<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='9. May 2026 2:31 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/ex-us-soldier-among-3-sentenced-for-dprk-it-worker-scam/</loc>
		<lastmod>2026-03-23T22:54:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-anchors-ai-security-strategy/</loc>
		<lastmod>2026-03-23T22:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mazda-discloses-security-breach-exposing-employee-and-partner-data/</loc>
		<lastmod>2026-03-23T22:57:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-phishing-platform-returns-after-recent-police-disruption/</loc>
		<lastmod>2026-03-23T22:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-the-soc-what-could-go-wrong/</loc>
		<lastmod>2026-03-23T22:58:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-targets-ci-cd-secrets/</loc>
		<lastmod>2026-03-23T22:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-debate-human-role-in-ai-powered-security/</loc>
		<lastmod>2026-03-23T23:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netenrich-launches-cyber-risk-operations-to-replace-alert-centric-security-models/</loc>
		<lastmod>2026-03-23T23:50:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netenrich-launches-cyber-risk-operations-to-replace-alert-centric-security-models-2/</loc>
		<lastmod>2026-03-23T23:50:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armor-launches-dash-to-give-boards-and-c-suite-a-direct-unfiltered-view-of-cyber-risk/</loc>
		<lastmod>2026-03-23T23:50:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omnitrust-launches-trust-lifecycle-management-platform-to-unify-device-identity-and-ai-agent-security/</loc>
		<lastmod>2026-03-23T23:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-ships-zero-trust-for-ai-agents-self-service-red-teaming-and-agentic-soc-tools-at-rsac-2026/</loc>
		<lastmod>2026-03-23T23:53:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/expel-launches-managed-siem-to-take-detection-engineering-off-security-teams-plates/</loc>
		<lastmod>2026-03-23T23:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuskira-unveils-federated-detection-engine-at-rsac-2026/</loc>
		<lastmod>2026-03-23T23:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-launches-aurora-agentic-soc-claims-worlds-largest-commercial-agentic-soc/</loc>
		<lastmod>2026-03-23T23:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snyk-launches-agent-security-solution-and-ships-evo-ai-spm-at-rsac-2026/</loc>
		<lastmod>2026-03-23T23:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-adds-microsoft-defender-support-to-falcon-next-gen-siem-at-rsac-2026/</loc>
		<lastmod>2026-03-23T23:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-launches-sage-to-govern-ai-agents-in-real-time/</loc>
		<lastmod>2026-03-23T23:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-canisterworm-targets-kubernetes-clusters-deploys-kamikaze-wiper/</loc>
		<lastmod>2026-03-24T00:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doe-sets-5-year-plan-to-harden-us-grid-against-cyberattacks/</loc>
		<lastmod>2026-03-24T00:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dataminr-launches-cyber-defense-suite-that-fuses-external-threat-signals-with-internal-telemetry/</loc>
		<lastmod>2026-03-24T00:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/playnance-introduces-participation-first-model-for-social-gaming-with-new-protocol-launch/</loc>
		<lastmod>2026-03-24T00:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-disruption-fears-rattle-cybersecurity-stocks-3/</loc>
		<lastmod>2026-03-24T00:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-disruption-fears-rattle-cybersecurity-stocks/</loc>
		<lastmod>2026-03-24T00:52:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-disruption-fears-rattle-cybersecurity-stocks-2/</loc>
		<lastmod>2026-03-24T00:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-disruption-fears-rattle-cybersecurity-stocks-4/</loc>
		<lastmod>2026-03-24T00:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-disruption-fears-rattle-cybersecurity-stocks-5/</loc>
		<lastmod>2026-03-24T00:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-rolls-out-chatgpt-library-to-store-your-personal-files/</loc>
		<lastmod>2026-03-24T00:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-2026-ai-oozing-out-of-every-pore/</loc>
		<lastmod>2026-03-24T04:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-cryptographic-agility-frameworks-for-ai-resource-orchestration/</loc>
		<lastmod>2026-03-24T04:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-day-1-security-must-evolve-at-agentic-speed/</loc>
		<lastmod>2026-03-24T04:53:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isacs-confront-ais-promise-and-peril-for-threat-intelligence-sharing/</loc>
		<lastmod>2026-03-24T04:54:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-poised-to-most-help-low-skilled-hackers-in-the-near-term/</loc>
		<lastmod>2026-03-24T04:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-updates-security-platform-to-discover-ai-agents-2/</loc>
		<lastmod>2026-03-24T04:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-updates-security-platform-to-discover-ai-agents-3/</loc>
		<lastmod>2026-03-24T04:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-updates-security-platform-to-discover-ai-agents/</loc>
		<lastmod>2026-03-24T04:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-updates-security-platform-to-discover-ai-agents-4/</loc>
		<lastmod>2026-03-24T04:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-walks-away-with-24-5-million-after-breaching-resolv-defi-platform/</loc>
		<lastmod>2026-03-24T04:57:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-zunahme-technischer-eskalation-in-der-dach-region-mit-deutschland-als-spitzenziel/</loc>
		<lastmod>2026-03-24T04:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cps-im-visier-cyberkriminelle-attacken-zunehmend-auf-kritis/</loc>
		<lastmod>2026-03-24T04:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-redefines-trust-in-global-payments/</loc>
		<lastmod>2026-03-24T05:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomwares-new-era-moving-at-ai-speed/</loc>
		<lastmod>2026-03-24T05:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hong-kong-police-can-demand-phone-and-computer-passwords-under-amended-national-security-law/</loc>
		<lastmod>2026-03-24T05:02:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tuv-warnt-aufzuge-werden-zunehmend-zum-ziel-von-cyberkriminellen/</loc>
		<lastmod>2026-03-24T05:04:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-hacker-nutzen-sicherheitslucken-update-dringend-empfohlen/</loc>
		<lastmod>2026-03-24T05:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/absurde-geschichten-aus-der-cybercrime-welt/</loc>
		<lastmod>2026-03-24T06:41:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-readiness-fehlender-datenzugriff-bremst-datengestutzte-initiativen-aus/</loc>
		<lastmod>2026-03-24T06:42:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmen-setzen-verstarkt-auf-genai-doch-sicherheitsgrundlagen-fehlen/</loc>
		<lastmod>2026-03-24T06:42:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/m-trends-report-2026-die-aktuelle-bedrohungslage-2/</loc>
		<lastmod>2026-03-24T06:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/m-trends-report-2026-die-aktuelle-bedrohungslage/</loc>
		<lastmod>2026-03-24T06:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delve-halts-demos-insight-partners-scrubs-investment-post-amid-fake-compliance-allegations/</loc>
		<lastmod>2026-03-24T06:44:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-sets-impossible-ground-rules-for-relocation-of-flown-space-vehicle/</loc>
		<lastmod>2026-03-24T06:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-netscaler-adc-and-gateway-flaws-expose-systems-to-remote-attacks/</loc>
		<lastmod>2026-03-24T06:46:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-security-update-fixes-8-vulnerabilities-that-could-enable-remote-code-execution/</loc>
		<lastmod>2026-03-24T06:47:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-in-2026-why-staying-current-is-no-longer-optional-for-your-business/</loc>
		<lastmod>2026-03-24T06:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-discovery-inventory-and-govern-shadow-ai-agents-nudge-security/</loc>
		<lastmod>2026-03-24T06:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-handing-off-access-in-22-seconds-mandiant-finds/</loc>
		<lastmod>2026-03-24T06:51:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-cross-platform-and-third-party-endpoint-patching-with-action1/</loc>
		<lastmod>2026-03-24T06:52:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roundcube-releases-urgent-security-update-to-fix-critical-bugs/</loc>
		<lastmod>2026-03-24T06:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silentconnect-uses-fake-invites-to-deploy-screenconnect-rat/</loc>
		<lastmod>2026-03-24T06:54:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-chatgpt-invites-target-android-users-with-malware/</loc>
		<lastmod>2026-03-24T06:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/untersuchung-von-qualys-9-schwachstellen-bedrohen-millionen-linux-systeme/</loc>
		<lastmod>2026-03-24T06:56:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tut-of-superiority/</loc>
		<lastmod>2026-03-24T07:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quikbot-and-efgh-bring-real-time-insurance-to-physical-ai/</loc>
		<lastmod>2026-03-24T07:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/measuring-security-performance-in-real-time-not-once-a-quarter/</loc>
		<lastmod>2026-03-24T07:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-new-genai-security-protections-in-azure-ai-foundry/</loc>
		<lastmod>2026-03-24T07:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-releases-quick-start-guide-linking-cybersecurity-enterprise-risk-and-workforce-management/</loc>
		<lastmod>2026-03-24T07:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-leak-site-tied-to-active-initial-access-broker-emerges-on-underground-forums/</loc>
		<lastmod>2026-03-24T07:56:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage/</loc>
		<lastmod>2026-03-24T07:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leaks/</loc>
		<lastmod>2026-03-24T07:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/v2x-macht-das-auto-zum-teil-des-internets-das-connected-car-wird-zum-computer-auf-vier-radern/</loc>
		<lastmod>2026-03-24T07:59:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year/</loc>
		<lastmod>2026-03-24T08:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-top-10-risks-for-agentic-applications-must-know-risks/</loc>
		<lastmod>2026-03-24T08:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisos-should-embrace-ai-honeypots/</loc>
		<lastmod>2026-03-24T08:51:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-cyberattack-on-crunchyroll-exposes-risks-in-outsourced-systems/</loc>
		<lastmod>2026-03-24T08:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year-2/</loc>
		<lastmod>2026-03-24T08:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-threat-actors-abuse-vs-code-auto-run-to-spread-stoatwaffle-malware/</loc>
		<lastmod>2026-03-24T08:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/es-ware-soooo-schon-gewesen-der-traum-von-fehlerfreiem-code-ist-erneut-geplatzt/</loc>
		<lastmod>2026-03-24T08:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-im-einklang-cycode-stellt-maestro-fur-application-security-vor/</loc>
		<lastmod>2026-03-24T08:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-auf-kubernetes-trifft-sysdig-feiert-10-jahre-falco/</loc>
		<lastmod>2026-03-24T08:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausweiskopien-rechnungen-und-mehr-ccc-deckt-datenpanne-bei-anwaltsportal-auf/</loc>
		<lastmod>2026-03-24T08:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausweiskopien-rechnungen-und-mehr-ccc-deckt-datenpanne-bei-anwaltsportal-auf/</loc>
		<lastmod>2026-03-24T08:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/streamline-physical-security-to-enable-data-center-growth-in-the-era-of-ai/</loc>
		<lastmod>2026-03-24T09:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-issues-emergency-patch-for-critical-flaw-enabling-remote-code-execution/</loc>
		<lastmod>2026-03-24T09:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-just-made-it-much-harder-to-ship-a-vulnerable-pull-request/</loc>
		<lastmod>2026-03-24T09:52:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-just-made-it-much-harder-to-ship-a-vulnerable-pull-request-2/</loc>
		<lastmod>2026-03-24T09:52:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-is-paying-the-salaries-of-this-towns-entire-police-force/</loc>
		<lastmod>2026-03-24T09:52:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-access-broker-jailed-for-facilitating-ransomware-attacks-targeting-u-s-companies/</loc>
		<lastmod>2026-03-24T09:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-forms-job-scam-spreads-purehvnc-malware/</loc>
		<lastmod>2026-03-24T09:54:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/founder-of-coindcx-arrested-amid-serious-fraud-and-cheating-charges/</loc>
		<lastmod>2026-03-24T09:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiper-angriff-durch-den-iran-tausende-stryker-mitarbeiter-konnten-nach-cyberangriff-nicht-arbeiten-2/</loc>
		<lastmod>2026-03-24T09:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiper-angriff-durch-den-iran-tausende-stryker-mitarbeiter-konnten-nach-cyberangriff-nicht-arbeiten/</loc>
		<lastmod>2026-03-24T09:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-in-der-cybersecurity-architektur-schlagt-tools/</loc>
		<lastmod>2026-03-24T09:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-threat-intelligence-building-an-openclaw-defense-system-with-multiple-layer-protection/</loc>
		<lastmod>2026-03-24T10:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/achtung-manipulation-so-missbrauchen-cyberkriminelle-die-ki/</loc>
		<lastmod>2026-03-24T10:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-ai-adoption-is-on-the-rise-but-its-risky/</loc>
		<lastmod>2026-03-24T10:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-body-is-betraying-your-right-to-privacy/</loc>
		<lastmod>2026-03-24T10:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/get-down-get-down-theyre-gonna-see-us-six-months-of-hiding-from-ice/</loc>
		<lastmod>2026-03-24T10:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-target-ms-sql-servers-to-deploy-ice-cloud-scanner-malware/</loc>
		<lastmod>2026-03-24T10:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year-3/</loc>
		<lastmod>2026-03-24T10:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitten-in-der-nacht-bundesweite-polizeieinsatze-wegen-einer-softwarelucke/</loc>
		<lastmod>2026-03-24T10:58:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-enroll-a-code-signing-certificate-in-sectigo-certificate-manager/</loc>
		<lastmod>2026-03-24T11:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-20963-sharepoint-deserialization-remote-code-execution-vulnerability/</loc>
		<lastmod>2026-03-24T11:52:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-20963-sharepoint-deserialization-remote-code-execution-vulnerability-2/</loc>
		<lastmod>2026-03-24T11:52:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-end-of-static-security-why-ai-demands-real-time-microsegmentation/</loc>
		<lastmod>2026-03-24T11:52:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-hosted-malware-campaign-uses-split-payload-to-evade-detection/</loc>
		<lastmod>2026-03-24T11:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-motunrayo-fransisca-ogundipe-cybersecurity-analyst-at-tiktok/</loc>
		<lastmod>2026-03-24T11:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-vulnerabilities-in-tp-link-devices-enable-arbitrary-command-execution/</loc>
		<lastmod>2026-03-24T11:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-vulnerabilities-in-tp-link-devices-enable-arbitrary-command-execution-2/</loc>
		<lastmod>2026-03-24T11:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multiple-vulnerabilities-in-tp-link-devices-enable-arbitrary-command-execution-3/</loc>
		<lastmod>2026-03-24T11:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills/</loc>
		<lastmod>2026-03-24T11:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials/</loc>
		<lastmod>2026-03-24T11:59:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-initial-access-broker-handed-81-month-sentence/</loc>
		<lastmod>2026-03-24T12:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploit-kit-veroffentlicht-leak-auf-github-gefahrdet-millionen-von-iphones/</loc>
		<lastmod>2026-03-24T12:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insight-partners-scrubs-delve-investment-post-amid-fake-compliance-allegations/</loc>
		<lastmod>2026-03-24T12:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-backups-uber-handlungsfahigkeit-entscheiden/</loc>
		<lastmod>2026-03-24T12:51:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/omada-identity-ernennt-jakob-h-kraglund-zum-neuen-ceo/</loc>
		<lastmod>2026-03-24T12:52:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-kundigt-weltweit-grostes-kommerzielles-agenticoperations-center-an/</loc>
		<lastmod>2026-03-24T12:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meldebutton-fur-phishing-in-microsoft-teams/</loc>
		<lastmod>2026-03-24T12:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auf-der-dmea-zeigt-claroty-wie-sich-cyberbedrohungen-durch-priorisierung-effektiv-bekampfen-lassen/</loc>
		<lastmod>2026-03-24T12:55:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-routers-made-abroad-yeah-thats-going-to-be-a-no-from-uncle-sam/</loc>
		<lastmod>2026-03-24T12:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-initial-access-broker-who-fed-ransomware-crews-gets-81-months-in-us-prison/</loc>
		<lastmod>2026-03-24T12:57:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-iphone-exploit-leaked-online-hundreds-of-millions-at-risk/</loc>
		<lastmod>2026-03-24T12:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/81-month-sentence-for-russian-hacker-behind-major-ransomware-campaigns/</loc>
		<lastmod>2026-03-24T12:59:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/32-of-top-exploited-vulnerabilities-are-over-a-decade-old/</loc>
		<lastmod>2026-03-24T13:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-details-ai-prompt-abuse-techniques-targeting-ai-assistants/</loc>
		<lastmod>2026-03-24T13:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nvidia-puts-gpu-orchestration-in-community-hands/</loc>
		<lastmod>2026-03-24T13:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-ministry-of-finance-discloses-breach-affecting-employees/</loc>
		<lastmod>2026-03-24T13:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-unleashes-iran-targeted-canisterworm-kubernetes-wiper/</loc>
		<lastmod>2026-03-24T13:05:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dell-wyse-management-flaws-could-lead-to-full-system-compromise/</loc>
		<lastmod>2026-03-24T13:05:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/</loc>
		<lastmod>2026-03-24T13:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/</loc>
		<lastmod>2026-03-24T13:08:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitspraktiken-fur-softwareentwicklung-mit-ki-hilfe-ki-tools-in-der-entwicklung-schaffen-neue-angriffsflachen/</loc>
		<lastmod>2026-03-24T13:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-us-regulierungsbehorde-verbietet-router-aus-dem-ausland/</loc>
		<lastmod>2026-03-24T13:09:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-watchdog-cyber-scaled-dmarc-services-and-client-growth-with-easydmarc/</loc>
		<lastmod>2026-03-24T13:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/team-mirai-and-democracy/</loc>
		<lastmod>2026-03-24T13:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/</loc>
		<lastmod>2026-03-24T13:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-stoatwaffle-malware-autoexecutes-attacks-on-developers/</loc>
		<lastmod>2026-03-24T13:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-who-helped-yanluowang-ransomware-gang-gets-nearly-7-year-prison-sentence/</loc>
		<lastmod>2026-03-24T13:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insight-partners-scrubs-investment-post-about-delve-amid-fake-compliance-allegations/</loc>
		<lastmod>2026-03-24T13:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-entwickeln-sich-zur-primaren-angriffsflache/</loc>
		<lastmod>2026-03-24T13:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sysdig-feiert-10-jahriges-jubilaum-von-falco-mit-einer-70-000-us-dollar-spende/</loc>
		<lastmod>2026-03-24T13:58:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-slams-supplier-for-delayed-breach-notice-after-staff-data-exposed/</loc>
		<lastmod>2026-03-24T13:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telling-an-ai-model-that-its-an-expert-programmer-makes-it-a-worse-programmer/</loc>
		<lastmod>2026-03-24T14:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-paid-the-salaries-of-this-towns-entire-police-force/</loc>
		<lastmod>2026-03-24T14:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yanluowang-ransomware-access-broker-gets-81-months-in-prison/</loc>
		<lastmod>2026-03-24T14:02:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-exploit-chain-leaked-online-posing-risk-to-millions-of-iphones/</loc>
		<lastmod>2026-03-24T14:04:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tycoon2fa-operators-resume-cloud-account-phishing-following-infrastructure/</loc>
		<lastmod>2026-03-24T14:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-proposes-better-identity-guardrails-for-ai-agents/</loc>
		<lastmod>2026-03-24T14:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-cybersecurity-software-fails-20-of-the-time-warns-absolute-security/</loc>
		<lastmod>2026-03-24T14:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-der-chat-zur-angriffsflache-wird-knowbe4-reagiert-mit-phish-alert-button/</loc>
		<lastmod>2026-03-24T14:07:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iis-ohne-support-hunderttausende-angreifbare-microsoft-server-im-netz/</loc>
		<lastmod>2026-03-24T14:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iis-ohne-support-hunderttausende-angreifbare-microsoft-server-im-netz-2/</loc>
		<lastmod>2026-03-24T14:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-discloses-employee-data-breach-after-navia-hack/</loc>
		<lastmod>2026-03-24T15:12:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft/</loc>
		<lastmod>2026-03-24T15:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-large-bank-uses-ai-digital-twins-for-threat-hunting/</loc>
		<lastmod>2026-03-24T15:14:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-ukrainian-foreign-minister-dmytro-kuleba-to-address-the-new-cyber-frontline-at-infosecurity-europe/</loc>
		<lastmod>2026-03-24T15:16:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/csa-and-aembit-survey-68-of-organizations-cant-distinguish-ai-agent-actions-from-human-activity/</loc>
		<lastmod>2026-03-24T14:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-expands-aida-to-eight-ai-agents-at-rsac-2026-targeting-fully-autonomous-human-risk-management/</loc>
		<lastmod>2026-03-24T14:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/utimaco-survey-78-of-us-companies-say-data-breaches-are-the-top-genai-risk-but-most-havent-acted/</loc>
		<lastmod>2026-03-24T14:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivys-march-supply-chain-attack-shows-where-secret-exposure-hurts-most/</loc>
		<lastmod>2026-03-24T14:54:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-castles-research-team/</loc>
		<lastmod>2026-03-24T14:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spotting-issues-in-defi-with-dimensional-analysis/</loc>
		<lastmod>2026-03-24T14:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-finance-ministry-probing-cyber-breach-affecting-internal-systems/</loc>
		<lastmod>2026-03-24T14:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anime-streaming-giant-crunchyroll-says-hacker-stole-data-related-to-customer-service-tickets/</loc>
		<lastmod>2026-03-24T14:58:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-access-broker-sentenced-to-over-6-years-in-prison-for-ransomware-schemes/</loc>
		<lastmod>2026-03-24T14:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reddit-will-gesichts-scan-fur-anmeldung-einfuhren/</loc>
		<lastmod>2026-03-24T15:01:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aisuru-und-kimwolf-strafverfolgungsbehorden-konnten-zwei-der-weltgrosten-botnetze-ausheben/</loc>
		<lastmod>2026-03-24T15:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/country-that-put-backdoors-into-cisco-routers-to-spy-on-world-bans-foreign-routers/</loc>
		<lastmod>2026-03-24T15:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-critical-flaw-could-leak-data-update-now/</loc>
		<lastmod>2026-03-24T15:04:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-adoption-starts-with-security/</loc>
		<lastmod>2026-03-24T15:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-adoption-starts-with-security-2/</loc>
		<lastmod>2026-03-24T15:06:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-forces-cisos-to-rebuild-defense-playbooks/</loc>
		<lastmod>2026-03-24T15:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-ai-era-is-reshaping-data-protection/</loc>
		<lastmod>2026-03-24T15:08:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-netscaler-adc-gateway-flaw-may-soon-be-exploited-cve-2026-3055/</loc>
		<lastmod>2026-03-24T15:08:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-initial-access-broker-helped-ransomware-gangs-extort-millions-sentenced-to-81-months/</loc>
		<lastmod>2026-03-24T15:09:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/huntress-brings-itdr-to-google-workspace-as-identity-attacks-surge/</loc>
		<lastmod>2026-03-24T15:11:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-bridging-the-gap-between-authentication-and-trust/</loc>
		<lastmod>2026-03-24T15:11:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-ai-native-security-assurance-leads-the-grc-transformation/</loc>
		<lastmod>2026-03-24T15:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cisa-warn-of-russian-hackers-hijacking-signal-and-whatsapp-accounts/</loc>
		<lastmod>2026-03-24T15:51:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-compounds-hiring-ai-models/</loc>
		<lastmod>2026-03-24T15:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-import-of-consumer-grade-routers-amid-national-security-concerns/</loc>
		<lastmod>2026-03-24T15:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-angriffe-haben-sich-verdoppelt/</loc>
		<lastmod>2026-03-24T15:55:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-ransomware-gang-targeted-us-healthcare-org-amid-military-conflict/</loc>
		<lastmod>2026-03-24T15:55:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-asks-whether-terrorism-risk-insurance-program-should-bolster-cyber-coverage/</loc>
		<lastmod>2026-03-24T15:57:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-asks-whether-terrorism-risk-insurance-program-should-bolster-cyber-coverage-2/</loc>
		<lastmod>2026-03-24T15:57:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/treasury-asks-whether-terrorism-risk-insurance-program-should-bolster-cyber-coverage-3/</loc>
		<lastmod>2026-03-24T15:57:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-access-broker-sentenced-to-over-6-years-in-prison-for-ransomware-schemes-2/</loc>
		<lastmod>2026-03-24T15:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-import-of-new-consumer-routers-made-overseas-citing-security-risks/</loc>
		<lastmod>2026-03-24T15:59:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/strengthening-cloud-resilience-in-federal-environments/</loc>
		<lastmod>2026-03-24T16:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncle-sam-closes-the-door-on-all-new-foreign-made-routers/</loc>
		<lastmod>2026-03-24T16:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-safety-conversation-is-focused-on-the-wrong-layer/</loc>
		<lastmod>2026-03-24T16:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-bug-causing-classic-outlook-sync-issues-with-gmail/</loc>
		<lastmod>2026-03-24T16:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-urges-immediate-patching-for-critical-netscaler-vulnerabilities/</loc>
		<lastmod>2026-03-24T16:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-npm-ghost-campaign-uses-fake-install-logs-to-hide-malware/</loc>
		<lastmod>2026-03-24T16:05:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/predator-spyware-kann-apple-gerate-uber-kamera-und-mikro-ausspionieren/</loc>
		<lastmod>2026-03-24T16:07:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swissbit-adds-hid-seos-to-ishield-key-2-previews-pqc-platform-and-face-biometrics-at-rsac-2026/</loc>
		<lastmod>2026-03-24T16:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-buffer-overflows-demystified-chaitanya-rahalkar-on-exploits-patching/</loc>
		<lastmod>2026-03-24T16:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-ddos-attacks-surge-150-gcore-analysis-shows-faster-cheaper-more-frequent-attacks/</loc>
		<lastmod>2026-03-24T16:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-encrypted-data-from-2019-is-already-compromised-the-quantum-time-bomb/</loc>
		<lastmod>2026-03-24T16:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-ai-act-compliance-guide-for-cisos-grc-leaders-kovrr/</loc>
		<lastmod>2026-03-24T16:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-groups-speed-up-initial-access-handoff-through-planning-coordination/</loc>
		<lastmod>2026-03-24T16:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-poised-to-help-low-skilled-hackers-in-the-near-term/</loc>
		<lastmod>2026-03-24T16:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-of-irans-handala-hack-group-using-fake-apps-to-spy-on-windows-users/</loc>
		<lastmod>2026-03-24T16:58:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualderm-partners-december-2025-data-breach-impacts-over-3-million-people/</loc>
		<lastmod>2026-03-24T16:58:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-security-needs-context-to-deliver-results/</loc>
		<lastmod>2026-03-24T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-anonymous-student-and-crime-tips-exposed-in-major-data-breach/</loc>
		<lastmod>2026-03-24T17:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-openclaw-deployer-repo-delivers-trojan-instead/</loc>
		<lastmod>2026-03-24T17:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-cyber-campaigns-show-shift-toward-dual-espionage/</loc>
		<lastmod>2026-03-24T17:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-expands-into-cybersecurity-with-ai-driven-lakewatch-platform/</loc>
		<lastmod>2026-03-24T17:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-the-identity-and-access-gaps-in-the-age-of-autonomous-ai-survey-report/</loc>
		<lastmod>2026-03-24T17:51:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-apim-signup-bypass-97-9-of-developer-portals-still-exploitable-anonymously-and-from-the-internet-2/</loc>
		<lastmod>2026-03-24T17:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-apim-signup-bypass-97-9-of-developer-portals-still-exploitable-anonymously-and-from-the-internet/</loc>
		<lastmod>2026-03-24T17:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-foreign-made-routers-from-us-market-over-unacceptable-risk/</loc>
		<lastmod>2026-03-24T17:55:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/opentelemetry-als-fundament-einer-vertrauenswurdigen-observability-infrastruktur/</loc>
		<lastmod>2026-03-24T17:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access/</loc>
		<lastmod>2026-03-24T17:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access-2/</loc>
		<lastmod>2026-03-24T17:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access-3/</loc>
		<lastmod>2026-03-24T17:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-confirms-data-breach-after-hacker-claims-unauthorized-access-4/</loc>
		<lastmod>2026-03-24T17:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-government-bans-imported-routers-raising-tough-questions/</loc>
		<lastmod>2026-03-24T17:57:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ignition-technology-lands-in-north-america/</loc>
		<lastmod>2026-03-24T17:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-darksword-leak-puts-millions-of-iphones-at-risk-after-initial-attack/</loc>
		<lastmod>2026-03-24T17:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-now-has-a-free-built-in-vpn-with-50gb-monthly-data-limit/</loc>
		<lastmod>2026-03-24T18:01:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-now-has-a-free-built-in-vpn-with-50gb-monthly-data-limit-2/</loc>
		<lastmod>2026-03-24T18:01:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sql-server-ransomware-attacks-how-they-work-and-how-to-harden-your-database/</loc>
		<lastmod>2026-03-24T18:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner-2/</loc>
		<lastmod>2026-03-24T18:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner-3/</loc>
		<lastmod>2026-03-24T18:03:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner/</loc>
		<lastmod>2026-03-24T18:03:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securden-unveils-unified-identity-security-platform-at-rsac-2026-combining-pam-epm-iga-and-more/</loc>
		<lastmod>2026-03-24T18:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hyperproof-launches-ai-guided-experiences-for-compliance-operations-at-rsac-2026/</loc>
		<lastmod>2026-03-24T18:34:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imper-ai-launches-workforce-identity-security-platform-at-rsac-2026/</loc>
		<lastmod>2026-03-24T18:35:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cy4data-labs-brings-real-time-insider-threat-detection-to-rsac-2026/</loc>
		<lastmod>2026-03-24T18:36:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/projectdiscovery-launches-neo-an-autonomous-pentesting-platform-at-rsac-2026/</loc>
		<lastmod>2026-03-24T18:37:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tanium-adds-ai-governance-ot-endpoint-support-and-closed-loop-remediation-at-rsac-2026/</loc>
		<lastmod>2026-03-24T18:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/effective-api-security-testing-strategies-for-modern-application-environments/</loc>
		<lastmod>2026-03-24T18:39:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-passkeys-dont-work-on-some-devices-device-level-limitations/</loc>
		<lastmod>2026-03-24T18:40:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-warn-of-a-loud-and-aggressive-extortion-wave-following-trivy-hack/</loc>
		<lastmod>2026-03-24T18:41:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critics-call-fcc-router-rule-a-big-swing-that-could-create-more-supply-chain-uncertainty/</loc>
		<lastmod>2026-03-24T18:42:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ovhcloud-founder-denies-massive-590tb-data-breach-claims/</loc>
		<lastmod>2026-03-24T18:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr/</loc>
		<lastmod>2026-03-24T18:44:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unleashes-gemini-ai-to-scour-dark-web-for-corporate-threats/</loc>
		<lastmod>2026-03-24T18:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-data-will-be-used-against-you-author-of-new-book-on-the-dangers-of-a-surveillance-society/</loc>
		<lastmod>2026-03-24T19:00:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-ics-cybervorfalle-in-industriellen-netzwerken-einen-neuen-hochststand/</loc>
		<lastmod>2026-03-24T19:01:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-restless-guests-azure-exploit-exposed/</loc>
		<lastmod>2026-03-24T19:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tools-to-measure-data-center-infrastructure-efficiency-the-complete-guide/</loc>
		<lastmod>2026-03-24T19:52:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/companies-face-difficult-choices-in-blaming-hackers-for-an-attack/</loc>
		<lastmod>2026-03-24T19:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/20-coolest-ai-and-security-products-at-rsac-2026/</loc>
		<lastmod>2026-03-24T19:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pi-hole-glanzt-mit-einigen-verbesserungen/</loc>
		<lastmod>2026-03-24T19:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-loses-game-of-trivy-pursuit-gets-compromised/</loc>
		<lastmod>2026-03-24T19:56:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/understanding-wizs-approach-to-securing-the-ai-supply-chain/</loc>
		<lastmod>2026-03-24T19:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-ai-and-security-teams-need-transparent-data-pipelines/</loc>
		<lastmod>2026-03-24T19:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-ai-and-security-teams-need-transparent-data-pipelines-2/</loc>
		<lastmod>2026-03-24T19:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-ai-and-security-teams-need-transparent-data-pipelines-3/</loc>
		<lastmod>2026-03-24T19:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-backdoors-litellm-versions-1-82-71-82-8-likely-via-trivy-ci-cd-compromise/</loc>
		<lastmod>2026-03-24T19:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trivy-supply-chain-compromise-what-happened-and-playbooks-to-respond/</loc>
		<lastmod>2026-03-24T20:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breach-at-dutch-ministry-of-finance-impacts-staff-following-cyberattack/</loc>
		<lastmod>2026-03-24T20:51:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-fcc-targets-foreign-routers-in-supply-chain-crackdown/</loc>
		<lastmod>2026-03-24T20:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-medical-device-cybersecurity-the-good-and-bad/</loc>
		<lastmod>2026-03-24T20:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-is-paying-salaries-and-more-for-this-towns-entire-police-force/</loc>
		<lastmod>2026-03-24T20:54:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sumo-logic-expands-dojo-ai-with-soc-analyst-agent-that-recommends-actions-not-just-alerts/</loc>
		<lastmod>2026-03-24T21:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aistrike-launches-continuous-detection-engineering-to-fix-alert-noise-at-the-source/</loc>
		<lastmod>2026-03-24T21:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aistrike-launches-continuous-detection-engineering-to-fix-alert-noise-at-the-source-2/</loc>
		<lastmod>2026-03-24T21:52:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/training-effective-models-without-the-annotation-budget/</loc>
		<lastmod>2026-03-24T21:53:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cve-program-a-bedrock-of-global-cyber-defense-is-teetering-on-the-brink/</loc>
		<lastmod>2026-03-24T21:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-could-reshape-saas-industry-and-add-security-risks-warns-uk-cyber-agency/</loc>
		<lastmod>2026-03-24T21:54:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-says-malware-was-involved-in-recent-cyberattack-as-production-lines-reopen/</loc>
		<lastmod>2026-03-24T21:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-takes-center-stage-at-rsac-conference-2026/</loc>
		<lastmod>2026-03-24T21:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-bans-new-foreign-made-routers-citing-unacceptable-security-risks/</loc>
		<lastmod>2026-03-24T21:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-new-routers-made-outside-the-usa-over-security-risks/</loc>
		<lastmod>2026-03-24T21:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-new-routers-made-outside-the-usa-over-security-risks-2/</loc>
		<lastmod>2026-03-24T21:59:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsa-conference-uk-ncsc-head-urges-industry-to-develop-vibe-coding-safeguards/</loc>
		<lastmod>2026-03-24T21:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-litellm-pypi-package-delivers-multi-stage-credential-stealer/</loc>
		<lastmod>2026-03-24T22:50:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darkswords-github-leak-threatens-to-turn-elite-iphone-hacking-into-a-tool-for-the-masses/</loc>
		<lastmod>2026-03-24T22:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-ma-is-surging-as-ai-reshapes-the-market/</loc>
		<lastmod>2026-03-24T22:51:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-secure-by-demand-can-reset-cybersecurity/</loc>
		<lastmod>2026-03-24T22:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-pros-must-grasp-the-vibe-coding-nettle-says-ncsc-chief/</loc>
		<lastmod>2026-03-24T22:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-stryker-recovering-after-large-scale-cyberattack/</loc>
		<lastmod>2026-03-24T22:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-kics-code-scanner-targeted-in-widening-supply-chain-hit/</loc>
		<lastmod>2026-03-24T22:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-coding-tools-crushed-the-endpoint-security-fortress/</loc>
		<lastmod>2026-03-24T22:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-in-agentic-ai-security-is-essential-3/</loc>
		<lastmod>2026-03-24T23:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-in-agentic-ai-security-is-essential/</loc>
		<lastmod>2026-03-24T23:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-trust-in-agentic-ai-security-is-essential-2/</loc>
		<lastmod>2026-03-24T23:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-non-human-identities-manage-access/</loc>
		<lastmod>2026-03-24T23:51:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-expands-into-cybersecurity-arena-with-new-lakewatch-offering/</loc>
		<lastmod>2026-03-24T23:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-pilot-program-to-test-social-media-restrictions-on-families-before-government-decides-on-ban/</loc>
		<lastmod>2026-03-24T23:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitkoms-smart-city-index-2026-stadte-errichten-digitale-zwillinge/</loc>
		<lastmod>2026-03-24T23:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-attack-path-management-specterops-erweitert-losungsangebot-auf-okta-github-und-mac/</loc>
		<lastmod>2026-03-24T23:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-mazda-infinite-campus-and-dutch-ministry-hit-by-data-breaches/</loc>
		<lastmod>2026-03-24T23:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-ai-driven-code-at-scale/</loc>
		<lastmod>2026-03-24T23:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-prevention-isnt-enough-shifting-to-true-operational-resilience-in-2026/</loc>
		<lastmod>2026-03-24T23:59:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/</loc>
		<lastmod>2026-03-24T23:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-litellm-pypi-package-backdoored-to-steal-credentials-auth-tokens/</loc>
		<lastmod>2026-03-25T00:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-litellm-pypi-package-backdoored-to-steal-credentials-auth-tokens-2/</loc>
		<lastmod>2026-03-25T00:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-true-value-in-ai-lies-in-execution/</loc>
		<lastmod>2026-03-25T00:48:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-best-ai-soc-platforms-2026-comprehensive-comparison-guide/</loc>
		<lastmod>2026-03-25T00:48:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-quantum-threats-drive-encryption-changes/</loc>
		<lastmod>2026-03-25T00:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/julius-v0-2-0-from-33-to-63-probes-now-detecting-cloud-ai-enterprise-inference-and-rag-pipelines/</loc>
		<lastmod>2026-03-25T04:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-hardened-granular-resource-authorization-policies/</loc>
		<lastmod>2026-03-25T04:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/</loc>
		<lastmod>2026-03-25T04:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/turning-security-operations-over-to-ai-requires-trust/</loc>
		<lastmod>2026-03-25T04:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/which-came-first-the-system-prompt-or-the-rce/</loc>
		<lastmod>2026-03-25T05:49:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-intel-sharing-the-push-toward-cyber-disruption/</loc>
		<lastmod>2026-03-25T05:49:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-coding-redefines-software-development/</loc>
		<lastmod>2026-03-25T05:51:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-security-stack-looks-fine-from-the-dashboard-and-thats-the-problem/</loc>
		<lastmod>2026-03-25T05:51:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-2026-1-ships-backtrack-mode-eight-new-tools-and-a-kernel-upgrade-to-6-18/</loc>
		<lastmod>2026-03-25T05:53:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aqua-securitys-trivy-scanner-hit-by-supply-chain-attack-threatening-software-integrity/</loc>
		<lastmod>2026-03-25T05:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-hacktivists-make-noise-but-have-little-impact-on-war/</loc>
		<lastmod>2026-03-25T05:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-dont-have-to-choose-between-bas-or-automated-pentesting-you-shouldnt/</loc>
		<lastmod>2026-03-25T06:49:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-phishing-simulations-arent-building-a-security-culture/</loc>
		<lastmod>2026-03-25T06:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-litellm-package-with-95m-downloads-tied-to-teampcp-after-trivy-kics-hacks/</loc>
		<lastmod>2026-03-25T06:52:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-litellm-package-with-95m-downloads-tied-to-teampcp-after-trivy-kics-hacks-2/</loc>
		<lastmod>2026-03-25T06:52:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackerone-confirms-employee-data-stolen-following-linked-navia-hack/</loc>
		<lastmod>2026-03-25T06:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-authenticators-hidden-passkey-design-may-expose-new-passwordless-attack-vectors/</loc>
		<lastmod>2026-03-25T06:54:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehler-in-node-js-projekten-ibm-app-connect-durch-dos-angriffe-gefahrdet/</loc>
		<lastmod>2026-03-25T06:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vibe-coding-needs-guardrails-says-ncsc-amid-rising-ai-security-concerns/</loc>
		<lastmod>2026-03-25T07:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/78-security-leaders-highlight-the-urgent-need-to-rethink-cyber-risk-in-an-ai-driven-world/</loc>
		<lastmod>2026-03-25T07:52:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-turboquant-cuts-ai-memory-use-without-losing-accuracy/</loc>
		<lastmod>2026-03-25T07:52:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/training-an-ai-agent-to-attack-llm-applications-like-a-real-adversary/</loc>
		<lastmod>2026-03-25T07:54:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-blocks-new-foreign-consumer-router-models-citing-serious-security-risks/</loc>
		<lastmod>2026-03-25T07:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-malicious-npm-packages-target-crypto-developers-steal-wallet-keys-via-telegram/</loc>
		<lastmod>2026-03-25T07:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-backdoors-litellm-versions-1-82-71-82-8-via-trivy-ci-cd-compromise/</loc>
		<lastmod>2026-03-25T07:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dramatischer-anstieg-bei-voice-angriffen-drei-prinzipien-schutzen-vor-ki-gestutzten-voice-angriffen/</loc>
		<lastmod>2026-03-25T07:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-souveranitat-am-pc-ein-technischer-leitfaden-fur-echte-kontrolle-uber-daten-und-systeme/</loc>
		<lastmod>2026-03-25T08:49:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-pcs-are-unreliable-unpatched-and-unloved-compared-to-macs/</loc>
		<lastmod>2026-03-25T08:51:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-best-free-vpns/</loc>
		<lastmod>2026-03-25T08:51:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-openclaw-trap-campaign-targets-developers-and-gamers-via-trojanized-github-repos/</loc>
		<lastmod>2026-03-25T08:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-2026-1-launches-with-8-new-hacking-tools-for-penetration-testers/</loc>
		<lastmod>2026-03-25T08:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns/</loc>
		<lastmod>2026-03-25T08:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommerzielle-systeme-fur-qkd-auf-dem-prufstand-austausch-im-labor-von-tuv-nord/</loc>
		<lastmod>2026-03-25T08:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-stellt-neuen-ki-agenten-zur-validierung-und-behebung-von-sicherheitslucken-vor/</loc>
		<lastmod>2026-03-25T08:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zollabfertigung-von-hand-lkw-staus-wegen-bundesweiter-it-storung-beim-zoll/</loc>
		<lastmod>2026-03-25T08:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-cuts-action-approval-loop-lets-claude-code-make-the-call-2/</loc>
		<lastmod>2026-03-25T09:49:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-cuts-action-approval-loop-lets-claude-code-make-the-call/</loc>
		<lastmod>2026-03-25T09:49:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranians-dont-have-a-missile-alert-system-so-volunteers-built-their-own-warning-map/</loc>
		<lastmod>2026-03-25T09:49:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manager-of-botnet-used-in-ransomware-attacks-gets-2-years-in-prison/</loc>
		<lastmod>2026-03-25T09:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manager-of-botnet-used-in-ransomware-attacks-gets-2-years-in-prison-2/</loc>
		<lastmod>2026-03-25T09:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-study-reveals-how-infostealer-infections-lead-to-dark-web-exposure-in-just-48-hours/</loc>
		<lastmod>2026-03-25T09:53:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-fusball-zur-falle-wird-warum-betruger-gezielt-fans-ins-visier-nehmen/</loc>
		<lastmod>2026-03-25T09:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaische-cloudinfrastruktur-made-in-eu-schwieriger-als-gedacht/</loc>
		<lastmod>2026-03-25T09:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsprufung-reddit-plant-biometrie-check-gegen-bot-armeen/</loc>
		<lastmod>2026-03-25T09:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identitatsprufung-reddit-plant-biometrie-check-gegen-bot-armeen-2/</loc>
		<lastmod>2026-03-25T09:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-footprint-exposure-whats-public-and-why-it-matters/</loc>
		<lastmod>2026-03-25T10:50:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-footprint-exposure-whats-public-and-why-it-matters-2/</loc>
		<lastmod>2026-03-25T10:50:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-breaking-traditional-security-models-heres-where-they-fail-first/</loc>
		<lastmod>2026-03-25T10:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-one-man-used-10000-bots-to-steal-8000000-from-music-artists/</loc>
		<lastmod>2026-03-25T10:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50-gb-datenvolumen-inklusive-kostenloser-vpn-ab-sofort-direkt-in-firefox-149-verfugbar/</loc>
		<lastmod>2026-03-25T10:53:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-litellm-versions-linked-to-teampcp-supply-chain-attack/</loc>
		<lastmod>2026-03-25T10:54:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-litellm-versions-linked-to-teampcp-supply-chain-attack-2/</loc>
		<lastmod>2026-03-25T10:54:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-trims-action-approval-loop-lets-claude-code-make-the-call/</loc>
		<lastmod>2026-03-25T10:54:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-adenike-ajayi-lweka-cybersecurity-consultant-at-accenture/</loc>
		<lastmod>2026-03-25T10:56:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-henhouse-nets-over-500-arrests-in-uk-fraud-crackdown/</loc>
		<lastmod>2026-03-25T10:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-mit-professioneller-unterstutzung-keycloak-machtig-aber-auch-machtig-komplex/</loc>
		<lastmod>2026-03-25T10:57:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacken-auf-security-tools-und-mehr-uber-1-000-cloudumgebungen-kompromittiert/</loc>
		<lastmod>2026-03-25T10:59:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-key-trends-reshaping-the-iam-market/</loc>
		<lastmod>2026-03-25T11:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-key-trends-reshaping-the-iam-market-4/</loc>
		<lastmod>2026-03-25T11:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-key-trends-reshaping-the-iam-market-2/</loc>
		<lastmod>2026-03-25T11:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-key-trends-reshaping-the-iam-market-3/</loc>
		<lastmod>2026-03-25T11:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-hits-trivy-checkmarx-and-litellm-in-credential-theft-campaign/</loc>
		<lastmod>2026-03-25T11:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-group-lapsus-claims-the-hack-of-pharma-giant-astrazeneca/</loc>
		<lastmod>2026-03-25T11:52:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-hands-entra-id-users-new-option-for-mfa/</loc>
		<lastmod>2026-03-25T11:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/could-ai-replace-the-ceo-zuckerbergs-ceo-agent-sparks-debate/</loc>
		<lastmod>2026-03-25T11:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/</loc>
		<lastmod>2026-03-25T11:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-ransomware-pay2key-targets-servers-virtualization-hosts-and-cloud-workloads-3/</loc>
		<lastmod>2026-03-25T11:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-ransomware-pay2key-targets-servers-virtualization-hosts-and-cloud-workloads/</loc>
		<lastmod>2026-03-25T11:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-ransomware-pay2key-targets-servers-virtualization-hosts-and-cloud-workloads-2/</loc>
		<lastmod>2026-03-25T11:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-ransomware-pay2key-targets-servers-virtualization-hosts-and-cloud-workloads-4/</loc>
		<lastmod>2026-03-25T11:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5%c2%afnginx-plus-opensource-flaw-lets-attackers-execute-code-via-mp4-file/</loc>
		<lastmod>2026-03-25T11:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploiting-magento-flaw-to-execute-remote-code-and-seize-full-account-access/</loc>
		<lastmod>2026-03-25T11:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smartapesg-clickfix-campaign-spreads-remcos-netsupport-rat-stealc-sectop-rat/</loc>
		<lastmod>2026-03-25T12:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clawhub-vulnerability-lets-attackers-manipulate-rankings-to-become-top-skill/</loc>
		<lastmod>2026-03-25T12:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-sound-alarm-over-prompt-poaching-browser-extensions/</loc>
		<lastmod>2026-03-25T12:04:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-sound-alarm-over-prompt-poaching-browser-extensions-2/</loc>
		<lastmod>2026-03-25T12:04:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-automatisiert-sicherheitsprozesse-mit-aida-ausbau-der-ki-agenten/</loc>
		<lastmod>2026-03-25T12:06:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/raus-aus-der-cloud-ein-start-up-auf-eu-infrastruktur-schwieriger-als-gedacht/</loc>
		<lastmod>2026-03-25T12:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-khaled-mohamed-the-bug-hunter-who-found-a-microsoft-flaw/</loc>
		<lastmod>2026-03-25T12:50:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-breach-compromises-over-1000-saas-environments-lapsus-joins-the-extortion-wave/</loc>
		<lastmod>2026-03-25T12:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-warns-developers-after-litellm-malware-found-stealing-cloud-and-ci-cd-credentials/</loc>
		<lastmod>2026-03-25T12:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ptc-warns-of-critical-windchill-flexplm-flaw-enabling-remote-code-execution/</loc>
		<lastmod>2026-03-25T12:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-steigt-mit-dem-agentenbasierten-siem-in-den-security-markt-ein/</loc>
		<lastmod>2026-03-25T12:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agenten-zur-sicheren-validierung-von-sicherheitslucken-und-autonomer-behebung/</loc>
		<lastmod>2026-03-25T12:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gestutzte-malware-ist-fester-bestandteil-im-werkzeugkasten-von-cyberkriminellen/</loc>
		<lastmod>2026-03-25T12:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-etabliert-intelligenzebene-um-agentenbasierte-systeme-zu-sichern/</loc>
		<lastmod>2026-03-25T12:58:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-already-shifting-focus-from-erp-migration-disaster-in-pursuit-of-ai-driven-growth/</loc>
		<lastmod>2026-03-25T12:58:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-openclaw-token-giveaway-targets-github-devs-with-wallet-draining-scam/</loc>
		<lastmod>2026-03-25T12:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-cybersecurity-excellence-awards-winners-announced-during-rsa-conference-as-ai-security-dominates/</loc>
		<lastmod>2026-03-25T13:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-targets-foreign-router-imports-amid-rising-cybersecurity-concerns/</loc>
		<lastmod>2026-03-25T13:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-pypi-packages-compromised-in-expanding-teampcp-supply-chain-attacks/</loc>
		<lastmod>2026-03-25T13:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-pypi-packages-compromised-in-expanding-teampcp-supply-chain-attacks-2/</loc>
		<lastmod>2026-03-25T13:03:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-targets-foreign-made-routers-as-security-concerns-rise-but-experts-warn-risks-go-further/</loc>
		<lastmod>2026-03-25T13:04:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mirai-botnets-evolve-into-major-ddos-and-proxy-abuse-threats/</loc>
		<lastmod>2026-03-25T13:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/goharbor-issues-urgent-patch-for-harbor-flaw-allowing-full-registry-compromise/</loc>
		<lastmod>2026-03-25T13:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-releases-firefox%c2%af149-0-with-free-builtin-vpn-offering-50%c2%afgb-monthly-data/</loc>
		<lastmod>2026-03-25T13:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/csa-launches-csai-foundation-for-ai-security/</loc>
		<lastmod>2026-03-25T13:08:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/</loc>
		<lastmod>2026-03-25T13:09:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/</loc>
		<lastmod>2026-03-25T13:10:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/</loc>
		<lastmod>2026-03-25T13:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-expands-supply-chain-campaign-with-litellm-pypi-compromise/</loc>
		<lastmod>2026-03-25T13:11:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/link11-european-cyber-report-2026-acht-tage-ohne-unterbrechung-ddos-wird-zur-dauerbelastung/</loc>
		<lastmod>2026-03-25T13:13:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/block-compromised-passwords-without-breaking-user-experience/</loc>
		<lastmod>2026-03-25T13:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-is-increasing-demand-for-software-engineers-not-replacing-them/</loc>
		<lastmod>2026-03-25T13:51:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sen-wyden-warns-of-another-section-702-abuse/</loc>
		<lastmod>2026-03-25T13:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/try-our-new-dimensional-analysis-claude-plugin/</loc>
		<lastmod>2026-03-25T13:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyber-chief-urges-full-court-press-to-counter-rising-cyber-threats/</loc>
		<lastmod>2026-03-25T13:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grapheneos-verweigert-alterskontrollen-im-betriebssystem/</loc>
		<lastmod>2026-03-25T13:56:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/recent-navia-data-breach-impacts-hackerone-employee-data/</loc>
		<lastmod>2026-03-25T13:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quelloffener-eclient-thunderbird-149-und-ein-update-fur-140-9-esr-verfugbar/</loc>
		<lastmod>2026-03-25T13:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-market-shifts-to-msp-identity-and-infrastructure/</loc>
		<lastmod>2026-03-25T13:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-agents-are-one-prompt-away-from-ransomware/</loc>
		<lastmod>2026-03-25T13:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemini-picks-up-criminal-activity-buried-in-dark-web-noise/</loc>
		<lastmod>2026-03-25T14:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-satellite-data-becomes-a-weapon/</loc>
		<lastmod>2026-03-25T14:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-2026-1-released-with-8-new-tools-new-backtrack-mode/</loc>
		<lastmod>2026-03-25T14:03:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/obfuscated-vbs-and-png-loaders-power-new-open-directory-malware-campaign-with-rat-payloads/</loc>
		<lastmod>2026-03-25T14:04:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-native-security-is-a-must-to-counter-ai-based-attacks/</loc>
		<lastmod>2026-03-25T14:04:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-nsa-directors-discuss-red-line-for-offensive-cyberattacks/</loc>
		<lastmod>2026-03-25T14:06:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-bans-foreign-made-routers-over-national-security-concerns/</loc>
		<lastmod>2026-03-25T14:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/32-xe-kerne-intels-grose-battlemage-gpu-ist-da-als-pro-model-b70/</loc>
		<lastmod>2026-03-25T15:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/you-cant-monetize-what-you-cant-see-ai-traffic-detection-for-publishers/</loc>
		<lastmod>2026-03-25T14:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halfway-through-rsac-the-writing-on-the-wall-says-one-thing-agents/</loc>
		<lastmod>2026-03-25T14:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halfway-through-rsac-the-writing-on-the-wall-says-one-thing-agents-2/</loc>
		<lastmod>2026-03-25T14:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/halfway-through-rsac-the-writing-on-the-wall-says-one-thing-agents-3/</loc>
		<lastmod>2026-03-25T14:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-data-mining-conti-leaks-leads-to-actual-binaries-and-to-a-hardcoded-c2-with-an-encryption-key-on-tripod-com-part-five/</loc>
		<lastmod>2026-03-25T14:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-are-turning-vs-code-into-a-silent-attack-tool/</loc>
		<lastmod>2026-03-25T14:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/500gb-stolen-from-namibia-airports-a-wake-up-call-for-aviation-security/</loc>
		<lastmod>2026-03-25T14:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tidal-wave-what-defenders-must-do-now/</loc>
		<lastmod>2026-03-25T14:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-7m-email-addresses-exposed-in-crunchyroll-third-party-breach/</loc>
		<lastmod>2026-03-25T14:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paid-ai-accounts-are-now-a-hot-underground-commodity/</loc>
		<lastmod>2026-03-25T14:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-backed-hackers-target-southeast-asian-military-systems-in-ongoing-spy-campaign/</loc>
		<lastmod>2026-03-25T15:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-near-miss-database-is-key-to-improving-information-sharing/</loc>
		<lastmod>2026-03-25T15:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-wins-four-infosec-awards-at-rsa-2026-launches-admp-and-seraai-2-0/</loc>
		<lastmod>2026-03-25T15:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pre-security-ships-platform-3-3-with-signalgate-data-fabric-and-agentic-soargpt-at-rsac-2026/</loc>
		<lastmod>2026-03-25T15:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tenable-launches-hexa-ai-an-agentic-orchestration-engine-inside-tenable-one/</loc>
		<lastmod>2026-03-25T15:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nudge-security-adds-ai-agent-discovery-to-surface-shadow-agents-and-their-risks-across-the-enterprise/</loc>
		<lastmod>2026-03-25T15:55:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hadrian-launches-nova-an-agentic-pentesting-solution-for-continuous-external-attack-validation/</loc>
		<lastmod>2026-03-25T15:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netrise-launches-provenance-to-map-who-is-behind-open-source-components-and-how-risk-spreads/</loc>
		<lastmod>2026-03-25T15:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyera-ships-browser-shield-data-lineage-and-mcp-to-close-ai-data-security-gaps/</loc>
		<lastmod>2026-03-25T15:57:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conductorone-launches-ai-access-management-to-govern-ai-tools-agents-and-mcp-connections/</loc>
		<lastmod>2026-03-25T15:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-routers-now-top-the-riskiest-connected-devices-list-with-11-new-device-types-emerging/</loc>
		<lastmod>2026-03-25T16:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broadcom-introduces-symantec-cbx-unifying-symantec-and-carbon-black-into-a-single-xdr-platform/</loc>
		<lastmod>2026-03-25T16:00:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-ransomware-operation-targeted-us-healthcare-provider/</loc>
		<lastmod>2026-03-25T16:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-wants-details-from-white-house-on-cyber-strategy-iran-resilience-measures/</loc>
		<lastmod>2026-03-25T16:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-botnet-operator-linked-to-major-ransomware-attacks-sentenced-in-us/</loc>
		<lastmod>2026-03-25T16:04:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rechenzentrumsstrategie-allianz-zur-starkung-digitaler-infrastrukturen-mahnt-konkretisierung-bei-strompreisen-und-energieeffizienz-an/</loc>
		<lastmod>2026-03-25T16:04:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-funf-gefahrlichsten-angriffstechniken-in-2026-basieren-allesamt-auf-kunstlicher-intelligenz/</loc>
		<lastmod>2026-03-25T16:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browser-entwickeln-sich-zum-hauptziel-der-cyberkriminalitat/</loc>
		<lastmod>2026-03-25T16:07:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-nutzen-den-iran-krieg-fur-malware-infizierte-geschaftskommunikation/</loc>
		<lastmod>2026-03-25T16:08:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-klaviyo-alternatives-for-revenue-growth-and-advanced-analytics/</loc>
		<lastmod>2026-03-25T16:08:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-translation-fixes-multilingual-content-chaos/</loc>
		<lastmod>2026-03-25T16:10:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-translation-fixes-multilingual-content-chaos-2/</loc>
		<lastmod>2026-03-25T16:10:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/botnet-operator-behind-14-million-in-ransomware-extortion-payments-gets-24-months-behind-bars/</loc>
		<lastmod>2026-03-25T16:11:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/4-best-free-vpns-in-2026/</loc>
		<lastmod>2026-03-25T16:11:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishers-pose-as-palo-alto-networks-recruiters-for-months-in-job-scam/</loc>
		<lastmod>2026-03-25T16:12:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-5-most-dangerous-new-attack-techniques-to-watch/</loc>
		<lastmod>2026-03-25T16:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/</loc>
		<lastmod>2026-03-25T16:15:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notfallmanagement-und-vorsorge-fur-krisen-hybride-angriffe-treffen-deutschland-unvorbereitet/</loc>
		<lastmod>2026-03-25T16:16:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vicarius-launches-vintelligence-a-second-flagship-product-for-continuous-agentic-validation/</loc>
		<lastmod>2026-03-25T16:50:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entro-security-launches-aga-to-govern-ai-agents-and-non-human-identities-across-the-enterprise/</loc>
		<lastmod>2026-03-25T16:52:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miggo-security-expands-runtime-defense-platform-with-ai-bom-agentic-detection-and-mcp-monitoring/</loc>
		<lastmod>2026-03-25T16:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/skyhawk-security-adds-threat-actor-context-to-cloud-attack-scenarios-mapping-simulations-to-known-adversaries/</loc>
		<lastmod>2026-03-25T16:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novee-brings-autonomous-red-teaming-to-llm-applications-built-from-its-own-vulnerability-research/</loc>
		<lastmod>2026-03-25T16:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-department-launches-new-bureau-to-combat-high-tech-threats/</loc>
		<lastmod>2026-03-25T16:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-has-created-a-new-attack-surface-and-encryption-is-not-enough/</loc>
		<lastmod>2026-03-25T16:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-has-created-a-new-attack-surface-and-encryption-is-not-enough-2/</loc>
		<lastmod>2026-03-25T16:59:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-bumps-up-q-day-deadline-to-2029-far-sooner-than-previously-thought/</loc>
		<lastmod>2026-03-25T17:00:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-cybersecurity-companies-making-big-ai-moves-at-rsac-2026/</loc>
		<lastmod>2026-03-25T17:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/puerto-rico-government-agency-cancels-drivers-license-appointments-after-cyberattack/</loc>
		<lastmod>2026-03-25T17:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-now-tp-link-archer-nx-routers-vulnerable-to-firmware-takeover/</loc>
		<lastmod>2026-03-25T17:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emergency-microsoft-oracle-patches-point-to-wider-cyber-issues/</loc>
		<lastmod>2026-03-25T17:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/</loc>
		<lastmod>2026-03-25T17:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-cybersecurity-excellence-awards-winners-announced-during-rsa-conference-as-ai-security-dominates-3/</loc>
		<lastmod>2026-03-25T17:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-cybersecurity-excellence-awards-winners-announced-during-rsa-conference-as-ai-security-dominates-2/</loc>
		<lastmod>2026-03-25T17:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-phones-linked-to-rising-financial-fraud-threat/</loc>
		<lastmod>2026-03-25T17:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-compromised-enterprise-identities-at-industrial-scale-warns-sentinelone/</loc>
		<lastmod>2026-03-25T17:09:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-to-have-accessed-data-tied-to-millions-of-crime-tipsters/</loc>
		<lastmod>2026-03-25T17:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-hits-widely-used-ai-package-risks-impacting-thousands-of-companies/</loc>
		<lastmod>2026-03-25T17:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-arrests-alleged-owner-of-cybercrime-forum-leakbase-report-says-2/</loc>
		<lastmod>2026-03-25T17:53:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-arrests-alleged-owner-of-cybercrime-forum-leakbase-report-says/</loc>
		<lastmod>2026-03-25T17:53:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attack-disrupts-operation-at-major-spanish-fishing-port/</loc>
		<lastmod>2026-03-25T17:54:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/age-checks-creep-into-linux-as-systemd-gets-a-dob-field/</loc>
		<lastmod>2026-03-25T17:55:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blame-game-why-public-cyber-attribution-carries-risks/</loc>
		<lastmod>2026-03-25T17:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cyber-resilience-requires-recovery-not-just-backups/</loc>
		<lastmod>2026-03-25T17:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/helping-msps-take-control-of-certificate-management-introducing-sectigo-partner-platform/</loc>
		<lastmod>2026-03-25T18:14:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-und-der-nahostkrieg-durftige-auskunfte-zum-raketenschutz-fur-rechenzentren/</loc>
		<lastmod>2026-03-25T18:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakbase-admin-arrested-in-russia-over-massive-stolen-credential-marketplace/</loc>
		<lastmod>2026-03-25T18:49:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-bans-new-foreign-made-home-routers-over-national-security-fears/</loc>
		<lastmod>2026-03-25T18:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-dark-side-of-ddos-why-ddos-downtime-is-harder-to-prevent/</loc>
		<lastmod>2026-03-25T18:56:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/before-the-lights-go-out/</loc>
		<lastmod>2026-03-25T18:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-expert-ai-prompt-that-kills-accuracy/</loc>
		<lastmod>2026-03-25T19:14:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-gitguardian-enables-rapid-response-to-the-litellm-supply-chain-attack/</loc>
		<lastmod>2026-03-25T19:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-not-shift-budgets-to-ai-how-businesses-should-and-shouldnt-respond-to-evolving-threats/</loc>
		<lastmod>2026-03-25T19:52:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chained-vulnerabilities-in-cisco-catalyst-switches-could-induce-denialservice/</loc>
		<lastmod>2026-03-25T19:52:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/den-fortschritt-im-blick-cyberangreifer-im-windschatten-wie-unternehmen-governance-risk-compliance-grc-mit-ki-harmonisieren/</loc>
		<lastmod>2026-03-25T19:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-police-rouse-system-admins-from-sleep-over-it-flaw/</loc>
		<lastmod>2026-03-25T19:54:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-targets-2029-for-post-quantum-cyber-readiness/</loc>
		<lastmod>2026-03-25T19:56:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-proved-the-industry-agrees-on-the-problem-now-comes-the-hard-part/</loc>
		<lastmod>2026-03-25T19:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-rsa-2026-security-leaders-grapple-with-ais-growing-role-and-risks/</loc>
		<lastmod>2026-03-25T19:57:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/</loc>
		<lastmod>2026-03-25T19:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-your-scanner-becomes-the-weapon-from-trivy-to-litellm/</loc>
		<lastmod>2026-03-25T20:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-llm-powered-network-intrusion-detection/</loc>
		<lastmod>2026-03-25T20:50:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-wins-four-global-infosec-awards-at-rsa-2026-and-launches-admp-and-seraai-2-0-autonomous-soc/</loc>
		<lastmod>2026-03-25T20:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scammers-have-virtual-smartphones-on-speed-dial-for-fraud/</loc>
		<lastmod>2026-03-25T20:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mirai-malware-evolves-into-hundreds-of-variants-driving-botnet-growth/</loc>
		<lastmod>2026-03-25T20:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mirai-malware-evolves-into-hundreds-of-variants-driving-botnet-growth-2/</loc>
		<lastmod>2026-03-25T20:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/florida-suspends-firm-for-unlawfully-offshoring-claims-data/</loc>
		<lastmod>2026-03-25T20:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bubble-ai-app-builder-abused-to-steal-microsoft-account-credentials/</loc>
		<lastmod>2026-03-25T20:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-evolving-glassworm-malware-is-making-the-rounds-of-code-repositories/</loc>
		<lastmod>2026-03-25T21:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-acting-chief-warns-shutdown-is-increasing-cyber-risks-causing-resignations/</loc>
		<lastmod>2026-03-25T21:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks-2/</loc>
		<lastmod>2026-03-25T21:53:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convicted-spyware-chief-hints-that-greeces-government-was-behind-dozens-of-phone-hacks/</loc>
		<lastmod>2026-03-25T21:53:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-supply-chain-attacks-dont-even-require-malware%c2%a6just-post-poisoned-documentation/</loc>
		<lastmod>2026-03-25T21:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-supply-chain-attacks-dont-even-require-malware%c2%a6just-post-poisoned-documentation-2/</loc>
		<lastmod>2026-03-25T21:54:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-cryptographers-panel-highlights-ai-defense-challenges/</loc>
		<lastmod>2026-03-25T21:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-moves-post-quantum-encryption-timeline-up-to-2029/</loc>
		<lastmod>2026-03-25T22:50:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-national-convicted-for-running-botnet-used-in-attacks-on-u-s-firms/</loc>
		<lastmod>2026-03-25T22:52:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-disruption-demands-global-trust-and-coordination/</loc>
		<lastmod>2026-03-25T22:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polyshell-attacks-target-56-of-all-vulnerable-magento-stores/</loc>
		<lastmod>2026-03-25T22:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-redline-infostealer-conspirator-extradited-to-us/</loc>
		<lastmod>2026-03-25T23:50:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisos-need-to-start-taking-ai-third-party-risk-seriously/</loc>
		<lastmod>2026-03-25T23:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-forced-into-reactive-cyber-posture-amid-shutdown/</loc>
		<lastmod>2026-03-25T23:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-exploits-data-breaches-and-zero-days-define-this-weeks-cybersecurity-landscape/</loc>
		<lastmod>2026-03-25T23:54:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-government-launches-bureau-of-emerging-threats/</loc>
		<lastmod>2026-03-25T23:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-adds-ai-powered-bug-detection-to-expand-security-coverage/</loc>
		<lastmod>2026-03-25T23:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/at-rsac-the-eu-leads-while-us-officials-are-sidelined/</loc>
		<lastmod>2026-03-25T23:58:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-innovative-methods-secure-agentic-ai/</loc>
		<lastmod>2026-03-26T00:49:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-safe-is-your-cloud-with-agentic-ai/</loc>
		<lastmod>2026-03-26T00:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-critical-citrix-netscaler-hole-of-similar-severity-to-citrixbleed2-says-expert/</loc>
		<lastmod>2026-03-26T00:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-ai-security-scalable/</loc>
		<lastmod>2026-03-26T00:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mandiant-veroffentlicht-m-trends-report-2026-mittels-ki-konnten-angreifer-operationen-ausweiten/</loc>
		<lastmod>2026-03-26T00:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keynote-auf-der-rsac-2026-die-funf-gefahrlichsten-angriffstechniken/</loc>
		<lastmod>2026-03-26T00:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/delve-did-the-security-compliance-on-litellm-an-ai-project-hit-by-malware/</loc>
		<lastmod>2026-03-26T00:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cyberattacks-can-turn-battery-farms-into-grid-blackouts/</loc>
		<lastmod>2026-03-26T00:57:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/daten-von-68-millionen-crunchyroll-usern-gestohlen-was-betroffene-jetzt-tun-sollten/</loc>
		<lastmod>2026-03-26T00:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wlan-synchronisierung-fur-alle-android-gerate-das-bringt-das-neue-google-update/</loc>
		<lastmod>2026-03-26T00:59:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wlan-synchronisierung-fur-alle-android-gerate-das-bringt-das-neue-google-update-2/</loc>
		<lastmod>2026-03-26T00:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entropy-rich-synthetic-data-generation-for-pqc-key-material/</loc>
		<lastmod>2026-03-26T04:48:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-uk-cyber-security-resilience-bill-means-for-security-practitioners/</loc>
		<lastmod>2026-03-26T04:49:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indian-government-probes-cctv-espionage-operation-linked-to-pakistan/</loc>
		<lastmod>2026-03-26T04:50:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/half-of-vmware-users-plan-to-reduce-usage-by-2028/</loc>
		<lastmod>2026-03-26T04:51:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-threats-usher-in-dark-period-for-cyber-defenders-2/</loc>
		<lastmod>2026-03-26T04:53:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-threats-usher-in-dark-period-for-cyber-defenders-3/</loc>
		<lastmod>2026-03-26T04:53:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-based-threats-usher-in-dark-period-for-cyber-defenders/</loc>
		<lastmod>2026-03-26T04:53:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fedramp-and-the-data-broker-loophole/</loc>
		<lastmod>2026-03-26T05:48:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/who-owns-ai-agent-access-at-most-companies-nobody-knows/</loc>
		<lastmod>2026-03-26T05:49:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-secure-firewall-vulnerability-exposes-systems-to-remote-code-execution-by-attackers/</loc>
		<lastmod>2026-03-26T05:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-releases-urgent-patches-for-multiple-vulnerabilities-exposing-systems-to-dos-and-crashes/</loc>
		<lastmod>2026-03-26T05:51:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmensrisiko-ki-im-einsatz-ohne-kontrolle/</loc>
		<lastmod>2026-03-26T06:50:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-unternehmen-die-31methode-nutzen-sollten/</loc>
		<lastmod>2026-03-26T06:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kali-linux-2026-1-launches-with-8-new-tools-ui-refresh-and-kernel-upgrade/</loc>
		<lastmod>2026-03-26T06:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-nearly-undetectable-llm-attack-needs-only-a-handful-of-poisoned-samples/</loc>
		<lastmod>2026-03-26T06:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-facilities-run-on-fragile-supply-chains-and-nobody-wants-to-admit-it/</loc>
		<lastmod>2026-03-26T06:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unbreakable-enterprise-kernel-8-2-ships-with-confidential-computing-support-xfs-live-repair/</loc>
		<lastmod>2026-03-26T06:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/charity-commission-warns-alan-turing-institute-of-its-legal-duties-after-complaints/</loc>
		<lastmod>2026-03-26T06:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2026-9444-cve-2026-20131-cisco-warnt-vor-angriffen-auf-firewall-management-center/</loc>
		<lastmod>2026-03-26T06:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-und-wiz-helfen-gemeinsam-unternehmen-cloud-bedrohungen-zu-verstehen-und-abzuschwachen/</loc>
		<lastmod>2026-03-26T07:49:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-soc-vendors-are-selling-a-future-that-production-deployments-havent-reached-yet/</loc>
		<lastmod>2026-03-26T07:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leakbase-forum-admin-arrested-by-russian-authorities-in-global-cybercrime-operation/</loc>
		<lastmod>2026-03-26T07:51:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-unveils-new-guidance-to-detect-and-defend-against-trivy-supply-chain-attack/</loc>
		<lastmod>2026-03-26T07:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-vs-code-security-alerts-on-github-spread-malware-in-massive-phishing-attack/</loc>
		<lastmod>2026-03-26T07:54:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputer-in-funf-bis-zehn-jahren-breit-verfugbar-post-quanten-kryptografie-wird-zur-pflicht/</loc>
		<lastmod>2026-03-26T07:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enhancing-user-experience-with-passwordless-authentication-a-design-first-approach-2/</loc>
		<lastmod>2026-03-26T08:49:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enhancing-user-experience-with-passwordless-authentication-a-design-first-approach/</loc>
		<lastmod>2026-03-26T08:49:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-factory-security-blueprint-zum-schutz-der-ki-infrastruktur/</loc>
		<lastmod>2026-03-26T08:49:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-tipps-fur-eine-sichere-websitestrategie/</loc>
		<lastmod>2026-03-26T08:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firewall-mit-bsi-zertifizierung-eal4-fur-virtualisierte-umgebungen/</loc>
		<lastmod>2026-03-26T08:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/preventing-account-takeovers-a-practical-guide-to-detection-and-response/</loc>
		<lastmod>2026-03-26T08:53:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-bots-and-synthetic-identities-fuel-surge-in-fraud/</loc>
		<lastmod>2026-03-26T08:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synology-diskstation-manager-vulnerability-puts-users-at-risk-of-remote-command-execution-attacks/</loc>
		<lastmod>2026-03-26T08:54:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-npm-install-messages-conceal-rat-malware-in-new-open-source-supply-chain-attack/</loc>
		<lastmod>2026-03-26T08:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites/</loc>
		<lastmod>2026-03-26T08:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-okosystem-vor-dem-kollaps-warum-ki-schneller-unsicherer-wird-als-sie-reift/</loc>
		<lastmod>2026-03-26T08:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/biometrie-daten-airlines-sollen-zugriff-auf-pass-chips-erhalten/</loc>
		<lastmod>2026-03-26T08:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-runtime-identity-securing-every-action-beyond-login/</loc>
		<lastmod>2026-03-26T09:49:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/node-js-fixes-critical-flaws-patches-dos-risk-in-latest-security-update/</loc>
		<lastmod>2026-03-26T09:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/idrive-for-windows-vulnerability-allows-attackers-to-escalate-privileges-and-gain-unauthorized-access/</loc>
		<lastmod>2026-03-26T09:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kiss-loader-malware-targets-with-early-bird-apc-injection-in-new-attack-campaign/</loc>
		<lastmod>2026-03-26T09:53:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/administrative-cooperation-group-bsi-erhalt-vorsitz-fur-zusammenarbeit-fur-cra-3/</loc>
		<lastmod>2026-03-26T09:54:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/administrative-cooperation-group-bsi-erhalt-vorsitz-fur-zusammenarbeit-fur-cra/</loc>
		<lastmod>2026-03-26T09:54:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/administrative-cooperation-group-bsi-erhalt-vorsitz-fur-zusammenarbeit-fur-cra-2/</loc>
		<lastmod>2026-03-26T09:54:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/administrative-cooperation-group-bsi-erhalt-vorsitz-fur-zusammenarbeit-fur-cra-4/</loc>
		<lastmod>2026-03-26T09:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-studie-zeigt-risiken-hinter-ki-generiertem-code/</loc>
		<lastmod>2026-03-26T09:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorsicht-urlaubsfalle-so-viele-deutsche-fallen-auf-reisebetrug-herein/</loc>
		<lastmod>2026-03-26T09:57:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-hacker-legen-it-von-spaniens-grostem-fischereihafen-lahm/</loc>
		<lastmod>2026-03-26T09:57:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-router-lucke-lasst-angreifer-andere-firmware-einschleusen/</loc>
		<lastmod>2026-03-26T09:57:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-raus-aus-der-cloud-ein-start-up-auf-eu-infrastruktur-schwieriger-als-gedacht/</loc>
		<lastmod>2026-03-26T09:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-wants-to-know-if-banning-under-16s-from-social-media-does-anything-useful/</loc>
		<lastmod>2026-03-26T10:49:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-authorities-arrest-alleged-leakbase-admin-behind-stolen-data-marketplace/</loc>
		<lastmod>2026-03-26T10:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-races-to-secure-encryption-before-quantum-threats-arrive/</loc>
		<lastmod>2026-03-26T10:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/andurils-real-war-is-with-itself/</loc>
		<lastmod>2026-03-26T10:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/torg-grabber-malware-shifts-from-telegram-exfiltration-to-encrypted-rest-api-for-c2/</loc>
		<lastmod>2026-03-26T10:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-screenshot-lures-target-web3-support-staff-with-multi-stage-malware-attack/</loc>
		<lastmod>2026-03-26T10:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/invoice-fraud-costs-uk-construction-sector-millions-nca-warns/</loc>
		<lastmod>2026-03-26T10:55:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/klassische-pentests-enden-oft-an-der-sap-anwendungsschicht-sap-systeme-als-blinder-fleck-bei-penetrationstests/</loc>
		<lastmod>2026-03-26T10:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitslucken-angreifer-konnen-tprouter-kapern/</loc>
		<lastmod>2026-03-26T10:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters/</loc>
		<lastmod>2026-03-26T11:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uae-positions-cyber-security-as-pillar-of-national-resilience-and-digital-growth/</loc>
		<lastmod>2026-03-26T11:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reddit-declares-war-on-bad-bot-activity/</loc>
		<lastmod>2026-03-26T11:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-pay2key-ransomware-group-re-emerges/</loc>
		<lastmod>2026-03-26T11:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-cloud-und-sicherheit-runtime-first-wird-zum-erfolgsfaktor/</loc>
		<lastmod>2026-03-26T11:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-phishers-use-fake-openclaw-tokens-to-drain-crypto-wallets/</loc>
		<lastmod>2026-03-26T12:49:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sanctions-chinese-crypto-marketplace-tied-to-scam-compounds/</loc>
		<lastmod>2026-03-26T12:51:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-460-never-knock-on-the-door-of-a-nuclear-submarine-base-and-ask-for-a-selfie/</loc>
		<lastmod>2026-03-26T12:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brit-lawmaker-targeted-by-ai-deepfake-fails-to-get-answers-from-us-big-tech/</loc>
		<lastmod>2026-03-26T12:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-hijacked-developer-accounts-spread-npm-malware/</loc>
		<lastmod>2026-03-26T12:54:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-webrtc-skimmer-bypassing-traditional-defenses/</loc>
		<lastmod>2026-03-26T12:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mission-to-smuggle-170-million-worth-of-ai-tech-to-china-collapsed-for-three-men/</loc>
		<lastmod>2026-03-26T12:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/join-our-livestream-today-the-war-machine/</loc>
		<lastmod>2026-03-26T12:57:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspected-redline-infostealer-malware-admin-extradited-to-us/</loc>
		<lastmod>2026-03-26T12:58:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-urgent-warning-on-langflow-code-injection-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-26T13:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-ivanti-epmm-vulnerabilities-expose-systems-to-arbitrary-code-execution-attacks/</loc>
		<lastmod>2026-03-26T13:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-nvidia-vulnerabilities-risk-remote-code-execution-and-denialservice-attacks/</loc>
		<lastmod>2026-03-26T13:02:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-tax-audit-phishing-campaign-shifts-from-rats-to-python-stealers/</loc>
		<lastmod>2026-03-26T13:04:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intermediaries-driving-global-spyware-market-expansion/</loc>
		<lastmod>2026-03-26T13:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/</loc>
		<lastmod>2026-03-26T13:05:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/</loc>
		<lastmod>2026-03-26T13:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-expands-bug-bounty-to-cover-ai-abuse-and-safety-concerns/</loc>
		<lastmod>2026-03-26T13:07:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-internet-security-report-2hj-2025-deutschland-platz-drei-bei-office-exploits-weltweit/</loc>
		<lastmod>2026-03-26T13:08:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kein-patch-verfugbar-forscher-demonstrieren-windows-passwortklau-uber-den-browser/</loc>
		<lastmod>2026-03-26T13:09:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-enterprise-infrastructure-tools-that-eliminate-months-of-engineering-work/</loc>
		<lastmod>2026-03-26T13:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-modern-classroom-management-tools-help-teachers-reclaim-instructional-time/</loc>
		<lastmod>2026-03-26T13:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/landmark-verdicts-put-metas-addiction-machine-platforms-on-trial/</loc>
		<lastmod>2026-03-26T13:54:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-krieg-wird-fur-malware-infizierte-geschaftskommunikation-genutzt/</loc>
		<lastmod>2026-03-26T13:54:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-pitches-lakewatch-as-a-cheaper-siem-but-is-it-really/</loc>
		<lastmod>2026-03-26T13:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-investigating-snapchat-and-pornography-sites-in-child-safety-crackdown/</loc>
		<lastmod>2026-03-26T13:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-detains-alleged-admin-of-leakbase-cybercrime-forum-weeks-after-global-crackdown/</loc>
		<lastmod>2026-03-26T13:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/talos-takes-2025-insights-from-talos-and-splunk/</loc>
		<lastmod>2026-03-26T13:58:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wer-beim-backup-nur-an-die-daten-denkt-hat-kein-backup/</loc>
		<lastmod>2026-03-26T13:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-wer-in-echtzeit-reagiert-bleibt-sicher/</loc>
		<lastmod>2026-03-26T14:00:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hochentwickelte-plugxkampagne-nutzt-den-aktuellen-nahostkonflikt-als-koder/</loc>
		<lastmod>2026-03-26T14:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watchguard-optimiert-network-detection-and-response-fur-kmus-und-msps/</loc>
		<lastmod>2026-03-26T14:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hmrc-hands-473m-fujitsu-migration-deal-to-aws-after-competition-melts-away/</loc>
		<lastmod>2026-03-26T14:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-release-tool-to-detect-stealthy-bpfdoor-implants-in-critical-infrastructure-networks/</loc>
		<lastmod>2026-03-26T14:04:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-jumps-on-the-bandwagon-and-will-use-your-data-to-train-ai/</loc>
		<lastmod>2026-03-26T14:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-ios-exploit-framework-linked-to-triangulation-attacks/</loc>
		<lastmod>2026-03-26T14:06:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-arrests-suspected-owner-of-leakbase-cybercrime-forum/</loc>
		<lastmod>2026-03-26T14:08:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostclaw-ai-malware-targets-macos-users-with-credential-stealing-payloads/</loc>
		<lastmod>2026-03-26T14:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/</loc>
		<lastmod>2026-03-26T14:10:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website-2/</loc>
		<lastmod>2026-03-26T14:10:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/</loc>
		<lastmod>2026-03-26T14:12:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/</loc>
		<lastmod>2026-03-26T14:12:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-becomes-the-top-cybersecurity-priority-for-defenders-as-criminals-exploit-it-pwc-warns/</loc>
		<lastmod>2026-03-26T14:14:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xiaomi-phishing-attempt-red-flags-you-cant-afford-to-ignore-3/</loc>
		<lastmod>2026-03-26T14:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xiaomi-phishing-attempt-red-flags-you-cant-afford-to-ignore/</loc>
		<lastmod>2026-03-26T14:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xiaomi-phishing-attempt-red-flags-you-cant-afford-to-ignore-2/</loc>
		<lastmod>2026-03-26T14:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kit-forschung-zu-quantentechnologien-optische-kontrolle-von-kernspins-in-molekulen-bietet-neue-perspektiven/</loc>
		<lastmod>2026-03-26T14:51:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know/</loc>
		<lastmod>2026-03-26T14:52:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conntour-raises-7m-from-general-catalyst-yc-to-build-an-ai-search-engine-for-security-video-systems/</loc>
		<lastmod>2026-03-26T14:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-kunstliche-intelligenz-zum-hebel-fur-die-wettbewerbsfahigkeit-des-mittelstands-wird/</loc>
		<lastmod>2026-03-26T14:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pxa-stealer-malware-targets-banks-uses-telegram-to-exfiltrate-data/</loc>
		<lastmod>2026-03-26T14:55:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/acalvio-shadowplex-review-deception-based-preemptive-cybersecurity/</loc>
		<lastmod>2026-03-26T14:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-redline-infostealer-operator-ends-up-in-us-custody/</loc>
		<lastmod>2026-03-26T14:58:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-a-vpn-may-subject-you-to-nsa-spying/</loc>
		<lastmod>2026-03-26T14:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/join-our-livestream-the-war-machine/</loc>
		<lastmod>2026-03-26T14:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tiktok-for-business-accounts-targeted-in-new-phishing-campaign/</loc>
		<lastmod>2026-03-26T15:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-rolls-out-more-ai-features-ios-multi-account-support/</loc>
		<lastmod>2026-03-26T15:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-a-modern-fraud-attack-from-bot-signups-to-account-takeovers/</loc>
		<lastmod>2026-03-26T15:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leak-bazaar-converts-stolen-corporate-data-into-organized-criminal-marketplace/</loc>
		<lastmod>2026-03-26T15:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-rootkit-leverages-ebpf-and-kernel-modules-to-stealthily-infiltrate-linux-systems/</loc>
		<lastmod>2026-03-26T15:05:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-near-miss-database-is-key-to-improving-information-sharing-2/</loc>
		<lastmod>2026-03-26T15:05:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-schutzt-ki-fabriken-mit-neuem-security-architecture-blueprint/</loc>
		<lastmod>2026-03-26T15:07:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-schutzt-ki-fabriken-mit-neuem-security-architecture-blueprint-2/</loc>
		<lastmod>2026-03-26T15:07:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-schutzt-ki-fabriken-mit-neuem-security-architecture-blueprint-3/</loc>
		<lastmod>2026-03-26T15:07:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-the-evolution-of-auth-from-passwords-to-ai-agents/</loc>
		<lastmod>2026-03-26T15:50:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-attack-installs-fake-browser-extension-for-surveillance/</loc>
		<lastmod>2026-03-26T15:50:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-citrix-netscaler-raises-fears-of-new-exploitation-wave/</loc>
		<lastmod>2026-03-26T15:51:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-cool-ai-and-agentic-tools-unveiled-at-rsac-2026/</loc>
		<lastmod>2026-03-26T15:53:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-rolls-out-age-verification-to-uk-iphone-users/</loc>
		<lastmod>2026-03-26T15:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-major-hacking-tool-has-leaked-online-putting-millions-of-iphones-at-risk-heres-what-you-need-to-know-2/</loc>
		<lastmod>2026-03-26T15:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-north-georgia-triumphs-in-dod-hacking-contest/</loc>
		<lastmod>2026-03-26T15:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-20-billion-crypto-scam-market-faces-a-new-government-crackdown/</loc>
		<lastmod>2026-03-26T15:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anduril-wants-to-own-the-future-of-war-tech-mishaps-delays-and-challenges-abound/</loc>
		<lastmod>2026-03-26T15:58:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anduril-wants-to-own-the-future-of-war-tech-mishaps-delays-and-challenges-abound-2/</loc>
		<lastmod>2026-03-26T15:58:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-exploits-windows-run-dialog-and-macos-terminal-to-deploy-malware/</loc>
		<lastmod>2026-03-26T15:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-dependency-decisions-introduce-ignore-security-bugs/</loc>
		<lastmod>2026-03-26T15:59:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/etherrat-techniques-bypass-security-via-ethereum-smart-contracts/</loc>
		<lastmod>2026-03-26T16:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-quantum-computers-could-hack-encrypted-systems-by-2029/</loc>
		<lastmod>2026-03-26T16:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-quantum-computers-could-hack-encrypted-systems-by-2029-2/</loc>
		<lastmod>2026-03-26T16:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-gegen-eu-regierungen-digitale-angriffe-heizen-nahostkonflikt-an/</loc>
		<lastmod>2026-03-26T16:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluevoyant-deckt-komplexe-phishing-kampagne-gegen-finanzkunden-auf/</loc>
		<lastmod>2026-03-26T16:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaparlament-freiwillige-scans-zu-kindesmissbrauch-endgultig-gescheitert/</loc>
		<lastmod>2026-03-26T16:05:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speed-judgment-and-behavior-ais-defense-mandate/</loc>
		<lastmod>2026-03-26T16:55:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speed-judgment-and-behavior-ais-defense-mandate-2/</loc>
		<lastmod>2026-03-26T16:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-redrawing-the-cybersecurity-vendor-landscape-2/</loc>
		<lastmod>2026-03-26T16:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-redrawing-the-cybersecurity-vendor-landscape/</loc>
		<lastmod>2026-03-26T16:57:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-redrawing-the-cybersecurity-vendor-landscape-3/</loc>
		<lastmod>2026-03-26T16:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-hacker-mints-24m-from-resolv/</loc>
		<lastmod>2026-03-26T16:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anduril-wants-to-own-the-future-of-war-tech-mishaps-delays-and-challenges-abound-3/</loc>
		<lastmod>2026-03-26T16:59:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anduril-wants-to-own-the-future-of-war-tech-mishaps-delays-and-challenges-abound-4/</loc>
		<lastmod>2026-03-26T16:59:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anduril-wants-to-own-the-future-of-war-tech-mishaps-delays-and-challenges-abound-5/</loc>
		<lastmod>2026-03-26T16:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-fixes-bug-that-lets-hackers-take-over-routers-without-a-password/</loc>
		<lastmod>2026-03-26T16:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-next-billion-users-wont-be-human-securing-the-agentic-enterprise/</loc>
		<lastmod>2026-03-26T17:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers/</loc>
		<lastmod>2026-03-26T17:01:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-organizations-can-use-blunders-to-level-up-their-security-programs/</loc>
		<lastmod>2026-03-26T17:03:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-rapidly-weaponize-critical-oracle-weblogic-rce-honeypot-study-finds/</loc>
		<lastmod>2026-03-26T17:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eula/</loc>
		<lastmod>2026-03-26T16:50:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-ukraine-hacker-group-bearlyfy-targets-russian-companies-with-custom-ransomware/</loc>
		<lastmod>2026-03-26T16:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silicon-valleys-two-biggest-dramas-have-intersected-litellm-and-delve/</loc>
		<lastmod>2026-03-26T16:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-hits-ctrl-z-decides-it-will-train-its-ai-with-user-data-after-all/</loc>
		<lastmod>2026-03-26T16:53:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quish-splash-qr-code-phishing-campaign-hits-1-6-million-users/</loc>
		<lastmod>2026-03-26T16:53:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-25-million-deepfake-why-your-video-calls-can-no-longer-be-trusted/</loc>
		<lastmod>2026-03-26T17:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-agentworks-expansion-gives-big-boost-to-security-for-partners-ceo-george-kurtz/</loc>
		<lastmod>2026-03-26T17:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-nsa-chiefs-worry-american-offensive-edge-in-cybersecurity-is-slipping/</loc>
		<lastmod>2026-03-26T17:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-made-strides-with-ios-26-security-but-leaked-hacking-tools-still-leave-millions-exposed-to-spyware-attacks/</loc>
		<lastmod>2026-03-26T17:55:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-ai-security-solutions-for-enterprises-in-2026/</loc>
		<lastmod>2026-03-26T17:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/livestream-replay-the-war-machine/</loc>
		<lastmod>2026-03-26T17:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-sound-the-alarm-on-vulnerabilities-in-ai-generated-code/</loc>
		<lastmod>2026-03-26T17:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-researchers-sound-the-alarm-on-vulnerabilities-in-ai-generated-code/</loc>
		<lastmod>2026-03-26T17:58:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kubernetes-upgrades-are-eating-engineering-time-how-to-get-it-back/</loc>
		<lastmod>2026-03-26T18:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autonomous-development-and-ai-speed-vs-security/</loc>
		<lastmod>2026-03-26T18:51:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncover-prompt-injection-insider-threats-with-the-tenable-one-model-refusal-detection/</loc>
		<lastmod>2026-03-26T18:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-official-accuses-china-of-supporting-exploiting-cyber-scam-crisis-in-southeast-asia/</loc>
		<lastmod>2026-03-26T18:54:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-puppet-made-me-cry-and-all-i-got-was-this-t-shirt/</loc>
		<lastmod>2026-03-26T18:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-kerlyn-manyi-cybersecurity-practitioner-nucleus-systems-founder-of-cyberfoundher-initiative/</loc>
		<lastmod>2026-03-26T18:57:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-kerlyn-manyi-cybersecurity-practitioner-nucleus-systems-founder-of-cyberfoundher-initiative-2/</loc>
		<lastmod>2026-03-26T18:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks/</loc>
		<lastmod>2026-03-26T18:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-recent-mass-attacks/</loc>
		<lastmod>2026-03-26T19:00:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-pue-a-guide-to-data-center-efficiency/</loc>
		<lastmod>2026-03-26T19:50:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bpfdoor-in-telecom-networks-the-fcc-is-securing-the-edge-but-chinas-hackers-are-already-past-it/</loc>
		<lastmod>2026-03-26T19:51:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-redaction-software-can-help-government-agencies-comply-with-foia/</loc>
		<lastmod>2026-03-26T19:53:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-dcie-a-guide-to-data-center-efficiency/</loc>
		<lastmod>2026-03-26T19:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-guide-to-responding-to-shadow-ai/</loc>
		<lastmod>2026-03-26T19:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/channel-has-huge-role-in-securing-ai-agent-revolution-top-execs-at-rsac-2026/</loc>
		<lastmod>2026-03-26T19:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-redline-malware-developer-extradited-to-us-faces-up-to-30-years/</loc>
		<lastmod>2026-03-26T19:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-pushes-new-rules-to-crack-down-on-robocallers-foreign-call-centers/</loc>
		<lastmod>2026-03-26T19:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-canva-hikvision-vulnerabilities/</loc>
		<lastmod>2026-03-26T19:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-misaligned-incentives-are-the-cisos-biggest-problem/</loc>
		<lastmod>2026-03-26T20:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/millions-of-uk-iphone-users-will-need-to-verify-their-age-heres-why/</loc>
		<lastmod>2026-03-26T20:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-365-under-siege-phishing-campaign-bypasses-mfa-across-5-countries/</loc>
		<lastmod>2026-03-26T20:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/</loc>
		<lastmod>2026-03-26T20:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-langflow-ai-platform-under-attack/</loc>
		<lastmod>2026-03-26T20:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-vom-netz-genommen-cyberangriff-mundet-in-hafenbetrieb-mit-stift-und-papier/</loc>
		<lastmod>2026-03-26T20:05:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-warnt-vor-sicherheitslucken-firmware-zahlreicher-router-manipulierbar/</loc>
		<lastmod>2026-03-26T20:06:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-guerrilla-grc-helping-small-businesses-get-cyber-smart/</loc>
		<lastmod>2026-03-26T20:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chain-reaction-how-one-stolen-token-tore-through-five-ecosystems/</loc>
		<lastmod>2026-03-26T20:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-exploit-reveals-evolution-of-triangulation-ios-exploitation-framework/</loc>
		<lastmod>2026-03-26T20:53:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-vector-databases-put-enterprise-ai-data-at-risk/</loc>
		<lastmod>2026-03-26T20:54:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-the-fccs-router-ban-the-wrong-fix/</loc>
		<lastmod>2026-03-26T20:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automotive-cybersecurity-threats-grow-in-era-of-connected-autonomous-vehicles/</loc>
		<lastmod>2026-03-26T20:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infiniti-stealer-a-new-macos-infostealer-using-clickfix-and-python-nuitka/</loc>
		<lastmod>2026-03-26T21:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-yiff-machine-we-hacked-93gb-of-anonymous-crime-tips/</loc>
		<lastmod>2026-03-26T21:51:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nyc-health-notifying-patients-of-2-third-party-hacks/</loc>
		<lastmod>2026-03-26T21:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-healthcare-faces-rising-risks-from-shadow-ai/</loc>
		<lastmod>2026-03-26T21:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-cloud-infrastructure-the-bare-metal-facts/</loc>
		<lastmod>2026-03-26T21:54:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack/</loc>
		<lastmod>2026-03-26T21:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-nhis-supported-in-regulatory-compliance/</loc>
		<lastmod>2026-03-26T22:51:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-proactive-in-managing-ai-risks/</loc>
		<lastmod>2026-03-26T22:52:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-deliver-value-in-cloud-environments/</loc>
		<lastmod>2026-03-26T22:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-langflow-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-26T22:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-tycoon2fa-phishing-platform-rebounds/</loc>
		<lastmod>2026-03-26T22:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-hit-in-cascading-supply-chain-attack/</loc>
		<lastmod>2026-03-26T22:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-trumps-plot-to-grab-irans-nuclear-fuel-would-actually-work/</loc>
		<lastmod>2026-03-26T22:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/odni-tackles-ai-threat-hunting-app-cybersecurity-in-year-one-tech-review/</loc>
		<lastmod>2026-03-26T23:50:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tails-7-6-ships-automatic-tor-bridge-retrieval-and-a-new-password-manager/</loc>
		<lastmod>2026-03-26T23:51:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tails-7-6-ships-automatic-tor-bridge-retrieval-and-a-new-password-manager-2/</loc>
		<lastmod>2026-03-26T23:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-70-prozent-der-deutschen-unternehmen-genehmigen-ki-projekte-trotz-sicherheitsbedenken/</loc>
		<lastmod>2026-03-27T00:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ghost-campaign-uses-fake-npm-progress-bars-to-phish-sudo-passwords/</loc>
		<lastmod>2026-03-27T00:54:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/make-openais-models-misbehave-and-earn-a-reward/</loc>
		<lastmod>2026-03-27T00:54:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-product-launches-at-rsac-2026/</loc>
		<lastmod>2026-03-27T00:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-piloting-skills-based-assessments-for-cyber-workers/</loc>
		<lastmod>2026-03-27T00:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-and-the-cybersecurity-risk-that-was-already-here/</loc>
		<lastmod>2026-03-27T21:37:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place/</loc>
		<lastmod>2026-03-27T21:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-llm-assisted-risk-management-for-small-teams-budgets/</loc>
		<lastmod>2026-03-27T21:39:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gpt-cant-trace-an-attack-chain-a-purpose-built-cybersecurity-llm-can/</loc>
		<lastmod>2026-03-27T21:40:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-the-worst-weekly-phishing-attack-recap-ironscales/</loc>
		<lastmod>2026-03-27T21:41:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-threat-group-hacks-fbi-director-kash-patels-personal-email/</loc>
		<lastmod>2026-03-27T21:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-email-privacy-tool-tested-in-fbi-threat-case-exposing-limits-of-anonymity/</loc>
		<lastmod>2026-03-27T21:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-your-best-friend-is-a-bot-who-never-says-no/</loc>
		<lastmod>2026-03-27T21:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-ciam-a-complete-guide-to-customer-identity-and-access-management-in-2026/</loc>
		<lastmod>2026-03-27T21:46:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ao-labs/</loc>
		<lastmod>2026-03-27T21:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/espionage-campaign-targets-telecom-with-stealthy-linux-based-backdoor/</loc>
		<lastmod>2026-03-27T21:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-is-the-first-line-of-defense-especially-in-an-ai-fueled-threat-landscape/</loc>
		<lastmod>2026-03-27T21:48:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/plugx-malware-nutzt-geopolitische-spannungen-aus/</loc>
		<lastmod>2026-03-27T21:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browser-werden-zum-hauptziel-von-cyberkriminalitat/</loc>
		<lastmod>2026-03-27T21:50:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-identity-and-cloud-conference-2026-eic-2026-19-bis-22-mai-2026-in-berlin/</loc>
		<lastmod>2026-03-27T21:51:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/70-prozent-der-unternehmen-genehmigen-ki-projekte-trotz-sicherheitsbedenken/</loc>
		<lastmod>2026-03-27T21:53:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm/</loc>
		<lastmod>2026-03-27T21:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm-2/</loc>
		<lastmod>2026-03-27T21:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-die-linke/</loc>
		<lastmod>2026-03-27T21:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-steps-cisos-can-take-to-empower-their-teams/</loc>
		<lastmod>2026-03-27T21:57:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-quantum-apocalypse-is-coming-sooner-than-we-thought/</loc>
		<lastmod>2026-03-27T21:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-ceo-tomer-weingarten-mssps-are-the-hyperscalers-for-ai-governance-and-security/</loc>
		<lastmod>2026-03-27T21:59:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasir-securitys-hybrid-warfare-against-middle-east-energy-infrastructure/</loc>
		<lastmod>2026-03-27T22:00:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-parliament-rejects-extension-of-csam-scanning-rules-for-tech-platforms/</loc>
		<lastmod>2026-03-27T22:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-weighs-new-limits-on-political-donations-as-reports-warn-of-hardtrace-foreign-interference/</loc>
		<lastmod>2026-03-27T22:01:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-confirms-theft-of-directors-personal-emails-by-iran-linked-hacking-group/</loc>
		<lastmod>2026-03-27T22:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-court-threatens-xai-with-fines-over-groks-nonconsensual-nude-images/</loc>
		<lastmod>2026-03-27T22:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latvia-accuses-russia-of-of-disinformation-campaign-targeting-baltic-states/</loc>
		<lastmod>2026-03-27T22:05:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-handala-claim-to-compromise-fbi-director-kash-patels-personal-data/</loc>
		<lastmod>2026-03-27T22:05:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-leaders-say-the-next-two-years-are-going-to-be-insane/</loc>
		<lastmod>2026-03-27T22:06:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-leaks-data-extortion-what-you-need-to-know/</loc>
		<lastmod>2026-03-27T22:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-krieg-als-aufhanger-cyberkriminelle-missbrauchen-geopolitische-ereignisse-fur-malware-attacken-auf-geschaftskommunikation/</loc>
		<lastmod>2026-03-27T22:08:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-confirms-cyberattack-after-hackers-claim-data-breach/</loc>
		<lastmod>2026-03-27T22:09:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-claim-breach-of-fbi-director-kash-patels-personal-email-account/</loc>
		<lastmod>2026-03-27T22:11:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/</loc>
		<lastmod>2026-03-27T22:12:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-cyberattacks-ai-risks-and-geopolitical-cyber-threats/</loc>
		<lastmod>2026-03-27T22:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-funding-jolt-eu-moves-to-back-the-cve-vulnerability-system/</loc>
		<lastmod>2026-03-27T22:14:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-energy-sector-isnt-ready-for-ransomware-and-2025-proved-it/</loc>
		<lastmod>2026-03-27T22:14:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordlist-angriffe-wenn-cyberkriminelle-gezielt-unternehmensbegriffe-nutzen/</loc>
		<lastmod>2026-03-27T22:15:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experten-statements-zum-world-backup-day/</loc>
		<lastmod>2026-03-27T22:17:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-es-wichtig-ist-backups-up-to-date-zu-halten/</loc>
		<lastmod>2026-03-27T22:17:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/afc-ajax-drops-ball-as-flaws-let-hackers-play-admin-with-tickets-and-bans/</loc>
		<lastmod>2026-03-27T22:19:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-war-drives-urgent-need-to-counter-underwater-attack-drones/</loc>
		<lastmod>2026-03-27T22:19:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-boffins-scoured-the-web-and-found-hundreds-of-valid-api-keys/</loc>
		<lastmod>2026-03-27T22:20:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-tweaks-timed-usage-limits-to-discourage-claude-demand-during-peak-hours/</loc>
		<lastmod>2026-03-27T22:22:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-would-prefer-to-forget-march-ever-happened-in-its-uae-region/</loc>
		<lastmod>2026-03-27T22:22:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sets-2029-deadline-as-quantum-computers-threaten-encryption/</loc>
		<lastmod>2026-03-27T22:25:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bianlian-ransomware-spreads-via-fake-invoice-svg-images-in-new-attacks/</loc>
		<lastmod>2026-03-27T22:25:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-aitm-phishing-wave-hijacks-tiktok-business-accounts/</loc>
		<lastmod>2026-03-27T22:26:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-and-bsi-warn-orgs-of-critical-ptc-windchill-and-flexplm-flaw/</loc>
		<lastmod>2026-03-27T22:27:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-an-aquasecurity-trivy-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-27T22:28:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-red-menshen-apt-deploys-stealthy-bpfdoor-implants-in-telecom-networks/</loc>
		<lastmod>2026-03-27T22:29:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-2029-quantum-deadline-is-a-wake-up-call/</loc>
		<lastmod>2026-03-27T22:30:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-critical-flaw-in-grassroots-dicom-imaging-library/</loc>
		<lastmod>2026-03-27T22:31:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/handala-hacks-fbi-director-kash-patels-personal-email/</loc>
		<lastmod>2026-03-27T22:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-blocks-trumps-anthropic-ban-as-ai-dispute-continues/</loc>
		<lastmod>2026-03-27T22:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/court-blocks-trumps-anthropic-ban-as-ai-dispute-continues/</loc>
		<lastmod>2026-03-27T22:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-sonar-shares-why-code-security-must-shift-before-ci/</loc>
		<lastmod>2026-03-27T22:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-sonar-shares-why-code-security-must-shift-before-ci/</loc>
		<lastmod>2026-03-27T22:37:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-how-zscaler-is-securing-the-ai-ecosystem/</loc>
		<lastmod>2026-03-27T22:37:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-vulnerabilities-insider-threats-and-ai-driven-cybercrime-define-the-week/</loc>
		<lastmod>2026-03-27T22:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-strikes-again-backdoored-telnyx-pypi-package-delivers-malware/</loc>
		<lastmod>2026-03-27T22:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-sounds-alarm-on-langflow-rce-trivy-supply-chain-compromise-after-rapid-exploitation/</loc>
		<lastmod>2026-03-27T22:41:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ajax-data-breach-exposed-season-tickets-supporter-bans-open-to-tampering/</loc>
		<lastmod>2026-03-27T22:42:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-frenzy-feeds-credential-chaos-secrets-leak-through-code-tools-and-infrastructure/</loc>
		<lastmod>2026-03-27T22:44:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-breached-kash-patels-email-but-not-the-fbis/</loc>
		<lastmod>2026-03-27T22:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-upgrades-security-breaches-and-industry-shifts-define-this-week-in-tech/</loc>
		<lastmod>2026-03-27T22:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-issues-high-risk-security-patch-for-3-5-billion-chrome-users-what-you-need-to-know/</loc>
		<lastmod>2026-03-27T22:46:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-dr-catherine-knibbs-founder-and-ceo-of-children-and-tech/</loc>
		<lastmod>2026-03-27T22:47:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-citrix-netscaler-flaw-draws-citrixbleed-comparisons-as-exploitation-window-narrows/</loc>
		<lastmod>2026-03-27T22:48:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-moves-q-day-estimate-to-2029-industry-experts-say-the-clock-is-already-ticking/</loc>
		<lastmod>2026-03-27T22:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-vs-code-alerts-on-github-spread-malware-to-developers/</loc>
		<lastmod>2026-03-27T22:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-grc-teams-get-the-tech-the-mindset-shift-is-whats-missing/</loc>
		<lastmod>2026-03-27T22:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-investigating-breach-after-amazon-cloud-account-hack/</loc>
		<lastmod>2026-03-27T22:53:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anti-piracy-coalition-takes-down-animeplay-app-with-5-million-users/</loc>
		<lastmod>2026-03-27T22:54:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements/</loc>
		<lastmod>2026-03-27T22:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-police-discloses-security-breach-after-phishing-attack/</loc>
		<lastmod>2026-03-27T22:55:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bind-9-security-flaws-allow-attackers-to-bypass-security-controls-and-crash-servers/</loc>
		<lastmod>2026-03-27T22:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-critical-aquasecurity-trivy-scanner-vulnerability-to-kev-catalog/</loc>
		<lastmod>2026-03-27T22:59:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-cyberattack-targets-japanese-businesses-with-tax-themed-phishing-scams/</loc>
		<lastmod>2026-03-27T23:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-hackers-focus-on-ai-developers-planting-malicious-code-to-disrupt-projects/</loc>
		<lastmod>2026-03-27T23:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-target-south-asian-financial-firm-with-brushworm-and-brushlogger-attacks/</loc>
		<lastmod>2026-03-27T23:02:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/red-hat-warns-of-malware-embedded-in-popular-linux-tool-opening-doors-for-unauthorized-access/</loc>
		<lastmod>2026-03-27T23:04:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-deploy-usb-malware-rats-and-stealers-in-southeast-asian-government-attacks/</loc>
		<lastmod>2026-03-27T23:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-error-reporting-vulnerability-exposes-systems-to-privilege-escalation-allowing-system-access/</loc>
		<lastmod>2026-03-27T23:05:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-zip-files-used-to-deploy-pxa-stealer-targeting-financial-firms/</loc>
		<lastmod>2026-03-27T23:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-implant-stealthy-bpfdoor-backdoors-in-telecom-networks-for-persistent-access/</loc>
		<lastmod>2026-03-27T23:07:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-upgrades-the-backdoor-it-uses-to-spy-on-telcos-globally/</loc>
		<lastmod>2026-03-27T23:09:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wartime-usage-of-compromised-ip-cameras-highlight-their-danger/</loc>
		<lastmod>2026-03-27T23:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infrastructure-attacks-with-physical-consequences-down-25/</loc>
		<lastmod>2026-03-27T23:11:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-sets-2029-deadline-for-quantum-safe-cryptography/</loc>
		<lastmod>2026-03-27T23:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coruna-darksword-democratizing-nation-state-exploit-kits/</loc>
		<lastmod>2026-03-27T23:14:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-organizations-can-use-mistakes-to-level-up-their-security-programs/</loc>
		<lastmod>2026-03-27T23:15:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/</loc>
		<lastmod>2026-03-27T23:15:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files/</loc>
		<lastmod>2026-03-27T23:17:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/</loc>
		<lastmod>2026-03-27T23:17:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/</loc>
		<lastmod>2026-03-27T23:19:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion-2/</loc>
		<lastmod>2026-03-27T23:19:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-are-at-war/</loc>
		<lastmod>2026-03-27T23:20:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/</loc>
		<lastmod>2026-03-27T23:21:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/</loc>
		<lastmod>2026-03-27T23:22:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wave-of-aitm-phishing-targets-tiktok-for-business/</loc>
		<lastmod>2026-03-27T23:24:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-targets-telnyx-package-in-latest-pypi-software-supply-chain-attack/</loc>
		<lastmod>2026-03-27T23:26:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-computing-threat-to-encryption-is-closer-than-expected-warns-google/</loc>
		<lastmod>2026-03-27T23:26:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cracks-down-on-chinese-crypto-marketplace-for-funding-southeast-asia-scam-hubs/</loc>
		<lastmod>2026-03-27T23:27:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-npm-und-vs-code-betroffen-neue-glassworm-angriffswelle-trifft-hunderte-von-repositories-und-pakete/</loc>
		<lastmod>2026-03-27T23:28:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entra-id-als-zentrale-achillesferse-von-flughafen-wenn-identitatssysteme-ausfallen-steht-der-ganze-flughafen-still/</loc>
		<lastmod>2026-03-27T23:30:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/analyse-von-sophos-cyberkriminelle-nutzen-vms-massenhaft-aus/</loc>
		<lastmod>2026-03-27T23:30:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-113-digital-souveran-aber-ohne-den-hype/</loc>
		<lastmod>2026-03-27T23:31:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hochentwickelte-plugx-malware-nutzt-nahostkonflikt-als-lockmittel/</loc>
		<lastmod>2026-03-27T23:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-holt-veena-bricker-als-neue-personalchefin-an-bord/</loc>
		<lastmod>2026-03-27T23:35:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/keepit-annual-data-report-2026-zeigt-nachholbedarf-bei-der-wiederherstellung-von-daten-im-ernstfall/</loc>
		<lastmod>2026-03-27T23:35:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-schlaferzellen-versteckte-linux-malware-in-telko-netzwerken-entdeckt/</loc>
		<lastmod>2026-03-27T23:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parteizentrale-der-linken-gehackt/</loc>
		<lastmod>2026-03-27T23:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parteizentrale-der-linken-gehackt-2/</loc>
		<lastmod>2026-03-27T23:38:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/laufende-angriffe-gefahrden-fast-1-000-sharepoint-instanzen/</loc>
		<lastmod>2026-03-27T23:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erpressungen-erwartet-hacker-wollen-riesige-supply-chain-attacke-zu-geld-machen/</loc>
		<lastmod>2026-03-27T23:40:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-darksword-version-geleakt-warum-dieses-exploit-kit-millionen-iphones-hacken-kann/</loc>
		<lastmod>2026-03-27T23:41:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-ensure-confident-data-privacy-with-nhis/</loc>
		<lastmod>2026-03-27T23:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-empowered-are-security-teams-with-agentic-ai/</loc>
		<lastmod>2026-03-27T23:44:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-nhis-relieve-compliance-burdens/</loc>
		<lastmod>2026-03-27T23:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-mythos-leak-is-a-wake-up-call-phishing-3-0-is-already-here/</loc>
		<lastmod>2026-03-27T23:45:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-data-stolen-in-a-cyberattack-on-the-infrastructure-hosting-its-web-sites/</loc>
		<lastmod>2026-03-27T23:47:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-girds-for-looming-iot-security-regulations/</loc>
		<lastmod>2026-03-27T23:48:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-treasury-weighs-cyber-insurance-backstop/</loc>
		<lastmod>2026-03-27T23:49:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/</loc>
		<lastmod>2026-03-27T23:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-walk-away-from-breachforums-leak-300000-user-database/</loc>
		<lastmod>2026-03-27T23:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-european-commission-confirmed-a-cyberattack-affecting-part-of-its-cloud-systems/</loc>
		<lastmod>2026-03-27T23:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-supply-chain-attack-exposes-credentials-across-ai-ecosystems/</loc>
		<lastmod>2026-03-27T23:54:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-parliament-rejects-chat-control-message-scanning/</loc>
		<lastmod>2026-03-27T23:54:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-no-easy-fixes-for-expanding-ai-attack-surface-but-a-coordinated-response-is-emerging/</loc>
		<lastmod>2026-03-28T00:31:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startups-und-scaleups-der-digitalwirtschaft-betroffen-bitkom-kritisiert-berliner-ausbildungsplatzumlage/</loc>
		<lastmod>2026-03-28T00:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-isaca-studie-enthullt-blinden-fleck-unternehmensrisiko-unkontrollierter-ki-einsatz/</loc>
		<lastmod>2026-03-28T00:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-of-confidence-27-march-2026/</loc>
		<lastmod>2026-03-28T04:31:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staff-too-scared-of-the-ai-axe-to-pick-it-up-forrester-finds/</loc>
		<lastmod>2026-03-28T04:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-handala-hackers-breach-fbi-chief-kash-patels-gmail/</loc>
		<lastmod>2026-03-28T04:34:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-confirms-cyberattack-after-aws-account-breach/</loc>
		<lastmod>2026-03-28T05:31:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vsx-scanner-vulnerability-lets-malicious-extensions-go-live/</loc>
		<lastmod>2026-03-28T07:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-euro-goes-full-sovereignty-mode-us-cloud-giants-not-on-guest-list/</loc>
		<lastmod>2026-03-28T08:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-f5-big-ip-amp-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-28T08:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-panel-wraps-up-rsac-2026-on-ai-ot-risks/</loc>
		<lastmod>2026-03-28T08:35:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta446-deploys-leaked-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/</loc>
		<lastmod>2026-03-28T08:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/</loc>
		<lastmod>2026-03-28T08:38:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/txone-ot-ics-report-cyberangriffe-auf-produktionsnetze-erreichen-neues-rekordniveau/</loc>
		<lastmod>2026-03-28T08:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-shift-left-security/</loc>
		<lastmod>2026-03-28T09:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-exploiting-rce-vulnerability-in-big-ip-apm-systems-cve-2025-53521/</loc>
		<lastmod>2026-03-28T09:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-certificate-loader-hides-blankgrabber-malware-chain/</loc>
		<lastmod>2026-03-28T09:34:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/</loc>
		<lastmod>2026-03-28T09:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/</loc>
		<lastmod>2026-03-28T10:32:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-group-handala-hacked-fbi-director-kash-patels-personal-email-account/</loc>
		<lastmod>2026-03-28T11:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-browser-extensions-hijack-users-ai-chats-in-new-prompt-poaching-attack/</loc>
		<lastmod>2026-03-28T11:35:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-authentication-starts-with-secure-software-development/</loc>
		<lastmod>2026-03-28T12:31:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passwordless-for-service-smb-software-where-friction-actually-kills-revenue/</loc>
		<lastmod>2026-03-28T12:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-lacks-ambition-to-fight-tax-fraud-says-pac/</loc>
		<lastmod>2026-03-28T13:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-agenten-verantwortung-ubernehmen-wie-jfrog-und-nvidia-sicherheit-neu-denken/</loc>
		<lastmod>2026-03-28T13:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apples-last-tower-topples%c2%a6-and-the-others-will-follow/</loc>
		<lastmod>2026-03-28T14:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-group-to-compensate-450000-customers-after-app-glitch/</loc>
		<lastmod>2026-03-28T14:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/</loc>
		<lastmod>2026-03-28T15:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-data-to-intelligence-why-more-signals-dont-equal-better-security/</loc>
		<lastmod>2026-03-28T16:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-good-models-gone-bad-visualizing-data-poisoning-with-gephi/</loc>
		<lastmod>2026-03-28T16:34:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/netzwerke-der-fluggesellschaften-insbesondere-durch-osterreiseverkehr-und-globale-unsicherheiten-auf-die-probe-gestellt/</loc>
		<lastmod>2026-03-28T16:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-the-ai-coding-boom-is-rewriting-application-security/</loc>
		<lastmod>2026-03-28T16:35:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-companies-should-confront-q-day/</loc>
		<lastmod>2026-03-28T16:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-eu-plans-to-improve-its-global-cyber-ecosystem/</loc>
		<lastmod>2026-03-28T16:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-the-hack-of-the-european-commission/</loc>
		<lastmod>2026-03-28T17:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-startup-cyber-funding-boom-creates-execution-risks-2/</loc>
		<lastmod>2026-03-28T17:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-startup-cyber-funding-boom-creates-execution-risks/</loc>
		<lastmod>2026-03-28T17:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-connected-vehicles-expand-cyber-risk-surface/</loc>
		<lastmod>2026-03-28T17:34:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-outpacing-enterprise-security-controls-2/</loc>
		<lastmod>2026-03-28T17:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-outpacing-enterprise-security-controls/</loc>
		<lastmod>2026-03-28T17:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/</loc>
		<lastmod>2026-03-28T17:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/duckier-der-kostenlose-vpn-dienst-von-ddownload/</loc>
		<lastmod>2026-03-28T19:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-350gb-data-breach-at-european-commission/</loc>
		<lastmod>2026-03-28T19:34:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/folk-are-getting-dangerously-attached-to-ai-that-always-tells-them-theyre-right/</loc>
		<lastmod>2026-03-28T21:39:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-nhis-in-dynamic-markets/</loc>
		<lastmod>2026-03-28T22:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-agentic-ai-impenetrable-by-cyber-threats/</loc>
		<lastmod>2026-03-28T22:35:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/can-agentic-ai-keep-you-ahead-in-cybersecurity/</loc>
		<lastmod>2026-03-28T22:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-2026-voraus-bsi-ruft-zur-datensicherung-auf/</loc>
		<lastmod>2026-03-29T00:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-wird-nicht-an-der-technologie-scheitern-sondern-am-faktor-mensch/</loc>
		<lastmod>2026-03-29T00:34:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-admits-capita-pension-portal-was-crapita-at-launch/</loc>
		<lastmod>2026-03-29T03:31:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-urgent-lock-screen-warnings-for-unpatched-iphones-and-ipads/</loc>
		<lastmod>2026-03-29T03:32:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-wikipediaverbot-fur-kitexte-ist-ein-weckruf-fur-unternehmen/</loc>
		<lastmod>2026-03-29T05:35:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-versus-ai-the-future-of-cyber-defense/</loc>
		<lastmod>2026-03-29T05:36:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-legt-die-schwerwiegendsten-datenlecks-im-jahr-2025-offen/</loc>
		<lastmod>2026-03-29T05:32:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-einhaltung-von-nis2-wird-nicht-an-der-technik-scheitern-sondern-an-den-menschen/</loc>
		<lastmod>2026-03-29T06:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-practices-zur-single-sign-on-absicherung/</loc>
		<lastmod>2026-03-29T06:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-practices-zur-single-sign-on-absicherung-2/</loc>
		<lastmod>2026-03-29T06:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/where-ai-labs-will-and-wont-disrupt-cybersecurity/</loc>
		<lastmod>2026-03-29T06:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-redefine-enterprise-cybersecurity-risk/</loc>
		<lastmod>2026-03-29T06:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-ai-awareness-training-for-texas-government-agencies-how-kratikals-threatcop-meets-the-dir-mandate/</loc>
		<lastmod>2026-03-29T07:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datensouveranitat-jedes-dritte-unternehmen-war-2025-von-einem-vorfall-betroffen/</loc>
		<lastmod>2026-03-29T07:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-nist-updates-dns-security-guidance-compromised-litellm-pypi-packages/</loc>
		<lastmod>2026-03-29T08:34:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1password-ist-dir-zu-teuer-diese-europaischen-passwort-manager-kannst-du-sogar-teilweise-kostenlos-nutzen/</loc>
		<lastmod>2026-03-29T08:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/commercial-space-pleads-with-nasa-to-stop-moving-the-goalposts-in-orbit/</loc>
		<lastmod>2026-03-29T09:31:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-569-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-03-29T10:32:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-threat-landscape-digest-january-february-2026/</loc>
		<lastmod>2026-03-29T11:32:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tells-crusty-old-kernel-drivers-to-get-with-the-windows-hardware-compatibility-program/</loc>
		<lastmod>2026-03-29T11:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gruppe-mit-verbindungen-zum-iran-epostfach-von-fbi-direktor-gehackt/</loc>
		<lastmod>2026-03-29T11:34:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-highlights-from-agentic-ai-to-active-defense/</loc>
		<lastmod>2026-03-29T12:31:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-90/</loc>
		<lastmod>2026-03-29T13:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/urgent-alert-netscaler-bug-cve-2026-3055-probed-by-attackers-could-leak-sensitive-data/</loc>
		<lastmod>2026-03-29T14:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-a-new-xz-every-day-paul-novarese-on-the-collapse-of-oss-supply-chain-security/</loc>
		<lastmod>2026-03-29T15:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/</loc>
		<lastmod>2026-03-29T15:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites-2/</loc>
		<lastmod>2026-03-29T15:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-confirms-hack-of-director-patels-personal-email-inbox/</loc>
		<lastmod>2026-03-29T22:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-role-does-innovation-play-in-agentic-ai-development/</loc>
		<lastmod>2026-03-29T23:33:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-nhis-fully-supported-for-optimal-performance/</loc>
		<lastmod>2026-03-29T23:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euro-office-wirtschaftsinitiative-startet-souverane-office-alternative/</loc>
		<lastmod>2026-03-29T23:35:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attribute-based-access-control-for-ai-capability-negotiation/</loc>
		<lastmod>2026-03-30T03:32:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-count-on-government-guidance-after-a-smart-home-breach/</loc>
		<lastmod>2026-03-30T04:32:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fifa-world-cup-2026-a-match-between-fans-and-scammers/</loc>
		<lastmod>2026-03-30T05:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-tracking-risk-inside-your-tires/</loc>
		<lastmod>2026-03-30T05:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-march-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</loc>
		<lastmod>2026-03-30T05:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/planning-a-spring-break-trip-dont-fall-for-these-7-travel-scams/</loc>
		<lastmod>2026-03-30T05:37:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-foreign-router-ban-criticized-for-being-industrial-policy-disguised-as-cybersecurity/</loc>
		<lastmod>2026-03-30T05:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shipsec-studio-brings-open-source-workflow-orchestration-to-security-operations/</loc>
		<lastmod>2026-03-30T05:38:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breaking-out-can-ai-agents-escape-their-sandboxes/</loc>
		<lastmod>2026-03-30T05:40:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/voidlink-proves-ai-assisted-malware-is-no-longer-experimental/</loc>
		<lastmod>2026-03-30T05:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-actively-exploited-f5-big-ip-vulnerability-in-ongoing-attacks/</loc>
		<lastmod>2026-03-30T05:41:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uneinigkeit-uber-ausnutzung-sharepoint-schwachstelle-fuhrt-zu-remote-code-ausfuhrung/</loc>
		<lastmod>2026-03-30T05:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-resilienzmasstabe-setzen-warum-backup-allein-nicht-mehr-ausreicht/</loc>
		<lastmod>2026-03-30T06:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backups-testen-schutzen-und-wiederherstellen/</loc>
		<lastmod>2026-03-30T06:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datensicherung-in-zeiten-der-cloud-die-unterschatzte-verantwortung-fur-backups-in-microsoft-365/</loc>
		<lastmod>2026-03-30T06:34:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-risk-alone-doesnt-get-you-to-yes/</loc>
		<lastmod>2026-03-30T06:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-probe-citrix-netscaler-systems-ahead-of-suspected-cve-2026-3055-exploitation/</loc>
		<lastmod>2026-03-30T06:37:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-latest-ai-test-pressures-cybersecurity-stocks-lower/</loc>
		<lastmod>2026-03-30T06:38:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/im-interview-mit-christoph-schuhwerk-von-zscaler-wer-sich-noch-nicht-mit-resilienz-beschaftigt-hat-muss-es-jetzt-tun/</loc>
		<lastmod>2026-03-30T06:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-eu-cra-treating-cybersecurity-as-product-liability/</loc>
		<lastmod>2026-03-30T07:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tailscale-funnel-ermoglicht-das-port-forwarding-bei-mullvad/</loc>
		<lastmod>2026-03-30T07:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/systemrescue-13-updates-its-kernel-to-linux-6-18-lts-adds-new-recovery-tools/</loc>
		<lastmod>2026-03-30T07:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-confirms-data-breach-after-europa-eu-hack/</loc>
		<lastmod>2026-03-30T07:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canisterworm-targets-docker-kubernetes-and-redis-to-steal-secrets/</loc>
		<lastmod>2026-03-30T07:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gezielte-angriffe-uber-pfadermittlung-sicherheitslucke-im-wing-ftp-server-wird-aktiv-ausgenutzt/</loc>
		<lastmod>2026-03-30T07:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-stoppt-verteilung-neue-update-panne-bei-windows-11/</loc>
		<lastmod>2026-03-30T07:39:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufdeckung-von-rund-15-500-bosartigen-domains-2/</loc>
		<lastmod>2026-03-30T08:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufdeckung-von-rund-15-500-bosartigen-domains-3/</loc>
		<lastmod>2026-03-30T08:32:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aufdeckung-von-rund-15-500-bosartigen-domains/</loc>
		<lastmod>2026-03-30T08:32:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smart-homes-are-getting-smarter-but-post-breach-guidance-is-falling-behind/</loc>
		<lastmod>2026-03-30T08:32:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-ta446-uses-darksword-exploit-to-target-iphone-users-in-phishing-wave/</loc>
		<lastmod>2026-03-30T08:34:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-linked-apt-ta446-uses-darksword-exploit-to-target-iphone-users-in-phishing-wave-2/</loc>
		<lastmod>2026-03-30T08:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/</loc>
		<lastmod>2026-03-30T08:36:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-best-data-loss-prevention-software-in-2026/</loc>
		<lastmod>2026-03-30T08:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-key-winre-and-setup-updates-to-prepare-for-2026-secure-boot-changes/</loc>
		<lastmod>2026-03-30T08:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/</loc>
		<lastmod>2026-03-30T08:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-grafana-flaws-allow-attackers-to-achieve-remote-code-execution/</loc>
		<lastmod>2026-03-30T08:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-user-behavior-is-the-primary-entry-point-for-cyberattacks/</loc>
		<lastmod>2026-03-30T09:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-openclaws-agent-skills-become-an-attack-surface/</loc>
		<lastmod>2026-03-30T09:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-trends-redefining-organizations-future-with-iam/</loc>
		<lastmod>2026-03-30T09:34:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wedium-will-tiktok-angreifen-und-baut-dafur-eine-ausweisschranke/</loc>
		<lastmod>2026-03-30T09:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-struggling-with-chinese-competition-its-own-safety-obsession/</loc>
		<lastmod>2026-03-30T09:37:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macos-infinity-stealer-uses-nuitka-python-payload-and-clickfix/</loc>
		<lastmod>2026-03-30T09:37:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bees-and-hummingbirds-arent-just-buzzing-theyre-sipping-trace-booze/</loc>
		<lastmod>2026-03-30T09:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-confirms-cloud-data-breach/</loc>
		<lastmod>2026-03-30T09:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-unterschatzte-risiko-hypervisor-wechsel-und-die-folgen-fur-die-datensicherheit/</loc>
		<lastmod>2026-03-30T09:40:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-kontrollverlust-und-comeback-die-macht-der-datensicherung/</loc>
		<lastmod>2026-03-30T09:41:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-hacker-attackieren-cloud-infrastruktur-der-eu-kommission/</loc>
		<lastmod>2026-03-30T09:43:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-kubernetes-controllers-are-the-perfect-backdoor/</loc>
		<lastmod>2026-03-30T10:34:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/theoretische-fuhrerscheinprufung-betrug-gefahrdet-verkehrssicherheit/</loc>
		<lastmod>2026-03-30T10:34:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/konfigurationen-der-world-backup-day-sollte-backups-jenseits-purer-datensicherung-propagieren/</loc>
		<lastmod>2026-03-30T10:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-scams-steps-up-to-online-fraud-challenge/</loc>
		<lastmod>2026-03-30T10:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-laura-price-cyber-skills-partnership-lead-at-bt/</loc>
		<lastmod>2026-03-30T10:37:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-back-up-day-2026-what-are-the-takeaways/</loc>
		<lastmod>2026-03-30T10:39:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-pulls-kb5079391-windows-update-over-install-issues/</loc>
		<lastmod>2026-03-30T10:39:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telnyx-python-sdk-backdoored-on-pypi-to-steal-cloud-credentials/</loc>
		<lastmod>2026-03-30T10:40:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlient-ems-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-30T10:41:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stored-xss-vulnerability-in-jira-work-management-could-enable-full-organization-takeover/</loc>
		<lastmod>2026-03-30T10:43:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/</loc>
		<lastmod>2026-03-30T10:44:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-und-ot-verschmelzen-zu-cyber-physischen-systemen-wenn-vernetzte-maschinen-manipuliert-werden-droht-lebensgefahr/</loc>
		<lastmod>2026-03-30T10:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arztpraxen-schatten-ki-nutzung-trotz-datenschutzbedenken/</loc>
		<lastmod>2026-03-30T10:46:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-hacker-erpressen-gelahmte-und-hirngeschadigte-patienten/</loc>
		<lastmod>2026-03-30T10:47:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/charity-fraud-how-to-avoid-falling-for-fake-donation-campaigns/</loc>
		<lastmod>2026-03-30T11:32:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apis-are-the-new-perimeter-heres-how-cisos-are-securing-them/</loc>
		<lastmod>2026-03-30T11:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-fueled-cyberattacks-surge-in-uae-amid-rising-regional-tensions/</loc>
		<lastmod>2026-03-30T11:35:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-admits-attackers-broke-into-public-web-systems-but-says-little-else/</loc>
		<lastmod>2026-03-30T11:35:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-uses-fake-ringtone-file-in-tainted-telnyx-sdk-to-steal-credentials/</loc>
		<lastmod>2026-03-30T11:36:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlient-ems-flaw-exploited-for-remote-code-execution/</loc>
		<lastmod>2026-03-30T11:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-tweaks-location-privacy-with-one-time-access/</loc>
		<lastmod>2026-03-30T11:38:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now/</loc>
		<lastmod>2026-03-30T11:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-homoglyph-tricks-let-cybercriminals-mimic-trusted-domains/</loc>
		<lastmod>2026-03-30T11:40:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ico-fines-uk-nuisance-call-scammers-100000/</loc>
		<lastmod>2026-03-30T11:41:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hilfe-bei-scam-ki-oma-hilde-hat-bereits-3-000-anfragen-beantwortet/</loc>
		<lastmod>2026-03-30T11:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-march-23-march-29/</loc>
		<lastmod>2026-03-30T12:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/second-data-breach-at-european-commission-this-year-leaves-open-questions-over-resilience/</loc>
		<lastmod>2026-03-30T12:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-evades-powershell-detection-via-rundll32-and-webdav/</loc>
		<lastmod>2026-03-30T12:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugin-flaw-exposes-sensitive-data-across-800000-sites/</loc>
		<lastmod>2026-03-30T12:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta446-uses-darksword-exploit-kit-to-target-iphone-users/</loc>
		<lastmod>2026-03-30T12:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/</loc>
		<lastmod>2026-03-30T12:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-citrix-netscaler-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-03-30T12:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackergruppe-qilin-unter-verdacht-cyberangriff-auf-die-linke/</loc>
		<lastmod>2026-03-30T12:40:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-treibt-resilienz-und-wachstum-ausfalle-werden-zum-millionenrisiko/</loc>
		<lastmod>2026-03-30T12:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-tabletop-exercise-scenarios-every-cybersecurity-team-should-practice-in-2026/</loc>
		<lastmod>2026-03-30T13:35:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-recap-from-ai-hype-to-real-saas-security-outcomes/</loc>
		<lastmod>2026-03-30T13:36:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fireside-chat-ai-gives-rise-to-a-semantic-attack-surface-forcing-a-new-class-of-network-defense/</loc>
		<lastmod>2026-03-30T13:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ccpa-rules-turn-your-privacy-policy-into-a-liability/</loc>
		<lastmod>2026-03-30T13:37:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-software-firm-carecloud-informs-sec-of-potential-patient-data-leak/</loc>
		<lastmod>2026-03-30T13:39:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-department-reissues-10-million-reward-for-info-on-iranian-hackers/</loc>
		<lastmod>2026-03-30T13:39:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30th-march-threat-intelligence-report/</loc>
		<lastmod>2026-03-30T13:40:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-fortinet-forticlient-ems-bug-under-active-attack-cve-2026-21643/</loc>
		<lastmod>2026-03-30T13:42:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-it-worker-used-stolen-identity-ai-generated-resume-in-job-scam/</loc>
		<lastmod>2026-03-30T13:42:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crysome-rat-stealthy-net-malware-adds-av-killer-hvnc-features/</loc>
		<lastmod>2026-03-30T13:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/india-set-to-ban-hikvision-tp-link-devices-in-april/</loc>
		<lastmod>2026-03-30T13:46:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepload-malware-combines-clickfix-with-ai-generated-code-to-avoid-detection/</loc>
		<lastmod>2026-03-30T13:48:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-vier-schritten-die-m365-tenant-resilienz-starken-die-vier-grosten-risiken-fur-den-microsoft-365-tenant/</loc>
		<lastmod>2026-03-30T13:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vdefends-built-in-advantage-enable-closed-loop-lateral-security-for-zero-trust-private-cloud/</loc>
		<lastmod>2026-03-30T14:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-good-enough-products-are-getting-destroyed-in-the-ai-era/</loc>
		<lastmod>2026-03-30T14:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-spotlight-dimitris-georgiou-on-building-security-that-serves-people-first/</loc>
		<lastmod>2026-03-30T14:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-restores-most-manufacturing-after-cyberattack/</loc>
		<lastmod>2026-03-30T14:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-downplays-shinyhunters-cyberattack-impact/</loc>
		<lastmod>2026-03-30T14:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-court-sentences-notorious-card-fraud-ringleader-flint-and-25-associates/</loc>
		<lastmod>2026-03-30T14:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/</loc>
		<lastmod>2026-03-30T14:40:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-report-zeigt-einen-deutlichen-anstieg-bei-synthetischem-identitatsbetrug/</loc>
		<lastmod>2026-03-30T14:40:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-bug-exploited-in-days-may-be-multiple-flaws-in-a-trench-coat/</loc>
		<lastmod>2026-03-30T14:41:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dark-web-market-lists-alleged-375tb-lockheed-martin-data-for-600m/</loc>
		<lastmod>2026-03-30T14:42:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-breach-fbi-director-kash-patels-email-leak-messages-online/</loc>
		<lastmod>2026-03-30T14:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-deploy-ctrl-for-rdp-hijacking/</loc>
		<lastmod>2026-03-30T14:44:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exposed-server-leaks-thegentlemen-ransomware-toolkit-credentials-and-ngrok-tokens/</loc>
		<lastmod>2026-03-30T14:46:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/achtung-vor-phishing-hacker-stehlen-18-millionen-kundendaten-von-asgoodasnew/</loc>
		<lastmod>2026-03-30T14:47:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks-2/</loc>
		<lastmod>2026-03-30T15:34:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/its-a-mystery-alleged-unpatched-telegram-zero-day-allows-device-takeover-but-telegram-denies/</loc>
		<lastmod>2026-03-30T15:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/</loc>
		<lastmod>2026-03-30T15:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking/</loc>
		<lastmod>2026-03-30T15:37:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/</loc>
		<lastmod>2026-03-30T15:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-soc-process-fixes-that-unlock-tier-1-productivity/</loc>
		<lastmod>2026-03-30T15:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passkeys-hit-critical-mass-microsoft-auto-enables-for-millions-87-of-companies-deploy-as-passwords-near-end-of-life/</loc>
		<lastmod>2026-03-30T16:34:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-macos-security-feature-will-alert-users-about-possible-clickfix-attacks/</loc>
		<lastmod>2026-03-30T16:34:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/citrix-netscaler-products-confirmed-to-be-under-exploitation/</loc>
		<lastmod>2026-03-30T16:35:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-observed-malware-campaign-likely-combines-ai-and-clickfix/</loc>
		<lastmod>2026-03-30T16:36:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-top-cybersecurity-ceos-on-the-future-of-ai-agents-rsac-2026/</loc>
		<lastmod>2026-03-30T16:37:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-will-hide-your-email-address-from-apps-and-websites-but-not-cops/</loc>
		<lastmod>2026-03-30T16:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-rausch-und-qualitats-kater/</loc>
		<lastmod>2026-03-30T16:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/am-worldday-geht-es-nicht-mehr-nur-um-datensicherung-sondern-auch-um-das-identitats-und-zugriffsmanagement/</loc>
		<lastmod>2026-03-30T16:40:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldday-mehr-als-nur-schutz-vor-ransomware/</loc>
		<lastmod>2026-03-30T16:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstelle-bei-chatgpt-erlaubte-konversationsdaten-auszulesen/</loc>
		<lastmod>2026-03-30T16:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcps-attack-spree-slows-but-threat-escalates-with-ransomware-pivot/</loc>
		<lastmod>2026-03-30T16:44:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-fbi-director-breach-reveals-about-executive-digital-exposure/</loc>
		<lastmod>2026-03-30T17:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-start-recon-exploit-a-framework-for-desktop-app-pentesting/</loc>
		<lastmod>2026-03-30T17:34:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forrester-threat-intelligence-landscape-key-takeaways-for-security-leaders/</loc>
		<lastmod>2026-03-30T17:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-year-old-strongswan-flaw-lets-attackers-crash-vpns-via-integer-underflow/</loc>
		<lastmod>2026-03-30T17:36:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/24-7-payments-for-24-7-agents-the-case-for-crypto-in-the-machine-economy/</loc>
		<lastmod>2026-03-30T17:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/under-fire-attackers-target-flaws-in-f5-and-citrix-gear/</loc>
		<lastmod>2026-03-30T17:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-is-back-and-the-certificate-automation-gap-is-impossible-to-ignore/</loc>
		<lastmod>2026-03-30T17:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials/</loc>
		<lastmod>2026-03-30T17:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rubrik-bringt-neue-innovationen-fur-msp-gesteuerte-cyber-resilienz/</loc>
		<lastmod>2026-03-30T17:41:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-regulator-fines-financial-giant-36-million-for-data-protection-failures/</loc>
		<lastmod>2026-03-30T18:32:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wave-browser-brings-gaming-tools-and-ocean-cleanup-into-the-same-tab/</loc>
		<lastmod>2026-03-30T18:34:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-fraud-becomes-a-ciso-level-security-threat/</loc>
		<lastmod>2026-03-30T18:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-brews-over-critical-no-click-telegram-flaw/</loc>
		<lastmod>2026-03-30T18:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gruppe-mit-verbindungen-zum-iran-epostfach-des-fbi-direktors-gehackt/</loc>
		<lastmod>2026-03-30T18:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-readiness-in-the-age-of-mythos-when-your-ai-thinks-learns-and-defends/</loc>
		<lastmod>2026-03-30T19:34:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-say-credential-stealing-campaign-used-ai-to-build-evasion-at-every-stage/</loc>
		<lastmod>2026-03-30T19:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/partei-die-linke-wurde-opfer-eines-cyberangriffs/</loc>
		<lastmod>2026-03-30T19:36:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-groups-target-southeast-asian-government-with-advanced-malware-in-2025/</loc>
		<lastmod>2026-03-30T19:38:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepseek-outage-shakes-ai-service-used-by-355m-worldwide/</loc>
		<lastmod>2026-03-30T19:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-30T19:39:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manufacturing-and-healthcare-share-struggles-with-passwords/</loc>
		<lastmod>2026-03-30T19:40:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-risk-management-explained-through-star-wars/</loc>
		<lastmod>2026-03-30T20:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-patches-chatgpt-flaw-that-smuggled-data-over-dns/</loc>
		<lastmod>2026-03-30T20:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-big-ip-vulnerability-reclassified-as-rce-under-exploitation/</loc>
		<lastmod>2026-03-30T20:34:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability/</loc>
		<lastmod>2026-03-30T20:36:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/while-tsa-made-headlines-cisa-went-dark/</loc>
		<lastmod>2026-03-30T21:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-codex-vulnerability-allowed-attackers-to-steal-github-tokens/</loc>
		<lastmod>2026-03-30T21:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-visibility-to-action-modernizing-security-operations-with-cisco-optiv-and-splunk/</loc>
		<lastmod>2026-03-30T21:35:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-gives-new-details-on-cyber-command-personnel-reform/</loc>
		<lastmod>2026-03-30T21:35:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-based-ehr-vendor-notifies-sec-about-hacking-incident/</loc>
		<lastmod>2026-03-30T21:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/</loc>
		<lastmod>2026-03-30T21:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oasis-raises-120m-series-b-to-safeguard-agentic-identities/</loc>
		<lastmod>2026-03-30T22:32:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-cyberthreats-test-us-infrastructure-defenses/</loc>
		<lastmod>2026-03-30T22:34:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-vishing-campaigns-abuse-online-services-to-evade-anti-spam-filters/</loc>
		<lastmod>2026-03-30T22:35:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data/</loc>
		<lastmod>2026-03-30T22:35:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-deepload-malware-steals-credentials-evades-detection/</loc>
		<lastmod>2026-03-30T22:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation/</loc>
		<lastmod>2026-03-30T22:38:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-im-aufsichtsrat-woran-sich-gremien-kunftig-messen-lassen-mussen/</loc>
		<lastmod>2026-03-30T23:33:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-ai-gateway-startup-litellm-ditches-controversial-startup-delve/</loc>
		<lastmod>2026-03-30T23:34:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pq-compliant-secure-multi-party-computation-for-model-contexts/</loc>
		<lastmod>2026-03-31T03:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-should-you-be-excited-about-agentic-ai-in-cybersecurity/</loc>
		<lastmod>2026-03-31T03:34:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-you-be-certain-your-ai-is-compliant/</loc>
		<lastmod>2026-03-31T03:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-hit-by-another-exploited-cybersecurity-flaw/</loc>
		<lastmod>2026-03-31T03:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kkh-gibt-eltern-tipps-um-kinder-vor-digitalem-stress-zu-bewahren/</loc>
		<lastmod>2026-03-31T03:38:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-democratizing-finance-but-also-redefining-risk/</loc>
		<lastmod>2026-03-31T03:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kernel-observability-for-data-movement/</loc>
		<lastmod>2026-03-31T03:39:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/insider-threats-rise-with-north-korean-ai-hiring-fraud-schemes/</loc>
		<lastmod>2026-03-31T03:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-exploit-tax-season-with-new-phishing-tactics/</loc>
		<lastmod>2026-03-31T03:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-it-glitch-exposed-data-of-nearly-500000-banking-customers/</loc>
		<lastmod>2026-03-31T03:42:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-at-scale-how-open-vsx-is-raising-the-bar/</loc>
		<lastmod>2026-03-31T04:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-formaler-compliance-zu-echter-cybersicherheit-im-finanzsektor/</loc>
		<lastmod>2026-03-31T04:34:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-vertrauen-ist-gut-kontrolle-ist-besser/</loc>
		<lastmod>2026-03-31T05:35:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-cybercrime-investigations-gain-ground/</loc>
		<lastmod>2026-03-31T05:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-art-of-making-technical-risk-make-sense-to-executives/</loc>
		<lastmod>2026-03-31T05:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hottest-cybersecurity-open-source-tools-of-the-month-march-2026/</loc>
		<lastmod>2026-03-31T05:38:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-v8-9-3-released-with-fixes-for-curl-security-flaw-and-crash-bugs/</loc>
		<lastmod>2026-03-31T05:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fehlerhafte-paketverwaltung-ubuntu-sicherheitslucke-ermoglicht-angreifern-root-zugriff/</loc>
		<lastmod>2026-03-31T05:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-alert-fatigue-what-european-socs-actually-struggle-with/</loc>
		<lastmod>2026-03-31T06:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-in-security-efficiency-or-blind-spots/</loc>
		<lastmod>2026-03-31T06:34:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-im-done-calling-humans-the-weakest-link/</loc>
		<lastmod>2026-03-31T06:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploiting-critical-f5-big-ip-flaw-in-attacks-patch-now/</loc>
		<lastmod>2026-03-31T06:36:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roadk1ll-malware-turns-hacked-devices-into-network-relays/</loc>
		<lastmod>2026-03-31T06:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-ai-uncovers-zero-day-rce-vulnerabilities-in-vim-and-emacs/</loc>
		<lastmod>2026-03-31T06:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ghostsocks-hijacks-devices-as-proxy-network-for-stealthy-cyberattacks/</loc>
		<lastmod>2026-03-31T06:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-browser-hijacking-a-silent-threat/</loc>
		<lastmod>2026-03-31T07:34:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-man-admits-guilt-in-child-exploitation-cyberstalking-linked-to-764-network/</loc>
		<lastmod>2026-03-31T07:34:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-cyber-resilience-demands-unified-defense/</loc>
		<lastmod>2026-03-31T07:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday/</loc>
		<lastmod>2026-03-31T07:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/carecloud-data-breach-exposes-patient-data-after-hackers-access-it-systems/</loc>
		<lastmod>2026-03-31T07:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepload-malware-uses-clickfix-and-ai-evasion-to-hit-enterprise-networks/</loc>
		<lastmod>2026-03-31T07:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-vulnerability-enabled-silent-leakage-of-prompts-and-sensitive-information/</loc>
		<lastmod>2026-03-31T07:40:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/</loc>
		<lastmod>2026-03-31T07:42:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cra-und-nis2-machen-software-sicherheit-uberprufbar-jenseits-des-vertrauens-software-muss-sicherheit-technisch-belegen/</loc>
		<lastmod>2026-03-31T07:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisoned-axios-npm-account-takeover-50-million-downloads-and-a-rat-that-vanishes-after-install/</loc>
		<lastmod>2026-03-31T08:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fahndung-nach-cyberkriminellen-130-firmen-attackiert/</loc>
		<lastmod>2026-03-31T08:34:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-breach-fbi-directors-personal-email-and-post-his-cv-and-photos-online/</loc>
		<lastmod>2026-03-31T08:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-allegedly-breached-chemical-manufacturer-giant-dow-inc/</loc>
		<lastmod>2026-03-31T08:37:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach/</loc>
		<lastmod>2026-03-31T08:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tax-filing-scams-used-to-deliver-malware-in-new-cybercrime-campaigns/</loc>
		<lastmod>2026-03-31T08:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anderungen-an-gesetzesentwurfen-bundestag-verabschiedet-eu-vorgaben-zum-data-act/</loc>
		<lastmod>2026-03-31T08:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rund-30-000-instanzen-am-netz-citrix-systeme-werden-attackiert/</loc>
		<lastmod>2026-03-31T08:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-persona-in-drei-minuten-in-den-datenschutz-wahnsinn/</loc>
		<lastmod>2026-03-31T08:41:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-quantum-clock-is-ticking-and-your-encryption-is-running-out-of-time/</loc>
		<lastmod>2026-03-31T09:32:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-gets-serious-about-regulation-again/</loc>
		<lastmod>2026-03-31T09:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-aggressively-targets-2029-to-migrate-fully-to-pqc/</loc>
		<lastmod>2026-03-31T09:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-fake-nachrichten-greifen-zugangsdaten-ab/</loc>
		<lastmod>2026-03-31T09:35:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-key-takeaways-from-rsa-conference-2026/</loc>
		<lastmod>2026-03-31T09:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-supply-chain-attack-exposes-developers-to-hidden-malware/</loc>
		<lastmod>2026-03-31T09:37:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drive-now-detects-ransomware-and-helps-restore-affected-files/</loc>
		<lastmod>2026-03-31T09:38:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-introduces-advanced-ransomware-defense-and-recovery-features-in-drive/</loc>
		<lastmod>2026-03-31T09:40:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-adds-clickfix-attack-warnings-in-new-macos-tahoe-security-feature/</loc>
		<lastmod>2026-03-31T09:40:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-urges-immediate-patching-of-f5-big-ip-bug/</loc>
		<lastmod>2026-03-31T09:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patienten-werden-erpresst-cyberangriff-auf-greifswalder-klinik/</loc>
		<lastmod>2026-03-31T09:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-betritt-mit-ki-gestutzten-siem-lakewatch-den-security-markt/</loc>
		<lastmod>2026-03-31T09:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/soc-von-bluevoyant-verhindert-gezielten-social-engineering-angriff-auf-eu-finanzeinrichtung/</loc>
		<lastmod>2026-03-31T09:44:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-pakete-laden-malware-nach-popularer-http-client-axios-kompromittiert/</loc>
		<lastmod>2026-03-31T09:45:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-wird-50-sein-betriebssystem-ist-noch-alter-wie-unix-ins-macbook-kam/</loc>
		<lastmod>2026-03-31T09:46:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shrinking-pqc-timeline-highlights-immediate-risk-to-data-security/</loc>
		<lastmod>2026-03-31T10:40:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rspamd-4-0-0-ships-memory-savings-a-new-scan-protocol-and-a-required-migration-step/</loc>
		<lastmod>2026-03-31T10:40:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/</loc>
		<lastmod>2026-03-31T10:41:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eviltokens-launches-new-phishing-service-targeting-microsoft-accounts/</loc>
		<lastmod>2026-03-31T10:42:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-2026-cyber-resilienz-beginnt-mit-backup-ein-rahmenwerk-fur-messbare-wiederherstellung/</loc>
		<lastmod>2026-03-31T10:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situation-monitors-vs-osint-desinformation-statt-intelligence/</loc>
		<lastmod>2026-03-31T10:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lets-stop-sovereignty-washing/</loc>
		<lastmod>2026-03-31T10:32:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/einbruch-war-gestern-hacker-loggen-sich-heute-einfach-ein/</loc>
		<lastmod>2026-03-31T10:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/8-ways-to-bolster-your-security-posture-on-the-cheap/</loc>
		<lastmod>2026-03-31T10:35:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-external-pressures-redefining-cybersecurity-risk/</loc>
		<lastmod>2026-03-31T10:36:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-in-2025-blending-in-is-the-strategy/</loc>
		<lastmod>2026-03-31T10:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-citrix-netscaler-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-03-31T10:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/change-intelligence-and-deployment-connectors-for-liquibase-secure/</loc>
		<lastmod>2026-03-31T11:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-blast-top-npm-package-backdoored-to-drop-dirty-rat-on-dev-machines/</loc>
		<lastmod>2026-03-31T11:35:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intel-puts-its-data-center-performance-knowledge-on-github/</loc>
		<lastmod>2026-03-31T11:35:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-gizem-acar-tekin-ceo-and-co-founder-of-photarix/</loc>
		<lastmod>2026-03-31T11:37:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-finance-ministry-responds-to-cyberattack-by-taking-systems-offline/</loc>
		<lastmod>2026-03-31T11:37:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telegram-based-resokerrat-adds-screenshot-capture-and-persistence/</loc>
		<lastmod>2026-03-31T11:38:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/png-vulnerabilities-allow-attackers-to-trigger-crashes-and-leak-sensitive-data/</loc>
		<lastmod>2026-03-31T11:39:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-firewall-verteidigt-spitzenplatz-in-den-g2-reports-fruhjahr-2026/</loc>
		<lastmod>2026-03-31T11:40:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/situation-monitors-vs-osint-desinformation-statt-intelligence-2/</loc>
		<lastmod>2026-03-31T11:41:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tcp-vs-udp-difference-examples-future/</loc>
		<lastmod>2026-03-31T12:33:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missed-opportunity-us-governments-absence-from-rsac-conference-leaves-stark-void/</loc>
		<lastmod>2026-03-31T12:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passkey-schwachstelle-bei-google-authenticator/</loc>
		<lastmod>2026-03-31T12:35:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-we-made-trail-of-bits-ai-native-so-far/</loc>
		<lastmod>2026-03-31T12:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-f5-big-ip-flaw-upgraded-to-9-8-rce-exploited-in-the-wild/</loc>
		<lastmod>2026-03-31T12:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dutch-ministry-of-finance-takes-treasury-systems-offline-amid-cyber-incident-investigation/</loc>
		<lastmod>2026-03-31T12:39:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-packages-backdoored-in-supply-chain-attack/</loc>
		<lastmod>2026-03-31T12:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-developers-just-got-a-new-verification-layer/</loc>
		<lastmod>2026-03-31T12:41:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-developers-just-got-a-new-verification-layer-2/</loc>
		<lastmod>2026-03-31T12:41:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-outlook-classic-crashes-caused-by-teams-meeting-add-in/</loc>
		<lastmod>2026-03-31T12:42:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/employee-data-breaches-surge-to-seven-year-high/</loc>
		<lastmod>2026-03-31T12:44:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertrauen-in-daten-und-ki-auf-dem-prufstand-veeam-studie-zum-world-backup-day/</loc>
		<lastmod>2026-03-31T12:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-zwei-hacks-in-einem-monat-kryptodieb-kauft-von-millionenbeute-pokemon-karten/</loc>
		<lastmod>2026-03-31T12:46:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/passkeys-vs-bots-do-they-really-solve-the-human-verification-problem/</loc>
		<lastmod>2026-03-31T13:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-reasons-kids-are-overrated-until-suddenly-theyre-your-entire-support-infrastructure/</loc>
		<lastmod>2026-03-31T13:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inventors-of-quantum-cryptography-win-turing-award/</loc>
		<lastmod>2026-03-31T13:35:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-patches-twin-leaks-as-codex-slips-and-chatgpt-spills/</loc>
		<lastmod>2026-03-31T13:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug-by-thursday/</loc>
		<lastmod>2026-03-31T13:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-verborgene-passkey-architektur-des-google-authenticators-konnte-neue-angriffswege-fur-passwortlose-systeme-eroffnen/</loc>
		<lastmod>2026-03-31T13:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/worldday-studie-von-veeam-enthullt-vertrauenskrise-bei-daten-und-ki/</loc>
		<lastmod>2026-03-31T13:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/download-2026-sans-identity-threats-defenses-survey/</loc>
		<lastmod>2026-03-31T13:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-gets-a-rebuilt-console-engine-with-regex-search-sixel-images-and-a-10x-speed-boost/</loc>
		<lastmod>2026-03-31T13:40:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-counters-clickfix-attacks-with-macos-terminal-warning/</loc>
		<lastmod>2026-03-31T13:41:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-launches-encrypted-video-conferencing-and-unified-workspace-to-take-on-google-and-microsoft/</loc>
		<lastmod>2026-03-31T13:42:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-tools-abused-to-kill-av-ahead-of-ransomware-attacks/</loc>
		<lastmod>2026-03-31T13:44:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-packages-breached-in-ongoing-supply-chain-attack/</loc>
		<lastmod>2026-03-31T13:45:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/</loc>
		<lastmod>2026-03-31T13:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/</loc>
		<lastmod>2026-03-31T13:47:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-explores-ways-to-exploit-stolen-supply-chain-secrets/</loc>
		<lastmod>2026-03-31T13:48:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-repository-ready-for-whats-next/</loc>
		<lastmod>2026-03-31T14:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-we-made-trail-of-bits-ai-native-so-far-2/</loc>
		<lastmod>2026-03-31T14:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-hackers-are-on-the-offensive-against-the-us-and-israel/</loc>
		<lastmod>2026-03-31T14:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-truechaos-0-day-exploitation-against-southeast-asian-government-targets/</loc>
		<lastmod>2026-03-31T14:36:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erfolgreicher-cyberangriff-auf-eu-kommission-spielt-angeblich-350-gigabyte-an-daten-in-die-hande-der-shinyhunters/</loc>
		<lastmod>2026-03-31T14:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-poison-axios-npm-package-with-100-million-weekly-downloads/</loc>
		<lastmod>2026-03-31T14:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/carecloud-incident-exposes-patient-data-disrupts-ehr-systems/</loc>
		<lastmod>2026-03-31T14:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backup-day-puts-the-focus-on-data-protection/</loc>
		<lastmod>2026-03-31T14:40:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-stripped-more-than-50-million-from-uranium-crypto-exchange-spent-it-on-trading-cards/</loc>
		<lastmod>2026-03-31T14:41:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-broken-system-that-keeps-shipping-crews-stranded-in-the-strait-of-hormuz/</loc>
		<lastmod>2026-03-31T14:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-categorize-ai-agents-and-prioritize-risk/</loc>
		<lastmod>2026-03-31T14:44:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/</loc>
		<lastmod>2026-03-31T14:44:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/</loc>
		<lastmod>2026-03-31T14:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chatgpt-security-issue-enabled-data-theft-via-single-prompt/</loc>
		<lastmod>2026-03-31T14:46:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/foxveil-neuer-malware-loader-tarnt-sich-in-normalem-webverkehr/</loc>
		<lastmod>2026-03-31T14:47:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-compliance-verspricht-und-risiken-liefert/</loc>
		<lastmod>2026-03-31T14:48:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-considering-cloud-coverage-in-siem-xdr-design-2/</loc>
		<lastmod>2026-03-31T15:33:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-considering-cloud-coverage-in-siem-xdr-design/</loc>
		<lastmod>2026-03-31T15:33:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/between-ai-urgency-and-ai-fatigue-at-rsac-2026/</loc>
		<lastmod>2026-03-31T15:34:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/46-vulnerability-statistics-2026-key-trends-in-discovery-exploitation-and-risk/</loc>
		<lastmod>2026-03-31T15:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-ceo-george-kurtz-on-explosive-ai-growth-potential-for-partners/</loc>
		<lastmod>2026-03-31T15:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-10-coolest-iot-security-companies-the-2026-internet-of-things-50/</loc>
		<lastmod>2026-03-31T15:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-criminal-service-plans-to-monetize-data-stolen-by-ransomware-gangs/</loc>
		<lastmod>2026-03-31T15:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hackers-pose-as-ukraines-cyber-agency-to-target-government-businesses/</loc>
		<lastmod>2026-03-31T15:40:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hackers-pose-as-ukraines-cyber-agency-to-target-government-businesses/</loc>
		<lastmod>2026-03-31T15:40:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hackers-pose-as-ukraines-cyber-agency-to-target-government-businesses/</loc>
		<lastmod>2026-03-31T15:40:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hackers-pose-as-ukraines-cyber-agency-to-target-government-businesses-3/</loc>
		<lastmod>2026-03-31T15:40:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-russian-hackers-pose-as-ukraines-cyber-agency-to-target-government-businesses-2/</loc>
		<lastmod>2026-03-31T15:40:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-data-giant-carecloud-says-hackers-accessed-patients-medical-records/</loc>
		<lastmod>2026-03-31T15:41:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nearly-half-a-million-mobile-customers-of-lloyds-banking-group-affected-by-security-incident/</loc>
		<lastmod>2026-03-31T15:41:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eviltokens-ramps-up-device-code-phishing-targeting-microsoft-365-users/</loc>
		<lastmod>2026-03-31T15:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latest-xloader-obfuscation-methods-and-network-protocol/</loc>
		<lastmod>2026-03-31T16:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-spectacle-rsac-2026-and-the-5-layers-of-ai-security-firetail-blog/</loc>
		<lastmod>2026-03-31T16:34:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synthetic-data-and-gdpr-compliance/</loc>
		<lastmod>2026-03-31T16:35:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paneras-5-1-million-user-breach-when-no-hack-becomes-a-ransomware-business-model/</loc>
		<lastmod>2026-03-31T16:36:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paneras-5-1-million-user-breach-when-no-hack-becomes-a-ransomware-business-model-2/</loc>
		<lastmod>2026-03-31T16:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whats-new-in-tenable-cloud-security-custom-policies-aws-abac-and-research-driven-protection/</loc>
		<lastmod>2026-03-31T16:39:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-actors-claims-raise-questions-about-larger-cyber-threat-to-u-s-allies/</loc>
		<lastmod>2026-03-31T16:40:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-hijacks-axios-open-source-project-used-by-millions-to-push-malware/</loc>
		<lastmod>2026-03-31T16:40:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-emerging-threats-are-harder-to-prioritize-in-the-ai-era-3/</loc>
		<lastmod>2026-03-31T16:42:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-emerging-threats-are-harder-to-prioritize-in-the-ai-era/</loc>
		<lastmod>2026-03-31T16:42:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-emerging-threats-are-harder-to-prioritize-in-the-ai-era-2/</loc>
		<lastmod>2026-03-31T16:42:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rethinking-vulnerability-management-strategies-for-mid-market-security/</loc>
		<lastmod>2026-03-31T16:42:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-quantum-are-forcing-a-rethink-of-digital-trust/</loc>
		<lastmod>2026-03-31T16:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-code-surge-is-forcing-a-rethink-of-appsec/</loc>
		<lastmod>2026-03-31T16:44:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-angreifbar-wird-neue-risiken-durch-prompt-injection/</loc>
		<lastmod>2026-03-31T16:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-supply-chain-attack-chops-away-at-npm-trust/</loc>
		<lastmod>2026-03-31T17:34:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-datadome-blocked-an-80m-request-scraping-attack-on-a-leading-review-platform/</loc>
		<lastmod>2026-03-31T17:35:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-actors-claims-raise-questions-about-larger-cyber-threat-to-us-allies/</loc>
		<lastmod>2026-03-31T17:36:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attack-on-axios-software-developer-tool-threatens-widespread-compromises/</loc>
		<lastmod>2026-03-31T17:36:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-sends-ai-agents-into-pen-testing-and-devops/</loc>
		<lastmod>2026-03-31T17:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-deploys-pseudo-ransomware-revives-pay2key-operations/</loc>
		<lastmod>2026-03-31T17:38:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/</loc>
		<lastmod>2026-03-31T17:40:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-sans-identity-threats-report-why-attacks-still-work/</loc>
		<lastmod>2026-03-31T18:33:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-hijacked-npm-account-takeover-deploys-cross-platform-rat-to-millions/</loc>
		<lastmod>2026-03-31T18:35:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-indicts-maryland-man-for-2021-theft-of-54-million-from-uranium-finance/</loc>
		<lastmod>2026-03-31T18:35:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-blamed-for-hijacking-popular-axios-open-source-project-to-spread-malware/</loc>
		<lastmod>2026-03-31T18:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-court-dismisses-judicial-review-against-evisa-system/</loc>
		<lastmod>2026-03-31T18:37:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-militarys-gps-software-is-an-8-billion-mess/</loc>
		<lastmod>2026-03-31T18:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</loc>
		<lastmod>2026-03-31T18:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-computers-need-vastly-fewer-resources-than-thought-to-break-vital-encryption/</loc>
		<lastmod>2026-03-31T19:34:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-blamed-for-hijacking-popular-axios-open-source-project-to-spread-malware-2/</loc>
		<lastmod>2026-03-31T19:34:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-targets-m365-accounts-with-password-spraying-attacks/</loc>
		<lastmod>2026-03-31T19:35:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-hijack-axios-npm-account-to-spread-rat-malware/</loc>
		<lastmod>2026-03-31T19:36:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-industry-may-be-running-out-of-time-to-prepare-for-quantum-attacks/</loc>
		<lastmod>2026-03-31T19:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drive-expands-ai-ransomware-detection-file-recovery-to-more-users/</loc>
		<lastmod>2026-03-31T19:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-developer-verification-rollout-begins-ahead-of-september-enforcement/</loc>
		<lastmod>2026-03-31T19:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attack-on-axios-npm-package-scope-impact-and-remediations/</loc>
		<lastmod>2026-03-31T20:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-risks-shape-ai-adoption-but-investment-accelerates-nonetheless/</loc>
		<lastmod>2026-03-31T20:35:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild/</loc>
		<lastmod>2026-03-31T20:35:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncertainty-dominates-discussions-at-rsac-conference-2026/</loc>
		<lastmod>2026-03-31T20:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-news-rsa-security-and-microsoft-advance-identity-security-for-ai-era/</loc>
		<lastmod>2026-03-31T20:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-compromise-on-npm-introduces-hidden-malicious-package/</loc>
		<lastmod>2026-03-31T21:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flipping-the-script-the-premiere-of-the-women-in-security-documentary-at-rsac/</loc>
		<lastmod>2026-03-31T21:35:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/synthetic-data-is-all-you-need-for-reinforcement-learning/</loc>
		<lastmod>2026-03-31T21:36:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-gap-csas-ai-security-initiatives-at-rsac/</loc>
		<lastmod>2026-03-31T21:37:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-writes-the-code-what-changes-for-security/</loc>
		<lastmod>2026-03-31T21:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-atomic-honeypot-a-mysql-honeypot-that-fights-back/</loc>
		<lastmod>2026-03-31T21:40:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-atomic-honeypot-a-mysql-honeypot-that-fights-back-2/</loc>
		<lastmod>2026-03-31T21:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-trojanize-axios-http-library-in-highest-impact-npm-supply-chain-attack/</loc>
		<lastmod>2026-03-31T21:41:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-links-axios-supply-chain-attack-to-north-korean-group/</loc>
		<lastmod>2026-03-31T21:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-uncertainty-dominates-dialog-at-rsac-conference/</loc>
		<lastmod>2026-03-31T21:44:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-vertex-ai-has-an-over-privileged-problem/</loc>
		<lastmod>2026-03-31T21:44:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-breaches-cloud-saas-instances-with-stolen-credentials/</loc>
		<lastmod>2026-03-31T21:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-open-that-whatsapp-message-microsoft-warns/</loc>
		<lastmod>2026-03-31T22:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-soc-firm-tenex-raises-250m-to-drive-faster-response/</loc>
		<lastmod>2026-03-31T22:35:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/implantable-orthopedic-device-maker-reports-hack/</loc>
		<lastmod>2026-03-31T22:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-open-back-door-industrial-remote-access/</loc>
		<lastmod>2026-03-31T22:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-attack-deploys-cross-platform-rat/</loc>
		<lastmod>2026-03-31T22:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-security-alliance-wins-2026-sc-award-for-ai-security-certification/</loc>
		<lastmod>2026-03-31T22:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-research-reveals-chatgpt-data-exfiltration-flaw/</loc>
		<lastmod>2026-03-31T22:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-threatens-to-start-attacking-major-us-tech-firms-on-april-1/</loc>
		<lastmod>2026-03-31T22:40:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-ai-finds-vim-emacs-rce-bugs-that-trigger-on-file-open/</loc>
		<lastmod>2026-03-31T22:41:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-package-compromised-in-precision-attack/</loc>
		<lastmod>2026-03-31T22:42:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/asking-ai-for-personal-advice-is-a-bad-idea-stanford-study-shows/</loc>
		<lastmod>2026-03-31T23:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitaler-druck-trinkgeld-per-terminal-bei-verbrauchern-umstritten/</loc>
		<lastmod>2026-03-31T23:34:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-backups-verhindern-dass-aus-einem-schlechten-tag-ein-katastrophaler-wird/</loc>
		<lastmod>2026-03-31T23:34:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-accidentally-leaks-claude-code/</loc>
		<lastmod>2026-03-31T23:35:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagons-zero-trust-push-faces-a-2027-reality-check/</loc>
		<lastmod>2026-03-31T23:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-north-korean-ai-hiring-scheme-targets-us-companies/</loc>
		<lastmod>2026-03-31T23:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-launches-new-meet-privacy-focused-conferencing-platform/</loc>
		<lastmod>2026-03-31T23:38:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw/</loc>
		<lastmod>2026-03-31T23:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-policy-enforcement-engines-for-post-quantum-mcp-governance/</loc>
		<lastmod>2026-04-01T03:34:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-be-optimistic-about-the-future-of-agentic-ai/</loc>
		<lastmod>2026-04-01T03:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-agentic-ai-a-powerful-ally-in-cybersecurity/</loc>
		<lastmod>2026-04-01T03:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-you-satisfied-with-your-current-nhi-management/</loc>
		<lastmod>2026-04-01T03:37:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technical-advisory-axios-npm-supply-chain-attack-cross-platform-rat-deployed-via-compromised-maintainer-account/</loc>
		<lastmod>2026-04-01T03:38:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-employee-error-exposes-claude-code-source/</loc>
		<lastmod>2026-04-01T03:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-executive-order-purports-to-limit-mail-in-voting-mandate-federal-voter-lists/</loc>
		<lastmod>2026-04-01T03:40:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/</loc>
		<lastmod>2026-04-01T03:41:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-will-push-out-rare-backported-patches-to-protect-ios-18-users-from-darksword-hacking-tool/</loc>
		<lastmod>2026-04-01T03:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-source-code-accidentally-leaked-in-npm-package/</loc>
		<lastmod>2026-04-01T03:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-now-allows-you-to-change-your-gmail-com-address/</loc>
		<lastmod>2026-04-01T03:44:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maryland-man-charged-over-53m-uranium-finance-crypto-hack/</loc>
		<lastmod>2026-04-01T03:45:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantom-project-bundles-infostealer-crypter-and-rat-for-sale/</loc>
		<lastmod>2026-04-01T03:46:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workload-identity-and-access-management-the-definitive-guide/</loc>
		<lastmod>2026-04-01T04:33:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/workload-iam-vs-secrets-management-a-practical-decision-guide/</loc>
		<lastmod>2026-04-01T04:34:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-detectors-trained-on-one-dataset-often-stumble-on-another/</loc>
		<lastmod>2026-04-01T04:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/low-statt-critical-ki-patch-dienst-stuft-schwachstelle-fatal-falsch-ein/</loc>
		<lastmod>2026-04-01T04:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crunchyroll-datenleck-68-millionen-nutzer-betroffen-was-du-jetzt-tun-solltest/</loc>
		<lastmod>2026-04-01T04:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-im-microsoft-365-umfeld-wenn-cloud-produktivitat-zur-sicherheitsarchitektur-wird/</loc>
		<lastmod>2026-04-01T05:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mimecast-makes-enterprise-email-security-deployable-in-minutes/</loc>
		<lastmod>2026-04-01T05:34:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/financial-groups-lay-out-a-plan-to-fight-ai-identity-attacks/</loc>
		<lastmod>2026-04-01T05:35:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-actively-exploit-critical-weblogic-rce-vulnerabilities-in-ongoing-attacks/</loc>
		<lastmod>2026-04-01T05:37:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xloader-malware-sharpens-obfuscation-masks-c2-traffic-via-decoy-servers/</loc>
		<lastmod>2026-04-01T05:37:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2026-13486-cve-2026-21992-oracle-schliest-rce-schwachstelle-in-fusion-middleware/</loc>
		<lastmod>2026-04-01T05:39:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/leaknet-changes-tactics-but-consistency-gives-defenders-an-advantage/</loc>
		<lastmod>2026-04-01T06:34:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-front-end-library-npm-supply-chain-poisoning-alert/</loc>
		<lastmod>2026-04-01T06:35:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-bei-netzwerkausfallen-gilt-murphys-gesetz/</loc>
		<lastmod>2026-04-01T06:35:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-epic-fury-und-die-digitale-reaktion/</loc>
		<lastmod>2026-04-01T06:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-windows-11-emergency-update-fixes-preview-update-install-issues/</loc>
		<lastmod>2026-04-01T06:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-supply-chain-attack-uses-undicy-http-to-deploy-rat/</loc>
		<lastmod>2026-04-01T06:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-clouds-vertex-ai-hit-by-vulnerability-enabling-sensitive-data-access/</loc>
		<lastmod>2026-04-01T06:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spam-anrufe-diese-nummern-sollten-sie-sofort-blockieren/</loc>
		<lastmod>2026-04-01T07:34:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drive-ransomware-detection-now-on-by-default-for-paying-users/</loc>
		<lastmod>2026-04-01T07:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-update-fixes-critical-installation-loop-problem/</loc>
		<lastmod>2026-04-01T07:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-telnyx-python-sdk-backdoored-to-steal-credentials-on-windows-macos-and-linux/</loc>
		<lastmod>2026-04-01T07:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trueconf-vulnerability-under-active-exploitation-in-southeast-asia-government-attacks/</loc>
		<lastmod>2026-04-01T07:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms/</loc>
		<lastmod>2026-04-01T07:38:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-trivy-hack-hacker-sollen-quellcode-von-cisco-erbeutet-haben/</loc>
		<lastmod>2026-04-01T07:39:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-ai-becomes-the-punchline/</loc>
		<lastmod>2026-04-01T08:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/steganography-sabotage-inside-pawn-storms-prismex-offensive-against-nato-logistics/</loc>
		<lastmod>2026-04-01T08:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/free-vpns-leak-your-data-while-claiming-privacy/</loc>
		<lastmod>2026-04-01T08:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-breach-axios-package-target-windows-macos-and-linux-systems/</loc>
		<lastmod>2026-04-01T08:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-breach-axios-package-target-windows-macos-and-linux-systems-2/</loc>
		<lastmod>2026-04-01T08:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crewai-hit-by-critical-vulnerabilities-enabling-sandbox-escape-and-host-compromise/</loc>
		<lastmod>2026-04-01T08:41:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/</loc>
		<lastmod>2026-04-01T08:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-apple-bringt-exploit-patch-fur-weitere-iphones/</loc>
		<lastmod>2026-04-01T08:44:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/javascript-bibliothek-nordkoreanische-hacker-sollen-hinter-axios-hack-stecken/</loc>
		<lastmod>2026-04-01T08:44:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-arms-race-is-already-over-you-just-dont-know-which-side-won/</loc>
		<lastmod>2026-04-01T09:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norma-rae-union-activity-and-computer-hacking-skywest-sues-pilots-for-using-its-directory-of-employees-to-unionize/</loc>
		<lastmod>2026-04-01T09:34:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-funf-gefahrlichsten-angriffstechniken-2026/</loc>
		<lastmod>2026-04-01T09:34:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-redline-malware-developer-extradited-to-united-states/</loc>
		<lastmod>2026-04-01T09:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-startup-mercor-hit-by-supply-chain-attack-linked-to-litellm/</loc>
		<lastmod>2026-04-01T09:36:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-startup-mercor-hit-by-supply-chain-attack-linked-to-litellm-2/</loc>
		<lastmod>2026-04-01T09:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-manufacturers-under-cyber-fire-with-80-reporting-attacks/</loc>
		<lastmod>2026-04-01T09:38:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poc-exploit-code-published-for-nginx-ui-backup-restore-security-flaw/</loc>
		<lastmod>2026-04-01T09:39:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-hijack-axios-npm-package-to-spread-rats/</loc>
		<lastmod>2026-04-01T09:40:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erneute-massive-attacke-eu-kommission-bestatigt-schweren-cyberangriff/</loc>
		<lastmod>2026-04-01T09:41:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nisumsetzungsgesetz-erweitert-enwg-anforderungen-virtuelle-kraftwerke-mit-nis-2-jetzt-im-fokus-der-regulierung/</loc>
		<lastmod>2026-04-01T09:42:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-trust-index-von-thales-zeigt-die-vertrauensgrenze-der-ki-assistenz-ja-autonomie-nein/</loc>
		<lastmod>2026-04-01T09:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schadcode-per-klick-attackierte-chrome-lucke-gefahrdet-millionen-von-nutzern/</loc>
		<lastmod>2026-04-01T09:44:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spamhaus-cbl-is-reborn%c2%a6-now-interplanetary/</loc>
		<lastmod>2026-04-01T10:32:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-ways-cisos-can-combat-ai-hallucinations/</loc>
		<lastmod>2026-04-01T10:32:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-awareness-is-not-a-control-rethinking-human-risk-in-enterprise-security/</loc>
		<lastmod>2026-04-01T10:34:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sentinelone-autonomous-detection-blocks-trojaned-litellm-triggered-by-claude-code/</loc>
		<lastmod>2026-04-01T10:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eight-in-10-uk-manufacturers-hit-by-cyber-incident-in-a-year/</loc>
		<lastmod>2026-04-01T10:36:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lokale-rechenzentren-direkt-an-azure-anbinden-azure-expressroute-direct-vpn-fur-azure/</loc>
		<lastmod>2026-04-01T10:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/definition-it-was-ist-it-governance/</loc>
		<lastmod>2026-04-01T10:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verschlusselung-von-windows-was-ist-bitlocker/</loc>
		<lastmod>2026-04-01T10:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-und-emacs-claude-liefert-auf-zuruf-gefahrliche-schadcode-exploits/</loc>
		<lastmod>2026-04-01T10:40:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-situation-monitors-vs-osint-desinformation-statt-intelligence/</loc>
		<lastmod>2026-04-01T10:41:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-tac-security-hits-10000-clients-enters-top-5-in-global-vm-appsec/</loc>
		<lastmod>2026-04-01T11:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-identity-and-api-security-tools-modern-saas-teams-should-evaluate-in-2026/</loc>
		<lastmod>2026-04-01T11:34:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stored-xss-bug-found-in-jira-work-management/</loc>
		<lastmod>2026-04-01T11:34:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-says-north-korea-was-behind-the-axios-npm-supply-chain-attack/</loc>
		<lastmod>2026-04-01T11:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mazda-data-breach-exposing-employee-and-partner-records-via-system-vulnerability/</loc>
		<lastmod>2026-04-01T11:36:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-handala-hackers-breach-fbi-director-kash-patels-gmail-account/</loc>
		<lastmod>2026-04-01T11:37:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-zielen-auf-exilportal-iranwire/</loc>
		<lastmod>2026-04-01T11:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imagemagick-zero-day-enables-rce-on-linux-and-wordpress-servers/</loc>
		<lastmod>2026-04-01T11:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-tac-security-hits-10000-clients-enters-top-5-in-global-vm-appsec-2/</loc>
		<lastmod>2026-04-01T11:40:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defending-encryption-in-the-post-quantum-era/</loc>
		<lastmod>2026-04-01T11:41:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/</loc>
		<lastmod>2026-04-01T11:42:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crystalx-malware-as-a-service-spreads-via-telegram-with-stealer-rat-tools/</loc>
		<lastmod>2026-04-01T11:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-firm-tac-security-hits-10000-clients-enters-top-5-in-global-vm-appsec-3/</loc>
		<lastmod>2026-04-01T11:44:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-hotel-booking-systems-to-send-fake-payment-requests-to-guests/</loc>
		<lastmod>2026-04-01T11:45:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-schrift-tauscht-wie-ki-webassistenten-auf-eine-raffinierte-illusion-hereinfallen/</loc>
		<lastmod>2026-04-01T11:46:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-taxonomy-of-cognitive-security/</loc>
		<lastmod>2026-04-01T12:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-malware-campaign-uses-malicious-vbs-files-to-gain-persistent-access/</loc>
		<lastmod>2026-04-01T12:34:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-regelmasigen-test-ihrer-backups-wandeln-unternehmen-am-abgrund/</loc>
		<lastmod>2026-04-01T12:34:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-chrome-update-fixes-21-flaws-warns-of-actively-exploited-vulnerability/</loc>
		<lastmod>2026-04-01T12:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kostenfreie-bewertung-der-internen-angriffsflache/</loc>
		<lastmod>2026-04-01T12:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airlock-microgateway-5-0-sichert-handlungsfahigkeit-in-kubernetes-nach-dem-ende-von-ingress-nginx/</loc>
		<lastmod>2026-04-01T12:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-lacking-in-the-security-world/</loc>
		<lastmod>2026-04-01T12:38:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-chrome-zero-day-with-in-the-wild-exploit-cve-2026-5281/</loc>
		<lastmod>2026-04-01T12:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cultureai-launches-on-microsoft-marketplace-to-accelerate-secure-ai-adoption/</loc>
		<lastmod>2026-04-01T12:40:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-against-using-chinese-mobile-apps-due-to-privacy-risks/</loc>
		<lastmod>2026-04-01T12:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-faces-alleged-data-leak-as-shinyhunters-claims-responsibility/</loc>
		<lastmod>2026-04-01T12:44:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-dynamic-application-security-testing-dast-platforms-in-2026/</loc>
		<lastmod>2026-04-01T12:44:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-modeline-vulnerability-opens-door-to-arbitrary-os-command-execution/</loc>
		<lastmod>2026-04-01T12:45:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-we-training-ai-too-late/</loc>
		<lastmod>2026-04-01T12:46:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/</loc>
		<lastmod>2026-04-01T12:47:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-groups-exploit-legit-it-tools-to-bypass-antivirus/</loc>
		<lastmod>2026-04-01T13:41:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cis-benchmarks-march-2026-update/</loc>
		<lastmod>2026-04-01T13:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ethereum-based-etherrat-etherhiding-power-stealthy-malware-campaigns/</loc>
		<lastmod>2026-04-01T13:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-of-new-chrome-zero-day-under-active-exploitation-users-urged-to-update-immediately/</loc>
		<lastmod>2026-04-01T13:44:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-improve-privacy-with-exif-data-removal-feature/</loc>
		<lastmod>2026-04-01T13:45:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-forgotten-endpoint-security-risks-of-dormant-devices/</loc>
		<lastmod>2026-04-01T13:46:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-target-european-governments-in-espionage-campaigns/</loc>
		<lastmod>2026-04-01T13:47:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/terroristische-hackergruppe-wer-ist-cyberav3ngers/</loc>
		<lastmod>2026-04-01T13:48:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gigabyte-control-center-schadcode-lucke-in-verbreitetem-hardware-steuertool/</loc>
		<lastmod>2026-04-01T13:49:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-due-diligence-checklist-2026-how-to-avoid-ai-implementation-failures-security-risks-and-cost-overruns/</loc>
		<lastmod>2026-04-01T13:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/email-deliverability-testing-from-single-checks-to-continuous-monitoring/</loc>
		<lastmod>2026-04-01T13:34:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-tips-for-phishing-email-analysis/</loc>
		<lastmod>2026-04-01T13:35:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/romania-under-daily-barrage-of-cyberattacks-defense-minister-says/</loc>
		<lastmod>2026-04-01T13:36:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lancom-startet-fruhjahrs-roadshow-in-14-deutschen-stadten-plus-einem-online-event/</loc>
		<lastmod>2026-04-01T13:37:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agent-corey-sorgt-fur-transparenz-und-sicherheit-in-microsoft-365-umgebungen/</loc>
		<lastmod>2026-04-01T13:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-schwachstelle-in-abgeharteten-videokonferenz-tool-trueconf/</loc>
		<lastmod>2026-04-01T13:40:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-next-employee-might-not-exist-lexisnexis-report-exposes-the-synthetic-identity-explosion/</loc>
		<lastmod>2026-04-01T14:32:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mutation-testing-for-the-agentic-era/</loc>
		<lastmod>2026-04-01T14:34:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-finally-lets-you-change-your-email-address-without-losing-anything/</loc>
		<lastmod>2026-04-01T14:35:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/block-the-prompt-not-the-work-the-end-of-doctor-no/</loc>
		<lastmod>2026-04-01T14:35:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/</loc>
		<lastmod>2026-04-01T14:37:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/</loc>
		<lastmod>2026-04-01T14:38:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/</loc>
		<lastmod>2026-04-01T14:38:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybride-angriffe-bevolkerung-wunscht-sich-mehr-befugnisse-fur-sicherheitsbehorden/</loc>
		<lastmod>2026-04-01T14:39:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-calls-u-s-tech-companies-legitimate-targets-threatens-to-attack/</loc>
		<lastmod>2026-04-01T15:32:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sonatypes-container-scanning-protects-you-from-zero-days/</loc>
		<lastmod>2026-04-01T15:34:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-chinese-geopolitical-issues-drive-renewed-cyberespionage-campaign/</loc>
		<lastmod>2026-04-01T15:34:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-says-it-was-hacked-and-may-take-several-weeks-to-recover/</loc>
		<lastmod>2026-04-01T15:35:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/peoples-panel-to-check-if-uk-wants-controversial-digital-id-will-cost-630k/</loc>
		<lastmod>2026-04-01T15:36:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-links-axios-npm-supply-chain-attack-to-north-korea-linked-apt-unc1069/</loc>
		<lastmod>2026-04-01T15:38:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdooring-of-javascript-library-axios-tied-to-north-korea/</loc>
		<lastmod>2026-04-01T15:38:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-linked-to-axios-npm-supply-chain-compromise/</loc>
		<lastmod>2026-04-01T15:39:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-warns-quantum-computers-could-crack-crypto-sooner-than-expected/</loc>
		<lastmod>2026-04-01T15:40:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/routine-access-is-powering-modern-intrusions-a-new-threat-report-finds/</loc>
		<lastmod>2026-04-01T15:41:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-venom-stealer-maas-platform-automates-continuous-data-theft/</loc>
		<lastmod>2026-04-01T15:42:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsidesslc-2025-cybersecurity-at-home-protecting-your-family-in-a-connected-world/</loc>
		<lastmod>2026-04-01T16:33:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-proofs-how-to-prove-you-know-a-secret-without-revealing-the-secret/</loc>
		<lastmod>2026-04-01T16:34:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-knowledge-proofs-how-to-prove-you-know-a-secret-without-revealing-the-secret-2/</loc>
		<lastmod>2026-04-01T16:34:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-data-quality-risk-at-the-schema-layer-liquibase-secure/</loc>
		<lastmod>2026-04-01T16:35:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-open-source-library-targeted-in-sophisticated-supply-chain-attack/</loc>
		<lastmod>2026-04-01T16:36:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-actors-targeting-middle-eastern-city-governments-to-undermine-missile-strike-responses/</loc>
		<lastmod>2026-04-01T16:37:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-leaks-512000-lines-of-claude-ai-code-in-major-blunder/</loc>
		<lastmod>2026-04-01T16:38:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/venom-stealer-maas-platform-commoditizes-clickfix-attacks/</loc>
		<lastmod>2026-04-01T16:40:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/key-leaks-vault-failures-and-tee-attacks-highlights-from-rwc-2026/</loc>
		<lastmod>2026-04-01T17:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-aws-ai-controls-every-security-team-should-have/</loc>
		<lastmod>2026-04-01T17:36:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/48-hours-the-window-between-infostealer-infection-and-dark-web-sale/</loc>
		<lastmod>2026-04-01T17:36:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-on-windows-users-targeted-in-new-campaign-warns-microsoft/</loc>
		<lastmod>2026-04-01T17:37:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-actors-target-middle-eastern-city-governments-to-undermine-missile-strike-responses/</loc>
		<lastmod>2026-04-01T17:38:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cambodia-extradites-alleged-cyber-scam-linchpin-to-china-as-crackdown-intensifies/</loc>
		<lastmod>2026-04-01T17:39:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-was-actually-government-spyware/</loc>
		<lastmod>2026-04-01T17:40:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-take-aim-at-hasbro-weeks-of-recovery-ahead/</loc>
		<lastmod>2026-04-01T17:41:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-threatens-to-attack-apple-google-and-other-us-tech-firms-in-middle-east/</loc>
		<lastmod>2026-04-01T17:42:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-using-whatsapp-to-deliver-malware-to-windows-pcs/</loc>
		<lastmod>2026-04-01T17:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattacks-intensify-pressure-on-latin-american-governments/</loc>
		<lastmod>2026-04-01T17:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-takes-some-systems-offline-after-cybersecurity-incident/</loc>
		<lastmod>2026-04-01T17:46:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manufacturing-healthcare-share-struggles-with-passwords/</loc>
		<lastmod>2026-04-01T17:47:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-governance-how-to-approach-it/</loc>
		<lastmod>2026-04-01T18:34:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-ai-governance-how-to-approach-it-2/</loc>
		<lastmod>2026-04-01T18:34:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vim-and-gnu-emacs-claude-code-helpfully-found-zero-day-exploits-for-both/</loc>
		<lastmod>2026-04-01T18:35:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-dakota-water-treatment-plant-reports-march-ransomware-attack/</loc>
		<lastmod>2026-04-01T18:36:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-made-by-government-spyware-maker/</loc>
		<lastmod>2026-04-01T18:37:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project-2/</loc>
		<lastmod>2026-04-01T18:38:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-phishing-scam-uses-fake-notifications-to-hijack-accounts/</loc>
		<lastmod>2026-04-01T18:40:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novoice-android-malware-on-google-play-infected-2-3-million-devices/</loc>
		<lastmod>2026-04-01T18:41:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-vertex-ai-is-over-privileged-thats-a-problem/</loc>
		<lastmod>2026-04-01T18:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/</loc>
		<lastmod>2026-04-01T18:45:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-negara-malaysia-rmit-update-new-authentication-rules-for-fintech-and-banks/</loc>
		<lastmod>2026-04-02T06:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-friction-and-roi-a-cisos-take-on-making-security-work-for-the-business/</loc>
		<lastmod>2026-04-02T06:54:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-attack-chain-delivers-vbs-cloud-payloads-msi-backdoor/</loc>
		<lastmod>2026-04-02T06:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-tizian-kohler-head-of-security-bei-adlon-reines-praventionsdenken-reicht-heute-nicht-mehr-aus/</loc>
		<lastmod>2026-04-02T06:57:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-triple-headed-dragon-inside-the-three-cluster-chinese-cyberespionage-campaign-targeting-se-asia/</loc>
		<lastmod>2026-04-02T07:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-discloses-cyberattack-after-unauthorized-network-access-detected/</loc>
		<lastmod>2026-04-02T07:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-zap-ptk-add-on-converts-browser-security-findings-into-native-zap-alerts/</loc>
		<lastmod>2026-04-02T07:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-smart-software-manager-flaw-allowed-arbitrary-command-execution/</loc>
		<lastmod>2026-04-02T07:57:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-px4-autopilot-vulnerability-let-attackers-gain-control-of-drones/</loc>
		<lastmod>2026-04-02T07:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ta416-broadens-europe-spy-campaign-with-web-bugs-and-malware/</loc>
		<lastmod>2026-04-02T07:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-2026-backup-kann-jeder-recovery-ist-die-kunst/</loc>
		<lastmod>2026-04-02T08:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unix-in-macos-apple-wird-50-und-setzt-immer-noch-auf-ein-betriebssystem-aus-den-1960ern/</loc>
		<lastmod>2026-04-02T08:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-spyware-vendor-creates-fake-whatsapp-app-targeting-200-users/</loc>
		<lastmod>2026-04-02T08:54:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-14000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/</loc>
		<lastmod>2026-04-02T08:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-warns-chinese-mobile-apps-could-expose-user-data-to-cyberattacks/</loc>
		<lastmod>2026-04-02T08:56:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit/</loc>
		<lastmod>2026-04-02T08:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-warnt-iphone-nutzer-mit-spyware-attackiert/</loc>
		<lastmod>2026-04-02T08:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-zerschlagt-aisuru-und-kimwolf-doch-die-nachste-hydra-wachst-bereits/</loc>
		<lastmod>2026-04-02T09:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-the-age-of-instant-software/</loc>
		<lastmod>2026-04-02T09:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vietnam-linked-pxa-stealer-campaign-exploits-linkedin-to-target-professionals-globally/</loc>
		<lastmod>2026-04-02T09:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trueconf-zero-day-vulnerability-exploited-to-target-government-networks/</loc>
		<lastmod>2026-04-02T09:57:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-links-classic-outlook-issue-to-email-delivery-problems/</loc>
		<lastmod>2026-04-02T09:57:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/novoice-on-google-play-exploits-22-flaws-to-hit-millions-of-android-users/</loc>
		<lastmod>2026-04-02T09:58:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-issues-alert-on-chrome-zero-day-under-active-exploitation/</loc>
		<lastmod>2026-04-02T09:59:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-releases-ios-18-7-7-update-to-defend-against-darksword-exploit/</loc>
		<lastmod>2026-04-02T10:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-supply-chain-breach-microsoft-shares-mitigation-steps/</loc>
		<lastmod>2026-04-02T10:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-cni-firms-face-up-to-5m-in-downtime-from-ot-attacks/</loc>
		<lastmod>2026-04-02T10:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versteckte-risiken-im-blick-bitdefender-deckt-verborgene-angriffsflachen-auf/</loc>
		<lastmod>2026-04-02T10:05:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-auf-hasbro-hacker-infiltrieren-it-von-grosem-spielwarenkonzern/</loc>
		<lastmod>2026-04-02T10:06:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-10608-inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/</loc>
		<lastmod>2026-04-02T10:55:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-edr-killer-infection-chain/</loc>
		<lastmod>2026-04-02T10:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-the-talos-2025-year-in-review-a-discussion-on-what-the-data-means-for-defenders/</loc>
		<lastmod>2026-04-02T10:57:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases/</loc>
		<lastmod>2026-04-02T10:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unmasking-the-paramilitary-agents-behind-trumps-violent-immigration-crackdown/</loc>
		<lastmod>2026-04-02T11:00:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/</loc>
		<lastmod>2026-04-02T11:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/world-backup-day-2026-strategische-neuausrichtung-am-tag-des-backups/</loc>
		<lastmod>2026-04-02T11:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-haben-bis-zu-76-tage-im-jahr-freien-zugang-zu-unternehmens-pcs-in-aller-welt/</loc>
		<lastmod>2026-04-02T11:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-github-developers-are-targeted-by-token-giveaway-scams/</loc>
		<lastmod>2026-04-02T11:54:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/darksword-exploit-forces-apple-to-loosen-its-patching-policy/</loc>
		<lastmod>2026-04-02T11:55:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cisco-imc-auth-bypass-gives-attackers-admin-access/</loc>
		<lastmod>2026-04-02T11:56:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-cert-ua-site-spreads-go-based-rat-in-phishing-campaign/</loc>
		<lastmod>2026-04-02T11:57:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rfq-malware-campaign-uses-docx-rtf-js-and-python/</loc>
		<lastmod>2026-04-02T11:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-schwer-loschbar-android-malware-millionenfach-uber-google-play-verteilt/</loc>
		<lastmod>2026-04-02T11:59:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-cyber-resilience-strategic-data-protection-for-iec-62443-and-nis2-compliance/</loc>
		<lastmod>2026-04-02T12:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/imo-health-5-reasons-security-culture-starts-with-trust/</loc>
		<lastmod>2026-04-02T12:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/possible-us-government-iphone-hacking-tool-leaked/</loc>
		<lastmod>2026-04-02T12:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shut-the-front-door-on-email-attacks-how-to-scale-security-services-without-increasing-workload/</loc>
		<lastmod>2026-04-02T12:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-haben-bis-zu-76-tage-im-jahr-freien-zugang-zu-unternehmens-pcs/</loc>
		<lastmod>2026-04-02T12:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europaische-kommission-bestatigt-datenpanne-auf-der-webplattform-europa-eu-durch-einen-cyberangriff-von-shinyhunters/</loc>
		<lastmod>2026-04-02T12:59:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/http-client-axios-kompromittiert/</loc>
		<lastmod>2026-04-02T13:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-warns-high-risk-individuals-of-signal-and-whatsapp-social-engineering-attacks/</loc>
		<lastmod>2026-04-02T13:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hacker-group-handal-claims-breach-of-israeli-defense-firm/</loc>
		<lastmod>2026-04-02T13:01:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-will-hit-hospitals-rehearsals-are-key-to-defense/</loc>
		<lastmod>2026-04-02T13:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/</loc>
		<lastmod>2026-04-02T13:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-trusted-open-source-report/</loc>
		<lastmod>2026-04-02T13:04:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-deckt-angriff-auf-ein-schwergewicht-der-ki-entwicklung-auf/</loc>
		<lastmod>2026-04-02T13:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-improve-google-workspace-phishing-protection-for-schools-without-adding-it-burden/</loc>
		<lastmod>2026-04-02T13:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dmarc-troubleshooting-checklist-for-enterprises/</loc>
		<lastmod>2026-04-02T13:54:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eviltokens-abuses-microsoft-device-code-flow-for-account-takeovers/</loc>
		<lastmod>2026-04-02T13:55:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/video-the-ttp-ep-21-when-attackers-become-trusted-users/</loc>
		<lastmod>2026-04-02T13:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-infostealer-sold-as-service-targets-browsers-wallets-and-accounts/</loc>
		<lastmod>2026-04-02T13:57:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-style-ransomware-campaign-hits-windows-users-across-south-america/</loc>
		<lastmod>2026-04-02T13:58:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bank-trojan-casbaneiro-worms-through-latin-america/</loc>
		<lastmod>2026-04-02T13:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/standardize-or-suffer-the-jchk-blueprint-for-mssps-defending-smb-and-sme-clients/</loc>
		<lastmod>2026-04-02T14:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-recap-new-aws-privileged-permissions-and-services/</loc>
		<lastmod>2026-04-02T14:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-agentification-of-test-data-management-is-here-meet-the-structural-agent/</loc>
		<lastmod>2026-04-02T14:56:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yurei-ransomware-uses-common-tools-adds-stranger-things-references/</loc>
		<lastmod>2026-04-02T14:57:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-imc-flaw-grants-unauthenticated-admin-access/</loc>
		<lastmod>2026-04-02T14:58:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-standard-chartered-bank-ng/</loc>
		<lastmod>2026-04-02T14:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime/</loc>
		<lastmod>2026-04-02T15:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/</loc>
		<lastmod>2026-04-02T15:01:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtech-giant-stryker-fully-operational-after-data-wiping-attack/</loc>
		<lastmod>2026-04-02T15:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/geopolitics-ai-and-cybersecurity-insights-from-rsac-2026/</loc>
		<lastmod>2026-04-02T15:04:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/</loc>
		<lastmod>2026-04-02T15:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-storm-infostealer-remotely-decrypts-stolen-credentials/</loc>
		<lastmod>2026-04-02T15:05:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-expands-ios-18-security-updates-amid-darksword-threat/</loc>
		<lastmod>2026-04-02T15:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-observe-sub-one-hour-ransomware-attacks/</loc>
		<lastmod>2026-04-02T15:07:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-used-as-covert-channel-in-multi-stage-malware-campaign/</loc>
		<lastmod>2026-04-02T15:08:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-leak-anthropic-legt-versehentlich-500-000-zeilen-offen/</loc>
		<lastmod>2026-04-02T15:09:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/at-rsac-2026-ai-redefines-the-future-of-penetration-testing/</loc>
		<lastmod>2026-04-02T15:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-fim-freely-available-but-what-makes-them-expensive/</loc>
		<lastmod>2026-04-02T15:55:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-expands-darksword-patches-to-ios-18-7-7/</loc>
		<lastmod>2026-04-02T15:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sasol-reduced-java-costs-by-92-while-strengthening-security-and-compliance/</loc>
		<lastmod>2026-04-02T15:58:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sasol-reduced-java-costs-by-92-while-strengthening-security-and-compliance-2/</loc>
		<lastmod>2026-04-02T15:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-sasol-reduced-java-costs-by-92-while-strengthening-security-and-compliance-3/</loc>
		<lastmod>2026-04-02T15:58:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malwarebytes-privacy-vpn-receives-full-third-party-audit/</loc>
		<lastmod>2026-04-02T15:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/retail-and-hospitality-cisos-expect-budget-growth-new-ai-headaches-and-opportunities/</loc>
		<lastmod>2026-04-02T16:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack/</loc>
		<lastmod>2026-04-02T16:02:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepl-setzt-auf-aws-vom-vorzeigeprojekt-zur-cloud-abhangigkeit/</loc>
		<lastmod>2026-04-02T16:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-releases-defenseclaw-to-help-secure-openclaw/</loc>
		<lastmod>2026-04-02T16:04:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-goes-nude-exposes-claude-code-source-by-accident/</loc>
		<lastmod>2026-04-02T16:05:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/servicenow-allegedly-says-salesman-overachieved-and-is-not-entitled-to-comp/</loc>
		<lastmod>2026-04-02T16:06:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs/</loc>
		<lastmod>2026-04-02T16:07:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-uac-0255-impersonate-cert-ua-to-spread-agewheeze-malware-via-phishing/</loc>
		<lastmod>2026-04-02T16:08:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-wikipedia-of-cyber-helps-sap-make-sense-of-threat-data/</loc>
		<lastmod>2026-04-02T16:09:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-supply-chain-hacks-trigger-wave-of-intrusions-data-theft/</loc>
		<lastmod>2026-04-02T16:11:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/software-supply-chain-hacks-trigger-wave-of-intrusions-data-theft-2/</loc>
		<lastmod>2026-04-02T16:11:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssh-10-3-patches-five-security-bugs-and-drops-legacy-rekeying-support/</loc>
		<lastmod>2026-04-02T16:12:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions/</loc>
		<lastmod>2026-04-02T16:14:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-issues-security-alert-over-hackers-targeting-whatsapp-and-signal-accounts/</loc>
		<lastmod>2026-04-02T16:15:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-i-make-kubernetes-selfservice-without-losing-control/</loc>
		<lastmod>2026-04-02T16:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-opening-words-research-conferences-arent-effective/</loc>
		<lastmod>2026-04-02T16:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-trusted-systems-become-attack-paths/</loc>
		<lastmod>2026-04-02T16:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-csf-2-0-and-universalizing-cybersecurity/</loc>
		<lastmod>2026-04-02T16:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fedramp-ready-class-a-certification-and-breaking-into-the-federal-market/</loc>
		<lastmod>2026-04-02T16:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/</loc>
		<lastmod>2026-04-02T16:58:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-renew-push-for-labor-department-backed-cyber-apprenticeship-grants/</loc>
		<lastmod>2026-04-02T17:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/money-transfer-app-duc-exposed-thousands-of-drivers-licenses-and-passports-to-the-open-web/</loc>
		<lastmod>2026-04-02T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ice-says-it-bought-paragons-spyware-to-use-in-drug-trafficking-cases/</loc>
		<lastmod>2026-04-02T17:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-systems-nerfed-by-data-breach-it-recovery-underway/</loc>
		<lastmod>2026-04-02T17:02:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-starbucks-incident-exposes-code-and-firmware/</loc>
		<lastmod>2026-04-02T17:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-ai-dominates-but-community-remains-key-to-security/</loc>
		<lastmod>2026-04-02T17:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/</loc>
		<lastmod>2026-04-02T17:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-treating-ai-agents-as-identities-can-reduce-enterprise-ai-risk/</loc>
		<lastmod>2026-04-02T17:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proactive-threat-hunting/</loc>
		<lastmod>2026-04-02T17:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-operations-platform/</loc>
		<lastmod>2026-04-02T17:55:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-time-cyber-threat-detection/</loc>
		<lastmod>2026-04-02T17:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-detection-software/</loc>
		<lastmod>2026-04-02T17:58:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/</loc>
		<lastmod>2026-04-02T17:58:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-ceo-nick-schneider-on-delivering-superior-security-with-new-agentic-soc-platform/</loc>
		<lastmod>2026-04-02T17:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-crypto-platform-confirms-280-million-stolen-in-hack-as-researchers-point-finger-at-north-korea/</loc>
		<lastmod>2026-04-02T18:00:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-senate-passes-bill-that-would-ban-children-under-15-from-social-media/</loc>
		<lastmod>2026-04-02T18:01:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-than-an-hour/</loc>
		<lastmod>2026-04-02T18:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncle-larrys-biggest-fan-cut-by-email-in-early-morning-oracle-layoff-spree/</loc>
		<lastmod>2026-04-02T18:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-cuts-jobs-across-sales-engineering-security/</loc>
		<lastmod>2026-04-02T18:05:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-cyberattack-knocks-systems-offline-recovery-could-take-weeks/</loc>
		<lastmod>2026-04-02T18:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-issues-rare-patch-up-to-270m-iphones-could-be-vulnerable-to-darksword-exploit/</loc>
		<lastmod>2026-04-02T18:07:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-language-of-emojis-in-threat-intelligence-how-adversaries-signal-obfuscate-and-coordinate-online/</loc>
		<lastmod>2026-04-02T18:54:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-bans-all-foreign-made-consumer-routers/</loc>
		<lastmod>2026-04-02T18:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-concealed-sinobi-ransomware/</loc>
		<lastmod>2026-04-02T18:56:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-democratisation-of-business-email-compromise-fraud/</loc>
		<lastmod>2026-04-02T18:57:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/they-thought-they-were-downloading-claude-code-source-they-got-a-nasty-dose-of-malware-instead/</loc>
		<lastmod>2026-04-02T18:58:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmail-celebrates-22-years-by-finally-letting-users-change-their-addresses/</loc>
		<lastmod>2026-04-02T18:59:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-fixed-critical-and-high-severity-flaws/</loc>
		<lastmod>2026-04-02T19:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reengineering-aml-in-the-era-of-instant-payments/</loc>
		<lastmod>2026-04-02T19:01:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/heres-what-can-happen-when-the-us-bombs-irans-nuclear-sites/</loc>
		<lastmod>2026-04-02T19:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/conductorone-extends-reach-of-identity-governance-to-ai/</loc>
		<lastmod>2026-04-02T19:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gmails-new-rename-feature-could-add-spam-and-phishing-to-your-inbox/</loc>
		<lastmod>2026-04-02T19:56:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-hit-by-cyberattack-investigates-possible-data-breach/</loc>
		<lastmod>2026-04-02T19:57:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-now-chrome-flaw-under-active-attack-google-confirms/</loc>
		<lastmod>2026-04-02T19:58:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-loses-280-million-as-hackers-seize-security-council-powers/</loc>
		<lastmod>2026-04-02T19:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-opening-poem/</loc>
		<lastmod>2026-04-02T20:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/97-of-enterprises-expect-a-major-ai-agent-security-incident-within-the-year/</loc>
		<lastmod>2026-04-02T20:54:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/renewables-reached-nearly-50-of-global-electricity-capacity-last-year/</loc>
		<lastmod>2026-04-02T20:55:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak/</loc>
		<lastmod>2026-04-02T20:56:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-a-nuclear-site-is-hit/</loc>
		<lastmod>2026-04-02T20:58:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-bosses-are-all-in-on-ai-heres-why/</loc>
		<lastmod>2026-04-02T20:58:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/</loc>
		<lastmod>2026-04-02T20:59:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-250k-single-point-of-failure-hiding-in-every-soc/</loc>
		<lastmod>2026-04-02T21:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-questions-that-expose-whether-an-agentic-soc-actually-works-in-production/</loc>
		<lastmod>2026-04-02T21:57:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-questions-that-expose-whether-an-agentic-soc-actually-works-in-production/</loc>
		<lastmod>2026-04-02T21:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-dems-decry-confirmed-ice-usage-of-paragon-spyware/</loc>
		<lastmod>2026-04-02T21:58:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telehealth-giant-hims-hers-says-its-customer-support-system-was-hacked/</loc>
		<lastmod>2026-04-02T21:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-ag-sues-change-healthcare-in-2024-ransomware-attack/</loc>
		<lastmod>2026-04-02T22:00:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-leak-exposes-ai-supply-chain-threats/</loc>
		<lastmod>2026-04-02T22:01:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uncanny-valley-irans-threats-on-us-tech-trumps-plans-for-midterms-and-polymarkets-pop-up-flop/</loc>
		<lastmod>2026-04-02T22:03:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-leak-used-to-push-infostealer-malware-on-github/</loc>
		<lastmod>2026-04-02T22:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/not-toying-around-hasbro-attack-may-take-weeks-to-remediate/</loc>
		<lastmod>2026-04-02T22:05:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-soc-analyst-was-never-meant-to-be-a-ticket-processor-autonomous-triage-proves-it/</loc>
		<lastmod>2026-04-02T22:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-improve-organizational-security/</loc>
		<lastmod>2026-04-02T22:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-build-trust-in-cloud-security/</loc>
		<lastmod>2026-04-02T22:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-certain-can-you-be-about-agentic-ais-security-capabilities/</loc>
		<lastmod>2026-04-02T22:58:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wozu-einbruch-in-unternehmens-netzwerke-wenn-es-auch-per-login-geht/</loc>
		<lastmod>2026-04-02T22:59:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/startup-linx-secures-50m-as-identity-threats-intensify/</loc>
		<lastmod>2026-04-02T22:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-commits-to-reform-of-cyber-talent-management-system/</loc>
		<lastmod>2026-04-02T23:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-wasabi-cloudflare-and-backblaze-go-headhead-in-new-cloud-storage-test/</loc>
		<lastmod>2026-04-02T23:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-your-own-eyes-turn-against-you-how-compromised-security-cameras-and-iot-ot-devices-become-tools-for-your-attackers/</loc>
		<lastmod>2026-04-02T23:54:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierte-zertifizierungen-fur-ki-compliance-unternehmen-sollten-genau-hinschauen-statt-blind-zu-vertrauen/</loc>
		<lastmod>2026-04-02T23:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/we-know-what-day-it-is-but-these-raspberry-pi-price-hikes-are-no-joke/</loc>
		<lastmod>2026-04-02T23:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-2026-global-threat-report-adversaries-use-ai-to-bypass-defenses/</loc>
		<lastmod>2026-04-02T23:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/genai-alone-isnt-enough-rethinking-ai-in-cybersecurity/</loc>
		<lastmod>2026-04-02T23:57:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/granular-policy-enforcement-for-hybrid-classical-quantum-ai-workflows/</loc>
		<lastmod>2026-04-03T03:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/</loc>
		<lastmod>2026-04-03T03:55:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-charges-in-uranium-finance-case/</loc>
		<lastmod>2026-04-03T03:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-feds-confirm-major-hack-of-fbi-system/</loc>
		<lastmod>2026-04-03T03:57:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-happens-when-data-centers-become-military-targets/</loc>
		<lastmod>2026-04-03T04:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-infosec-products-of-the-month-march-2026/</loc>
		<lastmod>2026-04-03T04:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/which-messaging-app-takes-the-most-limited-approach-to-permissions-on-android/</loc>
		<lastmod>2026-04-03T05:53:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/click-wait-repeat-digital-trust-erodes-one-login-at-a-time/</loc>
		<lastmod>2026-04-03T05:54:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-uses-github-as-c2-in-new-lnk-phishing-campaign/</loc>
		<lastmod>2026-04-03T05:55:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-saas-security-posture-management-sspm-tools-2026/</loc>
		<lastmod>2026-04-03T05:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-saas-security-posture-management-sspm-tools-2026-2/</loc>
		<lastmod>2026-04-03T05:57:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-deploys-malicious-dll-to-disable-most-edr-defenses/</loc>
		<lastmod>2026-04-03T06:02:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adobe-data-breach-allegedly-exposes-13-million-support-tickets/</loc>
		<lastmod>2026-04-03T06:04:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-open-source-toolkit-to-govern-autonomous-ai-agents/</loc>
		<lastmod>2026-04-03T06:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-loses-280-million-north-korean-hackers-seize-security-council-powers/</loc>
		<lastmod>2026-04-03T06:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-hackers-hit-axios-npm-in-supply-chain-attack/</loc>
		<lastmod>2026-04-03T06:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssh-10-3-released-with-patch-for-shell-injection-and-other-security-flaws/</loc>
		<lastmod>2026-04-03T06:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-abuse-react2shell-flaw-to-compromise-700-next-js-hosts/</loc>
		<lastmod>2026-04-03T08:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranische-akteure-hacker-knacken-mailfach-des-fbi-chefs-patel/</loc>
		<lastmod>2026-04-03T08:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-ransomware-and-supply-chain-breaches-surge/</loc>
		<lastmod>2026-04-03T07:54:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trivy-supply-chain-attack-enabled-european-commission-cloud-breach/</loc>
		<lastmod>2026-04-03T07:55:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/</loc>
		<lastmod>2026-04-03T07:55:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-router-flaws-allowed-attackers-to-launch-dos-attacks-and-cause-crashes/</loc>
		<lastmod>2026-04-03T07:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tp-link-router-flaws-allowed-attackers-to-launch-dos-attacks-and-cause-crashes-2/</loc>
		<lastmod>2026-04-03T07:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-weaponize-venom-stealer-via-clickfix-lures-for-massive-data-exfiltration/</loc>
		<lastmod>2026-04-03T07:58:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phorpiex-botnet-fuels-ransomware-sextortion-and-crypto-theft-attacks/</loc>
		<lastmod>2026-04-03T07:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/artemis-ii-astronaut-i-have-two-microsoft-outlooks-and-neither-one-of-those-are-working/</loc>
		<lastmod>2026-04-03T08:53:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs/</loc>
		<lastmod>2026-04-03T08:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intelligent-insurance-wie-ki-die-versicherungsbranche-neu-codiert/</loc>
		<lastmod>2026-04-03T08:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-cyber-industry-trends-revealed-at-rsac-2026/</loc>
		<lastmod>2026-04-03T09:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies/</loc>
		<lastmod>2026-04-03T09:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/</loc>
		<lastmod>2026-04-03T09:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trusted-platforms-exploited-to-steal-philippine-banking-credentials/</loc>
		<lastmod>2026-04-03T09:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-models-including-gemini-3-and-claude-haiku-4-5-secretly-protected-other-models-from-removal/</loc>
		<lastmod>2026-04-03T09:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/</loc>
		<lastmod>2026-04-03T09:59:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images-2/</loc>
		<lastmod>2026-04-03T09:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images-3/</loc>
		<lastmod>2026-04-03T09:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/</loc>
		<lastmod>2026-04-03T10:00:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot/</loc>
		<lastmod>2026-04-03T10:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nigerian-romance-scammer-jailed-after-being-caught-out-by-fellow-fraudster/</loc>
		<lastmod>2026-04-03T10:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-veteran-says-some-broken-by-update-pcs-were-already-doomed/</loc>
		<lastmod>2026-04-03T10:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-compromise-traced-to-targeted-social-engineering-attack/</loc>
		<lastmod>2026-04-03T10:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-chrome-extension-chatgpt-ad-blocker/</loc>
		<lastmod>2026-04-03T10:58:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-anforderungen-an-digitale-resilienz-geopolitische-risiken-und-der-druck-auf-backup-strategien/</loc>
		<lastmod>2026-04-03T10:59:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-privileged-access-is-becoming-the-control-plane-for-agentic-ai/</loc>
		<lastmod>2026-04-03T11:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hipaa-i-do-not-think-that-word-means-what-you-say-it-means/</loc>
		<lastmod>2026-04-03T11:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-by-terms-of-service-is-not-governance-at-all-the-anthropic-case-white-house-policy-and-the-coming-race-to-the-bottom/</loc>
		<lastmod>2026-04-03T11:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/b2b-authentication-provider-comparison-features-pricing-sso-support-2026/</loc>
		<lastmod>2026-04-03T11:57:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-source-leak-exploited-to-spread-malware/</loc>
		<lastmod>2026-04-03T11:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-still-working-to-fix-exchange-online-mailbox-access-issues/</loc>
		<lastmod>2026-04-03T11:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kimsuky-uses-malicious-lnk-files-to-drop-python-backdoor/</loc>
		<lastmod>2026-04-03T12:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-includes-trueconf-security-flaw-in-kev-catalog-after-exploitation-in-the-wild/</loc>
		<lastmod>2026-04-03T12:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/14000-f5-big-ip-apm-instances-exposed-online-as-attackers-exploit-rce-vulnerability/</loc>
		<lastmod>2026-04-03T12:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-security-app-gets-secure-boot-certificate-status-indicators-as-2026-expiration-approaches/</loc>
		<lastmod>2026-04-03T12:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-forces-unmanaged-windows-11-devices-to-upgrade-to-version-24h2/</loc>
		<lastmod>2026-04-03T12:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/infrastructure-engineer-pleads-guilty-to-locking-254-windows-servers-at-former-employer/</loc>
		<lastmod>2026-04-03T12:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crowdstrike-next-gen-siem-can-now-ingest-microsoft-defender-telemetry/</loc>
		<lastmod>2026-04-03T12:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/</loc>
		<lastmod>2026-04-03T12:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/</loc>
		<lastmod>2026-04-03T13:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-of-confidence-3-april-2026/</loc>
		<lastmod>2026-04-03T13:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clean-vs-fast-recovery-why-mtcr-matters/</loc>
		<lastmod>2026-04-03T13:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-sparkcat-malware-in-google-play-und-app-store/</loc>
		<lastmod>2026-04-03T13:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-warns-russian-hackers-are-revisiting-past-breaches-to-prepare-new-attacks/</loc>
		<lastmod>2026-04-03T13:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-imc-auth-bypass-vulnerability-allows-attackers-to-alter-user-passwords-cve-2026-20093/</loc>
		<lastmod>2026-04-03T13:57:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-progress-sharefile-flaws-expose-servers-to-unauthorized-remote-takeover/</loc>
		<lastmod>2026-04-03T13:59:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-progress-sharefile-flaws-expose-servers-to-unauthorized-remote-takeover-2/</loc>
		<lastmod>2026-04-03T13:59:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/source-code-leaks-highlight-lack-of-supply-chain-oversight/</loc>
		<lastmod>2026-04-03T14:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-phishing-platform-used-in-credential-theft-campaigns-against-c-suite-execs/</loc>
		<lastmod>2026-04-03T14:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/board-ready-security-metrics-that-actually-matter/</loc>
		<lastmod>2026-04-03T14:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/simplifying-mba-obfuscation-with-cobra/</loc>
		<lastmod>2026-04-03T14:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massachusetts-emergency-communications-system-impacted-by-cyberattack/</loc>
		<lastmod>2026-04-03T14:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-future-the-leading-international-ai-and-web3-forum-to-take-place-in-april/</loc>
		<lastmod>2026-04-03T14:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access/</loc>
		<lastmod>2026-04-03T14:57:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/evolution-of-ransomware-multi-extortion-ransomware-attacks/</loc>
		<lastmod>2026-04-03T14:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/picking-up-skull-vibrations-could-be-xr-headset-authentication/</loc>
		<lastmod>2026-04-03T14:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainguard-unveils-factory-2-0-to-automate-hardening-the-software-supply-chain/</loc>
		<lastmod>2026-04-03T15:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chainguard-unveils-factory-2-0-to-automate-hardening-the-software-supply-chain-2/</loc>
		<lastmod>2026-04-03T15:01:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-workforce-study-2025-cybersicherheit-ist-attraktiv-fur-frauen-trotz-ungleicher-behandlung/</loc>
		<lastmod>2026-04-03T15:02:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-prepare-your-business-for-ai-a-workflow-first-approach/</loc>
		<lastmod>2026-04-03T15:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/autosect-mobile-automating-android-and-ios-security-testing/</loc>
		<lastmod>2026-04-03T15:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/government-agencies-see-cyber-threats-as-major-barrier-to-tech-improvements/</loc>
		<lastmod>2026-04-03T15:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-firm-mercor-confirms-breach-as-hackers-claim-4tb-of-stolen-data/</loc>
		<lastmod>2026-04-03T15:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korealinked-hackers-drain-285m-from-drift-in-sophisticated-attack/</loc>
		<lastmod>2026-04-03T15:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/high-severity-vulnerabilities-supply-chain-breaches-and-ai-threats-redefine-cybersecurity-this-week/</loc>
		<lastmod>2026-04-03T15:59:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/armis-state-of-cyberwarfare-report-ai-powered-cyber-attacks-accelerate-worldwide/</loc>
		<lastmod>2026-04-03T15:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-breakthroughs-security-breaches-and-industry-shakeups-define-the-week-in-tech/</loc>
		<lastmod>2026-04-03T16:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-source-code-leak-highlights-big-supply-chain-missteps/</loc>
		<lastmod>2026-04-03T16:01:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-evaluating-threats-automating-defense-at-google/</loc>
		<lastmod>2026-04-03T16:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nhi-governance-is-the-outcome-gitguardian-is-how-you-get-there/</loc>
		<lastmod>2026-04-03T16:55:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-fy2027-budget-again-targets-cisa/</loc>
		<lastmod>2026-04-03T16:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-of-critical-flaws-in-progress-sharefile/</loc>
		<lastmod>2026-04-03T16:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-agentic-ai-startups-to-watch-in-2026/</loc>
		<lastmod>2026-04-03T16:59:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europes-cyber-agency-blames-hacking-gangs-for-massive-data-breach-and-leak/</loc>
		<lastmod>2026-04-03T16:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-2026-state-of-wireless-report-ai-wireless-threats-grow-as-security-gaps-widen/</loc>
		<lastmod>2026-04-03T17:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-alert-50-google-play-apps-linked-to-novoice-malware-reached-2-3m-downloads/</loc>
		<lastmod>2026-04-03T17:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-declares-surveillance-system-breach-a-major-incident/</loc>
		<lastmod>2026-04-03T17:03:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blast-radius-of-teampcp-attacks-expands-amid-hacker-infighting/</loc>
		<lastmod>2026-04-03T17:05:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-amperage/</loc>
		<lastmod>2026-04-03T17:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meet-vespasian-it-sees-what-static-analysis-cant/</loc>
		<lastmod>2026-04-03T17:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blocking-children-from-social-media-is-a-badly-executed-good-idea/</loc>
		<lastmod>2026-04-03T17:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-bug-bounty-program-hits-pause-on-payouts/</loc>
		<lastmod>2026-04-03T17:57:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-is-still-vulnerable-to-an-attack-anthropic-has-already-fixed/</loc>
		<lastmod>2026-04-03T17:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach-2/</loc>
		<lastmod>2026-04-03T18:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach/</loc>
		<lastmod>2026-04-03T18:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/</loc>
		<lastmod>2026-04-03T18:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression/</loc>
		<lastmod>2026-04-03T18:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/do-not-get-highjacked-off-your-own-supply-chain/</loc>
		<lastmod>2026-04-03T18:03:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-supply-chain-incident/</loc>
		<lastmod>2026-04-03T18:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms/</loc>
		<lastmod>2026-04-03T18:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/</loc>
		<lastmod>2026-04-03T18:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/</loc>
		<lastmod>2026-04-03T18:07:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-cyber-agency-attributes-major-data-breach-to-teampcp-hacking-group/</loc>
		<lastmod>2026-04-03T18:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</loc>
		<lastmod>2026-04-03T18:55:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-breaks-precedent-patches-darksword-for-ios-18/</loc>
		<lastmod>2026-04-03T18:55:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/</loc>
		<lastmod>2026-04-03T18:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-msp-ultimate-marketing-playbook/</loc>
		<lastmod>2026-04-03T19:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fcc-proposes-4-5-million-fine-for-voice-service-provider-hosting-suspicious-foreign-call-traffic/</loc>
		<lastmod>2026-04-03T19:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gen-ai-stalls-shadow-ai-rises-a-ciso-concern/</loc>
		<lastmod>2026-04-03T19:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-vendor-breaches-expose-healthcare-risk/</loc>
		<lastmod>2026-04-03T19:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-the-hard-part-isnt-building-the-agent-measuring-effectiveness/</loc>
		<lastmod>2026-04-03T20:54:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-the-hard-part-isnt-building-the-agent-measuring-effectiveness-2/</loc>
		<lastmod>2026-04-03T20:55:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/everything-i-learned-about-harness-engineering-and-ai-factories-in-san-francisco-april-2026/</loc>
		<lastmod>2026-04-03T20:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-lapse-lets-researchers-view-react2shell-hackers-dashboard/</loc>
		<lastmod>2026-04-03T20:57:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-ways-to-improve-your-business-resilience-with-backup-and-recovery/</loc>
		<lastmod>2026-04-03T20:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-steps-to-break-free-from-alert-fatigue-and-build-resilient-security-operations/</loc>
		<lastmod>2026-04-03T20:58:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-essential-steps-to-bulletproof-your-endpoint-security-and-avoid-the-biggest-mistakes-2/</loc>
		<lastmod>2026-04-03T21:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-essential-steps-to-bulletproof-your-endpoint-security-and-avoid-the-biggest-mistakes/</loc>
		<lastmod>2026-04-03T21:00:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-critical-mistakes-that-undermine-cyber-resilience-and-how-to-fix-them/</loc>
		<lastmod>2026-04-03T21:01:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-metrics-it-leaders-cant-afford-to-ignore-for-business-resilience/</loc>
		<lastmod>2026-04-03T21:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-critical-steps-to-achieve-business-resilience-in-cybersecurity/</loc>
		<lastmod>2026-04-03T21:03:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-gives-agencies-two-weeks-to-patch-video-conferencing-bug-exploited-by-chinese-hackers/</loc>
		<lastmod>2026-04-03T21:04:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-chatgpt-ad-blocker-chrome-extension-caught-spying-on-users/</loc>
		<lastmod>2026-04-03T21:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stryker-tells-customers-manufacturing-systems-restored/</loc>
		<lastmod>2026-04-03T21:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-developer-credential-economy-why-exposure-data-is-the-new-front-line-in-the-supply-chain-war/</loc>
		<lastmod>2026-04-03T21:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-gives-users-yet-another-reason-to-be-freaked-out-about-security/</loc>
		<lastmod>2026-04-03T21:56:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/</loc>
		<lastmod>2026-04-03T21:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ais-achilles-heel-is-an-oil-shipping-strait/</loc>
		<lastmod>2026-04-03T21:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-rebooted-breachforums-now-more-secure/</loc>
		<lastmod>2026-04-03T21:58:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-rethinking-trust-in-agentic-ai-security/</loc>
		<lastmod>2026-04-03T21:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk/</loc>
		<lastmod>2026-04-03T22:00:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-secretely-scans-for-6000-chrome-extensions-collects-data/</loc>
		<lastmod>2026-04-03T22:01:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-loses-280-million-as-north-korean-hackers-seize-security-council-powers/</loc>
		<lastmod>2026-04-03T22:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-reliable-are-nhis-in-identity-management/</loc>
		<lastmod>2026-04-03T22:54:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-non-human-identities-safe-for-companies/</loc>
		<lastmod>2026-04-03T22:54:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-protect-your-data-with-agentic-ai/</loc>
		<lastmod>2026-04-03T22:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finnlands-weg-der-nisumsetzung-pragmatische-losungen-und-burokratie-vermeidung/</loc>
		<lastmod>2026-04-03T22:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputing-hohe-erwartungen-bei-deutschen-unternehmen-mit-bisher-wenig-einsatz/</loc>
		<lastmod>2026-04-03T22:58:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/even-microsoft-knows-copilot-shouldnt-be-trusted-with-anything-important/</loc>
		<lastmod>2026-04-03T22:59:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/one-time-passcodes-are-gateway-for-financial-fraud-attacks/</loc>
		<lastmod>2026-04-03T23:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mercor-breach-linked-to-litellm-supply-chain-attack/</loc>
		<lastmod>2026-04-03T23:01:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-theranos-playbook-is-quietly-returning-in-cybersecurity/</loc>
		<lastmod>2026-04-03T23:02:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inconsistent-privacy-labels-dont-tell-users-what-they-are-getting/</loc>
		<lastmod>2026-04-03T23:05:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-wants-to-take-a-battle-axe-to-cisa-again-and-slash-707m-from-budget/</loc>
		<lastmod>2026-04-03T23:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacks-surge-in-march-2026/</loc>
		<lastmod>2026-04-04T03:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/that-dream-job-offer-from-coca-cola-or-ferrari-its-a-trap-for-your-passwords/</loc>
		<lastmod>2026-04-04T03:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-angriff-auf-python-paket-telnyx/</loc>
		<lastmod>2026-04-04T03:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zunehmende-technische-eskalation-bei-ddos-angriffen-in-der-dach-region/</loc>
		<lastmod>2026-04-04T03:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-hidden-code-secretly-scans-users-computers-for-installed-software/</loc>
		<lastmod>2026-04-04T05:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ends-claude-subscription-access-for-third-party-tools-like-openclaw/</loc>
		<lastmod>2026-04-04T05:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-ends-claude-subscription-access-for-third-party-tools-like-openclaw-2/</loc>
		<lastmod>2026-04-04T05:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-privileged-access-management-pam-solutions-2026/</loc>
		<lastmod>2026-04-04T06:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-10-best-identity-and-access-management-iam-companies-2026/</loc>
		<lastmod>2026-04-04T06:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mit-ki-gegen-fake-shops-akamai-stellt-brand-guardian-vor/</loc>
		<lastmod>2026-04-04T06:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-breach-exposed-data-of-30-eu-entities-cert-eu-says/</loc>
		<lastmod>2026-04-04T09:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-launch-social-engineering-offensive-against-key-node-js-maintainers/</loc>
		<lastmod>2026-04-04T09:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-posting-the-claude-code-leak-with-bonus-malware/</loc>
		<lastmod>2026-04-04T10:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-at-work-heres-how-to-avoid-accidentally-leaking-company-data/</loc>
		<lastmod>2026-04-04T11:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-malware-alert-plainjs-compromises-axios-packages/</loc>
		<lastmod>2026-04-04T13:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones/</loc>
		<lastmod>2026-04-04T13:56:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forking-frenzy-ensues-after-euro-office-launch-sparks-onlyoffice-backlash/</loc>
		<lastmod>2026-04-04T14:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forticlient-ems-zero-day-exploited-emergency-hotfixes-available-cve-2026-35616/</loc>
		<lastmod>2026-04-04T14:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</loc>
		<lastmod>2026-04-04T14:56:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-secretly-scans-for-6000-chrome-extensions-collects-data/</loc>
		<lastmod>2026-04-04T14:56:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-security-guidance-as-a-service/</loc>
		<lastmod>2026-04-04T15:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-ubernimmt-tater-suche-private-identifizieren-verdachtige-schneller-als-die-polizei/</loc>
		<lastmod>2026-04-04T15:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-will-code-kopien-loschen-lassen-und-gerat-dadurch-selbst-in-die-kritik/</loc>
		<lastmod>2026-04-04T15:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-fachgebietsleiterin-it-governance-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-04-04T15:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1069-targets-node-js-maintainers-via-fake-linkedin-slack-profiles-2/</loc>
		<lastmod>2026-04-04T16:52:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc1069-targets-node-js-maintainers-via-fake-linkedin-slack-profiles/</loc>
		<lastmod>2026-04-04T16:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-04T17:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-military-contractor-open-sources-tool-for-validating-hidden-communications-networks/</loc>
		<lastmod>2026-04-04T18:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-shivs-openai-with-three-new-ai-models-for-speech-and-images/</loc>
		<lastmod>2026-04-04T18:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-battles-chinese-open-weights-models-with-gemma-4/</loc>
		<lastmod>2026-04-04T18:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-models-will-deceive-you-to-save-their-own-kind/</loc>
		<lastmod>2026-04-04T18:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-ransomware-group-claims-the-hack-of-german-political-party-die-linke/</loc>
		<lastmod>2026-04-04T18:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sample-malware-phone-back-cc-command-and-control-md5s-from-domains-belonging-to-xss-forum-users-a-compilation/</loc>
		<lastmod>2026-04-04T20:54:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-microsoft-engineer-believes-azure-problems-stem-from-talent-exodus/</loc>
		<lastmod>2026-04-04T21:54:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/</loc>
		<lastmod>2026-04-04T21:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-choosing-agentic-ai-empowers-business-leaders/</loc>
		<lastmod>2026-04-04T22:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-scalable-is-agentic-ai-for-growing-businesses/</loc>
		<lastmod>2026-04-04T22:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-nhis-drive-technology-innovation/</loc>
		<lastmod>2026-04-04T22:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datensouveranitat-gefahrdet-jedes-dritte-unternehmen-2025-von-einem-vorfall-betroffen/</loc>
		<lastmod>2026-04-04T22:57:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-admits-claude-code-users-hitting-usage-limits-way-faster-than-expected/</loc>
		<lastmod>2026-04-04T22:58:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommunikationsbias-unsichtbare-meinungsverzerrung-mittels-ki/</loc>
		<lastmod>2026-04-04T23:54:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa-2/</loc>
		<lastmod>2026-04-05T03:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/west-virginia-gives-ciso-greater-authority-to-lead-statewide-cybersecurity-program/</loc>
		<lastmod>2026-04-05T03:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-connected-coffee-machine-reportedly-led-to-corporate-data-breach/</loc>
		<lastmod>2026-04-05T03:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-massive-forex-trading-data-leak-could-expose-438000-user-records/</loc>
		<lastmod>2026-04-05T03:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attack-on-vivaticket-disrupts-louvre-and-major-european-museums/</loc>
		<lastmod>2026-04-05T03:57:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-hackergruppe-ta416-greift-eu-und-nato-an/</loc>
		<lastmod>2026-04-05T03:58:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</loc>
		<lastmod>2026-04-05T05:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/</loc>
		<lastmod>2026-04-05T05:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-axios-npm-supply-chain-compromise-critical-forticlient-ems-bugs-exploited/</loc>
		<lastmod>2026-04-05T08:54:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/elastic-eliminiert-soar-automation-tax-mit-nativen-workflows/</loc>
		<lastmod>2026-04-05T08:55:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ddos-mitigation-fails-5-gaps-that-testing-reveals/</loc>
		<lastmod>2026-04-05T09:54:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/image-or-malware-read-until-the-end-and-answer-in-comments/</loc>
		<lastmod>2026-04-05T09:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-04-05T09:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hack-that-exposed-syrias-sweeping-security-failures/</loc>
		<lastmod>2026-04-05T09:56:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fifa-weltmeisterschaft-2026-vorsicht-betrug-im-zusammenhang-mit-fusball/</loc>
		<lastmod>2026-04-05T11:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards-2/</loc>
		<lastmod>2026-04-05T11:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irankrieg-usa-schranken-private-satellitenbilder-ein/</loc>
		<lastmod>2026-04-05T11:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/social-engineering-hacker-nehmen-open-source-maintainer-ins-visier/</loc>
		<lastmod>2026-04-05T11:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptography-moving-from-awareness-to-execution/</loc>
		<lastmod>2026-04-05T12:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-react2shell-in-automated-credential-theft-campaign/</loc>
		<lastmod>2026-04-05T14:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-guardrails-beyond-vibes/</loc>
		<lastmod>2026-04-05T15:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-91/</loc>
		<lastmod>2026-04-05T15:55:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/browsergate-linkedin-tracks-6000-browser-extensions-on-users-pcs/</loc>
		<lastmod>2026-04-05T16:54:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latest-breachforums-reboot-tied-to-fake-shinyhunters-admin/</loc>
		<lastmod>2026-04-05T16:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released/</loc>
		<lastmod>2026-04-05T19:54:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/</loc>
		<lastmod>2026-04-05T19:55:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/</loc>
		<lastmod>2026-04-05T20:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-assured-are-the-security-protocols-for-nhis/</loc>
		<lastmod>2026-04-05T22:54:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-capabilities-do-nhis-bring-to-cybersecurity/</loc>
		<lastmod>2026-04-05T22:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-is-proactive-nhi-management-crucial/</loc>
		<lastmod>2026-04-05T22:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/datenpanne-bestatigt-shinyhunters-attacke-auf-europaische-kommission/</loc>
		<lastmod>2026-04-05T22:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unternehmens-pcs-in-aller-welt-bis-zu-76-tage-im-jahr-freier-zugang-fur-cyberkriminelle/</loc>
		<lastmod>2026-04-05T23:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-architecture-for-decentralized-mcp-resource-provisioning/</loc>
		<lastmod>2026-04-06T03:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/killer-robots-are-here-now-what-lock-and-code-s07e07/</loc>
		<lastmod>2026-04-06T03:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/</loc>
		<lastmod>2026-04-06T03:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-spread-vidar-and-ghostsocks-malware-through-claude-code-leak/</loc>
		<lastmod>2026-04-06T03:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-leaders-to-watch-in-californias-artificial-intelligence-industry/</loc>
		<lastmod>2026-04-06T03:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-grapple-with-ai-demands-within-flat-budgets/</loc>
		<lastmod>2026-04-06T04:53:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisos-grapple-with-ai-demands-within-flat-budgets-2/</loc>
		<lastmod>2026-04-06T04:53:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-proton-authenticator-is-an-endend-encrypted-open-source-2fa-app/</loc>
		<lastmod>2026-04-06T05:54:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-talent-looks-the-other-way-as-wireless-security-incidents-pile-up/</loc>
		<lastmod>2026-04-06T05:55:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2000-forticlient-ems-instances-exposed-online-as-attackers-exploit-active-rce-flaw/</loc>
		<lastmod>2026-04-06T05:56:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/36-malicious-strapi-npm-packages-deliver-redis-rce-persistent-c2-malware/</loc>
		<lastmod>2026-04-06T05:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-deepmind-flags-new-threat-as-malicious-web-content-puts-ai-agents-at-risk/</loc>
		<lastmod>2026-04-06T05:58:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitbucket-confluence-und-mehr-betroffen-code-und-denialservice-angriffe-bei-atlassian-moglich/</loc>
		<lastmod>2026-04-06T05:59:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-youtube-found-negligent-a-turning-point-for-big-tech/</loc>
		<lastmod>2026-04-06T06:54:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw/</loc>
		<lastmod>2026-04-06T06:54:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/residential-proxies-make-a-mockery-of-ip-based-defenses/</loc>
		<lastmod>2026-04-06T06:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-weaponize-fake-microsoft-teams-domains-to-target-users/</loc>
		<lastmod>2026-04-06T06:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/resokerrat-hijacks-telegram-api-to-command-infected-windows-pcs/</loc>
		<lastmod>2026-04-06T06:57:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/education-authority-cyberattack-disrupts-schools-across-northern-ireland/</loc>
		<lastmod>2026-04-06T07:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/</loc>
		<lastmod>2026-04-06T07:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrielle-netze-und-cybersicherheit-siemens-und-palo-alto-verbinden-security-mit-privatem-5g/</loc>
		<lastmod>2026-04-06T07:55:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proven-incident-response-and-business-continuity-strategy/</loc>
		<lastmod>2026-04-06T08:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-march-30-april-5/</loc>
		<lastmod>2026-04-06T08:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-traffic-server-flaw-allowed-attackers-to-trigger-denialservice-attacks/</loc>
		<lastmod>2026-04-06T08:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-traffic-server-flaw-allowed-attackers-to-trigger-denialservice-attacks/</loc>
		<lastmod>2026-04-06T08:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-dgraph-database-flaw-allowed-attackers-to-bypass-authentication/</loc>
		<lastmod>2026-04-06T08:57:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-breach-ilspy-wordpress-domain-to-deliver-malware/</loc>
		<lastmod>2026-04-06T08:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poisoned-axios-package-spreads-cross-platform-malware-via-phantom-dependency/</loc>
		<lastmod>2026-04-06T08:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/130-firmen-attackiert-fahndung-nach-cyberkriminellen-2/</loc>
		<lastmod>2026-04-06T09:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/130-firmen-attackiert-fahndung-nach-cyberkriminellen/</loc>
		<lastmod>2026-04-06T09:00:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/achtung-kleinanzeigen-betrug-wer-diese-warnsignale-ignoriert-verliert-bares-geld/</loc>
		<lastmod>2026-04-06T09:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chat-with-your-data-introducing-ai-assistant-for-web-supply-chain-defense/</loc>
		<lastmod>2026-04-06T09:54:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
		<lastmod>2026-04-06T09:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-ways-attackers-abuse-ai-services-to-hack-your-business/</loc>
		<lastmod>2026-04-06T09:56:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/escaping-the-cots-trap/</loc>
		<lastmod>2026-04-06T09:57:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-password-spraying/</loc>
		<lastmod>2026-04-06T09:58:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-disrupts-massachusetts-emergency-dispatch-911-services-remain-active/</loc>
		<lastmod>2026-04-06T09:59:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banning-routers-wont-secure-the-internet/</loc>
		<lastmod>2026-04-06T10:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authentication-is-broken-heres-how-security-leaders-can-actually-fix-it/</loc>
		<lastmod>2026-04-06T10:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-revil-leader-unkn-identified-by-german-authorities-in-new-takedown-effort/</loc>
		<lastmod>2026-04-06T10:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-bug-bounty-program-hits-record-17-million-in-2025-payouts/</loc>
		<lastmod>2026-04-06T10:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/</loc>
		<lastmod>2026-04-06T10:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinesische-apt-nutzt-citrixday-salt-typhoon-systematischer-und-verdeckter-angriff/</loc>
		<lastmod>2026-04-06T10:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-enabled-society-of-the-future-must-be-breach-ready/</loc>
		<lastmod>2026-04-06T11:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6th-april-threat-intelligence-report/</loc>
		<lastmod>2026-04-06T11:54:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-pose-as-trading-firm-to-steal-285m-from-drift/</loc>
		<lastmod>2026-04-06T11:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-modular-malware-strategy-hides-attribution-defies-takedowns/</loc>
		<lastmod>2026-04-06T11:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-claude-code-flaw-silently-bypasses-user-configured-security-rules/</loc>
		<lastmod>2026-04-06T11:58:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-github-ci-update-steals-secrets-and-tokens/</loc>
		<lastmod>2026-04-06T12:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-github-ci-update-steals-secrets-and-tokens-2/</loc>
		<lastmod>2026-04-06T12:59:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-compliance-cliff-email-encryption-and-data-security-unpacked/</loc>
		<lastmod>2026-04-06T12:54:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-msp-90-daymoney-back-guarantee/</loc>
		<lastmod>2026-04-06T12:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-abuse-lnks-and-github-repos-in-ongoing-campaign/</loc>
		<lastmod>2026-04-06T12:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-abuse-lnks-and-github-repos-in-ongoing-campaign-2/</loc>
		<lastmod>2026-04-06T12:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-backed-malware-spread-via-lnk-files-in-south-korea/</loc>
		<lastmod>2026-04-06T12:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-google-workspace-blind-spot-every-k-12-it-team-misses/</loc>
		<lastmod>2026-04-06T13:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gartner-iam-summit-2026-identity-expanded-faster-than-most-programs-did/</loc>
		<lastmod>2026-04-06T13:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cybersecurity-is-the-first-step-in-preparing-your-company-for-an-ipo/</loc>
		<lastmod>2026-04-06T13:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-outage-hits-russian-banking-apps-metro-payments-across-regions/</loc>
		<lastmod>2026-04-06T13:57:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/convicted-spyware-maker-bryan-fleming-avoids-jail-at-sentencing/</loc>
		<lastmod>2026-04-06T13:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/samsung-to-shut-down-its-messaging-app-switch-to-google-messages-in-july/</loc>
		<lastmod>2026-04-06T13:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-lazy-loading-to-media-files-in-new-chrome-release/</loc>
		<lastmod>2026-04-06T14:00:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-protocol-hit-in-286m-suspected-north-korea-linked-crypto-heist/</loc>
		<lastmod>2026-04-06T14:01:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc>
		<lastmod>2026-04-06T14:02:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-threaten-to-leak-data-after-cyberattack-on-german-party-die-linke/</loc>
		<lastmod>2026-04-06T14:03:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ticket-savings-of-up-to-500-this-week-for-techcrunch-disrupt-2026/</loc>
		<lastmod>2026-04-06T14:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-targets-wordpress-with-new-ai-powered-emdash-cms/</loc>
		<lastmod>2026-04-06T14:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-security-researchers-and-red-teams-are-turning-to-workflow-automation/</loc>
		<lastmod>2026-04-06T14:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed/</loc>
		<lastmod>2026-04-06T14:58:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-state-of-ai-risk-management-in-2026-reveals-a-growing-confidence-gap/</loc>
		<lastmod>2026-04-06T14:59:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/</loc>
		<lastmod>2026-04-06T14:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-rolls-out-fix-new-macos-update-could-protect-100m-mac-users/</loc>
		<lastmod>2026-04-06T15:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-simple-breach-monitoring-is-no-longer-enough/</loc>
		<lastmod>2026-04-06T15:02:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-pypi-ai-proxy-steals-claude-prompt-exfiltrates-data/</loc>
		<lastmod>2026-04-06T15:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-in-healthcare-is-here-to-stay/</loc>
		<lastmod>2026-04-06T15:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/owasp-genai-security-project-gets-update-new-tools-matrix/</loc>
		<lastmod>2026-04-06T15:05:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc>
		<lastmod>2026-04-06T15:05:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc>
		<lastmod>2026-04-06T15:06:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-identity-governance-2026-experten-fehlt-die-transparenz-in-sachen-ki/</loc>
		<lastmod>2026-04-06T15:09:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-identity-governance-2026-experten-fehlt-die-transparenz-in-sachen-ki/</loc>
		<lastmod>2026-04-06T15:09:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-of-identity-governance-2026-experten-fehlt-die-transparenz-in-sachen-ki/</loc>
		<lastmod>2026-04-06T15:09:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-code-is-free-securing-software-in-the-agentic-future/</loc>
		<lastmod>2026-04-06T15:54:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-product-team-is-moving-fast-but-growth-is-stalling-how-lack-of-strategic-clarity-is-killing-business-outcome/</loc>
		<lastmod>2026-04-06T15:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hims-hers-says-limited-data-stolen-in-social-engineering-attack/</loc>
		<lastmod>2026-04-06T15:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-in-forticlient-ems-under-exploitation/</loc>
		<lastmod>2026-04-06T15:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-forticlient-ems-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-04-06T15:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online-2/</loc>
		<lastmod>2026-04-06T16:00:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks/</loc>
		<lastmod>2026-04-06T16:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/private-jets-deserted-shores-and-an-unbuilt-resort-alleged-links-to-sanctioned-scam-empire-revealed-in-timor-leste/</loc>
		<lastmod>2026-04-06T16:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schneller-zuruck-zur-kontrolle-microsoft-und-rubrik-schliesen-die-lucke-bei-identitatsangriffen/</loc>
		<lastmod>2026-04-06T16:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-validate-microsegmentation-policies-before-enforcement/</loc>
		<lastmod>2026-04-06T16:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-i-cancelled-semrush-after-7-years-and-why-geo-is-the-only-b2b-growth-strategy-that-matters-now/</loc>
		<lastmod>2026-04-06T16:54:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-becoming-an-operating-system-layer/</loc>
		<lastmod>2026-04-06T16:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-20-hottest-ai-cybersecurity-companies-the-2026-crn-ai-100/</loc>
		<lastmod>2026-04-06T16:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-us-warn-of-latest-fortinet-bug-being-exploited-in-wild/</loc>
		<lastmod>2026-04-06T16:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/undress-app-deepnude-boomt-millionen-opfer-kaum-konsequenzen/</loc>
		<lastmod>2026-04-06T16:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fortinet-flaw-allows-unauthorized-access-to-enterprise-systems/</loc>
		<lastmod>2026-04-06T16:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: ec7dfc90781adb8004181c0e388184d1; Queries for sitemap: 3; Total queries: 88; Seconds: 4.42; Memory for sitemap: 1KB; Total memory: 46MB -->
