<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://www.sternit.de/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='21. May 2026 22:53 pm' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://www.sternit.de/ransomware-trends-2026-weniger-gruppen-schnellere-angriffe-grosere-auswirkungen/</loc>
		<lastmod>2026-05-21T15:06:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisco-fixed-maximum-severity-flaw-cve-2026-20223-in-secure-workload/</loc>
		<lastmod>2026-05-21T15:07:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/oauth-token-als-einfallstor-was-der-vercel-angriff-uber-moderne-identitatsrisiken-lehrt/</loc>
		<lastmod>2026-05-21T15:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-cybersecurity-education-and-the-defense-of-americas-digital-border/</loc>
		<lastmod>2026-05-21T15:09:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/authorities-dismantle-first-vpn-used-by-ransomware-actors/</loc>
		<lastmod>2026-05-21T15:10:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-grafana-labs-breaches-traced-back-to-tanstack-supply-chain-compromise/</loc>
		<lastmod>2026-05-21T15:11:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-disrupts-malware-signing-service-used-by-ransomware-gangs-2/</loc>
		<lastmod>2026-05-21T15:12:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/inside-a-crypto-drainer-how-to-spot-it-before-it-empties-your-wallet/</loc>
		<lastmod>2026-05-21T15:13:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-hackers-target-telcos-with-new-linux-windows-malware/</loc>
		<lastmod>2026-05-21T15:14:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/max-severity-cisco-secure-workload-flaw-gives-site-admin-privileges/</loc>
		<lastmod>2026-05-21T15:16:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/chinese-apts-share-linux-backdoor-in-central-asia-telco-attacks/</loc>
		<lastmod>2026-05-21T15:18:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/kommunikationsstandard-matrix-digitale-souveranitat-braucht-offene-standards-und-vernetzung/</loc>
		<lastmod>2026-05-21T15:18:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ki-generierte-bug-reports-verstopfen-security-mailing-liste/</loc>
		<lastmod>2026-05-21T15:20:14+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-application-developer-gesucht-schau-dir-unsere-top-jobs-an/</loc>
		<lastmod>2026-05-21T15:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/neuer-job-als-application-developer-gesucht-schau-dir-unsere-top-jobs-an-2/</loc>
		<lastmod>2026-05-21T15:21:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/grafana-labs-links-github-environment-breach-to-tanstack-npm-supply-chain-attack/</loc>
		<lastmod>2026-05-21T16:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-one-experts-warn/</loc>
		<lastmod>2026-05-21T16:06:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-one-experts-warn-3/</loc>
		<lastmod>2026-05-21T16:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-one-experts-warn-2/</loc>
		<lastmod>2026-05-21T16:06:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/uk-plans-for-cybercrime-law-reform-would-protect-almost-no-one-experts-warn-4/</loc>
		<lastmod>2026-05-21T16:06:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/attackers-are-bypassing-mfa-on-sonicwall-vpns-because-something-was-wrong-with-previous-fix/</loc>
		<lastmod>2026-05-21T16:08:01+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/showboat-linux-malware-hits-middle-east-telecom-with-socks5-proxy-backdoor/</loc>
		<lastmod>2026-05-21T16:08:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocked-over-11-billion-in-app-store-fraud-in-6-years/</loc>
		<lastmod>2026-05-21T16:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/jfrog-report-2026-ki-governance-hinkt-hinterher-angriffe-auf-software-lieferketten-explodieren/</loc>
		<lastmod>2026-05-21T16:11:04+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/modulare-malware-macht-tech-support-scams-besonders-gefahrlich/</loc>
		<lastmod>2026-05-21T16:11:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cybercriminal-vpn-dismantled-in-europol-crackdown/</loc>
		<lastmod>2026-05-21T16:12:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/github-breach-traced-to-malicious-nx-console-vs-code-extension/</loc>
		<lastmod>2026-05-21T16:14:13+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/windows-privilege-escalation-bypass-uac/</loc>
		<lastmod>2026-05-21T16:14:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-asks-cybersecurity-community-to-alert-it-to-vulnerability-exploitation/</loc>
		<lastmod>2026-05-21T17:03:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/european-authorities-take-down-prolific-cybercrime-vpn-service/</loc>
		<lastmod>2026-05-21T17:04:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/deleted-google-api-keys-remain-active-up-to-23-minutes-study-finds/</loc>
		<lastmod>2026-05-21T17:06:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cryptohack-roundup-us-extradition-of-accused-in-340m-scam/</loc>
		<lastmod>2026-05-21T17:07:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/2026-verizon-dbir-the-new-era-of-cyber-threats/</loc>
		<lastmod>2026-05-21T17:08:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/microsoft-open-sources-tools-for-designing-and-testing-ai-agents/</loc>
		<lastmod>2026-05-21T17:09:45+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ai-agents-are-shifting-identity-security-budget-dynamics/</loc>
		<lastmod>2026-05-21T17:11:11+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emproof-erweitert-fuhrungsteam-daniel-willms-wird-director-growth/</loc>
		<lastmod>2026-05-21T17:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/emproof-erweitert-fuhrungsteam-daniel-willms-wird-director-growth-2/</loc>
		<lastmod>2026-05-21T17:12:39+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/hacking-cyberdeck-community-soll-helfen-den-flipper-one-zu-verwirklichen/</loc>
		<lastmod>2026-05-21T17:12:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/cisa-chief-frets-about-open-source-vulnerabilities-delayed-security-improvements/</loc>
		<lastmod>2026-05-21T18:03:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/defenders-fall-behind-as-ai-rewrites-the-rules-of-a-data-breach/</loc>
		<lastmod>2026-05-21T18:04:55+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-attack-surface-management-software-in-2026-2/</loc>
		<lastmod>2026-05-21T18:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-attack-surface-management-software-in-2026/</loc>
		<lastmod>2026-05-21T18:07:40+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/7-best-attack-surface-management-software-in-2026-3/</loc>
		<lastmod>2026-05-21T18:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/6-best-vulnerability-management-software-systems-for-2026/</loc>
		<lastmod>2026-05-21T18:07:58+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/palo-alto-networks-execs-platformization-is-the-key-in-frontier-ai-shift/</loc>
		<lastmod>2026-05-21T19:03:59+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/two-americans-plead-guilty-to-assisting-india-based-tech-support-scam-centers/</loc>
		<lastmod>2026-05-21T19:04:46+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/the-art-of-being-ungovernable/</loc>
		<lastmod>2026-05-21T19:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/global-law-enforcement-operation-takes-first-vpn-offline/</loc>
		<lastmod>2026-05-21T19:08:09+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/apple-blocks-over-2-million-apps-in-2025-fraud-crackdown/</loc>
		<lastmod>2026-05-21T19:08:50+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-accidentally-exposed-details-of-unfixed-chromium-flaw/</loc>
		<lastmod>2026-05-21T19:10:16+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/tech-giants-promise-british-regulator-they-will-tweak-platforms-to-protect-kids-online/</loc>
		<lastmod>2026-05-21T20:03:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/trump-postpones-executive-order-focused-on-ai-security/</loc>
		<lastmod>2026-05-21T20:04:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/law-enforcement-shuts-down-vpn-service-used-by-two-dozen-ransomware-gangs/</loc>
		<lastmod>2026-05-21T20:05:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/ondemand-what-we-got-wrong-about-ai-in-the-public-sector/</loc>
		<lastmod>2026-05-21T20:08:26+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/police-op-targets-vpn-service-favoured-by-ransomware-gangs/</loc>
		<lastmod>2026-05-21T20:08:48+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/lawmakers-from-both-parties-say-cisa-cuts-have-gone-too-far/</loc>
		<lastmod>2026-05-21T21:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/integrity-or-innovation-mixed-signals-in-trumps-exec-orders/</loc>
		<lastmod>2026-05-21T21:04:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/google-api-keys-remain-active-after-deletion/</loc>
		<lastmod>2026-05-21T21:06:38+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creepy-listening-tool-for-targeted-ads-didnt-actually-work-ftc-says/</loc>
		<lastmod>2026-05-21T22:07:41+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/creepy-listening-tool-for-targeted-ads-didnt-actually-work-ftc-says-2/</loc>
		<lastmod>2026-05-21T22:07:56+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/how-cisos-should-prep-for-agentic-ready-ai-boms/</loc>
		<lastmod>2026-05-21T22:08:47+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/u-s-cisa-adds-microsoft-and-adobe-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc>
		<lastmod>2026-05-21T22:03:51+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/new-jamf-ceo-sees-ai-advances-as-apple-security-driver/</loc>
		<lastmod>2026-05-21T22:04:52+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.sternit.de/breach-roundup-shai-hulud-copycat-hits-npm/</loc>
		<lastmod>2026-05-21T22:05:49+00:00</lastmod>
		<changefreq>hourly</changefreq>
		<priority>1.0</priority>
	</url>
</urlset><!-- Request ID: 4ce5d3986c5a3f303a76312917440ae9; Queries for sitemap: 3; Total queries: 89; Seconds: 5.3; Memory for sitemap: 1KB; Total memory: 70MB -->
