<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.zerowl.io</loc>
<lastmod>2026-04-03T18:51:34.347Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-emergency-update-to-fix-installation-loop-issues</loc>
<lastmod>2026-04-03T02:43:41.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action</loc>
<lastmod>2026-04-03T02:43:15.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/venom-stealer-maas-platform-commoditizes-clickfix-attacks</loc>
<lastmod>2026-04-03T02:42:43.689Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories</loc>
<lastmod>2026-04-03T02:42:03.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-state-of-trusted-open-source-report</loc>
<lastmod>2026-04-03T02:41:27.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-forgotten-endpoint-security-risks-of-dormant-devices</loc>
<lastmod>2026-04-03T02:41:14.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-hackers-using-remote-access-toolkit-ctrl-for-rdp-hijacking</loc>
<lastmod>2026-04-03T02:38:29.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners</loc>
<lastmod>2026-04-03T02:37:57.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomware-will-hit-hospitals-rehearsals-are-key-to-defense</loc>
<lastmod>2026-04-03T02:37:27.468Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/public-poc-exploit-released-for-nginx-ui-backup-restore-vulnerability</loc>
<lastmod>2026-04-03T02:37:26.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/png-vulnerabilities-allow-attackers-to-trigger-process-crashes-leak-sensitive-information</loc>
<lastmod>2026-04-03T02:37:20.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/novoice-campaign-on-google-play-puts-millions-of-android-users-at-risk</loc>
<lastmod>2026-04-03T02:36:20.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-chrome-zero-day-vulnerability-actively-exploited-in-attacks-patch-now</loc>
<lastmod>2026-04-03T02:34:34.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass</loc>
<lastmod>2026-04-03T02:33:57.505Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-remove-exif-data-from-images-shared-on-teams</loc>
<lastmod>2026-04-03T02:33:53.549Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leslie-nielsen-on-ai-agents-human-risks-and-the-concept-of-shadow-ai</loc>
<lastmod>2026-04-03T02:32:34.674Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/latams-self-taught-cyber-talent-overlooked-amid-cyberattack-glut</loc>
<lastmod>2026-04-03T02:32:13.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/immutable-backups-matter-even-more-in-the-ai-era</loc>
<lastmod>2026-04-03T02:31:25.074Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hsbc-india-asks-customers-to-use-all-uppercase-passwords</loc>
<lastmod>2026-04-03T02:31:15.539Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-interpol-and-fortinet-are-scaling-global-cybercrime-ops</loc>
<lastmod>2026-04-03T02:31:06.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-ai-is-transforming-the-balance-in-modern-cyber-threat-detection</loc>
<lastmod>2026-04-03T02:30:49.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-weaponize-docx-rtf-javascript-and-python-in-boeing-rfq-attack</loc>
<lastmod>2026-04-03T02:30:29.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-etherrat-and-etherhiding-to-hide-malware-infrastructure-on-ethereum</loc>
<lastmod>2026-04-03T02:30:05.948Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-push-crystalx-malware-as-a-service-through-telegram-with-stealer-and-rat-features</loc>
<lastmod>2026-04-03T02:29:41.195Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-hijack-hotel-booking-workflows-to-scam-guests-with-fake-payment-requests</loc>
<lastmod>2026-04-03T02:29:32.257Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-backdoor-telnyx-python-sdk-on-pypi-to-steal-credentials-across-windows-macos-and-linux</loc>
<lastmod>2026-04-03T02:28:36.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploiting-critical-weblogic-rce-vulnerabilities-in-attacks</loc>
<lastmod>2026-04-03T02:28:19.563Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/greg-clark-discusses-securing-ai-agency-and-safeguarding-machine-identities</loc>
<lastmod>2026-04-03T02:28:03.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/googles-vertex-ai-is-over-privileged-thats-a-problem</loc>
<lastmod>2026-04-03T02:28:02.806Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/geopolitics-ai-and-cybersecurity-insights-from-rsac-2026</loc>
<lastmod>2026-04-03T02:26:28.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyberattacks-intensify-pressure-on-latin-american-governments</loc>
<lastmod>2026-04-03T02:23:29.033Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-source-code-and-data-leak-allegedly-claimed-by-shinyhunters</loc>
<lastmod>2026-04-03T02:21:21.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-on-chrome-zero-day-exploit-actively-used-in-attacks</loc>
<lastmod>2026-04-03T02:20:42.695Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails</loc>
<lastmod>2026-04-03T02:19:30.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures</loc>
<lastmod>2026-04-03T02:19:26.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/block-the-prompt-not-the-work-the-end-of-doctor-no</loc>
<lastmod>2026-04-03T02:18:57.965Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bank-trojan-casbaneiro-worms-through-latin-america</loc>
<lastmod>2026-04-03T02:18:48.535Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/are-we-training-ai-too-late</loc>
<lastmod>2026-04-03T02:18:23.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-expands-ios-1877-update-to-more-devices-to-block-darksword-exploit</loc>
<lastmod>2026-04-03T02:17:58.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-should-make-analysts-better-not-replace-them</loc>
<lastmod>2026-04-03T02:17:47.404Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-redefining-software-supply-chain-security</loc>
<lastmod>2026-04-03T02:17:17.621Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-eliminating-the-window-to-respond-to-cyberattacks</loc>
<lastmod>2026-04-03T02:17:11.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-has-forced-a-rethink-of-data-security</loc>
<lastmod>2026-04-03T02:16:49.457Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-bots-are-breaking-the-old-ways-of-finding-bots</loc>
<lastmod>2026-04-03T02:16:40.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-agents-are-making-identity-security-happen-in-real-time</loc>
<lastmod>2026-04-03T02:16:39.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/companies-are-adopting-ai-faster-than-they-can-put-in-place-security-measures</loc>
<lastmod>2026-04-03T02:16:36.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-reasons-why-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming</loc>
<lastmod>2026-04-03T02:16:07.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/xloader-malware-upgrades-obfuscation-tactics-and-hides-c2-traffic-behind-decoy-servers</loc>
<lastmod>2026-04-03T02:43:46.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-emergency-update-fixes-installation-loop-issue</loc>
<lastmod>2026-04-03T02:43:38.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-entities</loc>
<lastmod>2026-04-03T02:42:30.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
<lastmod>2026-04-03T02:39:19.575Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-npm-supply-chain-attack-uses-undicy-http-to-deploy-screen-streaming-rat-and-browser-injector</loc>
<lastmod>2026-04-03T02:35:40.888Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mercor-ai-confirms-data-breach-following-lapsus-claims-of-4tb-data-theft</loc>
<lastmod>2026-04-03T02:33:14.793Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-telnyx-python-package-on-pypi-targets-developer-credentials</loc>
<lastmod>2026-04-03T02:32:55.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-now-allows-you-to-change-your-gmailcom-address-in-a-few-simple-steps</loc>
<lastmod>2026-04-03T02:27:48.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-cloud-vertex-ai-vulnerability-exposes-sensitive-data-to-attackers</loc>
<lastmod>2026-04-03T02:27:31.401Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/emerging-homoglyph-techniques-let-attackers-spoof-legitimate-websites</loc>
<lastmod>2026-04-03T02:24:14.814Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crewai-vulnerabilities-allow-attackers-to-bypass-sandboxes-and-compromise-systems</loc>
<lastmod>2026-04-03T02:22:38.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-says-that-the-claude-code-source-was-leaked-because-of-a-mistake-in-npm-packaging</loc>
<lastmod>2026-04-03T02:21:50.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-attacks-are-aimed-at-serious-flaws-in-weblogic-remote-code-execution</loc>
<lastmod>2026-04-03T02:16:28.557Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-telegram-based-resokerrat-which-has-screenshot-and-persistence-features</loc>
<lastmod>2026-04-03T02:28:45.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-breaches-cloud-saas-instances-with-stolen-credentials</loc>
<lastmod>2026-04-03T02:40:13.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/googles-vertex-ai-has-an-over-privileged-problem</loc>
<lastmod>2026-04-03T02:28:02.035Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/precision-attack-compromises-axios-npm-package</loc>
<lastmod>2026-04-03T02:18:30.511Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/android-developer-verification-rollout-starts-before-september-enforcement</loc>
<lastmod>2026-04-03T02:17:54.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks</loc>
<lastmod>2026-04-03T02:42:33.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-future-of-application-security-ai-bots-apis-identity-explained</loc>
<lastmod>2026-04-03T02:41:19.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rethinking-vulnerability-management-strategies-for-mid-market-security</loc>
<lastmod>2026-04-03T02:37:57.957Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-anyrun-macos-sandbox-helps-soc-teams-analyze-apple-threats-faster</loc>
<lastmod>2026-04-03T02:34:17.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-deploys-pseudo-ransomware-revives-pay2key-operations</loc>
<lastmod>2026-04-03T02:31:30.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-systems-are-redefining-the-enterprise-attack-surface</loc>
<lastmod>2026-04-03T02:17:48.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-resetting-the-threat-curve-for-phishing-attacks</loc>
<lastmod>2026-04-03T02:17:19.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-changing-how-much-cyberattacks-cost</loc>
<lastmod>2026-04-03T02:17:05.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-rise-of-ai-driven-code-is-making-people-rethink-appsec</loc>
<lastmod>2026-04-03T02:16:42.740Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-and-quantum-are-making-us-rethink-how-we-trust-digital-things</loc>
<lastmod>2026-04-03T02:16:39.645Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zero-day-alert-claude-ai-finds-critical-rce-bugs-in-vim-and-emacs</loc>
<lastmod>2026-04-03T02:43:49.198Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wordpress-plugin-vulnerability-exposes-sensitive-data-from-800000-sites</loc>
<lastmod>2026-04-03T02:43:43.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts</loc>
<lastmod>2026-04-03T02:42:44.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority</loc>
<lastmod>2026-04-03T02:41:08.919Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains</loc>
<lastmod>2026-04-03T02:38:49.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/png-vulnerabilities-allow-attackers-to-crash-systems-and-leak-sensitive-data</loc>
<lastmod>2026-04-03T02:37:12.899Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-unveils-ransomware-detection-and-file-recovery-for-google-drive</loc>
<lastmod>2026-04-03T02:27:59.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eviltokens-is-a-new-phishing-as-a-service-platform-that-lets-people-take-over-microsoft-accounts</loc>
<lastmod>2026-04-03T02:24:36.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-supply-chain-attack-hits-axios-npm-packages</loc>
<lastmod>2026-04-03T02:18:37.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dutch-ministry-of-finance-takes-systems-offline-following-cyberattack</loc>
<lastmod>2026-04-03T02:24:12.686Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-abuse-irs-and-tax-filing-lures-to-push-malware-in-new-campaigns</loc>
<lastmod>2026-04-03T02:23:31.593Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-citrix-netscaler-vulnerability-actively-exploited-in-attacks</loc>
<lastmod>2026-04-03T02:20:56.377Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chatgpt-vulnerability-let-attackers-silently-exfiltrate-user-prompts-and-other-sensitive-data</loc>
<lastmod>2026-04-03T02:19:41.589Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/carecloud-data-breach-hackers-accessed-it-infrastructure-and-stole-patient-data</loc>
<lastmod>2026-04-03T02:19:18.834Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apples-new-macos-tahoe-feature-warns-users-about-clickfix-attacks</loc>
<lastmod>2026-04-03T02:18:00.722Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/it-looks-like-the-claude-code-source-code-from-anthropic-was-leaked-through-their-npm-registry</loc>
<lastmod>2026-04-03T02:17:55.197Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-v893-released-addressing-curl-security-vulnerability-and-crash-issues</loc>
<lastmod>2026-04-03T02:36:14.358Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-deepload-malware-uses-clickfix-and-ai-generated-evasion-to-breach-enterprise-networks</loc>
<lastmod>2026-04-03T02:35:12.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-deploy-roadk1ll-pivoting-malware-to-turn-compromised-hosts-into-network-relays</loc>
<lastmod>2026-04-03T02:28:39.943Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-ai-discovers-zero-day-rce-vulnerabilities-in-vim-and-emacs</loc>
<lastmod>2026-04-03T02:21:47.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chatgpt-vulnerability-allows-silent-exfiltration-of-user-prompts-and-sensitive-data</loc>
<lastmod>2026-04-03T02:19:39.719Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/carecloud-data-breach-hackers-access-it-systems-steal-patient-data</loc>
<lastmod>2026-04-03T02:19:20.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/axios-npm-packages-hacked-to-add-bad-code-in-an-ongoing-supply-chain-attack</loc>
<lastmod>2026-04-03T02:18:43.888Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apples-macos-tahoe-adds-protection-against-clickfix-attacks</loc>
<lastmod>2026-04-03T02:18:02.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-notepad-v893-update-fixes-bugs-that-cause-crashes-and-curl-vulnerabilities</loc>
<lastmod>2026-04-03T02:36:15.174Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/axios-supply-chain-attack-sends-cross-platform-rat-through-hacked-npm-account</loc>
<lastmod>2026-04-03T02:18:44.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-it-worker-is-said-to-have-used-a-stolen-identity-and-an-ai-resume-to-trick-people-into-</loc>
<lastmod>2026-04-03T02:36:13.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/exposed-server-shows-thegentlemen-ransomware-toolkit-victim-credentials-and-ngrok-tokens</loc>
<lastmod>2026-04-03T02:24:48.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crysome-rat-is-a-new-type-of-net-malware-that-can-kill-av-and-hvnc</loc>
<lastmod>2026-04-03T02:23:17.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-new-clickfix-variant-uses-rundll32-and-webdav-to-get-around-powershell-detection</loc>
<lastmod>2026-04-03T02:34:48.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/deepload-malware-that-uses-ai-steals-credentials-and-hides-from-detection</loc>
<lastmod>2026-04-03T02:17:24.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-supply-chain-attack-allegedly-compromised-databricks-platform</loc>
<lastmod>2026-04-03T02:40:52.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/storm-brews-over-critical-no-click-telegram-flaw</loc>
<lastmod>2026-04-03T02:39:02.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/manufacturing-and-healthcare-both-have-problems-with-passwords</loc>
<lastmod>2026-04-03T02:33:06.012Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/f5-big-ip-vulnerability-changed-to-rce-and-being-used</loc>
<lastmod>2026-04-03T02:24:52.682Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vim-vulnerability-let-attackers-execute-arbitrary-command-via-weaponized-files</loc>
<lastmod>2026-04-03T02:42:53.114Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ta446-hackers-deploying-darksword-exploit-kit-to-attack-ios-users</loc>
<lastmod>2026-04-03T02:39:30.990Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability</loc>
<lastmod>2026-04-03T02:36:51.521Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/open-vsxs-new-scanner-vulnerability-allows-malicious-extension-goes-live</loc>
<lastmod>2026-04-03T02:36:47.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-homoglyph-attack-techniques-help-cybercriminals-spoof-trusted-domains</loc>
<lastmod>2026-04-03T02:35:17.893Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-break-into-the-telnyx-python-sdk-on-pypi-to-steal-cloud-and-developer-credentials</loc>
<lastmod>2026-04-03T02:28:29.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uses-of-deepload-malware-stealing-browser-credentials-with-clickfix-and-wmi-persistence</loc>
<lastmod>2026-04-03T02:23:47.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vim-vulnerability-allows-arbitrary-command-execution-via-malicious-files</loc>
<lastmod>2026-04-03T02:42:52.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stored-xss-bug-in-jira-work-management-could-lead-to-full-organization-takeover</loc>
<lastmod>2026-04-03T02:38:55.594Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-ctrl-rat-linked-to-russian-hackers-enables-rdp-hijacking-attacks</loc>
<lastmod>2026-04-03T02:35:05.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/india-to-ban-hikvision-tp-link-and-cctv-product-sales-starting-april</loc>
<lastmod>2026-04-03T02:31:28.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/canisterworm-malware-attacking-dockerk8sredis-to-gain-access-and-steal-secrets</loc>
<lastmod>2026-04-03T02:19:13.220Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blankgrabber-stealer-uses-fake-certificate-loader-to-hide-malware-delivery-chain</loc>
<lastmod>2026-04-03T02:18:57.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-roundup-telecom-sleeper-cells-llm-jailbreaks-apple-makes-uk-age-checks-mandatory-and-more</loc>
<lastmod>2026-04-03T02:16:19.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-soc-process-fixes-that-boost-tier-1-productivity</loc>
<lastmod>2026-04-03T02:16:10.210Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-framework-signals-ai-assisted-malware-is-no-longer-experimental</loc>
<lastmod>2026-04-03T02:42:55.606Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos</loc>
<lastmod>2026-04-03T02:41:23.803Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-prompt-poaching-attack-steals-users-ai-conversations-via-malicious-browser-extensions</loc>
<lastmod>2026-04-03T02:35:41.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-canisterworm-malware-hits-docker-k8s-redis-environments</loc>
<lastmod>2026-04-03T02:34:27.088Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/india-set-to-ban-sale-of-hikvision-tp-link-cctv-products-from-april</loc>
<lastmod>2026-04-03T02:31:26.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/espionage-campaign-targets-southeast-asian-government-with-usb-malware</loc>
<lastmod>2026-04-03T02:24:21.598Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-n8n-vulnerability-let-attackers-achieve-remote-code-execution</loc>
<lastmod>2026-04-03T02:23:01.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-grafana-vulnerabilities-allow-attackers-to-execute-code-remotely</loc>
<lastmod>2026-04-03T02:22:57.726Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacks-used-a-serious-fortinet-forticlient-ems-vulnerability</loc>
<lastmod>2026-04-03T02:22:56.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-malware-framework-shows-that-ai-assisted-malware-is-not-experimental-anymore</loc>
<lastmod>2026-04-03T02:42:58.239Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stored-xss-flaw-in-jira-work-management-could-enable-full-org-compromise</loc>
<lastmod>2026-04-03T02:39:01.498Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels</loc>
<lastmod>2026-04-03T02:38:13.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-zip-files-deliver-pxa-stealer-to-financial-sector-targets</loc>
<lastmod>2026-04-03T02:37:09.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-important-updates-for-winre-and-setup-before-the-2026-secure-boot-certificate-exp</loc>
<lastmod>2026-04-03T02:33:37.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-are-looking-for-flaws-in-citrix-netscaler-systems-before-they-think-they-can-use-cve-2026-30</loc>
<lastmod>2026-04-03T02:29:58.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign</loc>
<lastmod>2026-04-03T02:42:06.350Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/10-best-spam-filter-tools-2026</loc>
<lastmod>2026-04-03T02:16:05.277Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-10-best-log-monitoring-tools-for-2026</loc>
<lastmod>2026-04-03T02:16:01.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-10-best-tools-for-finding-fraud-in-2026</loc>
<lastmod>2026-04-03T02:15:47.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leak-bazaar-puts-stolen-business-data-into-a-profitable-market</loc>
<lastmod>2026-04-03T02:32:13.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-are-looking-into-citrix-netscaler-instances-in-advance-of-what-is-likely-to-be-cve-2026-3055</loc>
<lastmod>2026-04-03T02:29:40.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/by-default-windows-11-and-server-2025-update-will-block-cross-signed-kernel-drivers-that-are-not-tru</loc>
<lastmod>2026-04-03T02:43:32.821Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-with-ties-to-iran-break-into-the-fbi-directors-personal-email-and-hit-stryker-with-a-wiper-a</loc>
<lastmod>2026-04-03T02:31:32.890Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-vulnerability-in-aquasecurity-trivy-scanner-to-kev-catalog</loc>
<lastmod>2026-04-03T02:20:27.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-prompt-poaching-attack-lets-bad-browser-extensions-steal-ai-chats</loc>
<lastmod>2026-04-03T02:32:54.383Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-certificate-loader-hides-blankgrabber-malware-chain</loc>
<lastmod>2026-04-03T02:25:28.785Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/citrix-netscaler-is-currently-being-looked-at-for-cve-2026-3055-cvss-93-bug-that-reads-too-much-memo</loc>
<lastmod>2026-04-03T02:21:33.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ta446-deploys-leaked-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
<lastmod>2026-04-03T02:39:25.133Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/open-vsx-vulnerability-lets-malicious-extension-go-live</loc>
<lastmod>2026-04-03T02:36:41.605Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/european-commission-says-there-was-a-cyberattack-after-aws-account-was-hacked</loc>
<lastmod>2026-04-03T02:24:30.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-cve-2025-53521-to-the-list-of-known-vulnerabilities-kev-after-using-active-f5-big-ip-apm</loc>
<lastmod>2026-04-03T02:20:34.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-silver-fox-campaign-uses-tax-related-phishing-scams-to-target-japanese-businesses</loc>
<lastmod>2026-04-03T02:35:43.536Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-brushworm-and-brushlogger-to-attack-a-south-asian-financial-company</loc>
<lastmod>2026-04-03T02:28:37.866Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/coruna-darksword-and-democratizing-nation-state-exploit-kits</loc>
<lastmod>2026-04-03T02:22:16.610Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-sends-lock-screen-alerts-to-old-iphones-about-active-web-based-exploits</loc>
<lastmod>2026-04-03T02:18:02.471Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wartime-usage-of-compromised-ip-cameras-highlight-their-danger</loc>
<lastmod>2026-04-03T02:43:03.759Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</loc>
<lastmod>2026-04-03T02:40:43.193Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-phishing-zip-files-to-send-pxa-stealer-to-steal-money-from-banks-and-other-financial-ins</loc>
<lastmod>2026-04-03T02:30:24.870Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-improves-the-backdoor-it-uses-to-spy-on-telecom-companies-around-the-world</loc>
<lastmod>2026-04-03T02:20:05.922Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/telnyx-pypi-package-with-742000-downloads-compromised-in-teampcp-supply-chain-attack</loc>
<lastmod>2026-04-03T02:41:08.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks</loc>
<lastmod>2026-04-03T02:36:35.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacks-on-infrastructure-that-have-physical-effects-are-down-25</loc>
<lastmod>2026-04-03T02:31:28.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-mistakes-can-help-businesses-improve-their-security-programs</loc>
<lastmod>2026-04-03T02:31:09.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/we-are-at-war</loc>
<lastmod>2026-04-03T02:43:04.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-rootkit-exploits-ebpf-and-kernel-modules-for-stealth-on-linux</loc>
<lastmod>2026-04-03T02:43:00.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/red-hat-warns-of-malware-code-embedded-in-popular-linux-tool-allow-unauthorized-access-to-systems</loc>
<lastmod>2026-04-03T02:37:37.209Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-sets-2029-deadline-for-quantum-safe-cryptography</loc>
<lastmod>2026-04-03T02:27:55.803Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-aqua-security-trivy-scanner-flaw-to-kev-catalog</loc>
<lastmod>2026-04-03T02:20:16.028Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bind-9-vulnerabilities-allow-attackers-to-bypass-security-and-crash-servers</loc>
<lastmod>2026-04-03T02:18:54.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aitm-phishing-attacks-on-tiktok-business-accounts-use-cloudflare-turnstile-evasion</loc>
<lastmod>2026-04-03T02:17:48.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostclaw-malware-powered-by-ai-hits-macos-and-steals-passwords</loc>
<lastmod>2026-04-03T02:16:35.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silver-fox-phishing-campaign-shifts-from-rats-to-python-stealers</loc>
<lastmod>2026-04-03T02:38:50.303Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/red-hat-warns-of-malware-embedded-in-popular-linux-tool-allowing-unauthorized-access</loc>
<lastmod>2026-04-03T02:37:43.674Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-windows-error-reporting-vulnerability-lets-attackers-escalate-to-gain-system-access</loc>
<lastmod>2026-04-03T02:35:56.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-kiss-loader-malware-targets-systems-with-early-bird-apc-injection</loc>
<lastmod>2026-04-03T02:35:18.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-cloudflare-captcha-pages-spread-infiniti-stealer-malware-on-macos-systems</loc>
<lastmod>2026-04-03T02:25:36.855Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyberattack-on-web3-support-staff-uses-fake-screenshots-for-malware-delivery</loc>
<lastmod>2026-04-03T02:23:28.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/important-citrix-netscaler-and-gateway-weaknesses-allow-remote-attackers-to-expose-confidential-data</loc>
<lastmod>2026-04-03T02:22:44.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bearlyfy-attacks-over-70-russian-companies-with-custom-genielocker-ransomware</loc>
<lastmod>2026-04-03T02:18:49.274Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks</loc>
<lastmod>2026-04-03T02:32:05.837Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/isc-warns-of-high-severity-kea-dhcp-flaw-that-can-crash-services-remotely</loc>
<lastmod>2026-04-03T02:31:44.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-claude-chrome-extension-0-click-vulnerability-lets-attackers-silently-add-prompts-to-websites</loc>
<lastmod>2026-04-03T02:21:49.908Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropics-leaked-drafts-show-off-a-powerful-new-ai-model-called-claude-mythos</loc>
<lastmod>2026-04-03T02:17:57.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-attack-pushes-malware-using-fake-vs-code-alerts-on-github</loc>
<lastmod>2026-04-03T02:37:07.407Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/isc-warns-of-critical-kea-dhcp-flaw-causing-remote-service-crashes</loc>
<lastmod>2026-04-03T02:31:40.671Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-fake-npm-install-alerts-to-distribute-rat-malware-in-open-source-ecosystem</loc>
<lastmod>2026-04-03T02:30:06.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nvidia-flaws-that-are-very-important-allows-rce-and-dos-attacks</loc>
<lastmod>2026-04-03T02:23:07.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/langflow-ai-platform-under-attack-for-major-flaw</loc>
<lastmod>2026-04-03T02:22:45.597Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-clickfix-attack-uses-windows-run-dialog-box-and-macos-terminal-to-spread-malware</loc>
<lastmod>2026-04-03T02:34:46.577Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leak-bazaar-turns-stolen-business-data-into-a-structured-criminal-market</loc>
<lastmod>2026-04-03T02:32:15.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-voidlink-rootkit-hides-deep-inside-linux-systems-by-using-ebpf-and-kernel-modules</loc>
<lastmod>2026-04-03T02:43:02.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leakbase-hacker-forum-admin-arrested-in-russia-by-law-enforcement-authorities</loc>
<lastmod>2026-04-03T02:32:33.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/is-the-fccs-router-ban-the-wrong-fix</loc>
<lastmod>2026-04-03T02:31:34.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/idrive-for-windows-vulnerability-let-attackers-escalate-privileges</loc>
<lastmod>2026-04-03T02:31:24.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-plant-stealthy-bpfdoor-backdoors-in-telecom-networks-for-long-term-access</loc>
<lastmod>2026-04-03T02:29:34.683Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostclaw-ai-assisted-malware-attacking-macos-users-to-deploy-credential-stealing-payloads</loc>
<lastmod>2026-04-03T02:27:02.507Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-that-attackers-are-using-the-langflow-code-injection-vulnerability</loc>
<lastmod>2026-04-03T02:21:01.056Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybersecurity-threats-to-cars-are-growing-as-more-cars-become-connected-and-self-driving</loc>
<lastmod>2026-04-03T02:18:28.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tax-audit-phishing-campaign-tied-to-silver-fox-shifts-from-rats-to-python-stealers</loc>
<lastmod>2026-04-03T02:39:46.918Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silver-fox-abuses-stolen-ev-certificates-in-atlascross-rat-malware-campaign</loc>
<lastmod>2026-04-03T02:38:43.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-torg-grabber-stealer-moves-from-telegram-exfiltration-to-encrypted-rest-api-c2</loc>
<lastmod>2026-04-03T02:35:50.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-screenshot-lures-used-to-spread-multi-stage-malware-to-web3-support-staff</loc>
<lastmod>2026-04-03T02:25:42.666Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/red-menshen-which-is-linked-to-china-uses-stealthy-bpfdoor-implants-to-spy-on-telecom-networks</loc>
<lastmod>2026-04-03T02:20:03.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-mistakes-can-help-organizations-improve-their-security-programs</loc>
<lastmod>2026-04-03T02:31:08.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/synology-diskstation-manager-vulnerability-allow-remote-attackers-to-execute-arbitrary-commands</loc>
<lastmod>2026-04-03T02:39:10.030Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-entra-id-new-feature-removes-mfa-limitations-for-users</loc>
<lastmod>2026-04-03T02:33:25.195Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website</loc>
<lastmod>2026-04-03T02:21:52.293Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-secure-firewall-vulnerability-allows-remote-code-execution-as-root-user</loc>
<lastmod>2026-04-03T02:21:14.552Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-says-that-the-langflow-code-injection-flaw-is-being-used-in-the-wild</loc>
<lastmod>2026-04-03T02:20:58.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-powered-dependency-decisions-add-security-bugs-ignore-them</loc>
<lastmod>2026-04-03T02:17:26.511Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories</loc>
<lastmod>2026-04-03T02:41:54.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-launches-ai-safety-bug-bounty-to-detect-ai-specific-vulnerabilities</loc>
<lastmod>2026-04-03T02:36:48.340Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-kiss-loader-malware-uses-early-bird-apc-injection-in-emerging-attack-campaign</loc>
<lastmod>2026-04-03T02:35:24.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mirai-botnet-growth-spurs-massive-ddos-attacks-and-proxy-exploits</loc>
<lastmod>2026-04-03T02:34:09.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception</loc>
<lastmod>2026-04-03T02:33:10.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/intermediaries-driving-global-spyware-market-expansion</loc>
<lastmod>2026-04-03T02:31:29.473Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-npm-install-messages-hide-rat-malware-in-new-open-source-supply-chain-campaign</loc>
<lastmod>2026-04-03T02:25:41.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/important-nvidia-security-holes-allow-rce-and-dos-attacks</loc>
<lastmod>2026-04-03T02:23:06.292Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/important-ivanti-epmm-security-flaws-let-remote-code-run</loc>
<lastmod>2026-04-03T02:22:59.523Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks</loc>
<lastmod>2026-04-03T02:43:04.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/linux-ransomware-pay2key-targets-servers-virtualization-hosts</loc>
<lastmod>2026-04-03T02:32:41.924Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-new-mass-attacks-the-coruna-ios-kit-uses-code-from-the-2023-triangulation-exploit</loc>
<lastmod>2026-04-03T02:22:25.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-with-ties-to-china-break-into-military-systems-in-southeast-asia</loc>
<lastmod>2026-04-03T02:20:03.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/synology-dsm-vulnerability-allows-remote-command-execution-by-attackers</loc>
<lastmod>2026-04-03T02:39:10.970Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-guidance-to-detect-and-defend-against-trivy-supply-chain-attack</loc>
<lastmod>2026-04-03T02:33:48.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leakbase-hacker-forum-admin-arrested-by-russian-authorities</loc>
<lastmod>2026-04-03T02:32:18.706Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/idrive-for-windows-vulnerability-allows-privilege-escalation-attacks</loc>
<lastmod>2026-04-03T02:31:22.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghost-spn-attack-lets-hackers-kerberoast-without-being-seen-not-on-the-radar</loc>
<lastmod>2026-04-03T02:26:45.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-security-alerts-for-vs-code-on-github-were-used-to-spread-malware-in-a-large-phishing-campaign</loc>
<lastmod>2026-04-03T02:25:47.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/studies-show-that-infostealer-infections-can-cause-dark-web-leaks-in-less-than-48-hours</loc>
<lastmod>2026-04-03T02:37:44.677Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-flaw-in-the-cisco-secure-firewall-lets-remote-code-run-as-root</loc>
<lastmod>2026-04-03T02:21:12.148Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites</loc>
<lastmod>2026-04-03T02:43:11.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/telegram-driven-attack-targets-crypto-developers-with-malicious-npm-packages</loc>
<lastmod>2026-04-03T02:41:02.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nodejs-fixes-a-lot-of-security-holes-causing-dos-attacks-and-crashes</loc>
<lastmod>2026-04-03T02:36:08.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-powered-openclaw-trap-lures-developers-with-github-repos-that-have-been-hacked</loc>
<lastmod>2026-04-03T02:16:36.013Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/linux-ransomware-pay2key-attacking-servers-virtualization-platforms-and-cloud-environments</loc>
<lastmod>2026-04-03T02:32:40.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mirai-based-botnets-become-a-huge-threat-for-ddos-and-proxy-abuse</loc>
<lastmod>2026-04-03T02:34:09.281Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-eu-is-in-charge-at-rsac-and-us-officials-are-left-out</loc>
<lastmod>2026-04-03T02:18:26.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/linux-ransomware-pay2key-is-attacking-organizations-like-ervers-virtualization-hosts-and-cloud-workl</loc>
<lastmod>2026-04-03T02:32:39.834Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/smartapesg-clickfix-campaign-delivers-remcos-netsupport-rat-stealc-and-sectop-rat</loc>
<lastmod>2026-04-03T02:38:53.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/macos-threats-are-the-biggest-security-gap-in-2026-how-soc-teams-close-it</loc>
<lastmod>2026-04-03T02:32:53.904Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-police-arrest-leakbase-admin-for-running-a-huge-marketplace-for-stolen-credentials</loc>
<lastmod>2026-04-03T02:32:16.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/firefox-1490-is-out-now-and-it-comes-with-a-free-built-in-vpn-that-has-a-monthly-data-limit-of-50-gb</loc>
<lastmod>2026-04-03T02:26:17.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-protecting-smaller-businesses-is-the-key-to-keeping-big-businesses-safe-when-it-comes-to-supply-</loc>
<lastmod>2026-04-03T02:16:33.638Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishers-pose-as-palo-alto-networks-recruiters-for-months-in-job-scam</loc>
<lastmod>2026-04-03T02:37:03.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nodejs-patches-multiple-vulnerabilities-that-enable-dos-attacks-and-process-crashes</loc>
<lastmod>2026-04-03T02:36:12.151Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-research-maps-how-infostealer-infections-turn-into-dark-web-exposure-in-48-hours</loc>
<lastmod>2026-04-03T02:35:42.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leveraging-ai-agents-the-protos-labs-3c-framework-for-unified-enterprise-risk-intelligence-cyber-fra</loc>
<lastmod>2026-04-03T02:32:38.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-elite-socs-and-mssps-escalate-30-fewer-alerts-with-better-threat-intelligence</loc>
<lastmod>2026-04-03T02:30:55.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/f5-nginx-plus-and-open-source-vulnerability-allow-attackers-to-execute-code-using-mp4-file</loc>
<lastmod>2026-04-03T02:25:17.756Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blame-game-why-public-cyber-attribution-carries-risks</loc>
<lastmod>2026-04-03T02:18:57.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-rules-the-rsac-innovation-sandbox</loc>
<lastmod>2026-04-03T02:16:42.359Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-assisted-openclaw-trap-campaign-uses-trojanized-github-repositories-to-attack-developers-and-game</loc>
<lastmod>2026-04-03T02:16:34.932Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-a-near-miss-database-is-key-to-improving-information-sharing</loc>
<lastmod>2026-04-03T02:43:20.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat</loc>
<lastmod>2026-04-03T02:41:21.372Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sans-top-5-most-dangerous-new-attack-techniques-to-watch</loc>
<lastmod>2026-04-03T02:38:33.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-initial-access-broker-sentenced-to-prison-for-enabling-ransomware-attacks-on-us-firms</loc>
<lastmod>2026-04-03T02:38:31.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks</loc>
<lastmod>2026-04-03T02:38:26.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-to-shut-down-sora-video-platform-pivots-to-enterprise-and-developer-tools</loc>
<lastmod>2026-04-03T02:36:55.206Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-tp-link-vulnerabilities-allow-attackers-to-execute-arbitrary-commands-on-system</loc>
<lastmod>2026-04-03T02:34:13.187Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-entra-id-introduces-feature-to-eliminate-mfa-limitations</loc>
<lastmod>2026-04-03T02:33:19.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/glassworm-malware-uses-solana-dead-drops-to-send-rat-and-steal-browser-and-crypto-data</loc>
<lastmod>2026-04-03T02:27:18.635Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/firefox-149-released-with-a-patch-for-37-security-holes-that-let-attackers-attack-remotely</loc>
<lastmod>2026-04-03T02:26:19.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploiting-magento-to-execute-remote-code-and-gain-complete-account-access</loc>
<lastmod>2026-04-03T02:29:26.446Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/goharbor-vulnerability-allows-attackers-to-fully-compromise-container-registry</loc>
<lastmod>2026-04-03T02:27:19.959Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/firefox-1490-released-with-free-built-in-vpn-and-50gb-monthly-data</loc>
<lastmod>2026-04-03T02:26:16.214Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/f5-nginx-flaw-allows-code-execution-via-malicious-mp4-files</loc>
<lastmod>2026-04-03T02:25:10.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ex-nsa-directors-discuss-red-line-for-offensive-cyberattacks</loc>
<lastmod>2026-04-03T02:24:42.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/csa-launches-csai-foundation-for-ai-security</loc>
<lastmod>2026-04-03T02:23:21.093Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cloud-based-phishing-resumes-after-tycoon2fa-disruption</loc>
<lastmod>2026-04-03T02:22:04.723Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clawhub-vulnerability-allowed-attackers-to-change-rankings-to-make-the-1-skill</loc>
<lastmod>2026-04-03T02:21:54.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/to-stop-ai-based-attacks-you-need-ai-native-security</loc>
<lastmod>2026-04-03T02:17:23.838Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/passkey-architecture-in-google-authenticator-poses-new-cyberattack-threats</loc>
<lastmod>2026-04-03T02:37:02.727Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-hackers-broke-into-the-litellm-pypi-package-which-has-been-downloaded-95-million-times</loc>
<lastmod>2026-04-03T02:32:49.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-magento-flaw-for-remote-code-execution-and-account-takeover</loc>
<lastmod>2026-04-03T02:28:47.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-authenticators-hidden-passkey-architecture-could-open-new-passwordless-attack-paths</loc>
<lastmod>2026-04-03T02:27:21.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/five-harmful-npm-packages-are-aimed-at-crypto-developers-and-steal-wallet-keys-through-telegram</loc>
<lastmod>2026-04-03T02:26:20.032Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-fcc-banned-consumer-routers-made-outside-the-us-because-they-could-pose-security-risks</loc>
<lastmod>2026-04-03T02:25:48.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/340-microsoft-365-organizations-in-five-countries-are-being-hit-by-device-code-phishing-attacks-thro</loc>
<lastmod>2026-04-03T02:24:04.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-unleashes-irantargeted-canisterworm-kubernetes-wiper</loc>
<lastmod>2026-04-03T02:41:01.910Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-kali-linux-20261-comes-with-8-hacking-tools</loc>
<lastmod>2026-04-03T02:31:58.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-change-rankings-to-get-to-1-with-the-clawhub-vulnerability</loc>
<lastmod>2026-04-03T02:21:54.643Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kali-linux-20261-released-featuring-8-new-security-tools</loc>
<lastmod>2026-04-03T02:31:52.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-fcc-wont-let-foreign-companies-sell-new-consumer-routers-because-of-security-concerns</loc>
<lastmod>2026-04-03T02:26:09.572Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-hackers-behind-trivy-kics-breaches-now-target-litellm-package</loc>
<lastmod>2026-04-03T02:40:31.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackerone-data-breach-employee-data-stolen-in-navia-linked-hack</loc>
<lastmod>2026-04-03T02:28:07.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-fcc-has-stopped-new-foreign-made-routers-from-being-sold-because-of-worries-about-the-supply-cha</loc>
<lastmod>2026-04-03T02:25:51.971Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-google-forms-job-offers-to-spread-purehvnc-malware</loc>
<lastmod>2026-04-03T02:23:47.021Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/azure-ai-foundry-strengthens-cybersecurity-with-new-safeguards-for-generative-ai-models</loc>
<lastmod>2026-04-03T02:18:45.274Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aqua-securitys-trivy-scanner-hit-by-supply-chain-attack</loc>
<lastmod>2026-04-03T02:18:23.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aqua-securitys-trivy-scanner-compromised-in-supply-chain-attack</loc>
<lastmod>2026-04-03T02:18:16.101Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-hacktivists-make-noise-but-have-little-impact-on-war</loc>
<lastmod>2026-04-03T02:31:30.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-invitations-fuel-the-silentconnect-campaign-that-sends-out-the-screenconnect-rat</loc>
<lastmod>2026-04-03T02:25:39.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weaknesses-in-dell-wyse-management-allows-for-full-system-compromise</loc>
<lastmod>2026-04-03T02:24:02.956Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/after-a-problem-with-their-infrastructure-tycoon2fa-operators-start-phishing-for-cloud-accounts-agai</loc>
<lastmod>2026-04-03T02:42:35.381Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/checkmarx-kics-code-scanner-hit-in-widening-supply-chain</loc>
<lastmod>2026-04-03T02:19:59.209Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-ai-tools-for-coding-broke-down-the-endpoint-security-fortress</loc>
<lastmod>2026-04-03T02:30:46.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/as-teampcp-sends-out-an-iran-focused-kubernetes-wiper-canisterworm-becomes-destructive</loc>
<lastmod>2026-04-03T02:19:03.951Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/4-major-risks-of-ai-and-how-to-reduce-them</loc>
<lastmod>2026-04-03T02:16:10.582Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-backdoors-litellm-versions-18271828-likely-due-to-a-trivy-cicd-compromise</loc>
<lastmod>2026-04-03T02:40:02.412Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-are-constantly-attacking-ms-sql-servers-to-install-ice-cloud-scanner</loc>
<lastmod>2026-04-03T02:41:37.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-a-new-multi-stage-malware-campaign-google-forms-job-lures-deliver-purehvnc</loc>
<lastmod>2026-04-03T02:27:39.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-your-monitoring-program-is-letting-attackers-win</loc>
<lastmod>2026-04-03T02:43:26.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr</loc>
<lastmod>2026-04-03T02:39:54.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-fake-resumes-to-get-into-businesses-and-install-a-crypto-miner</loc>
<lastmod>2026-04-03T02:30:19.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-hackers-are-attacking-rdp-servers-to-install-harmful-software-and-stay-there</loc>
<lastmod>2026-04-03T02:18:10.203Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/instead-of-the-openclaw-deployer-repo-on-github-you-get-a-trojan</loc>
<lastmod>2026-04-03T02:27:14.827Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-details-new-security-safeguards-for-generative-ai-models-on-azure-ai-foundry</loc>
<lastmod>2026-04-03T02:33:17.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-a-large-bank-uses-ai-digital-twins-for-threat-hunting</loc>
<lastmod>2026-04-03T02:30:40.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-says-that-gemini-ai-agents-are-searching-the-dark-web-for-posts-that-could-be-dangerous</loc>
<lastmod>2026-04-03T02:27:49.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-data-leak-site-has-been-found-that-is-linked-to-an-active-initial-access-broker-on-underground</loc>
<lastmod>2026-04-03T02:35:06.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-suggests-better-identity-and-safety-for-ai-agents</loc>
<lastmod>2026-04-03T02:33:27.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/seo-poisoning-campaign-impersonates-2025-popular-apps-to-spread-asyncrat</loc>
<lastmod>2026-04-03T02:38:41.842Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-data-leak-site-linked-to-active-initial-access-broker</loc>
<lastmod>2026-04-03T02:37:47.271Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nist-releases-quick-start-guide-on-cybersecurity-risk-and-workforce-management</loc>
<lastmod>2026-04-03T02:35:59.989Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uses-of-ghost-campaign-7-npm-packages-that-steal-crypto-wallets-and-passwords</loc>
<lastmod>2026-04-03T02:26:40.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/five-things-you-can-learn-from-the-first-ever-gartner-market-guide-for-guardian-agents</loc>
<lastmod>2026-04-03T02:16:16.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/asyncrat-malware-hits-libyan-oil-refinery-as-part-of-a-long-term-spying-campaign</loc>
<lastmod>2026-04-03T02:32:51.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-a-new-malware-campaign-fake-chatgpt-invitations-are-being-sent-to-android-users</loc>
<lastmod>2026-04-03T02:25:29.614Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills</loc>
<lastmod>2026-04-03T02:41:20.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials</loc>
<lastmod>2026-04-03T02:40:39.751Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/roundcube-webmail-security-updates-patches-multiple-critical-vulnerabilities</loc>
<lastmod>2026-04-03T02:38:06.235Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-chrome-security-update-fixes-eight-security-holes-letting-code-run-on-a-remote-machine</loc>
<lastmod>2026-04-03T02:20:12.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/miolab-macos-stealer-expands-with-clickfix-delivery-and-crypto-wallet-theft</loc>
<lastmod>2026-04-03T02:34:02.065Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mazda-data-breach-exposing-employee-and-partner-records-via-system-vulnerability</loc>
<lastmod>2026-04-03T02:33:11.454Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malvertising-campaign-uses-tax-ads-to-deploy-byovd-edr-killer-huntress-says</loc>
<lastmod>2026-04-03T02:33:05.800Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-sending-fake-chatgpt-invites-to-android-users-to-spread-malware</loc>
<lastmod>2026-04-03T02:28:20.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-511000-microsoft-iis-instances-that-are-no-longer-supported-are-now-online</loc>
<lastmod>2026-04-03T02:16:15.655Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-sentences-russian-hacker-to-675-years-for-role-in-9m-ransomware-damage</loc>
<lastmod>2026-04-03T02:42:37.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-supply-chain-attack-spreads-through-compromised-docker-hub-images</loc>
<lastmod>2026-04-03T02:42:15.724Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomwares-new-era-moving-at-ai-speed</loc>
<lastmod>2026-04-03T02:37:29.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oblivion-rat-masquerades-as-play-store-updates-in-expanding-android-spyware-campaign</loc>
<lastmod>2026-04-03T02:36:25.185Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leaks</loc>
<lastmod>2026-04-03T02:21:45.858Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisos-debate-human-role-in-ai-powered-security</loc>
<lastmod>2026-04-03T02:21:28.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-hide-infostealer-in-notices-of-copyright-infringement</loc>
<lastmod>2026-04-03T02:18:27.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-supply-chain-attack-targets-cicd-secrets</loc>
<lastmod>2026-04-03T02:42:27.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oblivion-rat-turns-fake-play-store-updates-into-a-full-service-android-spyware-operation</loc>
<lastmod>2026-03-23T22:46:56.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</loc>
<lastmod>2026-03-23T22:46:55.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/macos-stealer-miolab-adds-clickfix-delivery-wallet-theft-and-team-api-tools</loc>
<lastmod>2026-03-23T22:46:50.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/libyan-oil-refinery-hit-in-long-running-espionage-campaign-using-asyncrat</loc>
<lastmod>2026-03-23T22:46:50.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-netscaler-adc-and-gateway-vulnerabilities-enable-remote-attacks-on-affected-systems</loc>
<lastmod>2026-03-23T22:46:40.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisos-talk-about-the-role-of-people-in-ai-powered-security</loc>
<lastmod>2026-03-23T22:46:38.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/what-could-go-wrong-with-ai-in-the-soc</loc>
<lastmod>2026-04-03T02:17:05.185Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-with-them</loc>
<lastmod>2026-03-23T16:45:22.749Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-vulnerability-scanner-breached-to-inject-credential-stealing-scripts</loc>
<lastmod>2026-03-23T16:45:21.547Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-511000-end-of-life-microsoft-iis-servers-exposed-online</loc>
<lastmod>2026-04-03T02:37:00.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-canisterworm-steals-npm-tokens-and-spreads-through-compromised-publisher-accounts</loc>
<lastmod>2026-03-23T16:45:11.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware</loc>
<lastmod>2026-03-23T16:45:10.854Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lapsus-hackers-claim-breach-of-astrazenecas-internal-systems</loc>
<lastmod>2026-04-03T02:32:11.730Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-quest-kace-sma-flaw-to-steal-credentials</loc>
<lastmod>2026-04-03T02:29:08.011Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crunchyroll-breach-hackers-claim-100gb-of-user-data-stolen</loc>
<lastmod>2026-04-03T02:23:16.502Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/copyright-themed-lures-deliver-multi-stage-purelog-stealer-in-new-credential-theft-campaign</loc>
<lastmod>2026-03-23T16:44:55.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-craft-cms-code-injection-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T16:44:53.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-craft-cms-code-injection-flaw-exploited-in-the-wild</loc>
<lastmod>2026-03-23T16:44:53.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-apple-vulnerabilities-linked-to-darksword-ios-exploit-chain-exploited-in-attacks</loc>
<lastmod>2026-03-23T16:44:53.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-hide-infostealer-in-copyright-infringement-notices</loc>
<lastmod>2026-03-23T16:44:50.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-dominates-rsac-innovation-sandbox</loc>
<lastmod>2026-03-23T16:44:48.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-cicd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more</loc>
<lastmod>2026-03-23T16:44:47.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/30-ip-kvm-flaws-could-let-attackers-control-bios-across-all-enterprise-networks</loc>
<lastmod>2026-03-23T16:44:47.419Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper</loc>
<lastmod>2026-03-23T10:07:18.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-canisterworm-malware-targets-npm-tokens-in-supply-chain-campaign</loc>
<lastmod>2026-03-23T10:07:05.563Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-emergency-out-of-band-update-for-windows-11-to-fix-microsoft-account-sign-in-failure</loc>
<lastmod>2026-03-23T10:07:02.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-cve-2025-32975-cvss-100-to-hijack-unpatched-quest-kace-sma-systems</loc>
<lastmod>2026-03-23T10:06:54.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-infect-7500-magento-stores-with-hidden-malicious-files</loc>
<lastmod>2026-03-23T10:06:47.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crunchyroll-data-breach-threat-actor-claims-exfiltration-of-100-gb-of-user-data</loc>
<lastmod>2026-03-23T10:06:46.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-qnap-qvr-pro-flaw-allows-remote-attackers-to-access-systems</loc>
<lastmod>2026-03-23T10:06:45.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/30-ip-kvm-flaws-put-businesses-at-risk-of-bios-level-attacks</loc>
<lastmod>2026-03-23T10:06:34.414Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fbi-says-russian-hackers-are-using-mass-phishing-attacks-to-go-after-signal-and-whatsapp</loc>
<lastmod>2026-03-23T04:16:18.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages</loc>
<lastmod>2026-03-23T04:16:50.426Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-leverage-copyright-themed-emails-to-drop-purelog-stealer</loc>
<lastmod>2026-03-23T04:16:48.884Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oracle-releases-urgent-patch-for-critical-rce-flaw-in-identity-manager-and-web-services-manager</loc>
<lastmod>2026-03-23T04:16:39.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-manager</loc>
<lastmod>2026-03-23T04:16:39.768Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oracle-issues-urgent-security-update-for-critical-rce-flaw-in-identity-manager-and-web-services-mana</loc>
<lastmod>2026-03-23T04:16:39.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-about-bugs-in-apple-craft-cms-and-laravel-in-kev-and-tells-them-to-fix-them-by-april-3-20</loc>
<lastmod>2026-03-23T04:16:07.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-march-update-breaks-microsoft-teams-and-onedrive-sign-ins</loc>
<lastmod>2026-03-23T04:16:53.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-voidstealer-variant-bypasses-chrome-abe-without-injection-or-privilege-escalation</loc>
<lastmod>2026-03-23T04:16:37.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-compromised-7500-magento-websites-to-upload-hidden-malicious-files-and-steal-data</loc>
<lastmod>2026-03-23T04:16:23.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-cowork-desktops-anthropic-launches-projects-feature</loc>
<lastmod>2026-03-23T04:16:00.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-cicd-secrets</loc>
<lastmod>2026-03-23T04:16:50.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/patch-now-oracles-fusion-middleware-has-a-serious-rce-flaw</loc>
<lastmod>2026-03-23T04:16:40.785Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybersecurity-fail-beast-gang-shows-off-ransomware-server</loc>
<lastmod>2026-03-23T04:16:14.404Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/with-governments-role-uncertain-businesses-unite-to-combat-fraud</loc>
<lastmod>2026-03-23T04:16:54.081Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sase-is-everywhere-still-awkward-in-2026</loc>
<lastmod>2026-03-23T04:16:44.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomware-actors-expand-edr-killer-tactics-beyond-vulnerable-drivers</loc>
<lastmod>2026-03-23T04:16:42.499Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/perseus-android-malware-steals-user-notes-and-enables-full-device-takeover</loc>
<lastmod>2026-03-23T04:16:41.076Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/navia-confirms-data-breach-exposing-sensitive-data-of-27-million-users</loc>
<lastmod>2026-03-23T04:16:35.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/navia-confirms-data-breach-27-million-users-sensitive-data-exposed</loc>
<lastmod>2026-03-23T04:16:35.471Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-unveils-new-teams-optimizations-for-windows-app-on-ios-android</loc>
<lastmod>2026-03-23T04:16:34.139Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover</loc>
<lastmod>2026-03-23T04:16:29.677Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interlock-ransomware-targets-cisco-enterprise-firewalls</loc>
<lastmod>2026-03-23T04:16:26.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-chrome-update-fixes-26-security-flaws-including-rce-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:21.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fbi-thai-partners-target-southeast-asia-scam-centers-behind-cyber-fraud-on-americans</loc>
<lastmod>2026-03-23T04:16:18.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-tools-fuel-vibe-coded-malware-campaign-targeting-unsuspecting-users</loc>
<lastmod>2026-03-23T04:16:18.262Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-unisoc-t612-modem-flaw-enables-rce-via-cellular-calls</loc>
<lastmod>2026-03-23T04:16:13.262Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure</loc>
<lastmod>2026-03-23T04:16:12.146Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-jenkins-vulnerabilities-expose-cicd-servers-to-rce-attacks</loc>
<lastmod>2026-03-23T04:16:11.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cobra-docguard-hijacked-by-speagle-malware-for-sensitive-data-theft</loc>
<lastmod>2026-03-23T04:16:10.350Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-says-that-the-cisco-secure-firewall-management-center-0-day-is-being-used-in-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:07.672Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-run-code-on-the-bamboo-data-center-and-server-because-they-are-vulnerable</loc>
<lastmod>2026-03-23T04:16:03.890Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks</loc>
<lastmod>2026-03-23T04:16:48.455Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silentconnect-uses-vbscript-powershell-and-peb-masquerading-to-deploy-screenconnect</loc>
<lastmod>2026-03-23T04:16:45.785Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-apt-exploits-zimbra-xss-to-target-ukrainian-government-in-operation-ghostmail</loc>
<lastmod>2026-03-23T04:16:44.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-apt-exploits-zimbra-xss-in-ghostmail-attacks-on-ukrainian-government</loc>
<lastmod>2026-03-23T04:16:44.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/post-quantum-web-could-be-safer-faster</loc>
<lastmod>2026-03-23T04:16:41.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/native-launches-with-security-control-plane-for-multicloud</loc>
<lastmod>2026-03-23T04:16:35.399Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-scams</loc>
<lastmod>2026-03-23T04:16:20.776Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/doj-disrupts-3-million-device-iot-botnets-behind-record-314-tbps-global-ddos-attacks</loc>
<lastmod>2026-03-23T04:16:15.739Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-jenkins-vulnerabilities-enable-remote-code-execution-on-cicd-servers</loc>
<lastmod>2026-03-23T04:16:11.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-bamboo-data-center-vulnerability-enables-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:11.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-cisco-firewall-0-day-exploited-in-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:07.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/authorities-disrupt-iot-botnet-infrastructure-behind-record-breaking-30-tbps-ddos-attacks</loc>
<lastmod>2026-03-23T04:16:03.462Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aura-confirms-data-breach-impacting-900000-consumer-records</loc>
<lastmod>2026-03-23T04:16:03.325Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apex-is-an-ai-powered-pentester-that-attacks-apps-in-black-box-mode-to-find-weaknesses</loc>
<lastmod>2026-03-23T04:16:01.369Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/open-directory-leak-reveals-iran-linked-15-node-relay-network</loc>
<lastmod>2026-03-23T04:16:38.447Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-says-older-iphones-are-open-to-attacks-from-coruna-and-darksword-exploit-kits</loc>
<lastmod>2026-03-23T04:16:01.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-puzzle-why-cant-mcp-security-be-fixed</loc>
<lastmod>2026-03-23T04:15:59.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more</loc>
<lastmod>2026-03-23T04:16:49.617Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers</loc>
<lastmod>2026-03-23T04:16:47.004Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-pyronut-package-backdoors-telegram-bots-with-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:30.558Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/horabot-banking-trojan-resurfaces-in-mexico-with-multi-stage-phishing-and-email-worm-tactics</loc>
<lastmod>2026-03-23T04:16:25.081Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-vulnerabilities-allow-data-exfiltration-and-user-redirection-to-malicious-sites</loc>
<lastmod>2026-03-23T04:16:09.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-tells-businesses-to-protect-microsoft-intune-after-stryker-breach</loc>
<lastmod>2026-03-23T04:16:07.400Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/54-edr-killers-use-byovd-to-take-advantage-of-34-vulnerable-drivers-that-are-signed-and-turn-off-sec</loc>
<lastmod>2026-03-23T04:15:58.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/waterplum-deploys-new-stoatwaffle-malware-in-vscode-based-supply-chain-campaign</loc>
<lastmod>2026-03-23T04:16:52.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-snappyclient-implant-enables-remote-access-data-theft-and-stealth</loc>
<lastmod>2026-03-23T04:16:37.071Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-snappyclient-implant-combines-remote-access-data-theft-and-advanced-evasion</loc>
<lastmod>2026-03-23T04:16:37.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-data</loc>
<lastmod>2026-03-23T04:16:36.754Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malware-operators-hijack-network-devices-for-ddos-attacks-and-crypto-mining</loc>
<lastmod>2026-03-23T04:16:30.922Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-linked-cyber-operations-merge-with-electronic-warfare-as-regional-tensions-surge</loc>
<lastmod>2026-03-23T04:16:27.057Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-linked-botnet-exposed-after-open-directory-leak-reveals-15-node-relay-network</loc>
<lastmod>2026-03-23T04:16:27.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-ceros-gives-security-teams-visibility-and-control-in-claude-code</loc>
<lastmod>2026-03-23T04:16:25.141Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-openwebui-servers-to-deploy-ai-powered-payloads</loc>
<lastmod>2026-03-23T04:16:23.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover</loc>
<lastmod>2026-03-23T04:16:15.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-vulnerabilities-allow-data-exfiltration-and-malicious-redirects</loc>
<lastmod>2026-03-23T04:16:09.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-microsoft-sharepoint-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/backdoored-open-vsx-extension-used-github-downloader-to-install-rat-and-stealer</loc>
<lastmod>2026-03-23T04:16:03.796Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eu-sanctions-companies-in-china-iran-for-cyberattacks</loc>
<lastmod>2026-03-23T04:16:17.097Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-that-hackers-are-taking-advantage-of-flaws-in-zimbra-and-sharepoint-cisco-was-hit-by-rans</loc>
<lastmod>2026-03-23T04:16:08.210Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/darksword-iphone-exploit-kit-serves-spies-thieves-alike</loc>
<lastmod>2026-03-23T04:16:15.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-c2-implant-snappyclient-is-aimed-at-crypto-wallets</loc>
<lastmod>2026-03-23T04:16:05.392Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uidai-launches-bug-bounty-programme-to-strengthen-aadhaar-security</loc>
<lastmod>2026-03-23T04:16:50.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uidai-launches-bug-bounty-program-to-boost-aadhaar-security</loc>
<lastmod>2026-03-23T04:16:50.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/screenconnect-vulnerability-allows-hackers-to-extract-unique-machine-keys-and-hijack-sessions</loc>
<lastmod>2026-03-23T04:16:45.258Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-meta-tiktok-steal-personal-financial-info-when-users-click-ads</loc>
<lastmod>2026-03-23T04:16:43.174Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote-jobs</loc>
<lastmod>2026-03-23T04:16:38.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-malware-campaigns-turn-network-devices-into-ddos-nodes-and-crypto-mining-bots</loc>
<lastmod>2026-03-23T04:16:36.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leaknet-scales-ransomware-operations-with-clickfix-lures-and-stealthy-deno-loader</loc>
<lastmod>2026-03-23T04:16:28.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access</loc>
<lastmod>2026-03-23T04:16:26.651Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/forcememo-hijacks-github-accounts-backdoors-hundreds-of-python-repos-via-force-push</loc>
<lastmod>2026-03-23T04:16:19.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fancybear-server-exposure-reveals-stolen-credentials-2fa-secrets-and-nato-linked-targets</loc>
<lastmod>2026-03-23T04:16:18.370Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-telnetd-vulnerability-enables-remote-attacker-to-execute-arbitrary-code-via-port-23</loc>
<lastmod>2026-03-23T04:16:13.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clear-communication-the-missing-link-in-cybersecurity-success</loc>
<lastmod>2026-03-23T04:16:09.482Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claudy-day-trio-of-flaws-exposes-claude-users-to-data-theft</loc>
<lastmod>2026-03-23T04:16:09.258Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-webkit-flaw-lets-bad-web-content-get-around-on-ios-and-macos</loc>
<lastmod>2026-03-23T04:16:01.895Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vidar-stealer-20-spreads-through-fake-game-cheats-promoted-on-github-and-reddit</loc>
<lastmod>2026-03-23T04:16:51.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ubuntu-desktop-systems-vulnerability-enables-attackers-to-gain-full-root-access</loc>
<lastmod>2026-03-23T04:16:50.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exploit</loc>
<lastmod>2026-03-23T04:16:50.759Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sidewinder-espionage-campaign-expands-across-southeast-asia</loc>
<lastmod>2026-03-23T04:16:45.652Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/regpwn-windows-registry-vulnerability-enables-full-system-access-to-attackers</loc>
<lastmod>2026-03-23T04:16:42.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewels</loc>
<lastmod>2026-03-23T04:16:41.971Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-launches-gpt-54-mini-and-nano-delivering-answers-2-faster</loc>
<lastmod>2026-03-23T04:16:38.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-stop-force-installation-of-365-copilot-app-on-windows-devices</loc>
<lastmod>2026-03-23T04:16:33.912Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-teams-support-call-leads-to-quick-assist-compromise-in-new-vishing-attack</loc>
<lastmod>2026-03-23T04:16:33.736Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/meta-tiktok-steal-users-sensitive-pii-when-they-click-on-ads</loc>
<lastmod>2026-03-23T04:16:31.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-telegram-download-site-pushes-multi-stage-loader-with-in-memory-execution</loc>
<lastmod>2026-03-23T04:16:30.662Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/diplomats-and-critical-infrastructure-targeted-in-boggy-serpens-spy-campaign</loc>
<lastmod>2026-03-23T04:16:15.689Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce</loc>
<lastmod>2026-03-23T04:16:13.317Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-telnetd-vulnerability-allows-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:13.107Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-forticlient-sql-injection-vulnerability-enables-arbitrary-database-access</loc>
<lastmod>2026-03-23T04:16:11.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-code-security-and-magecart-getting-the-threat-model-right</loc>
<lastmod>2026-03-23T04:16:08.750Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/boggy-serpens-targets-diplomats-and-critical-infrastructure-in-multi-wave-espionage-campaign</loc>
<lastmod>2026-03-23T04:16:05.116Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-abuse-court-documents-github-payloads-to-infect-judicial-targets-with-covert-rat</loc>
<lastmod>2026-03-23T04:16:02.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-webkit-vulnerability-allows-malicious-content-bypass-on-ios-and-macos</loc>
<lastmod>2026-03-23T04:16:01.830Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/9-serious-flaws-in-ip-kvm-let-anyone-get-root-access-without-having-to-log-in-across-four-vendors</loc>
<lastmod>2026-03-23T04:15:58.477Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-via-port-23</loc>
<lastmod>2026-03-23T04:16:13.385Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-regpwn-vulnerability-lets-attackers-gain-system-access-on-windows</loc>
<lastmod>2026-03-23T04:16:12.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-forticlient-sql-injection-flaw-allows-unauthorized-database-access</loc>
<lastmod>2026-03-23T04:16:11.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/credential-stealing-npm-malware-found-in-popular-react-native-packages</loc>
<lastmod>2026-03-23T04:16:10.754Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aws-bedrock-agentcore-flaw-enables-stealthy-c2-channels-and-data-theft</loc>
<lastmod>2026-03-23T04:16:03.680Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-fixes-a-webkit-flaw-that-lets-you-bypass-the-same-origin-policy-on-ios-and-macos</loc>
<lastmod>2026-03-23T04:16:01.597Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-attackers-are-logging-in-not-breaking-in</loc>
<lastmod>2026-03-23T04:16:34.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/less-lucrative-ransomware-market-makes-attackers-alter-methods</loc>
<lastmod>2026-03-23T04:16:28.956Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/glassworm-attacks-popular-react-native-packages-with-npm-malware-that-steals-credentials</loc>
<lastmod>2026-03-23T04:16:20.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/warlock-ransomware-group-augments-post-exploitation-activities</loc>
<lastmod>2026-03-23T04:16:52.360Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uks-companies-house-webfiling-flaw-exposed-private-director-data-for-five-months</loc>
<lastmod>2026-03-23T04:16:51.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/to-beat-alert-overload-stop-wasting-time-on-false-positives</loc>
<lastmod>2026-03-23T04:16:49.975Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/simple-custom-font-rendering-can-poison-chatgpt-claude-gemini-and-other-ai-systems</loc>
<lastmod>2026-03-23T04:16:46.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-windows-11-25h224h2-update-fixes-bluetooth-devices-visibility-issues</loc>
<lastmod>2026-03-23T04:16:37.407Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-alert-hackers-hijack-corporate-m365-accounts-with-oauth-device-codes</loc>
<lastmod>2026-03-23T04:16:35.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kubernetes-csi-driver-for-nfs-vulnerability-lets-attackers-delete-or-modify-nfs-server-directories</loc>
<lastmod>2026-03-23T04:16:28.195Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-target-cybersecurity-firm-outpost24-in-7-stage-phish</loc>
<lastmod>2026-03-23T04:16:24.478Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aws-bedrock-agentcore-sandbox-bypass-allows-covert-c2-channels-and-data-exfiltration</loc>
<lastmod>2026-03-23T04:16:03.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-use-seo-poisoning-and-signed-trojans-to-steal-vpn-credentials</loc>
<lastmod>2026-03-23T04:16:03.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/angular-xss-vulnerability-exposes-thousands-of-web-applications-to-xss-attacks</loc>
<lastmod>2026-03-23T04:16:00.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/data-exfiltration-and-rce-are-possible-because-of-ai-flaws-in-amazon-bedrock-langsmith-and-sglang</loc>
<lastmod>2026-03-23T04:16:00.042Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-25h224h2-update-fixes-bluetooth-visibility-problems</loc>
<lastmod>2026-03-23T04:16:53.521Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stryker-confirms-massive-wiper-attack-that-erased-thousands-of-devices</loc>
<lastmod>2026-03-23T04:16:47.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-decrypt-and-exploit-encrypted-palo-alto-cortex-xdr-bioc-rules</loc>
<lastmod>2026-03-23T04:16:43.118Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishers-weaponize-safe-links-with-multi-layered-url-rewriting-to-evade-detection</loc>
<lastmod>2026-03-23T04:16:41.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishers-abuse-livechat-support-tools-to-steal-sensitive-data-in-new-saas-based-attack-tactic</loc>
<lastmod>2026-03-23T04:16:41.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/payload-ransomware-uses-babuk-inspired-encryption-in-attacks-on-windows-and-esxi</loc>
<lastmod>2026-03-23T04:16:40.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-payload-ransomware-uses-babuk-style-encryption-against-windows-and-esxi-systems</loc>
<lastmod>2026-03-23T04:16:36.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-introduces-ai-powered-troubleshooting-for-purview-data-lifecycle-management</loc>
<lastmod>2026-03-23T04:16:32.673Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-npm-packages-deliver-pylangghost-rat-in-new-software-supply-chain-campaign</loc>
<lastmod>2026-03-23T04:16:30.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader</loc>
<lastmod>2026-03-23T04:16:28.756Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware</loc>
<lastmod>2026-03-23T04:16:28.141Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-wing-ftp-server-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:08.161Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-chrome-0-day-vulnerabilities-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-hijacking-legitimate-websites-to-attack-microsoft-teams-users</loc>
<lastmod>2026-03-23T04:16:02.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-exploit-safe-links-to-hide-phishing-urls-behind-rewriting-chains</loc>
<lastmod>2026-03-23T04:16:02.909Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-everywhere-but-cisos-are-still-securing-it-with-yesterdays-skills-and-tools-study-finds</loc>
<lastmod>2026-03-23T04:16:00.196Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/6-malicious-packagist-themes-ship-trojanized-jquery-in-the-ophimcms-supply-chain-attack</loc>
<lastmod>2026-03-23T04:15:58.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stryker-confirms-destructive-wiper-attack-tens-of-thousands-of-devices-wiped</loc>
<lastmod>2026-03-23T04:16:47.477Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rondodox-botnet-expands-to-174-exploits-leveraging-residential-ip-infrastructure-at-scale</loc>
<lastmod>2026-03-23T04:16:44.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-reveal-technique-to-decrypt-and-exploit-cortex-xdr-bioc-rules</loc>
<lastmod>2026-03-23T04:16:43.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/handala-hackers-use-rdp-and-netbird-in-mois-linked-wiper-attacks</loc>
<lastmod>2026-03-23T04:16:24.936Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/handala-hack-uses-rdp-netbird-and-parallel-wipers-in-mois-linked-destructive-intrusions</loc>
<lastmod>2026-03-23T04:16:24.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/condibot-malware-and-monaco-miner-broaden-attacks-on-network-hardware</loc>
<lastmod>2026-03-23T04:16:10.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths</loc>
<lastmod>2026-03-23T04:16:07.095Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-nexus-hackers-skulk-in-southeast-asian-military-orgs-for-years</loc>
<lastmod>2026-03-23T04:16:05.933Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/camelclone-spy-campaign-abuses-public-file-sharing-sites-and-rclone-in-government-focused-attacks</loc>
<lastmod>2026-03-23T04:16:05.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-take-over-real-websites-to-go-after-microsoft-teams-users</loc>
<lastmod>2026-03-23T04:16:02.952Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/qihoo-360-leaked-its-own-wildcard-ssl-private-key-inside-public-ai-installer</loc>
<lastmod>2026-03-23T04:16:42.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-secondary-payload-delivery</loc>
<lastmod>2026-03-23T04:16:35.606Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ibm-uncovers-slopoly-likely-ai-generated-malware-used-in-hive0163-ransomware-attack</loc>
<lastmod>2026-03-23T04:16:25.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-shipment-tracking-scams-surge-in-mea-stealing-banking-data-through-real-time-phishing</loc>
<lastmod>2026-03-23T04:16:18.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-filezilla-downloads-can-lead-to-rat-infections-through-a-stealthy-multi-stage-loader</loc>
<lastmod>2026-03-23T04:16:17.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/inside-olympic-cybersecurity-lessons-from-paris-2024-to-milan-cortina-2026</loc>
<lastmod>2026-03-23T04:16:26.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-find-an-affordable-easy-to-deploy-pam-in-2026-and-what-to-avoid</loc>
<lastmod>2026-03-23T04:16:25.416Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/glassworm-malware-evolves-to-hide-in-dependencies</loc>
<lastmod>2026-03-23T04:16:20.494Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-glassworm-attack-uses-stolen-github-tokens-to-push-malware-into-python-repositories</loc>
<lastmod>2026-03-23T04:16:20.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-security-validation-is-becoming-agentic</loc>
<lastmod>2026-03-23T04:16:53.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-ai-agents-leaking-sensitive-data-in-indirect-prompt-injection-attacks</loc>
<lastmod>2026-03-23T04:16:39.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-block-windows-11-and-server-2025-automated-installation-after-critical-rce-vulnerabilit</loc>
<lastmod>2026-03-23T04:16:33.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-exchange-online-mailbox-access-outage-affects-users-globally</loc>
<lastmod>2026-03-23T04:16:32.496Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/konni-apt-hijacks-kakaotalk-accounts-to-spread-malware-in-multi-stage-spear-phishing-campaign</loc>
<lastmod>2026-03-23T04:16:28.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-looker-studio-vulnerabilities-allow-attackers-to-exfiltrate-data-from-google-services</loc>
<lastmod>2026-03-23T04:16:21.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyberattack-targets-polands-nuclear-research-center-investigation-underway</loc>
<lastmod>2026-03-23T04:16:14.501Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-campaigns-spread-macsync-macos-infostealer-via-fake-ai-tool-installers</loc>
<lastmod>2026-03-23T04:16:09.830Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/betterleaks-new-open-source-tool-for-scanning-files-directories-and-git-repositories</loc>
<lastmod>2026-03-23T04:16:04.180Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/betterleaks-a-new-open-source-tool-to-scan-directories-files-and-git-repositories</loc>
<lastmod>2026-03-23T04:16:04.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-abuse-microsoft-teams-and-quick-assist-to-drop-stealthy-a0backdoor</loc>
<lastmod>2026-03-23T04:16:02.775Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-abuse-livechat-to-phish-credit-card-personal-data</loc>
<lastmod>2026-03-23T04:16:02.724Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/android-17-advanced-protection-mode-to-block-malicious-service-usage</loc>
<lastmod>2026-03-23T04:16:00.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/acrstealer-upgrades-with-syscall-evasion-and-tls-based-c2-in-new-campaign</loc>
<lastmod>2026-03-23T04:15:58.884Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-and-more</loc>
<lastmod>2026-03-23T04:15:58.602Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/real-time-phishing-campaigns-use-fake-shipment-alerts-to-steal-banking-data-in-mea</loc>
<lastmod>2026-03-23T04:16:42.680Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/indirect-prompt-injection-attacks-cause-openclaw-ai-agents-to-leak-sensitive-data</loc>
<lastmod>2026-03-23T04:16:26.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-looker-studio-vulnerabilities-enable-attackers-to-exfiltrate-data-from-google-services</loc>
<lastmod>2026-03-23T04:16:21.772Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-espionage</loc>
<lastmod>2026-03-23T04:16:16.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/android-17-launches-advanced-protection-mode-to-stop-bad-service-exploits</loc>
<lastmod>2026-03-23T04:16:00.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-tracks-storm-2561-in-fake-vpn-client-credential-theft-scheme</loc>
<lastmod>2026-03-23T04:16:34.030Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/machine-speed-defense-against-ai-malware</loc>
<lastmod>2026-03-23T04:16:29.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/konni-apt-uses-compromised-kakaotalk-accounts-to-launch-multi-stage-malware-attacks</loc>
<lastmod>2026-03-23T04:16:28.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-organizations-can-stay-ahead-of-emerging-threats-targeting-edge-devices</loc>
<lastmod>2026-03-23T04:16:25.263Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/to-stop-malware-from-getting-into-android-17-it-blocks-apps-that-arent-accessible-from-the-accessibi</loc>
<lastmod>2026-03-23T04:16:00.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-langsmith-account-takeover-vulnerability-puts-users-at-risk</loc>
<lastmod>2026-03-23T04:16:12.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/authorities-are-cracking-down-on-45000-malicious-ips-that-are-powering-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:03.402Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-ai-agent-flaws-could-allow-prompt-injection-and-data-theft</loc>
<lastmod>2026-03-23T04:16:38.983Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attack-on-the-glassworm-supply-chain-mistreatments-72-open-vsx-extensions-for-target-developers</loc>
<lastmod>2026-03-23T04:16:20.547Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-confirms-windows-11-24h225h2-bug-blocks-access-to-the-system-drive-c</loc>
<lastmod>2026-03-23T04:16:31.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-malicious-npm-campaign-pretends-to-be-solara-executor-in-order-to-steal-discord-and-crypto-wallet-</loc>
<lastmod>2026-03-23T04:16:30.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/loblaw-data-breach-hackers-gain-access-to-it-network-and-customer-data</loc>
<lastmod>2026-03-23T04:16:29.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-serious-langsmith-vulnerability-lets-someone-take-over-your-account-completely</loc>
<lastmod>2026-03-23T04:16:12.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-post-quantum-cryptography-cant-wait</loc>
<lastmod>2026-03-23T04:16:53.238Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-data-gap-why-nonprofit-cyber-incidents-go-underreported</loc>
<lastmod>2026-03-23T04:16:48.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyberattackers-dont-care-about-good-things</loc>
<lastmod>2026-03-23T04:16:14.539Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/veeam-patches-multiple-critical-rce-vulnerabilities-on-backup-server</loc>
<lastmod>2026-03-23T04:16:51.558Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/salesforce-warns-of-shinyhunters-group-exploiting-experience-cloud-sites</loc>
<lastmod>2026-03-23T04:16:44.802Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openssh-gssapi-vulnerability-allow-an-attacker-to-crash-ssh-child-processes</loc>
<lastmod>2026-03-23T04:16:39.595Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/metasploit-pro-500-released-with-powerful-new-modules-and-critical-enhancements</loc>
<lastmod>2026-03-23T04:16:31.682Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/meta-to-shut-down-instagram-end-to-end-encrypted-chat-support-starting-may-2026</loc>
<lastmod>2026-03-23T04:16:31.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interpol-dismantles-45000-malicious-ips-arrests-94-in-global-cybercrime</loc>
<lastmod>2026-03-23T04:16:26.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-pocs-misunderstood-risks-cause-cisco-sd-wan-chaos</loc>
<lastmod>2026-03-23T04:16:18.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-crackarmor-vulnerabilities-expose-126-million-linux-servers-to-complete-root-takeover</loc>
<lastmod>2026-03-23T04:16:11.335Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-zero-day-vulnerabilities-actively-exploited-in-the-wild-to-execute-malicious-code</loc>
<lastmod>2026-03-23T04:16:06.615Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-malware</loc>
<lastmod>2026-03-23T04:16:06.311Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/your-network-already-has-agentic-ai</loc>
<lastmod>2026-03-23T04:15:59.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/will-ai-save-consumers-from-smartphone-based-phishing-attacks</loc>
<lastmod>2026-03-23T04:16:53.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/what-orgs-can-learn-from-olympics-world-cup-ir-plans</loc>
<lastmod>2026-03-23T04:16:52.924Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ta453-and-ta473-drive-iran-war-themed-phishing-across-the-middle-east</loc>
<lastmod>2026-03-23T04:16:48.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials</loc>
<lastmod>2026-03-23T04:16:47.436Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/real-time-banking-trojan-strikes-brazils-pix-users</loc>
<lastmod>2026-03-23T04:16:42.729Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/powershell-and-psexec-used-to-steal-data-before-inc-ransomware-attack</loc>
<lastmod>2026-03-23T04:16:41.919Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/most-google-cloud-attacks-start-with-bug-exploitation</loc>
<lastmod>2026-03-23T04:16:34.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/investigating-a-new-click-fix-variant</loc>
<lastmod>2026-03-23T04:16:26.846Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/handala-expands-destructive-cyber-operations-beyond-israeli-targets</loc>
<lastmod>2026-03-23T04:16:24.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8</loc>
<lastmod>2026-03-23T04:16:21.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/authorities-shut-down-a-malicious-proxy-network-that-was-used-to-spread-malware</loc>
<lastmod>2026-03-23T04:16:03.574Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:51.501Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/six-malicious-packagist-themes-deliver-trojanized-jquery-payloads</loc>
<lastmod>2026-03-23T04:16:46.251Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-isolation</loc>
<lastmod>2026-03-23T04:16:37.595Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-openssh-flaw-in-gssapi-authentication-can-trigger-ssh-process-crashes</loc>
<lastmod>2026-03-23T04:16:36.647Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/meta-launches-new-anti-scam-tools-on-whatsapp-facebook-and-messenger</loc>
<lastmod>2026-03-23T04:16:31.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ericsson-us-discloses-data-breach-as-hackers-steal-employee-and-customer-data</loc>
<lastmod>2026-03-23T04:16:16.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-mediatek-flaw-allows-attackers-to-extract-android-pins-in-under-a-minute</loc>
<lastmod>2026-03-23T04:16:12.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/authorities-disrupt-socksescort-proxy-botnet-exploiting-369000-ips-across-163-countries</loc>
<lastmod>2026-03-23T04:16:03.517Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/security-filters-cant-stop-phishing-emails-made-by-ai</loc>
<lastmod>2026-03-23T04:15:59.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-copilot-email-and-teams-summarization-vulnerability-enables-phishing-attacks</loc>
<lastmod>2026-03-23T04:16:31.947Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/delineas-strongdm-acquisition-highlights-the-changing-role-of-pam</loc>
<lastmod>2026-03-23T04:16:15.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-serious-flaw-in-mediatek-lets-hackers-steal-android-phone-pins-in-less-than-a-minute</loc>
<lastmod>2026-03-23T04:16:12.479Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-mois-colludes-with-criminals-to-boost-cyberattacks</loc>
<lastmod>2026-03-23T04:16:27.143Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/people-who-are-against-commercial-spyware-are-worried-that-us-policy-will-change</loc>
<lastmod>2026-03-23T04:16:10.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-strykers-outage-is-a-disaster-recovery-wake-up-call</loc>
<lastmod>2026-03-23T04:16:53.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platform-hack-more</loc>
<lastmod>2026-03-23T04:16:49.775Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/splunk-rce-vulnerability-allows-attackers-to-execute-arbitrary-shell-commands</loc>
<lastmod>2026-03-23T04:16:47.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays</loc>
<lastmod>2026-03-23T04:16:44.708Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/paloalto-cortex-xdr-broker-vulnerability-attackers-to-obtain-and-modify-sensitive-information</loc>
<lastmod>2026-03-23T04:16:40.575Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos</loc>
<lastmod>2026-03-23T04:16:25.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:25.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-remote-management-tools-to-gain-initial-access-to-corporate-networks</loc>
<lastmod>2026-03-23T04:16:23.846Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ericsson-us-discloses-data-breach-hackers-stolen-employees-and-customers-data</loc>
<lastmod>2026-03-23T04:16:16.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-ios-xr-software-vulnerability-allow-attacker-to-execute-commands-as-root</loc>
<lastmod>2026-03-23T04:16:08.267Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beatbanker-malware-targets-crypto-wallets-with-audio-based-persistence</loc>
<lastmod>2026-03-23T04:16:03.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-web-help-desk-deserialization-vulnerability-enables-command-execution</loc>
<lastmod>2026-03-23T04:16:46.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iranlinked-actors-forge-deeper-ties-with-cybercriminal-networks</loc>
<lastmod>2026-03-23T04:16:27.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-leveraging-cloudflare-anti-bot-features-to-steal-microsoft-365-credentials</loc>
<lastmod>2026-03-23T04:16:24.267Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gitlab-security-update-patch-for-xss-and-api-dos-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:20.318Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-palo-alto-networks-cortex-xdr-broker-vulnerability-allows-attackers-to-access-and-modify-se</loc>
<lastmod>2026-03-23T04:16:12.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-social-engineering-delivers-macsync-infostealer-on-macs</loc>
<lastmod>2026-03-23T04:16:09.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-security-update-patch-for-29-vulnerabilities-that-allow-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:06.536Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/castlerat-exploits-deno-runtime-to-bypass-enterprise-security</loc>
<lastmod>2026-03-23T04:16:05.633Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload</loc>
<lastmod>2026-03-23T04:16:02.871Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-exploit</loc>
<lastmod>2026-03-23T04:16:01.650Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unc6426-turns-npm-supplychain-breach-into-full-aws-admin-access</loc>
<lastmod>2026-03-23T04:16:51.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stryker-corporation-hit-by-cyberattack-as-hackers-claim-system-breach-and-device-wipe</loc>
<lastmod>2026-03-23T04:16:47.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets</loc>
<lastmod>2026-03-23T04:16:46.190Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-finalizes-32-billion-acquisition-of-wiz-in-landmark-cybersecurity-deal</loc>
<lastmod>2026-03-23T04:16:21.490Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-completes-acquisition-of-wiz-in-historic-32-billion-deal</loc>
<lastmod>2026-03-23T04:16:21.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-chrome-security-update-fixes-29-vulnerabilities-including-remote-code-execution-flaws</loc>
<lastmod>2026-03-23T04:16:21.114Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-actively-exploited-n8n-rce-bug-as-24700-instances-remain-exposed</loc>
<lastmod>2026-03-23T04:16:07.039Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-cumulative-updates-for-windows-11-25h224h2-and-23h2</loc>
<lastmod>2026-03-23T04:16:33.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/xygeni-github-action-compromised-via-tag-poison</loc>
<lastmod>2026-03-23T04:16:54.253Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/instagram-down-new-outage-causes-widespread-disruption-in-posting-and-dm-functionality</loc>
<lastmod>2026-03-23T04:16:26.483Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/inc-ransomware-group-holds-healthcare-hostage-in-oceania</loc>
<lastmod>2026-03-23T04:16:26.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-scale-early-threat-detection-in-your-soc-without-extra-staff</loc>
<lastmod>2026-03-23T04:16:25.464Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gogs-vulnerability-lets-attackers-quietly-overwrite-big-file-storage-objects</loc>
<lastmod>2026-03-23T04:16:20.660Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four-minutes</loc>
<lastmod>2026-03-23T04:16:43.379Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credentials</loc>
<lastmod>2026-03-23T04:16:12.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-nexus-actors-move-their-attention-to-qatar-because-of-the-war-in-iran</loc>
<lastmod>2026-03-23T04:16:06.356Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/what-boards-must-demand-in-the-age-of-ai-automated-exploitation</loc>
<lastmod>2026-03-23T04:16:52.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vietnam-based-fraud-network-powers-large-scale-account-signup-abuse</loc>
<lastmod>2026-03-23T04:16:51.727Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unc6426-exploits-nx-npm-supply-chain-attack-to-gain-aws-admin-access-in-72-hours</loc>
<lastmod>2026-03-23T04:16:51.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/red-alert-app-trojan-targets-israeli-users-steals-sensitive-data-through-sms</loc>
<lastmod>2026-03-23T04:16:42.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/middle-east-conflict-highlights-cloud-resilience-gaps</loc>
<lastmod>2026-03-23T04:16:34.517Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-sql-server-zero-day-vulnerability-allows-attackers-to-escalate-privileges</loc>
<lastmod>2026-03-23T04:16:33.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days</loc>
<lastmod>2026-03-23T04:16:33.279Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patches-83-cves-in-march-update</loc>
<lastmod>2026-03-23T04:16:33.219Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-net-0-day-vulnerability-enables-denial-of-service-attacks</loc>
<lastmod>2026-03-23T04:16:32.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crackdown</loc>
<lastmod>2026-03-23T04:16:31.335Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/instagram-suffers-global-outage-users-unable-to-post-or-send-messages</loc>
<lastmod>2026-03-23T04:16:26.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/five-malicious-rust-crates-and-ai-bot-exploit-cicd-pipelines-to-steal-developer-secrets</loc>
<lastmod>2026-03-23T04:16:19.038Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dozens-of-vendors-patch-security-flaws-across-enterprise-software-and-network-devices</loc>
<lastmod>2026-03-23T04:16:15.864Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-microsoft-office-vulnerability-enables-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:12.542Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blacksanta-edr-killer-malware-attacks-hr-workflows-in-a-multi-layered-way</loc>
<lastmod>2026-03-23T04:16:04.838Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zoom-workplace-for-windows-vulnerabilities-allow-privilege-escalation</loc>
<lastmod>2026-03-23T04:16:54.498Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-tool</loc>
<lastmod>2026-03-23T04:16:49.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-zero-day-scramble-is-avoidable-a-guide-to-attack-surface-reduction</loc>
<lastmod>2026-03-23T04:16:48.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/scamagent-ai-agent-built-by-researchers-that-run-fully-autonomous-scam-calls</loc>
<lastmod>2026-03-23T04:16:45.100Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sap-security-update-patch-for-multiple-vulnerabilities-that-enable-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:44.943Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sap-releases-security-update-to-patch-multiple-remote-code-execution-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:44.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-threat-actor-sednit-resurfaces-with-sophisticated-toolkit</loc>
<lastmod>2026-03-23T04:16:44.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/overly-permissive-salesforce-cloud-configs-in-the-crosshairs</loc>
<lastmod>2026-03-23T04:16:40.116Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-to-acquire-promptfoo-to-fix-vulnerabilities-in-ai-systems</loc>
<lastmod>2026-03-23T04:16:38.840Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-acquires-promptfoo-to-strengthen-ai-security-and-fix-system-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:38.485Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-queries</loc>
<lastmod>2026-03-23T04:16:36.339Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patch-tuesday-march-2026-78-vulnerabilities-fixed-including-one-0-day</loc>
<lastmod>2026-03-23T04:16:33.046Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malformed-zip-files-allows-attackers-to-bypass-antivirus-and-edr-detections</loc>
<lastmod>2026-03-23T04:16:29.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malformed-zip-files-allow-attackers-to-bypass-antivirus-and-edr-detection</loc>
<lastmod>2026-03-23T04:16:29.720Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/macos-users-at-risk-as-critical-exiftool-bug-allows-image-based-code-execution</loc>
<lastmod>2026-03-23T04:16:29.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kali-linux-enhances-ai-driven-penetration-testing-with-local-ollama-5ire-and-mcp-kali-server</loc>
<lastmod>2026-03-23T04:16:27.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kadnap-malware-infects-14000-edge-devices-to-power-stealth-proxy-botnet</loc>
<lastmod>2026-03-23T04:16:27.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ivanti-desktop-and-server-management-vulnerability-allows-attackers-to-escalate-privileges</loc>
<lastmod>2026-03-23T04:16:27.327Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iphone-hacking-toolkit-used-by-russian-spies-likely-developed-by-us-contractor</loc>
<lastmod>2026-03-23T04:16:26.958Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iphone-exploit-toolkit-used-by-russian-spies-likely-originated-from-us-contractor</loc>
<lastmod>2026-03-23T04:16:26.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows</loc>
<lastmod>2026-03-23T04:16:25.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-attack-employees-over-microsoft-teams-to-trick-them-into-granting-remote-access</loc>
<lastmod>2026-03-23T04:16:23.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostclaw-mimic-as-openclaw-to-steal-everything-from-developers</loc>
<lastmod>2026-03-23T04:16:20.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-fortimanager-fgtupdates-vulnerability-allows-attackers-to-execute-malicious-commands</loc>
<lastmod>2026-03-23T04:16:19.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortigate-devices-exploited-to-breach-networks-and-steal-service-account-credentials</loc>
<lastmod>2026-03-23T04:16:19.410Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-github-repos-push-boryptgrab-stealer-to-harvest-browser-and-wallet-data</loc>
<lastmod>2026-03-23T04:16:17.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-cleanmymac-website-pushes-shub-stealer-to-drain-crypto-wallet-data</loc>
<lastmod>2026-03-23T04:16:17.800Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-pingora-vulnerabilities-expose-cloudflare-to-request-smuggling-and-cache-poisoning-attacks</loc>
<lastmod>2026-03-23T04:16:12.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cloudflare-pingora-vulnerabilities-allows-request-smuggling-cache-poisoning-attacks</loc>
<lastmod>2026-03-23T04:16:10.293Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-ivanti-endpoint-manager-authentication-bypass-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.822Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-exploited</loc>
<lastmod>2026-03-23T04:16:07.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-apt-campaign-targets-qatar-with-plugx-lures-tied-to-middle-east-conflict</loc>
<lastmod>2026-03-23T04:16:06.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blacksanta-edr-killer-targets-hr-workflows</loc>
<lastmod>2026-03-23T04:16:04.909Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt28-uses-beardshell-and-covenant-malware-to-spy-on-ukrainian-military</loc>
<lastmod>2026-03-23T04:16:02.143Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apache-zookeeper-vulnerability-allow-attackers-to-access-sensitive-data</loc>
<lastmod>2026-03-23T04:16:01.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-is-modifying-file-based-security-regulations</loc>
<lastmod>2026-03-23T04:16:00.127Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iran-linked-hackers-target-us-critical-infrastructure-amid-rising-cyber-threat-activity</loc>
<lastmod>2026-03-23T04:16:27.101Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/boryptgrab-stealer-steals-browser-and-crypto-wallet-data-and-spreads-via-false-github-repositories</loc>
<lastmod>2026-03-23T04:16:05.226Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/white-house-cyber-strategy-prioritizes-offense</loc>
<lastmod>2026-03-23T04:16:53.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vietnam-based-cybercrime-network-enables-fraudulent-account-signups-at-scale</loc>
<lastmod>2026-03-23T04:16:51.663Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/signal-confirms-targeted-phishing-attacks-resulting-in-account-takeovers</loc>
<lastmod>2026-03-23T04:16:45.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-launches-copilot-cowork-a-new-ai-feature-in-microsoft-365-to-automate-tasks</loc>
<lastmod>2026-03-23T04:16:32.805Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/maas-vip-keylogger-campaign-uses-steganography-and-in-memory-execution-to-steal-credentials-at-scale</loc>
<lastmod>2026-03-23T04:16:29.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/m365pwned-red-team-gui-toolkit-for-graph-api-based-microsoft-365-exploitation</loc>
<lastmod>2026-03-23T04:16:29.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials</loc>
<lastmod>2026-03-23T04:16:30.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/installfix-attacks-spread-fake-claude-code-sites</loc>
<lastmod>2026-03-23T04:16:26.597Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/are-we-prepared-for-agentic-ai-powered-auto-remediation</loc>
<lastmod>2026-03-23T04:16:02.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work-device</loc>
<lastmod>2026-03-23T04:16:51.059Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/transparent-tribes-vibeware-shift-signals-rise-of-ai-generated-malware-at-industrial-scale</loc>
<lastmod>2026-03-23T04:16:50.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hikvision-multiple-products-vulnerability-allows-malicious-users-to-escalate-privileges</loc>
<lastmod>2026-03-23T04:16:24.977Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-nginx-ui-vulnerabilities-allow-attacker-to-download-a-full-system-backup</loc>
<lastmod>2026-03-23T04:16:12.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-exiftool-flaw-lets-malicious-images-trigger-code-execution-on-macos</loc>
<lastmod>2026-03-23T04:16:11.449Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clipxdaemon-emerges-as-c2-less-linux-clipboard-hijacker-targeting-crypto-wallets-in-x11-sessions</loc>
<lastmod>2026-03-23T04:16:10.167Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-cyber-threat-lurks-in-critical-asian-sectors-for-years</loc>
<lastmod>2026-03-23T04:16:06.213Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-linked-cl-unk-1068-espionage-campaign-targets-critical-infrastructure-across-asia</loc>
<lastmod>2026-03-23T04:16:06.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/can-the-security-platform-finally-deliver-for-the-mid-market</loc>
<lastmod>2026-03-23T04:16:05.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apache-zookeeper-vulnerability-allows-attackers-to-access-sensitive-data</loc>
<lastmod>2026-03-23T04:16:01.318Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malware</loc>
<lastmod>2026-03-23T04:15:58.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zitadels-1-click-vulnerability-allows-attackers-to-take-over-entire-systems</loc>
<lastmod>2026-03-23T04:15:57.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wifi-signals-reveal-human-activities-through-walls-by-mapping-body-keypoints</loc>
<lastmod>2026-03-23T04:16:53.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/web-server-exploits-and-mimikatz-used-in-attacks-targeting-asian-critical-infrastructure</loc>
<lastmod>2026-03-23T04:16:52.632Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-linux-rootkits-leverage-ebpf-and-io-uring-for-stealth</loc>
<lastmod>2026-03-23T04:16:36.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-fake-ai-browser-extensions-compromised-chat-histories-across-20000-enterprise-tenant</loc>
<lastmod>2026-03-23T04:16:34.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-windows-terminal-in-new-clickfix-malware-attack</loc>
<lastmod>2026-03-23T04:16:23.957Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-imtoken-browser-extension-targets-crypto-wallet-credentials</loc>
<lastmod>2026-03-23T04:16:18.075Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-ai-browser-extensions-expose-chat-data-across-20000-enterprises</loc>
<lastmod>2026-03-23T04:16:17.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-macos-and-ios-vulnerabilities-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/after-ownership-is-transferred-the-chrome-extension-becomes-malicious-allowing-code-injection-and-da</loc>
<lastmod>2026-03-23T04:16:06.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/when-auto-updates-become-attack-paths</loc>
<lastmod>2026-03-23T04:16:53.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trojanized-gaming-tools-spread-java-based-rat-via-browser-and-chat-platforms</loc>
<lastmod>2026-03-23T04:16:50.496Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks</loc>
<lastmod>2026-03-23T04:16:45.202Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-rolls-out-codex-security-in-research-preview-for-contextaware-vulnerability-detection</loc>
<lastmod>2026-03-23T04:16:38.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-confirms-chatgpts-role-in-chinese-cyberattack-campaigns</loc>
<lastmod>2026-03-23T04:16:38.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-apt37-hackers-leverages-novel-malware-to-infect-airgapped-systems</loc>
<lastmod>2026-03-23T04:16:37.800Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-defender-uncovers-trojanized-gaming-utility-campaign-targeting-users-with-rats-and-remote-</loc>
<lastmod>2026-03-23T04:16:32.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-defender-expands-url-click-alerts-to-include-microsoft-teams-for-enhanced-security-visibil</loc>
<lastmod>2026-03-23T04:16:32.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/juniper-networks-ptx-vulnerability-enables-full-router-takeover</loc>
<lastmod>2026-03-23T04:16:27.606Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-manipulate-ai-via-indirect-prompt-injection</loc>
<lastmod>2026-03-23T04:16:24.419Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-macos-and-ios-vulnerabilities-cisa-issues-urgent-security-alert</loc>
<lastmod>2026-03-23T04:16:23.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fraudulent-chatgpt-and-gemini-ios-apps-target-users-in-new-phishing-scheme</loc>
<lastmod>2026-03-23T04:16:19.768Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-zyxel-vulnerabilities-exposes-routers-to-remote-command-injection</loc>
<lastmod>2026-03-23T04:16:14.149Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-trend-micro-apex-one-flaws-enable-remote-malicious-code-execution</loc>
<lastmod>2026-03-23T04:16:13.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-just-14-days-claude-ai-finds-22-significant-flaws-in-the-firefox-browser</loc>
<lastmod>2026-03-23T04:16:08.594Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/belarusian-kgb-gains-persistent-control-through-residentbat-android-malware</loc>
<lastmod>2026-03-23T04:16:03.984Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whether-were-ready-or-not-ai-is-changing-security</loc>
<lastmod>2026-03-23T04:16:00.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/known-exploited-vulnerabilities-in-active-software-were-discovered-in-87-of-exposed-organizations</loc>
<lastmod>2026-03-23T04:15:58.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/steaelite-rat-powers-new-wave-of-double-extortion-attacks-on-enterprises</loc>
<lastmod>2026-03-23T04:16:47.394Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/seaflower-backdoor-campaign-exploits-web3-wallets-to-harvest-seed-phrases</loc>
<lastmod>2026-03-23T04:16:45.319Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-defender-enhances-security-visibility-with-url-click-alerts-for-teams</loc>
<lastmod>2026-03-23T04:16:32.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-scams</loc>
<lastmod>2026-03-23T04:16:31.413Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/juniper-ptx-routers-at-risk-as-critical-vulnerability-enables-full-device-takeover</loc>
<lastmod>2026-03-23T04:16:27.677Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-api-keys-expose-private-data-silently-through-gemini</loc>
<lastmod>2026-03-23T04:16:20.837Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-code-hacked-to-achieve-full-rce-and-hijacked-organization-api-keys</loc>
<lastmod>2026-03-23T04:16:08.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/one-million-dutch-telco-odido-records-were-made-available-online-following-an-attempt-at-extortion</loc>
<lastmod>2026-03-23T04:15:57.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/marquis-v-sonicwall-lawsuit-ups-the-breach-blame-game</loc>
<lastmod>2026-03-23T04:16:31.090Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-years-of-cisco-sd-wan-zero-day-exploitation</loc>
<lastmod>2026-03-23T04:16:08.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wireshark-464-released-with-patches-for-multiple-security-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:54.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wireshark-464-released-with-fix-for-multiple-security-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:53.983Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uat-10027-targets-us-education-and-healthcare-with-dohdoor-backdoor</loc>
<lastmod>2026-03-23T04:16:50.628Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15-stories</loc>
<lastmod>2026-03-23T04:16:49.707Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/steaelite-rat-fuels-new-wave-of-double-extortion-threats-targeting-enterprises</loc>
<lastmod>2026-03-23T04:16:47.348Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sophisticated-seaflower-backdoor-campaign-targets-web3-wallets-to-steal-seed-phrases</loc>
<lastmod>2026-03-23T04:16:46.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-confirms-that-chinese-hackers-used-chatgpt-to-launch-cyberattacks</loc>
<lastmod>2026-03-23T04:16:38.618Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-claude-code-enables-remote-control-of-your-terminal-session-from-your-phone</loc>
<lastmod>2026-03-23T04:16:35.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/darkcloud-infostealer-emerges-as-major-threat-with-scalable-credential-theft-targeting-enterprises</loc>
<lastmod>2026-03-23T04:16:15.161Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-servicenow-ai-platform-vulnerability-enables-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:13.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/botnet-stores-for-aeternum-c2-polygon-blockchain-encrypted-commands-to-avoid-takedown</loc>
<lastmod>2026-03-23T04:15:59.368Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-released-for-windows-vulnerability-that-allows-attackers-to-cause-unrecoverable-bsod-crashes</loc>
<lastmod>2026-03-23T04:16:41.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-developers-of-fake-nextjs-job-repos-delivering-in-memory-malware</loc>
<lastmod>2026-03-23T04:16:34.280Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/marquis-files-lawsuit-against-sonicwall-after-backup-breach-triggers-ransomware-incident</loc>
<lastmod>2026-03-23T04:16:31.035Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-stripeapi-nuget-package-mimicked-official-library-and-stole-api-tokens</loc>
<lastmod>2026-03-23T04:16:30.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kali-linux-integrates-claude-ai-for-penetration-testing-via-model-context-protocol</loc>
<lastmod>2026-03-23T04:16:27.835Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hacker-jailbreaks-claude-ai-to-generate-exploit-code-and-exfiltrate-government-data</loc>
<lastmod>2026-03-23T04:16:22.461Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-disrupts-chinese-hackers-infrastructre-which-breached-53-telecom-and-government-entities</loc>
<lastmod>2026-03-23T04:16:21.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/firefox-148-released-with-sanitizer-api-to-disable-xss-attack</loc>
<lastmod>2026-03-23T04:16:18.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/expert-recommends-prepare-for-pqc-right-now</loc>
<lastmod>2026-03-23T04:16:17.197Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-zyxel-router-vulnerabilities-allow-remote-command-injection-attacks</loc>
<lastmod>2026-03-23T04:16:14.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-servicenow-ai-platform-flaw-allows-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:12.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-claude-code-vulnerabilities-enables-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:11.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-27-year-old-telnet-vulnerability-gives-attackers-root-access</loc>
<lastmod>2026-03-23T04:15:57.759Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mozilla-releases-firefox-148-with-new-sanitizer-api-to-block-xss-attacks</loc>
<lastmod>2026-03-23T04:16:34.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kali-linux-integrates-claude-ai-via-model-context-protocol-to-enhance-offensive-security</loc>
<lastmod>2026-03-23T04:16:27.884Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hacker-jailbreaks-claude-ai-to-write-exploit-code-and-steal-government-data</loc>
<lastmod>2026-03-23T04:16:22.521Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-cisco-sd-wan-0-day-vulnerability-exploited-since-2023-to-gain-root-access</loc>
<lastmod>2026-03-23T04:16:11.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023-for-admin-access</loc>
<lastmod>2026-03-23T04:16:08.404Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-sd-wan-zero-day-under-active-exploitation-grants-attackers-root-level-control</loc>
<lastmod>2026-03-23T04:16:08.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-police-use-chatgpt-to-smear-japan-pm-takaichi</loc>
<lastmod>2026-03-23T04:16:06.402Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-presents-claude-code-a-remote-terminal-control-system-for-mobile-devices</loc>
<lastmod>2026-03-23T04:16:00.690Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-using-fake-avast-website-to-harvest-users-credit-card-details</loc>
<lastmod>2026-03-23T04:16:49.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/surxrat-android-rat-attacking-users-gain-complete-device-control-and-data-exfiltration</loc>
<lastmod>2026-03-23T04:16:47.984Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-code-errors-endanger-developers-computers</loc>
<lastmod>2026-03-23T04:16:19.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ramp-forum-seizure-fractures-ransomware-ecosystem</loc>
<lastmod>2026-03-23T04:16:42.444Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pci-council-says-threats-to-payments-systems-are-speeding-up</loc>
<lastmod>2026-03-23T04:16:40.978Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oauth-attacks-in-entra-id-can-leverage-chatgpt-to-compromise-user-email-accounts</loc>
<lastmod>2026-03-23T04:16:38.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-soc-analysts-can-save-28-minutes-per-alert-review</loc>
<lastmod>2026-03-23T04:16:25.363Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-verifies-active-filezen-vulnerability-exploitation</loc>
<lastmod>2026-03-23T04:16:06.988Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-call-this-number-toad-emails-beat-gateways</loc>
<lastmod>2026-03-23T04:16:53.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-5-ways-broken-triage-increases-business-risk-instead-of-reducing-it</loc>
<lastmod>2026-03-23T04:16:50.071Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-critical-serv-u-vulnerabilities-enables-root-access</loc>
<lastmod>2026-03-23T04:16:46.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/slh-offers-5001000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks</loc>
<lastmod>2026-03-23T04:16:46.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-extends-dlp-support-for-copilot-to-prevent-sensitive-file-processing</loc>
<lastmod>2026-03-23T04:16:33.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-nextjs-repos-target-developers-via-fake-job-interviews</loc>
<lastmod>2026-03-23T04:16:30.141Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries</loc>
<lastmod>2026-03-23T04:16:21.426Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-code-errors-permit-api-key-exfiltration-and-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:08.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-exploit-apache-activemq-server-vulnerability-to-gain-rdp-access-and-deploy-lockbit-ran</loc>
<lastmod>2026-03-23T04:16:48.833Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/surxrat-malware-gives-hackers-complete-access-to-android-devices</loc>
<lastmod>2026-03-23T04:16:48.044Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-serv-u-critical-vulnerabilities-allow-attackers-to-gain-root-access</loc>
<lastmod>2026-03-23T04:16:46.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/richter-scale-model-measures-magnitude-of-ot-cyber-incidents</loc>
<lastmod>2026-03-23T04:16:43.810Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-vulnerabilities-in-cpsd-cryptopro-secure-disk-for-bitlocker-allow-root-access-and-credentia</loc>
<lastmod>2026-03-23T04:16:35.109Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-of-hackers-attacking-developers-with-malicious-nextjs-repositories</loc>
<lastmod>2026-03-23T04:16:34.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-stop-support-for-windows-server-2016-and-windows-10-2016</loc>
<lastmod>2026-03-23T04:16:33.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-released-updates-for-windows-11-version-25h2-and-24h2-systems</loc>
<lastmod>2026-03-23T04:16:33.384Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/manual-processes-are-putting-national-security-at-risk</loc>
<lastmod>2026-03-23T04:16:30.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-nuget-packages-stole-aspnet-data-npm-package-dropped-malware</loc>
<lastmod>2026-03-23T04:16:30.466Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-chatgpt-in-oauth-attacks-to-breach-entra-id-and-access-emails</loc>
<lastmod>2026-03-23T04:16:24.652Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-active-exploitation-of-filezen-vulnerability</loc>
<lastmod>2026-03-23T04:16:07.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lockbit-ransomware-is-deployed-via-rdp-access-using-an-apache-activemq-vulnerability</loc>
<lastmod>2026-03-23T04:16:01.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zerodayrat-malware-targets-android-and-ios-stealing-sensitive-data-from-millions</loc>
<lastmod>2026-03-23T04:16:54.404Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-slaps-sanctions-on-exploit-brokers-linked-to-theft-of-government-hacking-tools</loc>
<lastmod>2026-03-23T04:16:51.442Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-sanctions-network-of-exploit-brokers-that-stole-us-government-cyber-tools</loc>
<lastmod>2026-03-23T04:16:51.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-patches-4-critical-serv-u-155-flaws-allowing-root-code-execution</loc>
<lastmod>2026-03-23T04:16:46.562Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/operation-red-card-20-leads-to-651-arrests-in-africa</loc>
<lastmod>2026-03-23T04:16:39.683Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-malware-tricks-users-into-amos-infection-via-password-entry</loc>
<lastmod>2026-03-23T04:16:39.325Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nuget-package-exploit-steals-login-credentials-from-aspnet-developers</loc>
<lastmod>2026-03-23T04:16:38.319Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/github-copilot-exploited-to-perform-full-repository-takeover-via-passive-prompt-injection</loc>
<lastmod>2026-03-23T04:16:20.128Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/defense-contractor-employee-jailed-for-selling-8-zero-days-to-russian-broker</loc>
<lastmod>2026-03-23T04:16:15.348Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-verifies-active-filezen-cve-2026-25108-vulnerability-exploitation</loc>
<lastmod>2026-03-23T04:16:06.939Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-weaponized-ai-tools-to-gain-full-domain-access-within-30-minutes</loc>
<lastmod>2026-03-23T04:16:49.350Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/65-of-financial-institutions-ransomware-targeted-as-cybercriminals-increase-attacks</loc>
<lastmod>2026-03-23T04:15:58.253Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacking-aspnet-developers-with-malicious-nuget-packages-to-steal-login-credentials</loc>
<lastmod>2026-03-23T04:16:30.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/reddit-fined-1447-million-by-uk-regulator-for-childrens-privacy-failures</loc>
<lastmod>2026-03-23T04:16:42.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-group-picks-a-new-poison-medusa-ransomware</loc>
<lastmod>2026-03-23T04:16:28.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-now-take-control-of-a-network-in-just-29-minutes</loc>
<lastmod>2026-03-23T04:16:03.038Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-five-cyberdefense-recommendations-for-2026</loc>
<lastmod>2026-03-23T04:16:50.165Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/roguepilot-flaw-in-github-codespaces-enabled-copilot-to-leak-github-token</loc>
<lastmod>2026-03-23T04:16:43.969Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-deserialization-vulnerability-in-ruby-workers-could-enable-full-system-compromise</loc>
<lastmod>2026-03-23T04:16:36.153Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-openclaw-skills-used-to-trick-users-into-manual-password-entry-for-amos-infection</loc>
<lastmod>2026-03-23T04:16:30.510Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-leverage-steganographic-images-to-bypass-anti-malware-scans-and-deploy-malware-payloads</loc>
<lastmod>2026-03-23T04:16:24.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-huorong-download-site-used-to-deploy-valleyrat-backdoor-in-targeted-malware-campaign</loc>
<lastmod>2026-03-23T04:16:17.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/diesel-vortex-russian-cybercrime-group-targets-global-logistics-sector-and-steals-1600-credentials</loc>
<lastmod>2026-03-23T04:16:15.634Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uses-of-clickfix-infostealer-campaigns-false-captcha-attracts-victims-to-compromise</loc>
<lastmod>2026-03-23T04:16:09.908Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware</loc>
<lastmod>2026-03-23T04:16:50.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shinyhunters-allegedly-claim-breach-of-21-million-records-from-odido</loc>
<lastmod>2026-03-23T04:16:45.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-releases-2026223-released-with-security-updates-and-new-ai-features</loc>
<lastmod>2026-03-23T04:16:39.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-vmware-aria-vulnerabilities-enable-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:35.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-vmware-aria-vulnerabilities-allow-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:34.949Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-dashboards-ai-decisions-must-be-provable</loc>
<lastmod>2026-03-23T04:16:34.666Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-group-uses-medusa-ransomware-in-middle-east-and-us-healthcare-attacks</loc>
<lastmod>2026-03-23T04:16:28.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/identity-prioritization-isnt-a-backlog-problem-its-a-risk-math-problem</loc>
<lastmod>2026-03-23T04:16:25.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-deepseek-and-claude-to-launch-global-attack-on-fortigate-devices</loc>
<lastmod>2026-03-23T04:16:24.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-abuse-windows-management-instrumentation-wmi-for-stealthy-persistence</loc>
<lastmod>2026-03-23T04:16:22.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-lures-deploy-clickfix-infostealer-in-widespread-attack</loc>
<lastmod>2026-03-23T04:16:17.736Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/elon-musk-accuses-anthropic-of-stealing-data-in-a-massive-scale</loc>
<lastmod>2026-03-23T04:16:16.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vc-market-soars-as-cybersecurity-companies-pursue-ai</loc>
<lastmod>2026-03-23T04:16:02.487Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-introduces-optional-account-password-feature-to-strengthen-login-security</loc>
<lastmod>2026-03-23T04:16:52.976Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-backdoors</loc>
<lastmod>2026-03-23T04:16:51.301Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/starkiller-phishing-framework-proxies-real-login-pages-to-evade-mfa</loc>
<lastmod>2026-03-23T04:16:47.301Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-leverage-deepseek-and-claude-to-attack-fortigate-devices-worldwide</loc>
<lastmod>2026-03-23T04:16:24.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/graycharlie-campaign-compromises-wordpress-sites-to-spread-netsupport-rat-and-steal-data</loc>
<lastmod>2026-03-23T04:16:22.177Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-chrome-emergency-security-update-patches-three-high-severity-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:21.039Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-ruby-worker-deserialization-flaw-opens-door-to-complete-system-takeover</loc>
<lastmod>2026-03-23T04:16:12.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-claude-faces-large-scale-distillation-attacks-by-chinese-ai-labs-involving-13-million-exch</loc>
<lastmod>2026-03-23T04:16:00.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-bounty-of-over-10000-is-being-offered-to-hackers-who-can-disconnect-ring-video-doorbells-from-amaz</loc>
<lastmod>2026-03-23T04:15:57.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-hackers-use-fake-it-worker-scheme-to-infiltrate-firms</loc>
<lastmod>2026-03-23T04:16:37.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-rushes-emergency-chrome-update-to-fix-three-high-severity-security-flaws</loc>
<lastmod>2026-03-23T04:16:21.868Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-claims-that-16-million-claude-queries-were-used-by-chinese-ai-companies-to-replicate-the-m</loc>
<lastmod>2026-03-23T04:16:01.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-largest-data-breach-in-us-history-conduent-occurred-when-a-ransomware-group-stole-8-tb-of-data</loc>
<lastmod>2026-03-23T04:16:10.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/spitting-cash-atm-jackpotting-attacks-surged-in-2025</loc>
<lastmod>2026-03-23T04:16:47.101Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/an-ai-armed-amateur-hacked-more-than-600-fortigate-devices</loc>
<lastmod>2026-03-23T04:15:58.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-threat-actors-leverage-fake-it-worker-campaigns-and-contagious-interview-tactics</loc>
<lastmod>2026-03-23T04:16:37.932Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-phishing-framework-starkiller-proxies-real-login-pages-to-bypass-mfa</loc>
<lastmod>2026-03-23T04:16:36.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-mimicrat-custom-rat-uncovered-in-sophisticated-multi-stage-clickfix-campaign</loc>
<lastmod>2026-03-23T04:16:36.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-mfa-down-504-gateway-timeout-errors-disrupting-mfa-access-for-us-users</loc>
<lastmod>2026-03-23T04:16:32.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/irans-muddywater-targets-orgs-with-fresh-malware-as-tensions-mount</loc>
<lastmod>2026-03-23T04:16:27.237Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/enigma-cipher-device-still-holds-secrets-for-cyber-pros</loc>
<lastmod>2026-03-23T04:16:16.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt28-used-webhook-based-macro-malware-to-target-european-organizations</loc>
<lastmod>2026-03-23T04:16:02.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb</loc>
<lastmod>2026-03-23T04:16:54.202Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actor-allegedly-claimed-leak-of-wendys-international-franchise-database</loc>
<lastmod>2026-03-23T04:16:48.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-exploit-released-for-grandstream-gxp1600-voip-phones-rce-vulnerability</loc>
<lastmod>2026-03-23T04:16:41.517Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/jspdf-vulnerability-exposes-millions-of-developers-to-object-injection-attacks</loc>
<lastmod>2026-03-23T04:16:27.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-vulnerability-in-the-hpe-telco-service-activator-allows-attackers-to-circumvent-access-restriction</loc>
<lastmod>2026-03-23T04:16:25.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silver-fox-apt-uses-dll-sideloading-and-byovd-techniques-in-sophisticated-malware-attacks</loc>
<lastmod>2026-03-23T04:16:45.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silver-fox-apt-exploits-dll-sideloading-and-byovd-in-stealth-campaign</loc>
<lastmod>2026-03-23T04:16:45.906Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/owasp-smart-contract-top-10-2026-security-risks-and-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:40.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-exposed-endpoints-increase-risk-across-llm-infrastructure</loc>
<lastmod>2026-03-23T04:16:25.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-suspends-openclaw-users-from-antigravity-ai-after-oauth-token-abuse</loc>
<lastmod>2026-03-23T04:16:21.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fbi-warns-of-ploutus-malware-draining-us-atms-without-cards</loc>
<lastmod>2026-03-23T04:16:18.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dprk-linked-operators-sustain-aggressive-crypto-targeting-12-months-after-bybit-breach</loc>
<lastmod>2026-03-23T04:16:16.042Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-multiple-roundcube-vulnerabilities-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:08.029Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-docker-malware-30tbps-ddos-promptspy-ai-double-tap-skimmers-and-more</loc>
<lastmod>2026-03-23T04:15:58.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-allegedly-selling-whatsapp-crash-exploit-on-hacking-forums</loc>
<lastmod>2026-03-23T04:16:48.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/study-finds-llm-generated-passwords-highly-predictable-and-repetitive</loc>
<lastmod>2026-03-23T04:16:47.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-koreatied-operators-sustain-aggressive-crypto-targeting-campaign</loc>
<lastmod>2026-03-23T04:16:38.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-charliekirk-grabber-malware-steals-login-data-from-windows-pcs</loc>
<lastmod>2026-03-23T04:16:35.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens</loc>
<lastmod>2026-03-23T04:16:30.363Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-blocked-175-million-malicious-apps-from-entering-into-the-play-store</loc>
<lastmod>2026-03-23T04:16:20.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacks-in-progress-use-vshell-and-sparkrat-payloads-to-target-the-beyondtrust-vulnerability</loc>
<lastmod>2026-03-23T04:15:58.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-target-microsoft-365-accounts-in-oauth-token-theft-operation</loc>
<lastmod>2026-03-23T04:16:49.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/securing-the-modern-workplace-why-application-and-third-party-security-cant-be-ignored</loc>
<lastmod>2026-03-23T04:16:45.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-ai-malware-promptspy-uses-googles-gemini-for-android-attacks</loc>
<lastmod>2026-03-23T04:16:35.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/muddywater-uses-ghostfetch-char-and-http-vip-to-target-mena-organizations</loc>
<lastmod>2026-03-23T04:16:34.906Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cloudflare-down-customers-cannot-access-the-internet-for-six-hours-due-to-a-massive-worldwide-servic</loc>
<lastmod>2026-03-23T04:16:10.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/superclaw-open-source-framework-to-red-team-ai-agents-for-security-testing</loc>
<lastmod>2026-03-23T04:16:47.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-shai-huludlike-npm-worm-attack-19-packages-to-steal-devci-secrets</loc>
<lastmod>2026-03-23T04:16:36.956Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stocks-of-cybersecurity-companies-plummet-as-anthropogenic-releases-the-claude-security-tool</loc>
<lastmod>2026-03-23T04:16:14.992Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-launches-claude-code-security-to-scan-codebases-for-security-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:00.882Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-600-fortigate-devices-across-55-countries-are-compromised-by-an-ai-assisted-threat-actor</loc>
<lastmod>2026-03-23T04:15:59.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-readiness-and-security</loc>
<lastmod>2026-03-23T04:16:16.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-introduces-claude-code-security-an-ai-vulnerability-scanning-tool-for-codebase-scanning</loc>
<lastmod>2026-03-23T04:16:00.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog</loc>
<lastmod>2026-03-23T04:16:06.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning</loc>
<lastmod>2026-03-23T04:16:00.828Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-jenkins-vulnerability-exposes-build-environments-to-xss-attacks</loc>
<lastmod>2026-03-23T04:16:12.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-check-for-react2shell-exposure-using-a-new-tool</loc>
<lastmod>2026-03-23T04:16:03.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lessons-from-ai-hacking-every-model-every-layer-is-risky</loc>
<lastmod>2026-03-23T04:16:29.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-agents-disregard-security-policies-in-god-like-attack-machines</loc>
<lastmod>2026-03-23T04:16:20.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-released-for-windows-notepad-vulnerability-that-enables-malicious-command-execution</loc>
<lastmod>2026-03-23T04:16:41.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-released-for-windows-notepad-vulnerability-enabling-malicious-command-execution</loc>
<lastmod>2026-03-23T04:16:41.634Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ploutus-malware-drains-us-atms-without-a-card-or-account-fbi-issues-emergency-flash-alert</loc>
<lastmod>2026-03-23T04:16:41.463Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/paypal-data-breach-customers-names-ssns-and-dates-of-birth-exposed</loc>
<lastmod>2026-03-23T04:16:40.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/latin-americas-cyber-maturity-lags-threat-landscape</loc>
<lastmod>2026-03-23T04:16:28.358Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-using-oauth-apps-in-microsoft-entra-id-to-establish-persistence</loc>
<lastmod>2026-03-23T04:16:24.738Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploiting-critical-beyondtrust-vulnerability-to-deploy-vshell-and-sparkrat</loc>
<lastmod>2026-03-23T04:16:22.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-blocks-175-million-malicious-apps-from-entering-the-play-store</loc>
<lastmod>2026-03-23T04:16:20.956Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vulnerabilities-in-vs-code-extensions-threaten-128-million-developer-environments</loc>
<lastmod>2026-03-23T04:16:13.641Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cline-cli-230-supply-chain-attack-installed-openclaw-on-developer-systems</loc>
<lastmod>2026-03-23T04:16:10.126Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-malware</loc>
<lastmod>2026-03-23T04:16:09.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration</loc>
<lastmod>2026-03-23T04:16:04.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-apache-tomcat-allow-attackers-to-get-around-security-measures-with-http09-request</loc>
<lastmod>2026-03-23T04:16:01.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ukrainian-national-sentenced-to-5-years-in-north-korea-it-worker-fraud-case</loc>
<lastmod>2026-03-23T04:16:50.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/silicon-valley-engineers-charged-with-stealing-trade-secrets-from-google-and-other-tech-companies</loc>
<lastmod>2026-03-23T04:16:45.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-released-for-critical-chrome-0-day-vulnerability-exploited-in-the-wild</loc>
<lastmod>2026-03-23T04:16:41.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pentagi-automated-ai-powered-penetration-testing-tool-that-integrates-20-security-tools</loc>
<lastmod>2026-03-23T04:16:41.030Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/llm-generated-passwords-expose-major-security-flaws-with-predictability-repetition-and-weakness</loc>
<lastmod>2026-03-23T04:16:29.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026</loc>
<lastmod>2026-03-23T04:16:25.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-impersonate-google-forms-to-phish-user-login-information</loc>
<lastmod>2026-03-23T04:16:24.073Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/grandstream-voip-phones-flaw-allows-attackers-to-gain-root-level-access</loc>
<lastmod>2026-03-23T04:16:22.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/emerging-chiplet-designs-spark-fresh-cybersecurity-challenges</loc>
<lastmod>2026-03-23T04:16:16.671Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dos-flaws-exposed-in-socomec-diris-m-70-iiot-device-through-fuzzing</loc>
<lastmod>2026-03-23T04:16:15.807Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-rat</loc>
<lastmod>2026-03-23T04:16:09.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinas-two-vulnerability-databases-show-differing-timelines-for-disclosure</loc>
<lastmod>2026-03-23T04:16:05.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/splunk-enterprise-for-windows-vulnerability-let-attackers-hijack-dlls-and-gain-system-access</loc>
<lastmod>2026-03-23T04:16:47.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-issues-emergency-chrome-security-update-to-address-high-severity-pdfium-and-v8-flaws</loc>
<lastmod>2026-03-23T04:16:21.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/former-google-engineers-indicted-over-trade-secret-transfers-to-iran</loc>
<lastmod>2026-03-23T04:16:19.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fbi-reports-1900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025</loc>
<lastmod>2026-03-23T04:16:18.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-leverage-emoji-code-to-evade-traditional-security-measures</loc>
<lastmod>2026-03-23T04:16:14.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cache-deception-vulnerability-found-in-sveltekit-and-vercel-combo-exposes-user-data-to-attackers</loc>
<lastmod>2026-03-23T04:16:05.492Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/c2-servers-used-by-digitstealer-maliciously-target-macos-devices</loc>
<lastmod>2026-03-23T04:16:05.436Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/advanced-malware-gets-around-air-gapped-security-by-using-external-drives</loc>
<lastmod>2026-03-23T04:15:59.311Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-former-google-engineers-indicted-over-trade-secret-transfers-to-iran</loc>
<lastmod>2026-03-23T04:16:49.911Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-attacks-put-corporate-networks-at-risk-by-exploiting-critical-ivanti-epmm-zero-day</loc>
<lastmod>2026-03-23T04:15:58.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/selective-thread-emulation-and-fuzzing-expose-dos-flaws-in-socomec-diris-m-70-iiot-device</loc>
<lastmod>2026-03-23T04:16:45.439Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinas-dual-vulnerability-databases-show-a-different-disclosure-timeline-beyond-cve</loc>
<lastmod>2026-03-23T04:16:04.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/supply-chain-attack-secretly-installs-openclaw-for-cline-users</loc>
<lastmod>2026-03-23T04:16:47.871Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/connected-and-compromised-when-iot-devices-turn-into-threats</loc>
<lastmod>2026-03-23T04:16:10.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/best-in-class-starkiller-phishing-kit-bypasses-mfa</loc>
<lastmod>2026-03-23T04:16:04.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/details-of-abu-dhabi-finance-weeks-exposed-vip-passports</loc>
<lastmod>2026-03-23T04:15:58.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence</loc>
<lastmod>2026-03-23T04:16:42.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/promptspy-first-known-android-ai-malware-uses-googles-gemini-for-decision-making</loc>
<lastmod>2026-03-23T04:16:42.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center</loc>
<lastmod>2026-03-23T04:16:33.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interpol-operation-red-card-20-arrests-651-in-african-cybercrime-crackdown</loc>
<lastmod>2026-03-23T04:16:26.794Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/adidas-data-breach-815000-supposedly-stolen-records</loc>
<lastmod>2026-03-23T04:15:59.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20-stories</loc>
<lastmod>2026-03-23T04:16:49.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-using-fake-google-forms-site-to-harvest-google-logins</loc>
<lastmod>2026-03-23T04:16:49.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-leveraging-nslookupexe-to-stage-payloads-via-dns-using-clickfix-attack</loc>
<lastmod>2026-03-23T04:16:24.358Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-issues-a-honeywell-warning-vulnerabilities-in-cctv-products-cause-account-takeovers</loc>
<lastmod>2026-03-23T04:16:07.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-intelligence-has-a-human-shaped-blind-spot</loc>
<lastmod>2026-03-23T04:16:49.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-defender-unveils-centralized-script-library-with-copilot-analysis-for-enhanced-live-respon</loc>
<lastmod>2026-03-23T04:16:32.273Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-defender-launches-centralized-script-library-with-copilot-powered-analysis</loc>
<lastmod>2026-03-23T04:16:32.151Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/from-exposure-to-exploitation-how-ai-collapses-your-response-window</loc>
<lastmod>2026-03-23T04:16:19.817Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-clickfix-attack-triggers-enterprise-malware-outbreak</loc>
<lastmod>2026-03-23T04:16:17.673Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crypto-scams-sweep-asia-blending-malvertising-and-pig-butchering-tactics</loc>
<lastmod>2026-03-23T04:16:14.193Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-dev-tool-clines-npm-token-hijacked-by-hackers-for-8-hours</loc>
<lastmod>2026-03-23T04:15:59.965Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/advanced-crypto-mining-malware-proliferates-via-air-gapped-systems-and-external-drives</loc>
<lastmod>2026-03-23T04:15:59.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-new-sysupdate-malware-variant-targeting-linux-systems</loc>
<lastmod>2026-03-23T04:16:43.433Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-abuse-nslookupexe-to-stage-payloads-via-dns-in-clickfix-attacks</loc>
<lastmod>2026-03-23T04:16:22.585Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users</loc>
<lastmod>2026-03-23T04:16:18.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware</loc>
<lastmod>2026-03-23T04:16:10.818Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-campaign-uses-homebrew-installer-to-spread-cuckoo-stealer-on-macos</loc>
<lastmod>2026-03-23T04:16:09.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-use-counterfeit-wallets-and-backdoors-in-cryptocurrency-theft-operations</loc>
<lastmod>2026-03-23T04:16:02.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-launches-evmbench-for-blockchain-vulnerability-detection-and-exploitation</loc>
<lastmod>2026-03-23T04:16:38.684Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-40-of-south-africans-were-scammed-in-2025</loc>
<lastmod>2026-03-23T04:16:34.616Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-launch-sophisticated-multi-stage-phishing-campaign-targeting-bookingcom-partners-and-travele</loc>
<lastmod>2026-03-23T04:16:24.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-can-leverage-grok-and-copilot-for-stealthy-malware-communication-and-control</loc>
<lastmod>2026-03-23T04:16:23.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/foxveil-malware-evades-detection-by-leveraging-cloudflare-netlify-and-discord</loc>
<lastmod>2026-03-23T04:16:19.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clawhavoc-uses-1184-malevolent-skills-to-destroy-openclaws-clawhub</loc>
<lastmod>2026-03-23T04:16:09.414Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cryptocurrency-scams-target-asia-combining-malvertising-and-pig-butchering-with-losses-up-to-10-mill</loc>
<lastmod>2026-03-23T04:16:14.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/targeting-corporate-networks-critical-ivanti-epmm-zero-day-vulnerabilities-were-exploited-in-the-wil</loc>
<lastmod>2026-03-23T04:16:11.907Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-clickfix-attack-chain-causes-enterprise-wide-malware-infection-in-companies</loc>
<lastmod>2026-03-23T04:16:17.621Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/scam-abuses-gemini-chatbots-to-convince-people-to-buy-fake-crypto</loc>
<lastmod>2026-03-23T04:16:45.054Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dells-hard-coded-flaw-a-nation-state-goldmine</loc>
<lastmod>2026-03-23T04:16:15.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/highlights-of-important-grandstream-voip-bugs-blind-spot-in-smb-security</loc>
<lastmod>2026-03-23T04:16:11.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-advertising-new-clickfix-payload-that-stores-malware-within-browser-cache</loc>
<lastmod>2026-03-23T04:16:48.684Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-365-exchange-url-filtering-update-quarantines-legitimate-emails-as-phishing</loc>
<lastmod>2026-03-23T04:16:31.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-365-copilot-flaw-allows-ai-assistant-to-summarize-sensitive-emails</loc>
<lastmod>2026-03-23T04:16:31.798Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malware-campaign-delivers-remote-access-backdoor-and-fake-metamask-wallet-to-steal-cryptocurrency-fu</loc>
<lastmod>2026-03-23T04:16:30.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-abuses-legitimate-homebrew-workflow-to-deploy-cuckoo-stealer-on-macos-for-credential-harves</loc>
<lastmod>2026-03-23T04:16:09.542Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-cisos-guide-to-protecting-data-assets-from-ai-scraping</loc>
<lastmod>2026-03-23T04:15:58.768Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-ai-framework-v2026217-released-with-anthropic-model-support-and-security-fixes</loc>
<lastmod>2026-03-23T04:16:39.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-sysupdate-variant-malware-discovered-and-tool-developed-to-decrypt-encrypted-linux-c2-traffic</loc>
<lastmod>2026-03-23T04:16:37.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/grandstream-gxp1600-voip-phones-exposed-to-unauthenticated-remote-code-execution</loc>
<lastmod>2026-03-23T04:16:22.062Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clawhavoc-poisoned-openclaws-clawhub-with-1184-malicious-skills-enabling-data-theft-and-backdoor-acc</loc>
<lastmod>2026-03-23T04:16:09.340Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/citizen-lab-finds-cellebrite-tool-used-on-kenyan-activists-phone-in-police-custody</loc>
<lastmod>2026-03-23T04:16:08.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/16-common-pdf-platform-zero-day-vulnerabilities-permit-data-exfiltration-and-code-execution</loc>
<lastmod>2026-03-23T04:15:57.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/single-character-typo-of-instead-of-leads-to-0-day-rce-in-firefox</loc>
<lastmod>2026-03-23T04:16:46.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/paloalto-to-acquire-koi-security-for-establishing-agentic-endpoint-security</loc>
<lastmod>2026-03-23T04:16:40.651Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/palo-alto-networks-to-acquire-koi-security-to-advance-agentic-endpoint-protection</loc>
<lastmod>2026-03-23T04:16:40.475Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-crescentharvest-malware-abuses-iran-protest-narrative-for-rat-deployment</loc>
<lastmod>2026-03-23T04:16:36.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-instability</loc>
<lastmod>2026-03-23T04:16:15.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs</loc>
<lastmod>2026-03-23T04:16:11.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-windows-video-activex-control-rce-flaw-to-kev-catalog-following-active-exploitation</loc>
<lastmod>2026-03-23T04:16:06.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-sonnet-46-with-enhanced-coding-computer-usage-and-a-1m-token-context-window-is-released-by-an</loc>
<lastmod>2026-03-23T04:16:01.001Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-v892-released-with-double-lock-update-mechanism-following-recent-hack</loc>
<lastmod>2026-03-23T04:16:38.207Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-foxveil-malware-loader-leverages-cloudflare-netlify-and-discord-to-evade-detection</loc>
<lastmod>2026-03-23T04:16:36.282Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-clickfix-payload-stores-malware-in-browser-cache</loc>
<lastmod>2026-03-23T04:16:35.989Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-vs-code-extension-with-11m-downloads-expose-developers-to-one-click-xss-attacks</loc>
<lastmod>2026-03-23T04:16:34.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024</loc>
<lastmod>2026-03-23T04:16:15.479Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-exploit-atlassian-cloud-for-large-scale-spam-campaigns-targeting-investors</loc>
<lastmod>2026-03-23T04:16:14.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-social-engineering-fuels-matanbuchus-30-astarionrat-attack</loc>
<lastmod>2026-03-23T04:16:10.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-google-chromium-0-day-vulnerability-actively-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.722Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-actively-exploited-windows-activex-rce-flaw-to-kev-catalog</loc>
<lastmod>2026-03-23T04:16:06.663Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-methods-for-getting-your-intelligent-workflow-program-started</loc>
<lastmod>2026-03-23T04:15:57.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/singapore-its-4-major-telcos-fend-off-chinese-hackers</loc>
<lastmod>2026-03-23T04:16:46.068Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-fixes-hijacked-update-mechanism-used-to-deliver-targeted-malware</loc>
<lastmod>2026-03-23T04:16:38.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-malware-campaign-crescentharvest-exploits-iran-protest-sentiment-to-deploy-information-stealing-</loc>
<lastmod>2026-03-23T04:16:36.453Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/matanbuchus-30-returns-with-clickfix-social-engineering-and-silent-msi-installations-to-deploy-astar</loc>
<lastmod>2026-03-23T04:16:31.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-triton-app-fork-emerges-on-github-posing-threat-to-cybersecurity</loc>
<lastmod>2026-03-23T04:16:30.720Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-qr-codes-to-spread-phishing-and-malware-across-mobile-phones</loc>
<lastmod>2026-03-23T04:16:23.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dell-zero-day-actively-abused-by-china-linked-threat-actors-to-install-malware</loc>
<lastmod>2026-03-23T04:16:15.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dell-0-day-vulnerability-exploited-by-chinese-hackers-since-mid-2024-to-deploy-malware</loc>
<lastmod>2026-03-23T04:16:15.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-leverage-atlassian-cloud-for-spam-campaigns-redirecting-targets-to-fraudulent-investm</loc>
<lastmod>2026-03-23T04:16:14.690Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-windows-admin-center-vulnerability-allows-privilege-escalation</loc>
<lastmod>2026-03-23T04:16:13.878Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-log-poisoning-vulnerability-in-openclaw-ai-allows-content-manipulation</loc>
<lastmod>2026-03-23T04:16:12.369Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-the-most-recent-kev-update-cisa-identifies-four-security-flaws-that-are-being-actively-exploited</loc>
<lastmod>2026-03-23T04:16:07.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/keenadu-android-backdoor-spreads-through-google-play-to-gain-remote-control-access-by-infecting-firm</loc>
<lastmod>2026-03-23T04:16:27.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/as-a-malicious-fork-of-a-legitimate-triton-app-appears-on-github-malware-is-out-in-the-wild</loc>
<lastmod>2026-03-23T04:16:30.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-attacks-and-malicious-apps-are-distributed-across-mobile-devices-via-qr-codes</loc>
<lastmod>2026-03-23T04:16:42.400Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/supply-chain-attack-embeds-malware-in-android-devices</loc>
<lastmod>2026-03-23T04:16:47.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rmm-abuse-explodes-as-hackers-ditch-malware</loc>
<lastmod>2026-03-23T04:16:43.855Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poland-energy-resists-attack-on-solar-and-wind-facilities</loc>
<lastmod>2026-03-23T04:16:41.800Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies</loc>
<lastmod>2026-03-23T04:16:43.334Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-attacks-deliver-modelorat-by-abusing-the-dns-lookup-command</loc>
<lastmod>2026-03-23T04:16:09.594Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/washington-hotel-located-in-japan-suffers-ransomware-attack</loc>
<lastmod>2026-03-23T04:16:52.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-law-firm-accuses-lenovo-of-bulk-data-transfers-to-china</loc>
<lastmod>2026-03-23T04:16:51.346Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-kit-hosted-on-legitimate-cloud-and-cdn-platforms-targeting-microsoft-and-google-users</loc>
<lastmod>2026-03-23T04:16:41.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates</loc>
<lastmod>2026-03-23T04:16:27.984Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/indias-largest-pharmacy-exposes-customer-personal-details-and-access-to-internal-systems</loc>
<lastmod>2026-03-23T04:16:26.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eu-parliament-blocks-ai-features-on-corporate-devices-over-cybersecurity-concerns</loc>
<lastmod>2026-03-23T04:16:17.046Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-0apt-ransomware-group-claims-to-have-200-victims-but-no-actual-data-is-delivered</loc>
<lastmod>2026-03-23T04:15:57.148Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/washington-hotel-suffers-ransomware-attack-systems-disrupted</loc>
<lastmod>2026-03-23T04:16:52.506Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-attacking-openclaw-configurations-to-steal-login-credentials</loc>
<lastmod>2026-03-23T04:16:48.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/smartloader-attack-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer</loc>
<lastmod>2026-03-23T04:16:46.360Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russia-announces-nationwide-telegram-ban-effective-april-1</loc>
<lastmod>2026-03-23T04:16:44.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/indias-largest-pharmacy-exposes-customer-personal-data-and-internal-system-access</loc>
<lastmod>2026-03-23T04:16:26.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/firefox-v14703-released-with-fix-for-heap-buffer-overflow-vulnerability</loc>
<lastmod>2026-03-23T04:16:18.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-behind-0apt-ransomware-claim-200-attacks-provide-no-data</loc>
<lastmod>2026-03-23T04:16:14.593Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/an-openclaw-ai-agent-critical-log-poisoning-vulnerability-permits-the-injection-of-malicious-content</loc>
<lastmod>2026-03-23T04:16:12.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/webinar-how-modern-soc-teams-use-ai-and-context-to-investigate-cloud-breaches-faster</loc>
<lastmod>2026-03-23T04:16:52.692Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/my-day-getting-my-hands-dirty-with-an-ndr-system</loc>
<lastmod>2026-03-23T04:16:35.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mozilla-firefox-v14703-released-with-fix-for-critical-heap-buffer-overflow-vulnerability</loc>
<lastmod>2026-03-23T04:16:34.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-teams-introduces-ai-workflows-powered-by-microsoft-365-copilot-for-scheduled-task-automati</loc>
<lastmod>2026-03-23T04:16:33.629Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-chrome-extension-steals-facebook-business-manage-2fa-codes-and-analytics-data</loc>
<lastmod>2026-03-23T04:16:29.912Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/langchain-community-ssrf-bypass-vulnerability-enables-access-to-internal-services</loc>
<lastmod>2026-03-23T04:16:28.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-target-winter-olympics-2026-fans-with-fake-online-shops</loc>
<lastmod>2026-03-23T04:16:24.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-evolve-noodlophile-malware-tactics-with-job-posting-phishing-scams</loc>
<lastmod>2026-03-23T04:16:23.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-vulnerability-in-apache-nifi-allows-authorization-bypass</loc>
<lastmod>2026-03-23T04:16:01.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-finds-summarize-with-ai-prompts-manipulating-chatbot-recommendations</loc>
<lastmod>2026-03-23T04:16:32.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/langchain-community-flaw-allows-ssrf-bypass-to-access-internal-infrastructure</loc>
<lastmod>2026-03-23T04:16:28.251Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-summarize-with-ai-buttons-to-inject-malicious-memory-prompts</loc>
<lastmod>2026-03-23T04:16:23.897Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/25-cloud-password-manager-vulnerabilities-permit-unauthorized-access-and-changes</loc>
<lastmod>2026-03-23T04:15:57.628Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zerodayrat-malware-strikes-android-and-ios-devices-for-real-time-spying</loc>
<lastmod>2026-03-23T04:16:54.358Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lockbit-ransomware-unleashes-devastating-50-version-targeting-windows-linux-and-esxi</loc>
<lastmod>2026-03-23T04:16:29.262Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-variant-matryoshka-deployed-to-steal-data-from-macos-systems</loc>
<lastmod>2026-03-23T04:16:10.074Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-264-developer-beta</loc>
<lastmod>2026-03-23T04:16:01.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/25-cloud-password-manager-flaws-that-permit-unauthorized-access-and-data-manipulation</loc>
<lastmod>2026-03-23T04:15:57.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/study-uncovers-25-password-recovery-attacks-in-major-cloud-password-managers</loc>
<lastmod>2026-03-23T04:16:47.711Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/operation-doppelbrand-weaponizing-fortune-500-brands</loc>
<lastmod>2026-03-23T04:16:39.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-clickfix-variant-matryoshka-attacking-users-to-deploy-macos-stealer-malware</loc>
<lastmod>2026-03-23T04:16:36.049Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/joomla-novaraintassos-framework-vulnerabilities-enables-sql-injection-and-unauthenticated-file-read</loc>
<lastmod>2026-03-23T04:16:27.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/infostealer-steals-openclaw-ai-agent-configuration-files-and-gateway-tokens</loc>
<lastmod>2026-03-23T04:16:26.377Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-can-use-summarize-with-ai-buttons-as-weapons-to-include-memory-prompts-in-ai-suggestions</loc>
<lastmod>2026-03-23T04:16:23.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unifying-endpoints-security-productivity-ai-readiness</loc>
<lastmod>2026-03-23T04:16:51.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-windows-11-kb5077181-update-triggers-infinite-restart-loop-on-some-devices</loc>
<lastmod>2026-03-23T04:16:34.423Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lockbits-new-50-version-attacking-windows-linux-and-esxi-systems</loc>
<lastmod>2026-03-23T04:16:29.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-joomla-novaraintassos-framework-flaws-enable-sql-injection-and-unauthenticated-file-read</loc>
<lastmod>2026-03-23T04:16:12.087Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-cleantalk-plugin-flaw-allows-authorization-bypass-on-wordpress-via-reverse-dns</loc>
<lastmod>2026-03-23T04:16:11.279Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-260k-chrome-users-were-tricked-by-false-ai-browser-extensions</loc>
<lastmod>2026-03-23T04:15:57.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-outlook-add-ins-hijack-0-day-patches-wormable-botnet-ai-malware</loc>
<lastmod>2026-03-23T04:16:52.762Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/safe-and-inclusive-esociety-how-lithuania-is-bracing-for-aidriven-cyber-fraud</loc>
<lastmod>2026-03-23T04:16:44.748Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rhysida-ransomware-delivered-via-fake-putty-and-google-authenticator</loc>
<lastmod>2026-03-23T04:16:43.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-attacks-leverage-zoom-teams-google-meet-invites</loc>
<lastmod>2026-03-23T04:16:41.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-founder-peter-steinberger-officially-joins-openai</loc>
<lastmod>2026-03-23T04:16:39.210Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-founder-makes-high-profile-move-to-openai</loc>
<lastmod>2026-03-23T04:16:39.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lotus-blossom-hackers-compromised-official-hosting-infrastructure-of-notepad</loc>
<lastmod>2026-03-23T04:16:29.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lotus-blossom-hackers-breach-notepad-hosting-infrastructure</loc>
<lastmod>2026-03-23T04:16:29.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/filezen-file-transfer-app-vulnerability-enables-arbitrary-command-execution</loc>
<lastmod>2026-03-23T04:16:18.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/systems-are-at-risk-of-remote-code-execution-attacks-due-to-a-critical-airleader-vulnerability</loc>
<lastmod>2026-03-23T04:16:10.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-zerodayrat-mobile-spyware-enables-real-time-surveillance-and-data-theft</loc>
<lastmod>2026-03-23T04:16:37.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-filezen-file-transfer-flaw-allows-arbitrary-command-execution</loc>
<lastmod>2026-03-23T04:16:11.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-beyondtrust-vulnerability-exploited-in-the-wild-to-gain-full-domain-control</loc>
<lastmod>2026-03-23T04:16:11.083Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-airleader-flaw-exposes-systems-to-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:10.886Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-on-critical-zlan-ics-flaws-enabling-full-device-takeover</loc>
<lastmod>2026-03-23T04:16:06.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-in-the-wild-are-actively-taking-advantage-of-a-chrome-0-day-vulnerability</loc>
<lastmod>2026-03-23T04:16:06.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-warn-of-fresh-clickfix-attack-wave-exploiting-windows-users</loc>
<lastmod>2026-03-23T04:16:43.598Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-lures-spread-xworm-remote-access-trojan</loc>
<lastmod>2026-03-23T04:16:41.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-chrome-zero-day-flaw-under-active-exploitation-by-threat-actors</loc>
<lastmod>2026-03-23T04:16:21.228Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-take-complete-domain-control-by-actively-exploiting-a-critical-beyondtrust-flaw</loc>
<lastmod>2026-03-23T04:15:59.060Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-tomorrow-socs-will-run-on-autonomous-threat-hunting</loc>
<lastmod>2026-03-23T04:16:53.383Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/when-ai-factories-scale-security-has-to-be-engineered-in</loc>
<lastmod>2026-03-23T04:16:53.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unifying-endpoints-a-must-for-security-productivity-and-ai-readiness</loc>
<lastmod>2026-03-23T04:16:51.198Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-oysterloader-an-advanced-obfuscated-loader-powering-rhysida-attacks</loc>
<lastmod>2026-03-23T04:16:43.481Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-chrome-zero-day-cve-2026-2441-under-active-attack-patch-released</loc>
<lastmod>2026-03-23T04:16:35.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/according-to-a-report-ai-powered-phishing-attacks-will-increase-in-2025</loc>
<lastmod>2026-03-23T04:15:59.601Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-staging</loc>
<lastmod>2026-03-23T04:16:32.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2026s-top-sql-beautifier-online</loc>
<lastmod>2026-03-23T04:16:04.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-of-sql-injection-vulnerability-in-microsoft-configuration-manager-being-used-in-attacks</loc>
<lastmod>2026-03-23T04:16:07.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-zscaler-squarex-agreement-enhances-secure-browsing-and-zero-trust-features</loc>
<lastmod>2026-03-23T04:16:54.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uses-of-malicious-campaigns-google-ads-and-claude-artifacts-to-spread-macos-malware</loc>
<lastmod>2026-03-23T04:16:29.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/release-of-remnux-v8-improved-automation-ai-functionalities-and-updated-features</loc>
<lastmod>2026-03-23T04:16:42.932Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-2026212-was-released-fixing-over-40-security-flaws</loc>
<lastmod>2026-03-23T04:16:38.937Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zimbra-security-update-patch-for-xss-xxe-ldap-injection-vulnerabilities</loc>
<lastmod>2026-03-23T04:16:54.454Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nation-state-hackers-put-defense-industrial-base-under-siege</loc>
<lastmod>2026-03-23T04:16:35.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-under-pressure-to-bolster-defenses-for-byovd-attacks</loc>
<lastmod>2026-03-23T04:16:34.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-orgs</loc>
<lastmod>2026-03-23T04:16:21.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-links-china-iran-russia-north-korea-to-coordinated-defense-sector-cyber-operations</loc>
<lastmod>2026-03-23T04:16:21.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/security-complexity-follows-suit-for-ai-agents-to-swarm</loc>
<lastmod>2026-03-23T04:15:59.725Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uat-9921-deploys-voidlink-malware-to-target-technology-and-financial-sectors</loc>
<lastmod>2026-03-23T04:16:50.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/surge-in-ai-driven-phishing-attacks-and-qr-code-quishing-in-2025-spam-and-phishing-report</loc>
<lastmod>2026-03-23T04:16:47.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/oysterloader-multistage-evasion-loader-uncovered-with-advanced-obfuscation-and-rhysida-ransomware-li</loc>
<lastmod>2026-03-23T04:16:40.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/orb-networks-leverages-compromised-iot-devices-for-masked-cyberattacks</loc>
<lastmod>2026-03-23T04:16:39.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-xworm-rat-campaign-uses-themed-phishing-lures-and-cve20180802-excel-exploit-to-evade-detection</loc>
<lastmod>2026-03-23T04:16:37.481Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unstructured-has-a-critical-cve-2025-64712-vulnerabilityio-allows-google-and-amazon-to-execute-code-</loc>
<lastmod>2026-03-23T04:16:11.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-1800-windows-servers-compromised-by-badiis-malware-in-large-scale-seo-poisoning-campaign</loc>
<lastmod>2026-03-23T04:16:39.944Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/npms-update-to-harden-their-supply-chain-and-points-to-consider</loc>
<lastmod>2026-03-23T04:16:38.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-history</loc>
<lastmod>2026-03-23T04:16:29.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-chrome-ai-extensions-target-260000-users-via-injected-iframes</loc>
<lastmod>2026-03-23T04:16:29.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dshield-sensor-detects-credential-stuffing-attack-with-self-propagating-ssh-worm</loc>
<lastmod>2026-03-23T04:16:16.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dragonforce-ransomware-group-targets-363-companies-in-strategic-expansion-since-2023</loc>
<lastmod>2026-03-23T04:16:16.255Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vulnerability-in-next-mdx-remote-allows-arbitrary-code-execution-in-react-server-side-rende</loc>
<lastmod>2026-03-23T04:16:13.704Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-1800-windows-servers-are-compromised-by-badiis-malware-in-an-seo-poisoning-attack</loc>
<lastmod>2026-03-23T04:16:03.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vmware-vsphere-targeted-by-rogue-vm-linked-to-muddled-libra-attack-group</loc>
<lastmod>2026-03-23T04:16:51.829Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-observe-in-the-wild-exploitation-of-beyondtrust-cvss-99-vulnerability</loc>
<lastmod>2026-03-23T04:16:43.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/patch-immediately-beyondtrust-remote-code-execution-flaw-exploited-in-the-wild</loc>
<lastmod>2026-03-23T04:16:40.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-code-execution-flaw-exploited-in-the-wild-cisa-issues-alert</loc>
<lastmod>2026-03-23T04:16:38.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-zimbra-vulnerabilities-fixed-xss-xxe-and-ldap-injection-risks-mitigated</loc>
<lastmod>2026-03-23T04:16:14.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/800000-sites-are-vulnerable-to-remote-code-execution-due-to-a-critical-wordpress-backup-plugin-flaw</loc>
<lastmod>2026-03-23T04:16:13.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vulnerability-in-next-mdx-remote-enables-arbitrary-code-execution-in-react-ssr</loc>
<lastmod>2026-03-23T04:16:13.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-notepad-code-execution-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:08.076Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-users-to-an-actively-exploited-sql-injection-vulnerability-in-microsoft-configuration-ma</loc>
<lastmod>2026-03-23T04:16:07.499Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korea-linked-unc1069-uses-ai-lures-to-attack-cryptocurrency-organizations</loc>
<lastmod>2026-03-23T04:16:37.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/users-of-windows-and-discord-are-delivered-the-bada-stealer-malware-by-the-new-duer-js-npm-package</loc>
<lastmod>2026-03-23T04:16:36.209Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/since-2023-the-dragonforce-ransomware-group-has-targeted-363-companies-and-grown-its-influence-throu</loc>
<lastmod>2026-03-23T04:16:16.179Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/those-summarize-with-ai-buttons-may-be-lying-to-you</loc>
<lastmod>2026-03-23T04:16:48.546Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/specterops-launches-bloodhound-scentry-to-accelerate-the-practice-of-identity-attack-path-management</loc>
<lastmod>2026-03-23T04:16:47.056Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again</loc>
<lastmod>2026-03-23T04:16:27.465Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gone-with-the-shame-one-in-two-americans-are-reluctant-to-talk-about-romance-scam-incidents</loc>
<lastmod>2026-03-23T04:16:20.723Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vellox-reverser-an-automated-malware-defense-tool-is-now-generally-available-according-to-booz-allen</loc>
<lastmod>2026-03-23T04:16:05.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-support</loc>
<lastmod>2026-03-23T04:16:21.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dshield-sensor-captures-self-propagating-ssh-worm-exploit-using-credential-stuffing-and-multi-stage-</loc>
<lastmod>2026-03-23T04:16:16.368Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-resolves-a-zero-day-exploit-impacting-ios-macos-and-other-devices</loc>
<lastmod>2026-03-23T04:16:01.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wordpress-backup-plugin-vulnerability-exposes-800000-sites-to-remote-code-execution-attacks</loc>
<lastmod>2026-03-23T04:16:54.145Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sophisticated-duer-js-npm-package-distributes-bada-stealer-malware-targeting-windows-and-discord-use</loc>
<lastmod>2026-03-23T04:16:46.817Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rogue-vm-linked-to-muddled-libra-in-vmware-vsphere-attack-revealing-key-ttps</loc>
<lastmod>2026-03-23T04:16:43.917Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-campaign-plants-malicious-packages-in-npm-and-pypi-ecosystems</loc>
<lastmod>2026-03-23T04:16:28.425Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/feiniu-nas-devices-infected-in-large-scale-netdragon-botnet-attack-exploiting-unpatched-vulnerabilit</loc>
<lastmod>2026-03-23T04:16:18.682Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/44-evilmouse-is-capable-of-independently-performing-orders-and-undermining-systems</loc>
<lastmod>2026-03-23T04:15:58.007Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-groups-graphalgo-fake-recruiter-campaign-exploits-github-npm-and-pypi-to-distribute-malware</loc>
<lastmod>2026-03-23T04:16:28.684Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hpe-aruba-networking-vulnerability-allows-privilege-escalation-and-dos-attacks</loc>
<lastmod>2026-03-23T04:16:25.694Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-warns-of-hackers-leveraging-gemini-ai-for-all-stages-of-cyberattacks</loc>
<lastmod>2026-03-23T04:16:22.011Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-attacks-emerge-as-key-entry-point-for-lummastealer-malware-campaigns</loc>
<lastmod>2026-03-23T04:16:17.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/despite-vpn-protection-adblock-filters-expose-a-users-location</loc>
<lastmod>2026-03-23T04:15:59.120Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-ai-prompt-rce-claude-0-click-renengine-loader-auto-0-days-25-stories</loc>
<lastmod>2026-03-23T04:16:49.522Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/promptware-hackers-can-use-google-calendar-invites-to-stream-victims-cameras-via-zoom</loc>
<lastmod>2026-03-23T04:16:42.250Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-outlook-add-in-stolen-4000-microsoft-account-credentials-and-credit-card-numbers</loc>
<lastmod>2026-03-23T04:16:32.984Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-group-uses-github-npm-pypi-for-graphalgo-malware-campaign</loc>
<lastmod>2026-03-23T04:16:28.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-chrome-security-update-patches-making-code-execution-attacks-possible</loc>
<lastmod>2026-03-23T04:16:06.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-leveraging-employee-monitoring-and-simplehelp-tools-to-deploy-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:48.943Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-ctem-divide-why-84-of-security-programs-are-falling-behind</loc>
<lastmod>2026-03-23T04:16:48.359Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/senegalese-data-breaches-expose-lack-of-security-maturity</loc>
<lastmod>2026-03-23T04:16:45.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomware-attacks-amplified-by-employee-monitoring-software-exploits</loc>
<lastmod>2026-03-23T04:16:42.546Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/palo-alto-networks-firewall-vulnerability-lets-attackers-force-reboot-loops</loc>
<lastmod>2026-03-23T04:16:40.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/palo-alto-networks-firewall-vulnerability-allows-an-attacker-to-force-firewalls-into-a-reboot-loop</loc>
<lastmod>2026-03-23T04:16:40.294Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-attacks-fuel-lummastealer-malware-surge</loc>
<lastmod>2026-03-23T04:16:17.559Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bqtlock-and-greenblood-target-organizations-with-ransomware-attacks</loc>
<lastmod>2026-03-23T04:16:05.343Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/44-evilmouse-autonomously-executes-commands-and-compromises-systems-once-connected</loc>
<lastmod>2026-03-23T04:15:57.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-framework-revolutionizes-on-demand-tool-creation</loc>
<lastmod>2026-03-23T04:16:51.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russia-blocked-whatsapp-for-over-100-million-users-nationwide</loc>
<lastmod>2026-03-23T04:16:44.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ru-apt-chainreaver-l-hijacks-trusted-sites-github-in-supply-chain-attack</loc>
<lastmod>2026-03-23T04:16:44.297Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/promptware-attack-lets-hackers-weaponize-google-calendar-invites-to-spy-via-zoom-camera</loc>
<lastmod>2026-03-23T04:16:42.298Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/israeli-spyware-firm-exposes-paragon-spyware-control-panel-on-linkedin</loc>
<lastmod>2026-03-23T04:16:27.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gtig-analysis-exposes-growing-cyber-threats-to-military-infrastructure</loc>
<lastmod>2026-03-23T04:16:22.236Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-0-day-vulnerability-actively-exploited-in-sophisticated-attack-to-target-individuals</loc>
<lastmod>2026-03-23T04:16:01.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/83-of-ivanti-epmm-exploits-on-bulletproof-hosting-infrastructure-are-associated-with-a-single-ip</loc>
<lastmod>2026-03-23T04:15:58.368Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-resolves-a-zero-day-exploit-impacting-ios-macos-and-apple-devices</loc>
<lastmod>2026-03-23T04:16:01.490Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/highlights-of-the-gtig-analysis-growing-supply-chain-and-espionage-threats-to-the-defense-industry</loc>
<lastmod>2026-03-23T04:16:22.285Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-a-massive-cross-platform-supply-chain-campaign-ru-apt-chainreaver-l-steals-github-repositories-an</loc>
<lastmod>2026-03-23T04:16:44.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-4000-microsoft-credentials-were-stolen-by-the-first-malicious-outlook-add-in-discovered</loc>
<lastmod>2026-03-23T04:16:18.976Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-koreas-unc1069-uses-ai-to-attack-crypto-companies</loc>
<lastmod>2026-03-23T04:16:37.988Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-weaponize-chatgpt-grok-and-leverages-google-ads-to-distribute-macos-amos-stealer</loc>
<lastmod>2026-03-23T04:16:49.280Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/prometei-botnet-attacking-windows-server-to-gain-remote-access-and-deploy-malware</loc>
<lastmod>2026-03-23T04:16:42.037Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/massive-spike-in-attacks-exploiting-ivanti-epmm-systems-0-day-vulnerability</loc>
<lastmod>2026-03-23T04:16:31.165Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-stay-on-top-of-future-threats-with-a-cutting-edge-soc</loc>
<lastmod>2026-03-23T04:16:25.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-sandboxjs-vulnerability-allows-remote-host-takeover-poc-released</loc>
<lastmod>2026-03-23T04:16:12.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-automaker-uses-a-developer-friendly-platform-to-secure-the-supply-chain</loc>
<lastmod>2026-03-23T04:16:03.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-remote-access-connection-manager-0-day-vulnerability-let-attackers-trigger-dos-attack</loc>
<lastmod>2026-03-23T04:16:53.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/legacy-irc-botnet-campaign-uses-automated-ssh-compromise-pipeline-to-enroll-linux-hosts-at-scale</loc>
<lastmod>2026-03-23T04:16:28.881Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-uuid-flaw-in-fiber-v2-on-go-124-enables-session-hijacking-csrf-bypass-and-zero-id-dos-risk</loc>
<lastmod>2026-03-23T04:16:13.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/organizations-are-being-attacked-by-bqtlock-and-greenblood-ransomware-to-encrypt-and-steal-data</loc>
<lastmod>2026-03-23T04:16:05.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-cyber-industry-defenses-spike-co2-emissions</loc>
<lastmod>2026-03-23T04:16:50.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-60-software-vendors-issue-security-fixes-across-os-cloud-and-network-platforms</loc>
<lastmod>2026-03-23T04:16:40.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mshtml-framework-zero-day-vulnerability-lets-attackers-bypass-security-features-over-the-network</loc>
<lastmod>2026-03-23T04:16:34.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-extended-security-updates-for-windows-10-users</loc>
<lastmod>2026-03-23T04:16:33.536Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-critical-windows-11-cumulative-updates-for-versions-25h2-24h2-and-23h2</loc>
<lastmod>2026-03-23T04:16:33.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-uuid-flaw-in-fiber-v2-on-go-124-enables-session-hijacking-and-csrf-bypass</loc>
<lastmod>2026-03-23T04:16:13.506Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt36-and-sidecopy-launch-cross-platform-rat-campaigns-against-indian-entities</loc>
<lastmod>2026-03-23T04:16:02.200Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/do-we-know-enough-about-the-data-that-underlies-ais-rise</loc>
<lastmod>2026-03-23T04:16:00.317Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/react2shell-flaw-weaponized-by-ilovepoop-attack-framework</loc>
<lastmod>2026-03-23T04:16:42.638Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-word-zero-day-vulnerability-allows-attackers-to-bypass-security-features</loc>
<lastmod>2026-03-23T04:16:34.473Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-investigates-teams-assignment-errors-after-failed-service-update</loc>
<lastmod>2026-03-23T04:16:32.746Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/exposed-training-open-the-door-for-crypto-mining-in-fortune-500-cloud-environments</loc>
<lastmod>2026-03-23T04:16:17.239Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/coinbase-cartel-targets-high-value-sectors-with-data-theft-first-extortion-strategy</loc>
<lastmod>2026-03-23T04:16:10.433Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/coinbase-cartel-prioritizes-data-theft-in-targeted-extortion-campaign</loc>
<lastmod>2026-03-23T04:16:10.385Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-six-microsoft-0-day-vulnerabilities-to-kev-catalog-following-active-exploitation</loc>
<lastmod>2026-03-23T04:16:06.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/double-extortion-attacks-using-exposed-rdp-are-exploited-by-cephalus-ransomware</loc>
<lastmod>2026-03-23T04:16:05.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-shell-zero-day-vulnerability-allows-attackers-to-bypass-authentication</loc>
<lastmod>2026-03-23T04:16:53.928Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-shell-security-feature-0-day-vulnerability-let-attackers-bypass-authentication</loc>
<lastmod>2026-03-23T04:16:53.868Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-remote-access-connection-manager-zero-day-enables-dos-attacks</loc>
<lastmod>2026-03-23T04:16:53.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploits</loc>
<lastmod>2026-03-23T04:16:47.257Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/socelars-malware-attacking-windows-systems-to-steal-sensitive-business-data</loc>
<lastmod>2026-03-23T04:16:46.468Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patches-59-vulnerabilities-including-six-actively-exploited-zero-days</loc>
<lastmod>2026-03-23T04:16:33.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ivanti-endpoint-manager-vulnerability-allows-remote-attackers-to-leak-arbitrary-data</loc>
<lastmod>2026-03-23T04:16:27.372Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gitlab-patches-multiple-vulnerabilities-enabling-dos-and-cross-site-scripting-attacks</loc>
<lastmod>2026-03-23T04:16:20.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt36-uses-new-disruptive-tools-to-target-linux-systems</loc>
<lastmod>2026-03-23T04:16:02.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-remote-desktop-services-0-day-vulnerability-exploited-in-the-wild-to-escalate-privileges</loc>
<lastmod>2026-03-23T04:16:53.827Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-notepad-vulnerability-allows-attackers-to-execute-malicious-code-remotely</loc>
<lastmod>2026-03-23T04:16:53.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-turns-cloud-misconfigurations-into-scalable-cybercrime-engine</loc>
<lastmod>2026-03-23T04:16:48.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gitlab-patches-multiple-vulnerabilities-that-enables-dos-and-cross-site-scripting-attacks</loc>
<lastmod>2026-03-23T04:16:20.252Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortios-authentication-bypass-vulnerability-allows-attackers-to-bypass-ldap-login</loc>
<lastmod>2026-03-23T04:16:19.597Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-bing-ads-spread-false-azure-support-scams</loc>
<lastmod>2026-03-23T04:16:17.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-february-2026-patch-tuesday-fixes-54-vulnerabilities-including-6-zero-days</loc>
<lastmod>2026-03-23T04:16:32.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-unc1069-use-ai-and-new-malware-in-attacks-against-the-financial-sector</loc>
<lastmod>2026-03-23T04:16:24.599Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-linux-c2-showcases-llm-generated-malware-capabilities</loc>
<lastmod>2026-03-23T04:16:52.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/asia-struggles-to-reduce-back-telnet-traffic-in-the-area</loc>
<lastmod>2026-03-23T04:16:02.552Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-hunting-is-essential-to-soc-maturity-but-it-frequently-overlooks-actual-attacks</loc>
<lastmod>2026-03-23T04:16:49.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-get-around-ldap-authentication-with-the-fortios-authentication-bypass-vulnerability</loc>
<lastmod>2026-03-23T04:16:19.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-whd-attacks-draw-attention-to-the-dangers-of-vulnerable-apps</loc>
<lastmod>2026-03-23T04:16:46.758Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-patches-6-actively-exploited-zero-days</loc>
<lastmod>2026-03-23T04:16:33.165Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zerodayrat-is-textbook-stalkerware-in-bypassing-mfa</loc>
<lastmod>2026-03-23T04:16:25.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-american-users-are-affected-by-a-microsoft-365-admin-center-outage</loc>
<lastmod>2026-03-23T04:16:31.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-10-best-ddos-protection-solutions-in-2026</loc>
<lastmod>2026-03-23T04:16:50.024Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-publish-malicious-dydx-packages-to-npm-and-pypi-repositories</loc>
<lastmod>2026-03-23T04:16:49.076Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sap-security-patch-day-critical-sap-crm-and-sap-s4hana-code-injection-vulnerabilities-fixed</loc>
<lastmod>2026-03-23T04:16:44.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/prometei-botnet-targets-windows-servers-to-gain-remote-access-and-deploy-malware</loc>
<lastmod>2026-03-23T04:16:42.094Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ivanti-endpoint-manager-vulnerability-lets-remote-attacker-leak-arbitrary-data</loc>
<lastmod>2026-03-23T04:16:27.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-weaponizing-7-zip-downloads-to-turn-your-home-computers-into-proxy-nodes</loc>
<lastmod>2026-03-23T04:16:24.799Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dprk-operatives-impersonate-professionals-on-linkedin-to-infiltrate-companies</loc>
<lastmod>2026-03-23T04:16:16.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-critical-gogs-vulnerability-allows-2fa-bypass-and-remote-command-execution</loc>
<lastmod>2026-03-23T04:16:11.813Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-industrializes-cloud-misconfigurations-into-a-self-propagating-cybercrime-platform</loc>
<lastmod>2026-03-23T04:16:48.164Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools</loc>
<lastmod>2026-03-23T04:16:43.699Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ot-attacks-get-scary-with-living-off-the-plant-techniques</loc>
<lastmod>2026-03-23T04:16:39.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ilovepoop-toolkit-exploiting-react2shell-vulnerability-to-deploy-malicious-payload</loc>
<lastmod>2026-03-23T04:16:25.917Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-apt36-hacker-group-uses-new-tools-to-disrupt-services-by-attacking-linux-systems</loc>
<lastmod>2026-03-23T04:16:02.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-error-reporting-service-vulnerability-let-attackers-elevate-privileges-poc-released</loc>
<lastmod>2026-03-23T04:16:53.628Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/what-organizations-need-to-change-when-managing-printers</loc>
<lastmod>2026-03-23T04:16:52.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-linux-c2-highlights-llm-generated-malware-with-multi-cloud-and-kernel-level-stealth</loc>
<lastmod>2026-03-23T04:16:51.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/transunions-real-networks-deal-focuses-on-robocall-blocking</loc>
<lastmod>2026-03-23T04:16:50.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/socelars-malware-attacking-windows-systems-to-collect-sensitive-data</loc>
<lastmod>2026-03-23T04:16:46.415Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/from-ransomware-to-residency-inside-the-rise-of-the-digital-parasite</loc>
<lastmod>2026-03-23T04:16:19.879Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crypto-scanner-new-tool-to-find-quantum-vulnerable-cryptography-in-your-codebase</loc>
<lastmod>2026-03-23T04:16:14.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-use-windows-shortcut-files-as-weapons-to-spread-worldwide-group-ransomware</loc>
<lastmod>2026-03-23T04:16:03.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zastai-raises-6m-pre-a-to-scale-zero-false-positive-ai-powered-code-security</loc>
<lastmod>2026-03-23T04:16:54.301Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-lnk-files-used-to-deploy-global-group-ransomware-worldwide</loc>
<lastmod>2026-03-23T04:16:30.075Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/guloader-evades-detection-using-polymorphic-code-and-trusted-cloud-hosting</loc>
<lastmod>2026-03-23T04:16:22.340Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fancy-bear-hackers-abuse-microsoft-zero-day-in-email-theft-campaign</loc>
<lastmod>2026-03-23T04:16:18.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bloody-wolf-hackers-deploy-netsupport-rat-in-targeted-attacks</loc>
<lastmod>2026-03-23T04:16:05.017Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/30-year-old-vulnerability-of-libpng-puts-millions-of-systems-at-risk-of-code-execution-attacks</loc>
<lastmod>2026-03-23T04:15:57.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/warlock-ransomware-breaches-smartertools-through-unpatched-smartermail-server</loc>
<lastmod>2026-03-23T04:16:52.264Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actor-claims-leak-of-cybercrime-focused-ai-platform-wormgpt-database</loc>
<lastmod>2026-03-23T04:16:48.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-teams-new-option-enables-users-to-flag-malicious-messages</loc>
<lastmod>2026-03-23T04:16:33.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/guloader-uses-polymorphic-code-and-trusted-cloud-hosting-to-evade-reputation-based-defenses</loc>
<lastmod>2026-03-23T04:16:22.402Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/15200-openclaw-control-panels-with-complete-system-access-are-posted-online</loc>
<lastmod>2026-03-23T04:15:57.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-exchange-online-erroneously-flags-legitimate-emails-as-phishing</loc>
<lastmod>2026-03-23T04:16:32.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploiting-ivanti-epmm-devices-to-deploy-dormant-backdoors</loc>
<lastmod>2026-03-23T04:16:22.786Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dutch-authorities-confirm-ivanti-zero-day-exploit-exposed-employee-contact-data</loc>
<lastmod>2026-03-23T04:16:16.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dprk-it-workers-impersonate-professionals-on-linkedin-to-secure-remote-jobs</loc>
<lastmod>2026-03-23T04:16:15.924Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bloody-wolf-hackers-attacking-organizations-to-deploy-netsupport-rat-and-gain-remote-access</loc>
<lastmod>2026-03-23T04:16:04.964Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/augustus-open-source-llm-vulnerability-scanner-with-210-attacks-across-28-llm-providers</loc>
<lastmod>2026-03-23T04:16:03.252Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-data-breach-in-an-ai-chat-app-exposes-300-million-messages-from-25-million-users</loc>
<lastmod>2026-03-23T04:15:59.858Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/transparent-tribe-targets-indias-startup-ecosystem-in-renewed-cyber-espionage-campaign</loc>
<lastmod>2026-03-23T04:16:50.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-leverage-reputable-isp-networks-via-bulletproof-hosting-services</loc>
<lastmod>2026-03-23T04:16:14.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-desktop-extensions-zero-click-rce-flaw-exposes-over-10000-users-to-silent-attacks</loc>
<lastmod>2026-03-23T04:16:08.854Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-hackers-are-targeting-singapores-telecom-industry-in-an-attempt-to-compromise-edge-devices</loc>
<lastmod>2026-03-23T04:16:06.263Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fvncbot-malware-leverages-android-accessibility-features-to-attack-users</loc>
<lastmod>2026-03-23T04:16:19.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-patches-critical-sqli-flaw-enabling-unauthenticated-code-execution</loc>
<lastmod>2026-03-23T04:16:19.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dprk-it-workers-impersonating-individuals-using-real-linkedin-accounts-to-apply-for-remote-roles</loc>
<lastmod>2026-03-23T04:16:15.976Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/15200-internet-exposed-openclaw-control-panels-with-complete-system-access</loc>
<lastmod>2026-03-23T04:15:57.368Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-five-step-guide-to-creating-a-reliable-security-orchestration-in-2026</loc>
<lastmod>2026-03-23T04:15:58.127Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-extensions-for-desktops-10000-users-are-at-risk-of-remote-attacks-due-to-a-0-click-rce-vulner</loc>
<lastmod>2026-03-23T04:16:08.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-exchange-online-identifies-legitimate-emails-from-customers-as-phishing</loc>
<lastmod>2026-03-23T04:16:32.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/byovd-bundles-with-ransomware-payload-by-reynolds</loc>
<lastmod>2026-03-23T04:16:43.647Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/warlock-gang-breaches-smartertools-via-smartermail-bugs</loc>
<lastmod>2026-03-23T04:16:52.153Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cloud-infrastructure-becomes-crime-bots-with-teampcp</loc>
<lastmod>2026-03-23T04:16:48.219Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/byovd-black-basta-bundles-with-ransomware-payload</loc>
<lastmod>2026-03-23T04:16:04.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-legitimate-apple-and-paypal-invoice-emails-in-dkim-replay-attacks</loc>
<lastmod>2026-03-23T04:16:23.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-associated-unc3886-launches-cyber-espionage-campaign-against-singapore-telecom-sector</loc>
<lastmod>2026-03-23T04:16:05.884Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-web-help-desk-exploited-for-rce-in-multi-stage-attacks-on-exposed-servers</loc>
<lastmod>2026-03-23T04:16:46.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/roundcube-webmail-vulnerability-let-attackers-track-email-opens</loc>
<lastmod>2026-03-23T04:16:44.142Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-recoverit-tool-runs-a-malicious-payload-by-exploiting-windows-service-recovery</loc>
<lastmod>2026-03-23T04:16:36.902Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/roundcube-webmail-vulnerability-lets-attackers-track-email-opens</loc>
<lastmod>2026-03-23T04:16:44.228Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-nodejs-based-ltx-stealer-attack-users-to-exfiltrate-login-credentials</loc>
<lastmod>2026-03-23T04:16:36.602Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/following-a-cyberattack-that-exposes-the-european-commission-eu-officials-respond-mobile-electronics</loc>
<lastmod>2026-03-23T04:16:16.989Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/scarcruft-abuses-legitimate-cloud-services-for-c2-and-ole-based-chain-to-drop-malware</loc>
<lastmod>2026-03-23T04:16:45.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploiting-solarwinds-web-help-desk-rce-to-deploy-custom-tools</loc>
<lastmod>2026-03-23T04:16:22.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/european-commission-contains-cyber-attack-targeting-staff-mobile-data</loc>
<lastmod>2026-03-23T04:16:17.150Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-notepad-hack-31tbps-ddos-ai-skill-malware-llm-backdoors-and-more</loc>
<lastmod>2026-03-23T04:15:58.544Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vortex-werewolf-attacking-organizations-to-gain-tor-enabled-remote-access-over-the-rdp-smb-sftp-and-</loc>
<lastmod>2026-03-23T04:16:52.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-top-cisos-solve-burnout-and-speed-up-mttr-without-extra-hiring</loc>
<lastmod>2026-03-23T04:16:25.655Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploiting-clawhub-skills-to-bypass-virustotal-detections-via-social-engineering</loc>
<lastmod>2026-03-23T04:16:24.019Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-forticlient-ems-vulnerability-allows-remote-malicious-code-execution</loc>
<lastmod>2026-03-23T04:16:11.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bloody-wolf-targets-uzbekistan-russia-using-netsupport-rat-in-spear-phishing-campaign</loc>
<lastmod>2026-03-23T04:16:05.068Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-hackers-use-abused-trusted-services-to-spread-malware-on-edge-devices</loc>
<lastmod>2026-03-23T04:16:02.374Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-use-windows-minifilter-drivers-to-detect-ransomware-in-real-time</loc>
<lastmod>2026-03-23T04:16:43.535Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-5-million-misconfigured-git-web-servers-exposing-secrets-to-the-internet</loc>
<lastmod>2026-03-23T04:16:39.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-recoverit-tool-exploits-windows-service-failure-recovery-functions-to-execute-payload</loc>
<lastmod>2026-03-23T04:16:36.845Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-critical-forticlientems-vulnerability-allows-attackers-to-remotely-execute-malicious-code</loc>
<lastmod>2026-03-23T04:16:11.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/teampcp-worm-exploits-cloud-infrastructure-to-build-criminal-infrastructure</loc>
<lastmod>2026-03-23T04:16:48.311Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomware-detection-with-windows-minifilter-by-intercepting-file-filter-and-change-events</loc>
<lastmod>2026-03-23T04:16:42.595Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/authentication-workflows-are-abused-in-a-new-telegram-phishing-attack-to-obtain-fully-authorized-use</loc>
<lastmod>2026-03-23T04:16:37.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/virustotal-integrates-with-openclaw-to-enhance-ai-marketplace-threat-detection</loc>
<lastmod>2026-03-23T04:16:51.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-becomes-new-target-in-rising-wave-of-supply-chain-poisoning-attacks</loc>
<lastmod>2026-03-13T02:48:26.297Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-attacking-it-osint-professionals-with-new-pystorerat-to-gain-remote-access</loc>
<lastmod>2026-03-23T04:16:23.135Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/black-basta-ransomware-actors-embeds-byovd-defense-evasion-component-with-ransomware-payload-itself</loc>
<lastmod>2026-03-23T04:16:04.771Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beyondtrust-addresses-a-serious-pre-auth-rce-risk-in-pra-and-remote-support</loc>
<lastmod>2026-03-23T04:16:04.355Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-leveraging-free-firebase-developer-accounts-to-send-phishing-emails</loc>
<lastmod>2026-03-23T04:16:24.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploiting-solarwinds-web-help-desk-rce-vulnerability-to-deploy-custom-tools</loc>
<lastmod>2026-03-23T04:16:22.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/crypto-scanner-launches-to-detect-quantum-vulnerable-cryptography-hidden-in-codebases</loc>
<lastmod>2026-03-23T04:16:14.301Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/watch-out-for-phishing-attacks-on-apple-pay-that-try-to-take-your-payment-information</loc>
<lastmod>2026-03-23T04:16:04.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voice-the-biggest-security-gap-youre-ignoring</loc>
<lastmod>2026-03-23T04:16:51.885Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/exposure-management-is-at-a-breaking-point-thats-forcing-a-reset</loc>
<lastmod>2026-03-23T04:16:17.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-new-security-risk-is-cloud-complexity</loc>
<lastmod>2026-03-23T04:16:10.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-cybersecurity-newsletter-office-0-day-esxi-0-day-and-notepad-hack-attacks-by-ransomware-and-o</loc>
<lastmod>2026-03-23T04:16:15.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-secure-local-device-localgpt-rust-integrated-focused-ai-assistant</loc>
<lastmod>2026-03-23T04:16:29.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-updates-and-store-functionality-are-disrupted-by-a-power-outage-in-the-microsoft-data-cen</loc>
<lastmod>2026-03-23T04:16:32.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/virustotal-scanning-is-integrated-by-openclaw-to-identify-malicious-clawhub-skills</loc>
<lastmod>2026-03-23T04:16:39.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/release-of-openclaw-v202626-including-safety-scanner-gpt-53-codex-and-opus-46-support</loc>
<lastmod>2026-03-23T04:16:39.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/virustotal-and-openclaw-collaborate-to-secure-the-ai-agent-skill-marketplace</loc>
<lastmod>2026-03-23T04:16:39.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/0-day-vulnerability-in-beyondtrust-remote-access-products-permits-the-execution-of-code-remotely</loc>
<lastmod>2026-03-23T04:16:04.593Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nmapunleashed-makes-nmap-scanning-more-comfortable-and-effective</loc>
<lastmod>2026-03-23T04:16:37.649Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/your-payment-information-is-seriously-at-risk-from-a-recent-apple-pay-phishing-attack</loc>
<lastmod>2026-03-23T04:16:35.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/german-authorities-warn-of-signal-phishing-aimed-at-journalists-politicians-and-the-military</loc>
<lastmod>2026-03-23T04:16:19.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-cybersquatting-attacks-are-used-by-cybercriminals-to-distribute-malware-and-steal-data</loc>
<lastmod>2026-03-23T04:16:14.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/with-enhanced-cybersecurity-and-validation-of-more-than-500-high-severity-vulnerabilities-claude-opu</loc>
<lastmod>2026-03-23T04:16:09.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-emails-are-distributed-by-cybercriminals-using-firebase-developer-accounts</loc>
<lastmod>2026-03-23T04:16:14.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/to-lower-security-risks-cisa-orders-the-removal-of-unsupported-active-network-edge-devices</loc>
<lastmod>2026-03-23T04:16:07.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-from-china-are-stealing-linux-based-devices-in-order-to-distribute-malware-and-manipulate-tr</loc>
<lastmod>2026-03-23T04:16:05.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/renengine-loader-using-stealthy-multistage-execution-chain-to-bypass-security-controls</loc>
<lastmod>2026-03-23T04:16:43.054Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/odyssey-stealers-new-wave-actively-targets-macos-users</loc>
<lastmod>2026-03-23T04:16:37.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/encrypt-it-already-campaign-pushes-big-tech-to-prioritize-e2e-encryption</loc>
<lastmod>2026-03-23T04:16:16.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shai-hulud-the-unspoken-price-of-supply-chain-incidents</loc>
<lastmod>2026-03-23T04:16:45.547Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/safe-use-is-complicated-by-openclaws-gregarious-insecurities</loc>
<lastmod>2026-03-23T04:16:39.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/routers-are-the-target-of-traffic-by-the-china-linked-dknife-aitm-framework-delivery-of-malware-and-</loc>
<lastmod>2026-03-23T04:16:05.822Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-opus-46-released-with-enhanced-cybersecurity-capabilities-validating-500-high-severity-vulner</loc>
<lastmod>2026-03-23T04:16:08.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-orders-removal-of-unsupported-edge-devices-to-reduce-federal-network-risk</loc>
<lastmod>2026-03-23T04:16:07.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-q-27-launches-a-covert-attack-on-corporate-environments-without-setting-off-alarms</loc>
<lastmod>2026-03-23T04:16:02.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/renengine-loader-uses-complex-chain-to-bypass-security</loc>
<lastmod>2026-03-23T04:16:42.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-and-oauth-token-flaws-lead-to-full-microsoft-365-compromise</loc>
<lastmod>2026-03-23T04:16:41.197Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openai-unveils-trusted-access-for-cybersecurity-with-enhanced-security-capabilities</loc>
<lastmod>2026-03-23T04:16:38.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/flickr-confirms-data-breach-35-million-users-data-at-risk</loc>
<lastmod>2026-03-23T04:16:19.219Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dutch-authorities-seized-servers-of-windscribe-vpn-provider</loc>
<lastmod>2026-03-23T04:16:16.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/data-tool-to-triage-exploited-vulnerabilities-can-make-kev-more-useful</loc>
<lastmod>2026-03-23T04:16:15.304Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-apt-group-uses-linux-exploits-to-redirect-traffic-and-deploy-malicious-software</loc>
<lastmod>2026-03-23T04:16:06.165Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/70-government-and-infrastructure-entities-are-violated-by-the-asian-state-backed-group-tgr-sta-1030</loc>
<lastmod>2026-03-23T04:16:02.607Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/spam-campaign-distributes-fake-pdfs-installing-remote-monitoring-tools-for-persistent-access</loc>
<lastmod>2026-03-23T04:16:46.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-attacks-exploit-oauth-weakness-to-breach-microsoft-365</loc>
<lastmod>2026-03-23T04:16:41.238Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-variant-of-odyssey-stealer-malware-plagues-macos-systems</loc>
<lastmod>2026-03-23T04:16:37.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-samsung-knox-helps-stop-your-network-security-breach</loc>
<lastmod>2026-03-23T04:16:25.310Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/f5-patches-critical-vulnerabilities-in-big-ip-nginx-and-related-products</loc>
<lastmod>2026-03-23T04:16:17.336Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/encase-driver-weaponized-as-edr-killers-persist</loc>
<lastmod>2026-03-23T04:16:16.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyber-success-trifecta-education-certifications-experience</loc>
<lastmod>2026-03-23T04:16:14.456Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/compromised-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware</loc>
<lastmod>2026-03-23T04:16:10.528Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/claude-opus-46-finds-500-high-severity-flaws-across-major-open-source-libraries</loc>
<lastmod>2026-03-23T04:16:08.902Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-react-native-community-command-injection-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-03-23T04:16:08.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-q-27-exploits-weaknesses-in-corporate-security-to-launch-silent-undetected-attacks</loc>
<lastmod>2026-03-23T04:16:01.958Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/moltbook-an-agentic-ai-website-has-numerous-security-flaws</loc>
<lastmod>2026-03-23T04:15:59.475Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interlock-ransomware-actors-new-tool-exploiting-gaming-anti-cheat-driver-0-day-to-disable-edr-and-av</loc>
<lastmod>2026-02-05T01:25:21.535Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-soc-headache-is-false-negatives-this-is-how-to-fix-it-quickly</loc>
<lastmod>2026-02-05T01:25:18.858Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/extra-extra-announcing-dr-global-latin-america</loc>
<lastmod>2026-02-05T01:25:18.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-makes-unpublicized-ransomware-updates-to-kev-catalog</loc>
<lastmod>2026-02-05T01:25:16.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-drop-malware-and-rmm-tools-using-windows-screensavers</loc>
<lastmod>2026-02-05T01:25:15.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ntdsdit-exfiltration-enables-complete-active-directory-compromise</loc>
<lastmod>2026-02-05T01:25:24.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-develops-scanner-to-detect-backdoors-in-open-weight-large-language-models</loc>
<lastmod>2026-02-05T01:25:22.779Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interlock-ransomware-uses-new-tool-to-kill-edr-via-anti-cheat-driver-flaw</loc>
<lastmod>2026-02-05T01:25:21.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-deadvax-malware-campaign-uses-ipfs-hosted-vhd-phishing-files-to-deploy-asyncrat</loc>
<lastmod>2026-02-05T01:25:17.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/smooth-sailing-or-big-breach-the-mexican-government-is-accused-of-leaking</loc>
<lastmod>2026-02-05T01:25:16.123Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ransomware-gang-goes-full-godfather-with-cartel</loc>
<lastmod>2026-02-06T09:46:57.295Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-solarwinds-web-help-desk-rce-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-02-06T09:49:32.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-investigating-teams-chat-image-retrieval-issue-affecting-enterprise-users</loc>
<lastmod>2026-02-06T09:49:19.796Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shadow-dns-hacking-routers-internet-traffic-through-compromised-routers</loc>
<lastmod>2026-02-06T09:47:52.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/supply-chain-attack-abused-notepad-update-infrastructure-to-deliver-targeted-malware</loc>
<lastmod>2026-02-06T09:47:41.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-abuse-microsoft-google-platforms-to-attack-enterprise-users</loc>
<lastmod>2026-02-06T09:47:27.059Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/valleyrat-mimic-as-line-installer-attacking-users-to-steal-login-details</loc>
<lastmod>2026-02-06T09:47:13.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rancher-manager-security-bug-could-allow-attackers-to-steal-admin-credentials</loc>
<lastmod>2026-02-05T01:25:25.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/orchid-security-introduces-continuous-identity-observability-for-enterprise-applications</loc>
<lastmod>2026-02-05T01:25:25.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-tp-link-os-command-injection-flaws-allow-attackers-to-gain-admin-control</loc>
<lastmod>2026-02-05T01:25:23.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-actively-exploited-gitlab-ssrf-vulnerability-in-community-and-enterprise-editions</loc>
<lastmod>2026-02-05T01:25:17.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/amaranth-dragon-a-company-connected-to-china-uses-a-winrar-vulnerability-in-espionage-operations</loc>
<lastmod>2026-02-05T01:25:16.569Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pen-testers-may-be-replaced-by-ai-but-oversight-and-trust-are-still-lacking</loc>
<lastmod>2026-02-05T01:25:14.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/big-breach-or-nada-de-nada-mexican-govt-faces-leak-allegations</loc>
<lastmod>2026-02-06T09:49:59.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exfiltrating-ntdsdit-file-to-gain-full-active-directory-access</loc>
<lastmod>2026-02-06T09:49:50.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/valleyrat-campaign-uses-trojanized-line-setup-to-harvest-credentials</loc>
<lastmod>2026-02-05T01:25:28.423Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-first-90-seconds-how-early-decisions-shape-incident-response-investigations</loc>
<lastmod>2026-02-05T01:25:27.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-can-run-any-code-due-to-the-ingress-nginx-vulnerability</loc>
<lastmod>2026-02-05T01:25:21.454Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-scan-citrix-netscaler-infrastructure-to-identify-exposed-login-panels</loc>
<lastmod>2026-02-05T01:25:20.384Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bugs-in-google-looker-permit-data-exfiltration-and-cross-tenant-rce</loc>
<lastmod>2026-02-05T01:25:19.886Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-of-active-attacks-using-solarwinds-web-help-desk-deserialization-rce-exploit</loc>
<lastmod>2026-02-05T01:25:17.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-chrome-let-attackers-run-any-code-and-bring-down-systems</loc>
<lastmod>2026-02-05T01:25:16.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-warns-python-infostealers-target-macos-via-fake-ads-and-installers</loc>
<lastmod>2026-02-05T01:25:23.292Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-glassworm-campaign-targets-developers-via-vsx-extensions</loc>
<lastmod>2026-02-05T01:25:21.881Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-actively-exploit-react-native-metro-server-flaw-to-target-developers-in-the-wild</loc>
<lastmod>2026-02-05T01:25:20.321Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/enterprise-users-targeted-via-abused-microsoft-and-google-cloud-platforms</loc>
<lastmod>2026-02-05T01:25:18.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eclipse-foundation-mandates-pre-publish-security-checks-for-open-vsx-extensions</loc>
<lastmod>2026-02-05T01:25:18.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dos-and-sql-injection-attacks-are-made-possible-by-critical-django-vulnerabilities</loc>
<lastmod>2026-02-05T01:25:17.273Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-actively-exploited-solarwinds-web-help-desk-rce-to-kev-catalog</loc>
<lastmod>2026-02-05T01:25:16.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-chrome-allow-attackers-to-run-any-code-and-crash-the-system</loc>
<lastmod>2026-02-05T01:25:16.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploiting-react-server-components-vulnerability-in-the-wild-to-deploy-malicious-payloads</loc>
<lastmod>2026-02-05T01:25:20.777Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shadow-dns-malware-exploits-router-vulnerabilities-to-intercept-internet-communications</loc>
<lastmod>2026-02-05T01:25:26.774Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-just-three-days-russian-hackers-turn-a-microsoft-office-bug-into-a-weapon</loc>
<lastmod>2026-02-05T01:25:26.604Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stronger-incident-prevention-takes-just-one-ciso-decision</loc>
<lastmod>2026-02-05T01:25:27.194Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploiting-react-natives-metro-server-in-the-wild-to-attack-developers</loc>
<lastmod>2026-02-05T01:25:20.751Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/developer-ecosystems-will-be-shattered-by-glassworm-malware-again</loc>
<lastmod>2026-02-05T01:25:19.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-the-foxit-pdf-editor-allow-attackers-to-run-any-javascript</loc>
<lastmod>2026-02-05T01:25:19.194Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/watch-out-for-new-compliance-emails-that-use-word-and-pdf-files-as-weapons-to-steal-private-informat</loc>
<lastmod>2026-02-05T01:25:15.818Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/watch-out-for-phishing-attacks-on-dropbox-that-harvest-login-credentials</loc>
<lastmod>2026-02-05T01:25:15.689Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pdfly-variant-uses-custom-pyinstaller-modification-forcing-analysts-to-reverse-engineer-decryption</loc>
<lastmod>2026-02-05T01:25:25.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/as-a-first-step-toward-more-secure-authentication-microsoft-will-disable-ntlm-by-default</loc>
<lastmod>2026-02-05T01:25:23.223Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-cisos-can-eliminate-alert-fatigue-and-focus-on-high-risk-security-incidents-with-soc-teams</loc>
<lastmod>2026-02-05T01:25:21.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/docker-resolves-important-ask-gordon-ai-error-enabling-code-execution-through-image-metadata</loc>
<lastmod>2026-02-05T01:25:17.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/one-click-at-a-time-dark-patterns-compromise-security</loc>
<lastmod>2026-02-05T01:25:17.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/8-minute-access-ai-quickens-aws-environment-breach</loc>
<lastmod>2026-02-05T01:25:14.318Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/webinar-the-smarter-soc-blueprint-learn-what-to-build-buy-and-automate</loc>
<lastmod>2026-02-05T01:25:28.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mozilla-unveils-kill-switch-to-disable-all-firefox-ai-features</loc>
<lastmod>2026-02-05T01:25:23.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploit-metro4shell-rce-flaw-in-react-native-cli-npm-package</loc>
<lastmod>2026-02-05T01:25:20.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/foxit-pdf-editor-vulnerability-allows-attackers-to-execute-arbitrary-javascript</loc>
<lastmod>2026-02-05T01:25:19.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chollima-apt-hackers-weaponize-lnk-file-to-deploy-sophisticated-malware</loc>
<lastmod>2026-02-05T01:25:16.708Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beware-of-malicious-party-invitations-that-tricks-users-into-installing-remote-access-tools</loc>
<lastmod>2026-02-05T01:25:15.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/to-address-a-serious-security-flaw-asus-discontinues-the-file-shredder-feature</loc>
<lastmod>2026-02-05T01:25:14.842Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/when-cloud-outages-ripple-across-the-internet</loc>
<lastmod>2026-02-05T01:25:28.616Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-to-disable-ntlm-by-default-in-major-push-for-stronger-authentication-security</loc>
<lastmod>2026-02-05T01:25:23.273Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-compliance-themed-emails-use-wordpdf-attachments-for-data-theft</loc>
<lastmod>2026-02-05T01:25:21.740Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-app-on-the-google-play-with-50k-downloads-deploy-anatsa-banking-malware</loc>
<lastmod>2026-02-05T01:25:21.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/infostealer-attacks-target-macos-abusing-python-and-trusted-services</loc>
<lastmod>2026-02-05T01:25:21.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hikvision-risk-of-wireless-access-points-permits-the-execution-of-malicious-commands</loc>
<lastmod>2026-02-05T01:25:21.163Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-launch-credential-harvesting-phishing-attacks-by-imitating-dropbox</loc>
<lastmod>2026-02-05T01:25:15.089Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-ghostchat-app-hijacks-devices-and-requests-unlock-passcodes</loc>
<lastmod>2026-02-05T01:25:21.808Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-kiloview-vulnerabilities-allow-attackers-to-gain-full-administrative-control</loc>
<lastmod>2026-02-05T01:25:17.558Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-office-cve-2026-21509-is-used-by-apt28-in-espionage-focused-malware-attacks</loc>
<lastmod>2026-02-05T01:25:14.624Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apache-syncope-vulnerability-allows-attackers-to-hijack-active-user-sessions</loc>
<lastmod>2026-02-05T01:25:14.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-50000-downloads-of-the-anatsa-banking-trojan-were-discovered-in-the-google-play-app</loc>
<lastmod>2026-02-05T01:25:14.546Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-ai-agent-skills-abused-by-threat-actors-to-deliver-malware</loc>
<lastmod>2026-02-05T01:25:24.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-hosting-breach-attributed-to-china-linked-lotus-blossom-hacking-group</loc>
<lastmod>2026-02-05T01:25:24.334Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-hack-detailed-along-with-the-iocs-and-custom-malware-used</loc>
<lastmod>2026-02-05T01:25:24.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mozilla-adds-one-click-option-to-disable-generative-ai-features-in-firefox</loc>
<lastmod>2026-02-05T01:25:23.485Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dynowiper-wiper-malware-launches-destructive-attacks-on-energy-firms</loc>
<lastmod>2026-02-05T01:25:18.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/autonomous-ai-agents-become-the-new-operating-system-for-cybercrime</loc>
<lastmod>2026-02-05T01:25:15.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/denmark-is-the-target-of-a-russian-hacker-alliance-on-a-large-scale-cyberattack</loc>
<lastmod>2026-02-05T01:25:26.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/600k-is-paid-by-the-county-to-pen-testers-who-were-wrongfully-imprisoned</loc>
<lastmod>2026-02-05T01:25:17.207Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-from-china-take-over-updates-for-notepad-for-six-months</loc>
<lastmod>2026-02-05T01:25:16.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-use-false-pdf-lures-to-gather-dropbox-logins</loc>
<lastmod>2026-02-05T01:25:14.990Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-find-341-malicious-clawhub-skills-stealing-data-from-openclaw-users</loc>
<lastmod>2026-02-05T01:25:26.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/targeting-russian-government-security-agency-networks-a-new-punishing-owl-hacker-group</loc>
<lastmod>2026-02-05T01:25:23.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-bug-hides-password-sign-in-option-from-the-lock-screen</loc>
<lastmod>2026-02-05T01:25:28.723Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shinyhunters-expands-scope-of-saas-extortion-attacks</loc>
<lastmod>2026-02-05T01:25:26.939Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pulsar-rat-attacking-windows-systems-via-per-user-run-registry-key-and-exfiltrates-sensitive-details</loc>
<lastmod>2026-02-05T01:25:25.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-bug-enables-one-click-remote-code-execution-via-malicious-link</loc>
<lastmod>2026-02-05T01:25:25.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nationstates-suffers-databreach-game-site-temporarily-offline</loc>
<lastmod>2026-02-05T01:25:23.601Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-begins-ntlm-phase-out-with-three-stage-plan-to-move-windows-to-kerberos</loc>
<lastmod>2026-02-05T01:25:22.595Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-are-using-a-microsoft-office-0-day-vulnerability-to-spread-malware</loc>
<lastmod>2026-02-05T01:25:20.641Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-21000-openclaw-ai-instances-with-customized-configurations-are-available-online</loc>
<lastmod>2026-02-05T01:25:14.122Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-bug-causing-password-sign-in-option-to-disappear-from-the-lock-screen-on</loc>
<lastmod>2026-02-05T01:25:28.665Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-21000-openclaw-ai-instances-found-exposing-personal-configuration-data</loc>
<lastmod>2026-02-05T01:25:25.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-stealthy-fileless-linux-malware-shadowhs-emphasizes-automated-propagation</loc>
<lastmod>2026-02-05T01:25:24.282Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nationstates-suffers-security-breach-forcing-temporary-shutdown</loc>
<lastmod>2026-02-05T01:25:23.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malware-is-actively-distributed-by-hackers-using-microsoft-office-zero-day</loc>
<lastmod>2026-02-05T01:25:20.259Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercrimes-new-operating-system-autonomous-ai-agents</loc>
<lastmod>2026-02-05T01:25:15.385Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bringing-emerging-technologies-negative-aspects-to-light</loc>
<lastmod>2026-02-05T01:25:26.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cellular-protocol-vulnerabilities-permit-unauthorized-silent-gps-monitoring</loc>
<lastmod>2026-02-05T01:25:16.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/android-devices-are-being-attacked-by-arsink-rats-in-order-to-obtain-private-information-and-facilit</loc>
<lastmod>2026-02-05T01:25:14.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/securing-the-mid-market-across-the-complete-threat-lifecycle</loc>
<lastmod>2026-02-05T01:25:26.720Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-found-a-considerable-increase-in-shinyhunters-threat-activity-using-novel-strategies</loc>
<lastmod>2026-02-05T01:25:19.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-ai-hijacks-mongodb-ransoms-office-zero-day-proxy-botnet-and-new-dangers</loc>
<lastmod>2026-02-05T01:25:14.364Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-hacker-alliance-launches-large-scale-cyberattack-on-denmark</loc>
<lastmod>2026-02-05T01:25:26.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/punishing-owl-hacker-group-targets-russian-government-networks</loc>
<lastmod>2026-02-05T01:25:25.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pulsar-rat-targets-windows-systems-via-run-registry-key</loc>
<lastmod>2026-02-05T01:25:25.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/polands-renewable-energy-sector-faces-widespread-cyber-intrusions</loc>
<lastmod>2026-02-05T01:25:25.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-new-security-feature-denies-unauthorized-access-to-system-files</loc>
<lastmod>2026-02-05T01:25:28.810Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-update-hacked-servers-to-send-users-to-malevolent-websites</loc>
<lastmod>2026-02-05T01:25:24.395Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/in-active-attacks-hackers-destroy-mongodb-databases-and-leave-ransom-notes</loc>
<lastmod>2026-02-05T01:25:21.094Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/state-sponsored-cybercriminals-take-over-notepad-update-servers-to-direct-users-to-dangerous-website</loc>
<lastmod>2026-02-05T01:25:27.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-11-introduces-new-security-feature-to-block-unauthorized-system-file-access</loc>
<lastmod>2026-02-05T01:25:28.750Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/state-sponsored-actors-hijacked-notepad-update-servers-to-redirect-users-to-malicious-servers</loc>
<lastmod>2026-02-05T01:25:27.107Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/notepad-official-update-mechanism-hijacked-to-deliver-malware-to-select-users</loc>
<lastmod>2026-02-05T01:25:24.370Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/1-click-clawdbot-vulnerability-enable-malicious-remote-code-execution-attacks</loc>
<lastmod>2026-02-05T01:25:13.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/shadowhs-fileless-malware-targets-linux-systems-with-automated-spread</loc>
<lastmod>2026-02-05T01:25:26.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/your-second-biggest-danger-your-personal-workflows</loc>
<lastmod>2026-02-05T01:25:29.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerability-of-the-critical-1-click-clawdbot-permits-the-exploitation-of-malicious-rce</loc>
<lastmod>2026-02-05T01:25:17.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/arsink-rat-targets-android-devices-to-steal-data-and-enable-remote-control</loc>
<lastmod>2026-02-05T01:25:14.818Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/moltbook-ai-flaw-leaks-user-emails-authentication-tokens-and-sensitive-api-keys</loc>
<lastmod>2026-02-05T01:25:23.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-security-update-for-windows-11-25h2-and-24h2-systems</loc>
<lastmod>2026-02-05T01:25:22.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-issues-a-warning-about-shinyhunters-significant-growth-using-novel-attack-methods</loc>
<lastmod>2026-02-05T01:25:20.087Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/targeting-linux-environments-autopentestx-is-a-new-automated-penetration-testing-toolkit</loc>
<lastmod>2026-02-05T01:25:15.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/update-servers-for-escan-antivirus-delivering-multi-stage-malware-due-to-compromise</loc>
<lastmod>2026-02-05T01:25:18.289Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-nightmares-are-caused-by-malicious-mac-cleaner-ads-on-google</loc>
<lastmod>2026-02-05T01:25:22.001Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/email-addresses-login-tokens-and-api-keys-are-exposed-by-a-moltbook-ai-vulnerability</loc>
<lastmod>2026-02-05T01:25:23.332Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/glassworm-was-spread-by-an-open-vsx-supply-chain-attack-using-a-compromised-development-account</loc>
<lastmod>2026-02-05T01:25:24.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dos-is-triggered-by-a-scada-vulnerability-which-could-disrupt-industrial-operations</loc>
<lastmod>2026-02-05T01:25:26.633Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/torq-uses-ai-powered-hyper-automation-to-take-socs-beyond-soar</loc>
<lastmod>2026-02-05T01:25:28.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2026s-top-10-dns-filtering-options</loc>
<lastmod>2026-02-05T01:25:28.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-top-10-cybersecurity-e-signature-solutions-for-2026</loc>
<lastmod>2026-02-05T01:25:28.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/redkitten-an-iran-affiliated-cyberattack-targets-activists-and-human-rights-organizations</loc>
<lastmod>2026-02-05T01:25:21.635Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/seven-new-exploit-modules-for-freepbx-cacti-and-smartermail-are-released-by-metasploit</loc>
<lastmod>2026-02-05T01:25:22.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mandiant-finds-shinyhunters-using-vishing-to-steal-mfa-and-breach-saas-platforms</loc>
<lastmod>2026-02-05T01:25:22.218Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mandiant-discovers-vishing-attacks-akin-to-shinyhunters-that-steal-mfa-in-order-to-compromise-saas-p</loc>
<lastmod>2026-02-05T01:25:22.159Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cert-polska-describes-coordinated-cyberattacks-on-more-than-30-solar-and-wind-farms</loc>
<lastmod>2026-02-05T01:25:16.386Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-flaws-in-freepbx-cacti-and-smartermail-are-the-focus-of-new-metasploit-modules</loc>
<lastmod>2026-02-05T01:25:23.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/code-execution-and-external-system-access-are-made-possible-by-175000-exposed-ollama-hosts</loc>
<lastmod>2026-02-05T01:25:13.937Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unconventional-predictions-for-2026-show-a-grab-bag-of-danger</loc>
<lastmod>2026-02-05T01:25:25.103Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/agentic-ai-will-become-the-attack-surface-poster-child-in-2026</loc>
<lastmod>2026-02-05T01:25:14.071Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tenable-addresses-data-exposure-shadow-ai-risks-and-ai-governance</loc>
<lastmod>2026-02-05T01:25:27.711Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openclaw-ai-is-unrestrained-in-corporate-settings</loc>
<lastmod>2026-02-05T01:25:25.006Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-rce-bugs-in-n8ns-second-round-increase-corporate-risk</loc>
<lastmod>2026-02-05T01:25:26.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trump-administration-rescinds-biden-era-software-guidance</loc>
<lastmod>2026-02-05T01:25:28.336Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tamecat-powershell-based-backdoor-exfiltrates-login-credentials-from-microsoft-edge-and-chrome</loc>
<lastmod>2026-02-05T01:25:27.687Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/former-google-engineer-found-guilty-of-stealing-ai-trade-secrets-for-china</loc>
<lastmod>2026-02-05T01:25:18.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-former-google-engineer-was-found-guilty-of-stealing-googles-ai-secrets-for-china</loc>
<lastmod>2026-02-05T01:25:18.669Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-200-websites-were-taken-over-by-attackers-using-a-vulnerability-in-magento-to-get-root-level-ac</loc>
<lastmod>2026-02-05T01:25:15.035Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tamecat-backdoor-steals-edge-and-chrome-login-credentials</loc>
<lastmod>2026-02-05T01:25:27.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-chrome-extensions-abusing-affiliate-links-and-stealing-chatgpt-access</loc>
<lastmod>2026-02-05T01:25:26.507Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nvidia-gpu-display-driver-vulnerabilities-allows-code-execution-and-privilege-escalation</loc>
<lastmod>2026-02-05T01:25:24.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostchat-spyware-targets-android-users-via-whatsapp</loc>
<lastmod>2026-02-05T01:25:19.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-using-hugging-face-hosting-to-deliver-android-rat-payload</loc>
<lastmod>2026-02-05T01:25:15.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-hijack-200-sites-by-exploiting-magento-vulnerability</loc>
<lastmod>2026-02-05T01:25:15.017Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/remote-code-execution-is-possible-with-175k-exposed-ollama-hosts</loc>
<lastmod>2026-02-05T01:25:13.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nvidia-gpu-display-driver-vulnerability-enables-code-execution-and-privilege-escalation</loc>
<lastmod>2026-02-05T01:25:24.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostchat-spyware-attacking-android-users-via-whatsapp-to-exfiltrate-sensitive-details</loc>
<lastmod>2026-02-05T01:25:19.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-ivanti-endpoint-manager-0-day-rce-vulnerabilities-actively-exploited-in-attacks</loc>
<lastmod>2026-02-05T01:25:17.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-uat-8099-uses-badiis-seo-malware-to-target-iis-servers-in-asia</loc>
<lastmod>2026-02-05T01:25:16.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wireshark-463-released-to-address-dissector-and-parser-crash-vulnerabilities</loc>
<lastmod>2026-02-05T01:25:28.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-can-cisos-respond-to-ransomware-getting-more-violent</loc>
<lastmod>2026-02-05T01:25:21.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/risks-from-ai-to-quantum-getting-ready-for-cybersecurity-the-future</loc>
<lastmod>2026-02-05T01:25:19.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lerlglvhrthg-trustbastion-dropper-sample-file-md5-hash-d8b0fd515d860be2969cf441ea3b620d-trustbastion</loc>
<lastmod>2026-02-05T01:25:15.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-use-hugging-face-hosting-to-spread-android-rats</loc>
<lastmod>2026-02-05T01:25:14.933Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wireshark-463-released-fix-for-vulnerabilities-that-lead-to-dos-attack-and-crashes</loc>
<lastmod>2026-02-05T01:25:28.836Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-328-million-fortinet-devices-exposed-online-with-risky-web-properties</loc>
<lastmod>2026-02-05T01:25:25.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-open-vsx-extension-with-5000-users-spreading-malware</loc>
<lastmod>2026-02-05T01:25:22.061Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/education-themed-malicious-domains-linked-to-bulletproof-hosting</loc>
<lastmod>2026-02-05T01:25:18.045Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacks-using-remote-code-execution-are-made-possible-by-a-serious-ivanti-endpoint-manager-flaw</loc>
<lastmod>2026-02-05T01:25:17.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wireshark-463-released-with-vulnerabilities-dissector-and-parser-crash</loc>
<lastmod>2026-02-05T01:25:28.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-teams-new-feature-to-flag-suspicious-one-to-one-calls</loc>
<lastmod>2026-02-05T01:25:23.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-update-for-windows-11-version-25h2-and-24h2-systems</loc>
<lastmod>2026-02-05T01:25:22.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-weaponized-open-vsx-extension-with-sophisticated-malware-after-reaching-5060-downloads</loc>
<lastmod>2026-02-05T01:25:20.841Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-introduces-android-theft-protection-to-make-stolen-devices-harder-for-hackers-to-exploit</loc>
<lastmod>2026-02-05T01:25:19.777Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/education-themed-malicious-domains-linked-to-bulletproof-hosting-infrastructure-exposed</loc>
<lastmod>2026-02-05T01:25:18.087Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/3280081-fortinet-devices-online-with-exposed-web-properties-under-risk</loc>
<lastmod>2026-02-05T01:25:14.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/with-a-cvss-93-score-smartermail-addresses-a-serious-unauthenticated-rce-vulnerability</loc>
<lastmod>2026-02-05T01:25:27.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-former-google-engineer-was-found-guilty-of-stealing-2000-ai-trade-secrets-for-a-chinese-startup</loc>
<lastmod>2026-02-05T01:25:18.722Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weaponized-vs-code-add-on-clawdbot-sneaks-in-screenconnect-rat-for-remote-control</loc>
<lastmod>2026-02-05T01:25:28.518Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/two-ivanti-epmm-zero-day-rce-flaws-actively-exploited-security-updates-released</loc>
<lastmod>2026-02-05T01:25:28.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-trump-administration-retracts-biden-era-sbom-advice</loc>
<lastmod>2026-02-05T01:25:28.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-new-rces-darknet-busts-kernel-bugs-25-more-stories</loc>
<lastmod>2026-02-05T01:25:27.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-using-ai-generated-malicious-job-offers-to-deploy-purerat</loc>
<lastmod>2026-02-05T01:25:27.924Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ta584-actors-leveraging-clickfix-social-engineering-to-deliver-tsundere-bot-malware</loc>
<lastmod>2026-02-05T01:25:27.571Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/swarmer-tool-evades-edr-by-abusing-stealthy-windows-registry-persistence-techniques</loc>
<lastmod>2026-02-05T01:25:27.449Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/survey-of-100-energy-systems-reveals-critical-ot-cybersecurity-gaps</loc>
<lastmod>2026-02-05T01:25:27.356Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/semantic-chaining-jailbreak-dupes-gemini-nano-banana-grok-4</loc>
<lastmod>2026-02-05T01:25:26.738Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-find-175000-publicly-exposed-ollama-ai-servers-across-130-countries</loc>
<lastmod>2026-02-05T01:25:26.400Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pytorch-vulnerability-allows-memory-corruption-leading-to-remote-code-execution</loc>
<lastmod>2026-02-05T01:25:25.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/python-based-pyrat-with-cross-platform-capabilities-and-extensive-remote-access-features</loc>
<lastmod>2026-02-05T01:25:25.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phpt-vulnerability-exposes-cicd-pipelines-to-remote-code-execution-attacks</loc>
<lastmod>2026-02-05T01:25:25.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-semantic-chaining-jailbreak-bypasses-grok-4-and-gemini-nano-banana-pro-security-filters</loc>
<lastmod>2026-02-05T01:25:24.224Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/additional-serious-issues-with-n8n-could-endanger-customer-security</loc>
<lastmod>2026-02-05T01:25:23.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-exchange-online-to-deprecate-smtp-auth-basic-authentication-for-tenants</loc>
<lastmod>2026-02-05T01:25:22.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weaponized-microsoft-365-outlook-add-ins-for-covertly-stealing-private-email-information</loc>
<lastmod>2026-02-05T01:25:22.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-365-outlook-add-ins-weaponized-to-exfiltrate-sensitive-email-data-without-leaving-traces</loc>
<lastmod>2026-02-05T01:25:22.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/matanbuchus-malware-downloader-changing-components-to-avoid-av-detections</loc>
<lastmod>2026-02-05T01:25:22.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/298-million-users-personal-information-was-exposed-in-a-massive-soundcloud-data-breach</loc>
<lastmod>2026-02-05T01:25:22.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-exploiting-freepbx-vulnerability-to-deploy-webshell-and-gain-control-of-systems</loc>
<lastmod>2026-02-05T01:25:20.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/grist-core-vulnerability-enables-malicious-remote-code-execution-via-crafted-spreadsheet-formulas</loc>
<lastmod>2026-02-05T01:25:20.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-largest-ipidea-residential-proxy-network-in-the-world-was-disrupted-by-google</loc>
<lastmod>2026-02-05T01:25:19.686Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-announces-android-theft-protection-feature-to-make-your-device-harder-target-for-hackers</loc>
<lastmod>2026-02-05T01:25:19.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/french-government-moves-to-ban-zoom-and-microsoft-teams-over-security-concerns</loc>
<lastmod>2026-02-05T01:25:19.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2026s-crucial-e-signature-solutions-for-cybersecurity</loc>
<lastmod>2026-02-05T01:25:18.528Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eskimming-attacks-fuelled-with-persistent-threats-evolving-tactics-and-unfinished-recovery</loc>
<lastmod>2026-02-05T01:25:18.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-update-packages-were-pushed-by-a-hacked-escan-antivirus-update-server</loc>
<lastmod>2026-02-05T01:25:18.230Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/escan-antivirus-update-server-breached-to-distribute-malicious-update-packages</loc>
<lastmod>2026-02-05T01:25:18.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-solarwinds-web-vulnerability-enables-security-bypassing-and-remote-code-execution</loc>
<lastmod>2026-02-05T01:25:17.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/important-idis-ip-cameras-one-click-vulnerability-causes-victims-computer-to-be-completely-compromis</loc>
<lastmod>2026-02-05T01:25:17.297Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-forticloud-sso-authentication-bypass-vulnerability-exploited-in-attacks</loc>
<lastmod>2026-02-05T01:25:17.109Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-alerts-hackers-to-a-forticloud-sso-authentication-bypass-vulnerability</loc>
<lastmod>2026-02-05T01:25:17.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/millions-of-reservations-are-exposed-by-calcoms-broken-access-controls-which-results-in-a-full-accou</loc>
<lastmod>2026-02-05T01:25:16.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blackice-a-container-based-red-teaming-toolkit-for-testing-ai-security</loc>
<lastmod>2026-02-05T01:25:16.167Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/blackice-a-red-teaming-toolkit-for-ai-security-testing-based-on-containers</loc>
<lastmod>2026-02-05T01:25:16.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/watch-out-for-the-clawdbot-agent-a-weaponized-vs-code-extension-that-uses-screenconnect-rat</loc>
<lastmod>2026-02-05T01:25:15.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-taking-advantage-of-canadian-citizens-dependency-on-digital-services</loc>
<lastmod>2026-02-05T06:22:42.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/three-choices-cisos-must-make-in-2026-to-reduce-the-risk-of-downtime</loc>
<lastmod>2026-02-05T01:25:14.269Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/aisuru-botnets-314-tbps-ddos-attack-sets-a-new-world-record-for-the-internet</loc>
<lastmod>2026-02-05T01:25:14.174Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/solarwinds-uses-unauthenticated-rce-and-auth-bypass-to-address-four-serious-web-help-desk-vulnerabil</loc>
<lastmod>2026-02-05T01:25:27.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/swarmer-tool-evading-edr-with-a-stealthy-modification-on-windows-registry-for-persistence</loc>
<lastmod>2026-02-05T01:25:27.485Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/grok-4-and-gemini-nano-security-filters-are-bypassed-by-a-new-semantic-chaining-jailbreak-attack</loc>
<lastmod>2026-02-05T01:25:24.149Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sensitive-documents-uploaded-to-public-chatgpt-by-the-cisa-chief</loc>
<lastmod>2026-02-05T01:25:16.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-ta584-weaponize-clickfix-social-engineering-for-tsundere-bot-payload</loc>
<lastmod>2026-02-05T01:25:27.826Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/python-powered-pyrat-rat-bypasses-defenses-for-seamless-multi-os-remote-access</loc>
<lastmod>2026-02-05T01:25:25.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-disrupts-ipidea-one-of-the-worlds-largest-residential-proxy-networks</loc>
<lastmod>2026-02-05T01:25:19.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-completely-destroys-the-biggest-ipidea-residential-proxy-network-in-the-world</loc>
<lastmod>2026-02-05T01:25:19.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/matanbuchus-malware-changes-components-to-evade-antivirus-protections</loc>
<lastmod>2026-02-05T01:25:18.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-10-best-data-removal-solutions-in-2026</loc>
<lastmod>2026-02-05T01:25:28.068Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-10-best-data-removal-services-in-2026</loc>
<lastmod>2026-02-05T01:25:28.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/surging-cyberattacks-boost-latin-america-to-riskiest-region</loc>
<lastmod>2026-02-05T01:25:27.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/months-after-patch-winrar-bug-poised-to-hit-smbs-hardest</loc>
<lastmod>2026-02-05T01:25:23.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-confirms-new-zero-day-behind-malicious-sso-logins</loc>
<lastmod>2026-02-05T01:25:19.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eskimming-attacks-surge-as-threat-actors-adopt-persistent-evolving-tactics</loc>
<lastmod>2026-02-05T01:25:18.507Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/consumers-reluctant-to-shop-at-stores-that-dont-take-security-seriously</loc>
<lastmod>2026-02-05T01:25:17.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-0-day-vulnerability-in-gemini-mcp-tool-enables-remote-attackers-to-run-arbitrary-code</loc>
<lastmod>2026-01-29T00:03:57.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-alerts-users-to-a-winrar-vulnerability-used-to-take-over-the-windows-system</loc>
<lastmod>2026-01-29T00:03:57.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-winrar-bug-is-expected-to-affect-smbs-the-most-months-after-it-was-patched</loc>
<lastmod>2026-01-29T00:03:57.802Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/customers-are-hesitant-to-shop-at-establishments-that-dont-prioritize-security</loc>
<lastmod>2026-01-29T00:03:56.687Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-verifies-a-new-zero-day-for-malevolent-sso-logins</loc>
<lastmod>2026-01-29T00:03:57.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zap-releases-hotfix-after-js-engine-leak-disrupts-active-scanning</loc>
<lastmod>2026-02-05T01:25:29.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zero-day-gemini-mcp-tool-enables-remote-attackers-to-run-any-code</loc>
<lastmod>2026-01-29T00:03:57.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ten-data-governance-technology-trends-every-bank-business-should-be-aware-of-in-2026</loc>
<lastmod>2026-02-05T01:25:13.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malware-is-dropped-by-a-fake-moltbot-ai-coding-assistant-on-the-vs-code-marketplace</loc>
<lastmod>2026-01-29T00:03:57.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/peckbirdy-backed-by-china-takes-off-for-cross-platform-attacks</loc>
<lastmod>2026-02-05T01:25:16.491Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zap-javascript-engine-memory-leak-issue-impacts-active-scan-usage</loc>
<lastmod>2026-01-29T00:03:59.356Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/soundcloud-data-breach-exposes-298-million-personal-users-details</loc>
<lastmod>2026-01-29T00:03:58.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-electrum-tied-to-december-2025-cyber-attack-on-polish-power-grid</loc>
<lastmod>2026-01-29T00:03:58.026Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-security-update-patches-background-fetch-api-vulnerability</loc>
<lastmod>2026-01-29T00:03:56.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-vulnerability-in-the-check-point-harmony-sase-windows-client-allows-for-privilege-escalation</loc>
<lastmod>2026-01-29T00:03:56.528Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-forticloud-sso-vulnerability-confirmed-by-fortinet-cve-2026-24858-in-the-wild-actively-expl</loc>
<lastmod>2026-01-29T00:03:57.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nike-is-looking-into-a-data-breach-in-response-to-a-worldleaks-ransomware-group-claim</loc>
<lastmod>2026-01-29T00:03:57.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-denies-lawsuit-claim-and-confirms-messages-are-device-encrypted-and-private</loc>
<lastmod>2026-01-29T00:03:59.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/increasing-cyberattacks-make-latin-america-the-riskiest-area</loc>
<lastmod>2026-01-29T00:03:58.516Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sandbox-escape-and-arbitrary-code-execution-are-made-possible-by-a-critical-vm2-nodejs-flaw</loc>
<lastmod>2026-01-29T00:03:56.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-introduces-new-strict-account-settings-to-protect-users-from-hackers</loc>
<lastmod>2026-01-29T00:03:59.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/two-high-severity-n8n-flaws-allow-authenticated-remote-code-execution</loc>
<lastmod>2026-01-29T00:03:58.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mustang-panda-deploys-updated-coolclient-backdoor-in-government-cyber-attacks</loc>
<lastmod>2026-01-29T00:03:57.826Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/from-triage-to-threat-hunts-how-ai-accelerates-secops</loc>
<lastmod>2026-01-29T00:03:57.549Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-warns-of-actively-exploited-forticloud-sso-flaw-cve-2026-24858</loc>
<lastmod>2026-01-29T00:03:57.523Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-exploit-fake-notepad-and-7-zip-sites-to-distribute-remote-monitoring-malware</loc>
<lastmod>2026-01-29T00:03:57.188Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-security-update-fixes-vulnerability-in-background-fetch-api</loc>
<lastmod>2026-01-29T00:03:56.643Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/millions-of-bookings-are-exposed-by-a-calcom-access-control-bug-risking-account-takeover</loc>
<lastmod>2026-01-29T00:03:56.512Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-indicts-31-in-massive-atm-malware-heist-draining-bank-cash-reserves</loc>
<lastmod>2026-01-29T00:03:58.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-court-slaps-46-month-sentence-on-chinese-citizen-in-millions-crypto-laundering-scheme</loc>
<lastmod>2026-01-29T00:03:58.644Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/exchange-online-smtp-auth-deprecation-looms-tenants-urged-to-migrate-now</loc>
<lastmod>2026-01-29T00:03:57.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-chinese-national-who-laundered-millions-of-dollars-taken-from-american-investors-was-sentenced-to-</loc>
<lastmod>2026-01-29T00:03:56.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-take-over-canadian-digital-services-putting-millions-of-users-at-risk</loc>
<lastmod>2026-01-29T00:03:56.494Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/tp-link-archer-vulnerability-allows-attackers-to-seize-control-of-routers</loc>
<lastmod>2026-02-05T01:25:28.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/password-reuse-in-disguise-an-often-missed-risky-workaround</loc>
<lastmod>2026-01-29T00:03:57.951Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/massive-soundcloud-data-breach-exposes-personal-details-of-298-million-users</loc>
<lastmod>2026-01-29T00:03:57.738Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-python-spellchecker-packages-on-pypi-delivered-hidden-remote-access-trojan</loc>
<lastmod>2026-01-29T00:03:57.362Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-captcha-attack-leverages-microsoft-application-virtualization-app-v-to-deploy-malware</loc>
<lastmod>2026-01-29T00:03:57.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-critical-flaw-in-check-point-harmony-sase-permits-windows-local-privilege-escalation</loc>
<lastmod>2026-01-29T00:03:56.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-new-strict-account-settings-option-to-protect-your-account-from-hackers</loc>
<lastmod>2026-01-29T00:03:59.234Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-app-v-exploited-in-sneaky-captcha-phishing-campaign</loc>
<lastmod>2026-01-29T00:03:57.761Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/honeymytes-coolclient-malware-now-steals-browser-logins-in-latest-variant</loc>
<lastmod>2026-01-29T00:03:57.702Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-honeymyte-hacking-group-updates-coolclient-malware-to-install-data-stealer-for-browser-login</loc>
<lastmod>2026-01-29T00:03:57.684Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-alerts-users-to-winrar-vulnerability-cve-2025-8088s-active-exploitation</loc>
<lastmod>2026-01-29T00:03:57.614Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/stanley-toolkit-turns-chrome-into-undetectable-phishing-vector</loc>
<lastmod>2026-01-29T00:03:58.492Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-rushes-emergency-patch-for-office-zero-day</loc>
<lastmod>2026-01-29T00:03:57.782Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-disables-forticloud-sso-following-0-day-vulnerability-exploited-in-the-wild</loc>
<lastmod>2026-01-29T00:03:57.457Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-telnet-server-flaw-exposes-forgotten-attack-surface</loc>
<lastmod>2026-01-29T00:03:56.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-openssl-vulnerabilities-allow-remote-attackers-to-execute-malicious-code</loc>
<lastmod>2026-01-29T00:03:56.707Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-the-death-of-accuracy-what-it-means-for-zero-trust</loc>
<lastmod>2026-01-29T00:03:56.475Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/5-practical-ways-to-use-security-ai-without-losing-control</loc>
<lastmod>2026-01-29T00:03:56.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/16-malicious-chrome-extensions-as-chatgpt-enhancements-steals-chatgpt-logins</loc>
<lastmod>2026-01-29T00:03:56.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/winrar-path-traversal-cve-2025-8088-actively-exploited-google-warns-of-persistent-windows-access</loc>
<lastmod>2026-01-29T00:03:59.272Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/openssl-vulnerabilities-allow-remote-attackers-to-execute-malicious-code</loc>
<lastmod>2026-01-29T00:03:57.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-warns-of-winrar-vulnerability-exploited-to-gain-control-over-windows-system</loc>
<lastmod>2026-01-28T02:09:10.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-patches-cve-2026-24858-after-active-fortios-sso-exploitation-detected</loc>
<lastmod>2026-01-29T00:03:57.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vulnerability-in-vm2-sandbox-library-for-nodejs-let-attackers-run-untrusted-code</loc>
<lastmod>2026-01-28T02:09:10.143Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/16-malevolent-chrome-add-ons-posing-as-chatgpt-enhancers-steal-user-information</loc>
<lastmod>2026-01-29T00:03:56.395Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/facebook-whatsapp-and-instagram-will-test-new-premium-subscriptions</loc>
<lastmod>2026-01-28T00:41:02.839Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-g-wagon-npm-package-uses-an-obfuscated-payload-to-attack-users-and-steal-their-browser-credentia</loc>
<lastmod>2026-01-28T00:41:02.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-watering-hole-attack-targets-emeditor-users-distributing-malware-for-stealers</loc>
<lastmod>2026-01-27T23:32:34.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-take-advantage-of-teams-features-to-steal-credentials-copying-microsoft-services</loc>
<lastmod>2026-01-27T21:31:57.352Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-use-teams-features-to-distribute-malicious-content-that-looks-like-microsoft-services</loc>
<lastmod>2026-01-27T20:26:24.672Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ai-and-the-death-of-accuracy-implications-for-zero-trust</loc>
<lastmod>2026-01-27T18:17:22.292Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vibe-coded-sicarii-ransomware-cant-be-decrypted</loc>
<lastmod>2026-01-29T00:03:59.067Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-rushes-office-zero-day-emergency-patch</loc>
<lastmod>2026-01-27T17:14:48.233Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/forgotten-attack-surface-revealed-by-a-critical-telnet-server-flaw</loc>
<lastmod>2026-01-27T17:14:47.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-becomes-an-undetectable-phishing-vector-with-the-stanley-toolkit</loc>
<lastmod>2026-01-27T16:07:06.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/effective-triage-is-being-neglected-by-your-soc-team-tier-1-analyst-its-a-business-issue</loc>
<lastmod>2026-01-27T14:03:42.129Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/worldleaks-extortion-group-claims-it-stole-14tb-of-nike-data</loc>
<lastmod>2026-01-29T00:03:59.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/whatsapp-rolls-out-lockdown-style-security-mode-to-protect-targeted-users-from-spyware</loc>
<lastmod>2026-01-27T12:59:58.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/experts-detect-pakistan-linked-cyber-campaigns-aimed-at-indian-government-entities</loc>
<lastmod>2026-01-27T12:59:57.553Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/canva-atlassian-epic-games-among-the-100-enterprises-targeted-by-shinyhunters-group</loc>
<lastmod>2026-01-27T12:59:56.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-targeting-it-sectors-by-taking-advantage-of-react2shell-vulnerabilities</loc>
<lastmod>2026-01-27T12:59:56.665Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-lawsuit-claims-that-meta-can-read-all-the-whatsapp-users-messages</loc>
<lastmod>2026-01-27T11:05:45.477Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/medusa-security-testing-tool-with-74-scanners-and-180-ai-agent-security-rules</loc>
<lastmod>2026-01-27T11:05:45.183Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-are-attacking-users-searching-for-legitimate-tools-by-using-seo-poisoning</loc>
<lastmod>2026-01-27T11:05:44.964Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/more-than-6000-smartertools-smartermail-servers-are-vulnerable-to-actively-exploited-rce-vulnerabili</loc>
<lastmod>2026-01-27T11:05:44.066Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wd-discovery-desktop-app-for-windows-vulnerability-enables-arbitrary-code-execution</loc>
<lastmod>2026-01-27T09:54:08.810Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/clickfix-assaults-extend-using-microsoft-scripts-trusted-web-services-and-fake-captchas</loc>
<lastmod>2026-01-27T09:54:07.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-secure-connectivity-principles-checklist-for-operational-technology-networks-connectivity-is-pub</loc>
<lastmod>2026-01-27T09:54:07.663Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/supply-chain-nightmare-hackers-hijack-github-desktop-to-distribute-trojans-as-legit-updates</loc>
<lastmod>2026-01-27T08:46:46.775Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-threat-intelligence-will-change-cybersecurity-in-2026</loc>
<lastmod>2026-01-29T00:03:57.719Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hand-cve-over-to-the-private-sector</loc>
<lastmod>2026-01-29T00:03:57.662Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vm2-sandbox-vulnerability-in-nodejs-lets-attackers-run-untrusted-code</loc>
<lastmod>2026-01-27T08:46:45.814Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/caminho-loader-as-a-service-using-steganography-to-conceal-net-payloads-within-image-files</loc>
<lastmod>2026-01-27T08:46:45.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beauty-in-destruction-exploring-malwares-impact-through-art</loc>
<lastmod>2026-01-27T08:46:45.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/over-6000-smartermail-servers-were-vulnerable-to-an-actively-exploited-rce-vulnerability</loc>
<lastmod>2026-01-27T08:46:44.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ctem-in-practice-outcomes-that-matter-validation-and-prioritization</loc>
<lastmod>2026-01-27T06:34:32.394Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-lawsuit-alleges-meta-can-read-all-whatsapp-users-messages</loc>
<lastmod>2026-01-27T05:39:55.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-vulnerability-in-python-ply-library-enables-remote-code-execution-poc-published</loc>
<lastmod>2026-01-27T05:39:54.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rce-attacks-via-spreadsheet-formulas-are-made-possible-by-a-critical-grist-core-vulnerability</loc>
<lastmod>2026-01-27T05:39:54.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-office-zero-day-actively-exploited-in-targeted-cyberattacks</loc>
<lastmod>2026-01-28T10:45:31.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/windows-vulnerability-in-the-wd-discovery-desktop-app-permits-arbitrary-code-execution</loc>
<lastmod>2026-01-27T04:33:39.070Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-using-fake-notepad-and-7-zip-websites-to-deploy-remote-monitoring-tools</loc>
<lastmod>2026-01-27T04:33:38.971Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nodejs-2550-released-with-updated-root-certificates-and-new-command-line-flags</loc>
<lastmod>2026-01-27T04:33:38.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-vulnerabilities-in-react-server-components-enable-dos-attacks</loc>
<lastmod>2026-01-27T04:33:38.629Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-office-zero-day-vulnerability-actively-exploited-in-attacks</loc>
<lastmod>2026-01-27T04:33:38.495Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-hackers-have-used-the-peckbirdy-javascript-c2-framework-since-2023</loc>
<lastmod>2026-01-27T04:33:37.800Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-aligned-apts-exploit-stolen-certificates-in-multi-vector-attacks-using-the-peckbirdy-cc-framew</loc>
<lastmod>2026-01-27T04:33:37.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-indian-government-is-being-attacked-by-apt-hackers-gitshellpad-malware-and-the-gogitter-tool</loc>
<lastmod>2026-01-27T04:33:37.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/five-useful-strategies-for-security-ai-without-losing-control</loc>
<lastmod>2026-01-27T04:33:37.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/multiple-flaws-in-react-server-components-could-allow-attackers-to-trigger-dos-attacks</loc>
<lastmod>2026-01-27T02:04:09.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/emergency-patch-for-active-exploitation-of-microsoft-office-zero-day-cve-2026-21509</loc>
<lastmod>2026-01-27T02:04:09.226Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-use-7-zip-and-fake-notepad-websites-to-spread-remote-monitoring-malware</loc>
<lastmod>2026-01-27T02:04:08.964Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/curl-to-terminate-bug-bounty-after-poor-quality-vulnerability-reports-produced-by-ai</loc>
<lastmod>2026-01-26T22:17:31.864Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/poc-released-over-800k-telnet-servers-are-vulnerable-to-rce-attacks</loc>
<lastmod>2026-01-26T22:17:31.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/wiper-attack-on-polands-power-grid-caused-by-sandworm</loc>
<lastmod>2026-01-26T16:35:25.069Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2026s-top-vpn-services-quick-safe-and-reasonably-priced</loc>
<lastmod>2026-01-26T14:15:16.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-malware-toolkit-sends-users-to-malicious-websites-while-the-url-stays-the-same</loc>
<lastmod>2026-01-26T11:52:05.327Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-tax-phishing-campaign-targets-indian-users-blackmoon-malware-delivery</loc>
<lastmod>2026-01-26T11:52:05.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/with-15-million-installs-malicious-vs-code-ai-extensions-steal-developer-source-code</loc>
<lastmod>2026-01-26T11:01:21.021Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dprks-konni-uses-an-ai-generated-backdoor-to-target-blockchain-developers</loc>
<lastmod>2026-01-26T11:01:20.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-dprk-interview-campaign-leverages-fake-fonts-to-deploy-malware</loc>
<lastmod>2026-01-26T10:11:52.065Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-cybersecurity-framework-to-safeguard-embedded-systems-is-released-by-mitre</loc>
<lastmod>2026-01-26T10:11:52.004Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-from-lazarus-are-actively-targeting-european-drone-manufacturers</loc>
<lastmod>2026-01-26T10:11:51.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-new-instagram-vulnerability-makes-private-posts-visible-to-anyone</loc>
<lastmod>2026-01-26T08:49:25.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/as-poc-is-released-more-than-800k-gnu-inetutils-telnetd-instances-are-vulnerable-to-rce-attacks</loc>
<lastmod>2026-01-26T08:03:37.569Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-zero-day-vulnerabilities-in-netsupport-manager-turn-on-remote-code-execution</loc>
<lastmod>2026-01-26T08:03:37.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/winning-against-ai-based-attacks-requires-a-combined-defensive-approach</loc>
<lastmod>2026-01-26T07:16:05.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/unprotected-database-exposes-48m-gmail-and-65m-instagram-records-online</loc>
<lastmod>2026-01-26T07:16:05.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-weaponize-lnk-files-to-deploy-moonpeak-malware-on-windows</loc>
<lastmod>2026-01-26T07:16:05.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/syncfuture-campaign-weaponizing-legitimate-enterprise-security-software-to-deploy-malware</loc>
<lastmod>2026-01-26T07:16:05.772Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sandworm-apt-group-targeting-polands-power-grid-with-dynowiper-malware</loc>
<lastmod>2026-01-26T07:16:05.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-phishing-attack-leverages-vercel-hosting-platform-to-deliver-a-remote-access-tool</loc>
<lastmod>2026-01-26T07:16:05.647Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-releases-out-of-band-update-kb5078127-to-fix-windows-11-file-system-and-outlook-freezes</loc>
<lastmod>2026-01-26T07:16:05.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-issues-out-of-band-update-kb5078127-to-fix-windows-11-file-system-and-outlook-freezes</loc>
<lastmod>2026-01-26T07:16:05.499Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/malicious-fake-captcha-network-hijacks-trusted-web-services-for-malware-delivery</loc>
<lastmod>2026-01-26T07:16:05.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers</loc>
<lastmod>2026-01-26T07:16:05.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-python-ply-library-vulnerability-enables-remote-code-execution</loc>
<lastmod>2026-01-26T07:16:05.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-releases-secure-connectivity-principles-checklist-for-ot-network-connectivity</loc>
<lastmod>2026-01-26T07:16:05.114Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/backdoor-flaw-hits-20000-wordpress-sites-enables-stealthy-admin-user-creation</loc>
<lastmod>2026-01-26T07:16:05.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attackers-targeting-construction-firms-exploiting-mjobtime-app-vulnerability-using-mssql-and-iis-pos</loc>
<lastmod>2026-01-26T07:16:04.917Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/systems-are-vulnerable-to-crashes-and-data-corruption-due-to-an-apache-hadoop-vulnerability</loc>
<lastmod>2026-01-26T07:16:04.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-in-apache-hadoop-expose-systems-possible-data-corruption-or-crashes</loc>
<lastmod>2026-01-26T07:16:04.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-critical-cves-browser-traps-ai-generated-malware-firewall-vulnerabilities-and-more</loc>
<lastmod>2026-01-26T07:16:04.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/65m-instagram-and-48m-gmail-were-exposed-online-due-to-an-unprotected-database</loc>
<lastmod>2026-01-26T07:16:04.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-is-looking-into-windows-11-version-25h2-boot-failure-issues-after-the-january-update</loc>
<lastmod>2026-01-26T02:53:10.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/a-critical-vmware-vcenter-rce-vulnerability-is-actively-exploited-cisa-warns</loc>
<lastmod>2026-01-26T01:43:04.507Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/telnetd-vulnerability-actively-exploited-following-public-proof-of-concept-release</loc>
<lastmod>2026-01-25T04:34:54.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/additional-fortinet-issues-exploited-critical-fortisiem-flaw</loc>
<lastmod>2026-01-25T04:34:54.289Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-introduces-winapp-cli-to-streamline-and-modernize-the-development-of-windows-applications</loc>
<lastmod>2026-01-25T04:34:54.249Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-unveils-the-much-awaited-gmailcom-feature-for-address-change</loc>
<lastmod>2026-01-25T04:34:53.760Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/security-leaders-cisos-gain-notoriety-enter-the-executive-suite</loc>
<lastmod>2026-01-25T04:34:53.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/an-ai-system-cuts-the-time-it-takes-to-reconstruct-an-attack-from-weeks-to-hours</loc>
<lastmod>2026-01-25T04:34:53.216Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2025-served-as-a-reminder-to-safeguard-human-judgment-rather-than-just-systems</loc>
<lastmod>2026-01-25T04:34:53.165Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-malware-gootloader-uses-5001000-concatenated-zip-files-to-avoid-recognition</loc>
<lastmod>2026-01-16T12:46:32.657Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fix-critical-vulnerabilities-in-go-1256-and-12412-to-reduce-the-risk-of-dos-and-memory-exhaustion</loc>
<lastmod>2026-01-16T12:04:06.627Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-aws-console-supply-chain-attack-lets-attackers-hijack-aws-github-repositories</loc>
<lastmod>2026-01-16T11:22:57.608Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-associated-with-china-used-sitecore-zero-day-to-infiltrate-critical-infrastructure</loc>
<lastmod>2026-01-16T11:22:57.390Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/five-dangerous-chrome-add-ons-workday-and-netsuite-impersonation-for-account-theft</loc>
<lastmod>2026-01-16T08:44:11.250Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nsa-issues-implementation-guidelines-for-zero-trust</loc>
<lastmod>2026-01-16T07:25:37.772Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-project-zero-unveils-a-complex-zero-click-exploit-chain-aimed-at-the-pixel-9</loc>
<lastmod>2026-01-16T06:44:45.055Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/go-programming-language-126-fixes-several-memory-depleting-vulnerabilities</loc>
<lastmod>2026-01-16T06:44:44.976Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/your-digital-footprint-can-lead-right-to-your-front-door</loc>
<lastmod>2026-01-16T06:01:40.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/winter-olympics-could-share-podium-with-cyberattackers</loc>
<lastmod>2026-01-16T06:01:39.936Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/vulnerabilities-surge-but-messy-reporting-blurs-picture</loc>
<lastmod>2026-01-16T06:01:39.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/uat-8837-hackers-target-organizations-using-open-source-tools-to-steal-sensitive-data</loc>
<lastmod>2026-01-16T06:01:39.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/predator-spyware-sample-indicates-vendor-controlled-c2</loc>
<lastmod>2026-01-16T06:01:39.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-malware-targets-200000-us-bank-employees-to-steal-login-credentials</loc>
<lastmod>2026-01-16T06:01:39.628Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-aws-console-supply-chain-attack-sees-hackers-hijack-aws-github-repositories</loc>
<lastmod>2026-01-16T06:01:39.520Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lotuslite-backdoor-targets-us-policy-entities-using-venezuela-themed-spear-phishing</loc>
<lastmod>2026-01-16T06:01:39.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-patches-zero-day-rce-exploited-by-china-linked-apt-in-secure-email-gateways</loc>
<lastmod>2026-01-16T06:01:39.344Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-associated-with-china-uses-sitecore-zero-day-to-attack-american-critical-infrastructure</loc>
<lastmod>2026-01-16T06:01:39.275Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/azure-identity-token-vulnerability-enables-windows-admin-center-tenant-wide-compromise</loc>
<lastmod>2026-01-16T06:01:39.196Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-ai-voice-cloning-exploit-wi-fi-kill-switch-plc-vulns-and-14-more-stories</loc>
<lastmod>2026-01-15T08:43:12.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/model-security-is-the-wrong-frame-the-real-risk-is-workflow-security</loc>
<lastmod>2026-01-15T07:56:49.262Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/four-antiquated-practices-that-will-destroy-your-socs-mttr-in-2026</loc>
<lastmod>2026-01-15T06:06:40.972Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trio-of-critical-bugs-spotted-in-delta-industrial-plcs</loc>
<lastmod>2026-01-15T05:26:31.455Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-legal-action-disrupts-redvds-cybercrime-infrastructure-used-for-online-fraud</loc>
<lastmod>2026-01-15T04:08:39.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/voidlink-malware-poses-advanced-threat-to-linux-systems</loc>
<lastmod>2026-01-15T01:49:18.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/taiwan-endures-greater-cyber-pressure-from-china</loc>
<lastmod>2026-01-15T01:49:18.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/servicenow-patches-critical-ai-platform-flaw-allowing-unauthenticated-user-impersonation</loc>
<lastmod>2026-01-15T01:49:18.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/retail-services-industries-under-fire-in-oceania</loc>
<lastmod>2026-01-15T01:49:18.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-disrupts-cybercrime-service-redvds</loc>
<lastmod>2026-01-15T01:49:18.469Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-malware-campaign-delivers-remcos-rat-through-multi-stage-windows-attack</loc>
<lastmod>2026-01-13T03:27:38.818Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-warns-of-active-exploitation-of-gogs-vulnerability-enabling-code-execution</loc>
<lastmod>2026-01-13T01:36:30.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/n8n-supply-chain-attack-abuses-community-nodes-to-steal-oauth-tokens</loc>
<lastmod>2026-01-12T11:01:15.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/weekly-recap-ai-automation-exploits-telecom-espionage-prompt-poaching-more</loc>
<lastmod>2026-01-12T07:58:41.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gobruteforcer-botnet-targets-crypto-project-databases-by-exploiting-weak-credentials</loc>
<lastmod>2026-01-12T04:59:10.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/anthropic-launches-claude-ai-for-healthcare-with-secure-health-record-access</loc>
<lastmod>2026-01-12T02:56:11.346Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-service-providers-fueling-industrial-scale-pig-butchering-fraud</loc>
<lastmod>2026-01-12T02:20:30.302Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-hackers-exploit-vmware-esxi-zero-days-to-escape-virtual-machines</loc>
<lastmod>2026-01-09T14:38:54.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trend-micro-apex-central-rce-flaw-scores-98-cvss-in-on-prem-windows-versions</loc>
<lastmod>2026-01-09T04:34:32.151Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-retires-10-emergency-cybersecurity-directives-issued-between-2019-and-2024</loc>
<lastmod>2026-01-09T03:36:51.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-patches-ise-security-vulnerability-after-public-poc-exploit-release</loc>
<lastmod>2026-01-08T16:07:07.264Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/coolify-discloses-11-critical-flaws-enabling-full-server-compromise-on-self-hosted-instances</loc>
<lastmod>2026-01-08T15:11:59.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-uat-7290-targets-telecoms-with-linux-malware-and-orb-nodes</loc>
<lastmod>2026-01-08T09:04:45.230Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-rustfs-flaw-iranian-ops-webui-rce-cloud-leaks-and-12-more-stories</loc>
<lastmod>2026-01-08T07:07:36.193Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-state-of-trusted-open-source</loc>
<lastmod>2026-01-08T06:26:30.346Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-microsoft-office-and-hpe-oneview-bugs-as-actively-exploited</loc>
<lastmod>2026-01-08T00:16:32.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-n8n-vulnerability-cvss-100-allows-unauthenticated-attackers-to-take-full-control</loc>
<lastmod>2026-01-07T08:36:29.508Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/n8n-warns-of-cvss-100-rce-vulnerability-affecting-self-hosted-and-cloud-versions</loc>
<lastmod>2026-01-07T06:18:44.965Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/veeam-patches-critical-rce-vulnerability-with-cvss-90-in-backup-replication</loc>
<lastmod>2026-01-07T04:50:43.496Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ongoing-attacks-exploiting-critical-rce-vulnerability-in-legacy-d-link-dsl-routers</loc>
<lastmod>2026-01-07T04:43:26.303Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-n8n-vulnerability-99-cvss-lets-authenticated-users-execute-system-commands</loc>
<lastmod>2026-01-06T17:05:58.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-adonisjs-bodyparser-flaw-cvss-92-enables-arbitrary-file-write-on-servers</loc>
<lastmod>2026-01-06T16:56:45.264Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-abuse-google-cloud-email-feature-in-multi-stage-phishing-campaign</loc>
<lastmod>2026-01-02T16:57:17.750Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-roi-problem-in-attack-surface-management</loc>
<lastmod>2026-01-02T16:57:16.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-browse-faster-and-get-more-done-using-adapt-browser</loc>
<lastmod>2026-01-01T12:27:03.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rondodox-botnet-exploits-critical-react2shell-flaw-to-hijack-iot-devices-and-web-servers</loc>
<lastmod>2026-01-01T12:27:01.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-ghostad-drain-macos-attacks-proxy-botnets-cloud-exploits-and-12-stories</loc>
<lastmod>2026-01-01T12:27:00.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-treasury-lifts-sanctions-on-three-individuals-linked-to-intellexa-and-predator-spyware</loc>
<lastmod>2025-12-31T14:45:37.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-adds-actively-exploited-sierra-wireless-router-flaw-enabling-rce-attacks</loc>
<lastmod>2025-12-31T14:03:44.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-zero-day-exploited-to-deliver-italian-memento-labs-leetagent-spyware</loc>
<lastmod>2025-12-31T14:03:42.793Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chrome-targeted-by-active-in-the-wild-exploit-tied-to-undisclosed-high-severity-flaw</loc>
<lastmod>2025-12-31T14:03:41.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-threat-group-jewelbug-quietly-infiltrated-russian-it-network-for-months</loc>
<lastmod>2025-12-31T14:03:40.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-threat-actors-exploit-toolshell-sharepoint-flaw-weeks-after-microsofts-july-patch</loc>
<lastmod>2025-12-31T14:03:39.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-hackers-have-started-exploiting-the-newly-disclosed-react2shell-vulnerability</loc>
<lastmod>2025-12-31T14:03:37.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-deepseek-r1-ai-generates-insecure-code-when-prompts-mention-tibet-or-uyghurs</loc>
<lastmod>2025-12-31T14:03:36.112Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-cybercrime-group-runs-global-seo-fraud-ring-using-compromised-iis-servers</loc>
<lastmod>2025-12-31T14:03:34.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-tick-group-exploits-lanscope-zero-day-to-hijack-corporate-systems</loc>
<lastmod>2025-12-31T14:03:33.610Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-hackers-exploit-windows-shortcut-flaw-to-target-european-diplomats</loc>
<lastmod>2025-12-31T14:03:32.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-accuses-us-of-fabricating-volt-typhoon-to-hide-its-own-hacking-campaigns</loc>
<lastmod>2025-12-31T14:03:30.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chatgpt-atlas-browser-can-be-tricked-by-fake-urls-into-executing-hidden-commands</loc>
<lastmod>2025-12-31T14:03:29.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/bridging-the-remediation-gap-introducing-pentera-resolve</loc>
<lastmod>2025-12-31T14:03:28.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/beware-the-hidden-costs-of-pen-testing</loc>
<lastmod>2025-12-31T14:03:26.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/astaroth-banking-malware-resurfaces-in-brazil-via-spear-phishing-attack</loc>
<lastmod>2025-12-31T14:03:25.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/asd-warns-of-ongoing-badcandy-attacks-exploiting-cisco-ios-xe-vulnerability</loc>
<lastmod>2025-12-31T14:03:23.868Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apple-issues-security-updates-after-two-webkit-flaws-found-exploited-in-the-wild</loc>
<lastmod>2025-12-31T14:03:22.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/analysing-clickfix-3-reasons-why-copypaste-attacks-are-driving-security-breaches</loc>
<lastmod>2025-12-31T14:03:20.949Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/amazon-uncovers-attacks-exploited-cisco-ise-and-citrix-netscaler-as-zero-day-flaws</loc>
<lastmod>2025-12-31T14:03:19.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-exploits-hit-dassault-and-xwiki-cisa-confirms-critical-flaws-under-attack</loc>
<lastmod>2025-12-31T14:03:18.183Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-directory-under-siege-why-critical-infrastructure-needs-stronger-security</loc>
<lastmod>2025-12-31T14:03:16.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/active-attacks-exploit-gladinets-hard-coded-keys-for-unauthorized-access-and-code-execution</loc>
<lastmod>2025-12-31T11:42:04.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/5-threats-that-reshaped-web-security-this-year-2025</loc>
<lastmod>2025-12-31T11:42:01.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/3000-youtube-videos-exposed-as-malware-traps-in-massive-ghost-network-operation</loc>
<lastmod>2025-12-31T11:41:08.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/2025-cybersecurity-reality-check-breaches-hidden-attack-surfaces-growing-and-ai-misperceptions-risin</loc>
<lastmod>2025-12-31T11:41:07.369Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/13-year-old-redis-flaw-exposed-cvss-100-vulnerability-lets-attackers-run-code-remotely</loc>
<lastmod>2026-02-04T10:53:01.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/zloader-malware-returns-with-dns-tunneling-to-stealthily-mask-c2-comms</loc>
<lastmod>2025-12-31T11:22:53.722Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/winos-40-malware-infects-gamers-through-malicious-game-optimization-apps</loc>
<lastmod>2025-12-31T11:22:52.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/warning-over-2000-palo-alto-networks-devices-hacked-in-ongoing-attack-campaign</loc>
<lastmod>2025-12-31T11:22:51.170Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-sanctions-chinese-cybersecurity-firm-over-treasury-hack-tied-to-silk-typhoon</loc>
<lastmod>2025-12-31T11:22:49.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-agencies-warn-of-rising-iranian-cyber-attacks-on-defense-ot-networks-and-critical-infrastructure</loc>
<lastmod>2025-12-31T11:22:48.445Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ukrainian-minors-recruited-for-cyber-ops-and-reconnaissance-in-russian-airstrikes</loc>
<lastmod>2025-12-31T11:22:47.180Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trump-terminates-dhs-advisory-committee-memberships-disrupting-cybersecurity-review</loc>
<lastmod>2025-12-31T11:22:45.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/top-5-malware-threats-to-prepare-against-in-2025</loc>
<lastmod>2025-12-31T11:22:44.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threat-actors-exploit-clickfix-to-deploy-netsupport-rat-in-latest-cyber-attacks</loc>
<lastmod>2025-12-31T11:22:43.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-recap-top-cybersecurity-threats-tools-and-tips-nov-25-dec-1</loc>
<lastmod>2025-12-31T11:22:42.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-18-nov-24</loc>
<lastmod>2025-12-31T11:22:40.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-04-nov-10</loc>
<lastmod>2025-12-31T11:22:39.274Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/scattered-spider-behind-cyberattacks-on-ms-and-co-op-causing-up-to-592m-in-damages</loc>
<lastmod>2025-12-31T11:22:37.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russian-hackers-gamaredon-and-turla-collaborate-to-deploy-kazuar-backdoor-in-ukraine</loc>
<lastmod>2025-12-31T11:22:36.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-batavia-windows-spyware-stealing-documents-from-russian-firms</loc>
<lastmod>2025-12-31T11:22:35.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/researchers-uncover-4-month-cyberattack-on-us-firm-linked-to-chinese-hackers</loc>
<lastmod>2025-12-31T11:22:34.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/reddelta-deploys-plugx-malware-to-target-mongolia-and-taiwan-in-espionage-campaigns</loc>
<lastmod>2025-12-31T11:22:32.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pro-iranian-hacktivist-group-leaks-personal-records-from-the-2024-saudi-games</loc>
<lastmod>2025-12-31T11:22:31.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/pngplug-loader-delivers-valleyrat-malware-through-fake-software-installers</loc>
<lastmod>2025-12-31T11:22:30.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/phishing-campaigns-use-real-time-checks-to-validate-victim-emails-before-credential-theft</loc>
<lastmod>2025-12-31T11:22:28.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-kimsuky-hackers-use-russian-email-addresses-for-credential-theft-attacks</loc>
<lastmod>2025-12-31T11:22:27.446Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korean-group-collaborates-with-play-ransomware-in-significant-cyber-attack</loc>
<lastmod>2025-12-31T11:22:26.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-ymir-ransomware-exploits-memory-for-stealthy-attacks-targets-corporate-networks</loc>
<lastmod>2025-12-31T11:22:24.912Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-sparrowdoor-backdoor-variants-found-in-attacks-on-us-and-mexican-organizations</loc>
<lastmod>2025-12-31T11:22:23.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-gootloader-campaign-targets-users-searching-for-bengal-cat-laws-in-australia</loc>
<lastmod>2025-12-31T11:22:22.279Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-golang-based-backdoor-uses-telegram-bot-api-for-evasive-c2-operations</loc>
<lastmod>2025-12-31T11:22:20.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-crontrap-malware-infects-windows-by-hiding-in-linux-vm-to-evade-antivirus</loc>
<lastmod>2025-12-31T11:22:19.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-android-banking-malware-toxicpanda-targets-users-with-fraudulent-money-transfers</loc>
<lastmod>2025-12-31T11:22:18.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/microsoft-russian-linked-hackers-using-device-code-phishing-to-hijack-accounts</loc>
<lastmod>2025-12-31T11:22:17.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lazarus-group-exploits-google-chrome-vulnerability-to-control-infected-devices</loc>
<lastmod>2025-12-31T11:22:15.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iranian-backed-pay2key-ransomware-resurfaces-with-80-profit-share-for-cybercriminals</loc>
<lastmod>2025-12-31T11:22:12.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hackers-target-over-70-microsoft-exchange-servers-to-steal-credentials-via-keyloggers</loc>
<lastmod>2025-12-31T11:22:11.454Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-warns-of-actively-exploited-cve-2024-43093-vulnerability-in-android-system</loc>
<lastmod>2025-12-31T11:22:10.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-identifies-three-new-russian-malware-families-created-by-coldriver-hackers</loc>
<lastmod>2025-12-31T11:22:08.913Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/gcore-ddos-radar-reveals-56-yoy-increase-in-ddos-attacks</loc>
<lastmod>2025-12-31T11:22:07.657Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/from-healthkick-to-govershell-the-evolution-of-uta0388s-espionage-malware</loc>
<lastmod>2025-12-31T11:22:06.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/four-arrested-in-440m-cyber-attack-on-marks-spencer-co-op-and-harrods</loc>
<lastmod>2025-12-31T11:22:05.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-ssl-vpns-hit-by-global-brute-force-wave-before-attackers-shift-to-fortimanager</loc>
<lastmod>2025-12-31T11:22:03.856Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ficora-and-kaiten-botnets-exploit-old-d-link-vulnerabilities-for-global-attacks</loc>
<lastmod>2025-12-31T11:22:02.578Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-google-chrome-sites-distribute-valleyrat-malware-via-dll-hijacking</loc>
<lastmod>2025-12-31T11:22:01.190Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/evilai-malware-masquerades-as-ai-tools-to-infiltrate-global-organizations</loc>
<lastmod>2025-12-31T11:21:59.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/eu-sanctions-3-russian-nationals-for-cyber-attacks-targeting-estonias-key-ministries</loc>
<lastmod>2025-12-31T11:21:58.643Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/donot-team-linked-to-new-tanzeem-android-malware-targeting-intelligence-collection</loc>
<lastmod>2025-12-31T11:21:57.344Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/dhs-warns-pro-iranian-hackers-likely-to-target-us-networks-after-iranian-nuclear-strikes</loc>
<lastmod>2025-12-31T11:21:56.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cybercriminals-use-excel-exploit-to-spread-fileless-remcos-rat-malware</loc>
<lastmod>2025-12-31T11:21:54.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cyber-criminals-exploit-open-source-tools-to-compromise-financial-institutions-across-africa</loc>
<lastmod>2025-12-31T11:21:53.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-wing-ftp-server-vulnerability-cve-2025-47812-actively-being-exploited-in-the-wild</loc>
<lastmod>2025-12-31T11:21:52.129Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cloud-atlas-deploys-vbcloud-malware-over-80-of-targets-found-in-russia</loc>
<lastmod>2025-12-31T11:21:50.806Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing</loc>
<lastmod>2025-12-31T11:21:49.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-hackers-use-cloudscout-toolset-to-steal-session-cookies-from-cloud-services</loc>
<lastmod>2025-12-31T11:21:48.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/chinese-hackers-use-anthropics-ai-to-launch-automated-cyber-espionage-campaign</loc>
<lastmod>2025-12-31T11:21:46.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-aligned-mirrorface-hackers-target-eu-diplomats-with-world-expo-2025-bait</loc>
<lastmod>2025-12-31T11:21:45.746Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cert-ua-identifies-malicious-rdp-files-in-latest-attack-on-ukrainian-entities</loc>
<lastmod>2025-12-31T11:21:44.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/belarus-linked-ghostwriter-uses-macropack-obfuscated-excel-macros-to-deploy-malware</loc>
<lastmod>2025-12-31T11:21:43.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt-c-60-hackers-exploit-statcounter-and-bitbucket-in-spyglace-malware-campaign</loc>
<lastmod>2025-12-31T11:21:41.856Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/androxgh0st-malware-integrates-mozi-botnet-to-target-iot-and-cloud-services</loc>
<lastmod>2025-12-31T11:21:40.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-6-jan</loc>
<lastmod>2025-12-31T11:21:39.185Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-weekly-recap-top-cybersecurity-threats-tools-and-tips</loc>
<lastmod>2025-12-31T11:21:37.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/thn-recap-top-cybersecurity-threats-tools-and-tips-dec-2-8</loc>
<lastmod>2025-12-31T11:21:36.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes</loc>
<lastmod>2025-12-30T12:08:58.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/why-data-security-and-privacy-need-to-start-in-code</loc>
<lastmod>2025-12-30T11:06:26.571Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/watchguard-warns-of-active-exploitation-of-critical-fireware-os-vpn-vulnerability</loc>
<lastmod>2025-12-30T11:06:25.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-doj-seizes-fraud-domain-behind-146-million-bank-account-takeover-scheme</loc>
<lastmod>2025-12-30T11:06:23.491Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/us-doj-charges-54-in-atm-jackpotting-scheme-using-ploutus-malware</loc>
<lastmod>2025-12-30T11:06:21.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/two-chrome-extensions-caught-secretly-stealing-credentials-from-over-170-sites</loc>
<lastmod>2025-12-30T11:06:20.323Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/trust-wallet-chrome-extension-breach-caused-7-million-crypto-loss-via-malicious-code</loc>
<lastmod>2025-12-30T11:06:18.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/traditional-security-frameworks-leave-organizations-exposed-to-ai-specific-attack-vectors</loc>
<lastmod>2025-12-30T11:06:17.101Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-whatsapp-hijacks-mcp-leaks-ai-recon-react2shell-exploit-and-15-more-stories</loc>
<lastmod>2025-12-30T11:06:15.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/threatsday-bulletin-stealth-loaders-ai-chatbot-flaws-ai-exploits-docker-hack-and-15-more-stories</loc>
<lastmod>2025-12-30T11:06:13.833Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/the-case-for-dynamic-ai-saas-security-as-copilots-scale</loc>
<lastmod>2025-12-30T11:06:12.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sonicwall-fixes-actively-exploited-cve-2025-40602-in-sma-100-appliances</loc>
<lastmod>2025-12-30T11:06:10.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/sec-files-charges-over-14-million-crypto-scam-using-fake-ai-themed-investment-tips</loc>
<lastmod>2025-12-30T11:06:09.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/russia-linked-hackers-use-microsoft-365-device-code-phishing-for-account-takeovers</loc>
<lastmod>2025-12-30T11:06:07.465Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/rogue-nuget-package-poses-as-tracerfody-steals-cryptocurrency-wallet-data</loc>
<lastmod>2025-12-30T11:06:05.895Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors</loc>
<lastmod>2025-12-30T11:06:04.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/passwd-a-walkthrough-of-the-google-workspace-password-manager</loc>
<lastmod>2025-12-30T11:06:02.615Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/north-korea-linked-hackers-steal-202-billion-in-2025-leading-global-crypto-theft</loc>
<lastmod>2025-12-30T11:06:01.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nomani-investment-scam-surges-62-using-ai-deepfake-ads-on-social-media</loc>
<lastmod>2025-12-30T11:05:59.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/nigeria-arrests-raccoono365-phishing-developer-linked-to-microsoft-365-attacks</loc>
<lastmod>2025-12-30T11:05:57.619Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-uefi-flaw-enables-early-boot-dma-attacks-on-asrock-asus-gigabyte-msi-motherboards</loc>
<lastmod>2025-12-30T11:05:56.066Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-mongodb-flaw-lets-unauthenticated-attackers-read-uninitialized-memory</loc>
<lastmod>2025-12-30T11:05:54.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-macsync-macos-stealer-uses-signed-app-to-bypass-apple-gatekeeper</loc>
<lastmod>2025-12-30T11:05:52.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/new-forumtroll-phishing-attacks-target-russian-scholars-using-fake-elibrary-emails</loc>
<lastmod>2025-12-30T11:05:51.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/mongodb-vulnerability-cve-2025-14847-under-active-exploitation-worldwide</loc>
<lastmod>2025-12-30T11:05:49.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/lastpass-2022-breach-led-to-years-long-cryptocurrency-thefts-trm-labs-finds</loc>
<lastmod>2025-12-30T11:05:48.070Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kimwolf-botnet-hijacks-18-million-android-tvs-launches-large-scale-ddos-attacks</loc>
<lastmod>2025-12-30T11:05:46.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/kimsuky-spreads-docswap-android-malware-via-qr-phishing-posing-as-delivery-app</loc>
<lastmod>2025-12-30T11:05:44.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/italy-fines-apple-986-million-over-att-rules-limiting-app-store-competition</loc>
<lastmod>2025-12-30T11:05:43.277Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/iranian-infy-apt-resurfaces-with-new-malware-activity-after-years-of-silence</loc>
<lastmod>2025-12-30T11:05:41.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/interpol-arrests-574-in-africa-ukrainian-ransomware-affiliate-pleads-guilty</loc>
<lastmod>2026-02-13T08:50:42.652Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/hpe-oneview-flaw-rated-cvss-100-allows-unauthenticated-remote-code-execution</loc>
<lastmod>2026-02-13T08:51:46.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/how-to-browse-the-web-more-sustainably-with-a-green-browser</loc>
<lastmod>2025-12-30T11:05:36.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/google-to-shut-down-dark-web-monitoring-tool-in-february-2026</loc>
<lastmod>2026-02-13T08:52:32.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/ghostposter-malware-found-in-17-firefox-add-ons-with-50000-downloads</loc>
<lastmod>2025-12-30T11:05:33.836Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-warns-of-active-exploitation-of-fortios-ssl-vpn-2fa-bypass-vulnerability</loc>
<lastmod>2026-02-13T08:53:24.074Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fortinet-fortigate-under-active-attack-through-saml-sso-authentication-bypass</loc>
<lastmod>2025-12-30T11:05:30.677Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fix-soc-blind-spots-see-threats-to-your-industry-country-in-real-time</loc>
<lastmod>2025-12-30T11:05:29.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fcc-bans-foreign-made-drones-and-key-parts-over-us-national-security-risks</loc>
<lastmod>2025-12-30T11:05:27.552Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/fake-whatsapp-api-package-on-npm-steals-messages-contacts-and-login-tokens</loc>
<lastmod>2025-12-30T11:05:25.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-n8n-flaw-cvss-99-enables-arbitrary-code-execution-across-thousands-of-instances</loc>
<lastmod>2025-12-30T11:05:24.364Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/critical-langchain-core-vulnerability-exposes-secrets-via-serialization-injection</loc>
<lastmod>2026-02-13T08:48:52.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cracked-software-and-youtube-videos-spread-countloader-and-gachiloader-malware</loc>
<lastmod>2025-12-30T11:05:21.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/compromised-iam-credentials-power-a-large-aws-crypto-mining-campaign</loc>
<lastmod>2025-12-30T11:05:19.690Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisco-warns-of-active-attacks-exploiting-unpatched-0-day-in-asyncos-email-security-appliances</loc>
<lastmod>2025-12-30T11:05:18.139Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-critical-asus-live-update-flaw-after-evidence-of-active-exploitation</loc>
<lastmod>2026-02-06T10:00:54.285Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/cisa-flags-actively-exploited-digiever-nvr-vulnerability-allowing-remote-code-execution</loc>
<lastmod>2025-12-30T11:05:15.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-ink-dragon-hacks-governments-using-shadowpad-and-finaldraft-malware</loc>
<lastmod>2025-12-30T11:05:13.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-linked-evasive-panda-ran-dns-poisoning-campaign-to-deliver-mgbot-malware</loc>
<lastmod>2025-12-30T11:05:11.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/china-aligned-threat-group-uses-windows-group-policy-to-deploy-espionage-malware</loc>
<lastmod>2026-02-13T08:49:45.337Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/attacks-are-evolving-3-ways-to-protect-your-business-in-2026</loc>
<lastmod>2025-12-30T11:05:08.782Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/apt28-targets-ukrainian-ukr-net-users-in-long-running-credential-phishing-campaign</loc>
<lastmod>2025-12-30T11:05:07.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://blog.zerowl.io/category/cyber-attack</loc>
<lastmod>2025-12-31T11:21:36.137Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.zerowl.io/category/cybersecurity</loc>
<lastmod>2025-12-12T16:31:59.036Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.zerowl.io/category/data-breach</loc>
<lastmod>2025-12-31T11:41:05.270Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://blog.zerowl.io/category/vulnerability</loc>
<lastmod>2025-12-31T11:42:01.349Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
</urlset>
