<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://cyberconvoy.com/</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>1.0</priority></url><url><loc>https://cyberconvoy.com/platform</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.9</priority></url><url><loc>https://cyberconvoy.com/about</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://cyberconvoy.com/pricing</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://cyberconvoy.com/contact</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://cyberconvoy.com/careers</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberconvoy.com/privacy-policy</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url><url><loc>https://cyberconvoy.com/terms-of-service</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url><url><loc>https://cyberconvoy.com/legal/msa</loc><lastmod>2026-03-29T00:00:00.000Z</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-netbak-pc-agent-affected-by-critical-aspnet-core-vulnerability-cve-2025-55315</loc><lastmod>2025-11-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-command-injection-vulnerabilities-impact-tp-link-omada-gateway-devices</loc><lastmod>2025-10-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-supply-chain-risk-leaked-access-tokens-in-visual-studio-code-extensions</loc><lastmod>2025-10-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/october-2025-microsoft-patch-tuesday-172-vulnerabilities-fixed-including-six-zero-days</loc><lastmod>2025-10-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-oracle-e-business-suite-zero-day-vulnerability-cve-2025-61882-allows-unauthenticated-rce</loc><lastmod>2025-10-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-wd-my-cloud-nas-vulnerability-allows-remote-command-execution</loc><lastmod>2025-10-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-cloud-backup-breach-all-users-impacted-credential-reset-required</loc><lastmod>2025-10-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-privilege-escalation-vulnerability-in-sudo-actively-exploited-cve-2025-32463</loc><lastmod>2025-10-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-releases-firmware-update-to-remove-rootkit-malware-from-sma-100-series-devices</loc><lastmod>2025-09-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emergency-chrome-update-patch-released-for-actively-exploited-zero-day-vulnerability</loc><lastmod>2025-09-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-urges-immediate-credential-resets-after-breach</loc><lastmod>2025-09-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/axios-abuse-and-2fa-kits-power-advanced-microsoft-365-phishing-attacks</loc><lastmod>2025-09-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-are-targeting-this-sonicwall-flaw-is-your-network-safe</loc><lastmod>2025-09-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zero-day-vulnerability-in-legacy-sitecore-deployments-exploited-for-weepsteel-reconnaissance-attacks</loc><lastmod>2025-09-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/unpatched-zero-day-vulnerability-discovered-in-multiple-tp-link-routers</loc><lastmod>2025-09-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-vulnerability-patched-in-docker-desktop-for-windows-and-macos-cve-2025-9074</loc><lastmod>2025-08-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-git-and-citrix-session-recording-vulnerabilities-exploited-urgent-updates-required</loc><lastmod>2025-08-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-releases-critical-fixes-for-netscaler-remote-code-execution-vulnerability</loc><lastmod>2025-08-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-windows-vulnerability-exploited-to-deploy-pipemagic-ransomexx-malware</loc><lastmod>2025-08-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-releases-emergency-patch-for-actively-exploited-zero-day-vulnerability</loc><lastmod>2025-08-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/n-able-n-central-zero-day-flaws-under-active-attack</loc><lastmod>2025-08-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zoom-xerox-patch-critical-rce-privilege-escalation-bugs</loc><lastmod>2025-08-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortisiem-bug-under-active-attack-enables-pre-auth-rce</loc><lastmod>2025-08-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-urges-admins-to-remove-deprecated-vulnerable-auth-plug-in</loc><lastmod>2024-02-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-confirms-patched-vulnerability-behind-recent-vpn-attacks-not-a-zero-day</loc><lastmod>2025-08-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exchange-server-bug-lets-hackers-slip-into-cloud-accounts</loc><lastmod>2025-08-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-oauth-apps-used-to-hack-microsoft-365-accounts</loc><lastmod>2025-08-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-flaw-used-in-chrome-zero-day-attacks</loc><lastmod>2025-08-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-rce-vulnerabilities-patched-in-sophos-firewall-and-sonicwall-sma-100-devices</loc><lastmod>2025-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hpe-alerts-on-hardcoded-passwords-in-aruba-devices</loc><lastmod>2025-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-issues-urgent-fix-for-sharepoint-rce-flaws</loc><lastmod>2025-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/matanbuchus-malware-spread-via-microsoft-teams-calls</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-extensions-slip-into-chrome-store-17m-affected</loc><lastmod>2025-07-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-cisco-ise-bug-allows-pre-auth-rce-patch-now</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-patches-4-esxi-zero-days-from-pwn2own</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsofts-july-update-137-fixes-including-1-zero-day</loc><lastmod>2025-07-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-servicenow-bug-data-exposed</loc><lastmod>2025-07-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sudo-flaws-let-attackers-escalate-to-root-on-linux</loc><lastmod>2025-07-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-patches-4th-chrome-zero-day-of-2025</loc><lastmod>2025-07-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/1200-citrix-servers-still-unpatched-for-critical-flaw</loc><lastmod>2025-07-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-vs-code-extensions-can-bypass-verification</loc><lastmod>2025-07-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/trojanized-netextender-and-connectwise-exploits-used-in-remote-access-attacks</loc><lastmod>2025-06-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/netscaler-flaw-lets-hackers-hijack-citrix-sessions</loc><lastmod>2025-06-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/beyondtrust-remote-support-hit-by-critical-rce-flaw</loc><lastmod>2025-06-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-67-bugs-including-webdav-zero-day</loc><lastmod>2025-06-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-veeam-flaw-lets-domain-users-hack-backup-servers</loc><lastmod>2025-06-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/adobe-patches-254-security-flaws</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-fixes-critical-account-takeover-flaw</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/connectwise-rotates-certificates-after-security-alert</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-docusign-sites-push-netsupport-rat</loc><lastmod>2025-06-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qilin-ransomware-exploits-fortinet-flaws-in-targeted-attacks</loc><lastmod>2025-06-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-pumabot-botnet-uses-ssh-brute-forcing-to-infect-iot-devices</loc><lastmod>2025-05-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-software-sites-spread-bumblebee-malware-to-target-it-users</loc><lastmod>2025-05-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/connectwise-hacked-by-state-sponsored-attackers</loc><lastmod>2025-05-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-windows-server-2025-flaw-exposes-active-directory</loc><lastmod>2025-05-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-100-fake-chrome-extensions-hijack-sessions-and-steal-data</loc><lastmod>2025-05-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/aws-default-iam-roles-expose-lateral-movement-risks</loc><lastmod>2025-05-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-patches-actively-exploited-chrome-flaw</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-immediate-patch-needed-for-attacked-sonicwall-vpn-flaw</loc><lastmod>2025-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fbi-old-routers-hacked-for-cybercrime-proxy-networks</loc><lastmod>2025-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-patches-critical-ios-xe-vulnerability</loc><lastmod>2025-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-wordpress-plugin-gives-hackers-backdoor-access</loc><lastmod>2025-05-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-warns-of-ongoing-vpn-attacks</loc><lastmod>2025-05-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/docker-malware-exploits-teneo-node-to-illegally-mine-crypto</loc><lastmod>2025-04-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-fixes-seven-zero-day-vulnerabilities-affecting-qts-quts-hero-and-key-applications</loc><lastmod>2025-11-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/most-browser-extensions-can-access-sensitive-enterprise-data</loc><lastmod>2025-04-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/erlangotp-ssh-rce-exploit-released-patch-now</loc><lastmod>2025-04-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-fortiswitch-vulnerability-allows-remote-admin-password-changes</loc><lastmod>2025-04-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-fixes-critical-vulnerability-in-netextender-software</loc><lastmod>2025-04-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/verizon-call-filter-api-vulnerability-exposed-customers-incoming-call-data</loc><lastmod>2025-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-alerts-on-cslu-backdoor-admin-account-exploited-in-attacks</loc><lastmod>2025-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-remote-code-execution-vulnerability-found-in-popular-apache-parquet-library</loc><lastmod>2025-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-releases-critical-patch-for-connect-secure-zero-day</loc><lastmod>2025-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-november-2025-patch-tuesday-63-vulnerabilities-fixed-including-an-actively-exploited-zero-day</loc><lastmod>2025-11-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/mozilla-fixes-critical-firefox-vulnerability-similar-to-recent-chrome-zero-day</loc><lastmod>2025-03-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/crushftp-urges-immediate-patching-of-critical-unauthenticated-access-vulnerability</loc><lastmod>2025-03-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-medusa-variant-wields-stolen-certificates-and-malicious-drivers-to-evade-detection</loc><lastmod>2025-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-vscode-extensions-spreading-early-stage-ransomware</loc><lastmod>2025-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-veeam-vulnerability-exposes-domain-users-to-backup-server-hacking</loc><lastmod>2025-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-releases-patch-for-webkit-zero-day-vulnerability-exploited-in-targeted-attacks</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-patch-new-connect-secure-auth-bypass-bug-immediately</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-flaw-in-react-and-nextjs-opens-door-to-server-hijacking</loc><lastmod>2025-12-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-exposes-brickstorm-attacks-targeting-vmware-servers</loc><lastmod>2025-12-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/clickfix-attack-delivers-infostealers-rats-in-fake-bookingcom-emails</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-march-2025-patch-tuesday-fixes-7-zero-days-and-57-flaws</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-webex-for-broadworks-flaw-exposing-credentials</loc><lastmod>2025-03-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-chrome-extensions-can-spoof-password-managers-in-new-attack</loc><lastmod>2025-03-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-warns-malvertising-campaign-impacted-1-million-pcs</loc><lastmod>2025-03-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/broadcom-fixes-three-vmware-zero-days-exploited-in-attacks</loc><lastmod>2025-03-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vscode-extensions-with-9-million-installs-pulled-over-security-risks</loc><lastmod>2025-02-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw</loc><lastmod>2024-02-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-authentication-bypass-vulnerabilities-patched-in-fortios-fortiweb-fortiproxy-and-fortiswitchmanager</loc><lastmod>2025-12-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-fortiweb-path-traversal-vulnerability-actively-exploited-to-create-unauthorized-admin-accounts</loc><lastmod>2025-11-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/botnet-targets-basic-auth-in-microsoft-365-password-spray-attacks</loc><lastmod>2025-02-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-openssh-flaws-expose-ssh-servers-to-mitm-and-dos-attacks</loc><lastmod>2025-02-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates</loc><lastmod>2025-02-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-releases-security-fix-for-netscaler-console-privilege-escalation-vulnerability</loc><lastmod>2025-02-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/whoami-attacks-give-hackers-code-execution-on-amazon-ec2-instances</loc><lastmod>2025-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-february-2025-patch-tuesday-fixes-4-zero-days-55-flaws</loc><lastmod>2025-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-fixes-three-critical-flaws-in-connect-secure-policy-secure</loc><lastmod>2025-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-addresses-critical-flaws-across-nas-router-software</loc><lastmod>2024-11-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-urges-immediate-patching-of-high-severity-sonicos-sslvpn-vulnerability-cve-2025-40601</loc><lastmod>2025-11-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emergency-update-issued-for-actively-exploited-chrome-zero-day-vulnerability</loc><lastmod>2025-12-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-patches-critical-azure-ai-face-service-vulnerability-with-cvss-99-score</loc><lastmod>2025-02-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-firewall-exploit-allows-vpn-sessions-hijacking-official-patch-released</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-sysinternals-0-day-flaws-enable-dll-injection-attacks-on-windows</loc><lastmod>2025-02-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-cityworks-rce-bug-to-breach-microsoft-iis-servers</loc><lastmod>2025-02-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/netgear-warns-users-to-patch-critical-wifi-router-vulnerabilities</loc><lastmod>2025-02-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploiting-flaws-in-simplehelp-rmm-to-breach-networks</loc><lastmod>2025-01-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-releases-urgent-fix-for-chrome-zero-day-security-flaw-cve-2025-13223</loc><lastmod>2025-11-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-december-2025-patch-tuesday-57-security-flaws-addressed-including-critical-and-zero-day-vulnerabilities</loc><lastmod>2025-12-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/maximum-severity-vulnerability-in-n8n-what-you-need-to-know-and-how-to-stay-protected</loc><lastmod>2026-01-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-fortinet-fortisiem-vulnerability-actively-exploited-in-the-wild</loc><lastmod>2026-01-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-devices-targeted-by-automated-exploits-abusing-sso-vulnerability</loc><lastmod>2026-01-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/clickfix-attack-exploits-fullscreen-browser-lures-and-steganography</loc><lastmod>2025-11-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-patches-actively-exploited-zero-day-affecting-iphones-macs-and-more</loc><lastmod>2025-01-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-homebrew-google-ads-target-mac-users-with-malware</loc><lastmod>2025-01-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-gangs-pose-as-it-support-in-microsoft-teams-phishing-attacks</loc><lastmod>2025-01-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-fixes-six-rsync-vulnerabilities-in-nas-backup-recovery-app</loc><lastmod>2025-01-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-warns-of-sma1000-rce-flaw-exploited-in-zero-day-attacks</loc><lastmod>2025-01-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/mikrotik-botnet-uses-misconfigured-spf-dns-records-to-spread-malware</loc><lastmod>2025-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/macos-bug-lets-hackers-install-malicious-kernel-drivers</loc><lastmod>2025-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-second-beyondtrust-flaw-to-kev-catalog-amid-active-attacks</loc><lastmod>2025-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hpe-oneview-critical-vulnerability-cvss-100-allows-unauthenticated-remote-code-execution</loc><lastmod>2025-12-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-nodejs-vulnerability-allows-denial-of-service-attacks-update-required</loc><lastmod>2026-01-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ms-teams-guest-access-security-flaw-defender-protection-bypass-explained</loc><lastmod>2025-11-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/banshee-stealer-evades-detection-using-apple-xprotect-encryption-algo</loc><lastmod>2025-01-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-mirai-botnet-targets-industrial-routers-with-zero-day-exploits</loc><lastmod>2025-01-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks</loc><lastmod>2025-01-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-urges-admins-to-patch-exploitable-sslvpn-bug-immediately</loc><lastmod>2025-01-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-four-faith-router-flaw-to-open-reverse-shells</loc><lastmod>2025-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/massive-healthcare-breaches-prompt-us-cybersecurity-rules-overhaul</loc><lastmod>2025-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ubuntu-command-not-found-tool-can-be-abused-to-spread-malware</loc><lastmod>2024-02-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-warns-of-new-sma1000-zeroday-exploited-in-active-attacks</loc><lastmod>2025-12-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-veeam-backup-replication-vulnerability-what-it-is-and-how-to-address-it</loc><lastmod>2026-01-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apache-warns-of-critical-flaws-in-mina-hugegraph-traffic-control</loc><lastmod>2024-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-botnet-exploits-vulnerabilities-in-nvrs-tp-link-routers</loc><lastmod>2024-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/adobe-warns-of-critical-coldfusion-bug-with-poc-exploit-code</loc><lastmod>2024-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/attackers-exploit-microsoft-teams-and-anydesk-to-deploy-darkgate-malware</loc><lastmod>2024-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-fortiwlm-bug-giving-hackers-admin-privileges</loc><lastmod>2024-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sophos-firewall-vulnerable-to-critical-remote-code-execution-flaw</loc><lastmod>2024-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-25000-sonicwall-vpn-firewalls-exposed-to-critical-flaws</loc><lastmod>2024-12-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-pulse-secure-found-using-11-year-old-linux-version-and-outdated-libraries</loc><lastmod>2024-02-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-security-advisory-addressing-the-mongodb-memory-read-vulnerability-cve-2025-14847</loc><lastmod>2025-12-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-update-patch-fortios-to-prevent-authentication-bypass-via-cve-2020-12812</loc><lastmod>2025-12-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-authentication-bypass-vulnerability-in-ibm-api-connect-urgent-patching-required</loc><lastmod>2026-01-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zloader-malware-returns-with-dns-tunneling-to-stealthily-mask-c2-comms</loc><lastmod>2024-12-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-of-maximum-severity-csa-auth-bypass-vulnerability</loc><lastmod>2024-12-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-active-exploitation-of-flaws-in-zyxel-projectsend-and-cyberpanel</loc><lastmod>2024-12-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-critical-whatsup-gold-rce-flaw-patch-now</loc><lastmod>2024-12-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veeam-warns-of-critical-rce-bug-in-service-provider-console</loc><lastmod>2024-12-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/novel-phishing-campaign-uses-corrupted-word-documents-to-evade-security</loc><lastmod>2024-12-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-says-bianlian-ransomware-now-focuses-only-on-data-theft</loc><lastmod>2024-11-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-abuse-avast-anti-rootkit-driver-to-disable-defenses</loc><lastmod>2024-11-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/mitre-shares-2024s-top-25-most-dangerous-software-weaknesses</loc><lastmod>2024-11-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-releases-urgent-updates-to-patch-actively-exploited-zero-day-vulnerabilities</loc><lastmod>2024-11-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/chinese-hackers-exploit-fortinet-vpn-zero-day-to-steal-credentials</loc><lastmod>2024-11-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/high-severity-flaw-in-postgresql-allows-hackers-to-exploit-environment-variables</loc><lastmod>2024-11-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-flaws-in-citrix-virtual-apps-enable-rce-attacks-via-msmq-misconfiguration</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-november-2024-patch-tuesday-fixes-4-zero-days-91-flaws</loc><lastmod>2024-11-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-veeam-rce-bug-now-used-in-frag-ransomware-attacks</loc><lastmod>2024-11-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zoom-patches-critical-privilege-elevation-flaw-in-windows-apps</loc><lastmod>2024-02-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/browser-extension-campaign-zoom-stealer-harvesting-meeting-data-from-22-million-users</loc><lastmod>2026-01-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/synology-patches-two-zero-days-exploited-at-pwn2own</loc><lastmod>2024-11-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hpe-warns-of-critical-rce-flaws-in-aruba-networking-access-points</loc><lastmod>2024-11-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/docusigns-envelopes-api-abused-to-send-realistic-fake-invoices</loc><lastmod>2024-11-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-steal-15000-cloud-credentials-from-exposed-git-config-files</loc><lastmod>2024-11-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/android-malware-fakecall-now-reroutes-bank-calls-to-attackers</loc><lastmod>2024-11-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks</loc><lastmod>2024-10-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-fixes-nas-backup-software-zero-day-exploited-at-pwn2own</loc><lastmod>2024-10-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/bumblebee-malware-attacks-are-back-after-4-month-break</loc><lastmod>2024-02-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/bumblebee-and-latrodectus-malware-return-with-sophisticated-phishing-strategies</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-bad-patch-for-critical-vcenter-server-rce-flaw</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-web-help-desk-flaw-is-now-exploited-in-attacks</loc><lastmod>2024-10-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-kubernetes-image-builder-vulnerability-exposes-nodes-to-root-access-risk</loc><lastmod>2024-10-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-google-meet-conference-errors-push-infostealing-malware</loc><lastmod>2024-10-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/intel-amd-cpus-on-linux-impacted-by-newly-disclosed-spectre-bypass</loc><lastmod>2024-10-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-abuse-f5-big-ip-cookies-to-map-internal-servers</loc><lastmod>2024-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-february-2024-patch-tuesday-fixes-2-zero-days-73-flaws</loc><lastmod>2024-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-critical-gitlab-vulnerability-could-allow-arbitrary-cicd-pipeline-execution</loc><lastmod>2024-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-two-factor-authentication-bypass-and-other-vulnerabilities-patched-in-gitlab</loc><lastmod>2026-01-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/firefox-zero-day-under-attack-update-your-browser-immediately</loc><lastmod>2024-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-fortinet-rce-flaw-now-exploited-in-attacks</loc><lastmod>2024-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/network-switch-rce-flaw-impacts-critical-infrastructure</loc><lastmod>2024-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-browser-updates-spread-updated-warmcookie-malware</loc><lastmod>2024-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails</loc><lastmod>2024-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/progress-urges-admins-to-patch-critical-whatsup-gold-bugs-asap</loc><lastmod>2024-09-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-issues-patch-for-critical-arm-vulnerability-enabling-rce-attacks</loc><lastmod>2024-09-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-urges-software-devs-to-weed-out-xss-vulnerabilities</loc><lastmod>2024-09-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-gangs-now-abuse-microsoft-azure-tool-for-data-theft</loc><lastmod>2024-09-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-of-another-critical-csa-flaw-exploited-in-attacks</loc><lastmod>2024-09-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/broadcom-fixes-critical-rce-bug-in-vmware-vcenter-server</loc><lastmod>2024-09-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-high-severity-csa-flaw-is-now-exploited-in-attacks</loc><lastmod>2024-09-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-warns-of-critical-pipeline-execution-vulnerability</loc><lastmod>2024-09-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/windows-vulnerability-abused-braille-spaces-in-zero-day-attacks</loc><lastmod>2024-09-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-vm2-sandbox-escape-cve-2026-22709-what-it-is-and-how-to-fix-it</loc><lastmod>2026-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/targeted-attack-exploits-notepad-update-system-for-months</loc><lastmod>2026-02-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-office-zero-day-attack</loc><lastmod>2026-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-september-2024-patch-tuesday-fixes-4-zero-days-79-flaws</loc><lastmod>2024-09-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veeam-warns-of-critical-rce-flaw-in-backup-replication-software</loc><lastmod>2024-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apache-fixes-critical-ofbiz-remote-code-execution-vulnerability</loc><lastmod>2024-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-sslvpn-access-control-flaw-is-now-exploited-in-attacks</loc><lastmod>2024-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/blackbyte-ransomware-exploits-vmware-esxi-flaw-in-latest-attack-wave</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-confluence-vulnerability-exploited-in-crypto-mining-campaigns</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-sway-abused-in-massive-qr-code-phishing-campaign</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-discloses-a-tenth-chrome-zero-day-as-exploited-this-year</loc><lastmod>2024-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/surge-in-targeted-citrix-netscaler-scans-leveraging-residential-proxies</loc><lastmod>2026-02-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-sonicos-vulnerability-affects-sonicwall-firewall-appliances</loc><lastmod>2024-08-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zero-click-windows-tcpip-rce-impacts-all-systems-with-ipv6-enabled</loc><lastmod>2024-08-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-fixes-hardcoded-credentials-flaw-in-web-help-desk</loc><lastmod>2024-08-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-albeast-vulnerability-exposes-weakness-in-aws-application-load-balancer</loc><lastmod>2024-08-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-ninth-chrome-zero-day-exploited-in-attacks-this-year</loc><lastmod>2024-08-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomhub-group-deploys-new-edr-killing-tool-in-latest-cyber-attacks</loc><lastmod>2024-08-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/national-public-data-confirms-breach-exposing-social-security-numbers</loc><lastmod>2024-08-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/mini-pcs-sold-on-amazon-contained-factory-installed-spyware</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-chrome-extensions-exposed-stealing-business-data-emails-and-browsing-activity</loc><lastmod>2026-02-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-remote-code-execution-vulnerability-patched-in-wpvivid-backup-migration-plugin</loc><lastmod>2026-02-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/freebsd-releases-urgent-patch-for-high-severity-openssh-vulnerability</loc><lastmod>2024-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-phishing-scam-uses-google-drawings-and-whatsapp-shortened-links</loc><lastmod>2024-08-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/18-year-old-security-flaw-in-firefox-and-chrome-exploited-in-attacks</loc><lastmod>2024-08-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-critical-rce-zero-days-in-end-of-life-ip-phones</loc><lastmod>2024-08-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malware-force-installs-chrome-extensions-on-300000-browsers-patches-dlls</loc><lastmod>2024-08-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/proofpoint-settings-exploited-to-send-millions-of-phishing-emails-daily</loc><lastmod>2024-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-abuse-free-trycloudflare-to-deliver-remote-access-malware</loc><lastmod>2024-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/onedrive-phishing-scam-tricks-users-into-running-malicious-powershell-script</loc><lastmod>2024-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/acronis-warns-of-cyber-infrastructure-default-password-abused-in-attacks</loc><lastmod>2024-07-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/alarming-risks-of-outsourcing-a-critical-consideration-for-healthcare-companies</loc><lastmod>2025-10-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-servicenow-rce-flaws-actively-exploited-to-steal-credentials</loc><lastmod>2024-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/docker-fixes-critical-5-year-old-authentication-bypass-flaw</loc><lastmod>2024-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-crowdstrike-fixes-target-companies-with-malware-data-wipers</loc><lastmod>2024-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-cisco-bug-lets-hackers-add-root-users-on-seg-devices</loc><lastmod>2024-07-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/darkgate-malware-exploits-samba-file-shares-in-short-lived-campaign</loc><lastmod>2024-07-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-hid-in-us-infrastructure-network-for-5-years</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-blast-radius-attack-bypasses-widely-used-radius-authentication</loc><lastmod>2024-07-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/massive-att-data-breach-exposes-call-logs-of-109-million-customers</loc><lastmod>2024-07-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/crowdstrike-update-crashes-windows-systems-causes-outages-worldwide</loc><lastmod>2024-07-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/windows-mshtml-zero-day-used-in-malware-attacks-for-over-a-year</loc><lastmod>2024-07-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-critical-bug-lets-attackers-run-pipelines-as-other-users</loc><lastmod>2024-07-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days</loc><lastmod>2024-07-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploiting-cisco-switches-zero-day-to-deliver-malware</loc><lastmod>2024-07-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-mshtml-flaw-exploited-to-deliver-merkspy-spyware-tool</loc><lastmod>2024-07-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-regresshion-openssh-rce-bug-gives-root-on-linux-servers</loc><lastmod>2024-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/p2pinfect-botnet-targets-redis-servers-with-new-ransomware-module</loc><lastmod>2024-06-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-target-new-moveit-transfer-critical-auth-bypass-bug</loc><lastmod>2024-06-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user</loc><lastmod>2024-06-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-google-chrome-errors-trick-you-into-running-malicious-powershell-scripts</loc><lastmod>2024-06-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-serv-u-path-traversal-flaw-actively-exploited-in-attacks</loc><lastmod>2024-06-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/kaspersky-antivirus-software-banned-in-us-over-security-concerns</loc><lastmod>2024-06-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-critical-vcenter-rce-vulnerability-patch-now</loc><lastmod>2024-06-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-vscode-extensions-with-millions-of-installs-discovered</loc><lastmod>2024-06-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-june-2024-patch-tuesday-fixes-51-flaws-18-rces</loc><lastmod>2024-06-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-confluence-high-severity-bug-allows-code-execution</loc><lastmod>2024-06-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-legitimate-packer-software-to-spread-malware-undetected</loc><lastmod>2024-06-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zyxel-releases-patches-for-firmware-vulnerabilities-in-eol-nas-models</loc><lastmod>2024-06-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-for-critical-progress-telerik-auth-bypass-released-patch-now</loc><lastmod>2024-06-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/php-fixes-critical-rce-flaw-impacting-all-versions-for-windows</loc><lastmod>2024-06-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-actively-exploited-linux-privilege-elevation-flaw</loc><lastmod>2024-05-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/check-point-vpn-zero-day-exploited-in-attacks-since-april-30</loc><lastmod>2024-05-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/redtail-crypto-mining-malware-exploiting-palo-alto-networks-firewall-vulnerability</loc><lastmod>2024-05-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-eighth-actively-exploited-chrome-zero-day-this-year</loc><lastmod>2024-05-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-antivirus-websites-deliver-malware-to-android-and-windows-devices</loc><lastmod>2024-05-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-patches-critical-remote-code-execution-flaws-in-endpoint-manager</loc><lastmod>2024-05-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veeam-warns-of-critical-backup-enterprise-manager-auth-bypass-bug</loc><lastmod>2024-05-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-fluent-bit-flaw-impacts-all-major-cloud-providers</loc><lastmod>2024-05-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-jetbrains-teamcity-on-premises-flaw-exposes-servers-to-takeover-patch-now</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-may-2024-patch-tuesday-fixes-3-zero-days-61-flaws</loc><lastmod>2024-05-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign</loc><lastmod>2024-05-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-chrome-emergency-update-fixes-6th-zero-day-exploited-in-2024</loc><lastmod>2024-05-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-three-zero-day-bugs-exploited-at-pwn2own-2024</loc><lastmod>2024-05-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/chrome-zero-day-alert-update-your-browser-to-patch-new-vulnerability</loc><lastmod>2024-05-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-warns-admins-to-manually-mitigate-putty-ssh-client-bug</loc><lastmod>2024-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-big-ip-next-central-manager-bugs-allow-device-takeover</loc><lastmod>2024-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/dell-warns-of-data-breach-49-million-customers-allegedly-affected</loc><lastmod>2024-05-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-latrodectus-malware-attacks-use-microsoft-cloudflare-themes</loc><lastmod>2024-05-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-account-takeover-bug-is-actively-exploited-in-attacks</loc><lastmod>2024-05-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-urges-software-devs-to-weed-out-path-traversal-vulnerabilities</loc><lastmod>2024-05-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-job-interviews-target-developers-with-new-python-backdoor</loc><lastmod>2024-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-1400-crushftp-servers-vulnerable-to-actively-exploited-bug</loc><lastmod>2024-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/maximum-severity-flowmon-bug-has-a-public-exploit-patch-now</loc><lastmod>2024-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-hijack-antivirus-updates-to-drop-guptiminer-malware</loc><lastmod>2024-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/evasive-sign1-malware-campaign-infects-39000-wordpress-sites</loc><lastmod>2024-03-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-facebook-midjourney-ai-page-promoted-malware-to-12-million-people</loc><lastmod>2024-04-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-fortinet-flaw-deploy-screenconnect-metasploit-in-new-campaign</loc><lastmod>2024-04-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cybercriminals-pose-as-lastpass-staff-to-hack-password-vaults</loc><lastmod>2024-04-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/widely-used-putty-ssh-client-found-vulnerable-to-key-recovery-attack</loc><lastmod>2024-04-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/watch-out-for-latrodectus-this-malware-could-be-in-your-inbox</loc><lastmod>2024-04-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-says-sisense-hack-impacts-critical-infrastructure-orgs</loc><lastmod>2024-04-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/palo-alto-networks-warns-of-pan-os-firewall-zero-day-used-in-attacks</loc><lastmod>2024-04-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-rolls-out-critical-security-patches-for-forticlientlinux-vulnerability</loc><lastmod>2024-04-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-april-2024-patch-tuesday-fixes-150-security-flaws-67-rces</loc><lastmod>2024-04-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-http2-vulnerability-exposes-web-servers-to-dos-attacks</loc><lastmod>2024-04-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/winntis-new-unapimon-tool-hides-malware-from-security-software</loc><lastmod>2024-04-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-fixes-vpn-gateway-vulnerability-allowing-rce-dos-attacks</loc><lastmod>2024-04-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/red-hat-warns-of-backdoor-in-xz-tools-used-by-most-linux-distros</loc><lastmod>2024-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/decade-old-linux-wall-bug-helps-make-fake-sudo-prompts-steal-passwords</loc><lastmod>2024-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-darcula-phishing-service-targets-iphone-users-via-imessage</loc><lastmod>2024-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-chrome-zero-days-exploited-at-pwn2own-2024</loc><lastmod>2024-03-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-tags-microsoft-sharepoint-rce-bug-as-actively-exploited</loc><lastmod>2024-03-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-mfa-bypassing-phishing-kit-targets-microsoft-365-gmail-accounts</loc><lastmod>2024-03-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-fixes-critical-standalone-sentry-bug-reported-by-nato</loc><lastmod>2024-03-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ftc-warns-scammers-are-impersonating-its-employees-to-steal-money</loc><lastmod>2024-03-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ande-loader-malware-targets-manufacturing-sector-in-north-america</loc><lastmod>2024-03-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-abuse-windows-smartscreen-flaw-to-drop-darkgate-malware</loc><lastmod>2024-03-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-critical-rce-bug-in-endpoint-management-software</loc><lastmod>2024-03-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-march-2024-patch-tuesday-fixes-60-flaws-18-rce-bugs</loc><lastmod>2024-03-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-fortinet-flaw-may-impact-150000-exposed-devices</loc><lastmod>2024-03-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-issues-patch-for-high-severity-vpn-hijacking-bug-in-secure-client</loc><lastmod>2024-03-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-teamcity-flaw-now-widely-exploited-to-create-admin-accounts</loc><lastmod>2024-03-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-critical-sandbox-escape-flaws-in-esxi-workstation-and-fusion</loc><lastmod>2024-03-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-two-new-ios-zero-days-exploited-in-attacks-on-iphones</loc><lastmod>2024-03-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-against-using-hacked-ivanti-devices-even-after-factory-resets</loc><lastmod>2024-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-bifrost-malware-for-linux-mimics-vmware-domain-for-evasion</loc><lastmod>2024-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fbi-cisa-warn-us-hospitals-of-targeted-blackcat-ransomware-attacks</loc><lastmod>2024-02-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/joomla-fixes-xss-flaws-that-could-expose-sites-to-rce-attacks</loc><lastmod>2024-02-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hijacked-subdomains-of-major-brands-used-in-massive-spam-campaign</loc><lastmod>2024-02-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/screenconnect-critical-bug-now-under-attack-as-exploit-code-emerges</loc><lastmod>2024-02-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-fortinet-rce-flaw-in-ssl-vpn-likely-exploited-in-attacks</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/kasseika-ransomware-uses-antivirus-driver-to-kill-other-antiviruses</loc><lastmod>2024-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/anydesk-update-alert-potential-security-breach-spurs-code-certificate-rotation</loc><lastmod>2024-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-first-zero-day-bug-exploited-in-attacks-this-year</loc><lastmod>2024-02-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-confirms-critical-vcenter-flaw-now-exploited-in-attacks</loc><lastmod>2024-01-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-first-actively-exploited-chrome-zero-day-of-2024</loc><lastmod>2024-01-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-warns-of-new-netscaler-zero-days-exploited-in-attacks</loc><lastmod>2024-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-warns-of-critical-rce-flaw-in-older-confluence-versions</loc><lastmod>2024-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-178k-sonicwall-firewalls-vulnerable-to-dos-potential-rce-attacks</loc><lastmod>2024-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-connect-secure-zero-days-exploited-to-deploy-custom-malware</loc><lastmod>2024-01-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/juniper-warns-of-critical-rce-bug-in-its-firewalls-and-switches</loc><lastmod>2024-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-401k-year-end-statements-used-to-steal-corporate-credentials</loc><lastmod>2024-01-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-vpn-chrome-extensions-force-installed-15-million-times</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-january-2024-patch-tuesday-fixes-49-flaws-12-rce-bugs</loc><lastmod>2024-01-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-bandook-rat-variant-resurfaces-targeting-windows-machines</loc><lastmod>2024-01-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-critical-epm-bug-lets-hackers-hijack-enrolled-devices</loc><lastmod>2024-01-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-actively-exploited-bugs-in-chrome-and-excel-parsing-library</loc><lastmod>2024-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/nearly-11-million-ssh-servers-vulnerable-to-new-terrapin-attacks</loc><lastmod>2024-01-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malware-using-google-multilogin-exploit-to-maintain-access-despite-password-reset</loc><lastmod>2024-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/github-warns-users-to-enable-2fa-before-upcoming-deadline</loc><lastmod>2023-12-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apache-ofbiz-rce-flaw-exploited-to-find-vulnerable-confluence-servers</loc><lastmod>2023-12-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks</loc><lastmod>2023-12-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malware-abuses-google-oauth-endpoint-to-revive-cookies-hijack-accounts</loc><lastmod>2023-12-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/barracuda-fixes-new-esg-zero-day-exploited-by-chinese-hackers</loc><lastmod>2023-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/3cx-warns-customers-to-disable-sql-database-integrations</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-8th-chrome-zero-day-exploited-in-attacks-this-year</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-are-exploiting-critical-apache-struts-flaw-using-public-poc</loc><lastmod>2024-01-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sophos-backports-rce-fix-after-attacks-on-unsupported-firewalls</loc><lastmod>2023-12-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-december-2023-patch-tuesday-fixes-34-flaws-1-zero-day</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-releases-security-updates-to-patch-critical-ios-and-macos-security-flaws</loc><lastmod>2023-12-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lazarus-group-using-log4j-exploits-to-deploy-remote-access-trojans</loc><lastmod>2023-12-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-breach-us-govt-agencies-using-adobe-coldfusion-exploit</loc><lastmod>2023-12-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-patches-critical-rce-flaws-across-multiple-products</loc><lastmod>2024-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-proxy-malware-targets-mac-users-through-pirated-software</loc><lastmod>2023-12-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-wordpress-security-advisory-pushes-backdoor-plugin</loc><lastmod>2023-12-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zero-day-alert-apple-rolls-out-ios-macos-and-safari-patches-for-2-actively-exploited-flaws</loc><lastmod>2023-12-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-critical-cloud-director-auth-bypass-unpatched-for-2-weeks</loc><lastmod>2023-12-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-use-new-agent-raccoon-malware-to-backdoor-us-targets</loc><lastmod>2023-12-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-azure-cli-flaw-found-that-leaked-credentials-in-logs</loc><lastmod>2023-11-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-chrome-emergency-update-fixes-5th-zero-day-exploited-in-2023</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-start-exploiting-critical-owncloud-flaw-patch-now</loc><lastmod>2023-11-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/kinsing-hackers-exploit-apache-activemq-vulnerability-to-deploy-linux-rootkits</loc><lastmod>2023-12-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/darkgate-and-pikabot-malware-emerge-as-qakbots-successors</loc><lastmod>2023-11-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-warns-admins-to-kill-netscaler-user-sessions-to-block-hackers</loc><lastmod>2023-11-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-google-ads-trick-winscp-users-into-installing-malware</loc><lastmod>2023-11-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-actively-exploited-windows-sophos-and-oracle-bugs</loc><lastmod>2023-11-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-discloses-critical-vcd-appliance-auth-bypass</loc><lastmod>2023-11-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-november-2023-patch-tuesday-fixes-5-zero-days-58-flaws</loc><lastmod>2023-12-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-actively-exploited-juniper-pre-auth-rce-exploit-chain</loc><lastmod>2023-11-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-microsoft-sharepoint-server-auth-bypass-flaw</loc><lastmod>2023-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sysaid-zero-day-flaw-exploited-in-clop-ransomware-attacks</loc><lastmod>2023-11-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/octo-tempest-is-one-of-the-most-dangerous-financial-hacking-groups</loc><lastmod>2023-10-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/the-rise-of-ransomware-in-healthcare-what-it-leaders-need-to-know</loc><lastmod>2023-11-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-flaws-discovered-in-veeam-one-it-monitoring-software-patch-now</loc><lastmod>2023-11-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-warns-of-critical-command-injection-flaws-in-qts-os-apps</loc><lastmod>2023-11-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks</loc><lastmod>2023-11-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-warns-of-new-critical-confluence-vulnerability-threatening-data-loss</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/servicenow-data-exposure-a-wake-up-call-for-companies</loc><lastmod>2023-10-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cryptojackers-steal-aws-credentials-from-github-in-5-minutes</loc><lastmod>2023-10-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ileakage-new-safari-exploit-impacts-apple-iphones-and-macs-with-a-and-m-series-cpus</loc><lastmod>2023-10-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-warns-admins-to-patch-netscaler-cve-2023-4966-bug-immediately</loc><lastmod>2023-10-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/september-was-a-record-month-for-ransomware-attacks-in-2023</loc><lastmod>2023-10-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-warns-admins-of-public-exploit-for-vrealize-rce-flaw</loc><lastmod>2023-10-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-attacks-now-target-unpatched-ws-ftp-servers</loc><lastmod>2023-10-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-notepad-google-ads-evade-detection-for-months</loc><lastmod>2023-10-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-fbi-urge-admins-to-patch-atlassian-confluence-immediately</loc><lastmod>2023-10-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-ios-kernel-zero-day-vulnerability-on-older-iphones</loc><lastmod>2023-10-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-releases-october-2023-patches-for-103-flaws-including-2-active-exploits</loc><lastmod>2023-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-hijack-citrix-netscaler-login-pages-to-steal-credentials</loc><lastmod>2023-10-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-active-exploitation-of-jetbrains-and-windows-vulnerabilities</loc><lastmod>2023-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-patches-critical-confluence-zero-day-exploited-in-attacks</loc><lastmod>2023-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-fixes-hard-coded-root-credentials-in-emergency-responder</loc><lastmod>2023-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-emergency-update-fixes-new-zero-day-used-to-hack-iphones</loc><lastmod>2023-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-hackers-target-azure-cloud-vms-via-breached-sql-servers</loc><lastmod>2023-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cloudflare-ddos-protections-ironically-bypassed-using-cloudflare</loc><lastmod>2023-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/github-repos-bombarded-by-info-stealing-commits-masked-as-dependabot</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ssh-keys-stolen-by-stream-of-malicious-pypi-and-npm-packages</loc><lastmod>2023-09-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/update-chrome-now-google-releases-patch-for-actively-exploited-zero-day-vulnerability</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/high-severity-flaws-uncovered-in-atlassian-products-and-isc-bind-server</loc><lastmod>2023-09-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-emergency-updates-fix-3-new-zero-days-exploited-in-attacks</loc><lastmod>2023-09-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-releases-urgent-security-patches-for-critical-vulnerability</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-winrar-proof-of-concept-exploit-drops-venomrat-malware</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-cisco-webex-google-ads-abuse-tracking-templates-to-push-malware</loc><lastmod>2023-09-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-access-broker-steals-accounts-via-microsoft-teams-phishing</loc><lastmod>2023-09-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-september-2023-patch-tuesday-fixes-2-zero-days-59-flaws</loc><lastmod>2023-09-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/free-download-manager-site-redirected-linux-users-to-malware-for-years</loc><lastmod>2023-09-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-rushes-to-patch-critical-chrome-vulnerability-exploited-in-the-wild-update-now</loc><lastmod>2023-09-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-vpn-zero-day-exploited-by-ransomware-gangs</loc><lastmod>2023-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/outlook-hack-microsoft-reveals-how-a-crash-dump-led-to-a-major-security-breach</loc><lastmod>2023-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware</loc><lastmod>2023-09-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/us-govt-email-servers-hacked-in-barracuda-zero-day-attacks</loc><lastmod>2023-09-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-can-exploit-windows-container-isolation-framework-to-bypass-endpoint-security</loc><lastmod>2023-09-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/wordpress-migration-add-on-flaw-could-lead-to-data-breaches</loc><lastmod>2023-09-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-aria-vulnerable-to-critical-ssh-authentication-bypass-flaw</loc><lastmod>2023-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lazarus-group-exploits-critical-zoho-manageengine-flaw-to-deploy-stealthy-quiterat-malware</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fbi-warns-of-patched-barracuda-esg-appliances-still-being-hacked</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-warns-of-critical-zero-day-flaw-being-actively-exploited-in-sentry-software</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/akira-ransomware-targets-cisco-vpns-to-breach-organizations</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-powershell-gallery-vulnerable-to-spoofing-supply-chain-attacks</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/raccoon-stealer-malware-returns-with-new-stealthier-version</loc><lastmod>2023-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/almost-2000-citrix-netscaler-servers-backdoored-in-hacking-campaign</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/threat-actors-abuse-google-amp-for-evasive-phishing-attacks</loc><lastmod>2023-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/rhysida-ransomware-behind-recent-attacks-on-healthcare</loc><lastmod>2023-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-august-2023-patch-tuesday-warns-of-2-zero-days-87-flaws</loc><lastmod>2023-08-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/dell-compellent-hardcoded-key-exposes-vmware-vcenter-admin-creds</loc><lastmod>2023-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-extensions-can-abuse-vs-code-flaw-to-steal-auth-tokens</loc><lastmod>2023-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-papercut-critical-bug-exposes-unpatched-servers-to-rce-attacks</loc><lastmod>2023-08-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/almost-40-of-ubuntu-users-vulnerable-to-new-privilege-elevation-flaws</loc><lastmod>2023-07-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-abusing-windows-search-feature-to-install-remote-access-trojans</loc><lastmod>2023-07-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-releases-patches-for-critical-flaws-in-confluence-and-bamboo</loc><lastmod>2023-07-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-bug-exposing-cf-api-admin-credentials-in-audit-logs</loc><lastmod>2023-12-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-new-zero-day-used-in-attacks-against-iphones-macs</loc><lastmod>2023-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/privilege-escalation-vulnerability-patched-in-windows-admin-center-cve-2026-26119</loc><lastmod>2026-02-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/github-warns-of-lazarus-hackers-targeting-devs-with-malicious-projects</loc><lastmod>2023-07-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sophisticated-bundlebot-malware-disguised-as-google-ai-chatbot-and-utilities</loc><lastmod>2023-07-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/adobe-fixes-patch-bypass-for-exploited-coldfusion-cve-2023-29298-flaw</loc><lastmod>2023-07-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-critical-citrix-adc-and-gateway-flaw-exploited-as-zero-days</loc><lastmod>2023-07-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-critical-rce-flaw-in-fortios-fortiproxy-devices</loc><lastmod>2023-07-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-releases-patches-for-132-vulnerabilities-including-6-under-active-attack</loc><lastmod>2023-07-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-warns-of-exploit-available-for-critical-vrealize-rce-bug</loc><lastmod>2023-07-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-warns-admins-to-patch-critical-auth-bypass-bugs-immediately</loc><lastmod>2023-07-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-onenote-will-block-120-dangerous-file-extensions</loc><lastmod>2023-04-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/two-spyware-apps-on-google-play-with-15-million-users-sending-data-to-china</loc><lastmod>2023-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/another-critical-unauthenticated-sqli-flaw-discovered-in-moveit-transfer-software</loc><lastmod>2023-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-bug-that-lets-attackers-break-traffic-encryption</loc><lastmod>2023-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-netwrix-auditor-rce-bug-exploited-in-truebot-malware-attacks</loc><lastmod>2023-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploiting-unpatched-wordpress-plugin-flaw-to-create-secret-admin-accounts</loc><lastmod>2023-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/grafana-warns-of-critical-auth-bypass-due-to-azure-ad-integration</loc><lastmod>2023-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-mockingjay-process-injection-technique-evades-edr-detection</loc><lastmod>2023-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/linux-version-of-akira-ransomware-targets-vmware-esxi-servers</loc><lastmod>2023-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-new-arcserve-udp-auth-bypass-vulnerability</loc><lastmod>2023-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-teams-bug-allows-malware-delivery-from-external-accounts</loc><lastmod>2023-06-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-cisco-anyconnect-bug-giving-system-privileges</loc><lastmod>2023-06-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/million-of-github-repositories-likely-vulnerable-to-repojacking-attack</loc><lastmod>2023-06-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-fixes-critical-fortinac-remote-command-execution-flaw</loc><lastmod>2023-06-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-zero-day-vulnerability-in-dell-recoverpoint-for-vms-cve-2026-22769-actively-exploited-since-2024</loc><lastmod>2026-02-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites</loc><lastmod>2023-06-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/severe-vulnerabilities-reported-in-microsoft-azure-bastion-and-container-registry</loc><lastmod>2023-06-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/barracuda-esg-zero-day-exploited-by-china-linked-apt</loc><lastmod>2023-06-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-releases-updates-to-patch-critical-flaws-in-windows-and-other-software</loc><lastmod>2023-06-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-new-fortios-rce-bug-may-have-been-exploited-in-attacks</loc><lastmod>2023-06-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/barracuda-says-hacked-esg-appliances-must-be-replaced-immediately</loc><lastmod>2023-06-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/more-moveit-transfer-sql-injection-vulnerabilities-discovered-patch-now</loc><lastmod>2023-06-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-hijack-legitimate-sites-to-host-credit-card-stealer-scripts</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-new-chrome-zero-day-flaw-with-exploit-in-the-wild</loc><lastmod>2023-06-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixes-critical-vulnerabilities-in-vrealize-network-analytics-tool</loc><lastmod>2023-06-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-fixes-anyconnect-bug-giving-windows-system-privileges</loc><lastmod>2023-06-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-firmware-vulnerability-in-gigabyte-systems-exposes-7-million-devices</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-oauth-vulnerability-in-expo-framework-allows-account-hijacking</loc><lastmod>2023-06-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-wordpress-membership-plugin-vulnerability-used-to-create-admin-accounts</loc><lastmod>2026-03-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zyxel-issues-critical-security-patches-for-firewall-and-vpn-products</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/terminator-antivirus-killer-is-a-vulnerable-windows-driver-in-disguise</loc><lastmod>2023-06-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/wordpress-force-installs-critical-jetpack-patch-on-5-million-sites</loc><lastmod>2023-06-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-apple-macos-vulnerability-allowing-sip-protection-bypass</loc><lastmod>2023-06-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qbot-malware-abuses-windows-wordpad-exe-to-infect-devices</loc><lastmod>2023-05-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-iphone-bugs-to-its-known-exploited-vulnerabilities-catalog</loc><lastmod>2023-05-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/pypi-repository-under-attack-user-sign-ups-and-package-uploads-temporarily-halted</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/barracuda-warns-of-email-gateways-breached-via-zero-day-flaw</loc><lastmod>2023-05-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/batloader-campaign-impersonates-chatgpt-and-midjourney-to-deliver-redline-stealer</loc><lastmod>2023-05-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-critical-switch-bugs-with-public-exploit-code</loc><lastmod>2023-05-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-fixes-three-new-zero-days-exploited-to-hack-iphones-macs</loc><lastmod>2023-05-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-microsoft-vscode-extensions-steal-passwords-open-remote-shells</loc><lastmod>2023-05-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-enterprise-vpn-downloads-steal-company-credentials</loc><lastmod>2026-03-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-aria-operations-command-injection-vulnerability-actively-exploited</loc><lastmod>2026-03-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-vulnerabilities-in-veeam-backup-servers-expose-systems-to-remote-code-execution</loc><lastmod>2026-03-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/babuk-code-used-by-9-ransomware-gangs-to-encrypt-vmware-esxi-servers</loc><lastmod>2023-05-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-in-browser-windows-updates-push-aurora-info-stealer-malware</loc><lastmod>2023-05-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-failed-patch-for-exploited-outlook-vulnerability</loc><lastmod>2023-05-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-cactus-ransomware-encrypts-itself-to-evade-antivirus</loc><lastmod>2023-05-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-start-using-double-dll-sideloading-to-evade-detection</loc><lastmod>2023-05-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-atomic-macos-malware-steals-keychain-passwords-and-crypto-wallets</loc><lastmod>2023-05-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-phone-adapters-vulnerable-to-rce-attacks-no-fix-available</loc><lastmod>2023-05-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/alert-active-exploitation-of-tp-link-apache-and-oracle-vulnerabilities-detected</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zyxel-firewall-devices-vulnerable-to-remote-code-execution-attacks-patch-now</loc><lastmod>2023-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-sharepoint-deserialization-flaw-now-being-actively-exploited</loc><lastmod>2026-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-discloses-xss-zero-day-flaw-in-server-management-tool</loc><lastmod>2023-04-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-ads-push-bumblebee-malware-used-by-ransomware-gangs</loc><lastmod>2023-04-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-and-vmware-release-security-updates-to-patch-critical-flaws-in-their-products</loc><lastmod>2023-04-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-gangs-abuse-process-explorer-driver-to-kill-security-software</loc><lastmod>2023-04-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-sql-servers-hacked-to-deploy-trigona-ransomware</loc><lastmod>2023-04-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-chrome-hit-by-second-zero-day-attack-urgent-patch-update-released</loc><lastmod>2023-04-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lockbit-ransomware-now-targeting-apple-macos-devices</loc><lastmod>2023-04-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qbot-expands-initial-access-malware-strategy-with-pdf-wsf-combo</loc><lastmod>2023-04-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-releases-urgent-chrome-update-to-fix-actively-exploited-zero-day-vulnerability</loc><lastmod>2023-04-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/irs-authorized-efilecom-tax-return-software-caught-serving-js-malware</loc><lastmod>2023-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-issues-patches-for-97-flaws-including-active-ransomware-exploit</loc><lastmod>2023-04-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-use-rilide-browser-extension-to-bypass-2fa-steal-crypto</loc><lastmod>2023-04-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hp-to-patch-critical-bug-in-laserjet-printers-within-90-days</loc><lastmod>2023-04-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/alphv-ransomware-exploits-veritas-backup-exec-bugs-for-initial-access</loc><lastmod>2023-04-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/winrar-sfx-archives-can-run-powershell-without-being-detected</loc><lastmod>2023-04-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic</loc><lastmod>2023-04-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-warns-customers-to-patch-linux-sudo-flaw-in-nas-devices</loc><lastmod>2023-04-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-alienfox-toolkit-steals-credentials-for-18-cloud-services</loc><lastmod>2023-04-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/bluenoroff-apt-hackers-using-new-ways-to-bypass-windows-motw-protection</loc><lastmod>2022-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-patch-addresses-critical-screenconnect-cryptographic-flaw-cve-2026-3564</loc><lastmod>2026-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-microsoft-outlook-bug-is-easy-exploitable</loc><lastmod>2023-03-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-macstealer-macos-malware-steals-icloud-keychain-data-and-passwords</loc><lastmod>2023-03-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-shares-tips-on-detecting-outlook-zero-day-exploitation</loc><lastmod>2023-03-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emotet-malware-distributed-as-fake-w-9-tax-forms-from-the-irs</loc><lastmod>2023-03-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-veeam-bug-allowing-cleartext-credential-theft</loc><lastmod>2023-03-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/rogue-nuget-packages-infect-net-developers-with-crypto-stealing-malware</loc><lastmod>2023-03-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-alerts-on-critical-security-vulnerabilities-in-industrial-control-systems</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-adobe-coldfusion-bug-to-known-exploited-vulnerabilities-catalog</loc><lastmod>2023-03-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-cryptojacking-operation-targeting-kubernetes-clusters-for-dero-mining</loc><lastmod>2023-03-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/large-scale-use-of-phishing-kits-sends-millions-of-emails-daily</loc><lastmod>2023-03-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/business-email-compromise-attacks-can-take-only-a-few-hours</loc><lastmod>2023-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-announced-a-critical-web-ui-rce-flaw-in-multiple-ip-phones</loc><lastmod>2023-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/us-cybersecurity-agency-cisa-adds-three-new-vulnerabilities-in-kev-catalog</loc><lastmod>2023-02-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-three-new-bugs-to-known-exploited-vulnerabilities-catalog</loc><lastmod>2023-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-devices-infected-by-malware-that-survives-firmware-upgrades</loc><lastmod>2023-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emotet-malware-returns-after-a-three-month-break</loc><lastmod>2023-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veeam-fixes-a-high-severity-bug-in-its-backup-replication-product</loc><lastmod>2023-03-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-critical-flaw-in-fortios-and-fortiproxy-could-give-hackers-remote-access</loc><lastmod>2023-03-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/six-critical-vulnerabilities-fixed-in-arubaos</loc><lastmod>2023-03-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/how-to-prevent-callback-phishing-attacks</loc><lastmod>2023-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/first-uefi-bootkit-malware-to-bypass-secure-boot-on-windows-11</loc><lastmod>2023-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-use-fake-chatgpt-apps-to-push-windows-android-malware</loc><lastmod>2023-02-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/the-week-in-ransomware</loc><lastmod>2023-03-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/trojanized-macos-apps-used-to-deploy-evasive-cryptocurrency-mining-malware</loc><lastmod>2023-02-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-warns-of-3-new-vulnerabilities-affecting-iphone-ipad-and-mac-devices</loc><lastmod>2023-02-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-fixes-critical-rce-flaws-in-fortinac-and-fortiweb</loc><lastmod>2023-02-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-start-using-havoc-post-exploitation-framework-in-attacks</loc><lastmod>2023-02-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emsisoft-says-hackers-are-spoofing-its-certs-to-breach-networks</loc><lastmod>2023-02-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-fixes-severe-flaws-in-workspace-virtual-apps-and-desktops</loc><lastmod>2023-02-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws</loc><lastmod>2023-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/researchers-uncover-obfuscated-malicious-code-in-pypi-python-packages</loc><lastmod>2023-02-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-active-attacks-exploiting-fortra-mft-terramaster-nas-and-intel-driver-flaws</loc><lastmod>2023-02-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sonicwall-warns-web-content-filtering-is-broken-on-windows-11-22h2</loc><lastmod>2023-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide</loc><lastmod>2023-02-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-warns-of-critical-jira-service-management-auth-flaw</loc><lastmod>2023-02-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-ddos-as-a-service-platform-used-in-recent-attacks-on-hospitals</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-exploit-for-chromebook-unenrolls-managed-chromeos-devices</loc><lastmod>2023-02-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-urges-admins-to-patch-on-premises-exchange-servers</loc><lastmod>2023-01-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/bitwarden-password-vaults-targeted-in-google-ads-phishing-attack</loc><lastmod>2023-01-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/federal-agencies-hacked-using-legitimate-remote-desktop-tools</loc><lastmod>2023-01-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-releases-patches-for-critical-vrealize-log-insight-software-vulnerabilities</loc><lastmod>2023-01-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lastpass-parent-company-goto-suffers-data-breach-customers-backups-compromised</loc><lastmod>2023-01-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-manageengine-rce-bug-now-exploited-to-open-reverse-shells</loc><lastmod>2023-01-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/paypal-accounts-breached-in-large-scale-credential-stuffing-attack</loc><lastmod>2023-01-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-4000-sophos-firewall-devices-vulnerable-to-rce-attacks</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-azure-services-flaws-couldve-exposed-cloud-resources-to-unauthorized-access</loc><lastmod>2023-01-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/active-directory-domain-compromised-in-under-24-hours</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/windows-error-reporting-tool-abused-to-deploy-malware</loc><lastmod>2023-01-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-defender-asr-rule-deletes-windows-app-shortcuts</loc><lastmod>2023-01-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-auth-bypass-bug-with-public-exploit-in-eol-routers</loc><lastmod>2023-01-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-issues-january-2023-patch-tuesday-updates-warns-of-zero-day-exploit</loc><lastmod>2023-01-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vscode-marketplace-can-be-abused-to-host-malicious-extensions</loc><lastmod>2023-01-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-pypi-packages-create-cloudflare-tunnels-to-bypass-firewalls</loc><lastmod>2023-01-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/high-severity-command-injection-flaws-found-in-fortinets-fortitester-fortiadc</loc><lastmod>2023-01-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-active-exploitation-of-jasperreports-vulnerabilities</loc><lastmod>2022-12-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug</loc><lastmod>2022-12-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-ads-abused-to-spread-malware-in-legit-software</loc><lastmod>2022-12-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lastpass-hackers-stole-customer-vault-data-in-cloud-storage-breach</loc><lastmod>2022-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/oktas-source-code-stolen-after-github-repositories-hacked</loc><lastmod>2022-12-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-bombard-pypi-platform-with-information-stealing-malware</loc><lastmod>2022-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-alert-veeam-backup-and-replication-vulnerabilities-being-exploited-in-attacks</loc><lastmod>2022-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-signed-malicious-windows-drivers-used-in-ransomware-attacks</loc><lastmod>2022-12-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-december-2022-patch-tuesday-fixes-2-zero-days-49-flaws</loc><lastmod>2022-12-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-actively-exploited-zero-day-vulnerability-discovered-in-apple-products</loc><lastmod>2022-12-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-python-malware-backdoors-vmware-esxi-servers-for-remote-access</loc><lastmod>2022-12-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-says-the-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks</loc><lastmod>2022-12-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-critical-citrix-adc-and-gateway-zero-day</loc><lastmod>2022-12-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-proxynotshell-exchange-zero-days-exploited-in-attacks</loc><lastmod>2022-11-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/citrix-urges-admins-to-patch-critical-adc-gateway-auth-bypass</loc><lastmod>2022-11-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sophos-fixed-a-critical-flaw-in-its-sophos-firewall-version-195</loc><lastmod>2022-12-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/experts-created-a-technique-to-bypass-web-application-firewalls-waf-of-several-major-vendors</loc><lastmod>2022-12-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-discloses-high-severity-ip-phone-bug-with-exploit-code</loc><lastmod>2022-12-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/automated-dark-web-markets-sell-corporate-email-accounts-for-2</loc><lastmod>2022-12-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/dell-hp-and-lenovo-devices-found-using-outdated-openssl-versions</loc><lastmod>2022-12-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-chrome-emergency-update-fixes-the-9th-zero-day-of-the-year</loc><lastmod>2022-12-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/trigona-ransomware-spotted-in-increasing-attacks-worldwide</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/the-evolution-of-business-email-compromise</loc><lastmod>2022-11-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/all-you-need-to-know-about-emotet-in-2022</loc><lastmod>2022-11-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-ransomexx-ransomware-variant-rewritten-in-rust</loc><lastmod>2022-11-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emotet-botnet-is-blasting-malware-again-after-5-months-break</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-october-2022-patch-tuesday-fixes-zero-day-used-in-attacks-84-flaws</loc><lastmod>2022-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malware-installs-malicious-browser-extensions-to-steal-users-passwords-and-cryptos</loc><lastmod>2022-11-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/nighthawk-likely-to-become-hackers-new-post-exploitation-tool-after-cobalt-strike</loc><lastmod>2022-11-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-releases-165-yara-rules-to-detect-cobalt-strike-attacks</loc><lastmod>2022-11-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lodarat-malware-resurfaces-with-new-variants-employing-updated-functionalities</loc><lastmod>2022-11-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/phishing-kit-impersonates-well-known-brands-to-target-us-shoppers</loc><lastmod>2022-11-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-search-results-poisoned-with-torrent-sites-via-data-studio</loc><lastmod>2022-11-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-fixes-critical-command-injection-bug-in-bitbucket-server</loc><lastmod>2022-11-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/worok-hackers-abuse-dropbox-api-to-exfiltrate-data-via-backdoor-hidden-in-images</loc><lastmod>2022-11-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cookies-for-mfa-bypass-gain-traction-among-cyberattackers</loc><lastmod>2022-11-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-windows-zero-day-bug-exploited-to-push-malware</loc><lastmod>2022-11-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/text4shell-a-remote-code-execution-bug-in-apache-commons-text-library</loc><lastmod>2022-10-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-rce-vulnerability-reported-in-connectwise-server-backup-solution</loc><lastmod>2022-11-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/openssl-fixes-two-high-severity-vulnerabilities-what-you-need-to-know</loc><lastmod>2022-11-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-data-breach-exposes-customers-contact-info-emails</loc><lastmod>2022-10-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/tear-in-microsoft-azure-service-fabric-can-give-attackers-full-admin-privileges</loc><lastmod>2022-10-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/experts-warn-of-stealthy-powershell-backdoor-disguising-as-windows-update</loc><lastmod>2022-10-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-tls-handshake-failures-in-windows-server-2019</loc><lastmod>2022-10-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/over-45000-vmware-esxi-servers-just-reached-end-of-life</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/magniber-ransomware-now-infects-windows-users-via-javascript-files</loc><lastmod>2022-10-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/researchers-warn-of-new-phishing-as-a-service-being-used-by-cyber-criminals</loc><lastmod>2022-10-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-report-uncovers-emotets-delivery-and-evasion-techniques-used-in-recent-attacks</loc><lastmod>2022-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/callback-phishing-attacks-evolve-their-social-engineering-tactics</loc><lastmod>2022-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/email-defenses-under-siege-phishing-attacks-dramatically-improve</loc><lastmod>2022-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/blackbyte-ransomware-abuses-vulnerable-windows-driver-to-disable-security-solutions</loc><lastmod>2022-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hundreds-of-microsoft-sql-servers-backdoored-with-new-malware</loc><lastmod>2022-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-admins-to-patch-critical-auth-bypass-bug-immediately</loc><lastmod>2022-10-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-royal-ransomware-emerges-in-multi-million-dollar-attacks</loc><lastmod>2022-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-hackers-exploit-critical-bitbucket-server-flaw-in-attacks</loc><lastmod>2022-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/how-to-protect-your-mac-against-ransomware-and-other-cyberthreats</loc><lastmod>2022-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-malware-backdoors-vmware-esxi-servers-to-hijack-virtual-machines</loc><lastmod>2022-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-microsoft-exchange-zero-day-actively-exploited-in-attacks</loc><lastmod>2022-09-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-365-phishing-attacks-impersonate-us-govt-agencies</loc><lastmod>2022-09-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/unpatched-15-year-old-python-bug-allows-code-execution-in-350k-projects</loc><lastmod>2022-09-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-microsoft-warn-of-widespread-chromeloader-malware-attacks</loc><lastmod>2022-09-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/emotet-botnet-now-pushes-quantum-and-blackcat-ransomware</loc><lastmod>2022-09-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-microsoft-can-get-your-passwords-via-web-browsers-spellcheck</loc><lastmod>2022-09-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-orders-agencies-to-patch-windows-ios-bugs-used-in-attacks</loc><lastmod>2022-09-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/patch-now-microsoft-issues-critical-security-updates-as-pcs-attacked-through-zero-day-flaw</loc><lastmod>2022-09-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs</loc><lastmod>2022-09-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/nsa-and-cisa-share-tips-to-secure-the-software-supply-chain</loc><lastmod>2022-09-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-stealthy-shikitega-malware-targeting-linux-systems-and-iot-devices</loc><lastmod>2022-09-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-cloud-providers-move-to-ban-basic-authentication</loc><lastmod>2022-09-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lampion-malware-returns-in-phishing-attacks-abusing-wetransfer</loc><lastmod>2022-09-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/windows-malware-delays-coinminer-install-by-a-month-to-evade-detection</loc><lastmod>2022-08-30T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cybercrime-groups-increasingly-adopting-sliver-command-and-control-framework</loc><lastmod>2022-08-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cve-2022-36804-bitbucket-server-and-data-center-command-injection-vulnerability</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-chrome-extension-internet-download-manager-has-200000-installs</loc><lastmod>2022-08-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/phishing-attacks-abusing-saas-platforms-see-a-massive-1100-growth</loc><lastmod>2022-08-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/safari-1561-addresses-a-zero-day-flaw-actively-exploited-in-the-wild</loc><lastmod>2022-08-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fbi-warns-of-residential-proxies-used-in-credential-stuffing-attacks</loc><lastmod>2022-08-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-7-vulnerabilities-to-list-of-bugs-exploited-by-hackers</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-fixes-fifth-chrome-zero-day-bug-exploited-this-year</loc><lastmod>2022-08-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/two-more-malicious-python-packages-in-the-pypi</loc><lastmod>2022-08-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/credential-theft-is-still-a-top-attack-method</loc><lastmod>2023-12-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/windows-kb5012170-secure-boot-dbx-update-may-fail-with-0x800f0922-error</loc><lastmod>2022-08-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/newly-uncovered-pypi-package-drops-fileless-cryptominer-to-linux-systems</loc><lastmod>2022-08-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/july-patch-tuesday-patches-include-fix-for-exploited-zero-day-cve-2022-30221</loc><lastmod>2022-07-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-issues-patches-for-121-flaws-including-zero-day-under-active-attack</loc><lastmod>2022-08-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/conti-cybercrime-cartel-using-bazarcall-phishing-attacks-as-initial-attack-vector</loc><lastmod>2022-08-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-issues-warning-on-active-exploitation-of-unrar-software-for-linux-systems</loc><lastmod>2022-08-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-iot-rapperbot-malware-targeting-linux-servers-via-ssh-brute-forcing-attack</loc><lastmod>2022-08-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-gwisinlocker-ransomware-encrypts-windows-and-linux-esxi-servers</loc><lastmod>2022-08-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-flaws-found-in-four-cisco-smb-router-ranges</loc><lastmod>2022-08-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-accounts-targeted-with-new-mfa-bypassing-phishing-kit</loc><lastmod>2022-08-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-urges-admins-to-patch-critical-auth-bypass-bug-immediately</loc><lastmod>2022-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/lockbit-ransomware-abuses-windows-defender-to-deploy-cobalt-strike-payload</loc><lastmod>2022-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-wsus-remote-code-execution-vulnerability-cve-2025-59287-actively-exploited</loc><lastmod>2025-10-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-campaign-targets-macos-users-with-fake-apps-delivering-info-stealing-malware</loc><lastmod>2025-09-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/salesloft-drift-breach-expands-oauth-token-compromise-impacts-additional-integrations-and-google-workspace-accounts</loc><lastmod>2025-08-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cursor-ai-editor-bug-allows-remote-code-execution</loc><lastmod>2025-08-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/akira-ransomware-targets-sonicwall-firewalls</loc><lastmod>2025-08-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-nvidia-bug-enables-cloud-privilege-escalation</loc><lastmod>2025-07-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-winrar-flaw-allows-malware-execution</loc><lastmod>2025-06-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/seo-poisoning-used-to-distribute-malware-through-zoom-teamviewer-visual-studio-installers</loc><lastmod>2022-02-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/80000-microsoft-entra-accounts-hit-by-password-attacks</loc><lastmod>2025-06-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-screenconnect-bug-under-attack</loc><lastmod>2025-06-06T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-gangs-target-sap-netweaver</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-fixes-critical-fortivoice-zero-day-rce-cve-2025-32756</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/zero-day-hack-exposes-data-in-craft-cms</loc><lastmod>2025-05-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-alerts-attackers-maintain-fortigate-access-after-patching-through-ssl-vpn-symlink-vulnerability</loc><lastmod>2025-04-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-april-2025-patch-tuesday-fixes-exploited-zero-day-134-flaws</loc><lastmod>2025-04-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-trusted-signing-service-exploited-to-sign-malware</loc><lastmod>2025-03-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/broadcom-warns-of-authentication-bypass-in-vmware-windows-tools</loc><lastmod>2025-03-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-attacks-target-critical-vulnerabilities-in-cisco-smart-licensing-utility</loc><lastmod>2025-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-patches-critical-authentication-bypass-vulnerabilities</loc><lastmod>2025-03-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/polaredge-botnet-exploits-cisco-and-other-flaws-to-hijack-asus-qnap-and-synology-devices</loc><lastmod>2025-02-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-adds-microsoft-and-zimbra-flaws-to-kev-catalog-amid-active-exploitation</loc><lastmod>2025-02-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-patches-actively-exploited-power-pages-privilege-escalation-vulnerability</loc><lastmod>2025-02-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-new-zero-day-exploited-to-hijack-firewalls</loc><lastmod>2025-02-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-veeam-flaw-allows-arbitrary-code-execution-via-man-in-the-middle-attack</loc><lastmod>2025-02-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-cacti-security-flaw-cve-2025-22604-enables-remote-code-execution</loc><lastmod>2025-01-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-targets-esxi-systems-via-stealthy-ssh-tunnels-for-c2-operations</loc><lastmod>2025-01-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-auth-bypass-zero-day-exploited-to-hijack-firewalls</loc><lastmod>2025-01-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-doubleclickjacking-attack-exploits-double-clicks-to-hijack-accounts</loc><lastmod>2025-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ldapnightmare-poc-exploit-crashes-lsass-and-reboots-windows-domain-controllers</loc><lastmod>2025-01-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls</loc><lastmod>2024-12-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers</loc><lastmod>2024-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/researchers-uncover-symlink-exploit-allowing-tcc-bypass-in-ios-and-macos</loc><lastmod>2024-12-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-mfa-authquake-flaw-enabled-unlimited-brute-force-attempts-without-alerts</loc><lastmod>2024-12-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ubuntu-linux-impacted-by-decade-old-needrestart-flaw-that-gives-root</loc><lastmod>2024-11-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/palo-alto-networks-warns-of-critical-rce-zero-day-exploited-in-attacks</loc><lastmod>2024-11-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veildrive-attack-exploits-microsoft-services-to-evade-detection-and-distribute-malware</loc><lastmod>2024-11-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-warns-of-new-critical-fortimanager-flaw-used-in-zero-day-attacks</loc><lastmod>2024-10-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-released-for-new-windows-server-winreg-ntlm-relay-attack</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cybercriminals-exploiting-docker-api-servers-for-srbminer-crypto-mining-attacks</loc><lastmod>2024-10-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/akira-and-fog-ransomware-now-exploit-critical-veeam-rce-flaw</loc><lastmod>2024-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/recently-patched-cups-flaw-can-be-used-to-amplify-ddos-attacks</loc><lastmod>2024-10-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/embargo-ransomware-escalates-attacks-to-cloud-environments</loc><lastmod>2024-09-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cybersecurity-researchers-warn-of-new-rust-based-splinter-post-exploitation-tool</loc><lastmod>2024-09-27T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hpe-aruba-networking-fixes-critical-flaws-impacting-access-points</loc><lastmod>2024-09-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/adobe-fixes-acrobat-reader-zero-day-with-public-poc-exploit</loc><lastmod>2024-09-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-fixes-root-escalation-vulnerability-with-public-exploit-code</loc><lastmod>2024-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-use-appdomain-injection-to-drop-cobaltstrike-beacons</loc><lastmod>2024-08-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-fixes-critical-rce-bug-affecting-all-web-help-desk-versions</loc><lastmod>2024-08-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-august-2024-patch-tuesday-fixes-9-zero-days-6-exploited</loc><lastmod>2024-08-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-about-actively-exploited-apache-ofbiz-rce-flaw</loc><lastmod>2024-08-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ransomware-gangs-exploit-vmware-esxi-auth-bypass-in-attacks</loc><lastmod>2024-08-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/teamviewer-abused-to-breach-networks-in-new-ransomware-attacks</loc><lastmod>2024-01-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-defender-flaw-exploited-to-deliver-acr-lumma-and-meduza-stealers</loc><lastmod>2024-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/solarwinds-fixes-8-critical-bugs-in-access-rights-audit-software</loc><lastmod>2024-07-19T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-unpatched-flaws-disclosed-in-popular-gogs-open-source-git-service</loc><lastmod>2024-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-attack-hfs-servers-to-drop-malware-and-monero-miners</loc><lastmod>2024-07-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks</loc><lastmod>2024-06-28T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/jetbrains-warns-of-intellij-ide-bug-exposing-github-access-tokens</loc><lastmod>2024-06-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/exploit-for-critical-veeam-auth-bypass-available-patch-now</loc><lastmod>2024-06-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/okta-warns-of-credential-stuffing-attacks-targeting-customer-identity-cloud</loc><lastmod>2024-05-31T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-qts-zero-day-in-share-feature-gets-public-rce-exploit</loc><lastmod>2024-05-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/nextgen-healthcare-mirth-connect-under-attack-cisa-issues-urgent-warning</loc><lastmod>2024-05-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/veeam-fixes-rce-flaw-in-backup-management-platform-cve-2024-29212</loc><lastmod>2024-05-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/four-critical-vulnerabilities-expose-hpe-aruba-devices-to-rce-attacks</loc><lastmod>2024-05-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/dropbox-discloses-breach-of-digital-signature-service-affecting-all-users</loc><lastmod>2024-05-03T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-discloses-root-escalation-flaw-with-public-exploit-code</loc><lastmod>2024-04-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-security-flaw-found-in-popular-layerslider-wordpress-plugin</loc><lastmod>2024-04-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atlassian-releases-fixes-for-over-2-dozen-flaws-including-critical-bamboo-bug</loc><lastmod>2024-03-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-warns-of-critical-auth-bypass-flaw-in-its-nas-devices</loc><lastmod>2024-03-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-target-docker-hadoop-redis-confluence-with-new-golang-malware</loc><lastmod>2024-03-07T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/anydesk-says-hackers-breached-its-production-servers-reset-passwords</loc><lastmod>2024-02-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-target-microsoft-sql-servers-in-mimic-ransomware-attacks</loc><lastmod>2024-01-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-releases-patches-for-13-critical-avalanche-rce-flaws</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/atomic-stealer-malware-strikes-macos-via-fake-browser-updates</loc><lastmod>2023-12-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-agent-tesla-malware-variant-using-zpaq-compression-in-email-attacks</loc><lastmod>2023-11-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-malvertising-campaign-uses-fake-windows-news-portal-to-distribute-malicious-installers</loc><lastmod>2023-11-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-rce-flaws-found-in-solarwinds-access-audit-solution</loc><lastmod>2023-10-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisco-warns-of-new-ios-xe-zero-day-actively-exploited-in-attacks</loc><lastmod>2023-10-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/bing-chat-responses-infiltrated-by-ads-pushing-malware</loc><lastmod>2023-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-critical-apache-rocketmq-bug-exploited-in-attacks</loc><lastmod>2023-09-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-fixes-flaw-discovered-by-tenable</loc><lastmod>2023-08-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fake-vmware-vconnector-package-on-pypi-targets-it-pros</loc><lastmod>2023-08-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/ivanti-patches-mobileiron-zero-day-bug-exploited-in-attacks</loc><lastmod>2023-07-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-expands-access-to-cloud-logging-data-for-free-after-exchange-hacks</loc><lastmod>2023-07-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-new-whirlpool-backdoor-used-in-barracuda-esg-hacks</loc><lastmod>2023-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/malicious-npm-packages-found-exfiltrating-sensitive-data-from-developers</loc><lastmod>2023-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-issues-urgent-patch-for-zero-day-flaw-targeting-ios-ipados-macos-and-safari</loc><lastmod>2023-07-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-tool-exploits-microsoft-teams-bug-to-send-malware-to-users</loc><lastmod>2023-07-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hackers-exploiting-critical-vulnerability-in-vmwares-aria-operations-networks</loc><lastmod>2023-06-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-buhti-ransomware-operation-uses-rebranded-lockbit-and-babuk-payloads</loc><lastmod>2023-06-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/parental-control-app-with-5-million-downloads-vulnerable-to-attacks</loc><lastmod>2023-05-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/critical-infrastructure-organizations-warned-of-bianlian-ransomware-attacks</loc><lastmod>2023-05-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/new-phishing-as-a-service-platform-lets-cybercriminals-generate-convincing-phishing-pages</loc><lastmod>2023-05-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-patches-high-severity-vulnerabilities-in-fortiadc-fortios</loc><lastmod>2023-05-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/linux-version-of-rtm-locker-ransomware-targets-vmware-esxi-servers</loc><lastmod>2023-04-29T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-releases-critical-patches-for-workstation-and-fusion-software</loc><lastmod>2023-04-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-fixed-a-critical-vulnerability-in-its-data-analytics-product</loc><lastmod>2023-04-13T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/hacked-sites-caught-spreading-malware-via-fake-chrome-updates</loc><lastmod>2023-04-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/apple-releases-updates-to-address-zero-day-flaws-in-ios-ipados-macos-and-safari</loc><lastmod>2023-12-22T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/3cx-desktop-app-found-to-be-trojanized-in-a-supply-chain-attack</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-march-2023-patch-tuesday-fixes-2-zero-days-83-flaws</loc><lastmod>2023-03-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/python-developers-warned-of-trojanized-pypi-packages-mimicking-popular-libraries</loc><lastmod>2023-02-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/reddit-suffers-security-breach-exposing-internal-documents-and-source-code</loc><lastmod>2023-02-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qnap-fixes-a-critical-bug-that-lets-hackers-inject-malicious-code</loc><lastmod>2023-02-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach</loc><lastmod>2023-01-21T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/nortonlifelock-warns-that-hackers-breached-password-manager-accounts</loc><lastmod>2023-01-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fin7-cybercrime-syndicate-emerges-as-major-player-in-ransomware-landscape</loc><lastmod>2022-12-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/google-chrome-flaw-added-to-cisa-patch-list</loc><lastmod>2022-12-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/actively-exploited-zero-day-flaw-in-chrome-browser-patch-now</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/fortinet-patches-6-high-severity-vulnerabilities</loc><lastmod>2022-11-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/researchers-detail-critical-rce-flaw-reported-in-popular-vm2-javascript-sandbox</loc><lastmod>2022-10-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/microsoft-issues-improved-mitigations-for-unpatched-exchange-server-vulnerabilities</loc><lastmod>2022-10-08T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/sophos-warns-of-new-firewall-rce-bug-exploited-in-attacks</loc><lastmod>2022-09-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cisa-warns-of-hackers-exploiting-recent-zoho-manageengine-vulnerability</loc><lastmod>2022-09-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/a-massive-hacking-campaign-stole-10000-login-credentials-from-130-different-organizations</loc><lastmod>2023-12-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/vmware-fixed-a-privilege-escalation-issue-in-vmware-tools</loc><lastmod>2022-08-24T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/gitlab-patches-critical-remote-code-execution-vulnerability</loc><lastmod>2022-08-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/palo-alto-networks-new-pan-os-ddos-flaw-exploited-in-attacks</loc><lastmod>2022-08-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/cloud-based-cryptocurrency-mining-attacks-abuse-github-actions-and-azure-vmsecurity-affairs</loc><lastmod>2022-07-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/havanacrypt-ransomware-sails-in-as-a-fake-google-update</loc><lastmod>2022-07-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://cyberconvoy.com/blog/qbot-collects-user-information-and-passwords-in-30-minutes</loc><lastmod>2022-03-02T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url></urlset>