<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='30. April 2026 5:50 am' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/vulnerability-exploitation-surges-often-precede-disclosure-offering-possible-early-warnings/</loc>
		<lastmod>2026-04-20T16:46:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-exploitation-surges-often-precede-disclosure-offering-possible-early-warnings/</loc>
		<lastmod>2026-04-20T16:46:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-exploitation-surges-often-precede-disclosure-offering-possible-early-warnings-2/</loc>
		<lastmod>2026-04-20T16:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-systems-targeted-after-third-party-tool-compromised/</loc>
		<lastmod>2026-04-20T16:47:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130000-users/</loc>
		<lastmod>2026-04-20T16:48:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-changes-focus-to-real-time-cyber-defense/</loc>
		<lastmod>2026-04-20T16:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nist-scales-back-vulnerability-scoring-in-2026-as-cve-volume-surges/</loc>
		<lastmod>2026-04-20T16:51:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abacus-expands-incident-response-as-kocho-reveals-users-are-struggling-2/</loc>
		<lastmod>2026-04-20T16:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abacus-expands-incident-response-as-kocho-reveals-users-are-struggling/</loc>
		<lastmod>2026-04-20T16:52:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zionsiphon-malware-targets-water-infrastructure-systems/</loc>
		<lastmod>2026-04-20T16:53:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italian-regulator-fines-national-postal-service-orgs-15-million-for-data-privacy-violations/</loc>
		<lastmod>2026-04-20T17:35:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-infrastructure-company-blames-290-million-theft-on-north-korean-hackers/</loc>
		<lastmod>2026-04-20T17:37:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scot-becomes-second-scattered-spider-linked-crook-to-plead-guilty-in-us/</loc>
		<lastmod>2026-04-20T17:37:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/article-5-and-the-eu-ai-acts-absolute-red-lines-firetail-blog/</loc>
		<lastmod>2026-04-20T18:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/article-5-and-the-eu-ai-acts-absolute-red-lines-firetail-blog-2/</loc>
		<lastmod>2026-04-20T18:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-subduction-retrieval/</loc>
		<lastmod>2026-04-20T18:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-tech-can-stop-scams-they-just-dont-lock-and-code-s07e08/</loc>
		<lastmod>2026-04-20T18:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-hackers-blamed-for-290m-crypto-theft/</loc>
		<lastmod>2026-04-20T18:45:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastodon-says-its-flagship-server-was-hit-by-a-ddos-attack-2/</loc>
		<lastmod>2026-04-20T18:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastodon-says-its-flagship-server-was-hit-by-a-ddos-attack/</loc>
		<lastmod>2026-04-20T18:47:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-token-flaw-turned-azures-ai-agent-into-a-spy/</loc>
		<lastmod>2026-04-20T18:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-token-flaw-turned-azures-ai-agent-into-a-spy-2/</loc>
		<lastmod>2026-04-20T18:48:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-traces-customer-data-theft-to-agentic-ai-tool-breach/</loc>
		<lastmod>2026-04-20T18:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-major-security-incident-as-hacker-claims-2m-ransom-demand/</loc>
		<lastmod>2026-04-20T18:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026s-breach-list-so-far-fbi-hacked-1b-androids-at-risk-270m-iphones-vulnerable-3/</loc>
		<lastmod>2026-04-20T18:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026s-breach-list-so-far-fbi-hacked-1b-androids-at-risk-270m-iphones-vulnerable/</loc>
		<lastmod>2026-04-20T18:51:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026s-breach-list-so-far-fbi-hacked-1b-androids-at-risk-270m-iphones-vulnerable-2/</loc>
		<lastmod>2026-04-20T18:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-ai-agents-should-be-getting-their-credentials-from-a-pam-vault/</loc>
		<lastmod>2026-04-20T19:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palantirs-nhs-future-in-doubt-as-ministers-eye-contract-break/</loc>
		<lastmod>2026-04-20T19:42:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-member-tyler-buchanan-pleads-guilty-to-major-crypto-theft-2/</loc>
		<lastmod>2026-04-20T19:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-member-tyler-buchanan-pleads-guilty-to-major-crypto-theft/</loc>
		<lastmod>2026-04-20T19:44:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-defender-flaws-exploited-on-windows-two-left-unpatched/</loc>
		<lastmod>2026-04-20T19:46:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-800-android-apps-targeted-in-pin-stealing-trojan-campaign/</loc>
		<lastmod>2026-04-20T19:47:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chrome-privacy-concerns-rise-as-expert-warns-of-fingerprinting-risks/</loc>
		<lastmod>2026-04-20T19:47:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seiko-usa-website-defaced-as-hacker-claims-customer-data-theft/</loc>
		<lastmod>2026-04-20T19:49:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/</loc>
		<lastmod>2026-04-20T19:50:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-rob-t-lee-glenn-thorpe-dan-hubbard-sergej-epp-vibe-coded-micro-talks/</loc>
		<lastmod>2026-04-20T20:42:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-desktop-changes-app-access-settings-for-browsers-you-dont-even-have-installed-yet/</loc>
		<lastmod>2026-04-20T20:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maritime-cybersecurity-rules-make-waves/</loc>
		<lastmod>2026-04-20T20:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-mcp-disclosure-is-the-ai-eras-open-redirect-moment/</loc>
		<lastmod>2026-04-20T20:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/</loc>
		<lastmod>2026-04-20T20:46:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/serialip-devices-hide-thousands-of-old-and-new-bugs/</loc>
		<lastmod>2026-04-20T20:47:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ftcs-ai-portfolio-is-about-to-get-bigger/</loc>
		<lastmod>2026-04-20T21:40:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercels-security-breach-started-with-malware-disguised-as-roblox-cheats/</loc>
		<lastmod>2026-04-20T21:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-blamed-for-290m-crypto-theft/</loc>
		<lastmod>2026-04-20T21:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-ants-id-system-website-hit-by-cyberattack-possible-data-breach/</loc>
		<lastmod>2026-04-20T21:44:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-ants-id-system-website-hit-by-cyberattack-possible-data-breach-3/</loc>
		<lastmod>2026-04-20T21:44:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-ants-id-system-website-hit-by-cyberattack-possible-data-breach-2/</loc>
		<lastmod>2026-04-20T21:44:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/this-vpn-lets-you-verify-your-business-privacy-for-130/</loc>
		<lastmod>2026-04-20T21:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amtrak-data-breach-exposes-2-1m-records-reports-suggest-larger-leak/</loc>
		<lastmod>2026-04-20T21:45:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vuln-in-googles-antigravity-ai-agent-manager-could-escape-sandbox-give-attackers-remote-code-execution/</loc>
		<lastmod>2026-04-20T22:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-breach-linked-to-context-ai-shinyhunters-says-its-not-involved/</loc>
		<lastmod>2026-04-20T22:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-enterprise-ai-leaders-are-doing-right/</loc>
		<lastmod>2026-04-20T22:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-ai-firm-faces-lawsuits-over-dna-data-use-disclosure/</loc>
		<lastmod>2026-04-20T22:46:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/singapore-pushes-for-global-standard-to-test-generative-ai/</loc>
		<lastmod>2026-04-20T22:46:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-5-best-vpn-extensions-for-chrome-2/</loc>
		<lastmod>2026-04-20T22:48:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-5-best-vpn-extensions-for-chrome/</loc>
		<lastmod>2026-04-20T22:48:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps/</loc>
		<lastmod>2026-04-20T22:48:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-employees-ai-tool-access-led-to-data-breach/</loc>
		<lastmod>2026-04-20T22:49:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nutzertauschung-und-datendiebstahl-unsichtbare-cyberangriffe-per-clickjacking/</loc>
		<lastmod>2026-04-20T23:41:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-attacken-versicherungs-und-rechtsfragen-in-zeiten-zunehmender-cyberangriffe/</loc>
		<lastmod>2026-04-20T23:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/</loc>
		<lastmod>2026-04-20T23:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ml-based-anomaly-detection-for-post-quantum-metadata-exfiltration/</loc>
		<lastmod>2026-04-21T03:42:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-risk-registers-vs-traditional-risk-management-whats-the-difference/</loc>
		<lastmod>2026-04-21T03:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-we-actually-need-endend-encryption/</loc>
		<lastmod>2026-04-21T03:44:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-job-scams-are-booming-and-i-was-fooled-by-one-here-is-how-to-avoid-them/</loc>
		<lastmod>2026-04-21T04:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-build-an-encrypted-routing-layer-for-private-ai-inference/</loc>
		<lastmod>2026-04-21T05:41:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-gguf-models-could-trigger-remote-code-execution-on-sglang-servers/</loc>
		<lastmod>2026-04-21T05:42:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-compromised-axios-npm-package-fueled-major-supply-chain-attack/</loc>
		<lastmod>2026-04-21T05:44:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sidewinder-spoofs-chrome-pdf-viewer-zimbra-to-steal-government-webmail-logins/</loc>
		<lastmod>2026-04-21T05:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lovable-ai-app-builder-hit-by-reported-api-flaw-exposing-thousands-of-projects/</loc>
		<lastmod>2026-04-21T05:46:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/remote-code-execution-und-evelation-of-privilege-cisa-warnt-vor-angriffen-auf-microsoft-exchange-und-windows-clfs/</loc>
		<lastmod>2026-04-21T05:48:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/manhattan-da-bragg-pushes-meta-to-put-a-stop-to-immigration-scams/</loc>
		<lastmod>2026-04-21T06:41:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluesky-fast-growing-x-alternative-hit-by-sophisticated-ddos-attack/</loc>
		<lastmod>2026-04-21T06:43:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poste-italiane-postepay-fined-euro12-5m-for-unlawful-user-data-processing/</loc>
		<lastmod>2026-04-21T06:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-fraudulent-browser-extensions-disguised-as-tiktok-downloaders-compromise-130k-users/</loc>
		<lastmod>2026-04-21T06:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-exploitation-could-shrink-defenders-patch-window/</loc>
		<lastmod>2026-04-21T06:47:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/funf-grunde-gegen-isolierten-endpunktschutz-warum-edr-im-zeitalter-von-ki-angriffen-versagt/</loc>
		<lastmod>2026-04-21T06:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warnt-vor-17-jahre-alter-excel-sicherheitslucke-im-aktiven-einsatz/</loc>
		<lastmod>2026-04-21T07:41:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-claims-us-used-backdoors-to-knock-out-networking-equipment-during-war/</loc>
		<lastmod>2026-04-21T07:43:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-issue-alerts-exploited-in-oauth-phishing-scam-targeting-developers/</loc>
		<lastmod>2026-04-21T07:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-alerts-defenders-to-exploited-cisco-catalyst-sd-wan-manager-security-flaws/</loc>
		<lastmod>2026-04-21T07:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6000-publicly-exposed-apache-activemq-instances-found-vulnerable-to-cve-2026-34197/</loc>
		<lastmod>2026-04-21T07:45:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gentlemen-raas-hits-windows-linux-and-esxi-with-new-c-based-locker-2/</loc>
		<lastmod>2026-04-21T07:47:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gentlemen-raas-hits-windows-linux-and-esxi-with-new-c-based-locker/</loc>
		<lastmod>2026-04-21T07:47:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines/</loc>
		<lastmod>2026-04-21T07:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiederherstellung-von-identitaten-recovery-strategien-fur-identitatssysteme/</loc>
		<lastmod>2026-04-21T07:49:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/die-stille-expansion-der-gentlemen-deutschland-im-fokus/</loc>
		<lastmod>2026-04-21T07:50:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-makes-credential-stuffing-difficult-to-detect/</loc>
		<lastmod>2026-04-21T08:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warnt-vor-rasantem-anstieg-von-helpdesk-betrug-via-teams/</loc>
		<lastmod>2026-04-21T08:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panasonic-creates-device-locked-qr-codes-to-speed-facial-biometric-capture/</loc>
		<lastmod>2026-04-21T08:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluesky-hit-by-24-hour-ddos-attack-as-pro-iran-group-claims-responsibility/</loc>
		<lastmod>2026-04-21T08:46:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluesky-hit-by-24-hour-ddos-attack-as-pro-iran-group-claims-responsibility-2/</loc>
		<lastmod>2026-04-21T08:46:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/knowbe4-setzt-mit-iso-iec-42001-ein-klares-zeichen/</loc>
		<lastmod>2026-04-21T08:46:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsi-warnt-phishing-attacken-uber-signal-nehmen-zu/</loc>
		<lastmod>2026-04-21T08:48:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-techniques-attackers-use-to-infiltrate-your-systems-today/</loc>
		<lastmod>2026-04-21T09:41:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-thin-gray-line-handala-cyberav3ngers-and-irans-proxy-ops/</loc>
		<lastmod>2026-04-21T09:43:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-8-exploited-vulnerabilities-affecting-cisco-zimbra-teamcity/</loc>
		<lastmod>2026-04-21T09:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adaptavist-group-breach-spawns-imposter-emails-as-ransomware-crew-claims-mega-haul/</loc>
		<lastmod>2026-04-21T09:45:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ngate-nfc-malware-targets-android-users-through-trojanized-payment-app/</loc>
		<lastmod>2026-04-21T09:45:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/</loc>
		<lastmod>2026-04-21T09:46:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-cyber-incident-after-sophisticated-attacker-exploits-thirdparty-tool/</loc>
		<lastmod>2026-04-21T09:48:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-cyber-incident-after-sophisticated-attacker-exploits-thirdparty-tool-2/</loc>
		<lastmod>2026-04-21T09:48:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-blamed-for-290m-kelpdao-crypto-heist/</loc>
		<lastmod>2026-04-21T09:48:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mean-time-to-exploit-schrumpft-2026-auf-unter-einen-tag-claude-mythos-und-das-ende-der-kostenbarriere-fur-cyberangriffe/</loc>
		<lastmod>2026-04-21T09:50:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-auf-dem-computer-claude-desktop-app-installiert-ungefragt-backdoor/</loc>
		<lastmod>2026-04-21T09:50:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-als-neue-atomwaffen-das-bizarre-politik-manifest-von-palantir/</loc>
		<lastmod>2026-04-21T09:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/finanzverantwortlichen-fehlen-weiterhin-mindestregeln-fur-den-ki-einsatz/</loc>
		<lastmod>2026-04-21T10:42:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-identity-is-the-driving-force-behind-digital-transformation/</loc>
		<lastmod>2026-04-21T10:43:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-can-find-the-vulnerability-it-cant-tell-you-what-to-do-about-it/</loc>
		<lastmod>2026-04-21T10:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/</loc>
		<lastmod>2026-04-21T10:45:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/danische-filmindustrie-will-jugendliche-bekehren/</loc>
		<lastmod>2026-04-21T10:47:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grinex-crypto-exchange-shuts-down-blames-western-agencies-for-13-7m-breach/</loc>
		<lastmod>2026-04-21T10:47:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-cisco-catalyst-kentico-xperience-papercut-ng-mf-synacor-zcs-quest-kace-sma-and-jetbrains-teamcity-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-21T10:48:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-single-platform-powers-sim-farm-proxy-networks-across-17-countries/</loc>
		<lastmod>2026-04-21T10:49:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/they-built-a-legendary-privacy-tool-now-theyre-sworn-enemies/</loc>
		<lastmod>2026-04-21T10:50:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/</loc>
		<lastmod>2026-04-21T10:51:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-spots-sapphire-sleet-macos-attack-using-applescript-and-social-engineering/</loc>
		<lastmod>2026-04-21T10:52:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purerat-hides-pe-payloads-in-pngs-for-fileless-execution/</loc>
		<lastmod>2026-04-21T10:53:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unveranderliche-backup-speicherlosungen-die-ideale-verteidigung-gegen-ki-gestutzte-angriffe/</loc>
		<lastmod>2026-04-21T10:55:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deutschland-auf-platz-4-tausende-activemq-server-sind-angreifbar/</loc>
		<lastmod>2026-04-21T10:55:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-police-trials-snoop-tech-platform-in-push-to-cuff-more-london-shoplifters/</loc>
		<lastmod>2026-04-21T11:42:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/met-police-trials-snoop-tech-platform-in-push-to-cuff-more-london-shoplifters-2/</loc>
		<lastmod>2026-04-21T11:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-us-nsa-is-using-anthropics-claude-mythos-despite-supply-chain-risk/</loc>
		<lastmod>2026-04-21T11:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apache-syncope-rce-vulnerability-detailed-after-public-exploit-code-release/</loc>
		<lastmod>2026-04-21T11:43:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sophos-red-team-simuliert-hackerangriff-mit-ki-agenten-openclaw/</loc>
		<lastmod>2026-04-21T11:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-jahre-unentdeckt-mittels-ki-aufgespurte-lucke-gefahrdet-tausende-server/</loc>
		<lastmod>2026-04-21T11:46:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-policy-in-2026-the-missing-link-between-ai-ambition-and-execution/</loc>
		<lastmod>2026-04-21T12:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-and-mfa-exploitation-targeting-the-keys-to-the-kingdom/</loc>
		<lastmod>2026-04-21T12:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-assisted-intruders-pwned-vercel-via-oauth-abuse-and-a-pilfered-employee-account/</loc>
		<lastmod>2026-04-21T12:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crook-claims-to-leak-video-surveillance-footage-of-companies/</loc>
		<lastmod>2026-04-21T12:46:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-intel-scraping-without-burning-your-cover-or-your-stack/</loc>
		<lastmod>2026-04-21T12:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-another-cisco-catalyst-sd-wan-manager-bug-as-exploited-cve-2026-20133/</loc>
		<lastmod>2026-04-21T12:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-another-cisco-catalyst-sd-wan-manager-bug-as-exploited-cve-2026-20133-2/</loc>
		<lastmod>2026-04-21T12:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/actively-exploited-apache-activemq-flaw-impacts-6400-servers-2/</loc>
		<lastmod>2026-04-21T12:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/actively-exploited-apache-activemq-flaw-impacts-6400-servers/</loc>
		<lastmod>2026-04-21T12:50:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-ngate-malware-evades-detection-inside-nfc-payment-apps/</loc>
		<lastmod>2026-04-21T12:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-code-gemini-cli-and-github-copilot-exposed-to-prompt-injection-via-github-comments/</loc>
		<lastmod>2026-04-21T12:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-targets-indian-banks-korean-policy-circles/</loc>
		<lastmod>2026-04-21T12:53:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-based-attacks/</loc>
		<lastmod>2026-04-21T12:54:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins/</loc>
		<lastmod>2026-04-21T12:55:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution/</loc>
		<lastmod>2026-04-21T12:57:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution-2/</loc>
		<lastmod>2026-04-21T12:57:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isx-it-security-conference-2026-so-konnen-sie-threat-intelligence-fur-ihre-verteidigng-nutzen/</loc>
		<lastmod>2026-04-21T12:59:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isx-it-security-conference-2026-so-konnen-sie-threat-intelligence-fur-ihre-verteidigng-nutzen-2/</loc>
		<lastmod>2026-04-21T12:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-alterscheck-der-hohe-preis-der-verifikation/</loc>
		<lastmod>2026-04-21T13:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-alterscheck-der-hohe-preis-der-verifikation-2/</loc>
		<lastmod>2026-04-21T13:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-neuer-c52026-standard-das-bsi-wird-streng/</loc>
		<lastmod>2026-04-21T13:01:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/banken-vermischt-kuriose-phishing-panne-stiftet-verwirrung/</loc>
		<lastmod>2026-04-21T13:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dlp-that-doesnt-make-you-choose-introducing-menlo-ai-adaptive-dlp-blog-menlo-security/</loc>
		<lastmod>2026-04-21T13:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contrary-to-popular-superstition-aes-128-is-just-fine-in-a-post-quantum-world/</loc>
		<lastmod>2026-04-21T13:43:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/azure-sre-agent-flaw-lets-outsiders-silently-eavesdrop-on-enterprise-cloud-operations/</loc>
		<lastmod>2026-04-21T13:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-turned-googles-antigravity-file-search-into-rce/</loc>
		<lastmod>2026-04-21T13:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-turned-googles-antigravity-file-search-into-rce-3/</loc>
		<lastmod>2026-04-21T13:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-turned-googles-antigravity-file-search-into-rce-2/</loc>
		<lastmod>2026-04-21T13:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompt-injection-turned-googles-antigravity-file-search-into-rce-4/</loc>
		<lastmod>2026-04-21T13:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloud-platform-vercel-says-company-breached-through-third-party-ai-tool/</loc>
		<lastmod>2026-04-21T13:46:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/podcast-its-not-you-its-your-printer-state-sponsored-and-phishing-threats-in-2025/</loc>
		<lastmod>2026-04-21T13:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/podcast-its-not-you-its-your-printer-state-sponsored-and-phishing-threats-in-2025-2/</loc>
		<lastmod>2026-04-21T13:49:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-browser-vereint-netzwerk-und-ki-datenschutz-identity-und-endpoint-sowie-produktivitatsservices-entlang-eines-einzigen-user-interfaces/</loc>
		<lastmod>2026-04-21T13:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-chronicle-feature-lets-codex-read-your-screen-raising-privacy-concerns/</loc>
		<lastmod>2026-04-21T13:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-new-sd-wan-flaw-as-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-21T13:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/serialip-devices-hide-thousands-of-old-new-bugs/</loc>
		<lastmod>2026-04-21T13:53:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unchecked-ai-agents-cause-cybersecurity-incidents-at-two-thirds-of-firms/</loc>
		<lastmod>2026-04-21T13:55:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/database-change-governance-reduce-audit-prep-time-from-weeks-to-hours-liquibase-secure/</loc>
		<lastmod>2026-04-21T14:43:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/real-apple-notifications-are-being-used-to-drive-tech-support-scams/</loc>
		<lastmod>2026-04-21T14:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-must-have-features-in-an-enterprise-sso-solution-for-b2b-saas-in-2026/</loc>
		<lastmod>2026-04-21T14:46:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-phone-based-authentication-voice-otp-ivr-and-ai-voice-agent/</loc>
		<lastmod>2026-04-21T14:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-challenges-in-generative-ai-platforms/</loc>
		<lastmod>2026-04-21T14:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/android-17-ends-allnothing-access-to-your-contacts/</loc>
		<lastmod>2026-04-21T14:48:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/optiv-ceo-kevin-lynch-on-why-ai-wont-displace-the-channel/</loc>
		<lastmod>2026-04-21T14:49:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/todyl-ceo-on-elevating-the-capabilities-of-msps-with-new-assurance-marketplace/</loc>
		<lastmod>2026-04-21T14:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-targets-two-russian-propaganda-networks-with-new-sanctions/</loc>
		<lastmod>2026-04-21T14:53:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-targets-two-russian-propaganda-networks-with-new-sanctions/</loc>
		<lastmod>2026-04-21T14:53:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukraine-busts-bot-farm-supplying-thousands-of-fake-telegram-accounts-to-russian-spies/</loc>
		<lastmod>2026-04-21T14:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gold-fur-coreview-bei-den-cybersecurity-excellence-awards-2026-2/</loc>
		<lastmod>2026-04-21T14:56:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gold-fur-coreview-bei-den-cybersecurity-excellence-awards-2026/</loc>
		<lastmod>2026-04-21T14:56:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gold-fur-coreview-bei-den-cybersecurity-excellence-awards-2026-3/</loc>
		<lastmod>2026-04-21T14:56:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-getrenntes-monitoring-von-it-und-ot-der-groste-operative-blinde-fleck-ist/</loc>
		<lastmod>2026-04-21T14:56:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/yet-another-ex-ransomware-negotiator-admits-turning-rogue-after-payoff-from-crimelords/</loc>
		<lastmod>2026-04-21T14:57:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/</loc>
		<lastmod>2026-04-21T14:58:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-hacker-pleads-guilty-to-stealing-8-million-in-cryptocurrency/</loc>
		<lastmod>2026-04-21T14:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stopping-fraud-at-each-stage-of-the-customer-journey-without-adding-friction/</loc>
		<lastmod>2026-04-21T15:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-probes-telegram-teen-chat-sites-over-csam-sharing-concerns/</loc>
		<lastmod>2026-04-21T15:01:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time/</loc>
		<lastmod>2026-04-21T15:02:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gentlemen-ransomware-expands-with-rapid-affiliate-growth/</loc>
		<lastmod>2026-04-21T15:03:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auch-zahlungsdaten-betroffen-eine-million-basic-fit-mitglieder-haben-ihre-daten-verloren/</loc>
		<lastmod>2026-04-21T15:05:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-gadi-evron-on-behalf-of-zenity-pleasefix/</loc>
		<lastmod>2026-04-21T15:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-gadi-evron-on-behalf-of-zenity-pleasefix/</loc>
		<lastmod>2026-04-21T15:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sonatype-innovate-real-peer-connections-real-product-influence-real-recognition/</loc>
		<lastmod>2026-04-21T15:43:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation/</loc>
		<lastmod>2026-04-21T15:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-api-discovery-is-the-first-step-to-securing-ai/</loc>
		<lastmod>2026-04-21T15:45:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-confirms-exploitation-of-3-more-cisco-networking-device-vulnerabilities/</loc>
		<lastmod>2026-04-21T15:46:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-mit-island-der-browser-ist-der-neue-arbeitsplatz/</loc>
		<lastmod>2026-04-21T15:47:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation-2/</loc>
		<lastmod>2026-04-21T15:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-negotiator-admits-role-in-attacks-he-was-hired-to-resolve/</loc>
		<lastmod>2026-04-21T15:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool/</loc>
		<lastmod>2026-04-21T15:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/</loc>
		<lastmod>2026-04-21T15:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/timor-leste-parliament-questions-president-over-proposed-resorts-links-to-scam-empire/</loc>
		<lastmod>2026-04-21T15:52:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-breach-how-a-roblox-cheat-download-led-to-a-2m-data-heist-through-ai-tool-oauth-abuse/</loc>
		<lastmod>2026-04-21T16:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-google-antigravity-downloads-are-stealing-accounts-in-minutes/</loc>
		<lastmod>2026-04-21T16:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-urges-security-teams-to-view-environments-following-axios-compromise/</loc>
		<lastmod>2026-04-21T16:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/big-banks-seek-to-ease-security-worries-as-ai-push-accelerates/</loc>
		<lastmod>2026-04-21T16:46:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-negotiator-pleads-guilty-to-helping-ransomware-gang/</loc>
		<lastmod>2026-04-21T16:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-clickfix-attacks-deliver-applescript-stealers-to-snarf-credentials-wallets/</loc>
		<lastmod>2026-04-21T16:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-clickfix-attacks-deliver-applescript-stealers-to-snarf-credentials-wallets-2/</loc>
		<lastmod>2026-04-21T16:49:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridewell-among-first-to-achieve-level-2-defence-cyber-certification/</loc>
		<lastmod>2026-04-21T16:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/forescout-uncovers-new-security-risks-in-widely-used-industrial-networking-devices/</loc>
		<lastmod>2026-04-21T16:54:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/22-bridgebreak-flaws-expose-20000-lantronix-and-silex-serialip-converters/</loc>
		<lastmod>2026-04-21T16:56:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trojanized-android-app-fuels-new-wave-of-nfc-fraud/</loc>
		<lastmod>2026-04-21T16:59:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-saas-breaches-identity-risks-2026/</loc>
		<lastmod>2026-04-21T17:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/seceon-recognized-in-the-2026-gartner-voice-of-the-customer-report-for-security-information-and-event-management/</loc>
		<lastmod>2026-04-21T17:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-threats-arent-waiting/</loc>
		<lastmod>2026-04-21T17:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-you-see-targeted-ads-online-after-an-irl-conversation/</loc>
		<lastmod>2026-04-21T17:45:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-regulator-to-probe-telegram-teen-chat-sites-for-potential-child-safety-violations/</loc>
		<lastmod>2026-04-21T17:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-ai-mirror-reveals-about-how-we-think/</loc>
		<lastmod>2026-04-21T17:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-ai-mirror-reveals-about-how-we-think-2/</loc>
		<lastmod>2026-04-21T17:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-is-sued-over-scam-ads-on-facebook-and-instagram/</loc>
		<lastmod>2026-04-21T17:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation-3/</loc>
		<lastmod>2026-04-21T17:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities-2/</loc>
		<lastmod>2026-04-21T17:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serialip-converters/</loc>
		<lastmod>2026-04-21T17:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serialip-converters/</loc>
		<lastmod>2026-04-21T17:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serialip-converters/</loc>
		<lastmod>2026-04-21T17:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-runs-itself-what-agentic-ai-fraud-actually-looks-like/</loc>
		<lastmod>2026-04-21T18:42:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-runs-itself-what-agentic-ai-fraud-actually-looks-like-2/</loc>
		<lastmod>2026-04-21T18:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-attack-runs-itself-what-agentic-ai-fraud-actually-looks-like-3/</loc>
		<lastmod>2026-04-21T18:42:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-member-tylerb-pleads-guilty-3/</loc>
		<lastmod>2026-04-21T18:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-member-tylerb-pleads-guilty-2/</loc>
		<lastmod>2026-04-21T18:44:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scattered-spider-member-tylerb-pleads-guilty/</loc>
		<lastmod>2026-04-21T18:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-cisco-sd-wan-bugs-battered-in-attacks/</loc>
		<lastmod>2026-04-21T18:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-cisco-sd-wan-bugs-battered-in-attacks-2/</loc>
		<lastmod>2026-04-21T18:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-vulnerabilities-drop-but-critical-flaws-double-report-warns/</loc>
		<lastmod>2026-04-21T18:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-in-bomgar-rmm-exploitation-demonstrates-supply-chain-risk/</loc>
		<lastmod>2026-04-21T18:48:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-200-bugs-week-engineer-how-we-rebuilt-trail-of-bits-around-al/</loc>
		<lastmod>2026-04-21T19:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-alleges-us-networking-gear-was-deliberately-disabled/</loc>
		<lastmod>2026-04-21T19:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-alleges-us-networking-gear-was-deliberately-disabled-2/</loc>
		<lastmod>2026-04-21T19:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-alleges-us-networking-gear-was-deliberately-disabled-3/</loc>
		<lastmod>2026-04-21T19:43:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/500000-vulnerabilities-14-that-matter-how-exploit-chain-analysis-cuts-through-the-noise/</loc>
		<lastmod>2026-04-21T19:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scottish-man-pleads-guilty-to-attack-spree-that-created-scattered-spiders-notoriety/</loc>
		<lastmod>2026-04-21T19:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-ponder-terrorism-designations-homicide-charges-over-hospital-ransomware-attacks/</loc>
		<lastmod>2026-04-21T19:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-lazarus-apt-stole-290m-from-kelp-dao/</loc>
		<lastmod>2026-04-21T19:47:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-preps-for-post-quantum-computing/</loc>
		<lastmod>2026-04-21T19:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sans-institute-preps-live-systems-for-nato-cyber-exercise/</loc>
		<lastmod>2026-04-21T19:49:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/virtualbox-7-2-8-is-out-with-linux-kernel-7-0-support-and-crash-fixes/</loc>
		<lastmod>2026-04-21T19:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-used-anthropics-mythos-to-find-and-fix-271-bugs-in-firefox/</loc>
		<lastmod>2026-04-21T19:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-lotus-data-wiper-used-against-venezuelan-energy-utility-firms/</loc>
		<lastmod>2026-04-21T19:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exploits-turn-windows-defender-into-attacker-tool/</loc>
		<lastmod>2026-04-21T20:48:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/</loc>
		<lastmod>2026-04-21T20:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/splunk-enterprise-security-unmasked-blog-recap/</loc>
		<lastmod>2026-04-21T20:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack/</loc>
		<lastmod>2026-04-21T20:45:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thunderbird-150-arrives-with-encrypted-message-search-and-openpgp-improvements/</loc>
		<lastmod>2026-04-21T20:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thunderbird-150-arrives-with-encrypted-message-search-and-openpgp-improvements-2/</loc>
		<lastmod>2026-04-21T20:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-panic-to-playbook-modernizing-zeroday-response-in-appsec/</loc>
		<lastmod>2026-04-21T21:42:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-panic-to-playbook-modernizing-zeroday-response-in-appsec-2/</loc>
		<lastmod>2026-04-21T21:42:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thousands-of-apache-activemq-instances-still-unpatched-weeks-after-an-actively-exploited-hole-discovered/</loc>
		<lastmod>2026-04-21T21:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-digitalmint-ransomware-negotiator-pleads-guilty-to-extortion-scheme/</loc>
		<lastmod>2026-04-21T21:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/murder-she-wrote-ex-fbi-chief-wants-some-ransomware-crims-charged-with-homicide/</loc>
		<lastmod>2026-04-21T21:45:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-negotiator-caught-secretly-assisting-blackcat-extortion-scheme/</loc>
		<lastmod>2026-04-21T21:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-mdo-field-reports-every-it-security-lead-should-read/</loc>
		<lastmod>2026-04-21T22:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-anthropics-mythos-found-271-zero-day-vulnerabilities-in-firefox-150/</loc>
		<lastmod>2026-04-21T22:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-states-want-to-cause-harm-not-just-steal-cash-stop-handing-your-cyber-defenses-to-the-cheapest-contractor/</loc>
		<lastmod>2026-04-21T22:46:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-states-want-to-cause-harm-not-just-steal-cash-stop-handing-your-cyber-defenses-to-the-cheapest-contractor-2/</loc>
		<lastmod>2026-04-21T22:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-states-want-to-cause-harm-not-just-steal-cash-stop-handing-your-cyber-defenses-to-the-cheapest-contractor-3/</loc>
		<lastmod>2026-04-21T22:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-threats-are-rising-your-headcount-isnt/</loc>
		<lastmod>2026-04-21T22:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/293m-kelpdao-crypto-heist-exposes-cross-chain-weaknesses-in-defi/</loc>
		<lastmod>2026-04-21T22:48:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data-4/</loc>
		<lastmod>2026-04-21T22:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data/</loc>
		<lastmod>2026-04-21T22:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data-2/</loc>
		<lastmod>2026-04-21T22:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data-3/</loc>
		<lastmod>2026-04-21T22:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-govt-agency-confirms-breach-as-hacker-offers-to-sell-data-5/</loc>
		<lastmod>2026-04-21T22:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-negotiator-pleads-guilty-to-blackcat-scheme/</loc>
		<lastmod>2026-04-21T22:50:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-security-teams-can-transform-data-into-action/</loc>
		<lastmod>2026-04-21T23:42:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-april-2026-critical-patch-update-addresses-241-cves/</loc>
		<lastmod>2026-04-21T23:43:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-anthropics-mythos-found-271-security-vulnerabilities-in-firefox-150/</loc>
		<lastmod>2026-04-21T23:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airbus-acquires-quarkslab-to-counter-ai-reverse-engineering/</loc>
		<lastmod>2026-04-21T23:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-opm-health-insurance-data-collection-plan-draws-concern/</loc>
		<lastmod>2026-04-21T23:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-opm-health-insurance-data-collection-plan-draws-concern-2/</loc>
		<lastmod>2026-04-21T23:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-cybersecurity-lifeline-for-lean-it-teams-introducing-c-r-e-w/</loc>
		<lastmod>2026-04-22T03:41:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lattice-based-signature-schemes-for-mcp-host-authentication/</loc>
		<lastmod>2026-04-22T03:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ruckabwicklung-von-lebens-und-rentenversicherungen-verbraucherschutzer-warnen-vor-unseriosen-dienstleistern/</loc>
		<lastmod>2026-04-22T03:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-ai-act-tuv-verband-fordert-einheitliche-rahmenbedingungen-fur-industrielle-ki/</loc>
		<lastmod>2026-04-22T03:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-cyber-leaders-back-1-5t-budget-request/</loc>
		<lastmod>2026-04-22T03:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nation-states-responsible-for-nationally-significant-cyber-attacks-against-uk-says-ncsc-chief/</loc>
		<lastmod>2026-04-22T03:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shadow-ai-deepfakes-and-supply-chain-compromise-are-rewriting-the-financial-sector-threat-playbook/</loc>
		<lastmod>2026-04-22T04:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-150-jubilaum-mit-besser-geteilter-ansicht-und-neue-tab-funktionen/</loc>
		<lastmod>2026-04-22T05:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-found-271-firefox-flaws-but-none-a-human-couldnt-spot/</loc>
		<lastmod>2026-04-22T05:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagi-open-source-autonomous-ai-penetration-testing-system/</loc>
		<lastmod>2026-04-22T05:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-intelligence-flaw-kept-stolen-tokens-reusable-on-another-device/</loc>
		<lastmod>2026-04-22T05:47:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/exclusive-anthropic-cyber-tool-mythos-accessed-by-unapproved-actors/</loc>
		<lastmod>2026-04-22T05:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-could-face-hacktivist-attacks-at-scale-says-head-of-security-agency/</loc>
		<lastmod>2026-04-22T05:50:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eol-versionen-betroffen-17-jahre-alte-excel-schwachstelle-wird-sehr-wahrscheinlich-ausgenutzt/</loc>
		<lastmod>2026-04-22T05:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-authorities-confirm-data-breach-amid-hackers-data-leak-allegations/</loc>
		<lastmod>2026-04-22T06:44:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-authorities-confirm-data-breach-amid-hackers-data-leak-allegations-2/</loc>
		<lastmod>2026-04-22T06:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-tie-iranian-espionage-to-castlerat-and-chainshell/</loc>
		<lastmod>2026-04-22T06:46:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-signed-binary-helps-deliver-lotuslite-in-india-spy-campaign/</loc>
		<lastmod>2026-04-22T06:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-net-10-0-7-update-to-patch-elevation-of-privilege-vulnerability/</loc>
		<lastmod>2026-04-22T06:48:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/non-human-identities-ubersteigen-menschliche-50-zu-1-wenn-ki-agenten-ihre-eigenen-schlussel-brauchen/</loc>
		<lastmod>2026-04-22T06:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/south-korea-expands-ai-cybersecurity-to-safeguard-cloud-based-education-systems/</loc>
		<lastmod>2026-04-22T07:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-1300-microsoft-sharepoint-servers-vulnerable-to-spoofing-attacks/</loc>
		<lastmod>2026-04-22T07:43:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/namastex-npm-packages-spread-teampcp-style-canisterworm-malware/</loc>
		<lastmod>2026-04-22T07:45:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/1370-microsoft-sharepoint-servers-at-risk-of-spoofing-attacks-found-exposed-online/</loc>
		<lastmod>2026-04-22T07:46:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/amazon-anthropic-expand-alliance-with-5gw-compute-push-to-power-claude/</loc>
		<lastmod>2026-04-22T07:47:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transparenz-fur-unternehmen-und-behorden-bsi-aktualisiert-mit-c52026-den-cloud-sicherheitsstandard/</loc>
		<lastmod>2026-04-22T07:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-day-lucken-angriffe-auf-windows-systeme-beobachtet/</loc>
		<lastmod>2026-04-22T07:49:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saml-vs-oidc-vs-oauth-2-0-12-differences-every-b2b-engineering-team-should-know/</loc>
		<lastmod>2026-04-22T08:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saml-vs-oidc-vs-oauth-the-60-second-b2b-playbook/</loc>
		<lastmod>2026-04-22T08:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-150-jubilaum-mit-besser-geteilter-ansicht-und-neuen-tab-funktionen/</loc>
		<lastmod>2026-04-22T08:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/venezuela-energy-sector-targeted-by-highly-destructive-lotus-wiper/</loc>
		<lastmod>2026-04-22T08:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-emergency-patches-for-critical-asp-net-flaw/</loc>
		<lastmod>2026-04-22T08:47:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-emergency-patches-for-critical-asp-net-flaw-2/</loc>
		<lastmod>2026-04-22T08:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-emergency-patches-for-critical-asp-net-flaw-3/</loc>
		<lastmod>2026-04-22T08:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dindoor-backdoor-exploits-deno-and-msi-installers-to-slip-past-detection/</loc>
		<lastmod>2026-04-22T08:48:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-faces-a-cyber-perfect-storm-driven-by-tech-advances-and-nation-state-threats-ncsc-warns/</loc>
		<lastmod>2026-04-22T08:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neues-tool-von-mondoo-deckt-risiken-in-ki-agenten-skills-fruhzeitig-auf/</loc>
		<lastmod>2026-04-22T08:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-unbefugte-sollen-zugriff-auf-anthropics-super-ki-haben/</loc>
		<lastmod>2026-04-22T08:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/26-gefalschte-krypto-wallets-im-apple-app-store-entdeckt/</loc>
		<lastmod>2026-04-22T09:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-bets-on-epss-for-the-coming-bug-surge/</loc>
		<lastmod>2026-04-22T09:44:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/march-2026-cyber-threat-landscape-fueled-by-ransomware-breaches-and-access-markets/</loc>
		<lastmod>2026-04-22T09:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oil-crisis-what-oil-crisis-it-spending-de-coupled-from-wider-war-shock/</loc>
		<lastmod>2026-04-22T09:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/auraboros-rat-adds-live-audio-keylogging-and-cookie-theft-via-open-c2-panel/</loc>
		<lastmod>2026-04-22T09:47:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mustang-pandas-new-lotuslite-variant-targets-india-banks-south-korea-policy-circles/</loc>
		<lastmod>2026-04-22T09:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cohere-ai-terrarium-sandbox-flaw-enables-root-code-execution-container-escape/</loc>
		<lastmod>2026-04-22T09:49:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-investigates-report-of-rogue-access-to-hack-enabling-mythos-ai/</loc>
		<lastmod>2026-04-22T09:50:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-kompromittiert-151-github-repositories-in-einer-woche-wie-glassworm-vier-okosysteme-gleichzeitig-unterwanderte/</loc>
		<lastmod>2026-04-22T09:51:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-hartet-webbrowser-claude-mythos-findet-271-sicherheitslucken-in-firefox/</loc>
		<lastmod>2026-04-22T09:52:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-era-demands-a-different-kind-of-ciso-3/</loc>
		<lastmod>2026-04-22T10:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-era-demands-a-different-kind-of-ciso-4/</loc>
		<lastmod>2026-04-22T10:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-era-demands-a-different-kind-of-ciso-2/</loc>
		<lastmod>2026-04-22T10:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-era-demands-a-different-kind-of-ciso/</loc>
		<lastmod>2026-04-22T10:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ir-trends-q1-2026-phishing-reemerges-as-top-initial-access-vector-as-attacks-targeting-public-administration-persist/</loc>
		<lastmod>2026-04-22T10:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-tests-how-devs-react-to-yanking-claude-code-from-pro-plan/</loc>
		<lastmod>2026-04-22T10:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-reclaims-the-top-initial-access-spot-attackers-experiment-with-ai-tools-2/</loc>
		<lastmod>2026-04-22T10:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-reclaims-the-top-initial-access-spot-attackers-experiment-with-ai-tools/</loc>
		<lastmod>2026-04-22T10:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-reclaims-the-top-initial-access-spot-attackers-experiment-with-ai-tools-3/</loc>
		<lastmod>2026-04-22T10:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/onedrive-updates-focus-on-ai-access-control-and-compliance/</loc>
		<lastmod>2026-04-22T10:47:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersmart-partners-with-renaissance-to-deliver-complete-cyber-confidence-for-smes/</loc>
		<lastmod>2026-04-22T10:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gogra-malware-for-linux-uses-microsoft-graph-api-for-comms/</loc>
		<lastmod>2026-04-22T10:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-warns-of-fake-it-worker-identities-infiltrating-cloud-environments/</loc>
		<lastmod>2026-04-22T10:50:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalation-bug/</loc>
		<lastmod>2026-04-22T10:51:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-proxysmart-software-powering-90-sim-farms/</loc>
		<lastmod>2026-04-22T10:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-in-zeiten-von-quantencomputing-quantencomputing-heute-schon-eine-gefahr/</loc>
		<lastmod>2026-04-22T10:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/training-fur-den-ernstfall-locked-shields-generalprobe-fur-den-ernstfall/</loc>
		<lastmod>2026-04-22T10:55:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sendmarc-review-features-user-experiences-pros-cons-2026/</loc>
		<lastmod>2026-04-22T11:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-energy-medicine-yoga-reached-57-open-rates-and-simplified-bimi-implementation-with-easydmarc/</loc>
		<lastmod>2026-04-22T11:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-error-codes-explained-types-fixes-and-troubleshooting-guide/</loc>
		<lastmod>2026-04-22T11:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-ngate-malware-missbraucht-handypay-app-fur-nfc-betrug/</loc>
		<lastmod>2026-04-22T11:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scotland-yard-can-keep-using-live-facial-recognition-on-londoners-say-judges/</loc>
		<lastmod>2026-04-22T11:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tencents-qclaw-ai-agent-app-arrives-on-windows-and-macos/</loc>
		<lastmod>2026-04-22T11:48:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-traces-universal-print-issues-to-graph-api-code-change/</loc>
		<lastmod>2026-04-22T11:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lotus-wiper-hits-energy-sector-in-destructive-cyberattack/</loc>
		<lastmod>2026-04-22T11:50:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-spring-authorization-server-issue-exposes-systems-to-xss-and-ssrf-attacks/</loc>
		<lastmod>2026-04-22T11:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bamboo-data-centre-and-server-flaw-enables-command-injection-attacks-2/</loc>
		<lastmod>2026-04-22T11:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bamboo-data-centre-and-server-flaw-enables-command-injection-attacks/</loc>
		<lastmod>2026-04-22T11:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/former-ransomware-negotiator-pleads-guilty-to-working-for-blackcat-cyber-gang/</loc>
		<lastmod>2026-04-22T11:53:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nfc-tappay-gets-tapped-by-hackers/</loc>
		<lastmod>2026-04-22T12:42:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-unleashes-even-more-ai-security-agents-to-fight-the-baddies/</loc>
		<lastmod>2026-04-22T12:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/frances-secure-id-agency-probes-breach-as-crooks-claim-19m-records/</loc>
		<lastmod>2026-04-22T12:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/progress-software-fixes-sneaky-waf-bypass-vulnerability-cve-2026-21876/</loc>
		<lastmod>2026-04-22T12:45:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-fintech-accounts-used-to-launder-stolen-funds-before-detection/</loc>
		<lastmod>2026-04-22T12:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack/</loc>
		<lastmod>2026-04-22T12:47:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toxic-combinations-when-cross-app-permissions-stack-into-risk/</loc>
		<lastmod>2026-04-22T12:48:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isx-it-security-conference-2026-so-konnen-sie-threat-intelligence-fur-ihre-verteidigung-nutzen/</loc>
		<lastmod>2026-04-22T12:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-urteil-datenubermittlung-in-die-usa-ist-rechtmasig/</loc>
		<lastmod>2026-04-22T12:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ganzheitlicher-schutz-der-digitalen-welt-was-bedeutet-it-sicherheit/</loc>
		<lastmod>2026-04-22T12:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacken-laufen-bereits-rund-1-300-sharepoint-instanzen-sind-angreifbar/</loc>
		<lastmod>2026-04-22T12:52:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unauthorized-users-reportedly-gain-access-to-anthropics-mythos-ai-model/</loc>
		<lastmod>2026-04-22T13:44:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyber-agency-handling-four-major-incidents-a-week-as-nation-state-attacks-surge/</loc>
		<lastmod>2026-04-22T13:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-defense-department-cyber-strategy-imminent-official-says/</loc>
		<lastmod>2026-04-22T13:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-auf-abwegen-der-alibaba-vorfall-verdeutlicht-die-notwendigkeit-von-zero-trust/</loc>
		<lastmod>2026-04-22T13:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ausfallzeiten-nach-sicherheitsverstos-minimieren/</loc>
		<lastmod>2026-04-22T13:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorratsdatenspeicherung-rechtswidriger-entwurf-durch-die-hintertur/</loc>
		<lastmod>2026-04-22T13:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scotland-yard-can-keep-using-live-facial-recognition-on-people-in-london-say-judges/</loc>
		<lastmod>2026-04-22T13:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluesky-back-online-after-ddos-attack-as-iran-linked-313-team-takes-credit/</loc>
		<lastmod>2026-04-22T13:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/router-security-hardening-steps-for-2026-from-default-credential-audits-to-automated-firmware-risk-monitoring/</loc>
		<lastmod>2026-04-22T13:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-and-chatbots-transforming-the-future-of-consumer-lending/</loc>
		<lastmod>2026-04-22T13:52:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-is-being-used-in-dentistry/</loc>
		<lastmod>2026-04-22T13:53:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/</loc>
		<lastmod>2026-04-22T13:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-get-efficiency-mode-on-pcs-with-limited-resources/</loc>
		<lastmod>2026-04-22T13:56:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-teams-to-get-efficiency-mode-on-pcs-with-limited-resources-2/</loc>
		<lastmod>2026-04-22T13:56:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-firefox-150-released-with-fixes-for-multiple-code-execution-vulnerabilities/</loc>
		<lastmod>2026-04-22T13:57:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-google-ads-hit-crypto-users-with-wallet-drainers/</loc>
		<lastmod>2026-04-22T13:58:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/109-fake-github-repos-spread-smartloader-stealc-malware/</loc>
		<lastmod>2026-04-22T13:59:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-sim-farm-as-a-service-operation-spanning-87-panels-in-17-nations/</loc>
		<lastmod>2026-04-22T14:01:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool-2/</loc>
		<lastmod>2026-04-22T14:01:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surge-in-silent-subject-phishing-attacks-targets-vip-users/</loc>
		<lastmod>2026-04-22T14:02:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vorratsdatenspeicherung-in-neuem-gewand-kabinett-beschliest-speicherpflicht-fur-ip-adressen/</loc>
		<lastmod>2026-04-22T14:03:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wordpress-plugins-deaktiviert-backdoor-angriff-trifft-uber-400-000-installationen/</loc>
		<lastmod>2026-04-22T14:05:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-time-is-now-to-prepare-for-cra-enforcement/</loc>
		<lastmod>2026-04-22T14:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacking-the-mcp-trust-boundary/</loc>
		<lastmod>2026-04-22T14:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacking-the-mcp-trust-boundary-2/</loc>
		<lastmod>2026-04-22T14:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacking-the-mcp-trust-boundary-3/</loc>
		<lastmod>2026-04-22T14:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-big-google-cloud-security-and-wiz-announcements-at-next-2026/</loc>
		<lastmod>2026-04-22T14:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinas-cyber-capabilities-now-equal-to-the-us-warns-dutch-intelligence/</loc>
		<lastmod>2026-04-22T14:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-government-says-100-countries-have-spyware-that-can-hack-peoples-phones/</loc>
		<lastmod>2026-04-22T14:45:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teams-increasingly-abused-in-helpdesk-impersonation-attacks-2/</loc>
		<lastmod>2026-04-22T14:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teams-increasingly-abused-in-helpdesk-impersonation-attacks-3/</loc>
		<lastmod>2026-04-22T14:47:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mustang-panda-hits-india-and-s-korea-with-updated-lotuslite-backdoor/</loc>
		<lastmod>2026-04-22T14:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bridgebreak-flaws-impact-lantronix-and-silex-technology-converters/</loc>
		<lastmod>2026-04-22T14:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-variants-target-routers-and-dvrs-in-parallel-campaigns/</loc>
		<lastmod>2026-04-22T14:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-caller-as-a-service-fraud-the-scam-economy-has-a-hiring-process/</loc>
		<lastmod>2026-04-22T14:50:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-pledges-90m-for-cybersecurity-and-pushes-for-resilience-pledge/</loc>
		<lastmod>2026-04-22T14:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drittanbieter-tokens-gestohlen-shiny-hunters-erpressen-rockstar-games-nach-snowflake-breach/</loc>
		<lastmod>2026-04-22T14:52:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-unbefugte-sollen-zugriff-auf-anthropics-super-ki-haben/</loc>
		<lastmod>2026-04-22T14:53:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/snowfroc-2026-secure-defaults-real-trust-and-a-better-layer-on-top/</loc>
		<lastmod>2026-04-22T15:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentic-data-pipelines-the-shift-to-autonomous-data-engineering/</loc>
		<lastmod>2026-04-22T15:43:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-trading-website-drops-malware-that-hands-your-browser-to-attackers/</loc>
		<lastmod>2026-04-22T15:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researcher-claims-claude-desktop-installs-spyware-on-macos/</loc>
		<lastmod>2026-04-22T15:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-sometimes-with-ais-help-topped-initial-access-methods-in-q1-cisco-says/</loc>
		<lastmod>2026-04-22T15:46:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-zentrale-schwachstellen-gefahrden-die-it-sicherheitslage-im-mittelstand/</loc>
		<lastmod>2026-04-22T15:47:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-outband-updates-fixed-critical-asp-net-core-privilege-escalation-flaw/</loc>
		<lastmod>2026-04-22T15:48:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-quarters-of-uk-it-leaders-without-strong-ai-governance-plans-2/</loc>
		<lastmod>2026-04-22T15:50:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-quarters-of-uk-it-leaders-without-strong-ai-governance-plans/</loc>
		<lastmod>2026-04-22T15:50:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-quarters-of-uk-it-leaders-without-strong-ai-governance-plans-3/</loc>
		<lastmod>2026-04-22T15:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/three-quarters-of-uk-it-leaders-without-strong-ai-governance-plans-4/</loc>
		<lastmod>2026-04-22T15:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-finds-271-firefox-flaws-mozilla-believes-it-shifts-security-toward-defenders/</loc>
		<lastmod>2026-04-22T15:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spain-dismantles-major-4-7m-manga-piracy-platform-arrests-four/</loc>
		<lastmod>2026-04-22T15:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dprk-fake-job-scams-self-propagate-in-contagious-interview/</loc>
		<lastmod>2026-04-22T15:52:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-unveils-silentglass-a-plug-in-device-to-protect-monitors-from-cyber-attacks/</loc>
		<lastmod>2026-04-22T15:53:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-commits-90m-for-cybersecurity-and-pushes-for-resilience-pledge/</loc>
		<lastmod>2026-04-22T15:55:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-blamed-for-290m-kelpdao-crypto-heist/</loc>
		<lastmod>2026-04-22T15:55:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesetzentwurf-beschlossen-regierung-startet-neuen-anlauf-zur-vorratsdatenspeicherung/</loc>
		<lastmod>2026-04-22T15:56:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/backdoor-in-claude-desktop-app-stille-brucke-aus-dem-browser/</loc>
		<lastmod>2026-04-22T15:58:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberstrong-product-update-whats-new-in-release-4-14/</loc>
		<lastmod>2026-04-22T16:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-attend-tech-conferences-and-events-for-free-the-complete-guide-for-cybersecurity-and-ai-professionals/</loc>
		<lastmod>2026-04-22T16:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-attend-tech-conferences-and-events-for-free-the-complete-guide-for-cybersecurity-and-ai-professionals-2/</loc>
		<lastmod>2026-04-22T16:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-8-minutes-to-admin-we-caught-it-in-the-wild-welcome-to-vibehacking/</loc>
		<lastmod>2026-04-22T16:46:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-breachlocks-integrated-attack-validation-platform-debuts-in-gartner-aev-category/</loc>
		<lastmod>2026-04-22T16:48:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-breachlocks-integrated-attack-validation-platform-debuts-in-gartner-aev-category-2/</loc>
		<lastmod>2026-04-22T16:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-alert-breachlocks-integrated-attack-validation-platform-debuts-in-gartner-aev-category-3/</loc>
		<lastmod>2026-04-22T16:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-stole-100000-identities-to-infiltrate-global-companies/</loc>
		<lastmod>2026-04-22T16:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-sharepoint-vulnerability-widely-exposed-across-multiple-countries/</loc>
		<lastmod>2026-04-22T16:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-arrest-suspected-hacker-behind-dozens-of-data-breaches/</loc>
		<lastmod>2026-04-22T16:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-supreme-court-is-about-to-decide-how-far-geofence-warrants-can-go/</loc>
		<lastmod>2026-04-22T16:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cosmetics-giant-rituals-confirms-data-breach-of-customer-membership-records/</loc>
		<lastmod>2026-04-22T16:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schatten-ki-zwingt-sicherheitsverantwortliche-zum-handeln/</loc>
		<lastmod>2026-04-22T16:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-40372-microsoft-patches-asp-net-core-privilege-escalation-vulnerability/</loc>
		<lastmod>2026-04-22T16:56:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-40372-microsoft-patches-asp-net-core-privilege-escalation-vulnerability-2/</loc>
		<lastmod>2026-04-22T16:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions/</loc>
		<lastmod>2026-04-22T16:57:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api/</loc>
		<lastmod>2026-04-22T16:59:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api-2/</loc>
		<lastmod>2026-04-22T16:59:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-mythos-ai-and-why-could-it-be-a-threat-to-global-cybersecurity/</loc>
		<lastmod>2026-04-22T17:00:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-network-ready-for-ai-a-practical-evaluation-framework/</loc>
		<lastmod>2026-04-22T17:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eclient-thunderbird-150-bessert-bei-verschlusselten-e-mails-nach/</loc>
		<lastmod>2026-04-22T17:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/k2view-vs-broadcom-for-test-data-management/</loc>
		<lastmod>2026-04-22T17:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-best-free-vpns-you-can-trust-in-2026-and-the-premium-trials-worth-trying/</loc>
		<lastmod>2026-04-22T17:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-1300-sharepoint-servers-still-exposed-to-actively-exploited-spoofing-flaw/</loc>
		<lastmod>2026-04-22T17:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberattack-on-french-government-agency-triggers-phishing-alert/</loc>
		<lastmod>2026-04-22T17:47:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-tiktok-downloader-extensions-quietly-compromised-130k-users/</loc>
		<lastmod>2026-04-22T17:48:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/macos-native-tools-enable-stealthy-enterprise-attacks/</loc>
		<lastmod>2026-04-22T17:49:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-planets-and-bright-stars/</loc>
		<lastmod>2026-04-22T18:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-planets-and-bright-stars-2/</loc>
		<lastmod>2026-04-22T18:43:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-s3-another-c2-channel-for-agentcore-code-interpreters/</loc>
		<lastmod>2026-04-22T18:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-linked-group-accessed-anthropics-claude-mythos-ai-in-vendor-breach/</loc>
		<lastmod>2026-04-22T18:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mirai-botnet-exploits-cve-2025-29635-to-target-legacy-d-link-routers/</loc>
		<lastmod>2026-04-22T18:46:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-apple-phishing-scam-uses-fake-899-iphone-purchase-alert/</loc>
		<lastmod>2026-04-22T18:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-impersonate-it-help-desk-on-microsoft-teams-to-gain-access-steal-data/</loc>
		<lastmod>2026-04-22T18:48:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/</loc>
		<lastmod>2026-04-22T18:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-agentic-browser-defense-blog-menlo-security/</loc>
		<lastmod>2026-04-22T19:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-outband-patch-for-critical-security-flaw-in-update-to-asp-net-core/</loc>
		<lastmod>2026-04-22T19:43:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-deployed-wiper-malware-in-destructive-attacks-on-venezuelas-energy-sector/</loc>
		<lastmod>2026-04-22T19:45:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages-from-iphones/</loc>
		<lastmod>2026-04-22T19:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-bug-that-cops-used-to-extract-deleted-chat-messages-from-iphones-2/</loc>
		<lastmod>2026-04-22T19:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-wave-continues-as-mastodon-hit-after-bluesky-incident/</loc>
		<lastmod>2026-04-22T19:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russians-hacking-reaches-new-levels-of-hostility/</loc>
		<lastmod>2026-04-22T19:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-probes-alleged-unauthorized-access-to-ai-security-tool-mythos/</loc>
		<lastmod>2026-04-22T19:50:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-google-antigravity-installer-can-steal-accounts-in-minutes/</loc>
		<lastmod>2026-04-22T19:51:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-windows-11-users-dont-need-third-party-antivirus/</loc>
		<lastmod>2026-04-22T19:53:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-windows-11-users-dont-need-third-party-antivirus-2/</loc>
		<lastmod>2026-04-22T19:53:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kyber-ransomware-gang-toys-with-post-quantum-encryption-on-windows/</loc>
		<lastmod>2026-04-22T19:56:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/</loc>
		<lastmod>2026-04-22T19:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-macos-vulnerability-research-augmenting-apples-source-code-and-os-logs-with-ai-agents/</loc>
		<lastmod>2026-04-22T20:43:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-attacks-are-getting-worse-how-to-shrink-your-exposure/</loc>
		<lastmod>2026-04-22T20:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-invisible-threat-business-logic-flaws-in-modern-applications-and-why-scanners-miss-them/</loc>
		<lastmod>2026-04-22T20:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/youre-not-watching-mcps-anthropics-vulnerability-shows-why-you-should-be/</loc>
		<lastmod>2026-04-22T20:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-poisoned-xinference-package-targets-ai-inference-servers/</loc>
		<lastmod>2026-04-22T20:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-update-for-macos-and-linux-asp-net-threat/</loc>
		<lastmod>2026-04-22T20:49:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-update-for-macos-and-linux-asp-net-threat-2/</loc>
		<lastmod>2026-04-22T20:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-issues-emergency-update-for-macos-and-linux-asp-net-threat-3/</loc>
		<lastmod>2026-04-22T20:49:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids-2/</loc>
		<lastmod>2026-04-22T20:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/france-confirms-data-breach-at-government-agency-that-manages-citizens-ids/</loc>
		<lastmod>2026-04-22T20:51:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-github-grounds-copilot-account-sign-ups-amid-capacity-crunch/</loc>
		<lastmod>2026-04-22T20:51:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/report-discord-group-uses-claudes-supposedly-secret-mythos/</loc>
		<lastmod>2026-04-22T20:53:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/russian-hacking-reaches-new-levels-of-hostility/</loc>
		<lastmod>2026-04-22T20:53:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-workspace-intelligence-promises-privacy-while-running-on-your-data/</loc>
		<lastmod>2026-04-22T20:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vonage-girls-who-code-show-what-responsible-ai-looks-like/</loc>
		<lastmod>2026-04-22T20:55:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-fixes-271-firefox-bugs-using-anthropics-mythos-ai/</loc>
		<lastmod>2026-04-22T20:57:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-fixes-271-firefox-bugs-using-anthropics-mythos-ai-2/</loc>
		<lastmod>2026-04-22T20:57:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mozilla-fixes-271-firefox-bugs-using-anthropics-mythos-ai-3/</loc>
		<lastmod>2026-04-22T20:57:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers/</loc>
		<lastmod>2026-04-22T20:58:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-create-an-mcp-server-to-connect-your-app-with-llms/</loc>
		<lastmod>2026-04-22T21:44:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-siphon-more-than-12-million-from-crypto-users-in-sprawling-campaign/</loc>
		<lastmod>2026-04-22T21:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-director-pick-sean-plankey-withdraws-his-nomination/</loc>
		<lastmod>2026-04-22T21:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-republicans-roll-out-national-privacy-bill/</loc>
		<lastmod>2026-04-22T21:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-republicans-roll-out-national-privacy-bill-2/</loc>
		<lastmod>2026-04-22T21:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-driven-arms-race-needs-better-threat-intelligence/</loc>
		<lastmod>2026-04-22T21:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/interview-critical-local-infrastructure-is-missing-link-in-uk-cyber-resilience/</loc>
		<lastmod>2026-04-22T21:49:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-to-build-national-cyber-shield-to-protect-against-ai-cyber-threats/</loc>
		<lastmod>2026-04-22T21:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-launches-gemini-agent-platform-eighth-generation-tpus/</loc>
		<lastmod>2026-04-22T21:51:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-tsunami-of-flaws-when-frontier-ai-and-patch-tuesday-collide/</loc>
		<lastmod>2026-04-22T21:52:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-ios-bug-that-retained-deleted-notification-data/</loc>
		<lastmod>2026-04-22T21:53:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishingangriff-signal-account-von-julia-klockner-gehackt/</loc>
		<lastmod>2026-04-22T21:55:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-scam-lures-ships-into-strait-of-hormuz-falsely-promising-safe-passage-2/</loc>
		<lastmod>2026-04-22T22:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-scam-lures-ships-into-strait-of-hormuz-falsely-promising-safe-passage-3/</loc>
		<lastmod>2026-04-22T22:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropics-super-scary-bug-hunting-model-mythos-is-shaping-up-to-be-a-nothingburger/</loc>
		<lastmod>2026-04-22T22:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patch-still-leaves-1300-sharepoint-servers-exposed/</loc>
		<lastmod>2026-04-22T22:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-gentlemen-rapidly-rises-to-ransomware-prominence/</loc>
		<lastmod>2026-04-22T22:45:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-scam-lures-ships-into-strait-of-hormuz-falsely-promising-safe-passage/</loc>
		<lastmod>2026-04-22T22:43:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-464-rockstar-got-hacked-the-data-was-junk-the-secrets-it-revealed-were-not/</loc>
		<lastmod>2026-04-22T23:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-npm-supply-chain-worm-is-tearing-through-dev-environments/</loc>
		<lastmod>2026-04-22T23:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pharma-giant-merck-and-google-cloud-sign-1b-agentic-ai-deal/</loc>
		<lastmod>2026-04-22T23:45:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-cisco-is-eyeing-buy-of-non-human-identity-startup-astrix/</loc>
		<lastmod>2026-04-22T23:46:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automated-ml-driven-threat-hunting-in-post-quantum-encrypted-mcp-streams/</loc>
		<lastmod>2026-04-23T03:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-named-a-2026-google-partner-of-the-year-infrastructure-modernization-sovereign-cloud-category/</loc>
		<lastmod>2026-04-23T03:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-named-a-2026-google-partner-of-the-year-infrastructure-modernization-sovereign-cloud-category-2/</loc>
		<lastmod>2026-04-23T03:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tropic-trooper-pivots-to-adaptixc2-and-custom-beacon-listener/</loc>
		<lastmod>2026-04-23T03:46:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riddled-with-flaws-serialethernet-converters-endanger-critical-infrastructure/</loc>
		<lastmod>2026-04-23T03:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/riddled-with-flaws-serialethernet-converters-endanger-critical-infrastructure/</loc>
		<lastmod>2026-04-23T03:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox/</loc>
		<lastmod>2026-04-23T03:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-pgserve-automagik-developer-tools-found-in-npm-registry/</loc>
		<lastmod>2026-04-23T03:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-verandert-alles-gesamte-angriffsflache-der-unternehmen-im-visier/</loc>
		<lastmod>2026-04-23T03:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-red-flags-fur-unternehmen-bei-denen-infrastruktur-zum-risiko-wird/</loc>
		<lastmod>2026-04-23T03:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/magnificent-irony-as-meta-staff-unhappy-about-running-surveillance-software-on-work-pcs/</loc>
		<lastmod>2026-04-23T03:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-spaghettified-dbms-chart-that-shows-oracles-crown-is-slowly-slipping/</loc>
		<lastmod>2026-04-23T03:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-heralds-end-of-passwords-for-consumers-and-pushes-secure-passkeys/</loc>
		<lastmod>2026-04-23T03:55:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cnapp-ein-kaufratgeber/</loc>
		<lastmod>2026-04-23T04:42:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-fraud-and-lawsuits-drive-cyber-insurance-claims-to-new-peaks/</loc>
		<lastmod>2026-04-23T04:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-fur-identitaten-und-daten-identitat-ist-der-zugangsweg-daten-sind-das-ziel/</loc>
		<lastmod>2026-04-23T05:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vulnerability-management-und-sbom-generierung-sind-key-beim-cra/</loc>
		<lastmod>2026-04-23T05:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scenario-open-source-framework-for-automated-ai-app-red-teaming/</loc>
		<lastmod>2026-04-23T05:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gdpr-works-but-only-where-someone-enforces-it/</loc>
		<lastmod>2026-04-23T05:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2025-209440-cve-2025-8095-unsichere-verschlusselung-bei-openedge-ermoglicht-cyberangriffe/</loc>
		<lastmod>2026-04-23T05:46:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-year-in-zooms-ciso-reflects-on-balancing-security-and-business/</loc>
		<lastmod>2026-04-23T06:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-bug-that-let-the-fbi-recover-deleted-signal-messages/</loc>
		<lastmod>2026-04-23T06:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tropic-trooper-uses-custom-beacon-and-vs-code-tunnels-for-stealthy-remote-access/</loc>
		<lastmod>2026-04-23T06:44:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-exposes-271-zero-day-security-flaws-in-firefox/</loc>
		<lastmod>2026-04-23T06:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatliche-cyberbedrohungen-aus-iran-china-und-russland-eskalieren-wenn-cyberkriminalitat-hacktivismus-und-staatsakteure-verschmelzen/</loc>
		<lastmod>2026-04-23T06:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-identity-providers-your-b2b-saas-must-support-to-close-enterprise-deals/</loc>
		<lastmod>2026-04-23T07:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-rolls-out-ncaf-2-0-framework-to-boost-national-cybersecurity-readiness/</loc>
		<lastmod>2026-04-23T07:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tradingview-ai-site-spreads-needle-stealer-through-phony-tradingclaw-app-2/</loc>
		<lastmod>2026-04-23T07:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tradingview-ai-site-spreads-needle-stealer-through-phony-tradingclaw-app/</loc>
		<lastmod>2026-04-23T07:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-kics-docker-repo-hijacked-in-malicious-code-injection-attack/</loc>
		<lastmod>2026-04-23T07:45:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-privacy-issue-exposing-signal-message-data-through-notifications/</loc>
		<lastmod>2026-04-23T07:46:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bloomberg-bericht-hatten-unbefugte-zugang-zu-anthropics-super-ki/</loc>
		<lastmod>2026-04-23T07:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dieses-mal-wirklich-ios-update-loscht-geloschte-benachrichtigungen/</loc>
		<lastmod>2026-04-23T07:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/university-of-warsaw-data-breach-exposes-200000-sensitive-files-on-darknet/</loc>
		<lastmod>2026-04-23T08:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pass-the-key-passwords-have-passed-their-sell-by-date/</loc>
		<lastmod>2026-04-23T08:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-graph-api-misused-by-new-gogra-linux-malware-for-hidden-communication/</loc>
		<lastmod>2026-04-23T08:45:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xinference-pypi-breach-exposes-developers-to-cloud-credential-theft/</loc>
		<lastmod>2026-04-23T08:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-wallpaper-app-youtube-channel-used-to-spread-notnullosx-malware/</loc>
		<lastmod>2026-04-23T08:47:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ohne-vertrauen-kein-klick-verbraucher-fordern-mehr-datenschutz-bei-ki/</loc>
		<lastmod>2026-04-23T08:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-agent-betreibt-im-modelltraining-autonomes-krypto-mining/</loc>
		<lastmod>2026-04-23T08:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unterhandler-sollte-unternehmen-nach-ransomware-angriffen-helfen-aber-unterstutzte-heimlich-die-hacker/</loc>
		<lastmod>2026-04-23T08:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/roblox-clamps-down-on-chats-and-age-checks-as-legal-pressure-builds/</loc>
		<lastmod>2026-04-23T09:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gopherwhisper-apt-group-hides-command-and-control-traffic-in-slack-and-discord/</loc>
		<lastmod>2026-04-23T09:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-tackles-a-bad-habit-people-have-when-interacting-with-ai/</loc>
		<lastmod>2026-04-23T09:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-tackles-a-bad-habit-people-have-when-interacting-with-ai-2/</loc>
		<lastmod>2026-04-23T09:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-exploit-lmdeploy-flaw-in-the-wild-within-12-hours-of-advisory/</loc>
		<lastmod>2026-04-23T09:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-fake-it-workers-infiltrate-firms-to-dodge-sanctions/</loc>
		<lastmod>2026-04-23T09:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-lures-developers-with-backdoored-coding-tests/</loc>
		<lastmod>2026-04-23T09:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/</loc>
		<lastmod>2026-04-23T09:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-backs-passkeys-hailing-a-new-era-of-sign-in/</loc>
		<lastmod>2026-04-23T09:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bei-project-glasswing-bleibt-europa-ausen-vor-entscheider-bedeutet/</loc>
		<lastmod>2026-04-23T09:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/curl-entwickler-uber-ki-open-source-projekte-versinken-im-high-quality-chaos/</loc>
		<lastmod>2026-04-23T09:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/they-say-gartner-is-dead-clearly-they-havent-checked-their-llm-sources/</loc>
		<lastmod>2026-04-23T10:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/every-employee-is-getting-an-ai-assistant-but-is-security-infrastructure-ready/</loc>
		<lastmod>2026-04-23T10:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-a-flaw-in-microsoft-defender-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-23T10:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unwary-chinese-hackers-hardcoded-credentials-into-backdoors/</loc>
		<lastmod>2026-04-23T10:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outlook-mailboxes-used-to-conceal-linux-gogra-backdoor-traffic/</loc>
		<lastmod>2026-04-23T10:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zealot-shows-what-ais-capable-of-in-staged-cloud-attack/</loc>
		<lastmod>2026-04-23T10:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-gopherwhisper-infects-12-mongolian-government-systems-with-go-backdoors/</loc>
		<lastmod>2026-04-23T10:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/</loc>
		<lastmod>2026-04-23T10:50:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-10-inwild-prompt-injection-payloads-targeting-ai-agents/</loc>
		<lastmod>2026-04-23T10:51:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/filigran-kommt-nach-deutschland-und-bringt-frischen-schwung-ins-threat-management/</loc>
		<lastmod>2026-04-23T10:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-weltpolitik-zur-angriffsflache-fur-cyberangriffe-wird/</loc>
		<lastmod>2026-04-23T10:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-ios-bug-that-kept-deleted-notifications-including-chat-previews/</loc>
		<lastmod>2026-04-23T11:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-bring-your-own-encryption-byoe/</loc>
		<lastmod>2026-04-23T11:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-bring-your-own-encryption-byoe-2/</loc>
		<lastmod>2026-04-23T11:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-malware-via-monitor-cables-is-a-matter-of-national-security-this-might-be-the-gadget-for-you/</loc>
		<lastmod>2026-04-23T11:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-use-hidden-website-instructions-in-new-attacks-on-ai-assistants/</loc>
		<lastmod>2026-04-23T11:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ramp-uncovered-anatomy-of-russias-ransomware-marketplace/</loc>
		<lastmod>2026-04-23T11:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-iphone-bug-that-let-fbi-retrieve-deleted-signal-messagescve-2026-28950/</loc>
		<lastmod>2026-04-23T11:48:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-day/</loc>
		<lastmod>2026-04-23T11:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-package-hijacks-hugging-face-for-malware-delivery/</loc>
		<lastmod>2026-04-23T11:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages/</loc>
		<lastmod>2026-04-23T11:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-attacks-surge-63-annually-in-education-sector/</loc>
		<lastmod>2026-04-23T11:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nato-cyberabwehrubung-locked-shields-hybride-attacken-nehmen-weiter-zu/</loc>
		<lastmod>2026-04-23T11:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nachste-ki-kapitulation-nextcloud-zahlt-fur-gemeldete-lucken-keine-pramien-mehr/</loc>
		<lastmod>2026-04-23T11:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersecurity-dammbruch-dank-claude-mythos-preview-was-hinter-dem-hype-steckt/</loc>
		<lastmod>2026-04-23T11:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-marketing-manager-schwerpunkt-website-online-marketing-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-04-23T11:56:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/telco-privacy-violation-fine-no-telco-privacy-violation-fine-supreme-court-to-determine-if-fcc-can-charge-telcos-for-data-breaches/</loc>
		<lastmod>2026-04-23T12:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-resilience-for-uk-smes-practical-steps-to-reduce-third-party-risk-2/</loc>
		<lastmod>2026-04-23T12:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-resilience-for-uk-smes-practical-steps-to-reduce-third-party-risk/</loc>
		<lastmod>2026-04-23T12:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-resilience-for-uk-smes-practical-steps-to-reduce-third-party-risk-3/</loc>
		<lastmod>2026-04-23T12:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-off-season-three-supply-chain-campaigns-hit-npm-pypi-and-docker-hub-in-48-hours/</loc>
		<lastmod>2026-04-23T12:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-gets-agent-ready-for-the-mythos-age/</loc>
		<lastmod>2026-04-23T12:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/</loc>
		<lastmod>2026-04-23T12:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-in-der-cybersicherheit-lohnt-sich-der-aufwand-fur-kleine-sicherheitsteams/</loc>
		<lastmod>2026-04-23T12:48:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/experte-fur-threat-management-filigran-startet-in-deutschland/</loc>
		<lastmod>2026-04-23T12:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-belegt-ersten-platz-im-hybrid-mesh-networkbenchmark-von-miercom/</loc>
		<lastmod>2026-04-23T12:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/abwehrmasnahmen-zu-cyberwarfare-sollten-deutlich-gestarkt-werden/</loc>
		<lastmod>2026-04-23T12:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-brings-instant-email-verification-to-android-no-otp-needed/</loc>
		<lastmod>2026-04-23T12:52:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/if-cyber-espionage-via-hdmi-worries-you-ncsc-built-a-device-to-stop-it/</loc>
		<lastmod>2026-04-23T12:53:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms/</loc>
		<lastmod>2026-04-23T12:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms-2/</loc>
		<lastmod>2026-04-23T12:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gitlab-fixes-flaws-that-could-allow-attackers-to-hijack-user-sessions/</loc>
		<lastmod>2026-04-23T12:55:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/outlook-mailboxes-abused-to-conceal-linux-gogra-backdoor-traffic/</loc>
		<lastmod>2026-04-23T12:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed/</loc>
		<lastmod>2026-04-23T12:57:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/project-glasswing-proved-ai-can-find-the-bugs-whos-going-to-fix-them/</loc>
		<lastmod>2026-04-23T12:58:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-introduces-unique-ai-agent-identities-in-new-gemini-enterprise-platform/</loc>
		<lastmod>2026-04-23T12:59:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/some-interrail-travellers-told-to-cancel-passports-as-hacked-data-posted-online/</loc>
		<lastmod>2026-04-23T13:00:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-are-using-everyday-devices-to-hack-uk-firms-warns-watchdog/</loc>
		<lastmod>2026-04-23T13:01:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-are-using-everyday-devices-to-hack-uk-firms-warns-watchdog-2/</loc>
		<lastmod>2026-04-23T13:01:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sichere-kommunikation-was-tun-wenn-das-signal-konto-gehackt-wurde/</loc>
		<lastmod>2026-04-23T13:02:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/copperhelm-emerges-to-launch-autonomous-cloud-security-platform/</loc>
		<lastmod>2026-04-23T13:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-ai-agents-balancing-security-and-productivity/</loc>
		<lastmod>2026-04-23T13:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-ai-agents-balancing-security-and-productivity-2/</loc>
		<lastmod>2026-04-23T13:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/managing-ai-agents-balancing-security-and-productivity-3/</loc>
		<lastmod>2026-04-23T13:45:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uks-ncsc-calls-passkeys-the-default-says-passwords-are-no-longer-fit-for-the-purpose/</loc>
		<lastmod>2026-04-23T13:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-data-of-500000-britons-put-up-for-sale-on-chinese-website-2/</loc>
		<lastmod>2026-04-23T13:47:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-data-of-500000-britons-put-up-for-sale-on-chinese-website/</loc>
		<lastmod>2026-04-23T13:47:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-data-of-500000-britons-put-up-for-sale-on-chinese-website-3/</loc>
		<lastmod>2026-04-23T13:47:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unautorisierter-zugriff-discord-gruppe-verschaffte-sich-zugang-zu-claude-mythos/</loc>
		<lastmod>2026-04-23T13:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sase-im-browser-2/</loc>
		<lastmod>2026-04-23T13:49:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sase-im-browser-3/</loc>
		<lastmod>2026-04-23T13:49:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sase-im-browser/</loc>
		<lastmod>2026-04-23T13:49:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-warns-of-chinese-hackers-using-proxy-networks-to-evade-detection/</loc>
		<lastmod>2026-04-23T13:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-security-breach-affecting-customer-accounts-3/</loc>
		<lastmod>2026-04-23T13:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-security-breach-affecting-customer-accounts/</loc>
		<lastmod>2026-04-23T13:51:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-confirms-security-breach-affecting-customer-accounts-2/</loc>
		<lastmod>2026-04-23T13:51:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/africa-relinquishes-cyberattack-lead-to-latin-america-for-now/</loc>
		<lastmod>2026-04-23T13:52:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/electricity-is-a-growing-area-of-cyber-risk/</loc>
		<lastmod>2026-04-23T13:53:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-ios-notification-bug-exposing-deleted-messages/</loc>
		<lastmod>2026-04-23T13:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-ios-notification-bug-exposing-deleted-messages-2/</loc>
		<lastmod>2026-04-23T13:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malware-kit-venom-stealer-hebt-clickfix-angriffe-auf-ein-neues-niveau/</loc>
		<lastmod>2026-04-23T13:55:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malus-sh-ki-tool-befreit-open-source-programme-von-lizenzen/</loc>
		<lastmod>2026-04-23T13:56:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitcoin-erbeutet-kryptoscammer-nutzen-chaos-an-der-strase-von-hormus-aus/</loc>
		<lastmod>2026-04-23T13:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-chrome-zero-days-keep-winning-and-what-enterprises-need-to-change-blog-menlo-security/</loc>
		<lastmod>2026-04-23T14:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/district-administration-how-cloud-monitoring-protects-districts-from-new-cyber-threats/</loc>
		<lastmod>2026-04-23T14:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-branded-sso-interfaces-improve-user-trust-and-experience/</loc>
		<lastmod>2026-04-23T14:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-on-the-horizon-ai-and-cybersecurity/</loc>
		<lastmod>2026-04-23T14:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offer-customers-passkeys-by-default-uks-ncsc-tells-enterprises/</loc>
		<lastmod>2026-04-23T14:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyera-boosts-data-security-for-ai-agents-with-acquisition-of-ryft/</loc>
		<lastmod>2026-04-23T14:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-pick-for-cisa-director-withdraws-from-consideration/</loc>
		<lastmod>2026-04-23T14:49:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-republicans-unveil-data-privacy-law-that-would-override-state-protections/</loc>
		<lastmod>2026-04-23T14:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schwachstelle-in-qualcomm-snapdragon/</loc>
		<lastmod>2026-04-23T14:51:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-autonom-zu-abtrunnig-wo-klafft-die-governance-lucke-bei-rebellischen-ki-agenten/</loc>
		<lastmod>2026-04-23T14:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/american-farms-have-a-new-steward-for-their-safety-net-disaster-programs-palantir/</loc>
		<lastmod>2026-04-23T14:53:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/american-farms-have-a-new-steward-for-their-safety-net-disaster-programs-palantir-2/</loc>
		<lastmod>2026-04-23T14:53:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-using-compromised-networks-to-spy-on-western-companies-says-five-eyes/</loc>
		<lastmod>2026-04-23T14:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/using-ai-to-manage-insider-risk-amid-middle-east-conflict/</loc>
		<lastmod>2026-04-23T14:55:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-microsoft-security-vulnerabilities-revealed/</loc>
		<lastmod>2026-04-23T14:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberuk-2026-uk-lagging-on-legal-protections-for-cyber-pros/</loc>
		<lastmod>2026-04-23T14:57:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-with-a-special-interest-in-breaching-sports-institutions-ends-behind-bars/</loc>
		<lastmod>2026-04-23T14:58:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/some-teams-users-cant-join-meetings-after-edge-update/</loc>
		<lastmod>2026-04-23T14:59:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-using-everyday-devices-to-target-uk-firms-warns-cybersecurity-agency/</loc>
		<lastmod>2026-04-23T15:00:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/20-000-nutzer-betroffen-bosartige-chrome-erweiterungen-stehlen-google-und-telegram-daten/</loc>
		<lastmod>2026-04-23T15:01:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-ready-security-is-coming-to-hpe-nonstop/</loc>
		<lastmod>2026-04-23T15:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-we-mean-by-procedures-and-why-precision-matters/</loc>
		<lastmod>2026-04-23T15:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-we-mean-by-procedures-and-why-precision-matters-2/</loc>
		<lastmod>2026-04-23T15:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/measuring-cyber-risk-performance-how-cisos-can-report-to-the-board/</loc>
		<lastmod>2026-04-23T15:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uat-4356s-targeting-of-cisco-firepower-devices/</loc>
		<lastmod>2026-04-23T15:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-says-some-of-its-customers-data-was-stolen-prior-to-its-recent-hack/</loc>
		<lastmod>2026-04-23T15:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ios-flaw-let-deleted-notifications-linger-apple-issues-fix/</loc>
		<lastmod>2026-04-23T15:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/with-ais-help-north-korean-hackers-stumbled-into-a-near-undetectable-attack/</loc>
		<lastmod>2026-04-23T15:50:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cosmetics-giant-rituals-discloses-data-breach-affecting-customers/</loc>
		<lastmod>2026-04-23T15:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/regular-password-resets-arent-as-safe-as-you-think/</loc>
		<lastmod>2026-04-23T15:52:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apt-abuses-multiple-cloud-tools-to-spy-on-mongolia/</loc>
		<lastmod>2026-04-23T15:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bad-memories-still-haunt-ai-agents/</loc>
		<lastmod>2026-04-23T15:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bad-memories-still-haunt-ai-agents-2/</loc>
		<lastmod>2026-04-23T15:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign/</loc>
		<lastmod>2026-04-23T15:55:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/</loc>
		<lastmod>2026-04-23T15:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-fuhrt-customer-managed-keys-fur-lakebase-postgres-ein/</loc>
		<lastmod>2026-04-23T15:57:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-vulnerability-chaining-why-your-security-stack-cannot-detect-what-comes-next/</loc>
		<lastmod>2026-04-23T16:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-trace-an-access-path-across-multiple-firewalls/</loc>
		<lastmod>2026-04-23T16:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-written-software-creates-hassles-for-wary-security-teams/</loc>
		<lastmod>2026-04-23T16:44:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-disguises-cyberattacks-with-covert-network-botnets-us-and-allies-warn/</loc>
		<lastmod>2026-04-23T16:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-targeted-mongolian-government-using-slack-discord-for-covert-communications/</loc>
		<lastmod>2026-04-23T16:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-dozen-allied-agencies-say-china-is-building-covert-hacker-networks-out-of-everyday-routers/</loc>
		<lastmod>2026-04-23T16:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/googles-pixel-update-sparks-severe-battery-drain-across-multiple-models/</loc>
		<lastmod>2026-04-23T16:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool-2/</loc>
		<lastmod>2026-04-23T16:49:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/</loc>
		<lastmod>2026-04-23T16:49:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ping-identity-holt-google-cloud-security-partner-award-2026/</loc>
		<lastmod>2026-04-23T16:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-networking-breakthrough-points-to-key-security-gains/</loc>
		<lastmod>2026-04-23T17:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cyberattacks-on-companies-affect-everyone/</loc>
		<lastmod>2026-04-23T17:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-llms-winning-at-pwn2own/</loc>
		<lastmod>2026-04-23T17:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrity-assurance-the-security-capability-the-industry-still-doesnt-fully-understand/</loc>
		<lastmod>2026-04-23T17:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/iran-nexus-threat-groups-refine-attacks-against-critical-infrastructure/</loc>
		<lastmod>2026-04-23T17:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/age-checks-could-turn-internet-into-an-id-checkpoint-complains-proton-ceo/</loc>
		<lastmod>2026-04-23T17:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvester-apt-expands-spying-operations-with-new-gogra-linux-malware/</loc>
		<lastmod>2026-04-23T17:48:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-fixes-iphone-bug-after-fbi-retrieved-signal-messages/</loc>
		<lastmod>2026-04-23T17:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-favors-generalpurpose-gemini-models-over-cybersecurityspecific-ai/</loc>
		<lastmod>2026-04-23T17:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-is-a-wake-up-call-for-ddos-defense/</loc>
		<lastmod>2026-04-23T18:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-butlerian-jihad-compromised-bitwarden-cli-deploys-npm-worm-poisons-ai-assistants-and-dumps-github-secrets/</loc>
		<lastmod>2026-04-23T18:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-propagating-npm-malware-turns-trusted-packages-into-attack-paths-2/</loc>
		<lastmod>2026-04-23T18:45:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-propagating-npm-malware-turns-trusted-packages-into-attack-paths/</loc>
		<lastmod>2026-04-23T18:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/self-propagating-npm-malware-turns-trusted-packages-into-attack-paths-3/</loc>
		<lastmod>2026-04-23T18:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/siem-pricing-2026-leading-siem-providers-compared-how-to-reduce-the-price-of-siem-ownership/</loc>
		<lastmod>2026-04-23T18:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/siem-pricing-2026-leading-siem-providers-compared-how-to-reduce-the-price-of-siem-ownership-2/</loc>
		<lastmod>2026-04-23T18:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-pays-to-be-a-forever-student/</loc>
		<lastmod>2026-04-23T18:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gesichtserkennung-im-frankfurter-rotlichtviertel-polizei-scannt-jeden-passanten/</loc>
		<lastmod>2026-04-23T18:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/luxury-cosmetics-giant-rituals-discloses-data-breach-impacting-member-personal-details/</loc>
		<lastmod>2026-04-23T18:51:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-cyber-spooks-is-your-computer-monitor-spying-on-you/</loc>
		<lastmod>2026-04-23T18:52:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-guardian-view-on-anthropics-claude-mythos-when-ai-finds-every-flaw-who-controls-the-internet-editorial/</loc>
		<lastmod>2026-04-23T18:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-elite-cyber-teams-cant-crack-web-security/</loc>
		<lastmod>2026-04-23T19:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-steps-to-become-mythos-ready-2/</loc>
		<lastmod>2026-04-23T19:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-steps-to-become-mythos-ready/</loc>
		<lastmod>2026-04-23T19:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zscaler-ceo-on-vulnerability-surge-from-ai-we-all-need-to-be-paranoid/</loc>
		<lastmod>2026-04-23T19:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-agency-breached-through-cisco-vulnerability-firestarter-backdoor-allowed-access-through-march/</loc>
		<lastmod>2026-04-23T19:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-companies-exploiting-telecom-system-to-spy-on-targets-locations-research-shows/</loc>
		<lastmod>2026-04-23T19:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-top-cyber-nominee-withdraws-after-turbulent-process/</loc>
		<lastmod>2026-04-23T19:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-us-sanctioned-grinex-hacked/</loc>
		<lastmod>2026-04-23T19:53:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/</loc>
		<lastmod>2026-04-23T19:55:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines-2/</loc>
		<lastmod>2026-04-23T19:55:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/</loc>
		<lastmod>2026-04-23T19:56:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware/</loc>
		<lastmod>2026-04-23T19:57:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/g-backdoor-in-claude-desktop-app-stille-brucke-aus-dem-browser/</loc>
		<lastmod>2026-04-23T19:58:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-to-build-an-ai-company-now/</loc>
		<lastmod>2026-04-23T20:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-cambodian-senator-for-millions-earned-through-scam-compounds/</loc>
		<lastmod>2026-04-23T20:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dragos-despite-ai-use-new-malware-targeting-water-plants-is-hype/</loc>
		<lastmod>2026-04-23T20:45:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/</loc>
		<lastmod>2026-04-23T20:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-pick-to-run-us-cyber-agency-cisa-asks-to-drop-out/</loc>
		<lastmod>2026-04-23T20:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-attackers-are-pwning-your-infrastructure-to-use-in-attacks-10-countries-warn/</loc>
		<lastmod>2026-04-23T20:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacked-devices-are-gateways-for-chinese-nation-state-hackers/</loc>
		<lastmod>2026-04-23T20:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/</loc>
		<lastmod>2026-04-23T20:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign/</loc>
		<lastmod>2026-04-23T21:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-breaking-the-lethal-trifecta-without-ruining-your-agents/</loc>
		<lastmod>2026-04-23T21:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-gitguardian-views-on-helloworm00/</loc>
		<lastmod>2026-04-23T21:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-gitguardian-views-on-helloworm00-2/</loc>
		<lastmod>2026-04-23T21:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/in-a-first-a-ransomware-family-is-confirmed-to-be-quantum-safe/</loc>
		<lastmod>2026-04-23T21:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-practical-ways-ai-threat-detection-improves-enterprise-cyber-resilience/</loc>
		<lastmod>2026-04-23T21:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/3-practical-ways-ai-threat-detection-improves-enterprise-cyber-resilience-2/</loc>
		<lastmod>2026-04-23T21:47:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-curious-case-of-sean-plankeys-derailed-cisa-nomination/</loc>
		<lastmod>2026-04-23T21:48:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-secure-systems-against-ai-hackers-2/</loc>
		<lastmod>2026-04-23T21:49:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-secure-systems-against-ai-hackers/</loc>
		<lastmod>2026-04-23T21:49:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-secure-systems-against-ai-hackers-4/</loc>
		<lastmod>2026-04-23T21:49:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-secure-systems-against-ai-hackers-3/</loc>
		<lastmod>2026-04-23T21:49:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-secure-systems-against-ai-hackers-5/</loc>
		<lastmod>2026-04-23T21:50:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-uk-agencies-warn-hackers-were-hiding-on-cisco-firewalls-long-after-patches-were-applied/</loc>
		<lastmod>2026-04-23T21:51:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-tries-tries-again-with-isp-data-retention-mandate/</loc>
		<lastmod>2026-04-23T21:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-tries-tries-again-with-isp-data-retention-mandate/</loc>
		<lastmod>2026-04-23T21:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-favors-general-purpose-gemini-models-over-cybersecurityspecific-ai/</loc>
		<lastmod>2026-04-23T21:56:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vercel-attack-fallout-expands-to-more-customers-and-third-party-systems/</loc>
		<lastmod>2026-04-23T22:41:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/doctor-lobby-urges-congress-to-set-ai-chatbot-safeguards/</loc>
		<lastmod>2026-04-23T22:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/newly-deciphered-sabotage-malware-may-have-targeted-irans-nuclear-program-and-predates-stuxnet/</loc>
		<lastmod>2026-04-23T22:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin-2/</loc>
		<lastmod>2026-04-23T22:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/</loc>
		<lastmod>2026-04-23T22:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/privacy-vulnerability-in-firefox-and-tor-browsers/</loc>
		<lastmod>2026-04-23T23:41:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up/</loc>
		<lastmod>2026-04-23T23:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-password-manager-trojanized-in-supply-chain-attack/</loc>
		<lastmod>2026-04-23T23:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-anthropic-konnte-buchse-der-pandora-geoffnet-haben/</loc>
		<lastmod>2026-04-23T23:45:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-data-of-half-a-million-britons-on-sale-in-china-after-biobank-breach/</loc>
		<lastmod>2026-04-23T23:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-backed-hackers-are-industrializing-botnets/</loc>
		<lastmod>2026-04-23T23:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cloudsmith-raises-72m-for-software-supply-chain-security/</loc>
		<lastmod>2026-04-24T03:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tropic-trooper-apt-takes-aim-at-home-routers-japanese-targets/</loc>
		<lastmod>2026-04-24T03:48:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zero-trust-architecture-for-sidecar-based-mcp-servers/</loc>
		<lastmod>2026-04-24T03:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/communicating-cyber-risk-to-the-board-executive-reporting-best-practices/</loc>
		<lastmod>2026-04-24T03:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warnung-vor-neuen-android-trojanern-800-apps-betroffen/</loc>
		<lastmod>2026-04-24T03:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/harvester-apt-goes-cross-platform-new-linux-backdoor-abuses-microsoft-graph-api/</loc>
		<lastmod>2026-04-24T03:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-myanmar-scam-compound-managers-charged/</loc>
		<lastmod>2026-04-24T03:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/runtime-analytics-cuts-millions-of-alerts-to-what-matters/</loc>
		<lastmod>2026-04-24T04:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/where-ai-in-ci-cd-is-working-for-engineering-teams/</loc>
		<lastmod>2026-04-24T04:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/automatisierung-und-managed-security-services-in-der-cybersecurity-kostenoptimierung-bedeutet-nicht-verzicht/</loc>
		<lastmod>2026-04-24T05:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-unternehmen-jetzt-ein-ganzheitliches-exposure-management-brauchen-der-allgefahrenansatz-der-nis2/</loc>
		<lastmod>2026-04-24T05:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-die-qualitat-der-ki-trotz-steigender-adoption-nicht-schritt-halt/</loc>
		<lastmod>2026-04-24T05:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-study-of-1000-android-apps-finds-a-privacy-policy-logging-gap/</loc>
		<lastmod>2026-04-24T05:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-study-of-1000-android-apps-finds-a-privacy-policy-logging-gap-2/</loc>
		<lastmod>2026-04-24T05:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-spending-to-hit-6-31-trillion-record-thanks-to-ai/</loc>
		<lastmod>2026-04-24T05:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-ss7-and-diameter-flaws-to-track-mobile-users-globally/</loc>
		<lastmod>2026-04-24T05:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-gang-unveils-custom-data-theft-tool/</loc>
		<lastmod>2026-04-24T05:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-impersonate-it-helpdesk-staff-to-breach-firms-via-microsoft-teams/</loc>
		<lastmod>2026-04-24T05:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bitwarden-cli-compromised-after-malicious-github-actions-workflow/</loc>
		<lastmod>2026-04-24T05:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/business-planning-and-consolidation-und-business-warehouse-kritische-sql-injection-bei-sap/</loc>
		<lastmod>2026-04-24T05:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-safari-with-gpt-5-4/</loc>
		<lastmod>2026-04-24T06:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nur-ein-funftel-ist-zufrieden-dokumentenchaos-bremst-unternehmen-immer-noch-aus/</loc>
		<lastmod>2026-04-24T06:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-man-webseiten-im-darknet-versteckt/</loc>
		<lastmod>2026-04-24T06:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wie-man-webseiten-im-darknet-versteckt-2/</loc>
		<lastmod>2026-04-24T06:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-reckons-the-artemis-ii-heat-shield-performed-like-a-champ/</loc>
		<lastmod>2026-04-24T06:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-speeding-up-nation-state-cyber-programs/</loc>
		<lastmod>2026-04-24T06:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-track-900-react2shell-exploits-via-telegram-bots/</loc>
		<lastmod>2026-04-24T06:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wer-it-sicherheit-nur-auslagert-schafft-neue-silos-security-braucht-integration-nicht-delegation/</loc>
		<lastmod>2026-04-24T06:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vs-closed-weight-models-and-why-you-need-confidential-inference-either-way-2/</loc>
		<lastmod>2026-04-24T07:42:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-vs-closed-weight-models-and-why-you-need-confidential-inference-either-way/</loc>
		<lastmod>2026-04-24T07:42:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-research-becomes-a-crime-the-new-risk-landscape-for-osint-and-dark-web-intelligence/</loc>
		<lastmod>2026-04-24T07:43:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-robot-will-see-you-now/</loc>
		<lastmod>2026-04-24T07:46:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-gpt-5-5-is-out-with-expanded-cybersecurity-safeguards/</loc>
		<lastmod>2026-04-24T07:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/python-vulnerability-enables-outbounds-write-on-windows/</loc>
		<lastmod>2026-04-24T07:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-ollama-model-uploads-to-leak-server-data/</loc>
		<lastmod>2026-04-24T07:49:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-ollama-model-uploads-to-leak-server-data-2/</loc>
		<lastmod>2026-04-24T07:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-hide-behind-compromised-routers/</loc>
		<lastmod>2026-04-24T07:50:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/behorden-warnen-chinesische-hacker-kapern-massenhaft-router-und-iot-gerate/</loc>
		<lastmod>2026-04-24T07:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indiskretionen-wirtschaftsministerin-reiche-lies-epostfacher-prufen/</loc>
		<lastmod>2026-04-24T07:52:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-drafts-ai-agents-to-secure-systems-against-ai-hackers/</loc>
		<lastmod>2026-04-24T08:41:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-cyber-actors-turn-to-massive-covert-botnets-to-evade-detection/</loc>
		<lastmod>2026-04-24T08:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-threat-actors-use-consumer-device-botnets-to-evade-detection-warn-uk-and-partners/</loc>
		<lastmod>2026-04-24T08:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-26-04-lts-delivers-memory-safe-system-tools-and-live-patching-for-arm-servers-2/</loc>
		<lastmod>2026-04-24T08:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-26-04-lts-delivers-memory-safe-system-tools-and-live-patching-for-arm-servers-3/</loc>
		<lastmod>2026-04-24T08:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ubuntu-26-04-lts-delivers-memory-safe-system-tools-and-live-patching-for-arm-servers/</loc>
		<lastmod>2026-04-24T08:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/</loc>
		<lastmod>2026-04-24T08:45:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-supply-chain-malware-attack-targets-developers-with-worm-like-propagation/</loc>
		<lastmod>2026-04-24T08:46:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/thales-stellt-imperva-for-google-cloud-vor/</loc>
		<lastmod>2026-04-24T08:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-governance-gap-how-the-eu-ai-act-makes-api-security-a-compliance-imperative/</loc>
		<lastmod>2026-04-24T09:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-biobank-leak-prompts-urgent-review-of-data-protection-in-biomedical-research/</loc>
		<lastmod>2026-04-24T09:43:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-biobank-leak-prompts-urgent-review-of-data-protection-in-biomedical-research-2/</loc>
		<lastmod>2026-04-24T09:43:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greece-relaxes-euro-biometric-border-entry-rules-amid-airport-chaos-3/</loc>
		<lastmod>2026-04-24T09:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greece-relaxes-euro-biometric-border-entry-rules-amid-airport-chaos-2/</loc>
		<lastmod>2026-04-24T09:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greece-relaxes-euro-biometric-border-entry-rules-amid-airport-chaos/</loc>
		<lastmod>2026-04-24T09:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/greece-relaxes-euro-biometric-border-entry-rules-amid-airport-chaos-4/</loc>
		<lastmod>2026-04-24T09:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-gov-pays-public-550-to-discuss-digital-id-then-bans-journalists-from-the-room/</loc>
		<lastmod>2026-04-24T09:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-insider-podcast-folge-115-der-cra-hebt-cybersicherheit-auf-ein-neues-niveau/</loc>
		<lastmod>2026-04-24T09:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-and-power-bi-are-transforming-commercial-residential-property-insurance/</loc>
		<lastmod>2026-04-24T10:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-mythos-ready-briefing-says-about-credentials/</loc>
		<lastmod>2026-04-24T10:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-the-mythos-ready-briefing-says-about-credentials-2/</loc>
		<lastmod>2026-04-24T10:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/secure-by-design-principles-for-uk-smes-a-practical-guide/</loc>
		<lastmod>2026-04-24T10:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-arrest-hexdex-hacker-over-mass-data-theft-and-leaks/</loc>
		<lastmod>2026-04-24T10:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-supply-chain-attack-impacts-bitwarden-npm-distribution-path/</loc>
		<lastmod>2026-04-24T10:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compromised-everyday-devices-power-chinese-cyber-espionage-operations/</loc>
		<lastmod>2026-04-24T10:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-cisco-firewall-malware-can-only-be-killed-by-pulling-the-plug/</loc>
		<lastmod>2026-04-24T10:49:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/meta-is-overhauling-how-you-sign-in-manage-settings-and-protect-your-accounts/</loc>
		<lastmod>2026-04-24T10:50:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-pastebin-powershell-script-to-hijack-telegram-sessions/</loc>
		<lastmod>2026-04-24T10:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xiongmai-ip-camera-flaw-lets-attackers-bypass-authentication/</loc>
		<lastmod>2026-04-24T10:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/void-dokkaebi-hackers-spread-malware-through-fake-job-interviews/</loc>
		<lastmod>2026-04-24T10:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/</loc>
		<lastmod>2026-04-24T10:55:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/</loc>
		<lastmod>2026-04-24T10:55:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6692-impersonates-it-help-desk-via-microsoft-teams-to-deploy-snow-malware/</loc>
		<lastmod>2026-04-24T10:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-erweitert-google-cloud-um-intelligente-ki-sicherheitsfunktionen/</loc>
		<lastmod>2026-04-24T10:57:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/staatspolitik-per-messenger-was-der-klockner-signal-fall-wirklich-offenlegt/</loc>
		<lastmod>2026-04-24T10:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-12-jahre-unentdeckt-telekom-deckt-gefahrliche-root-lucke-in-linux-auf/</loc>
		<lastmod>2026-04-24T10:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast-12-jahre-unentdeckt-telekom-deckt-gefahrliche-root-lucke-in-linux-auf-2/</loc>
		<lastmod>2026-04-24T10:59:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-of-confidence-24-april-2026/</loc>
		<lastmod>2026-04-24T11:41:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/xinference-pypi-supply-chain-poisoning-warning/</loc>
		<lastmod>2026-04-24T11:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/</loc>
		<lastmod>2026-04-24T11:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-desktop-reportedly-adds-browser-access-bridge-for-chromium-browsers/</loc>
		<lastmod>2026-04-24T11:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-desktop-reportedly-adds-browser-access-bridge-for-chromium-browsers/</loc>
		<lastmod>2026-04-24T11:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-scam-triggers-costly-sms-fraud/</loc>
		<lastmod>2026-04-24T11:46:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-cisco-firepower-n-day-flaws-for-unauthorized-access/</loc>
		<lastmod>2026-04-24T11:47:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-angriff-auf-passwortmanager-npm-paket-von-bitwarden-kompromittiert/</loc>
		<lastmod>2026-04-24T11:48:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-vishing-auf-knopfdruck-die-kriminelle-plattform-athr-revolutioniert-telefonbetrug/</loc>
		<lastmod>2026-04-24T12:44:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cyber-express-weekly-roundup-data-breaches-malware-campaigns-and-cyber-fraud-investigations/</loc>
		<lastmod>2026-04-24T12:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-und-die-konsequenzen-fur-die-softwaresicherheit/</loc>
		<lastmod>2026-04-24T12:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/check-point-integriert-seine-aiplatform-in-google-cloud/</loc>
		<lastmod>2026-04-24T12:47:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/community-tool-zur-erkennung-von-credential-theft-mit-defense-first-ai/</loc>
		<lastmod>2026-04-24T12:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-beefs-up-remote-desktop-security-with-hardread-messages/</loc>
		<lastmod>2026-04-24T12:49:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-now-lets-admins-uninstall-copilot-on-enterprise-devices/</loc>
		<lastmod>2026-04-24T12:50:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-agent-id-administrator-role-to-hijack-service-principals/</loc>
		<lastmod>2026-04-24T12:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gpt-5-5-bio-bug-bounty-program-aims-to-improve-ai-safety-and-performance/</loc>
		<lastmod>2026-04-24T12:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine/</loc>
		<lastmod>2026-04-24T12:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/</loc>
		<lastmod>2026-04-24T12:55:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns/</loc>
		<lastmod>2026-04-24T12:56:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/operation-power-off-internationale-aktion-gegen-cybercrime/</loc>
		<lastmod>2026-04-24T12:57:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/intel-bets-the-farm-on-ai-inference-to-drag-cpu-back-to-the-top-table/</loc>
		<lastmod>2026-04-24T13:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/users-advised-to-drop-passwords-and-make-room-for-passkeys/</loc>
		<lastmod>2026-04-24T13:43:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/indirect-prompt-injection-is-taking-hold-in-the-wild/</loc>
		<lastmod>2026-04-24T13:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-koreas-lazarus-targets-macos-users-via-clickfix/</loc>
		<lastmod>2026-04-24T13:46:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-ki-eigene-wege-geht-warum-unternehmen-ihre-governance-neu-denken-mussen/</loc>
		<lastmod>2026-04-24T13:47:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gemeinsam-gegen-unsichtbare-angriffe-sans-institute-startet-hackathon/</loc>
		<lastmod>2026-04-24T13:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/q1-updates-in-nexus-repository-more-formats-stronger-operations-and-a-better-dayday-experience/</loc>
		<lastmod>2026-04-24T14:43:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/toronto-police-arrest-three-in-canadas-first-mobile-sms-blaster-case/</loc>
		<lastmod>2026-04-24T14:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/another-spyware-maker-caught-distributing-fake-android-snooping-apps/</loc>
		<lastmod>2026-04-24T14:45:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-ancient-linux-device-support-faces-the-chop/</loc>
		<lastmod>2026-04-24T14:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-opts-all-cli-users-into-telemetry-collection-whether-they-want-it-or-not/</loc>
		<lastmod>2026-04-24T14:47:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware/</loc>
		<lastmod>2026-04-24T14:48:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-10000-zimbra-servers-vulnerable-to-ongoing-xss-attacks/</loc>
		<lastmod>2026-04-24T14:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-phishing-is-no-1-with-a-bullet-for-cyberattackers/</loc>
		<lastmod>2026-04-24T14:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-biobank-data-breach-health-data-of-500000-listed-for-sale-in-china/</loc>
		<lastmod>2026-04-24T14:51:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-a-passkey-how-does-it-work-and-why-is-it-better-than-a-password/</loc>
		<lastmod>2026-04-24T14:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-cloud-next-2026-so-will-google-cloud-seine-kunden-zu-ai-unternehmen-machen/</loc>
		<lastmod>2026-04-24T14:53:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-cybersecurity-marketing-agencies-in-2026-the-specialists-who-actually-understand-the-industry/</loc>
		<lastmod>2026-04-24T15:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/too-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps-2/</loc>
		<lastmod>2026-04-24T15:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/too-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps-3/</loc>
		<lastmod>2026-04-24T15:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/too-many-vulnerabilities-heres-how-autosect-risk-prioritization-helps/</loc>
		<lastmod>2026-04-24T15:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dane-authentication-for-enterprise-email-security/</loc>
		<lastmod>2026-04-24T15:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/norways-prime-minister-proposes-ban-on-social-media-access-for-young-teens/</loc>
		<lastmod>2026-04-24T15:46:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/governments-on-high-alert-after-cisa-snuffs-out-firestarter-backdoor-on-fed-network/</loc>
		<lastmod>2026-04-24T15:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-campaign-targets-germanys-bundestag-president-julia-klockner/</loc>
		<lastmod>2026-04-24T15:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/</loc>
		<lastmod>2026-04-24T15:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-8-enterprise-vpn-solutions/</loc>
		<lastmod>2026-04-24T15:51:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-8-enterprise-vpn-solutions-2/</loc>
		<lastmod>2026-04-24T15:51:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-top-8-enterprise-vpn-solutions-3/</loc>
		<lastmod>2026-04-24T15:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/</loc>
		<lastmod>2026-04-24T15:52:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-building-secure-agentic-systems-lessons-from-daily-driver-agents/</loc>
		<lastmod>2026-04-24T16:42:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-attacks-on-banking-databases-governance-at-scale/</loc>
		<lastmod>2026-04-24T16:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-attacks-on-banking-databases-governance-at-scale-2/</loc>
		<lastmod>2026-04-24T16:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-data-of-500000-uk-volunteers-listed-for-sale-on-alibaba/</loc>
		<lastmod>2026-04-24T16:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-clarifies-mobile-hotspots-part-of-foreign-router-ban-despite-rarity-of-american-made-consumer-kit/</loc>
		<lastmod>2026-04-24T16:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-they-have-cruise-giant-carnivals-booty-as-7-5m-emails-surface/</loc>
		<lastmod>2026-04-24T16:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claim-they-have-cruise-giant-carnivals-booty-as-7-5m-emails-surface-2/</loc>
		<lastmod>2026-04-24T16:48:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-udemy-data-breach-of-1-4m-users/</loc>
		<lastmod>2026-04-24T16:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-breaches-ai-expansion-and-cloud-security-define-this-weeks-cyber-landscape-in-april-2026/</loc>
		<lastmod>2026-04-24T16:50:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bt-has-now-blocked-over-a-billion-clicks-to-malicious-websites-says-ncsc/</loc>
		<lastmod>2026-04-24T16:51:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-chief-warns-of-perfect-storm-as-cyber-threats-intensify-at-cyberuk/</loc>
		<lastmod>2026-04-24T16:52:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glasswing-secured-the-code-the-rest-of-your-stack-is-still-on-you/</loc>
		<lastmod>2026-04-24T16:53:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software/</loc>
		<lastmod>2026-04-24T16:54:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionageverdacht-bundesanwaltschaft-ermittelt-wegen-signal-angriff-2/</loc>
		<lastmod>2026-04-24T16:56:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spionageverdacht-bundesanwaltschaft-ermittelt-wegen-signal-angriff/</loc>
		<lastmod>2026-04-24T16:56:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/80-billion-lost-to-sms-fraud-last-year-the-good-news-is-wrong/</loc>
		<lastmod>2026-04-24T17:41:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hasbro-expects-march-cyberattack-to-impact-second-quarter-revenue/</loc>
		<lastmod>2026-04-24T17:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cisa-director-pick-withdraws-after-tumultuous-nomination-3/</loc>
		<lastmod>2026-04-24T17:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cisa-director-pick-withdraws-after-tumultuous-nomination-2/</loc>
		<lastmod>2026-04-24T17:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-cisa-director-pick-withdraws-after-tumultuous-nomination/</loc>
		<lastmod>2026-04-24T17:44:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-agents-need-least-privilege-too-and-how-to-enforce-it-automatically/</loc>
		<lastmod>2026-04-24T18:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-crowdstrike-is-helping-the-industry-to-withstand-ai-driven-vulnerability-deluge-exec/</loc>
		<lastmod>2026-04-24T18:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagon-grapples-with-securing-ai-as-it-moves-toward-autonomous-warfare/</loc>
		<lastmod>2026-04-24T18:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-warns-of-ai-model-extraction-campaigns/</loc>
		<lastmod>2026-04-24T18:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-says-china-linked-actors-tried-to-steal-american-ai-2/</loc>
		<lastmod>2026-04-24T18:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/white-house-says-china-linked-actors-tried-to-steal-american-ai/</loc>
		<lastmod>2026-04-24T18:47:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april/</loc>
		<lastmod>2026-04-24T18:48:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-pack2theroot-flaw-gives-hackers-root-linux-access/</loc>
		<lastmod>2026-04-24T18:49:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/</loc>
		<lastmod>2026-04-24T18:50:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-020-why-dns-is-your-first-line-of-cyber-defense-chris-buijs/</loc>
		<lastmod>2026-04-24T19:42:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tdl-020-why-dns-is-your-first-line-of-cyber-defense-chris-buijs-2/</loc>
		<lastmod>2026-04-24T19:43:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/benchmarking-openais-privacy-filter-what-it-gets-right-and-where-pii-detection-still-needs-real-data/</loc>
		<lastmod>2026-04-24T19:44:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-rotational-gravity/</loc>
		<lastmod>2026-04-24T19:45:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-are-top-university-websites-serving-porn-it-comes-down-to-shoddy-housekeeping/</loc>
		<lastmod>2026-04-24T19:46:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-last-in-line-for-access-to-anthropic-mythos/</loc>
		<lastmod>2026-04-24T19:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irans-cyber-threat-may-be-less-shock-and-awe-than-low-and-slow-officials-say/</loc>
		<lastmod>2026-04-24T19:48:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adt-says-customer-data-stolen-in-cyber-intrusion/</loc>
		<lastmod>2026-04-24T19:50:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/flurry-of-supply-chain-software-library-attacks/</loc>
		<lastmod>2026-04-24T19:51:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/health-records-of-500000-uk-biobank-volunteers-listed-online-in-china/</loc>
		<lastmod>2026-04-24T19:52:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-cloud-security-a-2026-guide/</loc>
		<lastmod>2026-04-24T19:53:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks/</loc>
		<lastmod>2026-04-24T19:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-us-house-privacy-bills-raise-hard-questions-about-enterprise-data-collection/</loc>
		<lastmod>2026-04-24T20:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk/</loc>
		<lastmod>2026-04-24T20:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-year-old-pack2theroot-bug-lets-linux-users-gain-root-privileges/</loc>
		<lastmod>2026-04-24T20:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-update-gets-new-controls-to-reduce-forced-restarts/</loc>
		<lastmod>2026-04-24T20:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-busts-myanmar-ring-targeting-us-citizens-in-financial-fraud/</loc>
		<lastmod>2026-04-24T20:46:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-rethinking-how-we-evaluate-security-agents-for-real-world-use/</loc>
		<lastmod>2026-04-24T21:42:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-driven-cybersecurity-transforming-enterprise-security-with-intelligent-automation/</loc>
		<lastmod>2026-04-24T21:43:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/latest-spy-power-reauthorization-bill-leaves-critics-unimpressed/</loc>
		<lastmod>2026-04-24T21:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firestarter-malware-survives-cisco-firewall-updates-security-patches/</loc>
		<lastmod>2026-04-24T21:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firestarter-malware-survives-cisco-firewall-updates-security-patches-2/</loc>
		<lastmod>2026-04-24T21:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-your-word-documents-an-ai-co-author-you-didnt-ask-for/</loc>
		<lastmod>2026-04-24T22:43:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-your-word-documents-an-ai-co-author-you-didnt-ask-for-2/</loc>
		<lastmod>2026-04-24T22:43:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-your-word-documents-an-ai-co-author-you-didnt-ask-for-3/</loc>
		<lastmod>2026-04-24T22:43:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-gives-your-word-documents-an-ai-co-author-you-didnt-ask-for-4/</loc>
		<lastmod>2026-04-24T22:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/poor-risk-analysis-cost-4-firms-1-7-million-in-hipaa-fines/</loc>
		<lastmod>2026-04-24T22:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-rise-of-shadow-ai-agents-inside-enterprises/</loc>
		<lastmod>2026-04-24T22:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-cloud-security-providers-you-might-be-overlooking-in-2026/</loc>
		<lastmod>2026-04-24T22:46:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/5-enterprise-vpn-solutions-every-business-should-know-in-2026/</loc>
		<lastmod>2026-04-24T22:47:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-secure-cloud-storage-for-privacy-protection-in-2026/</loc>
		<lastmod>2026-04-24T22:48:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/speicherung-von-ip-adressen-bitkom-begrust-prinzipiell-gesetzentwurf-und-fordert-nachscharfung/</loc>
		<lastmod>2026-04-24T23:42:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nutzer-umfrage-fast-50-apps-durchschnittlich-auf-jedem-smartphone-installiert/</loc>
		<lastmod>2026-04-24T23:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-7-has-turned-into-an-overzealous-query-cop-devs-complain/</loc>
		<lastmod>2026-04-24T23:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tekstream-targets-proactive-security-with-imaginex-cyber-buy/</loc>
		<lastmod>2026-04-24T23:45:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-hunts-for-cisco-backdoor-spotted-on-federal-network/</loc>
		<lastmod>2026-04-24T23:46:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adt-confirms-data-breach-after-shinyhunters-leak-threat/</loc>
		<lastmod>2026-04-24T23:47:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network/</loc>
		<lastmod>2026-04-25T03:42:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network-2/</loc>
		<lastmod>2026-04-25T03:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network-3/</loc>
		<lastmod>2026-04-25T03:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nis2-erfolgreich-umsetzen-warum-organisation-und-prozesse-vor-technologie-kommen-mussen/</loc>
		<lastmod>2026-04-25T04:41:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/informationssicherheit-ist-kein-technisches-it-thema-zertifizierung-entspann-dich-unordnung-kostet-mehr-nerven/</loc>
		<lastmod>2026-04-25T04:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/15-costliest-credential-stuffing-attack-examples-of-the-decade-and-the-authentication-lessons-they-teach/</loc>
		<lastmod>2026-04-25T05:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/saviynt-stellt-identityagenten-vor/</loc>
		<lastmod>2026-04-25T05:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wiz-founder-hack-yourself-with-ai-before-the-bad-guys-do/</loc>
		<lastmod>2026-04-25T06:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/</loc>
		<lastmod>2026-04-25T06:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing/</loc>
		<lastmod>2026-04-25T07:42:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing-2/</loc>
		<lastmod>2026-04-25T07:42:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/13-hidden-costs-of-password-based-authentication-with-real-roi-math/</loc>
		<lastmod>2026-04-25T07:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/10-warning-signs-your-current-authentication-stack-is-a-breach-waiting-to-happen/</loc>
		<lastmod>2026-04-25T07:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/txone-networks-bringt-mehr-klarheit-in-die-ot-sicherheit-2/</loc>
		<lastmod>2026-04-25T08:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/txone-networks-bringt-mehr-klarheit-in-die-ot-sicherheit/</loc>
		<lastmod>2026-04-25T08:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crime-crew-impersonates-help-desk-abuses-microsoft-teams-to-steal-your-data/</loc>
		<lastmod>2026-04-25T10:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/</loc>
		<lastmod>2026-04-25T10:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-scam-abuses-verification-clicks-to-send-costly-international-texts/</loc>
		<lastmod>2026-04-25T11:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/</loc>
		<lastmod>2026-04-25T11:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-the-worst-five-attacks-that-looked-broken-and-worked/</loc>
		<lastmod>2026-04-25T12:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-of-the-worst-five-attacks-that-looked-broken-and-worked-2/</loc>
		<lastmod>2026-04-25T12:43:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/irdai-2026-cybersecurity-guidelines-for-insurance-companies/</loc>
		<lastmod>2026-04-25T12:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wenn-das-konto-zur-zielscheibe-wird-kartenbetrug-und-phishing-boomen/</loc>
		<lastmod>2026-04-25T12:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/payouts-king-die-erben-von-blackbasta-formieren-sich-neu/</loc>
		<lastmod>2026-04-25T13:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proton-ceo-schlagt-alarm-altersverifizierung-als-trojanisches-pferd/</loc>
		<lastmod>2026-04-25T15:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844/</loc>
		<lastmod>2026-04-25T15:43:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supplier-assurance-for-uk-smes-a-practical-guide-to-checking-third-parties-without-overcomplicating-it/</loc>
		<lastmod>2026-04-25T16:42:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supplier-assurance-for-uk-smes-a-practical-guide-to-checking-third-parties-without-overcomplicating-it-2/</loc>
		<lastmod>2026-04-25T16:43:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/</loc>
		<lastmod>2026-04-25T16:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-securing-workspace-genal-at-google-speed/</loc>
		<lastmod>2026-04-25T17:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-securing-workspace-genal-at-google-speed/</loc>
		<lastmod>2026-04-25T17:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriffe-auf-industrie-steuerungen-infrastruktur-weltweit-bedroht/</loc>
		<lastmod>2026-04-25T17:42:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-admits-it-dumbed-down-claude-when-trying-to-make-it-smarter/</loc>
		<lastmod>2026-04-25T17:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-rolls-out-revamped-windows-insider-program/</loc>
		<lastmod>2026-04-25T17:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/solid-state-batteries-hold-more-juice-but-keep-cracking-up-now-researchers-know-why/</loc>
		<lastmod>2026-04-25T21:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-simplehelp-samsung-and-d-link-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-25T22:42:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-simplehelp-samsung-and-d-link-flaws-to-its-known-exploited-vulnerabilities-catalog-2/</loc>
		<lastmod>2026-04-25T22:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-resilienz-compacer-stellt-unternehmen-checkliste-mit-5-schritten-bereit-2/</loc>
		<lastmod>2026-04-25T23:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-resilienz-compacer-stellt-unternehmen-checkliste-mit-5-schritten-bereit/</loc>
		<lastmod>2026-04-25T23:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-resilienz-compacer-stellt-unternehmen-checkliste-mit-5-schritten-bereit-3/</loc>
		<lastmod>2026-04-25T23:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phishing-bedrohung-geopolitische-krisen-als-aufhanger-fur-hacker-attacken/</loc>
		<lastmod>2026-04-25T23:43:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/introducing-proactive-hardening-and-attack-surface-reduction-phasr-for-linux-and-macos/</loc>
		<lastmod>2026-04-26T03:41:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ismg-editors-the-push-for-ai-innovation-and-the-fallout/</loc>
		<lastmod>2026-04-26T03:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/california-engineer-identified-in-suspected-shooting-at-white-house-correspondents-dinner/</loc>
		<lastmod>2026-04-26T04:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-passkey-deployment-lessons-from-ebay-hubspot-revolut-and-vicroads/</loc>
		<lastmod>2026-04-26T05:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-pragt-das-zusammenspiel-von-analyse-automatisierung-und-nutzerverhalten-neu-kiverandert-esicherheit-und-awareness/</loc>
		<lastmod>2026-04-26T05:43:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-fur-finanzinstitute-schlachtfeld-postfach/</loc>
		<lastmod>2026-04-26T05:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tackles-quality-control-issues-just-kidding-its-encouraging-experienced-workers-to-leave/</loc>
		<lastmod>2026-04-26T07:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-tackles-quality-control-issues-just-kidding-its-encouraging-experienced-workers-to-leave-2/</loc>
		<lastmod>2026-04-26T07:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/week-in-review-claude-mythos-finds-271-firefox-flaws-vercel-breach/</loc>
		<lastmod>2026-04-26T08:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ermittlungen-laufen-regierungsmitglieder-von-ausspahung-uber-signal-betroffen/</loc>
		<lastmod>2026-04-26T08:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-newsletter-round-574-by-pierluigi-paganini-international-edition/</loc>
		<lastmod>2026-04-26T09:42:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-great-stay-why-tech-talent-is-choosing-stability-over-salary/</loc>
		<lastmod>2026-04-26T10:41:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trigona-ransomware-adopts-custom-tool-to-steal-data-and-evade-detection/</loc>
		<lastmod>2026-04-26T10:41:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/security-affairs-malware-newsletter-round-94/</loc>
		<lastmod>2026-04-26T12:41:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepseeks-new-models-are-so-efficient-theyll-run-on-a-toaster-by-which-we-mean-huaweis-npus/</loc>
		<lastmod>2026-04-26T13:42:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gopherwhisper-new-china-linked-apt-targets-mongolia-with-go-based-malware/</loc>
		<lastmod>2026-04-26T14:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/american-utility-firm-itron-discloses-breach-of-internal-it-network/</loc>
		<lastmod>2026-04-26T15:42:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/electricity-is-a-growing-area-of-cyber-risk-2/</loc>
		<lastmod>2026-04-26T15:43:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-operation-pale-fire/</loc>
		<lastmod>2026-04-26T16:42:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobilfunk-uberwachung-bad-connection-unsichtbare-angriffe-machen-dein-handy-zur-ortungswanze/</loc>
		<lastmod>2026-04-26T16:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobilfunk-uberwachung-bad-connection-unsichtbare-angriffe-machen-dein-handy-zur-ortungswanze-2/</loc>
		<lastmod>2026-04-26T16:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobilfunk-uberwachung-bad-connection-unsichtbare-angriffe-machen-dein-handy-zur-ortungswanze-3/</loc>
		<lastmod>2026-04-26T16:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mobilfunk-uberwachung-bad-connection-unsichtbare-angriffe-machen-dein-handy-zur-ortungswanze-4/</loc>
		<lastmod>2026-04-26T16:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-bug-in-crowdstrike-logscale-let-attackers-access-files/</loc>
		<lastmod>2026-04-26T17:42:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-code-bugcrawl-funktion-soll-fehler-im-coding-assistenten-erkennen-2/</loc>
		<lastmod>2026-04-26T18:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-code-bugcrawl-funktion-soll-fehler-im-coding-assistenten-erkennen-3/</loc>
		<lastmod>2026-04-26T18:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anthropic-claude-code-bugcrawl-funktion-soll-fehler-im-coding-assistenten-erkennen/</loc>
		<lastmod>2026-04-26T18:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-entra-agent-id-flaw-enabled-tenant-takeover-via-privilege-escalation/</loc>
		<lastmod>2026-04-26T20:42:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kinder-und-jugendschutz-in-der-digitalen-welt-bitkom-kommentar-zur-bestandsaufnahme-der-expertenkommission/</loc>
		<lastmod>2026-04-26T23:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wettbewerbsvorteil-fur-unternehmen-digitale-transformation-mit-ki-muss-vorangebracht-werden/</loc>
		<lastmod>2026-04-26T23:42:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/helping-romance-scam-victims-require-a-proactive-empathic-approach/</loc>
		<lastmod>2026-04-26T23:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quantum-resistant-identity-and-access-management-for-mcp-resources/</loc>
		<lastmod>2026-04-27T03:41:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-pop-count-isnt-the-real-measure-of-application-security-performance/</loc>
		<lastmod>2026-04-27T03:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/black-hat-asia-privacy-and-cyber-security-are-inseparable/</loc>
		<lastmod>2026-04-27T03:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protecting-michigans-patients-the-states-healthcare-cisos/</loc>
		<lastmod>2026-04-27T04:41:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-the-machine-michigans-automotive-cisos/</loc>
		<lastmod>2026-04-27T04:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cycognito-webinar-why-data-governance-fails-when-systems-dont-align/</loc>
		<lastmod>2026-04-27T04:43:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-bluegrass-states-security-leaders-kentucky-cisos-to-know/</loc>
		<lastmod>2026-04-27T04:44:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ciso-diaries-thomas-kopeinig-gatterer-on-intelligent-risk-resilience-and-security-at-the-speed-of-change/</loc>
		<lastmod>2026-04-27T04:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions/</loc>
		<lastmod>2026-04-27T04:46:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/multi-actor-intrusion-wenn-nicht-einer-sondern-zwei-angreifer-im-netzwerk-wirken/</loc>
		<lastmod>2026-04-27T04:47:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-lulu-reveals-unauthorized-outbound-connections-from-mac-apps/</loc>
		<lastmod>2026-04-27T04:48:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-in-der-formel-1-wenn-hacker-mitfahren/</loc>
		<lastmod>2026-04-27T05:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheit-im-unternehmen-warum-eine-korrekte-earchivierung-so-wichtig-ist-die-unterschatzte-schwachstelle/</loc>
		<lastmod>2026-04-27T05:43:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/esicherheit-schutz-erhohen-interne-it-entlasten/</loc>
		<lastmod>2026-04-27T05:45:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-ai-criminal-mastermind-is-already-hiring-on-gig-platforms/</loc>
		<lastmod>2026-04-27T05:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/25-open-source-cybersecurity-tools-that-dont-care-about-your-budget/</loc>
		<lastmod>2026-04-27T05:46:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-chain-codesys-vulnerabilities-to-backdoor-applications/</loc>
		<lastmod>2026-04-27T05:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-chain-codesys-vulnerabilities-to-backdoor-applications-2/</loc>
		<lastmod>2026-04-27T05:48:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-chain-codesys-vulnerabilities-to-backdoor-applications-3/</loc>
		<lastmod>2026-04-27T05:48:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/patches-fur-ios-und-ipados-apple-schliest-eine-vom-fbi-genutzte-sicherheitslucke/</loc>
		<lastmod>2026-04-27T05:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-yorks-3d-printing-crackdown-security-or-surveillance/</loc>
		<lastmod>2026-04-27T06:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-malware-conceals-payloads-in-jpeg-txt-files-to-evade-detection/</loc>
		<lastmod>2026-04-27T06:44:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/industrialisierte-geldwasche-mule-account-fabriken/</loc>
		<lastmod>2026-04-27T06:45:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/metabase-enterprise-rce-flaw-now-has-public-proofconcept-exploit/</loc>
		<lastmod>2026-04-27T06:46:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast16-malware-targets-high-value-systems-with-sabotage-capabilities/</loc>
		<lastmod>2026-04-27T06:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suspicious-microsoft-store-app-vibing-exe-allegedly-harvests-screens-and-audio/</loc>
		<lastmod>2026-04-27T06:48:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-verbote-funktionieren-nicht-shadow-agentic-ai-ist-ein-blinder-fleck-fur-cisos/</loc>
		<lastmod>2026-04-27T06:49:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/safe-vulnerability-disclosure-for-uk-smes-a-practical-guide/</loc>
		<lastmod>2026-04-27T07:42:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/transforming-raw-alerts-into-real-security-outcomes-with-seceon/</loc>
		<lastmod>2026-04-27T07:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-utility-giant-itron-discloses-a-security-breach/</loc>
		<lastmod>2026-04-27T07:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nessus-agent-windows-flaw-enables-system-level-code-execution/</loc>
		<lastmod>2026-04-27T07:45:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickfix-attack-swaps-powershell-for-cmdkey-remote-regsvr32-payloads/</loc>
		<lastmod>2026-04-27T07:46:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/erweitertes-security-portfolio-acronis-bietet-mdr-services-fur-msp-ohne-eigenes-soc/</loc>
		<lastmod>2026-04-27T07:48:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jetzt-bei-haveibeenpwned-hacker-erpressen-udemy-und-leaken-nutzerdaten/</loc>
		<lastmod>2026-04-27T07:48:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-11-microsoft-erlaubt-unbegrenztes-pausieren-von-updates/</loc>
		<lastmod>2026-04-27T07:49:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-week-in-security-april-20-april-26/</loc>
		<lastmod>2026-04-27T08:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-ai-driven-reconnaissance-matters-today/</loc>
		<lastmod>2026-04-27T08:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-700-million-question-how-cyber-risk-became-a-market-cap-problem/</loc>
		<lastmod>2026-04-27T08:45:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-iam-was-built-for-humans-ai-agents-dont-care/</loc>
		<lastmod>2026-04-27T08:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/your-iam-was-built-for-humans-ai-agents-dont-care-2/</loc>
		<lastmod>2026-04-27T08:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/npm-worm-hits-namastex-packages-steals-secrets-across-registries/</loc>
		<lastmod>2026-04-27T08:47:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackfile-group-targets-retail-and-hospitality-with-vishing-attacks-2/</loc>
		<lastmod>2026-04-27T08:49:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackfile-group-targets-retail-and-hospitality-with-vishing-attacks/</loc>
		<lastmod>2026-04-27T08:49:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackfile-group-targets-retail-and-hospitality-with-vishing-attacks-3/</loc>
		<lastmod>2026-04-27T08:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zoi-erneut-als-google-partner-of-the-year-ausgezeichnet/</loc>
		<lastmod>2026-04-27T08:49:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-indonesian-authorities-team-to-take-down-site-ripping-off-users-for-millions-2/</loc>
		<lastmod>2026-04-27T09:43:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-indonesian-authorities-team-to-take-down-site-ripping-off-users-for-millions/</loc>
		<lastmod>2026-04-27T09:43:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/when-security-becomes-the-attack-surface-why-endpoint-protection-must-evolve/</loc>
		<lastmod>2026-04-27T09:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-is-reshaping-devsecops-to-bring-security-closer-to-the-code/</loc>
		<lastmod>2026-04-27T09:45:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-manager-of-agents-how-ai-evolves-the-soc-analyst-role/</loc>
		<lastmod>2026-04-27T09:46:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fast16-pre-stuxnet-malware-that-targeted-precision-engineering-software/</loc>
		<lastmod>2026-04-27T09:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-moves-to-extradite-chinese-national-to-the-u-s-over-hacking-charges/</loc>
		<lastmod>2026-04-27T09:48:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-pharma-firms-with-malware-laced-excel-attacks/</loc>
		<lastmod>2026-04-27T09:50:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-pharma-firms-with-malware-laced-excel-attacks-2/</loc>
		<lastmod>2026-04-27T09:50:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openclaw-flaws-expose-systems-to-policy-bypass-attacks/</loc>
		<lastmod>2026-04-27T09:50:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-gemini-cli-flaw-raises-supply-chain-security-concerns/</loc>
		<lastmod>2026-04-27T09:51:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud/</loc>
		<lastmod>2026-04-27T09:52:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-identify-fast16-sabotage-malware-that-pre-dates-stuxnet/</loc>
		<lastmod>2026-04-27T09:53:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-falschungen-sind-visuell-kaum-noch-erkennbar-wie-it-forensiker-deepfakes-aufdecken/</loc>
		<lastmod>2026-04-27T09:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/panne-bei-rdp-verbindungen-windows-update-mit-kaputter-warnmeldung-verteilt/</loc>
		<lastmod>2026-04-27T09:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ebay-struggles-with-widespread-outage-disrupting-transactions-and-api-access/</loc>
		<lastmod>2026-04-27T10:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ico-chief-john-edwards-steps-back-as-workplace-probe-quietly-unfolds/</loc>
		<lastmod>2026-04-27T10:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-infostealer-spreads-via-fake-captchas-hides-in-jpeg-and-txt-files/</loc>
		<lastmod>2026-04-27T10:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-generierte-falschungen-deepfakes-aufdecken-so-arbeiten-it-forensiker/</loc>
		<lastmod>2026-04-27T10:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-security-questionnaires-why-most-startups-fail-and-the-trust-stack-that-fixes-it/</loc>
		<lastmod>2026-04-27T11:43:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ex-aws-legend-explains-what-enterprises-need-to-make-ai-actually-work/</loc>
		<lastmod>2026-04-27T11:43:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tokenmaxxing-isnt-an-ai-strategy/</loc>
		<lastmod>2026-04-27T11:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/firefox-bug-cve-2026-6770-enabled-cross-site-tracking-and-tor-fingerprinting/</loc>
		<lastmod>2026-04-27T11:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/is-your-iam-ready-for-ai/</loc>
		<lastmod>2026-04-27T11:46:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-millions-of-records-stolen-in-adt-breach/</loc>
		<lastmod>2026-04-27T11:48:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-millions-of-records-stolen-in-adt-breach-2/</loc>
		<lastmod>2026-04-27T11:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-claim-millions-of-records-stolen-in-adt-breach-3/</loc>
		<lastmod>2026-04-27T11:48:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itron-discloses-data-breach-after-hackers-access-internal-systems/</loc>
		<lastmod>2026-04-27T11:50:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/itron-discloses-data-breach-after-hackers-access-internal-systems-2/</loc>
		<lastmod>2026-04-27T11:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-elf-malware-generator-evades-ml-detection-with-semantic-preserving-changes/</loc>
		<lastmod>2026-04-27T11:51:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-warn-macos-textutil-keepassxc-can-fuel-automation-attacks/</loc>
		<lastmod>2026-04-27T11:52:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attacken-auf-firmennetzwerke-hacker-tricksen-teams-nutzer-mit-spam-aus/</loc>
		<lastmod>2026-04-27T11:54:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burglar-alarm-biz-burgled-adt-confirms-cyber-intrusion-after-shinyhunters-extortion-attempt/</loc>
		<lastmod>2026-04-27T12:42:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/burglar-alarm-biz-burgled-adt-confirms-cyber-intrusion-after-shinyhunters-extortion-attempt-2/</loc>
		<lastmod>2026-04-27T12:42:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-updates-the-windows-update-experience-you-can-hit-pause-now/</loc>
		<lastmod>2026-04-27T12:43:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-use-ms-teams-fake-mailbox-repair-utility-to-breach-organizations/</loc>
		<lastmod>2026-04-27T12:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-outlook-com-outage-is-causing-signin-failures/</loc>
		<lastmod>2026-04-27T12:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-income-tax-notices-used-to-spread-malware/</loc>
		<lastmod>2026-04-27T12:46:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/helping-romance-scam-victims-requires-a-proactive-empathic-approach/</loc>
		<lastmod>2026-04-27T12:47:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mythos-changed-the-math-on-vulnerability-discovery-most-teams-arent-ready-for-the-remediation-side/</loc>
		<lastmod>2026-04-27T12:48:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/</loc>
		<lastmod>2026-04-27T12:49:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/</loc>
		<lastmod>2026-04-27T12:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/most-cybersecurity-professionals-feel-undervalued-and-underpaid/</loc>
		<lastmod>2026-04-27T12:52:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agenten-auf-jeder-ebene-absichern-palo-alto-networks-ubernimmt-koi-security/</loc>
		<lastmod>2026-04-27T12:52:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mehrheitswechsel-bei-ic-consult-neue-dynamik-im-markt-fur-identitatssicherheit/</loc>
		<lastmod>2026-04-27T12:53:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/compliance-risiko-durch-unstrukturierte-daten/</loc>
		<lastmod>2026-04-27T12:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scaling-our-vision-welcoming-tamar-nulman-and-omri-arnon-to-the-legit-team/</loc>
		<lastmod>2026-04-27T13:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scaling-our-vision-welcoming-tamar-nulman-and-omri-arnon-to-the-legit-team-2/</loc>
		<lastmod>2026-04-27T13:44:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-backed-groups-are-using-massive-botnets-in-espionage-intrusion-campaigns/</loc>
		<lastmod>2026-04-27T13:45:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-task-execution-to-ai-orchestrated-work-why-hiring-process-must-be-rebuilt/</loc>
		<lastmod>2026-04-27T13:45:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patched-an-agent-only-role-that-was-not/</loc>
		<lastmod>2026-04-27T13:46:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/27th-april-threat-intelligence-report/</loc>
		<lastmod>2026-04-27T13:47:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-infrastructure-giant-itron-says-it-was-hacked-2/</loc>
		<lastmod>2026-04-27T13:49:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-infrastructure-giant-itron-says-it-was-hacked/</loc>
		<lastmod>2026-04-27T13:49:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberkriminelle-zielen-auf-den-fertigungssektor-ab/</loc>
		<lastmod>2026-04-27T13:49:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/technology-innovation-leadership-2026-auszeichnung-fur-check-point-fur-seine-waf-und-api-sicherheitslosungen/</loc>
		<lastmod>2026-04-27T13:50:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-air-gapped-bis-zur-private-cloud-wie-man-sicherheitsmasnahmen-der-umgebung-anpasst/</loc>
		<lastmod>2026-04-27T13:51:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-golden-dome-gets-3-2bn-of-contractors-and-an-ai-sprinkle/</loc>
		<lastmod>2026-04-27T13:53:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-golden-dome-gets-3-2bn-of-contractors-and-an-ai-sprinkle-2/</loc>
		<lastmod>2026-04-27T13:53:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersec-is-a-thankless-job-expanding-workload-and-shrinking-pay-packet/</loc>
		<lastmod>2026-04-27T13:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6692-hackers-exploit-microsoft-teams-to-deploy-snow-malware/</loc>
		<lastmod>2026-04-27T13:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/money-launderer-linked-to-230m-crypto-heist-gets-70-months-in-prison/</loc>
		<lastmod>2026-04-27T13:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deepfake-voice-attacks-are-outpacing-defenses-what-security-leaders-should-know/</loc>
		<lastmod>2026-04-27T13:58:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-youtube-downloads-spread-vidar-malware-to-steal-corporate-logins/</loc>
		<lastmod>2026-04-27T13:58:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-releases-enterprise-policy-option-to-disable-windows-11-copilot/</loc>
		<lastmod>2026-04-27T13:59:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/parsing-agentic-offensive-securitys-existential-threat/</loc>
		<lastmod>2026-04-27T14:00:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-testing-vs-protection-the-missing-layer-in-your-defense/</loc>
		<lastmod>2026-04-27T14:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-impersonate-microsoft-teams-help-desk-to-breach-corporate-networks-2/</loc>
		<lastmod>2026-04-27T14:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-impersonate-microsoft-teams-help-desk-to-breach-corporate-networks/</loc>
		<lastmod>2026-04-27T14:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-spy-posed-as-researcher-in-spear-phishing-campaign-targeting-nasa-to-steal-defense-software/</loc>
		<lastmod>2026-04-27T14:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-browsergate/</loc>
		<lastmod>2026-04-27T14:47:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linkedin-browsergate-2/</loc>
		<lastmod>2026-04-27T14:47:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/500000-uk-volunteers-medical-data-listed-for-sale-on-alibaba/</loc>
		<lastmod>2026-04-27T14:47:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft/</loc>
		<lastmod>2026-04-27T14:48:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-malware-hides-behind-obfuscation-and-staged-payloads/</loc>
		<lastmod>2026-04-27T14:49:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-proposes-forcing-google-to-share-search-data-with-rivals-under-dma/</loc>
		<lastmod>2026-04-27T14:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-proposes-forcing-google-to-share-search-data-with-rivals-under-dma-2/</loc>
		<lastmod>2026-04-27T14:51:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/20-year-old-malware-rewrites-history-of-cyber-sabotage/</loc>
		<lastmod>2026-04-27T14:52:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/utilities-tech-supplier-itron-discloses-cyber-attack-operations-unaffected/</loc>
		<lastmod>2026-04-27T14:53:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/widely-used-browser-extensions-selling-user-data/</loc>
		<lastmod>2026-04-27T14:55:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inakzeptable-destillation-usa-werfen-china-diebstahl-von-ki-technologie-vor/</loc>
		<lastmod>2026-04-27T14:56:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-microsoft-vulnerabilities-report-2026-weniger-microsoft-schwachstellen-aber-mehr-kritische-sicherheitslucken/</loc>
		<lastmod>2026-04-27T14:58:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyondtrust-microsoft-vulnerabilities-report-2026-weniger-microsoft-schwachstellen-aber-mehr-kritische-sicherheitslucken-2/</loc>
		<lastmod>2026-04-27T14:58:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-training-browsesafe-lessons-from-detecting-prompt-injection/</loc>
		<lastmod>2026-04-27T15:43:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-training-browsesafe-lessons-from-detecting-prompt-injection/</loc>
		<lastmod>2026-04-27T15:43:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-training-browsesafe-lessons-from-detecting-prompt-injection/</loc>
		<lastmod>2026-04-27T15:43:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/short-lived-credentials-in-agentic-systems-a-practical-trade-off-guide/</loc>
		<lastmod>2026-04-27T15:43:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-the-nvd-scales-back-cve-enrichment-heres-what-tenable-customers-need-to-know/</loc>
		<lastmod>2026-04-27T15:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/major-critical-infrastructure-supplier-reports-cyberattack/</loc>
		<lastmod>2026-04-27T15:46:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-uk-authorities-warn-that-firestarter-backdoor-malware-survives-patching/</loc>
		<lastmod>2026-04-27T15:46:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/italy-extradites-alleged-chinese-state-hacker-to-us/</loc>
		<lastmod>2026-04-27T15:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/blackfile-actively-extorting-data-theft-victims-in-retail-and-hospitality-sector/</loc>
		<lastmod>2026-04-27T15:48:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-crooks-got-robinhood-to-send-phishing-emails-to-its-own-users/</loc>
		<lastmod>2026-04-27T15:49:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-security-giant-adt-data-breach-affects-5-5-million-people/</loc>
		<lastmod>2026-04-27T15:50:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-spotting-cyberattacks-before-they-begin/</loc>
		<lastmod>2026-04-27T15:51:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-sanctions-target-cambodian-scam-network-leaders/</loc>
		<lastmod>2026-04-27T15:52:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supply-chain-angriffe-auf-entwickler-tools-checkmarx-und-bitwarden-im-fokus/</loc>
		<lastmod>2026-04-27T15:53:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-bundesregierung-vermutet-russland-hinter-spahkampagne/</loc>
		<lastmod>2026-04-27T15:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/disinformation-campaign-targeted-tibetan-parliamentexile-elections/</loc>
		<lastmod>2026-04-27T16:42:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entwickler-tools-als-neue-angriffsflache/</loc>
		<lastmod>2026-04-27T16:43:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-best-vpns-for-small-businesses-on-a-budget-in-2026/</loc>
		<lastmod>2026-04-27T16:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-vpn-solutions-every-business-should-know-in-2026/</loc>
		<lastmod>2026-04-27T16:45:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pypi-package-with-1-1m-monthly-downloads-hacked-to-push-infostealer/</loc>
		<lastmod>2026-04-27T16:46:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation/</loc>
		<lastmod>2026-04-27T16:47:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack/</loc>
		<lastmod>2026-04-27T16:48:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more-2/</loc>
		<lastmod>2026-04-27T16:49:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/as-weekly-recap-fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/</loc>
		<lastmod>2026-04-27T16:49:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zwischen-isolation-und-integration-sicherheitsstrategien-fur-hybride-infrastrukturen/</loc>
		<lastmod>2026-04-27T16:50:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fireside-chat-leaked-secrets-are-now-the-go-to-attack-vector-and-ai-is-accelerating-exposures/</loc>
		<lastmod>2026-04-27T17:42:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/senators-seek-answers-about-hackers-obtaining-sensitive-student-data-from-ostensibly-anonymous-tip-line/</loc>
		<lastmod>2026-04-27T17:42:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-who-allegedly-carried-out-cyberattacks-for-china-is-extradited-to-u-s/</loc>
		<lastmod>2026-04-27T17:43:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-leaks-data-of-udemy-zara-7-eleven-in-salesforce-linked-breach/</loc>
		<lastmod>2026-04-27T17:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/home-security-firm-adt-breach-5-5m-customers-data-exposed/</loc>
		<lastmod>2026-04-27T17:45:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ftc-americans-lost-over-2-1-billion-to-social-media-scams-in-2025/</loc>
		<lastmod>2026-04-27T17:46:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-and-utility-tech-companies-hacked-by-digital-intruders/</loc>
		<lastmod>2026-04-27T18:42:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-red-teaming-is-not-equal-to-prompt-injection/</loc>
		<lastmod>2026-04-27T18:43:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-landscape-features/</loc>
		<lastmod>2026-04-27T19:42:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-need-to-prepare-for-the-claude-mythos-era-of-cyberattacks-experts/</loc>
		<lastmod>2026-04-27T19:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/money-launderer-for-crypto-thieves-given-5-year-sentence/</loc>
		<lastmod>2026-04-27T19:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-who-allegedly-carried-out-cyberattacks-for-china-is-extradited-to-us/</loc>
		<lastmod>2026-04-27T19:45:27+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cole-allen-charged-with-attempting-to-assassinate-trump/</loc>
		<lastmod>2026-04-27T19:46:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tennessee-becomes-second-state-to-ban-cryptocurrency-atms-over-scam-concerns/</loc>
		<lastmod>2026-04-27T20:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tennessee-becomes-second-state-to-ban-cryptocurrency-atms-over-scam-concerns-2/</loc>
		<lastmod>2026-04-27T20:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/82-chrome-extensions-found-selling-user-data-6-5-million-users-affected/</loc>
		<lastmod>2026-04-27T20:43:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtronic-discloses-security-incident-after-shinyhunters-claimed-theft-of-9m-records/</loc>
		<lastmod>2026-04-27T20:45:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canada-arrests-three-for-operating-sms-blaster-device-in-toronto/</loc>
		<lastmod>2026-04-27T20:45:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-silk-typhoon-hacker-extradited-to-us-for-cyberespionage/</loc>
		<lastmod>2026-04-27T20:46:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adt-breach-exposes-data-of-5-5-million-customers-shinyhunters-likely-behind-attack/</loc>
		<lastmod>2026-04-27T21:42:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-exploring-the-al-automation-boundary/</loc>
		<lastmod>2026-04-27T21:43:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-package-with-1-million-monthly-downloads-stole-user-credentials/</loc>
		<lastmod>2026-04-27T21:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supreme-court-signals-location-data-searches-should-require-a-warrant/</loc>
		<lastmod>2026-04-27T21:45:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-and-utility-tech-companies-admit-digital-breakins/</loc>
		<lastmod>2026-04-27T21:46:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-golden-dome-gets-3-2b-of-contractors-and-an-ai-sprinkle/</loc>
		<lastmod>2026-04-27T21:48:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trumps-golden-dome-gets-3-2b-of-contractors-and-an-ai-sprinkle-2/</loc>
		<lastmod>2026-04-27T21:48:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/crypto-targeting-north-koreans-wield-fake-zoom-meetings/</loc>
		<lastmod>2026-04-27T21:49:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unc6692-combines-social-engineering-malware-cloud-abuse/</loc>
		<lastmod>2026-04-27T21:50:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supreme-court-justices-skeptically-question-both-sides-in-geofence-surveillance-case/</loc>
		<lastmod>2026-04-27T22:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/supreme-court-justices-skeptically-question-both-sides-in-geofence-surveillance-case-2/</loc>
		<lastmod>2026-04-27T22:43:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medical-device-maker-medtronic-says-its-been-hacked/</loc>
		<lastmod>2026-04-27T22:43:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-zero-trust-security-solutions-in-2026/</loc>
		<lastmod>2026-04-27T22:45:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/wireless-network-security-wep-wpa-wpa2-wpa3-explained-in-2026/</loc>
		<lastmod>2026-04-27T22:47:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-7-threat-intelligence-platforms-software-in-2026/</loc>
		<lastmod>2026-04-27T22:47:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-penetration-testing-tools-software-in-2026/</loc>
		<lastmod>2026-04-27T22:48:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nessus-agent-flaw-grants-system-level-access-on-windows/</loc>
		<lastmod>2026-04-27T22:49:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/glassworm-malware-attacks-return-via-73-openvsx-sleeper-extensions/</loc>
		<lastmod>2026-04-27T22:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bmds-zwischenbilanz-digitalministerium-hat-nach-einem-jahr-viel-erreicht-und-weiterhin-noch-viel-zu-tun/</loc>
		<lastmod>2026-04-27T23:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pentagons-anthropic-fight-draws-rebuke-from-ex-dod-leaders/</loc>
		<lastmod>2026-04-27T23:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/robinhood-account-creation-flaw-abused-to-send-phishing-emails/</loc>
		<lastmod>2026-04-27T23:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/contextual-anomaly-detection-in-quantum-resistant-mcp-transport-layers/</loc>
		<lastmod>2026-04-28T03:42:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-national-extradited-to-us-for-pandemic-era-silk-typhoon-attacks/</loc>
		<lastmod>2026-04-28T03:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ongoing-supply-chain-attack-explicitly-targeting-security-dev-tools/</loc>
		<lastmod>2026-04-28T03:45:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-email-infrastructure-impacts-otp-and-magic-link-authentication-success-rates/</loc>
		<lastmod>2026-04-28T04:42:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-email-infrastructure-impacts-otp-and-magic-link-authentication-success-rates-2/</loc>
		<lastmod>2026-04-28T04:42:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-authentication-systems-help-build-trust-in-online-education-platforms/</loc>
		<lastmod>2026-04-28T04:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/diagnostic-fatigue-why-the-visibility-industry-just-hit-its-limit/</loc>
		<lastmod>2026-04-28T04:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trust-risk-and-the-cisos-protecting-michigans-financial-institutions/</loc>
		<lastmod>2026-04-28T04:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-cisos-protecting-michigans-campuses-classrooms-and-research/</loc>
		<lastmod>2026-04-28T04:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each/</loc>
		<lastmod>2026-04-28T05:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each-2/</loc>
		<lastmod>2026-04-28T05:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each-3/</loc>
		<lastmod>2026-04-28T05:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-email-deliverability-matters-in-multi-factor-authentication-mfa-workflows/</loc>
		<lastmod>2026-04-28T05:43:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-verbreitet-sich-schneller-als-unternehmen-sie-kontrollieren-oder-absichern-konnen/</loc>
		<lastmod>2026-04-28T05:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verhaltensanalysen-fur-ki-agenten-in-cloud-umgebungen-transparenz-und-anomalieerkennung-als-sicherheitsfaktor/</loc>
		<lastmod>2026-04-28T05:46:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-strategischer-vision-zur-gelebten-sicherheitsarchitektur-zero-trust-ist-heute-wichtiger-denn-je/</loc>
		<lastmod>2026-04-28T05:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neue-managed-services-stellen-die-weichen-fur-digitale-souveranitat/</loc>
		<lastmod>2026-04-28T05:48:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-releases-symphony-to-automate-codex-work-through-linear/</loc>
		<lastmod>2026-04-28T05:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ics-intrusion-detection-has-blind-spots-that-complicate-plant-security/</loc>
		<lastmod>2026-04-28T05:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-opus-4-6-powered-ai-coding-agent-wipes-production-database-in-9-seconds/</loc>
		<lastmod>2026-04-28T05:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-document-reader-app-hits-10k-downloads-spreads-anatsa-malware/</loc>
		<lastmod>2026-04-28T05:52:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/unberechtigte-lese-und-schreibrechte-kritische-rce-schwachstelle-verbreitet-sich-uber-microsoft-github-repository/</loc>
		<lastmod>2026-04-28T05:53:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/endpoint-and-memory-forensics-fundamentals-for-uk-smes/</loc>
		<lastmod>2026-04-28T06:42:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/even-cybersecurity-researchers-are-exposing-secrets-in-their-arxiv-latex-source/</loc>
		<lastmod>2026-04-28T06:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickup-security-flaw-exposes-959-emails-linked-to-major-fortune-500-firms/</loc>
		<lastmod>2026-04-28T06:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-kyc-android-malware-spreads-via-whatsapp-to-hijack-bank-accounts/</loc>
		<lastmod>2026-04-28T06:45:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/notepad-vulnerability-lets-attackers-crash-app-and-expose-memory-data/</loc>
		<lastmod>2026-04-28T06:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drei-raas-gruppen-dominieren-deutschlands-bedrohungslandschaft-ransomware-trifft-deutschland-in-produktion-dienstleistung-und-handel/</loc>
		<lastmod>2026-04-28T06:47:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/artifact-poisoning-a-silent-threat-to-enterprise-software-supply-chains/</loc>
		<lastmod>2026-04-28T07:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-25874-hugging-face-lerobot-unauthenticated-rce-via-pickle-deserialization/</loc>
		<lastmod>2026-04-28T07:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-litellm-flaw-enables-database-attacks-through-sql-injection/</loc>
		<lastmod>2026-04-28T07:45:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oilrig-hides-c2-config-in-google-drive-image-via-lsb-steganography/</loc>
		<lastmod>2026-04-28T07:46:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover/</loc>
		<lastmod>2026-04-28T07:47:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202/</loc>
		<lastmod>2026-04-28T07:49:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202-2/</loc>
		<lastmod>2026-04-28T07:49:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberspionage-durch-russland-regierungsmitglieder-von-ausspahung-uber-signal-betroffen/</loc>
		<lastmod>2026-04-28T07:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/messenger-signal-plant-schutzfunktionen-gegen-phishing-angriffe/</loc>
		<lastmod>2026-04-28T07:51:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-signal-phishing-bundestag-forciert-umstieg-auf-wire/</loc>
		<lastmod>2026-04-28T07:52:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-companies-hit-with-record-fines-for-privacy-in-2025/</loc>
		<lastmod>2026-04-28T08:43:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-companies-hit-with-record-fines-for-privacy-in-2025-2/</loc>
		<lastmod>2026-04-28T08:43:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-launches-silentglass-a-plug-in-device-to-secure-hdmi-and-displayport-links/</loc>
		<lastmod>2026-04-28T08:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ncsc-launches-silentglass-a-plug-in-device-to-secure-hdmi-and-displayport-links-2/</loc>
		<lastmod>2026-04-28T08:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-ipfire-dns-firewall-blocks-malware-and-phishing-at-the-resolver/</loc>
		<lastmod>2026-04-28T08:46:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-ipfire-dns-firewall-blocks-malware-and-phishing-at-the-resolver-2/</loc>
		<lastmod>2026-04-28T08:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapp-tests-encrypted-cloud-backup-service-for-safer-message-storage/</loc>
		<lastmod>2026-04-28T08:48:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-crypto-firms-with-clickfix-and-ai-made-zoom-lures/</loc>
		<lastmod>2026-04-28T08:49:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-erweitert-agent-bricks-mit-neuen-features-und-governance/</loc>
		<lastmod>2026-04-28T08:50:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-and-the-practical-test-of-operational-resilience-2/</loc>
		<lastmod>2026-04-28T09:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-asks-iphone-users-to-reauthenticate-after-outlook-outage/</loc>
		<lastmod>2026-04-28T09:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sandworm-uses-ssh-over-tor-tunnel-for-stealthy-long-term-persistence/</loc>
		<lastmod>2026-04-28T09:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-silk-typhoon-hacker-extradited-to-u-s-over-covid-research-cyberattacks/</loc>
		<lastmod>2026-04-28T09:53:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-metrics-are-better-than-bad-metrics-in-the-soc-says-ncsc/</loc>
		<lastmod>2026-04-28T09:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/no-metrics-are-better-than-bad-metrics-in-the-soc-says-ncsc-2/</loc>
		<lastmod>2026-04-28T09:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacker-erpressen-medtronic-datenklau-bei-grosem-medizintechnik-konzern/</loc>
		<lastmod>2026-04-28T09:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-cisos-need-to-get-right-as-identity-enters-the-agentic-era/</loc>
		<lastmod>2026-04-28T09:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stopping-aitm-attacks-the-defenses-that-actually-work-after-authentication-succeeds/</loc>
		<lastmod>2026-04-28T09:45:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/french-police-arrest-21-year-old-hexdex/</loc>
		<lastmod>2026-04-28T09:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-storage-management-tool-stratis-3-9-0-adds-online-encryption-and-cache-less-pool-startup/</loc>
		<lastmod>2026-04-28T09:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-privacy-tool-bleachbit-6-0-0-upgrades-code-signing-across-windows-and-linux/</loc>
		<lastmod>2026-04-28T09:48:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-source-privacy-tool-bleachbit-6-0-0-upgrades-code-signing-across-windows-and-linux-2/</loc>
		<lastmod>2026-04-28T09:48:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/beyond-the-perimeter-why-identity-and-cyber-security-are-one-single-story/</loc>
		<lastmod>2026-04-28T09:49:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dora-and-the-practical-test-of-operational-resilience/</loc>
		<lastmod>2026-04-28T09:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-rag-pipelines-in-enterprise-saas/</loc>
		<lastmod>2026-04-28T10:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/securing-rag-pipelines-in-enterprise-saas-2/</loc>
		<lastmod>2026-04-28T10:44:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/suses-sovereignty-pitch-meets-an-inconvenient-6-billion-question/</loc>
		<lastmod>2026-04-28T10:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-android-spyware-morpheus-linked-to-italian-surveillance-firm/</loc>
		<lastmod>2026-04-28T10:46:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-evolution-of-scattered-spider-how-organizations-are-strengthening-defenses/</loc>
		<lastmod>2026-04-28T10:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breaking-the-endpoint-tax-aligning-security-with-risk/</loc>
		<lastmod>2026-04-28T10:48:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-remote-desktop-warnings-may-display-incorrectly/</loc>
		<lastmod>2026-04-28T10:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-expands-copilot-agent-mode-for-outlook-inbox-and-calendar-tasks/</loc>
		<lastmod>2026-04-28T10:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-backed-smishing-rings-scale-credential-theft-via-sms-and-ott-apps/</loc>
		<lastmod>2026-04-28T10:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-engineer-stole-us-military-and-nasa-software-for-years/</loc>
		<lastmod>2026-04-28T11:42:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dkim2-explained-whats-changing-and-what-to-do/</loc>
		<lastmod>2026-04-28T11:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bridging-the-eu-ai-act-compliance-gap-firetail-blog/</loc>
		<lastmod>2026-04-28T11:45:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-unofficial-download-sources-are-still-a-security-risk-in-2026/</loc>
		<lastmod>2026-04-28T11:46:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-role-of-aggregated-liquidity-in-modern-crypto-markets/</loc>
		<lastmod>2026-04-28T11:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/after-mythos-new-playbooks-for-a-zero-window-era/</loc>
		<lastmod>2026-04-28T11:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/maximal-moglicher-schweregrad-microsoft-umgebungen-durch-entra-id-lucke-gefahrdet/</loc>
		<lastmod>2026-04-28T11:49:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-lessons-security-leaders-must-learn-about-ai-and-apis/</loc>
		<lastmod>2026-04-28T12:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/guest-essay-how-augmented-reality-ar-can-turn-building-images-into-ad-space-with-no-control/</loc>
		<lastmod>2026-04-28T12:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-opus-agent-snuffs-out-startups-production-database/</loc>
		<lastmod>2026-04-28T12:45:22+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-linux-firestarter-backdoor-targets-cisco-firepower-devices/</loc>
		<lastmod>2026-04-28T12:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-fixes-entra-id-flaw-enabling-privilege-escalation/</loc>
		<lastmod>2026-04-28T12:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-metrics-killing-your-soc-and-what-to-use-instead/</loc>
		<lastmod>2026-04-28T12:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-state-privacy-fines-reached-3-425-billion-in-2025/</loc>
		<lastmod>2026-04-28T12:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/canadas-first-sms-blaster-case-leads-to-three-arrests/</loc>
		<lastmod>2026-04-28T12:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-tax-audits-and-updates-fuel-silver-fox-malware-campaign/</loc>
		<lastmod>2026-04-28T12:51:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated-rce/</loc>
		<lastmod>2026-04-28T12:52:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palantir-vertrag-lauft-aus-polizei-in-nrw-schreibt-analyse-software-neu-aus/</loc>
		<lastmod>2026-04-28T12:53:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberangriff-trifft-medtronic-datenklau-bei-grosem-medizintechnik-konzern/</loc>
		<lastmod>2026-04-28T12:55:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-bot-left-a-fingerprint-detecting-and-attributing-llm-generated-passwords/</loc>
		<lastmod>2026-04-28T13:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/enterprise-ai-adoption-in-2026-common-pitfalls-risks-and-proven-strategies-for-success/</loc>
		<lastmod>2026-04-28T13:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-resilience-as-capital-planning-quantifying-risk/</loc>
		<lastmod>2026-04-28T13:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-anthropics-mythos-means-for-the-future-of-cybersecurity/</loc>
		<lastmod>2026-04-28T13:46:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bsa-northbound-interface-introduction-of-interface-instance-functions/</loc>
		<lastmod>2026-04-28T13:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cursor-bug-could-turn-routine-git-into-rce/</loc>
		<lastmod>2026-04-28T13:48:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-ransomware-by-design-wiper-by-accident/</loc>
		<lastmod>2026-04-28T13:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybersicherheit-im-fokus-hiscout-auf-dem-niscongress-2026/</loc>
		<lastmod>2026-04-28T13:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/quanten-computing-warum-unternehmen-dem-q-day-nicht-ausgeliefert-sind/</loc>
		<lastmod>2026-04-28T13:51:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-bank-compensates-another-1625-customers-after-alarming-data-breach-2/</loc>
		<lastmod>2026-04-28T13:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-bank-compensates-another-1625-customers-after-alarming-data-breach/</loc>
		<lastmod>2026-04-28T13:52:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lloyds-bank-compensates-another-1625-customers-after-alarming-data-breach-3/</loc>
		<lastmod>2026-04-28T13:52:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-race-is-on-to-keep-ai-agents-from-running-wild-with-your-credit-cards/</loc>
		<lastmod>2026-04-28T13:53:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-an-opsec-playbook-how-threat-actors-evade-detection/</loc>
		<lastmod>2026-04-28T13:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hugging-face-lerobot-flaw-opens-door-to-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-28T13:55:31+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silk-typhoon-hacker-extradited-to-u-s-from-italy/</loc>
		<lastmod>2026-04-28T13:56:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-confirms-security-incident-involving-github-repository-exposure/</loc>
		<lastmod>2026-04-28T13:57:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/</loc>
		<lastmod>2026-04-28T13:58:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-turf-war-as-0apt-and-krybit-groups-trade-blows/</loc>
		<lastmod>2026-04-28T13:59:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-national-extradited-over-silk-typhoon-cyber-campaign/</loc>
		<lastmod>2026-04-28T14:00:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-national-extradited-over-silk-typhoon-cyber-campaign-2/</loc>
		<lastmod>2026-04-28T14:01:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/llm-proxies-vs-mcp-gateways-whats-the-difference/</loc>
		<lastmod>2026-04-28T14:42:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-shadow-ai-to-full-control-firetails-q1-2026-updates-firetail-blog/</loc>
		<lastmod>2026-04-28T14:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fake-captcha-scam-turns-a-quick-click-into-a-costly-phone-bill/</loc>
		<lastmod>2026-04-28T14:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-malware-hides-payloads-in-jpeg-and-txt-files/</loc>
		<lastmod>2026-04-28T14:45:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-drug-companies-in-new-cyber-campaign-2/</loc>
		<lastmod>2026-04-28T14:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-drug-companies-in-new-cyber-campaign/</loc>
		<lastmod>2026-04-28T14:46:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korean-hackers-target-drug-companies-in-new-cyber-campaign-3/</loc>
		<lastmod>2026-04-28T14:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sublime-security-debuts-first-partner-program-to-boost-agentic-email-security-in-the-channel/</loc>
		<lastmod>2026-04-28T14:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-defender-priorities-from-the-talos-year-in-review-2/</loc>
		<lastmod>2026-04-28T14:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/five-defender-priorities-from-the-talos-year-in-review/</loc>
		<lastmod>2026-04-28T14:49:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/verdeckte-netzwerke-warum-die-gemeinsame-warnung-internationaler-cyberbehorden-ein-umdenken-bei-der-geratesicherheit-erfordert/</loc>
		<lastmod>2026-04-28T14:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/databricks-erweitert-agent-bricks/</loc>
		<lastmod>2026-04-28T14:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-vereinfacht-zweigstellen-anbindung-durch-automatisierte-integration-mit-zscaler-internet-access/</loc>
		<lastmod>2026-04-28T14:52:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-deckt-bluenoroff-kampagne-mit-gefalschten-zoom-meetings-auf-2/</loc>
		<lastmod>2026-04-28T14:53:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/arctic-wolf-deckt-bluenoroff-kampagne-mit-gefalschten-zoom-meetings-auf/</loc>
		<lastmod>2026-04-28T14:53:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-i-been-pwned-claims-pitney-bowes-hit-by-8-2m-email-address-leak-2/</loc>
		<lastmod>2026-04-28T14:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-i-been-pwned-claims-pitney-bowes-hit-by-8-2m-email-address-leak/</loc>
		<lastmod>2026-04-28T14:55:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/have-i-been-pwned-claims-pitney-bowes-hit-by-8-2m-email-address-leak-3/</loc>
		<lastmod>2026-04-28T14:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/stablecoins-always-on-money-needs-always-on-controls/</loc>
		<lastmod>2026-04-28T14:55:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation-2/</loc>
		<lastmod>2026-04-28T14:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation/</loc>
		<lastmod>2026-04-28T14:56:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation-3/</loc>
		<lastmod>2026-04-28T14:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/signal-phishing-campaign-targets-german-officials-in-suspected-russian-operation-4/</loc>
		<lastmod>2026-04-28T14:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-find-38-flaws-in-openemr-theyve-been-fixed/</loc>
		<lastmod>2026-04-28T14:57:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-chinese-hacker-extradited-to-us-over-cyberattacks-targeting-covid-19-research/</loc>
		<lastmod>2026-04-28T14:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-to-deprecate-legacy-tls-in-exchange-online-starting-july/</loc>
		<lastmod>2026-04-28T14:59:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/anderungen-an-der-nvd-nist-reagiert-auf-schwachstellen-flut/</loc>
		<lastmod>2026-04-28T15:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-facebook-id-problem-breaking-your-dlp-alerts/</loc>
		<lastmod>2026-04-28T15:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-actor-targets-web3-execs-in-social-engineering-campaign/</loc>
		<lastmod>2026-04-28T15:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/north-korea-linked-actor-targets-web3-execs-in-social-engineering-campaign-2/</loc>
		<lastmod>2026-04-28T15:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ukrainian-police-detain-hackers-suspected-of-stealing-thousands-of-roblox-accounts-for-resale/</loc>
		<lastmod>2026-04-28T15:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/</loc>
		<lastmod>2026-04-28T15:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/</loc>
		<lastmod>2026-04-28T15:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/angriffswelle-uber-n8n-hacker-missbrauchen-automatisierungsplattform/</loc>
		<lastmod>2026-04-28T15:49:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-identity-attack-path-management-durch-ki-immer-wichtiger-wird/</loc>
		<lastmod>2026-04-28T15:50:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warum-identity-attack-path-management-durch-ki-immer-wichtiger-wird-2/</loc>
		<lastmod>2026-04-28T15:50:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-identity-geopolitics-and-data-integrity-define-cyber-resilience/</loc>
		<lastmod>2026-04-28T16:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-detection-deception-engineering-in-the-matrix/</loc>
		<lastmod>2026-04-28T16:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-detection-deception-engineering-in-the-matrix/</loc>
		<lastmod>2026-04-28T16:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-breach-did-not-knock-on-the-front-door/</loc>
		<lastmod>2026-04-28T16:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fundamental-tension-undermines-manufacturers-cybersecurity/</loc>
		<lastmod>2026-04-28T16:46:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fundamental-tension-undermines-manufacturers-cybersecurity-2/</loc>
		<lastmod>2026-04-28T16:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/rep-delia-ramirez-takes-over-as-top-house-cybersecurity-dem/</loc>
		<lastmod>2026-04-28T16:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ddos-testing-checklist-for-cybersecurity-managers-9-questions-to-ask-before-you-test/</loc>
		<lastmod>2026-04-28T16:48:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-supreme-court-appears-split-over-controversial-use-of-geofence-search-warrants/</loc>
		<lastmod>2026-04-28T16:49:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-claims-it-stole-1-4-million-records-from-udemy/</loc>
		<lastmod>2026-04-28T16:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-reportedly-charges-scattered-spider-hacker-arrested-in-finland/</loc>
		<lastmod>2026-04-28T16:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fresh-wave-of-glassworm-vs-code-extensions-slices-through-supply-chain/</loc>
		<lastmod>2026-04-28T16:52:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/medtronic-confirms-data-breach-after-shinyhunters-claims/</loc>
		<lastmod>2026-04-28T16:53:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/offizielles-statement-von-signal-regierungsmitglieder-von-ausspahung-uber-signal-betroffen/</loc>
		<lastmod>2026-04-28T16:55:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-tokenomics-cost-risk-ai-dependency-2026/</loc>
		<lastmod>2026-04-28T17:42:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/video-site-vimeo-blames-security-incident-on-anodot-breach/</loc>
		<lastmod>2026-04-28T17:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-github-shifts-to-metered-ai-billing-amid-cost-crisis-2/</loc>
		<lastmod>2026-04-28T17:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-github-shifts-to-metered-ai-billing-amid-cost-crisis/</loc>
		<lastmod>2026-04-28T17:46:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohnen-zensur-stromausfalle-das-internet-gerat-weltweit-unter-beschuss/</loc>
		<lastmod>2026-04-28T17:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-bail-bond-scams-are-using-ai-to-target-families/</loc>
		<lastmod>2026-04-28T18:43:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-bail-bond-scams-are-using-ai-to-target-families-2/</loc>
		<lastmod>2026-04-28T18:43:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-command-nsa-chief-warns-foreign-adversaries-likely-to-target-midterms/</loc>
		<lastmod>2026-04-28T18:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyber-command-nsa-chief-warns-foreign-adversaries-likely-to-target-midterms-2/</loc>
		<lastmod>2026-04-28T18:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/paragon-is-not-collaborating-with-italian-authorities-probing-spyware-attacks-report-says/</loc>
		<lastmod>2026-04-28T18:45:18+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/pack2theroot-12-year-old-linux-packagekit-flaw-enables-full-compromise/</loc>
		<lastmod>2026-04-28T18:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agent-wipes-startups-data-in-9-second-api-call/</loc>
		<lastmod>2026-04-28T18:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-arrest-10-suspected-members-of-black-axe-cybercrime-gang/</loc>
		<lastmod>2026-04-28T18:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-sharing-a-screenshot-can-get-you-jailed-in-the-uae/</loc>
		<lastmod>2026-04-28T18:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adt-confirms-major-data-breach-exposing-millions-of-names-partial-ssns/</loc>
		<lastmod>2026-04-28T18:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign/</loc>
		<lastmod>2026-04-28T18:51:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/open-is-not-costless-reclaiming-sustainable-infrastructure/</loc>
		<lastmod>2026-04-28T19:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/dont-pay-vect-a-ransom-your-datas-likely-already-wiped-out/</loc>
		<lastmod>2026-04-28T19:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/video-service-vimeo-confirms-anodot-breach-exposed-user-data/</loc>
		<lastmod>2026-04-28T19:45:28+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push/</loc>
		<lastmod>2026-04-28T19:46:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/china-linked-hackers-led-phishing-campaigns-targeting-journalists-and-activists-researchers-say/</loc>
		<lastmod>2026-04-28T20:41:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickup-data-leak-exposes-enterprise-emails-for-over-a-year/</loc>
		<lastmod>2026-04-28T20:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vidar-rises-to-top-of-chaotic-infostealer-market/</loc>
		<lastmod>2026-04-28T20:43:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-flash-talks/</loc>
		<lastmod>2026-04-28T21:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/federal-cio-cautious-on-anthropics-mythos-despite-planned-rollout/</loc>
		<lastmod>2026-04-28T21:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/decoding-q1-2026s-152-9-billion-crypto-custody-concentration/</loc>
		<lastmod>2026-04-28T21:46:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-3854-github-flaw-enables-remote-code-execution/</loc>
		<lastmod>2026-04-28T21:47:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/good-riddance-to-passwords-officials-urge-passkeys-instead/</loc>
		<lastmod>2026-04-28T21:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-are-exploiting-a-critical-litellm-pre-auth-sqli-flaw/</loc>
		<lastmod>2026-04-28T21:49:29+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/feuding-ransomware-groups-leak-each-others-data/</loc>
		<lastmod>2026-04-28T21:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/spy-agency-officials-say-job-loss-anxiety-moving-fast-safely-among-top-challenges-in-ai-workforce-overhaul/</loc>
		<lastmod>2026-04-28T22:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-dhl-phishing-scam-uses-11-step-attack-chain-to-steal-passwords/</loc>
		<lastmod>2026-04-28T22:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/germany-caught-up-in-likely-russian-signal-phishing/</loc>
		<lastmod>2026-04-28T22:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-ai-drives-shift-to-continuous-pen-testing-at-evinova/</loc>
		<lastmod>2026-04-28T22:47:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-network-security-tools-to-use-in-2026/</loc>
		<lastmod>2026-04-28T22:48:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/best-ai-deepfake-and-scam-detection-tools-for-security-in-2026/</loc>
		<lastmod>2026-04-28T22:49:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-intrusion-detection-prevention-systems-in-2026/</loc>
		<lastmod>2026-04-28T22:50:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fido-alliance-wants-to-keep-ai-agents-from-going-rogue-on-online-payments/</loc>
		<lastmod>2026-04-28T22:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/clickup-data-leak-exposes-enterprise-emails-for-over-a-year-2/</loc>
		<lastmod>2026-04-28T22:52:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/broken-vect-2-0-ransomware-acts-as-a-data-wiper-for-large-files/</loc>
		<lastmod>2026-04-28T22:53:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluenoroff-uses-fake-zoom-calls-to-turn-victims-into-attack-lures/</loc>
		<lastmod>2026-04-28T22:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluenoroff-uses-fake-zoom-calls-to-turn-victims-into-attack-lures-2/</loc>
		<lastmod>2026-04-28T22:55:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nsa-chief-during-snowden-affair-shares-regrets-reflections-13-years-later/</loc>
		<lastmod>2026-04-28T22:56:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ot-cybersecurity-frozen-out-by-frontier-labs/</loc>
		<lastmod>2026-04-28T23:42:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-moves-from-theory-to-practice/</loc>
		<lastmod>2026-04-28T23:43:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-moves-from-theory-to-practice-2/</loc>
		<lastmod>2026-04-28T23:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-moves-from-theory-to-practice-3/</loc>
		<lastmod>2026-04-28T23:43:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-bets-up-to-40b-on-anthropic-as-ai-compute-race-grows/</loc>
		<lastmod>2026-04-28T23:45:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-ransomware-actually-destructive-wiper-malware/</loc>
		<lastmod>2026-04-28T23:46:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-data-watchdog-accused-of-dragging-feet-on-evisa-investigation/</loc>
		<lastmod>2026-04-28T23:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/news-brief-ai-woes-continue-for-security-leaders/</loc>
		<lastmod>2026-04-28T23:48:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-model-context-protocol-transport/</loc>
		<lastmod>2026-04-29T03:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-cryptographic-agility-in-model-context-protocol-transport-2/</loc>
		<lastmod>2026-04-29T03:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-long-lived-api-credential-let-an-ai-agent-delete-production-data/</loc>
		<lastmod>2026-04-29T03:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-long-lived-api-credential-let-an-ai-agent-delete-production-data-2/</loc>
		<lastmod>2026-04-29T03:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-a-long-lived-api-credential-let-an-ai-agent-delete-production-data-3/</loc>
		<lastmod>2026-04-29T03:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/more-fake-extensions-linked-to-glassworm-found-in-open-vsx-code-marketplace/</loc>
		<lastmod>2026-04-29T03:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digitale-hygiene-ergo-empfiehlt-routinen-zur-starkung-der-datensicherheit/</loc>
		<lastmod>2026-04-29T03:47:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/schlechte-noten-von-it-entscheidern-zwischenbilanz-zu-einem-jahr-schwarz-rote-digitalpolitik/</loc>
		<lastmod>2026-04-29T03:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-govt-dept-sent-a-document-in-error-now-its-being-used-in-a-370m-contract-lawsuit/</loc>
		<lastmod>2026-04-29T03:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/gopherwhisper-ein-neues-versteck-voller-malware/</loc>
		<lastmod>2026-04-29T03:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/product-showcase-simplex-chat-removes-user-identifiers-from-messaging/</loc>
		<lastmod>2026-04-29T04:42:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluenoroff-kapert-krypto-wallets-per-zoom-meeting/</loc>
		<lastmod>2026-04-29T05:43:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluenoroff-kapert-krypto-wallets-per-zoom-meeting-2/</loc>
		<lastmod>2026-04-29T05:43:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapps-encryption-protects-servers-but-leaves-users-exposed-to-client-side-attacks/</loc>
		<lastmod>2026-04-29T05:44:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/whatsapps-encryption-protects-servers-but-leaves-users-exposed-to-client-side-attacks-2/</loc>
		<lastmod>2026-04-29T05:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-prompt-confidentiality-and-false-citations-worry-researchers/</loc>
		<lastmod>2026-04-29T05:46:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/identity-discovery-the-overlooked-lever-in-strategic-risk-reduction/</loc>
		<lastmod>2026-04-29T05:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-com-and-enterprise-server-vulnerability-allows-remote-code-execution/</loc>
		<lastmod>2026-04-29T05:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2026-19588-cve-2026-34197-nachrichtenbroker-im-kev-katalog-der-cisa-gelandet/</loc>
		<lastmod>2026-04-29T05:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/purple-team/</loc>
		<lastmod>2026-04-29T06:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesotas-cisos-homegrown-talent-securing-finance-insurance-and-beyond/</loc>
		<lastmod>2026-04-29T06:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/minnesotas-cisos-homegrown-talent-securing-finance-insurance-and-beyond-2/</loc>
		<lastmod>2026-04-29T06:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-exchange-online-security-controls-organizations-keep-getting-wrong/</loc>
		<lastmod>2026-04-29T06:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-2-0-raas-expands-attacks-across-windows-linux-and-esxi/</loc>
		<lastmod>2026-04-29T06:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cpanel-releases-emergency-patch-for-critical-authentication-flaw/</loc>
		<lastmod>2026-04-29T06:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cpanel-releases-emergency-patch-for-critical-authentication-flaw-2/</loc>
		<lastmod>2026-04-29T06:48:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-remote-desktop-warning-issue-after-april-update/</loc>
		<lastmod>2026-04-29T06:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-remote-desktop-warning-issue-after-april-update-2/</loc>
		<lastmod>2026-04-29T06:49:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bluenoroff-deploys-fileless-powershell-in-ai-generated-zoom-lure-campaign/</loc>
		<lastmod>2026-04-29T06:50:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/</loc>
		<lastmod>2026-04-29T06:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/264-milliarden-euro-aus-bitcoin-verkauf-vor-gericht-wie-ermittler-an-die-bitcoins-von-kriminellen-kommen/</loc>
		<lastmod>2026-04-29T06:52:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/betting-on-cybercrime-prediction-markets-and-hacking/</loc>
		<lastmod>2026-04-29T07:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tall-tales-chinas-private-contractors-and-the-global-hunt-for-dissent/</loc>
		<lastmod>2026-04-29T07:43:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/30-clawhub-skills-secretly-turn-ai-agents-into-a-crypto-swarm/</loc>
		<lastmod>2026-04-29T07:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fedora-linux-44-ships-with-gnome-50-and-kde-plasma-6-6/</loc>
		<lastmod>2026-04-29T07:45:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-windows-shell-zero-day-exploited-in-attacks/</loc>
		<lastmod>2026-04-29T07:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/agentenbasierte-abwehr-google-cloud-und-wiz-stellen-umfangreiche-ki-funktionen-vor/</loc>
		<lastmod>2026-04-29T07:47:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cert-in-warns-of-ai-driven-cyber-threat-surge-msmes-at-highest-risk/</loc>
		<lastmod>2026-04-29T08:43:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-microsoft-windows-shell-and-connectwise-screenconnect-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-04-29T08:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shinyhunters-exploit-anodot-incident-to-target-vimeo/</loc>
		<lastmod>2026-04-29T08:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slotagent-malware-hides-api-calls-and-strings-to-thwart-analysis-2/</loc>
		<lastmod>2026-04-29T08:47:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slotagent-malware-hides-api-calls-and-strings-to-thwart-analysis/</loc>
		<lastmod>2026-04-29T08:47:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/slotagent-malware-hides-api-calls-and-strings-to-thwart-analysis-3/</loc>
		<lastmod>2026-04-29T08:47:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vimeo-confirms-data-breach-after-hackers-access-user-database/</loc>
		<lastmod>2026-04-29T08:48:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lofystealer-targets-minecraft-players-via-node-js-loader-and-browser-injection/</loc>
		<lastmod>2026-04-29T08:49:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/studie-von-rubrik-zero-labs-zeigt-bedenkliche-defizite-in-der-identity-governance/</loc>
		<lastmod>2026-04-29T08:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/per-git-push-befehl-angreifer-hatten-millionen-von-github-repos-kapern-konnen/</loc>
		<lastmod>2026-04-29T08:51:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isop-disk-special-features/</loc>
		<lastmod>2026-04-29T09:41:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-leans-on-prior-ingenuity-to-face-future-ai-and-quantum-threats/</loc>
		<lastmod>2026-04-29T09:42:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/aws-leans-on-prior-ingenuity-to-face-future-ai-and-quantum-threats-2/</loc>
		<lastmod>2026-04-29T09:43:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-ide-vulnerability-allows-code-execution-via-hidden-git-hooks/</loc>
		<lastmod>2026-04-29T09:44:21+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/top-ai-powered-vendor-risk-management-platforms-for-saas-companies-in-2026/</loc>
		<lastmod>2026-04-29T09:45:24+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-says-backend-change-broke-teams-free-chat-and-calls/</loc>
		<lastmod>2026-04-29T09:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-3/</loc>
		<lastmod>2026-04-29T09:47:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/</loc>
		<lastmod>2026-04-29T09:47:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-2/</loc>
		<lastmod>2026-04-29T09:47:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-4/</loc>
		<lastmod>2026-04-29T09:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev-5/</loc>
		<lastmod>2026-04-29T09:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/das-kpi-paradox-viele-zahlen-wenig-steuerung-funf-security-kpis-die-der-vorstand-wirklich-braucht/</loc>
		<lastmod>2026-04-29T09:49:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/entschlusselung-unmoglich-ransomware-panne-fuhrt-zu-datenverlust/</loc>
		<lastmod>2026-04-29T09:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-and-risk-insights-for-enterprises-kovrr/</loc>
		<lastmod>2026-04-29T10:43:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-and-risk-insights-for-enterprises-kovrr-2/</loc>
		<lastmod>2026-04-29T10:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-and-risk-insights-for-enterprises-kovrr-3/</loc>
		<lastmod>2026-04-29T10:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-governance-and-risk-insights-for-enterprises-kovrr-4/</loc>
		<lastmod>2026-04-29T10:45:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-usage-monitoring-how-to-see-everything-your-employees-are-doing-with-ai-firetail-blog/</loc>
		<lastmod>2026-04-29T10:46:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-tyranny-of-security/</loc>
		<lastmod>2026-04-29T10:47:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-honeypots-turning-the-tables-on-malicious-ai-agents/</loc>
		<lastmod>2026-04-29T10:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-fixes-critical-rce-bug-cve-2026-3854-within-hours-of-discovery/</loc>
		<lastmod>2026-04-29T10:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/godaddy-customer-claims-registrar-transferred-27-year-old-domain-without-any-security-checks/</loc>
		<lastmod>2026-04-29T10:50:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/godaddy-customer-claims-registrar-transferred-27-year-old-domain-without-any-security-checks-2/</loc>
		<lastmod>2026-04-29T10:50:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-2-0-ransomware-wipes-large-files-across-windows-linux-esxi/</loc>
		<lastmod>2026-04-29T10:52:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-quarter-of-healthcare-organizations-report-medical-device-cyber-attacks/</loc>
		<lastmod>2026-04-29T10:52:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/drohende-angriffe-mittels-quantencomputing-vermeiden-gerustet-fur-den-q-day/</loc>
		<lastmod>2026-04-29T10:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/data-privacy-leaks-the-drip-drip-drip-of-exposure/</loc>
		<lastmod>2026-04-29T11:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-iam-for-agentic-ai-the-new-perimeter-of-trust-in-2026/</loc>
		<lastmod>2026-04-29T11:45:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-is-iam-for-agentic-ai-the-new-perimeter-of-trust-in-2026-2/</loc>
		<lastmod>2026-04-29T11:45:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isops-integration-with-nsfocus-devices/</loc>
		<lastmod>2026-04-29T11:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-traditional-iam-is-no-match-for-agentic-ai/</loc>
		<lastmod>2026-04-29T11:47:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/isop-traffic-forensics/</loc>
		<lastmod>2026-04-29T11:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mcp-permission-models-designing-secure-interactions/</loc>
		<lastmod>2026-04-29T11:49:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-a-recent-supply-chain-attack-singled-out-security-firms-checkmarx-and-bitwarden/</loc>
		<lastmod>2026-04-29T11:50:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-microsoft-warn-of-active-exploitation-of-windows-shell-vulnerability-cve-2026-32202/</loc>
		<lastmod>2026-04-29T11:51:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day/</loc>
		<lastmod>2026-04-29T11:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately/</loc>
		<lastmod>2026-04-29T11:53:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-turns-vect-ransomware-into-data-destroying-wiper/</loc>
		<lastmod>2026-04-29T11:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-turns-vect-ransomware-into-data-destroying-wiper-2/</loc>
		<lastmod>2026-04-29T11:55:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-flaw-turns-vect-ransomware-into-data-destroying-wiper-3/</loc>
		<lastmod>2026-04-29T11:55:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/nach-cyberangriff-hacker-erpressen-vimeo-mit-nutzerdaten/</loc>
		<lastmod>2026-04-29T11:56:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reply-stellt-die-jury-der-dritten-ausgabe-des-replyfilm-festivals-vor/</loc>
		<lastmod>2026-04-29T12:50:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/eu-waves-through-open-source-age-check-tool-to-keep-kids-safe-online/</loc>
		<lastmod>2026-04-29T12:51:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-estonian-suspect-arrested-over-alleged-scattered-spider-cyberattacks/</loc>
		<lastmod>2026-04-29T12:52:32+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-extension-flaw-exposes-developer-tokens-to-credential-theft/</loc>
		<lastmod>2026-04-29T12:53:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-coding-agent-vulnerability-lets-attackers-run-code-on-developers-machines/</loc>
		<lastmod>2026-04-29T12:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-coding-agent-vulnerability-lets-attackers-run-code-on-developers-machines-2/</loc>
		<lastmod>2026-04-29T12:55:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-coding-agent-vulnerability-lets-attackers-run-code-on-developers-machines-3/</loc>
		<lastmod>2026-04-29T12:55:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-connectwise-screenconnect-flaw-exploited-in-attacks-2/</loc>
		<lastmod>2026-04-29T12:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-connectwise-screenconnect-flaw-exploited-in-attacks/</loc>
		<lastmod>2026-04-29T12:56:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-warns-of-connectwise-screenconnect-flaw-exploited-in-attacks-3/</loc>
		<lastmod>2026-04-29T12:56:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-charges-suspected-scattered-spider-member-over-cyber-intrusions/</loc>
		<lastmod>2026-04-29T12:57:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong/</loc>
		<lastmod>2026-04-29T12:58:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chance-fur-kleinere-suchmaschinen-und-ki-bots-eu-kommission-google-soll-daten-mit-konkurrenz-teilen/</loc>
		<lastmod>2026-04-29T12:59:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/packagekit-forscher-entdecken-mit-claude-opus-12-jahre-alte-gefahrliche-root-lucke-in-linux/</loc>
		<lastmod>2026-04-29T13:00:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protective-security-in-the-ncsc-caf-a-practical-guide-for-uk-smes-2/</loc>
		<lastmod>2026-04-29T12:45:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/protective-security-in-the-ncsc-caf-a-practical-guide-for-uk-smes/</loc>
		<lastmod>2026-04-29T12:45:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/scam-checking-just-got-a-lot-easier-malwarebytes-is-now-in-claude/</loc>
		<lastmod>2026-04-29T12:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-has-found-271-zero-days-in-firefox/</loc>
		<lastmod>2026-04-29T12:47:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-github-rce-bug-exposed-millions-of-repositories-2/</loc>
		<lastmod>2026-04-29T12:48:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/critical-github-rce-bug-exposed-millions-of-repositories/</loc>
		<lastmod>2026-04-29T12:48:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/alleged-silk-typhoon-hacker-extradited-to-the-united-states-to-face-charges/</loc>
		<lastmod>2026-04-29T12:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reply-stellt-die-jury-der-dritten-ausgabe-des-replyfilm-festivals-vor/</loc>
		<lastmod>2026-04-29T12:50:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sevii-adds-ability-to-dynamically-deploy-ai-agents-to-combat-cyberattacks/</loc>
		<lastmod>2026-04-29T13:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sevii-adds-ability-to-dynamically-deploy-ai-agents-to-combat-cyberattacks-2/</loc>
		<lastmod>2026-04-29T13:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackernoon-why-cloud-monitoring-has-become-k12s-most-critical-cyber-defense-tool/</loc>
		<lastmod>2026-04-29T13:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-powered-legacy-system-transformation-solving-technical-debt-integration-challenges/</loc>
		<lastmod>2026-04-29T13:47:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hybrid-authentication-environments/</loc>
		<lastmod>2026-04-29T13:48:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-real-time-monitoring-protects-cloud-environments-from-threats/</loc>
		<lastmod>2026-04-29T13:49:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/state-cisos-losing-confidence-in-ability-to-manage-cyber-risks/</loc>
		<lastmod>2026-04-29T13:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/risiken-durch-transparenz-uber-die-eigene-angriffsflache-erkennen-und-systematisch-reduzieren/</loc>
		<lastmod>2026-04-29T13:51:34+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vom-jahrlichen-pentest-zum-continuousexposure-management/</loc>
		<lastmod>2026-04-29T13:52:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/woah-a-genuinely-helpful-ai-assisted-bug-report-that-isnt-total-slop-here-wiz-take-this-wad-of-cash/</loc>
		<lastmod>2026-04-29T13:53:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/woah-a-genuinely-helpful-ai-assisted-bug-report-that-isnt-total-slop-here-wiz-take-this-wad-of-cash/</loc>
		<lastmod>2026-04-29T13:53:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-co-founder-mitchell-hashimoto-says-github-no-longer-a-place-for-serious-work-2/</loc>
		<lastmod>2026-04-29T13:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hashicorp-co-founder-mitchell-hashimoto-says-github-no-longer-a-place-for-serious-work/</loc>
		<lastmod>2026-04-29T13:55:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brinker-introduces-a-novel-approach-to-deepfake-detection/</loc>
		<lastmod>2026-04-29T13:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/brinker-introduces-a-novel-approach-to-deepfake-detection-2/</loc>
		<lastmod>2026-04-29T13:56:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/buggy-vect-ransomware-is-effectively-a-data-wiper-researchers-find/</loc>
		<lastmod>2026-04-29T13:57:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/visual-studio-cloud-agents-now-run-inside-github-copilot/</loc>
		<lastmod>2026-04-29T13:58:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/learning-from-the-vercel-breach-shadow-ai-oauth-sprawl/</loc>
		<lastmod>2026-04-29T13:59:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos-2/</loc>
		<lastmod>2026-04-29T14:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos/</loc>
		<lastmod>2026-04-29T14:00:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos-3/</loc>
		<lastmod>2026-04-29T14:00:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-fixes-rce-flaw-that-gave-access-to-millions-of-private-repos-4/</loc>
		<lastmod>2026-04-29T14:00:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lotus-wiper-attack-targeted-venezuelan-energy-firms-utilities/</loc>
		<lastmod>2026-04-29T14:01:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/webinar-how-to-automate-exposure-validation-to-match-the-speed-of-ai-attacks/</loc>
		<lastmod>2026-04-29T14:02:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-track-2-9-billion-compromised-credentials/</loc>
		<lastmod>2026-04-29T14:03:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/von-penetrationstests-zu-ctem-kontinuierliches-risikomanagement-in-der-cybersicherheit/</loc>
		<lastmod>2026-04-29T14:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/miggo-security-leverages-ai-to-apply-virtual-patches-in-near-real-time/</loc>
		<lastmod>2026-04-29T14:45:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-developer-experience-is-the-foundation-of-devsecops-success/</loc>
		<lastmod>2026-04-29T14:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastering-agentic-ai-security-through-exposure-management-2/</loc>
		<lastmod>2026-04-29T14:47:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/mastering-agentic-ai-security-through-exposure-management/</loc>
		<lastmod>2026-04-29T14:47:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-risk-management-cloud-vs-safepaas-what-you-should-evaluate/</loc>
		<lastmod>2026-04-29T14:48:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deploying-safepaas-for-oracle-erp-cloud-a-90day-blueprint-to-strengthen-risk-management/</loc>
		<lastmod>2026-04-29T14:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deploying-safepaas-in-oracle-ebusiness-suite-a-90day-blueprint-to-continuous-independent-control-monitoring-2/</loc>
		<lastmod>2026-04-29T14:50:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deploying-safepaas-in-oracle-ebusiness-suite-a-90day-blueprint-to-continuous-independent-control-monitoring/</loc>
		<lastmod>2026-04-29T14:50:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/swiss-police-arrest-10-suspected-members-of-nigeria-linked-crime-group-black-axe/</loc>
		<lastmod>2026-04-29T14:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sri-lanka-discloses-another-missing-payment-days-after-hackers-stole-2-5m-from-its-finance-ministry/</loc>
		<lastmod>2026-04-29T14:52:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-gesteuerte-bot-angriffe-nehmen-um-das-125-fache-zu/</loc>
		<lastmod>2026-04-29T14:53:33+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberact-was-kmus-jetzt-tun-mussen/</loc>
		<lastmod>2026-04-29T14:56:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberact-was-kmus-jetzt-tun-mussen-2/</loc>
		<lastmod>2026-04-29T14:56:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberact-was-kmus-jetzt-tun-mussen-3/</loc>
		<lastmod>2026-04-29T14:56:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/all-supported-cpanel-versions-hit-by-critical-auth-bug-now-patched/</loc>
		<lastmod>2026-04-29T14:57:35+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/88-of-self-hosted-github-servers-exposed-to-rce-researchers-warn-cve-2026-3854/</loc>
		<lastmod>2026-04-29T14:58:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lazarus-targets-macos-users-with-new-mach-o-man-malware-kit/</loc>
		<lastmod>2026-04-29T14:59:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lotus-wiper-attack-targets-venezuelan-energy-firms-utilities/</loc>
		<lastmod>2026-04-29T15:00:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/malicious-npm-dependency-linked-to-ai-assisted-commit-targets-crypto-wallets/</loc>
		<lastmod>2026-04-29T15:01:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/checkliste-von-zero-networks-5-wichtige-schritte-fur-die-nis-2-compliance/</loc>
		<lastmod>2026-04-29T15:02:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-wont-patch-phantomrpc-feature-or-bug/</loc>
		<lastmod>2026-04-29T15:43:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-risk-to-executives-hrs-role-in-executive-protection/</loc>
		<lastmod>2026-04-29T15:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-risk-to-executives-hrs-role-in-executive-protection-2/</loc>
		<lastmod>2026-04-29T15:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/digital-risk-to-executives-hrs-role-in-executive-protection-3/</loc>
		<lastmod>2026-04-29T15:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-asset-visibility-to-attacker-disruption-why-knowing-what-you-have-isnt-enough/</loc>
		<lastmod>2026-04-29T15:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-censorship-index-reveals-russias-lead-and-widespread-content-blocking/</loc>
		<lastmod>2026-04-29T15:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-censorship-index-reveals-russias-lead-and-widespread-content-blocking-2/</loc>
		<lastmod>2026-04-29T15:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-censorship-index-reveals-russias-lead-and-widespread-content-blocking-3/</loc>
		<lastmod>2026-04-29T15:47:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/internet-censorship-index-reveals-russias-lead-and-widespread-content-blocking-4/</loc>
		<lastmod>2026-04-29T15:47:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/time-to-keep-up-with-ai-driven-attacks-is-narrowing-openai-says/</loc>
		<lastmod>2026-04-29T15:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-police-dismantles-euro50-million-crypto-investment-fraud-ring/</loc>
		<lastmod>2026-04-29T15:49:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-extension-flaw-exposes-developer-api-keys/</loc>
		<lastmod>2026-04-29T15:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-total-recon-how-we-discovered-1000s-of-open-agents-in-the-wild/</loc>
		<lastmod>2026-04-29T16:43:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/capability-deep-dive/</loc>
		<lastmod>2026-04-29T16:45:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/are-your-oracle-erp-controls-failing-silently/</loc>
		<lastmod>2026-04-29T16:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog/</loc>
		<lastmod>2026-04-29T16:47:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog-2/</loc>
		<lastmod>2026-04-29T16:47:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog-3/</loc>
		<lastmod>2026-04-29T16:47:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-commission-accuses-meta-of-breaching-child-safety-rules/</loc>
		<lastmod>2026-04-29T16:48:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-flags-data-theft-bug-in-nsa-built-ot-networking-tool/</loc>
		<lastmod>2026-04-29T16:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-bust-scam-call-centres-behind-euro50-million-in-fraud-losses/</loc>
		<lastmod>2026-04-29T16:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug/</loc>
		<lastmod>2026-04-29T16:51:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/vect-2-0-ransomware-acts-as-wiper-thanks-to-design-error/</loc>
		<lastmod>2026-04-29T16:52:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats-2/</loc>
		<lastmod>2026-04-29T16:53:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats/</loc>
		<lastmod>2026-04-29T16:53:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/it-was-bedeutet-compliance-fur-unternehmen/</loc>
		<lastmod>2026-04-29T16:55:05+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cyberwarfare-in-deutschland-studie-zeigt-wachsende-risiken-durch-ki-gestutzte-angriffe/</loc>
		<lastmod>2026-04-29T16:55:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen/</loc>
		<lastmod>2026-04-29T16:56:53+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen-2/</loc>
		<lastmod>2026-04-29T16:56:54+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen-4/</loc>
		<lastmod>2026-04-29T16:56:57+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen-3/</loc>
		<lastmod>2026-04-29T16:56:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen-5/</loc>
		<lastmod>2026-04-29T16:56:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/airline-app-verkehrsminister-legalisiert-rfid-check-in-beim-fliegen-6/</loc>
		<lastmod>2026-04-29T16:56:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-do-i-fix-crashloopbackoff-in-kubernetes-stepbystep/</loc>
		<lastmod>2026-04-29T17:43:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-mini-shai-hulud-targeting-the-sap-ecosystem-2/</loc>
		<lastmod>2026-04-29T17:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/a-mini-shai-hulud-targeting-the-sap-ecosystem/</loc>
		<lastmod>2026-04-29T17:45:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-ciam-why-legacy-identity-systems-are-dead-and-what-replaces-them-2/</loc>
		<lastmod>2026-04-29T17:46:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-ciam-why-legacy-identity-systems-are-dead-and-what-replaces-them/</loc>
		<lastmod>2026-04-29T17:46:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-future-of-ciam-why-legacy-identity-systems-are-dead-and-what-replaces-them-3/</loc>
		<lastmod>2026-04-29T17:46:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/polymarket-rejects-data-breach-claims-as-hacker-alleges-300k-records-stolen/</loc>
		<lastmod>2026-04-29T17:48:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/europe-gliding-toward-mandatory-online-age-verification/</loc>
		<lastmod>2026-04-29T17:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-npm-packages-compromised-by-mini-shai-hulud-credential-stealing-malware/</loc>
		<lastmod>2026-04-29T17:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/randall-munroes-xkcd-star-formation/</loc>
		<lastmod>2026-04-29T18:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/shai-hulud-strikes-sap-supply-chain-worm-weaponized-claude-code-to-compromise-the-cap-framework/</loc>
		<lastmod>2026-04-29T18:45:00+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/post-quantum-ai-infrastructure-security-protecting-mcp-deployments-in-2026/</loc>
		<lastmod>2026-04-29T18:45:23+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-powered-bluekit-phishing-kit-targets-major-platforms-with-mfa-bypass-attacks-2/</loc>
		<lastmod>2026-04-29T18:46:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-powered-bluekit-phishing-kit-targets-major-platforms-with-mfa-bypass-attacks/</loc>
		<lastmod>2026-04-29T18:46:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-ai-powered-bluekit-phishing-kit-targets-major-platforms-with-mfa-bypass-attacks-3/</loc>
		<lastmod>2026-04-29T18:46:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack/</loc>
		<lastmod>2026-04-29T18:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/why-financial-services-leaders-are-re-evaluating-open-source-for-database-change-management/</loc>
		<lastmod>2026-04-29T19:43:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-army-ranger-to-ethical-hacker-what-cybersecurity-can-learn-from-the-battlefield/</loc>
		<lastmod>2026-04-29T19:45:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/from-army-ranger-to-ethical-hacker-what-cybersecurity-can-learn-from-the-battlefield-2/</loc>
		<lastmod>2026-04-29T19:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/navigating-fedramps-move-to-certification-classes/</loc>
		<lastmod>2026-04-29T19:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsofts-patch-for-a-0-day-exploited-by-russian-spies-fell-short-another-windows-flaw-is-under-attack/</loc>
		<lastmod>2026-04-29T19:47:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/legacy-tls-tour-continues-with-exchange-online-blocking-old-versions-from-july-2026/</loc>
		<lastmod>2026-04-29T19:48:17+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-arrested-for-hijacking-and-selling-610000-roblox-accounts/</loc>
		<lastmod>2026-04-29T19:50:20+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/prompted-2026-your-agent-works-for-me-now/</loc>
		<lastmod>2026-04-29T20:43:15+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/congress-industry-ponder-government-posture-for-protecting-data-centers/</loc>
		<lastmod>2026-04-29T20:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-move-in-the-right-direction-develop-powerful-gps-interference-alarm/</loc>
		<lastmod>2026-04-29T20:45:30+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-biobank-health-data-listed-for-sale-on-alibaba/</loc>
		<lastmod>2026-04-29T20:46:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openai-trades-azure-exclusivity-for-enterprise-reach/</loc>
		<lastmod>2026-04-29T20:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-flaw-enables-remote-code-execution-with-a-single-git-push/</loc>
		<lastmod>2026-04-29T20:48:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-flaw-enables-remote-code-execution-with-a-single-git-push-2/</loc>
		<lastmod>2026-04-29T20:48:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-flaw-enables-remote-code-execution-with-a-single-git-push-3/</loc>
		<lastmod>2026-04-29T20:48:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-abuse-robinhood-signup-process-to-deliver-phishing-emails/</loc>
		<lastmod>2026-04-29T20:49:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-finds-38-security-flaws-in-electronic-health-record-platform/</loc>
		<lastmod>2026-04-29T20:50:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-sees-rising-demand-for-senior-cybersecurity-pros-in-age-of-ai/</loc>
		<lastmod>2026-04-29T21:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/survey-sees-rising-demand-for-senior-cybersecurity-pros-in-age-of-ai-2/</loc>
		<lastmod>2026-04-29T21:45:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-hidden-tax-on-security-how-data-costs-are-eating-your-controls-budget/</loc>
		<lastmod>2026-04-29T21:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sailpoint-ceo-the-tailwind-is-picking-up-on-securing-ai-agents/</loc>
		<lastmod>2026-04-29T21:46:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-china-partner-on-scam-center-takedown-in-dubai/</loc>
		<lastmod>2026-04-29T21:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zounds-a-genuinely-helpful-ai-assisted-bug-report-that-isnt-total-slop-here-wiz-take-this-wad-of-cash/</loc>
		<lastmod>2026-04-29T21:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/zounds-a-genuinely-helpful-ai-assisted-bug-report-that-isnt-total-slop-here-wiz-take-this-wad-of-cash/</loc>
		<lastmod>2026-04-29T21:48:42+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cve-2026-42208-litellm-bug-exploited-36-hours-after-its-disclosure/</loc>
		<lastmod>2026-04-29T21:49:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/us-fda-piloting-use-of-ai-for-real-time-clinical-trials/</loc>
		<lastmod>2026-04-29T21:50:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cpanel-vulnerability-exposes-servers-to-takeover/</loc>
		<lastmod>2026-04-29T21:51:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cryptomining/</loc>
		<lastmod>2026-04-29T21:52:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/reverse-engineering-with-ai-unearths-high-severity-github-bug/</loc>
		<lastmod>2026-04-29T21:53:19+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oracle-plans-to-power-its-new-mexico-mega-datacenter-with-a-2-45gw-fuel-cell-farm/</loc>
		<lastmod>2026-04-29T22:42:43+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cursor-ai-agent-wipes-pocketos-database-and-backups-in-9-seconds/</loc>
		<lastmod>2026-04-29T22:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silverfort-purchases-fabrix-to-bring-ai-to-access-decisions-2/</loc>
		<lastmod>2026-04-29T22:45:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/silverfort-purchases-fabrix-to-bring-ai-to-access-decisions/</loc>
		<lastmod>2026-04-29T22:45:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/fbi-backed-takedown-hits-crypto-scam-centers/</loc>
		<lastmod>2026-04-29T22:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/openais-founding-promise-goes-on-trial/</loc>
		<lastmod>2026-04-29T22:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years/</loc>
		<lastmod>2026-04-29T22:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/house-approves-spy-program-on-second-attempt-senate-fate-murky/</loc>
		<lastmod>2026-04-29T23:41:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/sicherheitsmanagement-der-digitalen-angriffsflache-ganzheitliche-transparenz-und-kontinuierliche-kontrolle/</loc>
		<lastmod>2026-04-29T23:42:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ransomware-hotspot-deutschland-als-top-ziel-fur-erpresser/</loc>
		<lastmod>2026-04-29T23:43:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/visual-studio-code-1-118-adds-auto-model-selection-to-copilot-cli/</loc>
		<lastmod>2026-04-29T23:45:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/official-sap-npm-packages-compromised-to-steal-credentials/</loc>
		<lastmod>2026-04-29T23:46:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/adaptive-security-leadership-in-an-expanding-threat-surface/</loc>
		<lastmod>2026-04-30T03:43:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasadaiqs-q1-insights-how-ai-became-adversary-infrastructure-2/</loc>
		<lastmod>2026-04-30T03:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasadaiqs-q1-insights-how-ai-became-adversary-infrastructure/</loc>
		<lastmod>2026-04-30T03:45:02+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kasadaiqs-q1-insights-how-ai-became-adversary-infrastructure-3/</loc>
		<lastmod>2026-04-30T03:45:03+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-built-a-chatbot-that-only-knows-the-world-before-1931/</loc>
		<lastmod>2026-04-30T03:45:25+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/researchers-unearth-industrial-sabotage-malware-that-predated-stuxnet-by-5-years/</loc>
		<lastmod>2026-04-30T03:46:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/smashing-security-podcast-465-this-developer-wanted-to-cheat-at-roblox-it-cost-millions/</loc>
		<lastmod>2026-04-30T03:47:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-cryptographic-code-flaw-offers-fast-route-to-root/</loc>
		<lastmod>2026-04-30T03:48:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-confirms-windows-flaw-is-being-exploited-after-incomplete-patch/</loc>
		<lastmod>2026-04-30T03:49:10+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/claude-mythos-fears-startle-japans-financial-services-sector/</loc>
		<lastmod>2026-04-30T03:50:06+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/coming-soon-ai-scan-openclaw-ecosystem-security-scanning-capabilities/</loc>
		<lastmod>2026-04-30T04:42:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/versa-vereinfacht-zweigstellen-anbindung-durch-automatisierte-integration-mit-zscaler-internet-access-2/</loc>
		<lastmod>2026-04-30T05:42:44+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/bad-bots-make-up-40-of-internet-traffic/</loc>
		<lastmod>2026-04-30T05:43:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-open-sources-its-ai-terminal-client-4/</loc>
		<lastmod>2026-04-30T05:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-open-sources-its-ai-terminal-client/</loc>
		<lastmod>2026-04-30T05:45:36+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-open-sources-its-ai-terminal-client-2/</loc>
		<lastmod>2026-04-30T05:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-open-sources-its-ai-terminal-client-3/</loc>
		<lastmod>2026-04-30T05:45:37+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/warp-open-sources-its-ai-terminal-client-5/</loc>
		<lastmod>2026-04-30T05:45:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/proftpd-sql-injection-flaw-opens-door-to-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-30T05:46:12+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/linux-kernel-0-day-copy-fail-grants-root-access-across-major-distros-since-2017/</loc>
		<lastmod>2026-04-30T05:47:07+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/euvd-2026-24742-cve-2026-41651-telekom-entdeckt-12-jahre-alte-linux-root-schwachstelle/</loc>
		<lastmod>2026-04-30T05:48:08+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 6e26cd9f4ee02526ff4c9238b56dbacc; Queries for sitemap: 3; Total queries: 88; Seconds: 4.64; Memory for sitemap: 1KB; Total memory: 86MB -->
