<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='8. April 2026 7:05 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/</loc>
		<lastmod>2026-04-06T17:01:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday-2/</loc>
		<lastmod>2026-04-06T17:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-credential-harvesting-campaign-exploits-react2shell-flaw/</loc>
		<lastmod>2026-04-06T17:02:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ten-great-cybersecurity-job-opportunities/</loc>
		<lastmod>2026-04-06T17:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-little-red-dots/</loc>
		<lastmod>2026-04-06T17:55:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-04-06T17:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/</loc>
		<lastmod>2026-04-06T17:58:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/watch-this-video-of-how-a-job-interviewer-exposes-a-north-korean-fake-it-worker/</loc>
		<lastmod>2026-04-06T17:59:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-hijack-of-one-of-the-webs-most-used-open-source-projects-was-likely-weeks-in-the-making/</loc>
		<lastmod>2026-04-06T18:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/missile-alert-phishing-exploits-iranisrael-conflict-for-microsoft-logins/</loc>
		<lastmod>2026-04-06T18:00:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-target-zero-day-flaw-in-fortinet-security-software/</loc>
		<lastmod>2026-04-06T18:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/</loc>
		<lastmod>2026-04-06T18:02:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/</loc>
		<lastmod>2026-04-06T18:04:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc>
		<lastmod>2026-04-06T18:04:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-value-of-immutability-with-object-first/</loc>
		<lastmod>2026-04-06T18:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-your-data-with-veeam/</loc>
		<lastmod>2026-04-06T18:55:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schema-confidence-gap-ai-data-quality-risks-explained/</loc>
		<lastmod>2026-04-06T18:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-customizable-b2b-authentication-solutions-white-label-login-branded-auth-enterprise-sso/</loc>
		<lastmod>2026-04-06T18:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-customizable-b2b-authentication-solutions-white-label-login-branded-auth-enterprise-sso-2/</loc>
		<lastmod>2026-04-06T18:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-spring-2026-threat-hunting-in-the-matrix/</loc>
		<lastmod>2026-04-06T18:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/first-stalkerware-maker-prosecuted-since-2014-receives-no-jail-time/</loc>
		<lastmod>2026-04-06T19:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploited-this-critical-forticlient-ems-bug-as-a-0-day/</loc>
		<lastmod>2026-04-06T19:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-work-expanded-risk-what-needs-to-change/</loc>
		<lastmod>2026-04-06T19:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/border-patrol-agents-sold-challenge-coins-with-charlottes-web-characters-in-riot-gear/</loc>
		<lastmod>2026-04-06T19:04:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-removes-support-and-recovery-assistant-from-windows/</loc>
		<lastmod>2026-04-06T19:04:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-the-worst-the-week-your-security-tools-became-the-disguise/</loc>
		<lastmod>2026-04-06T19:54:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-tech-vows-to-continue-csam-scanning-in-europe-despite-expiration-of-law-allowing-it/</loc>
		<lastmod>2026-04-06T19:55:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-police-unmask-two-suspects-linked-to-revil-ransomware-gang/</loc>
		<lastmod>2026-04-06T19:56:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/not-without-my-ai-agent-models-break-rules-to-save-peers/</loc>
		<lastmod>2026-04-06T19:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/</loc>
		<lastmod>2026-04-06T19:57:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/</loc>
		<lastmod>2026-04-06T19:59:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc>
		<lastmod>2026-04-06T19:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mexicos-meta-ruling-and-encryption/</loc>
		<lastmod>2026-04-06T20:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mitre-attck-v19-drops-april-28-how-to-prepare-your-soc-for-the-defense-evasion-split/</loc>
		<lastmod>2026-04-06T20:54:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-agents-exploiting-auth-by-one/</loc>
		<lastmod>2026-04-06T20:55:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-cyber-fraud-surges-to-17-6-billion-in-losses-as-scams-crypto-theft-soar/</loc>
		<lastmod>2026-04-06T20:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medusa-ransomware-group-using-zero-days-to-launch-attacks-within-24-hours-of-breach-microsoft-says/</loc>
		<lastmod>2026-04-06T20:58:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks/</loc>
		<lastmod>2026-04-06T20:59:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojai-extends-scope-and-reach-of-platform-for-securing-ai-environments/</loc>
		<lastmod>2026-04-06T21:54:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-helix-praetorian-guards-ai-architecture-for-offensive-security/</loc>
		<lastmod>2026-04-06T21:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-pending/</loc>
		<lastmod>2026-04-06T21:56:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-attack-shows-social-complex-engineering-is-industrialized/</loc>
		<lastmod>2026-04-06T21:56:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-issues-emergency-patch-for-forticlient-zero-day/</loc>
		<lastmod>2026-04-06T21:58:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-issues-emergency-patch-for-forticlient-zero-day-2/</loc>
		<lastmod>2026-04-06T21:58:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohnenfluge-im-fruhling-zunahme-der-konflikte-droht/</loc>
		<lastmod>2026-04-06T22:54:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/</loc>
		<lastmod>2026-04-06T22:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-assisted-supply-chain-attack-targets-github/</loc>
		<lastmod>2026-04-06T22:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-does-agentic-ai-contribute-to-tech-stability/</loc>
		<lastmod>2026-04-06T23:54:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-smart-are-nhis-in-managing-complex-tasks/</loc>
		<lastmod>2026-04-06T23:54:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-can-agentic-ai-keep-you-ahead-of-cyber-threats/</loc>
		<lastmod>2026-04-06T23:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-found-vulns-in-this-popular-linux-and-unix-print-server/</loc>
		<lastmod>2026-04-06T23:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-budget-proposal-would-slash-cisa-after-bruising-year/</loc>
		<lastmod>2026-04-06T23:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-budget-proposal-would-slash-cisa-after-bruising-year-2/</loc>
		<lastmod>2026-04-06T23:59:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-budget-proposal-would-slash-cisa-after-bruising-year-3/</loc>
		<lastmod>2026-04-06T23:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/censys-raises-70m-to-advance-ai-driven-threat-intelligence/</loc>
		<lastmod>2026-04-07T00:01:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2027-potus-budget-proposal-targets-cisa-with-funding-cuts/</loc>
		<lastmod>2026-04-07T00:01:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-safe-key-encapsulation-mechanisms-for-sensitive-context-transport/</loc>
		<lastmod>2026-04-07T03:54:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-single-source-of-truth-streamlines-regulatory-compliance/</loc>
		<lastmod>2026-04-07T03:55:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-bot-protection-and-control-are-essential-for-application-security/</loc>
		<lastmod>2026-04-07T03:57:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yahoo-japans-owner-consolidating-164-openstack-clusters-into-one/</loc>
		<lastmod>2026-04-07T03:58:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-an-ai-agent-screws-up-while-running-your-business-theres-nobody-to-sue/</loc>
		<lastmod>2026-04-07T03:58:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-nvidia-learned-to-embrace-the-light-in-its-quest-for-scale/</loc>
		<lastmod>2026-04-07T03:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/</loc>
		<lastmod>2026-04-07T04:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-study-finds-llms-are-embedded-at-every-stage-of-abuse-detection/</loc>
		<lastmod>2026-04-07T04:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/german-authorities-identify-revil-and-gandcrab-ransomware-bosses/</loc>
		<lastmod>2026-04-07T04:54:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsfocus-monthly-apt-insights-february-2026/</loc>
		<lastmod>2026-04-07T05:55:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-case-for-fixing-cwe-weakness-patterns-instead-of-patching-one-bug-at-a-time/</loc>
		<lastmod>2026-04-07T05:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-mimecast-brings-enterprise-grade-email-protection-to-api-deployment/</loc>
		<lastmod>2026-04-07T05:57:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-defenders-to-actively-exploited-fortinet-zero-day-vulnerability/</loc>
		<lastmod>2026-04-07T05:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tradingview-premium-reddit-posts-spread-vidar-and-amos-stealers/</loc>
		<lastmod>2026-04-07T05:58:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-defender-0-day-published-online-giving-attackers-potential-full-access/</loc>
		<lastmod>2026-04-07T05:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2025-19028-cve-2025-32975-systemen-durch-fehlerhafte-authentifizierung/</loc>
		<lastmod>2026-04-07T06:00:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/</loc>
		<lastmod>2026-04-07T06:54:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-storm-1175-exploiting-web-facing-vulnerabilities-to-deploy-medusa-ransomware/</loc>
		<lastmod>2026-04-07T06:54:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/</loc>
		<lastmod>2026-04-07T06:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed-2/</loc>
		<lastmod>2026-04-07T06:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed-3/</loc>
		<lastmod>2026-04-07T06:56:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/50000-wordpress-sites-running-ninja-forms-vulnerable-to-critical-file-upload-rce/</loc>
		<lastmod>2026-04-07T06:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-easm-arbeiten-unternehmen-im-blindflug-drei-schritte-fur-wirksames-external-attack-surface-management/</loc>
		<lastmod>2026-04-07T06:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forticlientems-vulnerabilities-under-active-exploitation-expose-systems-to-rce/</loc>
		<lastmod>2026-04-07T06:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/appsflyer-sdk-exploited-in-new-supply-chain-crypto-attack/</loc>
		<lastmod>2026-04-07T07:54:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actors-exploit-logmein-resolve-screenconnect-in-phishing-campaigns/</loc>
		<lastmod>2026-04-07T07:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-hit-m365-tenants-in-middle-east-password-spray-campaign/</loc>
		<lastmod>2026-04-07T07:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ratgeber-fur-unternehmen-und-privatanwender-verschlusselte-usb-sticks-kingston-erklart-technik-und-auswahlkriterien/</loc>
		<lastmod>2026-04-07T07:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoff-mit-microsoft-frustrierter-forscher-leakt-zero-day-exploit-fur-windows/</loc>
		<lastmod>2026-04-07T07:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/child-safety-at-risk-as-eu-csam-detection-law-lapses-reporting-concerns-rise/</loc>
		<lastmod>2026-04-07T08:54:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-installers-spread-rats-monero-miners-in-ongoing-malware-campaign/</loc>
		<lastmod>2026-04-07T08:54:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/</loc>
		<lastmod>2026-04-07T08:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gigaom-radar-check-point-setzt-sich-erneut-bei-application-security-an-die-spitze/</loc>
		<lastmod>2026-04-07T08:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-security-starts-before-login/</loc>
		<lastmod>2026-04-07T09:55:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/life-imprisonment-for-cambodian-scam-compound-operators-but-will-it-make-a-difference/</loc>
		<lastmod>2026-04-07T09:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experts-published-unpatched-windows-zero-day-bluehammer/</loc>
		<lastmod>2026-04-07T09:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-copilot-cli-gets-a-second-opinion-feature-built-on-cross-model-review/</loc>
		<lastmod>2026-04-07T09:59:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comp-ai-the-open-source-way-to-get-compliant-with-soc-2-iso-27001-hipaa-and-gdpr/</loc>
		<lastmod>2026-04-07T09:59:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-opens-applications-for-an-external-ai-safety-research-fellowship/</loc>
		<lastmod>2026-04-07T10:01:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-flowise-injection-vulnerability-as-15000-instances-remain-exposed/</loc>
		<lastmod>2026-04-07T10:01:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-ki-agenten-entdeckt-print-server-lucken-gefahrden-zahlreiche-linux-systeme/</loc>
		<lastmod>2026-04-07T10:02:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-masking-gaps-that-could-expose-your-organization/</loc>
		<lastmod>2026-04-07T10:55:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-is-the-new-attack-surface-and-most-teams-arent-prepared/</loc>
		<lastmod>2026-04-07T10:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-neu-bewertet-der-blinde-fleck-im-sicherheitskonzept/</loc>
		<lastmod>2026-04-07T10:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-security-is-now-a-board-level-issue-heres-what-csos-need-to-know/</loc>
		<lastmod>2026-04-07T10:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough/</loc>
		<lastmod>2026-04-07T10:59:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions/</loc>
		<lastmod>2026-04-07T11:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-trojan-horse-of-cybercrime-weaponizing-saas-notification-pipelines/</loc>
		<lastmod>2026-04-07T11:01:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/year-in-review-vulnerabilities-old-and-new-and-something-react2/</loc>
		<lastmod>2026-04-07T11:02:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-fortinet-forticlient-ems-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-07T11:04:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tor-backed-clickfix-campaign-drops-node-js-rat-on-windows/</loc>
		<lastmod>2026-04-07T11:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-android-flaw-allows-zero-interaction-denial-of-service-attacks/</loc>
		<lastmod>2026-04-07T11:06:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc>
		<lastmod>2026-04-07T11:07:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-1175-exploits-flaws-in-high-velocity-medusa-attacks/</loc>
		<lastmod>2026-04-07T11:07:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploited/</loc>
		<lastmod>2026-04-07T11:08:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-deaktiviert-legacy-authentifizierung-schrittweise-in-windows-server-ntlm-vor-dem-aus/</loc>
		<lastmod>2026-04-07T11:10:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rheinmetall-und-co-datenhandler-gefahrden-rustungsunternehmen-in-der-ukraine/</loc>
		<lastmod>2026-04-07T11:12:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/druckersystem-cups-lucken-gefahrden-zahlreiche-linux-systeme/</loc>
		<lastmod>2026-04-07T11:13:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-next-js-react2shell-vulnerability-breach-766-hosts-in-24-hours/</loc>
		<lastmod>2026-04-07T11:54:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/qualys-studie-zeigt-warum-die-klassische-cyberabwehr-an-ihre-grenzen-stost/</loc>
		<lastmod>2026-04-07T11:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ingenieur-gesteht-kollegen-aus-it-ausgesperrt-und-arbeitgeber-erpresst/</loc>
		<lastmod>2026-04-07T11:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-gmail-filtering-your-emails-causes-signs-fixes/</loc>
		<lastmod>2026-04-07T12:54:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-we-learned-about-tee-security-from-auditing-whatsapps-private-inference/</loc>
		<lastmod>2026-04-07T12:54:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fireside-chat-geopolitical-turmoil-rising-ai-risk-add-a-new-layer-to-enterprise-cyber-defense/</loc>
		<lastmod>2026-04-07T12:55:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-send-secure-email-in-gmail-step-by-step-guide/</loc>
		<lastmod>2026-04-07T12:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-hits-northern-irelands-centralized-school-network-disrupting-access-for-thousands/</loc>
		<lastmod>2026-04-07T12:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/talos-takes-2025s-ransomware-trends-and-zombie-vulnerabilities/</loc>
		<lastmod>2026-04-07T12:58:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-and-non-human-identities-creating-critical-security-gaps-report/</loc>
		<lastmod>2026-04-07T12:59:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gpubreach-exploit-uses-gpu-memory-bit-flips-to-achieve-full-system-takeover/</loc>
		<lastmod>2026-04-07T13:01:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-enabled-device-code-phishing-campaign-exploits-oauth-flow-for-account-takeover/</loc>
		<lastmod>2026-04-07T13:02:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kubernetes-flaws-let-hackers-jump-from-containers-to-cloud-accounts/</loc>
		<lastmod>2026-04-07T13:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gpubreach-attack-could-lead-to-full-system-takeover-and-root-shell-access/</loc>
		<lastmod>2026-04-07T13:04:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-gemini-npm-package-steals-ai-tool-tokens/</loc>
		<lastmod>2026-04-07T13:04:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk/</loc>
		<lastmod>2026-04-07T13:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-cost-of-recurring-credential-incidents/</loc>
		<lastmod>2026-04-07T13:06:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/</loc>
		<lastmod>2026-04-07T13:07:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alkohol-tester-betroffen-cyberangriff-blockiert-autos/</loc>
		<lastmod>2026-04-07T13:09:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantencomputer-neue-ansatze-brechen-verschlusselung-mit-weniger-qubits/</loc>
		<lastmod>2026-04-07T13:09:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minimus-hyper-growth-underway-with-yael-nardi-as-new-chief-business-officer/</loc>
		<lastmod>2026-04-07T13:55:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/traffic-violation-scams-swap-links-for-qr-codes-to-steal-your-card-details/</loc>
		<lastmod>2026-04-07T13:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/support-platform-breach-exposes-hims-amp-hers-customer-data/</loc>
		<lastmod>2026-04-07T13:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zeroclick-grafana-ai-attack-can-enable-enterprise-data-exfiltration/</loc>
		<lastmod>2026-04-07T13:57:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-telecom-giant-rostelecom-disrupts-internet-services-across-russia/</loc>
		<lastmod>2026-04-07T13:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackergruppe-nickel-alley-tauscht-it-experten-mit-gefalschten-jobs/</loc>
		<lastmod>2026-04-07T13:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amds-ai-director-slams-claude-code-for-becoming-dumber-and-lazier-since-last-update/</loc>
		<lastmod>2026-04-07T14:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/</loc>
		<lastmod>2026-04-07T14:02:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudflare-moves-up-its-post-quantum-deadline-as-researchers-narrow-the-path-to-q-day/</loc>
		<lastmod>2026-04-07T14:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cups-vulnerabilities-could-allow-remote-attackers-to-achieve-root-level-code-execution/</loc>
		<lastmod>2026-04-07T14:05:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bpfdoor-variants-hide-with-stateless-c2-and-icmp-relay-tactics/</loc>
		<lastmod>2026-04-07T14:06:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windmill-developer-platform-flaws-expose-users-to-rce-attacks-proofconcept-published/</loc>
		<lastmod>2026-04-07T14:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/focusing-on-the-people-in-cybersecurity-at-rsac-2026-conference/</loc>
		<lastmod>2026-04-07T14:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc>
		<lastmod>2026-04-07T14:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-deckt-gefalschte-jobangebote-auf-karrierenetzwerken-auf/</loc>
		<lastmod>2026-04-07T14:10:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-takeaways-from-the-future-of-search-discovery-understanding-agentic-commerce-webinar/</loc>
		<lastmod>2026-04-07T14:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-tenant-saas-and-single-sign-on-sso/</loc>
		<lastmod>2026-04-07T14:58:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-exposes-russian-cyber-unit-hacking-home-routers-to-hijack-internet-traffic/</loc>
		<lastmod>2026-04-07T14:58:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafanaghost-bypasses-grafanas-ai-defenses-without-leaving-a-trace/</loc>
		<lastmod>2026-04-07T15:00:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-administration-plans-to-cut-cybersecurity-agencys-budget-by-700-million/</loc>
		<lastmod>2026-04-07T15:00:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-broken-physics-of-remediation-studie-zeigt-fundamentalen-wandel-in-der-cyberabwehr/</loc>
		<lastmod>2026-04-07T15:03:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-moving-storm-1175-uses-new-exploits-to-breach-networks-and-drop-medusa/</loc>
		<lastmod>2026-04-07T15:05:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miwic26-anmol-agarwal-senior-security-researcher-at-nokia/</loc>
		<lastmod>2026-04-07T15:06:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-your-automated-pentesting-tool-just-hit-a-wall/</loc>
		<lastmod>2026-04-07T15:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lies-damned-lies-and-cybersecurity-metrics/</loc>
		<lastmod>2026-04-07T15:08:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/umfrage-von-netfiles-kaum-souveraner-datenaustausch-in-deutschland/</loc>
		<lastmod>2026-04-07T15:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-developing-deploying-ai-fingerprints-for-advanced-threat-detection/</loc>
		<lastmod>2026-04-07T15:54:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legacy-systems-are-undermining-financial-institution-cybersecurity/</loc>
		<lastmod>2026-04-07T15:55:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/container-security-without-context-is-just-more-noise/</loc>
		<lastmod>2026-04-07T15:55:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/react2shell-vulnerability-helps-hackers-steal-credentials-ai-platform-keys-and-other-sensitive-data/</loc>
		<lastmod>2026-04-07T15:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-outage-cripples-russian-banking-apps-and-metro-payments-nationwide/</loc>
		<lastmod>2026-04-07T15:57:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stop-texting-fbi-warning-drives-apples-iphone-messaging-update/</loc>
		<lastmod>2026-04-07T15:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rsac-2026-how-ai-is-reshaping-cybersecurity-faster-than-ever/</loc>
		<lastmod>2026-04-07T15:59:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/human-vs-ai-debates-shape-rsac-2026-cybersecurity-trends/</loc>
		<lastmod>2026-04-07T16:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafanaghost-exploit-bypasses-ai-guardrails-for-silent-data-exfiltration/</loc>
		<lastmod>2026-04-07T16:01:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-im-wandel-mehr-attacken-weniger-zahlende-opfer/</loc>
		<lastmod>2026-04-07T16:02:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-complete-guide-to-passwordless-authentication-in-2026-how-it-works-why-it-matters-and-how-to-implement-it/</loc>
		<lastmod>2026-04-07T16:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-devsecops-and-the-future-of-application-security-the-gartner-report/</loc>
		<lastmod>2026-04-07T16:56:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-sentry-alternatives-for-error-tracking-and-monitoring-2026/</loc>
		<lastmod>2026-04-07T16:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-cluster-launches-extortion-campaign-using-social-engineering/</loc>
		<lastmod>2026-04-07T16:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/massachusetts-hospital-turning-ambulances-away-after-cyberattack/</loc>
		<lastmod>2026-04-07T16:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafanaghost-vulnerability-allows-data-theft-via-ai-injection/</loc>
		<lastmod>2026-04-07T16:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-hijack-internet-traffic-using-vulnerable-routers/</loc>
		<lastmod>2026-04-07T17:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins/</loc>
		<lastmod>2026-04-07T17:02:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins-2/</loc>
		<lastmod>2026-04-07T17:02:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/</loc>
		<lastmod>2026-04-07T17:04:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-apt28-hackers-hijack-routers-to-steal-credentials-uk-security-agency-warns/</loc>
		<lastmod>2026-04-07T17:05:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gpu-rowhammer-attack-enables-privilege-escalation-and-full-system-compromise/</loc>
		<lastmod>2026-04-07T17:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/national-security-veterans-warn-against-delays-in-fisa-702-reauthorization/</loc>
		<lastmod>2026-04-07T17:55:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-losses-jumped-26-to-20-9-billion-in-2025/</loc>
		<lastmod>2026-04-07T17:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-losses-jumped-26-to-20-9-billion-in-2025-2/</loc>
		<lastmod>2026-04-07T17:56:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-losses-jumped-26-to-20-9-billion-in-2025-3/</loc>
		<lastmod>2026-04-07T17:56:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-infostealer-umgeht-2fa-malware-ubernimmt-accounts-ohne-passwort/</loc>
		<lastmod>2026-04-07T17:56:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-government-hackers-broke-into-thousands-of-home-routers-to-steal-passwords/</loc>
		<lastmod>2026-04-07T17:57:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russias-fancy-bear-still-attacking-routers-to-boost-fake-sites-ncsc-warns/</loc>
		<lastmod>2026-04-07T17:58:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minimus-appoints-tech-dealmaker-yael-nardi-as-chief-business-officer-to-drive-hyper-growth/</loc>
		<lastmod>2026-04-07T17:59:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-fbi-warning-chinese-apps-could-expose-user-data/</loc>
		<lastmod>2026-04-07T18:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks/</loc>
		<lastmod>2026-04-07T18:01:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget-2/</loc>
		<lastmod>2026-04-07T18:55:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget-3/</loc>
		<lastmod>2026-04-07T18:55:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget/</loc>
		<lastmod>2026-04-07T18:55:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tech-giants-launch-ai-powered-project-glasswing-to-identify-critical-software-vulnerabilities/</loc>
		<lastmod>2026-04-07T18:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-launching-disruptive-attacks-at-u-s-energy-water-targets-feds-warn/</loc>
		<lastmod>2026-04-07T18:57:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-launching-disruptive-attacks-at-u-s-energy-water-targets-feds-warn-2/</loc>
		<lastmod>2026-04-07T18:57:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-launching-disruptive-attacks-at-u-s-energy-water-targets-feds-warn-3/</loc>
		<lastmod>2026-04-07T18:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-debuts-preview-of-powerful-new-ai-model-mythos-in-new-cybersecurity-initiative/</loc>
		<lastmod>2026-04-07T18:59:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybercrime-losses-pass-20b-for-first-time-as-ai-boosts-online-fraud/</loc>
		<lastmod>2026-04-07T19:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybercrime-losses-pass-20b-for-first-time-as-ai-boosts-online-fraud-2/</loc>
		<lastmod>2026-04-07T19:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybercrime-losses-pass-20b-for-first-time-as-ai-boosts-online-fraud-3/</loc>
		<lastmod>2026-04-07T19:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-cybercrime-losses-pass-20b-for-first-time-as-ai-boosts-online-fraud-4/</loc>
		<lastmod>2026-04-07T19:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-pose-as-non-profit-developers-to-deploy-monero-mining-malware/</loc>
		<lastmod>2026-04-07T19:02:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nomshub-vulnerability-chain-exposes-hidden-risks-in-ai-coding-tools/</loc>
		<lastmod>2026-04-07T19:02:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-warns-of-iranian-hackers-targeting-critical-infrastructure/</loc>
		<lastmod>2026-04-07T19:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
		<lastmod>2026-04-07T19:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-in-the-age-of-instant-software-2/</loc>
		<lastmod>2026-04-07T19:59:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
		<lastmod>2026-04-07T20:00:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emulating-the-multi-stage-roningloader-malware/</loc>
		<lastmod>2026-04-07T20:01:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-practical-steps-to-strengthen-attack-resilience-with-attack-surface-management/</loc>
		<lastmod>2026-04-07T20:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-practical-steps-to-strengthen-attack-resilience-with-attack-surface-management-2/</loc>
		<lastmod>2026-04-07T20:04:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-practical-steps-to-strengthen-attack-resilience-with-attack-surface-management-3/</loc>
		<lastmod>2026-04-07T20:05:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-steps-to-strengthen-supply-chain-security-and-improve-cyber-resilience/</loc>
		<lastmod>2026-04-07T20:06:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-steps-to-strengthen-supply-chain-security-and-improve-cyber-resilience-2/</loc>
		<lastmod>2026-04-07T20:07:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-ways-to-strengthen-identity-security-and-improve-attack-resilience/</loc>
		<lastmod>2026-04-07T20:09:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-ways-to-strengthen-identity-security-and-improve-attack-resilience-2/</loc>
		<lastmod>2026-04-07T20:10:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-cyber-spies-targeting-consumer-soho-routers/</loc>
		<lastmod>2026-04-07T20:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-losses-break-the-20-billion-mark-2/</loc>
		<lastmod>2026-04-07T20:12:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercrime-losses-break-the-20-billion-mark/</loc>
		<lastmod>2026-04-07T20:12:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-teams-up-with-its-rivals-to-keep-ai-from-hacking-everything/</loc>
		<lastmod>2026-04-07T20:14:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-proposed-cisa-cuts-spark-alarm-among-cybersecurity-experts/</loc>
		<lastmod>2026-04-07T20:14:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-attack-shows-complex-social-engineering-is-industrialized/</loc>
		<lastmod>2026-04-07T20:16:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-attack-shows-complex-social-engineering-is-industrialized-2/</loc>
		<lastmod>2026-04-07T20:16:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/axios-attack-shows-complex-social-engineering-is-industrialized-3/</loc>
		<lastmod>2026-04-07T20:17:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-when-passports-execute-exploiting-ai-driven-kyc-pipelines/</loc>
		<lastmod>2026-04-07T19:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cloud-privileged-access-management-best-practices-to-prevent-privilege-abuse/</loc>
		<lastmod>2026-04-07T19:59:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-unveils-restricted-ai-cyber-model-in-unprecedented-industry-alliance/</loc>
		<lastmod>2026-04-07T20:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-iran-linked-attackers-targeting-critical-infrastructure-ot-devices/</loc>
		<lastmod>2026-04-07T20:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-pentagon-warn-of-iran-hacking-groups-targeting-operational-technology/</loc>
		<lastmod>2026-04-07T20:58:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iranian-hackers-are-targeting-american-critical-infrastructure-us-agencies-warn/</loc>
		<lastmod>2026-04-07T20:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hundreds-of-orgs-compromised-daily-in-microsoft-device-code-phishing-attacks/</loc>
		<lastmod>2026-04-07T21:00:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-hit-soho-routers-in-cyberespionage-campaign/</loc>
		<lastmod>2026-04-07T21:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-2/</loc>
		<lastmod>2026-04-07T21:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-3/</loc>
		<lastmod>2026-04-07T21:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/</loc>
		<lastmod>2026-04-07T21:04:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/</loc>
		<lastmod>2026-04-07T21:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-patches-ai-bug-that-could-have-leaked-user-data/</loc>
		<lastmod>2026-04-07T21:05:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-fraud-cost-americans-17-billion-in-2025-ai-scams-make-list-fbi/</loc>
		<lastmod>2026-04-07T21:56:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fortinet-releases-emergency-hotfix-for-forticlient-ems-zero-day-flaw/</loc>
		<lastmod>2026-04-07T21:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-things-to-know-on-anthropics-claude-mythos-and-project-glasswing/</loc>
		<lastmod>2026-04-07T21:59:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-critical-flowise-flaw-cve-2025-59528-for-remote-code-execution/</loc>
		<lastmod>2026-04-07T22:01:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mass-hospital-diverting-ambulances-as-it-deals-with-attack/</loc>
		<lastmod>2026-04-07T22:02:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-americans-lost-a-record-21-billion-to-cybercrime-last-year/</loc>
		<lastmod>2026-04-07T22:04:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/storm-1175-deploys-medusa-ransomware-at-high-velocity/</loc>
		<lastmod>2026-04-07T22:04:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-or-cli-how-to-choose-right-interface-for-your-ai-tools-2/</loc>
		<lastmod>2026-04-07T22:55:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-or-cli-how-to-choose-right-interface-for-your-ai-tools/</loc>
		<lastmod>2026-04-07T22:55:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/olympic-games-fifa-world-cup-offer-huge-platforms-rich-cyberattack-surface/</loc>
		<lastmod>2026-04-07T22:55:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sparkcat-meldet-sich-zuruck-neue-malware-variante-im-app-store-und-in-google-play-aufgetaucht/</loc>
		<lastmod>2026-04-07T22:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-calls-its-new-model-too-dangerous-to-release/</loc>
		<lastmod>2026-04-07T22:58:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-critical-infrastructure-facing-iranian-linked-ot-threats/</loc>
		<lastmod>2026-04-07T22:58:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-esentire-ceo-pursues-ai-driven-managed-security-shift-3/</loc>
		<lastmod>2026-04-07T23:00:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-esentire-ceo-pursues-ai-driven-managed-security-shift-2/</loc>
		<lastmod>2026-04-07T23:00:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-esentire-ceo-pursues-ai-driven-managed-security-shift/</loc>
		<lastmod>2026-04-07T23:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-esentire-ceo-pursues-ai-driven-managed-security-shift-4/</loc>
		<lastmod>2026-04-07T23:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/simplify-your-approach-to-securing-ot-networks/</loc>
		<lastmod>2026-04-07T23:01:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin/</loc>
		<lastmod>2026-04-07T23:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitdefender-threat-debrief-april-2026/</loc>
		<lastmod>2026-04-07T23:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-are-nhis-protected-from-unauthorized-access/</loc>
		<lastmod>2026-04-07T23:57:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-adaptable-are-agentic-ais-to-changing-regulations/</loc>
		<lastmod>2026-04-07T23:58:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-trustworthy-are-nhis-in-sensitive-environments/</loc>
		<lastmod>2026-04-07T23:59:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/physische-sicherheit-in-unternehmen-governance-entscheidend-bei-cloud-nutzung/</loc>
		<lastmod>2026-04-08T00:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-cyber-actors-disrupting-us-water-energy-facilities-fbi-warns/</loc>
		<lastmod>2026-04-08T00:02:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-warns-of-iran-affiliated-cyberattacks-on-critical-infrastructure-across-country/</loc>
		<lastmod>2026-04-08T00:02:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lattice-based-cryptographic-integration-for-mcp-transport-layers/</loc>
		<lastmod>2026-04-08T03:54:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery/</loc>
		<lastmod>2026-04-08T03:55:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-taiwan-to-tehran-how-ta416-pivots-its-plugx-backdoor-to-global-flashpoints/</loc>
		<lastmod>2026-04-08T03:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feds-quash-widespread-russia-backed-espionage-network-spanning-18000-devices/</loc>
		<lastmod>2026-04-08T03:57:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-all-your-zero-days-are-belong-to-mythos/</loc>
		<lastmod>2026-04-08T03:59:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patch-to-end-i486-support-hits-linux-kernel-merge-queue/</loc>
		<lastmod>2026-04-08T04:00:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-warns-of-iran-affiliated-cyber-attacks-on-critical-infrastructure-across-country/</loc>
		<lastmod>2026-04-08T04:00:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-new-ai-model-finds-and-exploits-zero-days-across-every-major-os-and-browser/</loc>
		<lastmod>2026-04-08T04:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-jobs-als-cyber-falle-so-trickst-nickel-alley-entwickler-aus/</loc>
		<lastmod>2026-04-08T05:55:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betrugsmaschen-steigende-risiken-im-vorfeld-der-fusball-wm-2026/</loc>
		<lastmod>2026-04-08T05:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6g-network-design-puts-ai-at-the-center-of-spectrum-routing-and-fault-management/</loc>
		<lastmod>2026-04-08T05:57:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openssl-3-6-2-lands-with-eight-cve-fixes/</loc>
		<lastmod>2026-04-08T05:59:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminals-move-deeper-into-networks-hiding-in-edge-infrastructure/</loc>
		<lastmod>2026-04-08T05:59:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/comfyui-servers-hijacked-for-cryptomining-proxy-botnet-ops/</loc>
		<lastmod>2026-04-08T06:00:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-identifies-critical-13-year-old-rce-vulnerability-in-apache-activemq/</loc>
		<lastmod>2026-04-08T06:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-identifies-critical-13-year-old-rce-vulnerability-in-apache-activemq-2/</loc>
		<lastmod>2026-04-08T06:02:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-identifies-critical-13-year-old-rce-vulnerability-in-apache-activemq-3/</loc>
		<lastmod>2026-04-08T06:02:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc>
		<lastmod>2026-04-08T06:04:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fuse-und-undertow-schwachstellen-in-red-hat-ermoglichen-dos-remote-code-und-datendiebstahl/</loc>
		<lastmod>2026-04-08T06:05:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 229766f15ddde1a651121ac0aea118de; Queries for sitemap: 3; Total queries: 88; Seconds: 4; Memory for sitemap: 1KB; Total memory: 50MB -->
