<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//huntingthreats.de/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://huntingthreats.de/</loc>
		<lastmod>2026-05-22T22:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-40165-high-schwachstelle/</loc>
		<lastmod>2026-05-21T13:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9144-high-schwachstelle/</loc>
		<lastmod>2026-05-21T13:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-40092-high-schwachstelle/</loc>
		<lastmod>2026-05-21T13:56:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-44050-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-6279-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-5118-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2025-71210-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2025-71211-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-47372-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-5433-critical-schwachstelle/</loc>
		<lastmod>2026-05-21T21:42:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44047-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:43:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44048-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:43:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-39461-high-luecke-in-freebsd-freebsd/</loc>
		<lastmod>2026-05-21T21:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9157-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:43:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45253-high-luecke-in-freebsd-freebsd/</loc>
		<lastmod>2026-05-21T21:43:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-2740-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44051-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:44:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-4858-high-luecke-in-mattermost-mattermost_server/</loc>
		<lastmod>2026-05-21T21:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45250-high-luecke-in-freebsd-freebsd/</loc>
		<lastmod>2026-05-21T21:44:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-28764-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:44:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45251-high-luecke-in-freebsd-freebsd/</loc>
		<lastmod>2026-05-21T21:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71212-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71213-high-schwachstelle/</loc>
		<lastmod>2026-05-21T21:45:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/showboat-linux-malware-hits-middle-east-telecom-with-socks5-proxy-backdoor/</loc>
		<lastmod>2026-05-21T22:42:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/</loc>
		<lastmod>2026-05-21T22:42:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories/</loc>
		<lastmod>2026-05-21T22:43:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/four-malicious-npm-packages-deliver-infostealers-and-phantom-bot-ddos-malware/</loc>
		<lastmod>2026-05-21T22:43:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/</loc>
		<lastmod>2026-05-21T22:43:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/</loc>
		<lastmod>2026-05-21T22:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/typosquatting-is-no-longer-a-user-problem-its-a-supply-chain-problem/</loc>
		<lastmod>2026-05-21T22:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/stealer-backdoor-found-in-3-node-ipc-versions-targeting-developer-secrets/</loc>
		<lastmod>2026-05-21T22:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/compromised-nx-console-18-95-0-targeted-vs-code-developers-with-credential-stealer/</loc>
		<lastmod>2026-05-21T22:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/popular-github-action-tags-redirected-to-imposter-commit-to-steal-ci-cd-credentials/</loc>
		<lastmod>2026-05-21T22:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/miniplasma-windows-0-day-enables-system-privilege-escalation-on-fully-patched-systems/</loc>
		<lastmod>2026-05-21T22:44:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/</loc>
		<lastmod>2026-05-21T22:44:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/google-accidentally-exposed-details-of-unfixed-chromium-flaw/</loc>
		<lastmod>2026-05-21T22:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide/</loc>
		<lastmod>2026-05-21T22:45:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/</loc>
		<lastmod>2026-05-21T22:56:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/</loc>
		<lastmod>2026-05-21T22:56:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71214-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:14:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71216-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71217-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-34927-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:14:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-34928-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-34929-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-34930-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45206-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45207-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45208-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:15:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44068-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44049-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44052-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/</loc>
		<lastmod>2026-05-21T23:16:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44055-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/</loc>
		<lastmod>2026-05-21T23:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44060-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/mini-shai-hulud-pushes-malicious-antv-npm-packages-via-compromised-maintainer-account/</loc>
		<lastmod>2026-05-21T23:16:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44062-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/</loc>
		<lastmod>2026-05-21T23:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-42001-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/pre-stuxnet-fast16-malware-tampered-with-nuclear-weapons-simulations/</loc>
		<lastmod>2026-05-21T23:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-45255-high-luecke-in-freebsd-freebsd/</loc>
		<lastmod>2026-05-21T23:17:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-13479-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:17:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/</loc>
		<lastmod>2026-05-21T23:17:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44053-high-schwachstelle/</loc>
		<lastmod>2026-05-21T23:17:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access/</loc>
		<lastmod>2026-05-21T23:17:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/police-seize-first-vpn-service-used-in-ransomware-data-theft-attacks/</loc>
		<lastmod>2026-05-21T23:17:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/apple-blocked-over-11-billion-in-app-store-fraud-in-6-years/</loc>
		<lastmod>2026-05-21T23:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-links-repo-breach-to-tanstack-npm-supply-chain-attack/</loc>
		<lastmod>2026-05-21T23:18:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cisa-admin-leaked-aws-govcloud-keys-on-github/</loc>
		<lastmod>2026-05-21T23:18:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canisterworm-springs-wiper-attack-targeting-iran/</loc>
		<lastmod>2026-05-21T23:18:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-2/</loc>
		<lastmod>2026-05-21T23:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-confirms-breach-4k-internal-repos-stolen/</loc>
		<lastmod>2026-05-21T23:18:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-48207-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T05:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-48207-critical-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:35:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-39531-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T05:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-39531-critical-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9089-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:35:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9089-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:35:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44058-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44058-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:35:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44064-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:35:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44064-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44066-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-44066-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-13477-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-13477-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71215-high-schwachstelle/</loc>
		<lastmod>2026-05-22T05:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2025-71215-high-schwachstelle-2/</loc>
		<lastmod>2026-05-22T05:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-warns-of-two-actively-exploited-defender-vulnerabilities-2/</loc>
		<lastmod>2026-05-22T05:37:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-rce-attacks-2/</loc>
		<lastmod>2026-05-22T05:38:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/when-identity-is-the-attack-path-2/</loc>
		<lastmod>2026-05-22T05:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/developer-workstations-are-now-part-of-the-software-supply-chain-2/</loc>
		<lastmod>2026-05-22T05:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-phishing-cobalt-strike/</loc>
		<lastmod>2026-05-22T05:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/inside-a-crypto-drainer-how-to-spot-it-before-it-empties-your-wallet/</loc>
		<lastmod>2026-05-22T05:39:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privilege-escalation/</loc>
		<lastmod>2026-05-22T05:39:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/new-fragnesia-linux-kernel-lpe-grants-root-access-via-page-cache-corruption/</loc>
		<lastmod>2026-05-22T05:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/alleged-kimwolf-botmaster-dort-arrested-charged-in-u-s-and-canada/</loc>
		<lastmod>2026-05-22T05:39:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/anti-ddos-firm-heaped-attacks-on-brazilian-isps/</loc>
		<lastmod>2026-05-22T05:39:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-3/</loc>
		<lastmod>2026-05-22T05:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/processes-and-culture-top-reasons-behind-data-breaches/</loc>
		<lastmod>2026-05-22T05:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/how-cisos-should-prep-for-agentic-ready-ai-boms/</loc>
		<lastmod>2026-05-22T05:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cyber-pros-cant-decide-if-ai-is-a-good-or-a-bad-thing/</loc>
		<lastmod>2026-05-22T05:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cisco-patches-cvss-10-0-secure-workload-rest-api-flaw-enabling-data-access/</loc>
		<lastmod>2026-05-22T06:40:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/</loc>
		<lastmod>2026-05-22T06:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/9-year-old-linux-kernel-flaw-enables-root-command-execution-on-major-distros-2/</loc>
		<lastmod>2026-05-22T06:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks-2/</loc>
		<lastmod>2026-05-22T06:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-internal-repositories-breached-via-malicious-nx-console-vs-code-extension-2/</loc>
		<lastmod>2026-05-22T06:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api-2/</loc>
		<lastmod>2026-05-22T06:41:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/agent-ai-is-coming-are-you-ready-2/</loc>
		<lastmod>2026-05-22T06:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/the-new-phishing-click-how-oauth-consent-bypasses-mfa-2/</loc>
		<lastmod>2026-05-22T06:41:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/interpol-operation-ramz-disrupts-mena-cybercrime-networks-with-201-arrests-2/</loc>
		<lastmod>2026-05-22T06:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%e2%9a%a1-weekly-recap-exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more-2/</loc>
		<lastmod>2026-05-22T06:42:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/grafana-github-token-breach-led-to-codebase-download-and-extortion-attempt-2/</loc>
		<lastmod>2026-05-22T06:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/grafana-breach-caused-by-missed-token-rotation-after-tanstack-attack-2/</loc>
		<lastmod>2026-05-22T06:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/google-api-keys-remain-active-after-deletion/</loc>
		<lastmod>2026-05-22T06:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/looking-back-looking-forward-digesting-a-dynamic-bouillabaisse-of-cyber-evolution/</loc>
		<lastmod>2026-05-22T06:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev/</loc>
		<lastmod>2026-05-22T07:40:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/ivanti-fortinet-sap-vmware-n8n-patch-rce-sql-injection-privilege-escalation-flaws/</loc>
		<lastmod>2026-05-22T07:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/chinese-hackers-target-telcos-with-new-linux-windows-malware/</loc>
		<lastmod>2026-05-22T07:40:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/flipper-one-project-needs-community-help-to-build-open-linux-platform/</loc>
		<lastmod>2026-05-22T07:40:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/hackers-bypass-sonicwall-vpn-mfa-due-to-incomplete-patching/</loc>
		<lastmod>2026-05-22T07:41:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/identity-alone-isnt-enough-why-device-security-has-to-share-the-load/</loc>
		<lastmod>2026-05-22T07:41:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-4/</loc>
		<lastmod>2026-05-22T07:41:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/processes-culture-top-reasons-behind-data-breaches/</loc>
		<lastmod>2026-05-22T07:41:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/russia-hacked-routers-to-steal-microsoft-office-tokens/</loc>
		<lastmod>2026-05-22T07:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/chinas-webworm-uses-discord-microsoft-graphs-to-hack-eu-govts/</loc>
		<lastmod>2026-05-22T07:42:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cyber-pros-cant-decide-if-ai-is-a-good-or-a-bad-thing-2/</loc>
		<lastmod>2026-05-22T07:42:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/infosecurity-europe/</loc>
		<lastmod>2026-05-22T07:42:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/can-laws-stop-deepfakes-south-korea-aims-to-find-out/</loc>
		<lastmod>2026-05-22T07:42:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/its-patch-tuesday-for-microsoft-not-a-zero-day-in-sight/</loc>
		<lastmod>2026-05-22T07:43:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/showboat-linux-malware-hits-middle-east-telecom-with-socks5-proxy-backdoor-2/</loc>
		<lastmod>2026-05-22T07:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps-2/</loc>
		<lastmod>2026-05-22T07:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories-2/</loc>
		<lastmod>2026-05-22T07:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/four-malicious-npm-packages-deliver-infostealers-and-phantom-bot-ddos-malware-2/</loc>
		<lastmod>2026-05-22T07:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development-2/</loc>
		<lastmod>2026-05-22T07:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos-2/</loc>
		<lastmod>2026-05-22T07:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/typosquatting-is-no-longer-a-user-problem-its-a-supply-chain-problem-2/</loc>
		<lastmod>2026-05-22T07:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/stealer-backdoor-found-in-3-node-ipc-versions-targeting-developer-secrets-2/</loc>
		<lastmod>2026-05-22T07:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/identity-alone-isnt-enough-why-device-security-has-to-share-the-load-2/</loc>
		<lastmod>2026-05-22T07:46:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/scattered-spider-member-tylerb-pleads-guilty/</loc>
		<lastmod>2026-05-22T07:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-5/</loc>
		<lastmod>2026-05-22T07:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/virtual-event-anatomy-of-a-data-breach-what-to-do-if-it-happens-to-you/</loc>
		<lastmod>2026-05-22T07:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/its-patch-tuesday-for-microsoft-not-a-zero-day-in-sight-2/</loc>
		<lastmod>2026-05-22T07:47:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-fixes-17-critical-flaws-in-may-patch-tuesday/</loc>
		<lastmod>2026-05-22T07:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit-2/</loc>
		<lastmod>2026-05-22T08:00:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack-2/</loc>
		<lastmod>2026-05-22T08:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/compromised-nx-console-18-95-0-targeted-vs-code-developers-with-credential-stealer-2/</loc>
		<lastmod>2026-05-22T08:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/popular-github-action-tags-redirected-to-imposter-commit-to-steal-ci-cd-credentials-2/</loc>
		<lastmod>2026-05-22T08:01:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/miniplasma-windows-0-day-enables-system-privilege-escalation-on-fully-patched-systems-2/</loc>
		<lastmod>2026-05-22T08:01:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence-2/</loc>
		<lastmod>2026-05-22T08:01:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/google-accidentally-exposed-details-of-unfixed-chromium-flaw-2/</loc>
		<lastmod>2026-05-22T08:01:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-6/</loc>
		<lastmod>2026-05-22T08:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/ukraine-identifies-infostealer-operator-tied-to-28000-stolen-accounts/</loc>
		<lastmod>2026-05-22T08:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</loc>
		<lastmod>2026-05-22T08:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/chinas-webworm-uses-discord-microsoft-graphs-to-hack-eu-govts-2/</loc>
		<lastmod>2026-05-22T08:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/fcc-softens-ban-on-foreign-made-routers/</loc>
		<lastmod>2026-05-22T08:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cyber-pros-cant-decide-if-ai-is-a-good-or-a-bad-thing-3/</loc>
		<lastmod>2026-05-22T08:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/what-itll-take-to-make-ai-boms-usable-in-a-modern-security-program/</loc>
		<lastmod>2026-05-22T08:03:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/first-vpn-dismantled-in-global-takedown-over-use-by-25-ransomware-groups/</loc>
		<lastmod>2026-05-22T19:55:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-34908-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T19:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/kimwolf-ddos-botnet-operator-arrested-in-canada-over-ddos-for-hire-attacks/</loc>
		<lastmod>2026-05-22T19:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-34909-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T19:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/ghostwriter-targets-ukraine-government-entities-with-prometheus-phishing-malware/</loc>
		<lastmod>2026-05-22T19:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-34910-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T19:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-6960-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T19:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/verizon-dbir-healthcare-fends-off-increased-social-engineering-attacks/</loc>
		<lastmod>2026-05-22T19:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%94%b4-cve-2026-33000-critical-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/megalodon-github-attack-targets-5561-repos-with-malicious-ci-cd-workflows/</loc>
		<lastmod>2026-05-22T19:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-47114-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/netherlands-seizes-800-servers-of-hosting-firm-enabling-cyberattacks/</loc>
		<lastmod>2026-05-22T19:56:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-47101-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/making-vulnerable-drivers-exploitable-without-hardware-the-byovd-perspective/</loc>
		<lastmod>2026-05-22T19:56:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-47102-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability-2/</loc>
		<lastmod>2026-05-22T19:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9018-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/mini-shai-hulud-pushes-malicious-antv-npm-packages-via-compromised-maintainer-account-2/</loc>
		<lastmod>2026-05-22T19:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-34911-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:56:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption-2/</loc>
		<lastmod>2026-05-22T19:57:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-4834-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak/</loc>
		<lastmod>2026-05-22T19:57:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-8679-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:57:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/its-patch-tuesday-for-microsoft-not-a-zero-day-in-sight-3/</loc>
		<lastmod>2026-05-22T19:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/%f0%9f%9f%a0-cve-2026-9011-high-schwachstelle/</loc>
		<lastmod>2026-05-22T19:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-7/</loc>
		<lastmod>2026-05-22T19:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/grafana-labs-says-code-breach-stemmed-from-tanstack-attack/</loc>
		<lastmod>2026-05-22T19:57:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare-2/</loc>
		<lastmod>2026-05-22T21:57:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/nginx-cve-2026-42945-exploited-in-the-wild-causing-worker-crashes-and-possible-rce/</loc>
		<lastmod>2026-05-22T21:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/pre-stuxnet-fast16-malware-tampered-with-nuclear-weapons-simulations-2/</loc>
		<lastmod>2026-05-22T21:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface-2/</loc>
		<lastmod>2026-05-22T21:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access-2/</loc>
		<lastmod>2026-05-22T21:57:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/us-and-canada-arrest-and-charge-suspected-kimwolf-botnet-admin/</loc>
		<lastmod>2026-05-22T21:58:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/former-us-execs-plead-guilty-to-aiding-tech-support-scammers/</loc>
		<lastmod>2026-05-22T21:58:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/why-chargebacks-are-just-one-piece-of-the-fraud-puzzle/</loc>
		<lastmod>2026-05-22T21:58:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cisa-admin-leaked-aws-govcloud-keys-on-github-2/</loc>
		<lastmod>2026-05-22T21:58:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/its-patch-tuesday-for-microsoft-not-a-zero-day-in-sight-4/</loc>
		<lastmod>2026-05-22T21:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/canvas-breach-disrupts-schools-colleges-nationwide-8/</loc>
		<lastmod>2026-05-22T21:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/github-confirms-breach-4k-internal-repos-stolen-2/</loc>
		<lastmod>2026-05-22T21:59:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/ai-agents-are-shifting-identity-security-budget-dynamics/</loc>
		<lastmod>2026-05-22T22:00:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://huntingthreats.de/cisa-exposes-secrets-credentials-in-private-repo/</loc>
		<lastmod>2026-05-22T22:00:15+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->