botnet-linked-to-record-shattering-30-tbps-ddos-campaigns-2/</loc>
		<lastmod>2026-03-20T06:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks/</loc>
		<lastmod>2026-03-20T06:18:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks-2/</loc>
		<lastmod>2026-03-20T06:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/54-edr-killers-use-byovd-to-exploit-35-signed-vulnerable-drivers-and-disable-security/</loc>
		<lastmod>2026-03-20T06:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/</loc>
		<lastmod>2026-03-20T07:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-watch-users-report-inflated-steps-missing-spo2-data/</loc>
		<lastmod>2026-03-20T07:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pixel-watch-users-report-inflated-steps-missing-spo2-data-2/</loc>
		<lastmod>2026-03-20T07:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/field-workers-dont-need-more-access-they-need-better-security/</loc>
		<lastmod>2026-03-20T07:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-misconfiguration-has-evolved-and-your-controls-havent/</loc>
		<lastmod>2026-03-20T07:17:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-critical-jenkins-vulnerabilities-put-ci-cd-servers-at-risk-of-rce-exploits/</loc>
		<lastmod>2026-03-20T07:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navia-confirms-data-breach-exposing-sensitive-information-of-2-7-million-users/</loc>
		<lastmod>2026-03-20T07:19:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-introduces-teams-upgrades-to-improve-windows-app-performance-on-ios-and-android/</loc>
		<lastmod>2026-03-20T07:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-disrupts-3-million-device-iot-botnets-behind-record-31-4-tbps-global-ddos-attacks/</loc>
		<lastmod>2026-03-20T07:22:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-exploit-kette-darksword-aufgedeckt-hacker-konnen-mit-nur-einem-klick-in-iphones-eindringen/</loc>
		<lastmod>2026-03-20T07:23:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nevis-erweitert-ciam-distribution-mit-vad-sos-software-service/</loc>
		<lastmod>2026-03-20T07:25:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-mcp-gateways-are-a-bad-idea-and-what-to-do-instead/</loc>
		<lastmod>2026-03-20T08:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-mcp-gateways-are-a-bad-idea-and-what-to-do-instead-2/</loc>
		<lastmod>2026-03-20T08:14:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursorjack-neue-angriffsmethode-auf-ki-entwicklungsumgebungen/</loc>
		<lastmod>2026-03-20T08:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-espionage-reality-your-infrastructure-is-already-in-the-collection-path/</loc>
		<lastmod>2026-03-20T08:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-espionage-reality-your-infrastructure-is-already-in-the-collection-path-2/</loc>
		<lastmod>2026-03-20T08:17:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitalthemen-weiterbildung-in-unternehmen-fast-uberall-aber-selten-fur-alle/</loc>
		<lastmod>2026-03-20T08:18:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stabilitat-von-stromnetzen-deutsche-unternehmen-mussen-sich-vorbereiten/</loc>
		<lastmod>2026-03-20T08:19:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conductorone-unveils-ai-access-management-to-accelerate-secure-compliant-ai-adoption/</loc>
		<lastmod>2026-03-20T08:20:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-windows-updates-break-teams-onedrive-sign-ins/</loc>
		<lastmod>2026-03-20T08:21:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-data-analyst-stole-company-data-in-2-5m-extortion-scheme/</loc>
		<lastmod>2026-03-20T08:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-web-could-be-safer-faster/</loc>
		<lastmod>2026-03-20T08:23:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-web-could-be-safer-faster-2/</loc>
		<lastmod>2026-03-20T08:23:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intransparenz-ist-das-eigentliche-sicherheitsrisiko-quantensicherheit-beginnt-mit-einer-bestandsaufnahme/</loc>
		<lastmod>2026-03-20T08:24:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/specterops-erweitert-identity-attack-path-management-auf-okta-github-und-mac/</loc>
		<lastmod>2026-03-20T08:25:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-malware-campaign-targets-indian-users-via-fake-echallan-alerts/</loc>
		<lastmod>2026-03-20T09:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-joint-action-disrupts-worlds-largest-ddos-botnets/</loc>
		<lastmod>2026-03-20T09:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-cisco-secure-firewall-management-center-0-day-is-being-exploited-in-ransomware-attacks/</loc>
		<lastmod>2026-03-20T09:14:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-cisco-secure-firewall-management-center-0-day-is-being-exploited-in-ransomware-attacks-2/</loc>
		<lastmod>2026-03-20T09:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bamboo-data-center-and-server-vulnerability-enables-remote-code-execution/</loc>
		<lastmod>2026-03-20T09:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bamboo-data-center-and-server-vulnerability-enables-remote-code-execution-2/</loc>
		<lastmod>2026-03-20T09:17:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/native-launches-with-security-control-plane-for-multicloud/</loc>
		<lastmod>2026-03-20T09:18:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-trotzt-schutzmasnahmen-investitionen-allein-garantieren-keine-sicherheit/</loc>
		<lastmod>2026-03-20T09:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/orange-cyberdefense-doku-dont-go-to-the-police-blickt-hinter-die-kulissen-der-cybercrime-welt/</loc>
		<lastmod>2026-03-20T09:20:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-sideloading-beinhaltet-24-stunden-wartezeit/</loc>
		<lastmod>2026-03-20T09:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-sideloading-beinhaltet-24-stunden-wartezeit/</loc>
		<lastmod>2026-03-20T09:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-sideloading-beinhaltet-24-stunden-wartezeit-2/</loc>
		<lastmod>2026-03-20T09:22:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riesige-botnetze-zerschlagen-millionen-von-geraten-fur-ddos-attacken-missbraucht/</loc>
		<lastmod>2026-03-20T09:23:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-do-when-your-website-is-under-a-ddos-attack/</loc>
		<lastmod>2026-03-20T10:12:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-invisible-breach-operation-ghostmail-uses-zero-click-xss-to-hijack-ukrainian-webmail/</loc>
		<lastmod>2026-03-20T10:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-screenconnect-servers-open-to-attack-cve-2026-3564/</loc>
		<lastmod>2026-03-20T10:14:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-screenconnect-servers-open-to-attack-cve-2026-3564-2/</loc>
		<lastmod>2026-03-20T10:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/musician-admits-to-10m-streaming-royalty-fraud-using-ai-bots/</loc>
		<lastmod>2026-03-20T10:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nca-boss-warns-that-teens-are-being-radicalized-into-cybercrime-online/</loc>
		<lastmod>2026-03-20T10:17:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnetze-zerschlagen-millionen-router-und-iot-gerate-fur-ddos-traffic-missbraucht/</loc>
		<lastmod>2026-03-20T10:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-executives-trust-ai-security-even-as-security-teams-confront-blind-spots-new-risks-2/</loc>
		<lastmod>2026-03-20T11:14:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-executives-trust-ai-security-even-as-security-teams-confront-blind-spots-new-risks/</loc>
		<lastmod>2026-03-20T11:14:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-block-bots-and-stop-bot-attacks-on-your-website-apps-apis/</loc>
		<lastmod>2026-03-20T11:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-e-commerce-transactions-with-modern-authentication/</loc>
		<lastmod>2026-03-20T11:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-humanix-people-oriented-social-engineering-attack-detection-and-response/</loc>
		<lastmod>2026-03-20T11:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zunehmende-cyberangriffe-aus-dem-iran-empfehlungen-fur-unternehmen/</loc>
		<lastmod>2026-03-20T11:18:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agents-of-chaos-ki-agenten-als-neue-risikoklasse/</loc>
		<lastmod>2026-03-20T11:19:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-transformation-gefahrdet-apis-entwickeln-sich-zur-primaren-angriffsflache/</loc>
		<lastmod>2026-03-20T11:20:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-transformation-gefahrdet-apis-entwickeln-sich-zur-primaren-angriffsflache-2/</loc>
		<lastmod>2026-03-20T11:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaknet-ransomware-what-you-need-to-know/</loc>
		<lastmod>2026-03-20T11:22:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pwc-will-say-goodbye-to-staff-who-arent-convinced-about-ai/</loc>
		<lastmod>2026-03-20T11:23:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-law-enforcement-operation-targets-aisuru-kimwolf-jackskid-botnet-operators/</loc>
		<lastmod>2026-03-20T11:24:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-disrupt-four-iot-botnets-behind-record-ddos-attacks/</loc>
		<lastmod>2026-03-20T11:25:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-ai-songs-streamed-billions-of-times-netting-fraudster-10-million/</loc>
		<lastmod>2026-03-20T11:26:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-danger-behind-metas-decision-to-kill-endend-encrypted-instagram-dms/</loc>
		<lastmod>2026-03-20T11:27:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks/</loc>
		<lastmod>2026-03-20T11:28:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-langflow-bug-in-just-20-hours/</loc>
		<lastmod>2026-03-20T11:29:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angeblich-kein-internet-windows-11-update-macht-app-anmeldungen-kaputt/</loc>
		<lastmod>2026-03-20T11:30:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-third-party-procurement-platforms-with-enterprise-sso/</loc>
		<lastmod>2026-03-20T12:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-sso-platforms-compared-ssojet-vs-auth0-vs-workos-vs-okta-for-saas/</loc>
		<lastmod>2026-03-20T12:15:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-urges-iphone-users-to-update-as-coruna-and-darksword-exploit-kits-emerge/</loc>
		<lastmod>2026-03-20T12:16:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-month-cyberespionage-campaign-hits-libyan-oil-refinery/</loc>
		<lastmod>2026-03-20T12:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-danger-behind-meta-killing-endend-encryption-for-instagram-dms/</loc>
		<lastmod>2026-03-20T12:19:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-unisoc-t612-modem-flaw-enables-remote-code-execution-via-cellular-calls/</loc>
		<lastmod>2026-03-20T12:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-scams/</loc>
		<lastmod>2026-03-20T12:21:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-die-verschlusselung-zum-risiko-wird/</loc>
		<lastmod>2026-03-20T12:22:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-und-netzsicherheit-im-fokus-banken-als-schlussel-zur-absicherung-kritischer-infrastrukturen/</loc>
		<lastmod>2026-03-20T12:23:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lucke-bei-campusnet-datenpanne-betrifft-mehr-als-eine-million-studenten/</loc>
		<lastmod>2026-03-20T12:24:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnetze-zerschlagen-millionen-router-und-iot-gerate-fur-ddos-angriffe-gekapert/</loc>
		<lastmod>2026-03-20T12:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-attacken-schlag-gegen-internationale-cyberkriminelle/</loc>
		<lastmod>2026-03-20T13:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einfluss-der-kunstlichen-intelligenz-auf-die-cloud-einfuhrung-budgets-und-it-resilienz/</loc>
		<lastmod>2026-03-20T13:14:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-grundet-mit-dem-executiveboard-einen-beirat-fur-ki-gestutzte-innovationen-in-der-it-sicherheit/</loc>
		<lastmod>2026-03-20T13:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-den-buroalltag-in-unternehmen-messbar-effizienter-macht/</loc>
		<lastmod>2026-03-20T13:16:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-den-buroalltag-in-unternehmen-messbar-effizienter-macht-2/</loc>
		<lastmod>2026-03-20T13:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-ki-den-buroalltag-in-unternehmen-messbar-effizienter-macht-3/</loc>
		<lastmod>2026-03-20T13:17:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/specterops-erweitert-sein-attack-path-management-fur-identitaten-auf-okta-github-und-mac/</loc>
		<lastmod>2026-03-20T13:18:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jaguar-land-rovers-cyber-bailout-sets-worrying-precedent-watchdog-warns/</loc>
		<lastmod>2026-03-20T13:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-slows-android-sideloading-to-trip-up-scammers/</loc>
		<lastmod>2026-03-20T13:20:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/terminated-contract-led-to-2-5-million-cyber-extortion-scheme/</loc>
		<lastmod>2026-03-20T13:21:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-security-update-fixes-26-vulnerabilities-enabling-remote-malicious-code-execution/</loc>
		<lastmod>2026-03-20T13:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover/</loc>
		<lastmod>2026-03-20T13:23:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-msg-vorstand-karsten-redenius-cra-macht-cybersecurity-zur-voraussetzung-fur-das-ce-zeichen/</loc>
		<lastmod>2026-03-20T13:24:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-grundet-executive-advisory-board-fur-ki-gestutzte-innovationen/</loc>
		<lastmod>2026-03-20T13:25:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-posture-management-in-2026/</loc>
		<lastmod>2026-03-20T14:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/that-job-brief-on-google-forms-could-infect-your-device/</loc>
		<lastmod>2026-03-20T14:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-autosect-how-ai-agents-are-transforming-software-composition-analysis/</loc>
		<lastmod>2026-03-20T14:15:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-police-force-presses-pause-on-live-facial-recognition-after-study-finds-racial-bias/</loc>
		<lastmod>2026-03-20T14:16:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-police-force-presses-pause-on-live-facial-recognition-after-study-finds-racial-bias-2/</loc>
		<lastmod>2026-03-20T14:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-police-force-presses-pause-on-live-facial-recognition-after-study-finds-racial-bias-3/</loc>
		<lastmod>2026-03-20T14:16:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-disrupt-monster-iot-botnets-behind-record-breaking-ddos-attacks/</loc>
		<lastmod>2026-03-20T14:17:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fake-zoom-meeting-invite-scam-spreads-malware-on-windows-pcs/</loc>
		<lastmod>2026-03-20T14:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fake-zoom-meeting-invite-scam-spreads-malware-on-windows-pcs-2/</loc>
		<lastmod>2026-03-20T14:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fake-zoom-meeting-invite-scam-spreads-malware-on-windows-pcs-3/</loc>
		<lastmod>2026-03-20T14:18:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fake-zoom-meeting-invite-scam-spreads-malware-on-windows-pcs-4/</loc>
		<lastmod>2026-03-20T14:18:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-fmc-flaw-was-exploited-by-interlock-weeks-before-patch-cve-2026-20131/</loc>
		<lastmod>2026-03-20T14:19:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interlock-ransomware-targets-cisco-enterprise-firewalls/</loc>
		<lastmod>2026-03-20T14:20:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-governments-role-uncertain-businesses-unite-to-combat-fraud/</loc>
		<lastmod>2026-03-20T14:21:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-dropzone-ai-is-bringing-a-software-only-approach-to-agentic-soc-ceo/</loc>
		<lastmod>2026-03-20T15:15:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-dropzone-ai-is-bringing-a-software-only-approach-to-agentic-soc-ceo-2/</loc>
		<lastmod>2026-03-20T15:15:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rep-lahood-on-why-section-702-reauthorization-will-take-a-little-political-muscle/</loc>
		<lastmod>2026-03-20T15:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-seizes-domains-and-infrastructure-used-in-sprawling-botnet-campaigns/</loc>
		<lastmod>2026-03-20T15:17:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-pleads-guilty-to-8-million-ai-generated-music-scheme/</loc>
		<lastmod>2026-03-20T15:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/justice-department-disrupts-botnet-networks-that-hijacked-3-million-devices/</loc>
		<lastmod>2026-03-20T15:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschte-schutz-app-fur-krypto-wallets-stiehlt-nutzerdaten/</loc>
		<lastmod>2026-03-20T15:20:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-claws-its-way-towards-the-top-of-the-ai-market/</loc>
		<lastmod>2026-03-20T15:21:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-claude-claws-its-way-towards-the-top-of-the-ai-market-2/</loc>
		<lastmod>2026-03-20T15:21:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-image-format-conversion-is-becoming-a-practical-issue-in-web-security-and-performance/</loc>
		<lastmod>2026-03-20T15:22:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/upwind-founder-talks-benefits-of-going-channel-from-the-start/</loc>
		<lastmod>2026-03-20T15:23:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2-7-million-hit-in-workplace-benefits-data-breach-exposing-ssns-dates-of-birth-and-health-account-data/</loc>
		<lastmod>2026-03-20T15:24:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-reports-strong-growth-and-profitability-in-fy2025/</loc>
		<lastmod>2026-03-20T15:25:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks/</loc>
		<lastmod>2026-03-20T15:26:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-open-source-password-managers-for-windows-in-2026/</loc>
		<lastmod>2026-03-20T16:22:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-dr-chidimma-opara-computer-science-lecturer-at-teesside-university/</loc>
		<lastmod>2026-03-20T16:23:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday/</loc>
		<lastmod>2026-03-20T16:24:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endpunkte-ohne-authentifizierung-hacker-knachen-mckinsey-ki-lilli-in-nur-2-stunden/</loc>
		<lastmod>2026-03-20T16:25:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-getting-things-fixed-keynote-on-security-wins-and-fails/</loc>
		<lastmod>2026-03-20T16:15:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-getting-things-fixed-keynote-on-security-wins-and-fails-2/</loc>
		<lastmod>2026-03-20T16:15:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reunifying-the-cloud-introducing-aurelian-for-multi-cloud-security-testing/</loc>
		<lastmod>2026-03-20T16:16:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-know-ai-is-essential-for-cyber-defense-but-arent-yet-seeing-returns/</loc>
		<lastmod>2026-03-20T16:17:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-allies-move-to-dismantle-four-high-volume-iot-botnets/</loc>
		<lastmod>2026-03-20T16:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-confirms-seizure-of-domains-linked-to-iran-backed-threat-actor/</loc>
		<lastmod>2026-03-20T16:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/denvers-crosswalks-hacked-to-broadcast-anti-trump-messages/</loc>
		<lastmod>2026-03-20T16:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stranded-across-the-us/</loc>
		<lastmod>2026-03-20T16:21:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kotlin-vs-java-in-2026-what-smart-businesses-are-choosing-for-android-development/</loc>
		<lastmod>2026-03-20T17:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainguard-assemble-2026-and-the-security-factory-mindset/</loc>
		<lastmod>2026-03-20T17:14:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainguard-assemble-2026-and-the-security-factory-mindset-2/</loc>
		<lastmod>2026-03-20T17:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-dismantle-dark-web-network-exploiting-child-sexual-abuse-material/</loc>
		<lastmod>2026-03-20T17:16:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubiquiti-defect-poses-account-takeover-risk-for-unifi-networking-application-users/</loc>
		<lastmod>2026-03-20T17:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-accuses-irans-government-of-operating-hacktivist-group-that-hacked-stryker/</loc>
		<lastmod>2026-03-20T17:19:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/</loc>
		<lastmod>2026-03-20T17:20:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-security-fitness-app-gefahrdet-sicherheit-von-flugzeugtrager-verband/</loc>
		<lastmod>2026-03-20T17:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/could-your-face-change-what-you-pay-nyc-wants-limits-on-biometric-tracking/</loc>
		<lastmod>2026-03-20T18:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/could-your-face-change-what-you-pay-nyc-wants-limits-on-biometric-tracking-2/</loc>
		<lastmod>2026-03-20T18:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-takes-down-leak-sites-tied-to-irans-ministry-of-intelligence-and-security/</loc>
		<lastmod>2026-03-20T18:15:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-french-navy-officer-accidentally-leaked-the-location-of-an-aircraft-carrier-by-logging-his-run-on-strava/</loc>
		<lastmod>2026-03-20T18:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-accuses-irans-government-of-operating-hacktivist-group-that-hacked-stryker/</loc>
		<lastmod>2026-03-20T18:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/essex-police-halts-live-facial-recognition-over-bias-and-accuracy-risks/</loc>
		<lastmod>2026-03-20T18:18:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyber-monitoring-centre-plans-expansion-in-us-amid-risk-of-category-5-attack/</loc>
		<lastmod>2026-03-20T18:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-take-down-373000-fake-csam-sites-in-operation-alice/</loc>
		<lastmod>2026-03-20T18:20:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-plums/</loc>
		<lastmod>2026-03-20T19:13:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-recommends-privileged-access-controls-for-endpoint-management-after-stryker-incident/</loc>
		<lastmod>2026-03-20T19:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-using-ai-to-submit-bug-reports-says-google/</loc>
		<lastmod>2026-03-20T19:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trio-sentenced-for-facilitating-north-korean-it-worker-scheme-from-their-homes/</loc>
		<lastmod>2026-03-20T19:16:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-opsec-fail-beast-gang-exposes-ransomware-server/</loc>
		<lastmod>2026-03-20T19:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-ci-cd-secrets/</loc>
		<lastmod>2026-03-20T19:18:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-ci-cd-secrets-2/</loc>
		<lastmod>2026-03-20T19:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-security-con-for-dummies-an-intro/</loc>
		<lastmod>2026-03-20T20:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-city-reports-ransomware-attack-as-la-transit-agency-finds-unauthorized-activity/</loc>
		<lastmod>2026-03-20T20:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-issue-psa-on-russian-intelligence-campaign-to-target-messaging-apps/</loc>
		<lastmod>2026-03-20T20:15:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navia-data-breach-impacts-nearly-2-7-million-people/</loc>
		<lastmod>2026-03-20T20:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-kimwolf-botnets-disrupted-in-international-operation/</loc>
		<lastmod>2026-03-20T20:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-mails-trusted-sender-label-misused-in-new-phishing-scheme/</loc>
		<lastmod>2026-03-20T20:18:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/</loc>
		<lastmod>2026-03-20T20:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-now-oracles-fusion-middleware-has-critical-rce-flaw/</loc>
		<lastmod>2026-03-20T20:20:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trusted-java-containers-azul-zulu-openjdk-joins-dockers-official-images/</loc>
		<lastmod>2026-03-20T21:13:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/texas-gov-orders-state-review-of-chinese-made-medtech/</loc>
		<lastmod>2026-03-20T21:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-ai-policy-blueprint-leaves-key-risks-unresolved/</loc>
		<lastmod>2026-03-20T21:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-trusted-sender-labels-misused-in-new-apple-mail-phishing-scheme/</loc>
		<lastmod>2026-03-20T21:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/</loc>
		<lastmod>2026-03-20T21:17:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-018-how-to-think-not-what-to-think-mitch-prior/</loc>
		<lastmod>2026-03-20T22:12:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/</loc>
		<lastmod>2026-03-20T22:13:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptographers-engage-in-war-of-words-over-rustsec-bug-reports-and-subsequent-ban/</loc>
		<lastmod>2026-03-20T22:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-group-lapsus-claims-alleged-astrazeneca-data-breach/</loc>
		<lastmod>2026-03-20T22:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-stryker-attack-hits-healthcare-supply-chain/</loc>
		<lastmod>2026-03-20T22:16:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-top-democrat-is-urging-colleagues-to-support-trumps-spy-machine/</loc>
		<lastmod>2026-03-20T22:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-is-your-approach-to-agentic-ai-management/</loc>
		<lastmod>2026-03-20T23:13:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-certain-your-agentic-ai-optimally-performs/</loc>
		<lastmod>2026-03-20T23:14:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-controlled-should-your-cloud-native-ai-security-be/</loc>
		<lastmod>2026-03-20T23:15:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-next-car-might-need-300-gb-of-ram-and-so-will-autonomous-robots/</loc>
		<lastmod>2026-03-20T23:16:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7500-magento-sites-defaced-in-global-hacking-campaign/</loc>
		<lastmod>2026-03-20T23:17:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-growing-cyber-invasion-targeting-the-us/</loc>
		<lastmod>2026-03-20T23:18:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-factories-security-flaws-and-workforce-shifts-define-this-week-in-tech/</loc>
		<lastmod>2026-03-20T23:19:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-offensive-security-the-current-landscape-and-what-it-means-for-defense/</loc>
		<lastmod>2026-03-21T00:13:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/moonshot-ai-governance-breakdown-lessons-from-the-cursor-kimi-k2-5-incident/</loc>
		<lastmod>2026-03-21T00:14:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-lost-6-3-million-orders-to-vibe-coding-your-soc-is-next/</loc>
		<lastmod>2026-03-21T04:13:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-siem-isnt-broken-your-investigation-layer-is-missing/</loc>
		<lastmod>2026-03-21T04:14:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-lateral-movement-detection-tools-are-missing-90-of-attacks-heres-why/</loc>
		<lastmod>2026-03-21T04:15:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-nations-ready-to-be-the-cybersecurity-insurers-of-last-resort/</loc>
		<lastmod>2026-03-21T04:16:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-breaks-microsoft-account-sign-ins-in-windows-11-with-latest-update/</loc>
		<lastmod>2026-03-21T04:17:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-seizes-iranian-online-leak-sites-after-stryker-hack/</loc>
		<lastmod>2026-03-21T04:18:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copyright-complaint-lures-linked-to-new-purelog-stealer-credential-theft-wave/</loc>
		<lastmod>2026-03-21T05:13:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saps-grand-cloud-escape-plan-euro2b-short-of-the-runway/</loc>
		<lastmod>2026-03-21T06:13:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-and-cisa-flag-russian-cyber-operations-targeting-select-individuals-via-signal/</loc>
		<lastmod>2026-03-21T06:14:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-backdoored-with-credential-stealer-in-supply-chain-attack/</loc>
		<lastmod>2026-03-21T07:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-backdoored-with-credential-stealer-in-supply-chain-attack-2/</loc>
		<lastmod>2026-03-21T07:13:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-act-bsi-hat-vorsitz-der-adco-cra/</loc>
		<lastmod>2026-03-21T08:17:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-weltweite-studie-zeigt-kritische-lucke-zwischen-erkennung-und-eindammung-auf/</loc>
		<lastmod>2026-03-21T08:19:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-weltweite-studie-zeigt-kritische-lucke-zwischen-erkennung-und-eindammung-auf-2/</loc>
		<lastmod>2026-03-21T08:19:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages/</loc>
		<lastmod>2026-03-21T09:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-jahre-twelve-monkeys-einer-der-besten-zeitreisefilme-aller-zeiten/</loc>
		<lastmod>2026-03-21T09:15:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-fixes-high-severity-rce-vulnerability-affecting-identity-and-web-services-platforms/</loc>
		<lastmod>2026-03-21T10:12:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-compromised-to-inject-malicious-scripts-that-steal-credentials/</loc>
		<lastmod>2026-03-21T10:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-compromised-to-inject-malicious-scripts-that-steal-credentials-2/</loc>
		<lastmod>2026-03-21T10:14:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026/</loc>
		<lastmod>2026-03-21T10:15:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pki-auf-dem-prufstand-warum-modernisierung-unvermeidlich-ist/</loc>
		<lastmod>2026-03-21T10:16:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-otp-authentication-streamlines-service-delivery-for-hvac-companies/</loc>
		<lastmod>2026-03-21T11:12:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-otp-authentication-streamlines-service-delivery-for-hvac-companies-2/</loc>
		<lastmod>2026-03-21T11:12:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secrets-management-vs-secrets-elimination-where-should-you-invest/</loc>
		<lastmod>2026-03-21T11:13:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-owasp-top-10-for-llm-applications-2025-explained-simply/</loc>
		<lastmod>2026-03-21T11:15:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nehmen-vermehrt-kritische-infrastrukturen-ins-visier/</loc>
		<lastmod>2026-03-21T11:15:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polyshell-flaw-exposes-magento-and-adobe-commerce-to-file-upload-attacks/</loc>
		<lastmod>2026-03-21T11:16:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-a-car-breathalyzer-firm-leaves-drivers-stuck/</loc>
		<lastmod>2026-03-21T11:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-as-rsac-2026-opens-ai-has-bifurcated-cybersecurity-into-two-wars-the-clock-is-running-2/</loc>
		<lastmod>2026-03-21T12:11:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/my-take-as-rsac-2026-opens-ai-has-bifurcated-cybersecurity-into-two-wars-the-clock-is-running/</loc>
		<lastmod>2026-03-21T12:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-manager/</loc>
		<lastmod>2026-03-21T12:12:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/73-of-breaches-happen-due-to-weak-grc-implement-it-the-right-way/</loc>
		<lastmod>2026-03-21T13:11:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autofahrer-mit-alkohol-testsystemen-ausgesperrt/</loc>
		<lastmod>2026-03-21T13:12:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks/</loc>
		<lastmod>2026-03-21T14:14:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-adds-advanced-flow-for-safe-apk-sideloading-on-android/</loc>
		<lastmod>2026-03-21T15:14:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/</loc>
		<lastmod>2026-03-21T15:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diese-neue-version-einer-android-malware-scannt-deine-notizen-warum-das-gefahrlich-ist/</loc>
		<lastmod>2026-03-21T15:16:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-schliest-kritische-webkit-lucke-wie-du-das-versteckte-sicherheitsupdate-findest/</loc>
		<lastmod>2026-03-21T15:17:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-attack-alert-analysis-from-hidden-indicators-to-actionable-threat-intelligence/</loc>
		<lastmod>2026-03-21T16:14:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-%c2%a2-al-red-teaming-for-artificial-dummies/</loc>
		<lastmod>2026-03-21T17:14:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delve-accused-of-misleading-customers-with-fake-compliance-2/</loc>
		<lastmod>2026-03-21T18:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delve-accused-of-misleading-customers-with-fake-compliance/</loc>
		<lastmod>2026-03-21T18:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delve-accused-of-misleading-customers-with-fake-compliance-3/</loc>
		<lastmod>2026-03-21T18:14:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldleaks-ransomware-group-breached-the-city-of-los-angels/</loc>
		<lastmod>2026-03-21T18:15:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/</loc>
		<lastmod>2026-03-21T18:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions-2/</loc>
		<lastmod>2026-03-21T18:16:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-azure-monitor-alerts-abused-for-callback-phishing-attacks/</loc>
		<lastmod>2026-03-21T18:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-takes-ai-computing-to-orbit-with-new-space-platforms/</loc>
		<lastmod>2026-03-21T19:12:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidias-bluefield-4-stx-aims-to-fix-the-storage-problem-ai-agents-keep-running-into/</loc>
		<lastmod>2026-03-21T19:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jeff-bezos-rocket-company-blue-origin-applies-to-launch-51000-datacenter-satellites/</loc>
		<lastmod>2026-03-21T20:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supermicro-co-founder-arrested-charged-over-2-5b-nvidia-gpu-sales-to-china/</loc>
		<lastmod>2026-03-21T20:15:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canisterworm-the-self-spreading-npm-attack-that-uses-a-decentralized-server-to-stay-alive/</loc>
		<lastmod>2026-03-21T23:11:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-you-with-your-secrets-vaulting-strategy-2/</loc>
		<lastmod>2026-03-22T00:13:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-you-with-your-secrets-vaulting-strategy/</loc>
		<lastmod>2026-03-22T00:13:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-you-with-your-secrets-vaulting-strategy-3/</loc>
		<lastmod>2026-03-22T00:13:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-you-with-your-secrets-vaulting-strategy-4/</loc>
		<lastmod>2026-03-22T00:13:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-relieved-are-you-with-your-secrets-vaulting-strategy-5/</loc>
		<lastmod>2026-03-22T00:13:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-agentic-ai-optimized-for-latest-threats/</loc>
		<lastmod>2026-03-22T00:15:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/does-your-nhi-system-deliver-essential-value/</loc>
		<lastmod>2026-03-22T00:16:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-568-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-03-22T04:12:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millionen-kanale-geloscht-massive-razzien-bei-telegram/</loc>
		<lastmod>2026-03-22T05:13:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-innovation-sandbox-zeropath-from-alarm-accumulation-to-executable-fixes/</loc>
		<lastmod>2026-03-22T07:12:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zimperium-warnt-vor-neuer-bankingwelle-1-243-apps-kompromittiert/</loc>
		<lastmod>2026-03-22T08:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-auf-steam-fbi-sucht-gamer-hast-du-eines-dieser-spiele-gespielt/</loc>
		<lastmod>2026-03-22T08:14:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nehmen-vermehrt-kritische-infrastrukturen-ins-visier-2/</loc>
		<lastmod>2026-03-22T09:12:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resilienz-die-unterschatzte-ressource-im-datenschutzmanagement/</loc>
		<lastmod>2026-03-22T09:14:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medizin-der-zukunft-joint-venture-von-charita-und-schwarz-digits-soll-digitale-souveranitat-starken/</loc>
		<lastmod>2026-03-22T09:14:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-rethink-tech-buying-after-palantir-contracts/</loc>
		<lastmod>2026-03-22T09:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kontrolle-in-der-ki-ara-wie-unternehmen-den-uberblick-uber-ihre-agenten-behalten/</loc>
		<lastmod>2026-03-22T09:17:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-screenconnect-servers-open-to-attack-exploited-microsoft-sharepoint-flaw/</loc>
		<lastmod>2026-03-22T10:12:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-89/</loc>
		<lastmod>2026-03-22T11:11:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fireside-chat-in-the-ai-age-your-mfa-authentication-apps-can-be-compromised-in-minutes/</loc>
		<lastmod>2026-03-22T12:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-physical-ai-and-what-does-it-mean-for-government/</loc>
		<lastmod>2026-03-22T12:14:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-russian-intelligence-hijacking-encrypted-messaging-apps/</loc>
		<lastmod>2026-03-22T13:12:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sorry-amazon-you-couldnt-pick-a-worse-time-to-bring-a-phone-to-market-idc-analyst/</loc>
		<lastmod>2026-03-22T14:13:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sorry-amazon-you-couldnt-pick-a-worse-time-to-bring-a-phone-to-market-idc-analyst-2/</loc>
		<lastmod>2026-03-22T14:13:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-apple-laravel-livewire-and-craft-cms-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-22T15:12:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/</loc>
		<lastmod>2026-03-22T15:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-faces-in-the-fog-seth-law-on-unconventional-user-enumeration/</loc>
		<lastmod>2026-03-22T16:12:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-fixes-critical-rce-flaw-cve-2026-21992-in-identity-manager/</loc>
		<lastmod>2026-03-22T16:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-domains-portfolio-belonging-to-ramp-russian-anonymous-marketplace-forum-members-a-compilation/</loc>
		<lastmod>2026-03-22T20:13:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-compilation-of-bitcoin-wallet-addresses-from-the-ramp-russian-anonymous-marketplace-forum-members-a-compilation/</loc>
		<lastmod>2026-03-22T20:14:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-data-mining-conti-leaks-leads-to-actual-binaries-and-to-a-hardcoded-c2-with-an-encryption-key-on-tripod-com-part-three/</loc>
		<lastmod>2026-03-22T20:15:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-actors-target-whatsapp-and-signal-in-phishing-campaign/</loc>
		<lastmod>2026-03-22T20:16:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/90-der-unternehmen-setzen-security-teams-unter-druck-identitatskontrollen-fur-ki-zu-lockern/</loc>
		<lastmod>2026-03-23T06:48:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plumber-open-source-scanner-of-gitlab-ci-cd-pipelines-for-compliance-gaps/</loc>
		<lastmod>2026-03-23T06:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-updates-its-dns-security-guidance-for-the-first-time-in-over-a-decade/</loc>
		<lastmod>2026-03-23T06:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-warning-on-apple-vulnerabilities-exploited-through-darksword-ios-chain/</loc>
		<lastmod>2026-03-23T06:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidstealer-steals-chrome-secrets-without-injection-or-privilege-escalation/</loc>
		<lastmod>2026-03-23T06:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erstes-update-beim-patchday-im-marz-2026-uberraschendes-notfall-update-fur-windows-11/</loc>
		<lastmod>2026-03-23T06:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kritische-lucke-zwischen-erkennung-und-eindammung-von-cyberangriffen/</loc>
		<lastmod>2026-03-23T07:49:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foster-city-cyberattack-disrupts-services-raises-data-breach-fears/</loc>
		<lastmod>2026-03-23T07:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-ai-agents-are-moving-sensitive-data-do-you-know-where/</loc>
		<lastmod>2026-03-23T07:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canisterworm-hijacks-npm-publisher-accounts-steals-tokens/</loc>
		<lastmod>2026-03-23T07:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cve-2025-32975-cvss-10-0-to-hijack-unpatched-quest-kace-sma-systems/</loc>
		<lastmod>2026-03-23T07:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-know-you-can-pay-a-million-by-anja-shortland-review-the-terrifying-new-world-of-ransomware/</loc>
		<lastmod>2026-03-23T07:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-jeder-zweite-ciso-furchtet-jobverlust-nach-vorfall-cisos-mussen-die-sprache-des-vorstands-lernen/</loc>
		<lastmod>2026-03-23T07:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/building-a-layered-security-stack-identity-network-and-device-protection/</loc>
		<lastmod>2026-03-23T08:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-insider-threat-rises-again/</loc>
		<lastmod>2026-03-23T08:51:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-insider-threat-rises-again-2/</loc>
		<lastmod>2026-03-23T08:51:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nationale-rechenzentrumsstrategie-bitkom-fordert-noch-deutlich-verbesserte-rahmenbedingungen/</loc>
		<lastmod>2026-03-23T08:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-software-vereinbarung-von-bmds-und-bitkom-uber-einheitliche-standards-zur-beschaffung/</loc>
		<lastmod>2026-03-23T08:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-kb5085516-emergency-update-fixes-microsoft-account-sign-in/</loc>
		<lastmod>2026-03-23T08:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-qnap-qvr-pro-flaw-could-let-remote-attackers-access-systems/</loc>
		<lastmod>2026-03-23T08:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-ip-kvm-flaws-could-enable-bios-level-enterprise-network-attacks/</loc>
		<lastmod>2026-03-23T08:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-spreads-via-compromised-docker-hub-images/</loc>
		<lastmod>2026-03-23T08:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-factory-ohne-air-gap-warum-netzwerksichtbarkeit-in-der-produktion-zur-pflicht-werden-sollte/</loc>
		<lastmod>2026-03-23T08:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/streaming-vorbei-24-illegale-iptv-portale-vom-netz-genommen/</loc>
		<lastmod>2026-03-23T08:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-march-16-march-22/</loc>
		<lastmod>2026-03-23T09:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gefalschte-schutz-app-fur-krypto-wallets-stiehlt-nutzerdaten-2/</loc>
		<lastmod>2026-03-23T09:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kleine-fehler-fuhren-in-der-hybrid-cloud-zu-grosen-sicherheitsproblemen/</loc>
		<lastmod>2026-03-23T09:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turns-out-your-coffee-addiction-may-be-doing-your-brain-a-favor/</loc>
		<lastmod>2026-03-23T09:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payment-biz-pulls-plug-on-open-source-charity-after-kyc-spat/</loc>
		<lastmod>2026-03-23T09:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/international-police-operation-alice-take-down-373000-dark-web-sites-exploiting-children/</loc>
		<lastmod>2026-03-23T09:55:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-go-after-high-value-targets-through-signal/</loc>
		<lastmod>2026-03-23T09:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks/</loc>
		<lastmod>2026-03-23T09:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper/</loc>
		<lastmod>2026-03-23T09:58:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-alice-takes-down-370000-dark-web-sites/</loc>
		<lastmod>2026-03-23T09:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verteidiger-verlieren-an-vorsprung-ki-ist-fur-cyberkriminelle-kein-experiment-mehr/</loc>
		<lastmod>2026-03-23T10:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grapheneos-will-altersverifikation-nicht-unterstutzen/</loc>
		<lastmod>2026-03-23T10:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberabwehr-zwei-von-funf-unternehmen-nutzen-managed-security-services/</loc>
		<lastmod>2026-03-23T10:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behavioral-xdr-and-threat-intel-nab-north-korean-fake-it-worker-within-10-days-of-hire/</loc>
		<lastmod>2026-03-23T10:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-us-companies-must-be-ready-for-quantum-by-2030-a-practical-roadmap-2/</loc>
		<lastmod>2026-03-23T10:52:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-us-companies-must-be-ready-for-quantum-by-2030-a-practical-roadmap/</loc>
		<lastmod>2026-03-23T10:52:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-updates-dns-security-guidance-after-12-years-with-sp-800-81r3/</loc>
		<lastmod>2026-03-23T10:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-drone-swarm-is-coming-and-nato-air-defenses-are-too-expensive-to-cope/</loc>
		<lastmod>2026-03-23T10:54:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/removing-some-copilots-will-improve-windows-11/</loc>
		<lastmod>2026-03-23T10:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-crackdown-dismantles-4-botnets-behind-major-ddos-attacks/</loc>
		<lastmod>2026-03-23T10:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-actors-use-telegram-as-c2-in-malware-attacks-on-dissidents/</loc>
		<lastmod>2026-03-23T10:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hassan-took-a-bike-ride-now-hes-one-of-the-thousands-missing-in-gaza/</loc>
		<lastmod>2026-03-23T10:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-you-cant-get-a-death-certificate-in-gaza/</loc>
		<lastmod>2026-03-23T11:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-meera-tamboli-digital-forensics-and-incident-response-analyst-aveva/</loc>
		<lastmod>2026-03-23T11:00:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qa-if-its-not-secure-you-cant-trust-it-3/</loc>
		<lastmod>2026-03-23T11:02:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qa-if-its-not-secure-you-cant-trust-it/</loc>
		<lastmod>2026-03-23T11:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qa-if-its-not-secure-you-cant-trust-it-2/</loc>
		<lastmod>2026-03-23T11:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks/</loc>
		<lastmod>2026-03-23T11:02:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-craft-cms-code-injection-flaw-exploited-in-active-attacks/</loc>
		<lastmod>2026-03-23T11:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oblivion-rat-masquerades-as-play-store-update-to-spy-on-android-users/</loc>
		<lastmod>2026-03-23T11:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oblivion-rat-masquerades-as-play-store-update-to-spy-on-android-users/</loc>
		<lastmod>2026-03-23T11:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oblivion-rat-masquerades-as-play-store-update-to-spy-on-android-users/</loc>
		<lastmod>2026-03-23T11:05:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oblivion-rat-masquerades-as-play-store-update-to-spy-on-android-users/</loc>
		<lastmod>2026-03-23T11:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-in-china-wechat-bekommt-openclaw-integration-inmitten-eines-hypes/</loc>
		<lastmod>2026-03-23T11:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehlende-patches-auf-smartphones-volla-widerspricht-vorwurfen-von-grapheneos/</loc>
		<lastmod>2026-03-23T11:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-bots-tantiemen-abkassiert-musiker-gesteht-millionenbetrug-mit-ki-songs/</loc>
		<lastmod>2026-03-23T11:08:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-soldier-sentenced-for-helping-north-korean-it-workers/</loc>
		<lastmod>2026-03-23T11:49:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-broken-windows-update-days-after-vowing-fewer-broken-updates/</loc>
		<lastmod>2026-03-23T11:50:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-weather-powered-design-tool-needs-more-than-just-an-api-key/</loc>
		<lastmod>2026-03-23T11:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-unified-threat-management-utm-devices-software/</loc>
		<lastmod>2026-03-23T11:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-secure-cloud-storage-for-privacy-protection/</loc>
		<lastmod>2026-03-23T11:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-issues-emergency-fix-for-pre-auth-rce-in-identity-manager-cve-2026-21992/</loc>
		<lastmod>2026-03-23T11:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/511000-endlife-iis-instances-found-online-raising-security-risks/</loc>
		<lastmod>2026-03-23T11:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miolab-macos-stealer-expands-with-clickfix-wallet-theft-team-apis/</loc>
		<lastmod>2026-03-23T11:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-quest-kace-sma-flaw-to-harvest-credentials/</loc>
		<lastmod>2026-03-23T11:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-us-government-to-patch-maximum-severity-cisco-flaw/</loc>
		<lastmod>2026-03-23T11:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-in-china-wechat-bekommt-inmitten-des-hypes-openclaw-integration/</loc>
		<lastmod>2026-03-23T12:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-abe-bypass-discovered-new-voidstealer-malware-steals-passwords-and-cookies/</loc>
		<lastmod>2026-03-23T12:49:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2025-talos-year-in-review-speed-scale-and-staying-power/</loc>
		<lastmod>2026-03-23T12:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-grunde-warum-kunstliche-intelligenz-fur-cfos-zur-fuhrungsfrage-wird/</loc>
		<lastmod>2026-03-23T12:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dokumentarfilm-zur-cyberkriminalitat-dont-go-to-the-police/</loc>
		<lastmod>2026-03-23T12:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-5-best-voip-routers-wired-wireless-and-mesh-in-2026/</loc>
		<lastmod>2026-03-23T12:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-6-best-free-antivirus-software-providers-for-mac-in-2026/</loc>
		<lastmod>2026-03-23T12:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-exchange-online-service-change-causes-email-access-issues/</loc>
		<lastmod>2026-03-23T12:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/libyan-refinery-targeted-in-prolonged-spy-campaign-with-asyncrat/</loc>
		<lastmod>2026-03-23T12:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware/</loc>
		<lastmod>2026-03-23T12:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fallstudie-quipu-von-insellosungen-zu-waap-schutz-mit-statischen-rate-limits-stost-an-grenzen/</loc>
		<lastmod>2026-03-23T12:57:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorlon-launches-ai-agent-flight-recorder-and-action-center-to-close-the-agentic-response-gap/</loc>
		<lastmod>2026-03-23T13:52:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorlon-survey-99-of-organizations-got-hit-by-a-saas-or-ai-security-incident-in-2025/</loc>
		<lastmod>2026-03-23T13:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ridge-security-brings-agentic-ai-pentesting-to-smbs-with-purpleridge-3-0/</loc>
		<lastmod>2026-03-23T13:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-launches-id-plus-sovereign-deployment-for-organizations-that-cant-afford-identity-downtime/</loc>
		<lastmod>2026-03-23T13:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-extends-security-reach-to-ai-agents/</loc>
		<lastmod>2026-03-23T13:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-readiness-assessment-how-to-evaluate-if-your-business-is-truly-ready-for-ai/</loc>
		<lastmod>2026-03-23T13:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-big-crowdstrike-launches-for-next-gen-siem-ai-security/</loc>
		<lastmod>2026-03-23T13:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-unveils-zero-trust-for-ai-agents-5-things-to-know/</loc>
		<lastmod>2026-03-23T13:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beers-with-talos-breaks-down-the-2025-talos-year-in-review/</loc>
		<lastmod>2026-03-23T14:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-chip-testing-firm-shrugged-off-ransomware-hit-as-minor-then-came-the-data-leak/</loc>
		<lastmod>2026-03-23T14:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-shut-down-373000-dark-web-sites-in-single-operator-csam-network/</loc>
		<lastmod>2026-03-23T14:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-duck-launches-signal-to-tackle-the-security-risks-of-ai-generated-code/</loc>
		<lastmod>2026-03-23T14:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seo-poisoning-campaign-uses-fake-popular-apps-to-deliver-asyncrat/</loc>
		<lastmod>2026-03-23T14:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-with-them/</loc>
		<lastmod>2026-03-23T14:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/boomi-erneut-als-leader-ausgezeichnet-12-jahre-an-der-spitze-im-ipaas-markt/</loc>
		<lastmod>2026-03-23T14:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacke-trivy-scanner-und-140-npm-pakete-kompromittiert/</loc>
		<lastmod>2026-03-23T14:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more-2/</loc>
		<lastmod>2026-03-23T15:10:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appgate-brings-zero-trust-network-access-to-industrial-ot-with-new-secure-remote-access-product/</loc>
		<lastmod>2026-03-23T14:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/straiker-launches-discover-ai-and-expands-defend-ai-to-secure-enterprise-agent-deployments/</loc>
		<lastmod>2026-03-23T14:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-announces-ai-agent-security-red-teaming-and-auto-investigation-ga-at-rsac-2026/</loc>
		<lastmod>2026-03-23T14:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purple-book-community-and-armorcode-survey-flags-shadow-ai-ai-generated-code-risks/</loc>
		<lastmod>2026-03-23T14:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-ai-speed-unmanaged-cyber-risk/</loc>
		<lastmod>2026-03-23T14:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-act-eu/</loc>
		<lastmod>2026-03-23T14:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-debuts-secure-browser-for-smbs-5-key-features/</loc>
		<lastmod>2026-03-23T14:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-malware-operation-collapses-after-security-failures-developers-arrest/</loc>
		<lastmod>2026-03-23T14:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iranian-nasir-security-is-targeting-the-energy-sector-in-the-middle-east/</loc>
		<lastmod>2026-03-23T14:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/23rd-march-threat-intelligence-report/</loc>
		<lastmod>2026-03-23T14:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-immigration-agents-filmed-making-airport-arrests-as-trump-calls-in-ice-to-ease-security-line-delays/</loc>
		<lastmod>2026-03-23T15:01:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sovereign-sase-asservice-souveranitat-wird-zum-service/</loc>
		<lastmod>2026-03-23T15:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-browser-ermoglicht-sicheren-und-vertraulichen-einsatz-von-kunstlicher-intelligenz-in-unternehmen/</loc>
		<lastmod>2026-03-23T15:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enrico-feil-verantwortet-die-betreuung-der-hersteller-yubico-hid-global-und-egomind-beim-value-added-distributor-sysob/</loc>
		<lastmod>2026-03-23T15:04:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/varonis-atlas-securing-ai-and-the-data-that-powers-it/</loc>
		<lastmod>2026-03-23T15:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/varonis-atlas-securing-ai-and-the-data-that-powers-it-2/</loc>
		<lastmod>2026-03-23T15:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tax-scam-google-ads-push-byovd-edr-killer-huntress-finds/</loc>
		<lastmod>2026-03-23T15:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tax-scam-google-ads-push-byovd-edr-killer-huntress-finds-2/</loc>
		<lastmod>2026-03-23T15:07:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-dominates-rsac-innovation-sandbox/</loc>
		<lastmod>2026-03-23T15:08:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/</loc>
		<lastmod>2026-03-23T15:10:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-scanner-compromise-explained-and-what-it-means-for-your-saas-and-ci-cd-security/</loc>
		<lastmod>2026-03-23T15:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-launches-ai-app-to-tackle-new-anatomy-of-cyber-risk/</loc>
		<lastmod>2026-03-23T15:52:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandboxaq-adds-runtime-guardrails-mcp-risk-analysis-to-aqtive-guard-ahead-of-rsac-2026/</loc>
		<lastmod>2026-03-23T15:53:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doj-disrupts-botnets-but-ddos-threats-remain-security-pros-warn/</loc>
		<lastmod>2026-03-23T15:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/network-edge-devices-still-widely-used-after-reaching-endlife-status/</loc>
		<lastmod>2026-03-23T15:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-phone-call-is-the-new-phishing-email/</loc>
		<lastmod>2026-03-23T15:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-says-iranian-hackers-are-using-telegram-to-steal-data-in-malware-attacks/</loc>
		<lastmod>2026-03-23T15:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unleashes-gemini-ai-agents-on-the-dark-web/</loc>
		<lastmod>2026-03-23T15:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smooth-criminals-talking-their-way-into-cloud-environments-google-says/</loc>
		<lastmod>2026-03-23T15:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smooth-criminals-talking-their-way-into-cloud-environments-google-says-2/</loc>
		<lastmod>2026-03-23T15:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hacker-lands-remote-it-job-caught-after-vpn-slip/</loc>
		<lastmod>2026-03-23T16:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iranian-nasir-security-is-targeting-energy-companies-in-the-gulf/</loc>
		<lastmod>2026-03-23T16:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/44-aqua-security-repositories-defaced-after-trivy-supply-chain-breach/</loc>
		<lastmod>2026-03-23T16:03:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-devices-winning-the-race-to-get-hacked-in-2026/</loc>
		<lastmod>2026-03-23T16:04:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-must-visit-companies-at-rsac-2026/</loc>
		<lastmod>2026-03-23T16:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-threats-are-already-active-and-the-defense-response-remains-fragmented/</loc>
		<lastmod>2026-03-23T16:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-patch-triggers-sign-in-failures-across-microsoft-apps/</loc>
		<lastmod>2026-03-23T16:06:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-expands-with-new-compromised-docker-images/</loc>
		<lastmod>2026-03-23T16:07:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-konflikt-so-konnen-sie-den-schaden-von-wiper-attacken-begrenzen/</loc>
		<lastmod>2026-03-23T16:09:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/capital-one-software-expands-databolt-to-protect-unstructured-data-for-ai-use/</loc>
		<lastmod>2026-03-23T16:50:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/capital-one-software-expands-databolt-to-protect-unstructured-data-for-ai-use-2/</loc>
		<lastmod>2026-03-23T16:52:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soc-2-penetration-testing-requirements/</loc>
		<lastmod>2026-03-23T16:52:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/friendlydealer-mimics-official-app-stores-to-push-unvetted-gambling-apps/</loc>
		<lastmod>2026-03-23T16:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securityscorecard-debuts-titan-ai-to-automate-third-party-risk-management-workflows/</loc>
		<lastmod>2026-03-23T16:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nikes-1-4tb-ip-theft-when-ransomware-targets-trade-secrets-instead-of-files/</loc>
		<lastmod>2026-03-23T16:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-march-madness-scam-playbook/</loc>
		<lastmod>2026-03-23T16:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-confirms-cyberattack-is-contained-and-restoration-underway/</loc>
		<lastmod>2026-03-23T16:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lockheed-martin-targeted-in-alleged-breach-by-pro-iran-hacktivist/</loc>
		<lastmod>2026-03-23T16:58:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/faster-attacks-and-recovery-denial-ransomware-reshape-threat-landscape/</loc>
		<lastmod>2026-03-23T16:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sentences-nigerian-national-to-7-years-in-6-million-email-fraud-scheme/</loc>
		<lastmod>2026-03-23T17:01:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-based-semiconductor-testing-company-reports-ransomware-attack-to-sec/</loc>
		<lastmod>2026-03-23T17:02:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-hide-infostealer-in-copyright-infringement-notices/</loc>
		<lastmod>2026-03-23T17:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-phishing-service-resumes-activity-post-takedown/</loc>
		<lastmod>2026-03-23T17:04:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-tech-sector-overtakes-finance-as-top-target-for-cyber-attacks-mandiant-reports/</loc>
		<lastmod>2026-03-23T17:06:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-eliminating-the-impossible/</loc>
		<lastmod>2026-03-23T17:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-most-innovative-breach-readiness-solution-actually-means/</loc>
		<lastmod>2026-03-23T17:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-recap-cyber-risk-in-wartime-threat-intelligence-risk-modeling-and-insurance-strategy/</loc>
		<lastmod>2026-03-23T17:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defenseless-defenders-exploring-endpoint-detection-and-response-edr-inhibitors/</loc>
		<lastmod>2026-03-23T17:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-hot-new-cybersecurity-tools-announced-at-rsac-2026/</loc>
		<lastmod>2026-03-23T17:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-chip-testing-firm-shrugged-off-ransomware-hit-as-minor-then-came-the-data-leak-2/</loc>
		<lastmod>2026-03-23T17:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irish-government-launches-cni-resilience-plan/</loc>
		<lastmod>2026-03-23T17:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/routers-replace-pcs-as-primary-threat-vector-in-evolving-device-risk-landscape/</loc>
		<lastmod>2026-03-23T17:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-cybersecurity-staff-dont-know-how-fast-they-could-stop-a-cyber-attack-on-ai-systems/</loc>
		<lastmod>2026-03-23T17:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datadog-launches-ai-security-agent-to-combat-machine-speed-cyberattacks/</loc>
		<lastmod>2026-03-23T18:16:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-ai-powered-phishing-campaign-has-compromised-hundreds-of-organizations/</loc>
		<lastmod>2026-03-23T18:17:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-spreads-to-docker-github-repos/</loc>
		<lastmod>2026-03-23T18:19:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protos-labs-opens-up-protos-ai-for-free-targeting-cti-teams-at-rsac-2026/</loc>
		<lastmod>2026-03-23T18:49:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/socradar-launches-ai-agent-marketplace-and-identity-intelligence-at-rsac-2026/</loc>
		<lastmod>2026-03-23T18:50:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/accuknox-launches-ai-security-2-0-to-extend-zero-trust-protection-to-ai-models-and-agents/</loc>
		<lastmod>2026-03-23T18:51:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sacumen-launches-connectx-an-ai-platform-for-managing-the-full-connector-lifecycle/</loc>
		<lastmod>2026-03-23T18:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trivy-compromise-the-fallacy-of-secrets-management-and-the-case-for-workload-identity/</loc>
		<lastmod>2026-03-23T18:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-so-you-think-you-can-detect-lisa-li-on-detection-testing-in-production/</loc>
		<lastmod>2026-03-23T19:49:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zerotier-launches-quantum-secure-networking-platform-at-rsac-2026/</loc>
		<lastmod>2026-03-23T19:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/live-from-rsac-2026-colortokens-on-breach-readiness-measurable-risk-reduction-and-whats-ahead/</loc>
		<lastmod>2026-03-23T19:52:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/live-from-rsac-2026-colortokens-on-breach-readiness-measurable-risk-reduction-and-whats-ahead-2/</loc>
		<lastmod>2026-03-23T19:52:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/education-company-kaplan-reports-data-breach-impacting-more-than-230000/</loc>
		<lastmod>2026-03-23T19:52:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-iranian-hackers-targeting-opponents-with-telegram-malware/</loc>
		<lastmod>2026-03-23T19:54:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-authorities-block-paywall-removal-site-archive-today/</loc>
		<lastmod>2026-03-23T19:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-mysterious-numbers-station-is-broadcasting-through-the-iran-war/</loc>
		<lastmod>2026-03-23T19:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-probes-breach-after-hacker-claims-to-steal-6-8m-users-data/</loc>
		<lastmod>2026-03-23T19:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware/</loc>
		<lastmod>2026-03-23T19:59:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/absolute-security-enterprise-pcs-are-left-unprotected-76-days-a-year-as-endpoint-tools-fail-21-of-the-time/</loc>
		<lastmod>2026-03-23T20:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ironscales-launches-email-attack-of-the-day-a-daily-threat-intelligence-series-for-security-teams/</loc>
		<lastmod>2026-03-23T20:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-ai-frontier-suzu-labs-sweeps-4-global-infosec-awards-2026/</loc>
		<lastmod>2026-03-23T20:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tonic-textual-haystack-privacy-safe-data-for-rag-pipelines/</loc>
		<lastmod>2026-03-23T20:53:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-officials-election-experts-question-california-sheriffs-seizure-of-ballots/</loc>
		<lastmod>2026-03-23T20:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-cyber-incident-contained-restoration-continues/</loc>
		<lastmod>2026-03-23T20:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/</loc>
		<lastmod>2026-03-23T20:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-redefines-cybersecurity-architecture-for-autonomous-ai/</loc>
		<lastmod>2026-03-23T21:50:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-hackers-hit-an-iowa-company-cars-around-the-country-failed-to-start/</loc>
		<lastmod>2026-03-23T21:51:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-russian-iranian-cyber-activity-involving-messaging-platforms/</loc>
		<lastmod>2026-03-23T21:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/</loc>
		<lastmod>2026-03-23T21:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lightning-fast-exploits-make-it-essential-to-patch-fast-ask-questions-later/</loc>
		<lastmod>2026-03-23T21:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navia-data-breach-hits-2-7-million-people-exposing-sensitive-personal-data/</loc>
		<lastmod>2026-03-23T21:55:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-reinvents-android-sideloading-to-thwart-scammers/</loc>
		<lastmod>2026-03-23T21:55:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-artificial-intelligence-prevent-natural-disasters/</loc>
		<lastmod>2026-03-23T22:49:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-enterprises-truly-satisfied-with-their-secrets-sprawl-control/</loc>
		<lastmod>2026-03-23T22:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-enhance-data-security/</loc>
		<lastmod>2026-03-23T22:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-insist-trump-administrations-cyber-strategy-is-already-paying-off/</loc>
		<lastmod>2026-03-23T22:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qnap-fixed-four-vulnerabilities-demonstrated-at-pwn2own-ireland-2025/</loc>
		<lastmod>2026-03-23T22:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 3f617c2bd95be081c08ceb1a525086a2; Queries for sitemap: 3; Total queries: 88; Seconds: 4.72; Memory for sitemap: 1KB; Total memory: 62MB -->
