<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.cybrpulse.com/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.cybrpulse.com/progress-sharefile-has-a-full-server-takeover-chain-30-000-instances-are-exposed/</loc><lastmod>2026-04-04T13:09:21.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775308007.png</image:loc><image:caption>cybrpulse-featured-1775308007.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/voidlink-ai-built-malware-just-crossed-a-line-the-industry-cant-ignore/</loc><lastmod>2026-04-03T19:05:50.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775243025.png</image:loc><image:caption>cybrpulse-featured-1775243025.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/qilins-edr-killer-can-blind-300-security-tools-heres-how-it-works/</loc><lastmod>2026-04-02T19:08:40.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775156838.png</image:loc><image:caption>cybrpulse-featured-1775156838.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/qilin-ransomwares-edr-killer-can-blind-300-security-tools-talos-has-the-technical-breakdown/</loc><lastmod>2026-04-02T13:07:33.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775135116.png</image:loc><image:caption>cybrpulse-featured-1775135116.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/when-ai-gives-script-kiddies-superpowers-the-600-device-fortinet-breach/</loc><lastmod>2026-04-02T13:07:22.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/fortinet-ai-breach-featured-2.png</image:loc><image:caption>fortinet-ai-breach-featured-2.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/axios-got-poisoned-north-korean-hackers-hit-100m-download-npm-package/</loc><lastmod>2026-04-01T19:09:27.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775070437.png</image:loc><image:caption>cybrpulse-featured-1775070437.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/one-developer-one-week-one-ai-tool-how-voidlink-rewrote-the-rules-on-malware-development/</loc><lastmod>2026-04-01T13:05:45.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/04/cybrpulse-featured-1775048581-1.png</image:loc><image:caption>cybrpulse-featured-1775048581-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/teampcp-telnyx-python-sdk-backdoor-2026/</loc><lastmod>2026-03-31T19:06:45.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774983792.png</image:loc><image:caption>cybrpulse-featured-1774983792.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/teampcp-is-running-a-supply-chain-blitz-and-your-ci-cd-pipeline-is-the-target/</loc><lastmod>2026-03-30T19:04:25.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774897383.png</image:loc><image:caption>cybrpulse-featured-1774897383.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2026-21643-fortinet-forticlient-ems-is-being-actively-exploited-and-cisa-hasnt-caught-up-yet/</loc><lastmod>2026-03-30T13:04:46.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774875734.png</image:loc><image:caption>cybrpulse-featured-1774875734.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2026-21992-oracle-quietly-patches-cvss-9-8-rce-in-identity-manager-again/</loc><lastmod>2026-03-29T19:04:05.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774810908.png</image:loc><image:caption>cybrpulse-featured-1774810908.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2026-3055-citrix-netscaler-is-being-scoped-right-now-patch-before-it-gets-worse/</loc><lastmod>2026-03-29T13:03:36.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774789336.png</image:loc><image:caption>cybrpulse-featured-1774789336.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/f5-bigip-cve-2025-53521-citrix-netscaler-cve-2026-3055-active-exploitation/</loc><lastmod>2026-03-28T19:03:42.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774724516.png</image:loc><image:caption>cybrpulse-featured-1774724516.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/f5-big-ip-apm-cve-2025-53521-what-was-denial-of-service-is-now-confirmed-rce-and-its-being-exploited-2/</loc><lastmod>2026-03-28T13:04:12.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774702950.png</image:loc><image:caption>cybrpulse-featured-1774702950.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/glassworm-just-moved-into-ai-territory-and-your-developer-environment-is-the-target-2/</loc><lastmod>2026-03-27T19:04:02.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/your-security-scanner-was-the-attack-the-trivy-supply-chain-compromise/</loc><lastmod>2026-03-27T13:04:54.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774616556.png</image:loc><image:caption>cybrpulse-featured-1774616556.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/bpfdoor-is-living-inside-telecom-networks-and-its-getting-harder-to-see/</loc><lastmod>2026-03-26T19:04:41.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774551775.png</image:loc><image:caption>cybrpulse-featured-1774551775.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/trivy-supply-chain-attack-2026/</loc><lastmod>2026-03-26T13:04:53.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774530163.png</image:loc><image:caption>cybrpulse-featured-1774530163.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/trivy-supply-chain-attack-sha-pinning-2026/</loc><lastmod>2026-03-25T19:04:46.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774465363.png</image:loc><image:caption>cybrpulse-featured-1774465363.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/your-vulnerability-scanner-was-stealing-your-secrets-the-trivy-supply-chain-attack/</loc><lastmod>2026-03-25T13:05:05.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774443757.png</image:loc><image:caption>cybrpulse-featured-1774443757.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/two-low-severity-bugs-one-complete-takeover-dell-wms-on-premises-rce-chain-exposed/</loc><lastmod>2026-03-24T19:03:33.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774378899-1.png</image:loc><image:caption>cybrpulse-featured-1774378899-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2025-32975-quest-kace-sma-active-exploitation/</loc><lastmod>2026-03-24T13:04:06.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774357329.png</image:loc><image:caption>cybrpulse-featured-1774357329.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/teampcps-trivy-attack-is-still-active-check-your-ci-cd-now-2/</loc><lastmod>2026-03-23T19:02:57.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/cve-2025-32975-attackers-are-already-inside-unpatched-kace-sma-environments/</loc><lastmod>2026-03-23T13:03:18.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774270911.png</image:loc><image:caption>cybrpulse-featured-1774270911.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/langflow-rce-attackers-harvesting-ai-keys-within-20-hours-of-disclosure-2/</loc><lastmod>2026-03-22T19:02:29.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/three-cves-one-bad-week-cisco-fmc-zero-day-sharepoint-exploited-screenconnect-at-risk/</loc><lastmod>2026-03-22T13:04:04.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/apt28-is-back-and-this-time-theyre-hiding-behind-your-cloud-storage/</loc><lastmod>2026-03-21T19:03:02.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/apt28-is-back-with-new-implants-and-your-cloud-storage-is-the-c2/</loc><lastmod>2026-03-21T13:04:19.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774098116-1.png</image:loc><image:caption>cybrpulse-featured-1774098116-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2026-33017-attackers-hit-langflow-within-20-hours-your-ai-infrastructure-is-the-target-2/</loc><lastmod>2026-03-20T19:03:42.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774033340-1.png</image:loc><image:caption>cybrpulse-featured-1774033340-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/ai-malware-development-operational-2026/</loc><lastmod>2026-03-20T13:04:28.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1774011767.png</image:loc><image:caption>cybrpulse-featured-1774011767.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/interlock-ransomware-cisco-firewall-zero-day-cve-2026-20131/</loc><lastmod>2026-03-19T19:03:56.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/interlock-ransomware-has-been-exploiting-a-cvss-10-0-cisco-firewall-zero-day-since-january-2/</loc><lastmod>2026-03-19T13:04:23.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cybrpulse-featured-1773925357.png</image:loc><image:caption>cybrpulse-featured-1773925357.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/chrome-zero-days-cve-2026-3909-3910-active-exploitation/</loc><lastmod>2026-03-19T02:54:43.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-10.png</image:loc><image:caption>fix-10.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/glassworm-is-eating-the-developer-ecosystem/</loc><lastmod>2026-03-19T02:54:41.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-9.png</image:loc><image:caption>fix-9.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/two-months-after-patches-fortigate-sso-exploitation-is-still-breaking-networks/</loc><lastmod>2026-03-19T02:54:38.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-8.png</image:loc><image:caption>fix-8.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/your-fortigate-has-been-giving-away-your-active-directory/</loc><lastmod>2026-03-19T02:54:36.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-7.png</image:loc><image:caption>fix-7.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/apt28-is-back-with-a-new-toolkit-and-the-same-old-code/</loc><lastmod>2026-03-19T02:54:34.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-6.png</image:loc><image:caption>fix-6.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/fortigate-is-being-actively-looted-two-attack-chains-you-need-to-know/</loc><lastmod>2026-03-19T02:54:32.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-5.png</image:loc><image:caption>fix-5.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/fortigate-intrusions-are-blowing-up-ad-heres-what-sentinelone-found/</loc><lastmod>2026-03-19T02:54:29.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-4.png</image:loc><image:caption>fix-4.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/your-fortigate-knows-your-ad-password-so-does-the-attacker/</loc><lastmod>2026-03-19T02:54:27.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-3.png</image:loc><image:caption>fix-3.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/glassworm-wave-3-433-packages-compromised-your-code-review-wont-save-you/</loc><lastmod>2026-03-19T02:54:25.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-2.png</image:loc><image:caption>fix-2.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/fancybear-left-their-own-server-open-and-defenders-downloaded-the-whole-thing/</loc><lastmod>2026-03-19T02:54:23.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/fix-1.png</image:loc><image:caption>fix-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/microsofts-rras-hotpatch-covers-a-gap-that-standard-patch-tuesday-missed/</loc><lastmod>2026-03-17T23:00:13.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/rras-feature.png</image:loc><image:caption>rras-feature.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/americas-iphone-weapons-are-loose/</loc><lastmod>2026-03-16T04:03:24.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r6.png</image:loc><image:caption>cp-r6.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/one-hacker-two-ai-subscriptions-and-195-million-stolen-identities/</loc><lastmod>2026-03-16T04:03:24.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r5.png</image:loc><image:caption>cp-r5.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/iran-didnt-need-malware-it-needed-admin-access/</loc><lastmod>2026-03-16T04:03:23.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r4.png</image:loc><image:caption>cp-r4.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/two-chrome-zero-days-are-being-exploited-right-now-patch-today/</loc><lastmod>2026-03-16T04:03:23.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r3.png</image:loc><image:caption>cp-r3.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/apt28-is-back-with-new-implants-and-theyre-hiding-in-your-cloud-provider/</loc><lastmod>2026-03-16T04:03:22.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r2.png</image:loc><image:caption>cp-r2.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/ai-tools-are-the-new-attack-surface-your-security-policies-havent-caught-up-2/</loc><lastmod>2026-03-16T04:03:22.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/cp-r1.png</image:loc><image:caption>cp-r1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/clawjacked-when-your-ai-assistant-becomes-someone-elses-weapon/</loc><lastmod>2026-03-01T19:27:01.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/03/clawjacked-vulnerability-feature.png</image:loc><image:caption>clawjacked-vulnerability-feature.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/industrial-control-systems-under-siege-the-ics-vulnerability-crisis/</loc><lastmod>2026-02-26T19:36:54.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/ics-vulnerability-crisis-feature.png</image:loc><image:caption>ics-vulnerability-crisis-feature.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/beyondtrusts-bad-week-when-a-security-tool-becomes-the-attack-vector/</loc><lastmod>2026-02-21T18:23:53.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/beyondtrust-featured-notxt.png</image:loc><image:caption>beyondtrust-featured-notxt.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/keenadu-the-android-backdoor-that-survives-factory-resets/</loc><lastmod>2026-02-20T12:55:57.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/keenadu-firmware-backdoor.png</image:loc><image:caption>keenadu-firmware-backdoor.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/chrome-cve-2026-2441/</loc><lastmod>2026-02-16T15:12:58.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/critical-beyondtrust-rce-cybrpulse-early-detection/</loc><lastmod>2026-02-15T20:26:40.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/beyondtrust-cve-2026-1731.png</image:loc><image:caption>beyondtrust-cve-2026-1731.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/cve-2026-21533-windows-rdp-zero-day-exploited-for-privilege-escalation/</loc><lastmod>2026-02-13T04:10:00.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/rdp-zero-day-test.png</image:loc><image:caption>rdp-zero-day-test.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/apple-zero-day-cve-2026-20700/</loc><lastmod>2026-02-13T01:50:14.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/apple-zero-day-feature-1.png</image:loc><image:caption>apple-zero-day-feature-1.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/windows-rdp-zero-day-how-cybrpulse-flagged-cve-2026-21533-in-six-hours/</loc><lastmod>2026-02-11T12:28:49.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/image-6.png</image:loc><image:caption>image-6.png</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/welcome-to-cybrpulse-blog-v2/</loc><lastmod>2026-02-11T05:04:55.000Z</lastmod></url><url><loc>https://blog.cybrpulse.com/why-i-built-cybrpulse-fixing-the-threat-intel-trust-problem/</loc><lastmod>2026-02-11T03:24:29.000Z</lastmod><image:image><image:loc>https://blog.cybrpulse.com/content/images/2026/02/2026-02-10-21.23.52.jpg</image:loc><image:caption>2026-02-10-21.23.52.jpg</image:caption></image:image></url><url><loc>https://blog.cybrpulse.com/coming-soon/</loc><lastmod>2026-02-09T00:15:04.000Z</lastmod><image:image><image:loc>https://static.ghost.org/v4.0.0/images/feature-image.jpg</image:loc><image:caption>feature-image.jpg</image:caption></image:image></url></urlset>