<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
	<url>
			<loc>https://threatintel.cc/archive/</loc>
			<lastmod>2025-10-03T10:06:58-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/contact/</loc>
			<lastmod>2025-10-03T10:20:05-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/privacy/</loc>
			<lastmod>2025-10-03T10:45:04-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/about/</loc>
			<lastmod>2025-10-15T07:44:43-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/04/01/exclusive-cuddly-toy-maker-charlie.html</loc>
			<lastmod>2026-04-01T19:07:19-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/04/01/attackers-hijack-axios-npm-account.html</loc>
			<lastmod>2026-04-01T19:06:34-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/04/01/no-iranian-hackers-didnt-leak.html</loc>
			<lastmod>2026-04-01T19:05:50-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/04/01/mercor-says-it-was-hit.html</loc>
			<lastmod>2026-04-01T19:05:04-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/28/rogers-and-fido-confirm-data.html</loc>
			<lastmod>2026-03-28T23:36:19-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/apt-iran-hackers-steal-over.html</loc>
			<lastmod>2026-03-27T17:49:30-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/github-backbaylabsthruntgod-threat-hunting-command.html</loc>
			<lastmod>2026-03-27T09:30:26-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/converging-interests-analysis-of-threat.html</loc>
			<lastmod>2026-03-27T09:29:20-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/wikipedia-cracks-down-on-contributors.html</loc>
			<lastmod>2026-03-27T08:40:37-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/breach-roundup-tycoonfa-phishing-platform.html</loc>
			<lastmod>2026-03-27T08:40:02-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/27/google-cohere-launch-new-audio.html</loc>
			<lastmod>2026-03-27T08:38:57-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/hackers-threaten-mark-cubanbacked-firm.html</loc>
			<lastmod>2026-03-26T16:45:02-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/ajax-suffers-major-own-goal.html</loc>
			<lastmod>2026-03-26T16:43:08-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/cyber-serp-hack-breaches-ukraine.html</loc>
			<lastmod>2026-03-26T16:42:22-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/million-students-possibly-at-risk.html</loc>
			<lastmod>2026-03-26T16:41:24-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/russian-authorities-arrest-alleged-leakbase.html</loc>
			<lastmod>2026-03-26T16:40:13-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/tplink-canva-hikvision-vulnerabilities-cisco.html</loc>
			<lastmod>2026-03-26T15:26:09-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/cisa-new-langflow-flaw-actively.html</loc>
			<lastmod>2026-03-26T15:24:54-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/why-vector-databases-put-enterprise.html</loc>
			<lastmod>2026-03-26T15:23:21-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/26/chinas-dji-sues-rival-insta.html</loc>
			<lastmod>2026-03-26T15:21:29-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/24/the-air-apparent-apples-custom.html</loc>
			<lastmod>2026-03-24T15:32:15-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/24/iran-hits-amazon-web-services.html</loc>
			<lastmod>2026-03-24T07:57:04-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/24/openai-plans-desktop-superapp-to.html</loc>
			<lastmod>2026-03-24T06:42:15-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/mazda-discloses-security-breach-exposing.html</loc>
			<lastmod>2026-03-23T20:18:06-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/new-canisterworm-targets-kubernetes-clusters.html</loc>
			<lastmod>2026-03-23T20:16:49-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/us-regulator-bans-imports-of.html</loc>
			<lastmod>2026-03-23T20:15:21-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/openai-rolls-out-chatgpt-library.html</loc>
			<lastmod>2026-03-23T20:13:56-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/meta-acquihires-the-cofounders-of.html</loc>
			<lastmod>2026-03-23T20:12:32-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/doe-sets-year-plan-to.html</loc>
			<lastmod>2026-03-23T20:11:09-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/zero-trust-anchors-ai-security.html</loc>
			<lastmod>2026-03-23T20:09:30-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/23/sony-anime-streamer-crunchyroll-was.html</loc>
			<lastmod>2026-03-23T18:47:47-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/21/this-massive-data-breach-leaked.html</loc>
			<lastmod>2026-03-21T16:06:51-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/21/hacker-group-lapsus-claims-alleged.html</loc>
			<lastmod>2026-03-21T16:05:43-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/20/fbi-seizes-handala-data-leak.html</loc>
			<lastmod>2026-03-20T16:12:22-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/19/french-aircraft-carriers-location-exposed.html</loc>
			<lastmod>2026-03-19T22:02:02-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/19/hackers-claim-breach-of-chinas.html</loc>
			<lastmod>2026-03-19T16:40:11-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/19/millions-of-anonymous-crime-tips.html</loc>
			<lastmod>2026-03-19T16:39:34-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/19/no-the-aura-data-breach.html</loc>
			<lastmod>2026-03-19T16:38:51-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/the-proliferation-of-darksword-ios.html</loc>
			<lastmod>2026-03-18T17:14:48-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/cisco-firewall-day-vulnerability-exploited.html</loc>
			<lastmod>2026-03-18T17:13:32-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/russialinked-hackers-use-advanced-iphone.html</loc>
			<lastmod>2026-03-18T17:11:56-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/interlock-ransomware-exploited-cisco-firewall.html</loc>
			<lastmod>2026-03-18T17:10:35-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/chinese-crypto-hacking-groups-explosive.html</loc>
			<lastmod>2026-03-18T17:08:15-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/18/notorious-online-data-leak-market.html</loc>
			<lastmod>2026-03-18T17:06:55-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/17/some-small-us-airports-may.html</loc>
			<lastmod>2026-03-17T19:02:34-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/telus-digital-confirms-breach-after.html</loc>
			<lastmod>2026-03-12T13:24:23-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/apple-issues-emergency-fixes-for.html</loc>
			<lastmod>2026-03-12T13:22:57-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/x-suspends-m-accounts-in.html</loc>
			<lastmod>2026-03-12T13:21:35-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/tektreeinc-breach-claim-surfaces-weeks.html</loc>
			<lastmod>2026-03-12T13:19:34-04:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/us-disrupts-socksescort-proxy-network.html</loc>
			<lastmod>2026-03-12T12:18:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/oauth-device-code-phishing-exploiting.html</loc>
			<lastmod>2026-03-12T12:17:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/payment-giant-verifone-disputes-iranian.html</loc>
			<lastmod>2026-03-12T12:15:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/uk-regulators-demand-social-media.html</loc>
			<lastmod>2026-03-12T12:14:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/veeam-warns-of-critical-flaws.html</loc>
			<lastmod>2026-03-12T12:12:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/inc-ransomware-group-holds-healthcare.html</loc>
			<lastmod>2026-03-12T08:40:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/zoom-users-can-now-create.html</loc>
			<lastmod>2026-03-12T06:51:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/nvidias-nemotron-super-model-for.html</loc>
			<lastmod>2026-03-12T06:50:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/12/grammarly-shuts-down-expert-review.html</loc>
			<lastmod>2026-03-12T06:49:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/cal-ai-new-owner-of.html</loc>
			<lastmod>2026-03-11T17:57:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/irans-internet-blackout-surpasses-days.html</loc>
			<lastmod>2026-03-11T11:49:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/heres-the-memo-approving-gemini.html</loc>
			<lastmod>2026-03-11T11:47:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/iranbacked-hackers-claim-wiper-attack.html</loc>
			<lastmod>2026-03-11T11:45:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/march-patch-tuesday-fixes-two.html</loc>
			<lastmod>2026-03-11T07:00:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/michelin-confirms-data-breach-linked.html</loc>
			<lastmod>2026-03-11T06:58:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/overly-permissive-guest-settings-put.html</loc>
			<lastmod>2026-03-11T06:57:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/11/065552.html</loc>
			<lastmod>2026-03-11T06:55:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/github-elderpliniusclrts-leaked-system-prompts.html</loc>
			<lastmod>2026-03-10T20:23:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/hundreds-of-salesforce-customers-allegedly.html</loc>
			<lastmod>2026-03-10T09:52:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/fake-linkedin-interview-used-by.html</loc>
			<lastmod>2026-03-10T09:50:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/viral-quittr-porn-addiction-app.html</loc>
			<lastmod>2026-03-10T09:49:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/new-leakylooker-flaws-in-google.html</loc>
			<lastmod>2026-03-10T09:47:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/attackers-use-aitm-phishing-kit.html</loc>
			<lastmod>2026-03-10T09:46:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/blacksanta-edr-killer-targets-hr.html</loc>
			<lastmod>2026-03-10T09:45:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/hr-recruiters-targeted-in-yearlong.html</loc>
			<lastmod>2026-03-10T09:43:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/10/study-finds-rome-ai-agent.html</loc>
			<lastmod>2026-03-10T09:41:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/polinrider-dprk-threat-actor-implants.html</loc>
			<lastmod>2026-03-09T21:18:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/grapheneos-microsoft-authenticator-does-not.html</loc>
			<lastmod>2026-03-09T18:38:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/opensource-tool-sage-puts-a.html</loc>
			<lastmod>2026-03-09T14:30:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/cybersecurity-ma-roundup-deals-announced.html</loc>
			<lastmod>2026-03-09T14:29:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/how-we-hacked-mckinseys-ai.html</loc>
			<lastmod>2026-03-09T14:26:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/shinyhunters-claims-ongoing-salesforce-aura.html</loc>
			<lastmod>2026-03-09T14:25:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/fake-cleanmymac-site-uses-clickfix.html</loc>
			<lastmod>2026-03-09T14:22:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/russia-forged-new-cyber-weapons.html</loc>
			<lastmod>2026-03-09T14:21:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/openai-to-acquire-ai-security.html</loc>
			<lastmod>2026-03-09T14:19:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/malicious-npm-package-posing-as.html</loc>
			<lastmod>2026-03-09T14:17:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/09/ericsson-us-discloses-data-breach.html</loc>
			<lastmod>2026-03-09T14:16:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/fbi-investigating-suspicious-cyber-activity.html</loc>
			<lastmod>2026-03-08T12:16:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/chinalinked-hackers-use-malware-trio.html</loc>
			<lastmod>2026-03-08T12:14:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/openai-launches-codex-security-that.html</loc>
			<lastmod>2026-03-08T12:12:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/anthropic-finds-firefox-vulnerabilities-using.html</loc>
			<lastmod>2026-03-08T12:10:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/over-github-repositories-distributing-boryptgrab.html</loc>
			<lastmod>2026-03-08T12:08:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/hackers-spread-fake-red-alert.html</loc>
			<lastmod>2026-03-08T12:07:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/cognizant-trizetto-data-breach-exposes.html</loc>
			<lastmod>2026-03-08T12:06:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/microsoft-hackers-abusing-ai-at.html</loc>
			<lastmod>2026-03-08T12:04:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/termite-ransomware-breaches-linked-to.html</loc>
			<lastmod>2026-03-08T12:02:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/openai-codex-security-scanned-million.html</loc>
			<lastmod>2026-03-08T12:01:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/github-matrixleonsevilwaf-evilwaf-is-a.html</loc>
			<lastmod>2026-03-08T11:59:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/wikipedia-hit-by-selfpropagating-javascript.html</loc>
			<lastmod>2026-03-08T11:55:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/hackers-allegedly-selling-exploit-for.html</loc>
			<lastmod>2026-03-08T11:52:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/recent-cisco-catalyst-sdwan-vulnerability.html</loc>
			<lastmod>2026-03-08T11:51:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/massive-github-malware-operation-spreads.html</loc>
			<lastmod>2026-03-08T11:50:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/08/hackers-abuse-arpa-dns-and.html</loc>
			<lastmod>2026-03-08T11:48:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/07/cyberattacks-surge-amid-middle-east.html</loc>
			<lastmod>2026-03-07T19:15:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/07/lexisnexis-hack-exposes-m-records.html</loc>
			<lastmod>2026-03-07T19:14:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/07/lexisnexis-aws-data-breach-reactshell.html</loc>
			<lastmod>2026-03-07T19:12:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/google-threat-analyst-warns-iran.html</loc>
			<lastmod>2026-03-06T13:28:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/microsoft-warns-of-clickfix-campaign.html</loc>
			<lastmod>2026-03-06T10:37:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/apache-activemq-allow-attackers-to.html</loc>
			<lastmod>2026-03-06T10:35:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/microsoft-working-on-teams-feature.html</loc>
			<lastmod>2026-03-06T10:34:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/iranlinked-apt-targets-us-critical.html</loc>
			<lastmod>2026-03-06T10:32:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/irans-cyberkinetic-war-doctrine-takes.html</loc>
			<lastmod>2026-03-06T10:30:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/github-vellavetovellaveto-runtime-security-engine.html</loc>
			<lastmod>2026-03-06T10:28:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/openant-ai-based-vulnerability-scanner.html</loc>
			<lastmod>2026-03-06T10:26:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/102532.html</loc>
			<lastmod>2026-03-06T10:25:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/multistage-voidgeist-malware-delivering-xworm.html</loc>
			<lastmod>2026-03-06T10:23:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/fake-claude-code-install-guides.html</loc>
			<lastmod>2026-03-06T10:21:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/eccouncil-expands-ai-certification-portfolio.html</loc>
			<lastmod>2026-03-06T10:20:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/06/trizetto-notifying-m-of-hack.html</loc>
			<lastmod>2026-03-06T10:18:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/hackers-mimic-lastpass-support-email.html</loc>
			<lastmod>2026-03-05T08:09:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/cve-critical-telnetd-flaw-grants.html</loc>
			<lastmod>2026-03-05T08:07:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/cisco-secure-firewall-management-vulnerability.html</loc>
			<lastmod>2026-03-05T08:05:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/google-rolls-out-emergency-chrome.html</loc>
			<lastmod>2026-03-05T08:04:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/aws-middle-east-uae-region.html</loc>
			<lastmod>2026-03-05T07:08:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/cisco-flags-more-sdwan-flaws.html</loc>
			<lastmod>2026-03-05T07:06:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/070536.html</loc>
			<lastmod>2026-03-05T07:05:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/leakbase-cybercrime-forum-shut-down.html</loc>
			<lastmod>2026-03-05T07:04:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/supreme-court-to-decide-whether.html</loc>
			<lastmod>2026-03-05T07:03:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/uat-targets-south-american-telecommunication.html</loc>
			<lastmod>2026-03-05T07:01:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/065931.html</loc>
			<lastmod>2026-03-05T06:59:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/dprk-hackers-target-crypto-firms.html</loc>
			<lastmod>2026-03-05T06:58:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/05/law-enforcement-and-security-firms.html</loc>
			<lastmod>2026-03-05T06:56:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/a-possible-us-government-iphonehacking.html</loc>
			<lastmod>2026-03-03T23:01:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/lexisnexis-confirms-data-breach-as.html</loc>
			<lastmod>2026-03-03T22:58:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/ai-cyberattacks-costing-canadian-businesses.html</loc>
			<lastmod>2026-03-03T18:28:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/175414.html</loc>
			<lastmod>2026-03-03T17:54:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/ai-bot-compromises-five-major.html</loc>
			<lastmod>2026-03-03T17:53:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/hacktivists-claim-to-have-hacked.html</loc>
			<lastmod>2026-03-03T17:52:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/israel-used-hacked-tehran-traffic.html</loc>
			<lastmod>2026-03-03T17:51:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/174942.html</loc>
			<lastmod>2026-03-03T17:49:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/iranian-hacking-groups-go-dark.html</loc>
			<lastmod>2026-03-03T17:46:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/03/madison-square-garden-data-breach.html</loc>
			<lastmod>2026-03-03T17:44:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/02/keeping-the-internet-fast-and.html</loc>
			<lastmod>2026-03-02T21:28:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/02/canadian-tire-data-breach-impacts.html</loc>
			<lastmod>2026-03-02T06:41:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/01/ransomware-payment-rate-drops-to.html</loc>
			<lastmod>2026-03-01T21:56:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/03/01/hackers-publish-full-cache-of.html</loc>
			<lastmod>2026-03-01T15:13:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/hacking-group-begins-leaking-customer.html</loc>
			<lastmod>2026-02-28T17:25:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/unsecured-elasticsearch-database-leaks-dungeon.html</loc>
			<lastmod>2026-02-28T17:24:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/pathstone-allegedly-breached-as-attacks.html</loc>
			<lastmod>2026-02-28T17:22:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/manomano-data-breach-massive-diy.html</loc>
			<lastmod>2026-02-28T17:21:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/million-exposed-env-files-reveal.html</loc>
			<lastmod>2026-02-28T17:19:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/firms-linked-to-singapores-critical.html</loc>
			<lastmod>2026-02-28T17:17:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/ukrainian-man-pleads-guilty-to.html</loc>
			<lastmod>2026-02-28T10:51:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/iphone-and-ipad-are-the.html</loc>
			<lastmod>2026-02-28T10:50:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/public-google-api-keys-can.html</loc>
			<lastmod>2026-02-28T10:48:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/28/chilean-carding-shop-operator-extradited.html</loc>
			<lastmod>2026-02-28T10:47:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/twitch-ships-serverside-eppo-keys.html</loc>
			<lastmod>2026-02-27T13:20:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/trojanized-gaming-tools-spread-javabased.html</loc>
			<lastmod>2026-02-27T07:38:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/juniper-networks-ptx-routers-affected.html</loc>
			<lastmod>2026-02-27T07:36:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/the-ghost-in-the-annotations.html</loc>
			<lastmod>2026-02-27T07:35:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/dohdoor-malware-targets-us-schools.html</loc>
			<lastmod>2026-02-27T07:33:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/us-authorities-punish-sellers-of.html</loc>
			<lastmod>2026-02-27T07:32:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/study-finds-of-organizations-exposed.html</loc>
			<lastmod>2026-02-27T07:31:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/github-anticipatoraianticipator-anticipator-is-an.html</loc>
			<lastmod>2026-02-27T07:29:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/your-personal-openclaw-agent-may.html</loc>
			<lastmod>2026-02-27T07:27:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/europol-goes-after-the-coms.html</loc>
			<lastmod>2026-02-27T07:26:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/aeternum-botnet-loader-employs-polygon.html</loc>
			<lastmod>2026-02-27T07:24:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/fake-job-recruiters-hide-malware.html</loc>
			<lastmod>2026-02-27T07:23:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/27/why-tehrans-twotiered-internet-is.html</loc>
			<lastmod>2026-02-27T07:22:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/meta-exec-goes-viral-after.html</loc>
			<lastmod>2026-02-25T21:20:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/largescale-online-deanonymization-with-llms.html</loc>
			<lastmod>2026-02-25T20:30:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/google-disrupts-chineselinked-hackers-that.html</loc>
			<lastmod>2026-02-25T19:14:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/rogers-job-cuts-it-staff.html</loc>
			<lastmod>2026-02-25T19:09:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/microsoft-warns-of-jobthemed-repo.html</loc>
			<lastmod>2026-02-25T07:42:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/owasp-top-from-code-to.html</loc>
			<lastmod>2026-02-25T07:41:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/wynn-resorts-confirms-data-breach.html</loc>
			<lastmod>2026-02-25T07:38:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/richter-scale-model-measures-magnitude.html</loc>
			<lastmod>2026-02-25T07:37:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/if-you-thought-rto-battles.html</loc>
			<lastmod>2026-02-25T07:34:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/cisa-confirms-active-exploitation-of.html</loc>
			<lastmod>2026-02-25T07:32:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/25/hackers-exploit-cortex-xdr-live.html</loc>
			<lastmod>2026-02-25T07:31:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/threat-actor-allegedly-claimed-leak.html</loc>
			<lastmod>2026-02-24T17:35:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/shinyhunters-reveals-m-records-after.html</loc>
			<lastmod>2026-02-24T17:33:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/teenagers-behind-million-ttareungyi-data.html</loc>
			<lastmod>2026-02-24T17:30:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/cargurus-data-breach-claim-alleges.html</loc>
			<lastmod>2026-02-24T07:48:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/k-bounty-offered-to-hacker.html</loc>
			<lastmod>2026-02-24T07:47:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/crowdstrike-global-threat-report-evasive.html</loc>
			<lastmod>2026-02-24T07:45:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/deserialization-flaw-in-ruby-workers.html</loc>
			<lastmod>2026-02-24T07:43:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/fake-zoom-meeting-update-silently.html</loc>
			<lastmod>2026-02-24T07:42:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/github-etiennemunnichcrsagentskill-agent-skill-for.html</loc>
			<lastmod>2026-02-24T07:40:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/chinese-ai-labs-launch-massive.html</loc>
			<lastmod>2026-02-24T07:38:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/crowdstrike-says-ai-is-officially.html</loc>
			<lastmod>2026-02-24T07:34:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/north-korean-state-hackers-seen.html</loc>
			<lastmod>2026-02-24T07:33:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/new-zerodayrat-malware-claims-full.html</loc>
			<lastmod>2026-02-24T07:31:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/anthropic-says-claude-code-can.html</loc>
			<lastmod>2026-02-24T07:31:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/shinyhunters-extortion-gang-claims-odido.html</loc>
			<lastmod>2026-02-24T07:30:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/24/github-issues-abused-in-copilot.html</loc>
			<lastmod>2026-02-24T07:28:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/ad-tech-firm-optimizely-confirms.html</loc>
			<lastmod>2026-02-23T15:14:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/conduent-data-breach-could-be.html</loc>
			<lastmod>2026-02-23T15:12:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/microsoft-mfa-down-gateway-timeout.html</loc>
			<lastmod>2026-02-23T14:19:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/muddywater-targets-mena-organizations-with.html</loc>
			<lastmod>2026-02-23T07:45:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/jspdf-flaw-exposes-millions-of.html</loc>
			<lastmod>2026-02-23T07:44:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/police-seize-stolen-facebook-credentials.html</loc>
			<lastmod>2026-02-23T07:43:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/malicious-npm-packages-harvest-crypto.html</loc>
			<lastmod>2026-02-23T07:41:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/starkiller-phishing-kit-clones-real.html</loc>
			<lastmod>2026-02-23T07:39:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/ransomware-gangs-advancing-moscows-geopolitical.html</loc>
			<lastmod>2026-02-23T07:38:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/cloudflare-outage-explained-what-happened.html</loc>
			<lastmod>2026-02-23T07:37:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/hackers-use-excel-exploit-to.html</loc>
			<lastmod>2026-02-23T07:35:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/new-arkanix-stealer-blends-rapid.html</loc>
			<lastmod>2026-02-23T07:34:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/cve-fuels-ongoing-attacks-on.html</loc>
			<lastmod>2026-02-23T07:32:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/fake-huorong-security-site-infects.html</loc>
			<lastmod>2026-02-23T07:30:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/23/apples-latest-ferret-ai-model.html</loc>
			<lastmod>2026-02-23T06:44:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/22/uae-foils-cyber-attacks-state.html</loc>
			<lastmod>2026-02-22T21:34:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/22/cloudflare-down-hour-of-massive.html</loc>
			<lastmod>2026-02-22T21:31:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/22/shinyhunters-demands-m-not-to.html</loc>
			<lastmod>2026-02-22T13:14:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/22/paypal-data-breach-confirmedmoney-was.html</loc>
			<lastmod>2026-02-22T13:13:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/21/wirx-pharmacy-data-breach-affects.html</loc>
			<lastmod>2026-02-21T23:35:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/21/ndpc-probes-temu-over-alleged.html</loc>
			<lastmod>2026-02-21T21:44:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/aws-ai-coding-tool-decided.html</loc>
			<lastmod>2026-02-20T17:31:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/billion-personal-records-exposed-in.html</loc>
			<lastmod>2026-02-20T11:28:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/hackers-using-oauth-apps-in.html</loc>
			<lastmod>2026-02-20T08:23:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/red-card-interpol-busts-scam.html</loc>
			<lastmod>2026-02-20T08:22:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/poc-released-for-windows-notepad.html</loc>
			<lastmod>2026-02-20T08:21:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/chip-testing-giant-advantest-hit.html</loc>
			<lastmod>2026-02-20T08:20:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/facebook-ads-spread-fake-windows.html</loc>
			<lastmod>2026-02-20T08:19:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/google-cleans-house-bans-developer.html</loc>
			<lastmod>2026-02-20T08:17:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/fbi-million-losses-caused-by.html</loc>
			<lastmod>2026-02-20T08:15:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/poc-released-for-critical-chrome.html</loc>
			<lastmod>2026-02-20T08:14:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/llmgenerated-passwords-expose-major-security.html</loc>
			<lastmod>2026-02-20T08:13:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/mississippi-medical-center-closes-all.html</loc>
			<lastmod>2026-02-20T08:12:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/critical-vulnerabilities-in-vs-code.html</loc>
			<lastmod>2026-02-20T08:11:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/apache-tomcat-vulnerabilities-let-attackers.html</loc>
			<lastmod>2026-02-20T08:10:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/charliekirk-grabber-malware-targets-windows.html</loc>
			<lastmod>2026-02-20T08:08:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/beyondtrust-vulnerability-exploited-in-ransomware.html</loc>
			<lastmod>2026-02-20T08:05:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/critical-jenkins-vulnerability-exposes-build.html</loc>
			<lastmod>2026-02-20T08:04:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/20/openai-ceo-sam-altman-warns.html</loc>
			<lastmod>2026-02-20T06:55:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/french-ministry-confirms-data-access.html</loc>
			<lastmod>2026-02-18T20:05:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/zeroday-vulnerabilities-in-popular-pdf.html</loc>
			<lastmod>2026-02-18T12:08:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/clawhavoc-poisoned-openclaws-clawhub-with.html</loc>
			<lastmod>2026-02-18T12:04:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/predator-spyware-used-to-infect.html</loc>
			<lastmod>2026-02-18T12:02:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/chinalinked-hackers-exploited-dell-zeroday.html</loc>
			<lastmod>2026-02-18T12:01:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/vs-code-extensions-with-m.html</loc>
			<lastmod>2026-02-18T11:59:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/new-sysupdate-variant-malware-discovered.html</loc>
			<lastmod>2026-02-18T11:59:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/turning-moltbook-into-a-global.html</loc>
			<lastmod>2026-02-18T11:57:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/threat-groups-using-ai-to.html</loc>
			<lastmod>2026-02-18T11:56:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/new-keenadu-android-malware-found.html</loc>
			<lastmod>2026-02-18T11:54:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/microsoft-antiphishing-rules-mistakenly-blocked.html</loc>
			<lastmod>2026-02-18T11:53:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/grandstream-gxp-voip-phones-exposed.html</loc>
			<lastmod>2026-02-18T11:52:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/18/data-leak-at-abu-dhabi.html</loc>
			<lastmod>2026-02-18T11:50:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/17/fax-machines-ontarios-top-cause.html</loc>
			<lastmod>2026-02-17T23:00:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/subscribe-to-read-a-kpmg.html</loc>
			<lastmod>2026-02-16T14:17:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/canada-goose-confirms-data-leak.html</loc>
			<lastmod>2026-02-16T12:57:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/speedtest-connectivity-report-canada-h.html</loc>
			<lastmod>2026-02-16T12:07:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/japanese-sex-toys-maker-tenga.html</loc>
			<lastmod>2026-02-16T08:26:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/google-ads-and-claude-ai.html</loc>
			<lastmod>2026-02-16T08:24:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/hackers-exploit-summarize-with-ai.html</loc>
			<lastmod>2026-02-16T08:22:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/chatgpt-gets-new-security-feature.html</loc>
			<lastmod>2026-02-16T08:20:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/new-zerodayrat-mobile-spyware-enables.html</loc>
			<lastmod>2026-02-16T08:19:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/leaky-chrome-extensions-with-m.html</loc>
			<lastmod>2026-02-16T08:16:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/uk-sets-course-for-stricter.html</loc>
			<lastmod>2026-02-16T08:15:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/ai-is-no-longer-about.html</loc>
			<lastmod>2026-02-16T08:14:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/amazon-scraps-partnership-with-surveillance.html</loc>
			<lastmod>2026-02-16T08:13:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/16/password-managers-less-secure-than.html</loc>
			<lastmod>2026-02-16T08:02:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/15/microsoft-ai-chief-gives-it.html</loc>
			<lastmod>2026-02-15T16:41:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/15/figure-technology-data-breach-hackers.html</loc>
			<lastmod>2026-02-15T12:37:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/14/fintech-lending-giant-figure-confirms.html</loc>
			<lastmod>2026-02-14T14:24:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/anthropic-ceo-dario-amodei-just.html</loc>
			<lastmod>2026-02-13T10:28:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/beyondtrust-vulnerability-targeted-by-hackers.html</loc>
			<lastmod>2026-02-13T10:14:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/google-fears-massive-attempt-to.html</loc>
			<lastmod>2026-02-13T10:13:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/cisa-flags-critical-microsoft-sccm.html</loc>
			<lastmod>2026-02-13T10:12:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/fake-north-korean-it-workers.html</loc>
			<lastmod>2026-02-13T10:09:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/phishing-campaigns-target-users-with.html</loc>
			<lastmod>2026-02-13T10:05:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/openclaw-released-with-fix-for.html</loc>
			<lastmod>2026-02-13T10:03:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/how-to-find-and-remove.html</loc>
			<lastmod>2026-02-13T10:02:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/major-vibecoding-platform-orchids-is.html</loc>
			<lastmod>2026-02-13T10:01:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/chrome-extensions-infected-k-users.html</loc>
			<lastmod>2026-02-13T10:00:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/13/bsi-lutet-ende-der-klassischen.html</loc>
			<lastmod>2026-02-13T09:59:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/12/apple-patches-decadeold-ios-zeroday.html</loc>
			<lastmod>2026-02-12T15:23:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/12/qilin-admits-georgia-housing-authority.html</loc>
			<lastmod>2026-02-12T11:38:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/12/odido-cyber-attack-hackers-gained.html</loc>
			<lastmod>2026-02-12T11:37:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/12/russia-iran-accuse-elon-musks.html</loc>
			<lastmod>2026-02-12T08:00:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/ruaptchainreaverl-hijacks-trusted-websites-and.html</loc>
			<lastmod>2026-02-11T18:00:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/georgia-healthcare-company-data-breach.html</loc>
			<lastmod>2026-02-11T17:59:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/volvo-group-hit-in-massive.html</loc>
			<lastmod>2026-02-11T17:58:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/crazy-ransomware-gang-abuses-employee.html</loc>
			<lastmod>2026-02-11T17:57:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/nevada-unveils-new-statewide-data.html</loc>
			<lastmod>2026-02-11T17:56:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/github-bhavsecautopentestai-agentic-pentesting-mcp.html</loc>
			<lastmod>2026-02-11T17:54:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/free-tool-says-it-can.html</loc>
			<lastmod>2026-02-11T17:52:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/singapore-mounts-largestever-coordinated-cyber.html</loc>
			<lastmod>2026-02-11T17:50:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/whatsapp-the-domains-for-the.html</loc>
			<lastmod>2026-02-11T17:47:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/lummastealer-infections-surge-after-castleloader.html</loc>
			<lastmod>2026-02-11T15:19:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/sshstalker-botnet-uses-irc-c.html</loc>
			<lastmod>2026-02-11T08:42:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/gtig-warns-of-rising-espionage.html</loc>
			<lastmod>2026-02-11T08:41:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/we-hid-backdoors-in-binaries.html</loc>
			<lastmod>2026-02-11T08:40:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/signature-phishing-up-as-january.html</loc>
			<lastmod>2026-02-11T08:39:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/north-korean-actors-blend-clickfix.html</loc>
			<lastmod>2026-02-11T08:38:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/this-new-mobile-compromise-toolkit.html</loc>
			<lastmod>2026-02-11T08:37:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/microsoft-releases-critical-windows-cumulative.html</loc>
			<lastmod>2026-02-11T08:36:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/cephalus-ransomware-emerges-as-gobased.html</loc>
			<lastmod>2026-02-11T08:35:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/mshtml-framework-zeroday-opens-door.html</loc>
			<lastmod>2026-02-11T08:34:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/11/sms-otp-bombing-cybles-analysis.html</loc>
			<lastmod>2026-02-11T08:33:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/actively-exploited-zerodays-patched-by.html</loc>
			<lastmod>2026-02-10T15:28:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/074758.html</loc>
			<lastmod>2026-02-10T07:47:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/warlock-gang-breaches-smartertools-via.html</loc>
			<lastmod>2026-02-10T07:46:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/huge-stalkerware-data-breach-sees.html</loc>
			<lastmod>2026-02-10T07:44:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/treasure-valley-health-provider-reports.html</loc>
			<lastmod>2026-02-10T07:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/south-korea-blames-coupang-data.html</loc>
			<lastmod>2026-02-10T07:41:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/st-midamerica-credit-union-data.html</loc>
			<lastmod>2026-02-10T07:39:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/jbs-mental-health-authority-data.html</loc>
			<lastmod>2026-02-10T07:38:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/gain-federal-credit-union-data.html</loc>
			<lastmod>2026-02-10T07:38:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/bumble-and-match-respond-after.html</loc>
			<lastmod>2026-02-10T07:36:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/what-advisors-need-to-tell.html</loc>
			<lastmod>2026-02-10T07:35:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/ai-agents-exposed-to-the.html</loc>
			<lastmod>2026-02-10T06:26:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/eu-tells-meta-rival-chatbots.html</loc>
			<lastmod>2026-02-10T06:25:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/cybersecurity-jobs-available-right-now.html</loc>
			<lastmod>2026-02-10T06:23:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/of-cisos-open-to-career.html</loc>
			<lastmod>2026-02-10T06:22:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/rsac-releases-quantickle-open-source.html</loc>
			<lastmod>2026-02-10T06:20:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/million-users-affected-as-ai.html</loc>
			<lastmod>2026-02-10T06:19:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/openclaw-control-panels-exposed-online.html</loc>
			<lastmod>2026-02-10T06:18:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/how-ai-is-reshaping-attack.html</loc>
			<lastmod>2026-02-10T06:14:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/cisco-targets-highspeed-ai-networking.html</loc>
			<lastmod>2026-02-10T06:13:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/attackers-weaponize-windows-shortcut-files.html</loc>
			<lastmod>2026-02-10T06:12:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/singapore-rootkits-zeroday-used-in.html</loc>
			<lastmod>2026-02-10T06:11:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/dutch-agencies-hit-by-ivanti.html</loc>
			<lastmod>2026-02-10T06:10:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/10/windows-error-reporting-flaw-allows.html</loc>
			<lastmod>2026-02-10T06:09:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/introducing-augustus-open-source-llm.html</loc>
			<lastmod>2026-02-09T17:55:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/hackers-use-signal-qr-codes.html</loc>
			<lastmod>2026-02-09T12:41:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/top-photo-id-apps-leak.html</loc>
			<lastmod>2026-02-09T12:39:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/openai-updates-europe-privacy-policy.html</loc>
			<lastmod>2026-02-09T07:46:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/hackers-abuse-clawhub-skills-to.html</loc>
			<lastmod>2026-02-09T07:44:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/new-tool-blocks-imposter-attacks.html</loc>
			<lastmod>2026-02-09T07:38:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/the-shadow-campaigns-uncovering-global.html</loc>
			<lastmod>2026-02-09T07:36:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/german-agencies-warn-of-signal.html</loc>
			<lastmod>2026-02-09T07:34:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/dknife-targets-network-gateways-in.html</loc>
			<lastmod>2026-02-09T07:31:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/smartertools-hit-by-ransomware-via.html</loc>
			<lastmod>2026-02-09T07:26:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/anthropic-labs-chief-mike-krieger.html</loc>
			<lastmod>2026-02-09T07:25:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/hackers-exploit-legitimate-apple-and.html</loc>
			<lastmod>2026-02-09T07:22:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/09/microsoft-exchange-online-flags-customers.html</loc>
			<lastmod>2026-02-09T07:21:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/07/malware-hidden-in-pirated-games.html</loc>
			<lastmod>2026-02-07T20:21:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/07/introducing-kingfisher-realtime-secret-detection.html</loc>
			<lastmod>2026-02-07T20:19:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/07/bithumb-mistakenly-sends-bitcoin-b.html</loc>
			<lastmod>2026-02-07T20:18:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/07/state-actor-targets-countries-in.html</loc>
			<lastmod>2026-02-07T20:16:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/07/conduent-data-breach-might-have.html</loc>
			<lastmod>2026-02-07T11:25:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/how-much-do-cybersecurity-analysts.html</loc>
			<lastmod>2026-02-06T19:27:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/ai-agents-most-downloaded-skill.html</loc>
			<lastmod>2026-02-06T19:26:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/we-had-sex-in-a.html</loc>
			<lastmod>2026-02-06T14:42:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/illinois-man-pleads-guilty-to.html</loc>
			<lastmod>2026-02-06T11:50:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/claude-ai-finds-highseverity-software.html</loc>
			<lastmod>2026-02-06T11:49:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/eu-threatens-tiktok-with-massive.html</loc>
			<lastmod>2026-02-06T11:48:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/french-lawmakers-personal-data-leak.html</loc>
			<lastmod>2026-02-06T11:43:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/spains-ministry-of-science-shuts.html</loc>
			<lastmod>2026-02-06T11:42:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/south-korean-ecommerce-giant-coupang.html</loc>
			<lastmod>2026-02-06T11:41:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/nearly-million-web-servers-found.html</loc>
			<lastmod>2026-02-06T11:41:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/substack-data-breach-leaks-users.html</loc>
			<lastmod>2026-02-06T11:40:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/google-microsoft-pay-creators-and.html</loc>
			<lastmod>2026-02-06T10:52:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/technical-analysis-of-marco-stealer.html</loc>
			<lastmod>2026-02-06T07:38:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/stan-ghouls-attacks-in-russia.html</loc>
			<lastmod>2026-02-06T07:37:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/knife-cutting-the-edge-disclosing.html</loc>
			<lastmod>2026-02-06T07:35:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/06/saas-abuse-at-scale-phonebased.html</loc>
			<lastmod>2026-02-06T07:32:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/openai-just-launched-gptcodex-a.html</loc>
			<lastmod>2026-02-05T17:03:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/silent-push-identifies-more-than.html</loc>
			<lastmod>2026-02-05T17:01:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/malicious-nginx-configurations-enable-largescale.html</loc>
			<lastmod>2026-02-05T16:59:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/163246.html</loc>
			<lastmod>2026-02-05T16:32:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/aws-intruder-pulled-off-aiassisted.html</loc>
			<lastmod>2026-02-05T16:32:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/hackers-publish-personal-information-stolen.html</loc>
			<lastmod>2026-02-05T11:18:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/05/cybercrime-group-claims-responsibility-for.html</loc>
			<lastmod>2026-02-05T11:17:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/04/critical-nn-flaws-disclosed-along.html</loc>
			<lastmod>2026-02-04T17:01:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/from-credentials-to-cloud-admin.html</loc>
			<lastmod>2026-02-03T12:50:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/foxit-pdf-editor-vulnerabilities-let.html</loc>
			<lastmod>2026-02-03T12:48:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/hackers-exploiting-react-natives-metro.html</loc>
			<lastmod>2026-02-03T12:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/docker-fixes-critical-ask-gordon.html</loc>
			<lastmod>2026-02-03T12:45:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/uk-investigating-first-suspected-breach.html</loc>
			<lastmod>2026-02-03T12:44:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/iron-mountain-data-breach-mostly.html</loc>
			<lastmod>2026-02-03T12:43:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/03/an-ai-plush-toy-exposed.html</loc>
			<lastmod>2026-02-03T12:42:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/russian-hacker-alliance-targeting-denmark.html</loc>
			<lastmod>2026-02-02T21:45:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/dynowiper-datawiping-malware-attacking-energy.html</loc>
			<lastmod>2026-02-02T21:43:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/researchers-find-malicious-clawhub-skills.html</loc>
			<lastmod>2026-02-02T21:42:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/mozilla-announces-switch-to-disable.html</loc>
			<lastmod>2026-02-02T21:41:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/exgoogle-engineer-convicted-of-stealing.html</loc>
			<lastmod>2026-02-02T21:39:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/phishing-scam-uses-clean-emails.html</loc>
			<lastmod>2026-02-02T21:38:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/github-rootupclaudepoc-claude-code-remote.html</loc>
			<lastmod>2026-02-02T21:36:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/panera-bread-breach-affected-million.html</loc>
			<lastmod>2026-02-02T21:35:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/russian-hackers-exploit-recently-patched.html</loc>
			<lastmod>2026-02-02T21:34:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/02/spain-ministry-data-breach-actor.html</loc>
			<lastmod>2026-02-02T12:24:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/match-hinge-okcupid-and-panera.html</loc>
			<lastmod>2026-02-01T18:03:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/new-apple-privacy-feature-limits.html</loc>
			<lastmod>2026-02-01T18:01:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/critical-johnson-controls-products-vulnerabilities.html</loc>
			<lastmod>2026-02-01T18:00:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/exposed-mongodb-instances-still-targeted.html</loc>
			<lastmod>2026-02-01T17:59:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/depthfirst-click-rce-to-steal.html</loc>
			<lastmod>2026-02-01T17:58:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/comcast-agrees-to-million-settlement.html</loc>
			<lastmod>2026-02-01T11:43:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/bd-journos-personal-data-leaked.html</loc>
			<lastmod>2026-02-01T11:42:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/nobel-hacking-likely-leaked-peace.html</loc>
			<lastmod>2026-02-01T11:40:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/02/01/stopice-hacked-names-and-locations.html</loc>
			<lastmod>2026-02-01T11:38:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/31/mandiant-details-how-shinyhunters-abuse.html</loc>
			<lastmod>2026-01-31T11:04:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/31/kerberos-authentication-relay-via-dns.html</loc>
			<lastmod>2026-01-31T11:04:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/31/k-exposed-ollama-hosts-allow.html</loc>
			<lastmod>2026-01-31T11:01:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/31/ghostchat-spyware-targets-android-users.html</loc>
			<lastmod>2026-01-31T11:00:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/31/chinalinked-uat-targets-iis-servers.html</loc>
			<lastmod>2026-01-31T11:00:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/google-agrees-to-million-settlement.html</loc>
			<lastmod>2026-01-30T21:14:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/ai-agents-are-rewriting-compliance.html</loc>
			<lastmod>2026-01-30T07:41:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/nvidia-releases-security-updates-for.html</loc>
			<lastmod>2026-01-30T07:39:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/ivanti-provides-temporary-patches-for.html</loc>
			<lastmod>2026-01-30T07:38:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/wireshark-released-to-address-critical.html</loc>
			<lastmod>2026-01-30T07:37:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/turning-threat-reports-into-detection.html</loc>
			<lastmod>2026-01-30T07:34:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/latvia-says-russia-remains-its.html</loc>
			<lastmod>2026-01-30T07:33:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/cant-stop-wont-stop-ta.html</loc>
			<lastmod>2026-01-30T07:32:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/understanding-the-russian-cyber-threat.html</loc>
			<lastmod>2026-01-30T07:30:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/supply-chain-attack-on-escan.html</loc>
			<lastmod>2026-01-30T07:29:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/aisuru-botnet-sets-new-record.html</loc>
			<lastmod>2026-01-30T07:28:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/clawdbots-rename-to-moltbot-sparks.html</loc>
			<lastmod>2026-01-30T07:27:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/interlock-ransomware-new-techniques-same.html</loc>
			<lastmod>2026-01-30T07:26:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/dissecting-uat-new-persistence-mechanisms.html</loc>
			<lastmod>2026-01-30T07:24:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/no-place-like-home-network.html</loc>
			<lastmod>2026-01-30T07:23:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/30/ivanti-warns-of-two-epmm.html</loc>
			<lastmod>2026-01-30T07:22:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/operation-bizarre-bazaar-first-attributed.html</loc>
			<lastmod>2026-01-29T10:39:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/attacks-cascade-from-it-ot.html</loc>
			<lastmod>2026-01-29T10:38:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/solarwinds-warns-of-critical-web.html</loc>
			<lastmod>2026-01-29T10:37:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/malicious-pypi-packages-spellcheckpy-and.html</loc>
			<lastmod>2026-01-29T10:37:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/unveiling-the-weaponized-web-shell.html</loc>
			<lastmod>2026-01-29T10:36:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/29/fbi-seizes-ramp-cybercrime-forum.html</loc>
			<lastmod>2026-01-29T10:35:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/ais-safety-features-can-be.html</loc>
			<lastmod>2026-01-28T18:39:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/openai-wants-to-use-biometrics.html</loc>
			<lastmod>2026-01-28T18:37:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/a-rash-of-scam-spam.html</loc>
			<lastmod>2026-01-28T09:39:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/cyberattack-on-polands-power-grid.html</loc>
			<lastmod>2026-01-28T09:38:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/two-highseverity-nn-flaws-allow.html</loc>
			<lastmod>2026-01-28T09:37:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/critical-vm-nodejs-flaw-allows.html</loc>
			<lastmod>2026-01-28T09:36:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/hackers-hijack-exposed-llm-endpoints.html</loc>
			<lastmod>2026-01-28T09:35:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/why-microsoft-routed-examplecom-traffic.html</loc>
			<lastmod>2026-01-28T09:31:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/from-cipher-to-fear-the.html</loc>
			<lastmod>2026-01-28T09:30:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/russian-security-systems-firm-delta.html</loc>
			<lastmod>2026-01-28T09:29:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/honeymyte-updates-coolclient-and-deploys.html</loc>
			<lastmod>2026-01-28T09:28:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/diverse-threat-actors-exploiting-critical.html</loc>
			<lastmod>2026-01-28T09:27:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/have-i-been-pwned-soundcloud.html</loc>
			<lastmod>2026-01-28T09:26:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/microsoft-office-zeroday-cve-emergency.html</loc>
			<lastmod>2026-01-28T09:24:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/over-smartermail-servers-exposed-to.html</loc>
			<lastmod>2026-01-28T09:23:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/28/starbucks-removes-ayear-cap-for.html</loc>
			<lastmod>2026-01-28T08:42:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/27/cloudflare-misconfiguration-behind-recent-bgp.html</loc>
			<lastmod>2026-01-27T07:56:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/27/who-operates-the-badbox-botnet.html</loc>
			<lastmod>2026-01-27T07:55:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/27/apt-attacks-target-indian-government.html</loc>
			<lastmod>2026-01-27T07:54:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/27/peckbirdy-a-versatile-script-framework.html</loc>
			<lastmod>2026-01-27T07:52:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/vulncheck-state-of-exploitation.html</loc>
			<lastmod>2026-01-26T08:01:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/europes-gcve-raises-concerns-over.html</loc>
			<lastmod>2026-01-26T08:00:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/microsoft-releases-emergency-oob-update.html</loc>
			<lastmod>2026-01-26T07:57:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/eset-research-sandworm-behind-cyberattack.html</loc>
			<lastmod>2026-01-26T07:22:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/ransomwarelive-victim-kpmg-the-nova.html</loc>
			<lastmod>2026-01-26T07:20:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/new-dprk-interview-campaign-leverages.html</loc>
			<lastmod>2026-01-26T07:19:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/thousands-of-microsoft-teams-users.html</loc>
			<lastmod>2026-01-26T07:15:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/handsfree-lockpicking-critical-vulnerabilities-in.html</loc>
			<lastmod>2026-01-26T07:15:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/mitre-releases-new-cybersecurity-framework.html</loc>
			<lastmod>2026-01-26T07:13:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/lazarus-hackers-actively-attacking-european.html</loc>
			<lastmod>2026-01-26T07:12:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/stanley-malware-toolkit-enables-phishing.html</loc>
			<lastmod>2026-01-26T07:11:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/cisa-says-critical-vmware-rce.html</loc>
			<lastmod>2026-01-26T07:10:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/26/ireland-proposes-giving-police-new.html</loc>
			<lastmod>2026-01-26T07:08:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/24/toronto-tech-companies-are-hiring.html</loc>
			<lastmod>2026-01-24T14:02:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/microsoft-outage-now-resolved-latest.html</loc>
			<lastmod>2026-01-23T12:19:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/shinyhunters-leak-alleged-data-of.html</loc>
			<lastmod>2026-01-23T11:41:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/m-credentials-leaked-in-massive.html</loc>
			<lastmod>2026-01-23T11:34:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/nike-probes-potential-breach-after.html</loc>
			<lastmod>2026-01-23T11:21:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/081728.html</loc>
			<lastmod>2026-01-23T08:17:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/smb-cybersecurity-checklist.html</loc>
			<lastmod>2026-01-23T08:16:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/cybersecurity-stocks-drawing-investor-attention.html</loc>
			<lastmod>2026-01-23T08:13:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/under-armour-investigates-potential-customer.html</loc>
			<lastmod>2026-01-23T08:12:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/nist-begins-overhaul-of-sp.html</loc>
			<lastmod>2026-01-23T08:09:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/asrock-rack-breach-exposes-server.html</loc>
			<lastmod>2026-01-23T08:08:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/dualstage-phishing-attack-installs-logmein.html</loc>
			<lastmod>2026-01-23T08:07:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/financial-sector-failing-to-implement.html</loc>
			<lastmod>2026-01-23T08:04:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/european-space-agency-cybersecurity.html</loc>
			<lastmod>2026-01-23T08:02:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/arctic-wolf-observes-malicious-configuration.html</loc>
			<lastmod>2026-01-23T08:00:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/android-malware-uses-ai.html</loc>
			<lastmod>2026-01-23T07:58:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/23/finns-exposed-a-north-korean.html</loc>
			<lastmod>2026-01-23T07:57:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/new-osiris-ransomware-emerges-as.html</loc>
			<lastmod>2026-01-22T14:49:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/resilience-debt-is-emerging-as.html</loc>
			<lastmod>2026-01-22T08:13:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/major-firms-leave-critical-cyber.html</loc>
			<lastmod>2026-01-22T08:12:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/new-research-exposes-critical-thirdparty.html</loc>
			<lastmod>2026-01-22T08:09:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/oracle-january-cpu-includes-critical.html</loc>
			<lastmod>2026-01-22T08:07:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/kynd-study-finds-most-large.html</loc>
			<lastmod>2026-01-22T08:06:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/the-internets-oldest-trust-mechanism.html</loc>
			<lastmod>2026-01-22T08:02:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/ransomhub-claims-breach-of-apple.html</loc>
			<lastmod>2026-01-22T07:59:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/clearfake-malware-uses-proxy-execution.html</loc>
			<lastmod>2026-01-22T07:57:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/malware-campaign-disables-defender.html</loc>
			<lastmod>2026-01-22T07:55:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/one-in-uk-firms-unlikely.html</loc>
			<lastmod>2026-01-22T07:54:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/do-not-click-the-lastpass.html</loc>
			<lastmod>2026-01-22T07:51:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/germany-and-israel-pledge-cybersecurity.html</loc>
			<lastmod>2026-01-22T07:49:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/tesla-compromised-as-zeroday-vulnerabilities.html</loc>
			<lastmod>2026-01-22T07:48:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/acf-plugin-vulnerability-allows-attackers.html</loc>
			<lastmod>2026-01-22T07:47:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/voidlink-cloud-malware-shows-clear.html</loc>
			<lastmod>2026-01-22T07:46:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/22/a-familiar-logo-on-your.html</loc>
			<lastmod>2026-01-22T07:45:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/cve-dlink-dview-api-endpoint.html</loc>
			<lastmod>2026-01-21T15:48:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/bugbountymd-we-stop-the-bugbounty.html</loc>
			<lastmod>2026-01-21T15:44:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/carlsberg-event-wristband-leaked-pii.html</loc>
			<lastmod>2026-01-21T11:28:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/ny-union-breach-k-members.html</loc>
			<lastmod>2026-01-21T11:26:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/nightspire-ransomware-gang-alleges-hyatt.html</loc>
			<lastmod>2026-01-21T11:25:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/everest-ransomware-claims-mcdonalds-india.html</loc>
			<lastmod>2026-01-21T11:24:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/top-online-mentor-site-ustrive.html</loc>
			<lastmod>2026-01-21T11:23:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/boston-institute-of-analytics-identifies.html</loc>
			<lastmod>2026-01-21T08:15:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/081416.html</loc>
			<lastmod>2026-01-21T08:14:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/identitybased-attacks-remain-the-top.html</loc>
			<lastmod>2026-01-21T08:11:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/voidlink-cloud-malware-appears-aigenerated.html</loc>
			<lastmod>2026-01-21T08:10:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/080939.html</loc>
			<lastmod>2026-01-21T08:09:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/eu-proposes-cybersecurity-overhaul-to.html</loc>
			<lastmod>2026-01-21T07:56:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/crooks-can-now-rent-ai.html</loc>
			<lastmod>2026-01-21T07:54:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/overtheair-software-updates-pose-risks.html</loc>
			<lastmod>2026-01-21T07:52:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/pdfsider-windows-malware-deployed-on.html</loc>
			<lastmod>2026-01-21T07:51:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/disturbance-on-the-estlink-connections.html</loc>
			<lastmod>2026-01-21T07:50:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/21/million-this-crime-caused-serious.html</loc>
			<lastmod>2026-01-21T07:49:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/microsoft-begins-blocking-work-email.html</loc>
			<lastmod>2026-01-20T17:58:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/uk-launches-landmark-report-fraud.html</loc>
			<lastmod>2026-01-20T08:42:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/ransomhouse-claims-data-breach-at.html</loc>
			<lastmod>2026-01-20T08:41:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/hackathon-projects-show-ai-wellness.html</loc>
			<lastmod>2026-01-20T08:40:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/weaponized-invite-enabled-calendar-data.html</loc>
			<lastmod>2026-01-20T07:44:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/russia-sought-to-induce-blackout.html</loc>
			<lastmod>2026-01-20T07:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/uk-government-warns-of-ongoing.html</loc>
			<lastmod>2026-01-20T07:41:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/20/crashfix-attack-hijacks-browser-failures.html</loc>
			<lastmod>2026-01-20T07:38:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/hacker-pleads-guilty-to-hacking.html</loc>
			<lastmod>2026-01-19T08:24:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/british-army-to-spend-million.html</loc>
			<lastmod>2026-01-19T08:23:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/impacted-by-ingram-micro-ransomware.html</loc>
			<lastmod>2026-01-19T08:22:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/mastang-panda-uses-venezuela-news.html</loc>
			<lastmod>2026-01-19T08:21:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/law-enforcement-tracks-ransomware-group.html</loc>
			<lastmod>2026-01-19T08:20:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/hackers-exploiting-pdf-app-to.html</loc>
			<lastmod>2026-01-19T08:19:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/new-reports-reinforce-cyberattacks-role.html</loc>
			<lastmod>2026-01-19T08:18:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/firefox-joins-chrome-and-edge.html</loc>
			<lastmod>2026-01-19T08:17:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/19/malicious-ghostposter-browser-extensions-found.html</loc>
			<lastmod>2026-01-19T07:42:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/18/ciro-confirms-data-breach-exposed.html</loc>
			<lastmod>2026-01-18T18:11:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/18/microsoft-releases-oob-windows-updates.html</loc>
			<lastmod>2026-01-18T18:10:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/18/mandiant-releases-rainbow-table-that.html</loc>
			<lastmod>2026-01-18T18:09:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/18/hacktivists-hijacked-iran-s-state.html</loc>
			<lastmod>2026-01-18T18:07:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/18/germany-seeks-more-hacking-and.html</loc>
			<lastmod>2026-01-18T18:06:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/broadcom-chip-software-flaw-affecting.html</loc>
			<lastmod>2026-01-17T15:49:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/chinalinked-hackers-exploited-sitecore-zeroday.html</loc>
			<lastmod>2026-01-17T11:50:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/amd-sevsnp-cvms-on-zen.html</loc>
			<lastmod>2026-01-17T11:49:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/metasploit-wrapup-this-weeks-metasploit.html</loc>
			<lastmod>2026-01-17T11:47:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/jordanian-initial-access-broker-pleads.html</loc>
			<lastmod>2026-01-17T11:46:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/gootloader-now-uses-part-zip.html</loc>
			<lastmod>2026-01-17T11:26:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/european-states-spin-wheels-on.html</loc>
			<lastmod>2026-01-17T11:24:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/stealc-hackers-hacked-as-researchers.html</loc>
			<lastmod>2026-01-17T11:23:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/isp-sinkholes-kimwolf-servers-amid.html</loc>
			<lastmod>2026-01-17T11:19:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/epic-lawsuit-targets-alleged-sham.html</loc>
			<lastmod>2026-01-17T11:18:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/anatomy-of-an-attack-the.html</loc>
			<lastmod>2026-01-17T11:16:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/blazelightdev-the-author-describes-using.html</loc>
			<lastmod>2026-01-17T11:15:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/17/chinalinked-apt-uat-targets-north.html</loc>
			<lastmod>2026-01-17T11:13:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/introducing-chatgpt-go-now-available.html</loc>
			<lastmod>2026-01-16T19:35:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/black-basta-boss-makes-it.html</loc>
			<lastmod>2026-01-16T17:43:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/grubhub-says-hackers-stole-company.html</loc>
			<lastmod>2026-01-16T11:28:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/new-china-linked-voidlink-linux.html</loc>
			<lastmod>2026-01-16T11:27:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/supreme-court-hacked-proving-its.html</loc>
			<lastmod>2026-01-16T11:27:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/website-that-leaked-thousands-of.html</loc>
			<lastmod>2026-01-16T11:26:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/over-m-estimated-to-be.html</loc>
			<lastmod>2026-01-16T11:25:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/massive-breach-leaks-million-french.html</loc>
			<lastmod>2026-01-16T11:24:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/closing-the-door-on-netntlmv.html</loc>
			<lastmod>2026-01-16T08:24:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/a-simple-codebuild-flaw-put.html</loc>
			<lastmod>2026-01-16T08:23:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/active-exploitation-underway-for-critical.html</loc>
			<lastmod>2026-01-16T08:22:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/uat-targets-critical-infrastructure-sectors.html</loc>
			<lastmod>2026-01-16T08:21:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/new-remcos-campaign.html</loc>
			<lastmod>2026-01-16T08:20:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/chatgpt-is-now-more-reliable.html</loc>
			<lastmod>2026-01-16T07:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/palo-alto-networks-patches-firewalls.html</loc>
			<lastmod>2026-01-16T07:42:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/new-intelligence-is-moving-faster.html</loc>
			<lastmod>2026-01-16T07:38:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/chinalinked-apt-exploits-sitecore-zeroday.html</loc>
			<lastmod>2026-01-16T07:37:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/ransomware-attacks-and-supply-chain.html</loc>
			<lastmod>2026-01-16T07:36:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/dutch-police-sell-fake-tickets.html</loc>
			<lastmod>2026-01-16T07:35:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/chinalinked-apt-uat-abused-now.html</loc>
			<lastmod>2026-01-16T07:34:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/lotuslite-backdoor-targets-us-policy.html</loc>
			<lastmod>2026-01-16T07:33:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/breach-roundup-software-update-caused.html</loc>
			<lastmod>2026-01-16T07:32:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/whisperpair-attack-leaves-millions-of.html</loc>
			<lastmod>2026-01-16T07:31:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/16/microsoft-windows-update-causes-outlook.html</loc>
			<lastmod>2026-01-16T07:29:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/translategemma-a-new-family-of.html</loc>
			<lastmod>2026-01-15T17:48:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/aipowered-sextortion-a-new-threat.html</loc>
			<lastmod>2026-01-15T11:52:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/cve-tenantwide-rce-via-azure.html</loc>
			<lastmod>2026-01-15T11:50:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/microsoft-explains-why-windows-h.html</loc>
			<lastmod>2026-01-15T08:21:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/amazon-launches-its-sovereign-cloud.html</loc>
			<lastmod>2026-01-15T08:11:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/microsoft-says-this-free-app.html</loc>
			<lastmod>2026-01-15T08:05:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/uk-data-centre-planning-hits.html</loc>
			<lastmod>2026-01-15T08:04:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/072908.html</loc>
			<lastmod>2026-01-15T07:29:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/exploit-code-public-for-critical.html</loc>
			<lastmod>2026-01-15T07:27:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/france-fines-telcos-million.html</loc>
			<lastmod>2026-01-15T07:26:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/reprompt-the-singleclick-microsoft-copilot.html</loc>
			<lastmod>2026-01-15T07:24:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/inside-redvds-how-a-single.html</loc>
			<lastmod>2026-01-15T07:23:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/beijing-tells-chinese-firms-to.html</loc>
			<lastmod>2026-01-15T07:22:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/more-than-countries-impacted-by.html</loc>
			<lastmod>2026-01-15T07:20:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/15/eurail-passengers-taken-for-a.html</loc>
			<lastmod>2026-01-15T07:19:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/output-from-vibe-coding-tools.html</loc>
			<lastmod>2026-01-14T15:33:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/deadlock-ransomware-group-utilizes-polygon.html</loc>
			<lastmod>2026-01-14T15:32:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/flaw-in-ai-libraries-exposes.html</loc>
			<lastmod>2026-01-14T15:31:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/leann-shrinking-vector-search-by.html</loc>
			<lastmod>2026-01-14T15:12:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/cyber-threat-intelligence-briefing-jan.html</loc>
			<lastmod>2026-01-14T10:17:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/convincing-linkedin-commentreply-tactic-used.html</loc>
			<lastmod>2026-01-14T07:47:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/staples-caught-reselling-laptops-without.html</loc>
			<lastmod>2026-01-14T07:43:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/fbi-warns-of-north-korean.html</loc>
			<lastmod>2026-01-14T07:36:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/roboadvisor-betterment-discloses-data-breach.html</loc>
			<lastmod>2026-01-14T07:31:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/new-research-of-rdparty-applications.html</loc>
			<lastmod>2026-01-14T07:29:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/how-real-software-downloads-can.html</loc>
			<lastmod>2026-01-14T07:29:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/victorian-department-of-education-says.html</loc>
			<lastmod>2026-01-14T07:27:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/cloud-marketplace-pax-accidentally-exposes.html</loc>
			<lastmod>2026-01-14T07:26:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/14/online-shoppers-at-risk-as.html</loc>
			<lastmod>2026-01-14T07:25:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/direct-and-reverse-nfc-relay.html</loc>
			<lastmod>2026-01-13T15:31:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/belgian-hospital-az-monica-shuts.html</loc>
			<lastmod>2026-01-13T15:30:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/analyzing-a-multistage-asyncrat-campaign.html</loc>
			<lastmod>2026-01-13T09:19:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/sweden-detains-exmilitary-it-consultant.html</loc>
			<lastmod>2026-01-13T09:18:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/hungary-grants-asylum-to-former.html</loc>
			<lastmod>2026-01-13T09:17:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/executives-worry-most-about-cyberenabled.html</loc>
			<lastmod>2026-01-13T07:38:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/us-prepares-for-cyber-war.html</loc>
			<lastmod>2026-01-13T07:36:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/password-focuses-on-identity-security.html</loc>
			<lastmod>2026-01-13T07:34:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/cybersecurity-jobs-available-right-now.html</loc>
			<lastmod>2026-01-13T07:33:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/rakuten-viber-cisocto-on-balancing.html</loc>
			<lastmod>2026-01-13T07:31:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/devixor-an-evolving-android-banking.html</loc>
			<lastmod>2026-01-13T07:30:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/new-malware-campaign-delivers-remcos.html</loc>
			<lastmod>2026-01-13T07:28:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/spanish-energy-company-endesa-hacked.html</loc>
			<lastmod>2026-01-13T07:27:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/remote-code-execution-with-modern.html</loc>
			<lastmod>2026-01-13T07:26:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/xdr-ebpf-cadr-by-andrew.html</loc>
			<lastmod>2026-01-13T07:26:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/for-application-security-sca-sast.html</loc>
			<lastmod>2026-01-13T07:24:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/13/saps-january-security-updates-patch.html</loc>
			<lastmod>2026-01-13T07:21:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/12/artificial-brains-could-point-the.html</loc>
			<lastmod>2026-01-12T07:47:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/12/brussels-plots-open-source-push.html</loc>
			<lastmod>2026-01-12T07:46:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/12/instagram-denies-breach.html</loc>
			<lastmod>2026-01-12T07:45:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/why-attackers-are-phishing-on.html</loc>
			<lastmod>2026-01-11T19:28:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/ireland-recalls-almost-passports.html</loc>
			<lastmod>2026-01-11T19:27:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/reborn-in-rust-muddy-water.html</loc>
			<lastmod>2026-01-11T19:26:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/spain-arrests-suspects-linked-to.html</loc>
			<lastmod>2026-01-11T10:50:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/north-korealinked-apt-kimsuky-behind.html</loc>
			<lastmod>2026-01-11T10:49:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/11/breachforums-hacking-forum-database-leaked.html</loc>
			<lastmod>2026-01-11T10:47:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/largest-outages-of-a-downdetector.html</loc>
			<lastmod>2026-01-10T18:33:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/microsoft-may-soon-allow-it.html</loc>
			<lastmod>2026-01-10T17:59:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/illicit-crypto-economy-surges-as.html</loc>
			<lastmod>2026-01-10T17:58:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/fbi-warns-north-korean-hackers.html</loc>
			<lastmod>2026-01-10T17:57:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/hackers-target-misconfigured-proxies.html</loc>
			<lastmod>2026-01-10T17:56:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/organizations-recruiting-teenagers-to-do.html</loc>
			<lastmod>2026-01-10T17:55:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/first-federal-data-breach-claims.html</loc>
			<lastmod>2026-01-10T13:44:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/10/iranian-hack-turns-leaked-israeli.html</loc>
			<lastmod>2026-01-10T13:44:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/tailwind-lays-off-employees-as.html</loc>
			<lastmod>2026-01-09T12:12:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/inside-gobruteforcer-aigenerated-server-defaults.html</loc>
			<lastmod>2026-01-09T08:04:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/080250.html</loc>
			<lastmod>2026-01-09T08:02:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/phishing-campaign-abuses-google-cloud.html</loc>
			<lastmod>2026-01-09T08:01:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/vmware-esxi-zerodays-likely-exploited.html</loc>
			<lastmod>2026-01-09T08:00:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/china-hacked-email-systems-of.html</loc>
			<lastmod>2026-01-09T07:59:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/chatgpts-memory-feature-supercharges-prompt.html</loc>
			<lastmod>2026-01-09T07:58:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/09/cyber-retaliation-risks-rise-after.html</loc>
			<lastmod>2026-01-09T07:54:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/last-years-sk-telecom-usim.html</loc>
			<lastmod>2026-01-08T11:33:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/researchers-uncover-nodecordrat-hidden-in.html</loc>
			<lastmod>2026-01-08T08:32:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/fake-winrar-downloads-hide-malware.html</loc>
			<lastmod>2026-01-08T08:31:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/uat-targets-high-value-telecommunications.html</loc>
			<lastmod>2026-01-08T08:30:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/securing-vibe-coding-tools-scaling.html</loc>
			<lastmod>2026-01-08T08:29:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/critical-jspdf-vulnerability-enables-arbitrary.html</loc>
			<lastmod>2026-01-08T08:27:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/poc-released-for-unauthenticated-rce.html</loc>
			<lastmod>2026-01-08T08:26:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/microsoft-to-enforce-mfa-for.html</loc>
			<lastmod>2026-01-08T08:23:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/cisco-warns-of-identity-service.html</loc>
			<lastmod>2026-01-08T08:22:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/researchers-expose-whill-wheelchair-safety.html</loc>
			<lastmod>2026-01-08T08:21:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/microsoft-exchange-online-outage-blocks.html</loc>
			<lastmod>2026-01-08T08:20:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/threatsday-bulletin-rustfs-flaw-iranian.html</loc>
			<lastmod>2026-01-08T08:19:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/australia-nz-initial-access-threat.html</loc>
			<lastmod>2026-01-08T08:18:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/dell-admits-consumers-do-not.html</loc>
			<lastmod>2026-01-08T07:41:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/074009.html</loc>
			<lastmod>2026-01-08T07:40:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/poison-pill-defence-protects-proprietary.html</loc>
			<lastmod>2026-01-08T07:38:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/ibms-ai-agent-bob-easily.html</loc>
			<lastmod>2026-01-08T07:37:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/alleged-cyber-scam-kingpin-arrested.html</loc>
			<lastmod>2026-01-08T07:35:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/08/esa-calls-police.html</loc>
			<lastmod>2026-01-08T07:34:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/inside-the-telegram-channel-jailbreaking.html</loc>
			<lastmod>2026-01-07T12:52:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/who-are-the-hackers-behind.html</loc>
			<lastmod>2026-01-07T11:32:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/hacking-incidents-at-sites-including.html</loc>
			<lastmod>2026-01-07T11:31:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/canadian-fugitive-arrested-in-spain.html</loc>
			<lastmod>2026-01-07T11:28:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/nn-warns-of-cvss-rce.html</loc>
			<lastmod>2026-01-07T09:27:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/microsoft-warns-of-a-surge.html</loc>
			<lastmod>2026-01-07T09:26:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/the-wegmans-supermarket-chain-is.html</loc>
			<lastmod>2026-01-07T09:24:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/hackers-exploit-zeroday-in-discontinued.html</loc>
			<lastmod>2026-01-07T09:20:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/inside-safepay-analyzing-the-new.html</loc>
			<lastmod>2026-01-07T09:19:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/uk-announces-grand-plan-to.html</loc>
			<lastmod>2026-01-07T09:17:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/several-code-execution-flaws-patched.html</loc>
			<lastmod>2026-01-07T09:16:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/vulnerability-in-totolink-range-extender.html</loc>
			<lastmod>2026-01-07T09:14:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/07/ddosia-powers-affiliatedriven-hacktivist-attacks.html</loc>
			<lastmod>2026-01-07T09:13:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/vessel-impersonation-and-supply-chain.html</loc>
			<lastmod>2026-01-06T21:57:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/taiwan-says-chinas-attacks-on.html</loc>
			<lastmod>2026-01-06T20:28:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/threat-actors-hacked-global-companies.html</loc>
			<lastmod>2026-01-06T12:04:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/us-broadband-provider-brightspeed-investigates.html</loc>
			<lastmod>2026-01-06T12:03:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/aws-raises-gpu-prices-per.html</loc>
			<lastmod>2026-01-06T07:13:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/vscode-ide-forks-expose-users.html</loc>
			<lastmod>2026-01-06T07:11:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/nordvpn-denies-breach-claims.html</loc>
			<lastmod>2026-01-06T07:10:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/critical-mongobleed-bug-under-active.html</loc>
			<lastmod>2026-01-06T07:09:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/06/russian-hackers-target-european-hospitality.html</loc>
			<lastmod>2026-01-06T07:09:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/05/how-microsoft-is-betting-on.html</loc>
			<lastmod>2026-01-05T07:45:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/05/palo-alto-networks-securityintel-boss.html</loc>
			<lastmod>2026-01-05T07:44:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/05/trump-suggests-us-used-cyberattacks.html</loc>
			<lastmod>2026-01-05T07:43:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/03/pakistanlinked-hackers-target-indian-government.html</loc>
			<lastmod>2026-01-03T20:58:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/03/the-kimwolf-botnet-is-stalking.html</loc>
			<lastmod>2026-01-03T20:57:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/f-inc-securities-fraud-class.html</loc>
			<lastmod>2026-01-02T11:34:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/vvs-discord-stealer-using-pyarmor.html</loc>
			<lastmod>2026-01-02T11:33:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/phishing-campaign-abuses-google-cloud.html</loc>
			<lastmod>2026-01-02T11:31:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/covenant-health-data-breach-after.html</loc>
			<lastmod>2026-01-02T11:29:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/github-dnszlskmuaddib-supplychain-threat-detection.html</loc>
			<lastmod>2026-01-02T11:28:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/why-day-tls-and-ssl.html</loc>
			<lastmod>2026-01-02T11:27:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/sony-faces-an-unfixable-ps.html</loc>
			<lastmod>2026-01-02T11:24:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/risky-bulletin-us-lifts-sanctions.html</loc>
			<lastmod>2026-01-02T11:23:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/everest-ransomware-leaks-tb-of.html</loc>
			<lastmod>2026-01-02T11:21:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/handala-hack-telegram-breach-of.html</loc>
			<lastmod>2026-01-02T11:20:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/the-ai-will-replace-per.html</loc>
			<lastmod>2026-01-02T09:47:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/rondodox-botnet-exploits-reactshell.html</loc>
			<lastmod>2026-01-02T08:18:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/finland-seizes-ship-suspected-of.html</loc>
			<lastmod>2026-01-02T08:17:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2026/01/02/new-glassworm-malware.html</loc>
			<lastmod>2026-01-02T08:16:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/in-age-checks-started-locking.html</loc>
			<lastmod>2025-12-31T08:33:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/linkedin-job-scams-schneier-on.html</loc>
			<lastmod>2025-12-31T08:26:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/red-team-brainstorming-with-gpts.html</loc>
			<lastmod>2025-12-31T08:24:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/two-cybersecurity-professionals-admit-to.html</loc>
			<lastmod>2025-12-31T08:20:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/european-space-agency-confirms-breach.html</loc>
			<lastmod>2025-12-31T08:18:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/finns-fear-data-breaches.html</loc>
			<lastmod>2025-12-31T08:17:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/us-australia-say-mongobleed-bug.html</loc>
			<lastmod>2025-12-31T08:15:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/31/researchers-spot-new-shai-hulud.html</loc>
			<lastmod>2025-12-31T08:14:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/silver-fox-targets-indian-users.html</loc>
			<lastmod>2025-12-30T07:48:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/cybersecurity-acquisitions-surpassed-billion-mark.html</loc>
			<lastmod>2025-12-30T07:47:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/researchers-spot-new-shai-hulud.html</loc>
			<lastmod>2025-12-30T07:45:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/hacker-arrested-for-kmsauto-malware.html</loc>
			<lastmod>2025-12-30T07:44:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/romanian-energy-provider-hit-by.html</loc>
			<lastmod>2025-12-30T07:43:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/30/the-honeymyte-apt-evolves-with.html</loc>
			<lastmod>2025-12-30T07:42:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/top-us-accounting-firm-sax.html</loc>
			<lastmod>2025-12-29T14:10:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/french-software-company-fined-million.html</loc>
			<lastmod>2025-12-29T14:07:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/c-multiple-vulnerabilities-in-gnupg.html</loc>
			<lastmod>2025-12-29T14:06:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/bluetooth-headphone-jacking-full-disclosure.html</loc>
			<lastmod>2025-12-29T14:05:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/hunting-mongobleed.html</loc>
			<lastmod>2025-12-29T09:30:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/death-torture-and-amputation-how.html</loc>
			<lastmod>2025-12-29T09:29:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/llms-are-automating-the-human.html</loc>
			<lastmod>2025-12-29T07:47:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/evasive-panda-cyberespionage-campaign-uses.html</loc>
			<lastmod>2025-12-29T07:46:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/hacker-claims-theft-of-million.html</loc>
			<lastmod>2025-12-29T07:45:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/malicious-npm-packages-used-as.html</loc>
			<lastmod>2025-12-29T07:45:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/fortinet-warns-of-yearold-fortios.html</loc>
			<lastmod>2025-12-29T07:44:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/infostealer-malware-delivered-in-emeditor.html</loc>
			<lastmod>2025-12-29T07:43:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/malware-in-spread-far-beyond.html</loc>
			<lastmod>2025-12-29T07:42:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/million-affected-by-aflac-data.html</loc>
			<lastmod>2025-12-29T07:41:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/29/microsoft-copilot-is-rolling-out.html</loc>
			<lastmod>2025-12-29T07:40:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/28/anthony-albaneses-phone-number-is.html</loc>
			<lastmod>2025-12-28T11:31:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/28/iranlinked-hacking-group-claims-access.html</loc>
			<lastmod>2025-12-28T11:29:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/28/massive-rainbow-six-siege-breach.html</loc>
			<lastmod>2025-12-28T11:28:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/27/langchain-core-vulnerability-allows-prompt.html</loc>
			<lastmod>2025-12-27T19:32:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/27/meet-the-team-that-investigates.html</loc>
			<lastmod>2025-12-27T19:31:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/27/petlibro-your-pet-feeder-is.html</loc>
			<lastmod>2025-12-27T19:29:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/27/everest-ransomware-group-claims-theft.html</loc>
			<lastmod>2025-12-27T11:53:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/27/npm-package-with-downloads-compromises.html</loc>
			<lastmod>2025-12-27T07:51:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/26/denmark-is-being-heavily-targeted.html</loc>
			<lastmod>2025-12-26T11:50:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/26/coordinated-scams-target-mena-region.html</loc>
			<lastmod>2025-12-26T11:49:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/26/nomani-investment-scam-surges-using.html</loc>
			<lastmod>2025-12-26T11:48:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/26/phoenix-university-data-breach-exposes.html</loc>
			<lastmod>2025-12-26T11:14:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/26/shinsegae-affiliate-reports-leak-of.html</loc>
			<lastmod>2025-12-26T11:12:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/201013.html</loc>
			<lastmod>2025-12-25T20:10:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/asiana-airlines-informs-employees-of.html</loc>
			<lastmod>2025-12-25T11:34:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/the-evasive-panda-apt-group.html</loc>
			<lastmod>2025-12-25T10:48:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/lumma-stealer-danger-lurking-in.html</loc>
			<lastmod>2025-12-25T10:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/threatsday-bulletin-stealth-loaders-ai.html</loc>
			<lastmod>2025-12-25T09:57:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/xhunt-apt-cyberespionage-operations-targeting.html</loc>
			<lastmod>2025-12-25T09:55:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/i-quit-when-cisos-need.html</loc>
			<lastmod>2025-12-25T09:53:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/cisa-flags-actively-exploited-digiever.html</loc>
			<lastmod>2025-12-25T09:51:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/25/lastpass-breach-led-to-yearslong.html</loc>
			<lastmod>2025-12-25T09:50:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/fbi-seized-webadspanelsorg-hosting-stolen.html</loc>
			<lastmod>2025-12-24T15:10:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/github-tomermtprotodissector-wireshark-plugin-for.html</loc>
			<lastmod>2025-12-24T15:08:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/us-energy-dept-flags-ai.html</loc>
			<lastmod>2025-12-24T13:32:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/fcc-bans-foreignmade-drones.html</loc>
			<lastmod>2025-12-24T08:13:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/microsoft-teams-strengthens-messaging-security.html</loc>
			<lastmod>2025-12-24T08:10:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/24/malicious-extensions-in-chrome-web.html</loc>
			<lastmod>2025-12-24T08:10:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/shinhan-card-reports-internal-leak.html</loc>
			<lastmod>2025-12-23T11:35:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/how-cyber-powerhouse-israel-was.html</loc>
			<lastmod>2025-12-23T11:33:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/red-hat-breach-exposes-data.html</loc>
			<lastmod>2025-12-23T11:30:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/ddos-incident-disrupts-frances-postal.html</loc>
			<lastmod>2025-12-23T08:20:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/critical-rce-flaw-impacts-over.html</loc>
			<lastmod>2025-12-23T08:19:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/ukrainian-hacker-admits-affiliate-role.html</loc>
			<lastmod>2025-12-23T08:18:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/23/interpolled-action-decrypts-ransomware-strains.html</loc>
			<lastmod>2025-12-23T08:18:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/macsync-macos-malware-distributed-via.html</loc>
			<lastmod>2025-12-22T13:17:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/pornhub-tells-users-to-expect.html</loc>
			<lastmod>2025-12-22T13:15:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/romanian-water-authority-hit-by.html</loc>
			<lastmod>2025-12-22T13:13:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/how-i-reverse-engineered-a.html</loc>
			<lastmod>2025-12-22T13:13:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/pirate-activists-have-copied-spotifys.html</loc>
			<lastmod>2025-12-22T13:11:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/fake-whatsapp-api-package-on.html</loc>
			<lastmod>2025-12-22T13:09:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/scammers-use-ai-to-make.html</loc>
			<lastmod>2025-12-22T13:08:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/uzbek-users-under-attack-by.html</loc>
			<lastmod>2025-12-22T13:06:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/22/iranian-infy-apt-resurfaces-with.html</loc>
			<lastmod>2025-12-22T08:15:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/chinese-hackers-targeting-cisco-email.html</loc>
			<lastmod>2025-12-20T23:07:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/testing-aiorchestrated-attacks-in-practice.html</loc>
			<lastmod>2025-12-20T23:06:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/cisa-warns-asus-live-update.html</loc>
			<lastmod>2025-12-20T23:05:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/airbus-to-migrate-critical-apps.html</loc>
			<lastmod>2025-12-20T23:03:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/watchguard-sounds-alarm-as-critical.html</loc>
			<lastmod>2025-12-20T23:02:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/20/openai-user-data-exposed-in.html</loc>
			<lastmod>2025-12-20T22:57:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/over-forticloud-sso-devices-exposed.html</loc>
			<lastmod>2025-12-19T12:18:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/top-lawmaker-asks-white-house.html</loc>
			<lastmod>2025-12-19T12:16:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/cracked-software-and-youtube-videos.html</loc>
			<lastmod>2025-12-19T12:15:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/longnosedgoblin-caught-snooping-on-asian.html</loc>
			<lastmod>2025-12-19T12:13:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/code-audit-for-the-tor.html</loc>
			<lastmod>2025-12-19T12:12:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/smart-tv-manufacturer-ordered-to.html</loc>
			<lastmod>2025-12-19T12:09:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/rockrose-development-suffers-security-breach.html</loc>
			<lastmod>2025-12-19T12:06:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/statelinked-and-criminal-hackers-use.html</loc>
			<lastmod>2025-12-19T12:05:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/new-cybersecurity-laws-and-trends.html</loc>
			<lastmod>2025-12-19T12:02:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/fears-thousands-of-confidential-documents.html</loc>
			<lastmod>2025-12-19T11:38:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/government-data-stolen-in-hack.html</loc>
			<lastmod>2025-12-19T11:37:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/075711.html</loc>
			<lastmod>2025-12-19T07:57:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/clop-ransomware-targets-gladinet-centrestack.html</loc>
			<lastmod>2025-12-19T07:56:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/new-chinalinked-hacker-group-spies.html</loc>
			<lastmod>2025-12-19T07:55:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/hpe-oneview-vulnerable-to-remote.html</loc>
			<lastmod>2025-12-19T07:53:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/north-koreas-digital-surge-b.html</loc>
			<lastmod>2025-12-19T07:47:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/nigeria-arrests-raccoono-phishing-developer.html</loc>
			<lastmod>2025-12-19T07:45:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/kimwolf-android-botnet-ensnares-million.html</loc>
			<lastmod>2025-12-19T07:44:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/university-of-sydney-data-breach.html</loc>
			<lastmod>2025-12-19T07:43:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/ai-advertising-company-hacked-schneier.html</loc>
			<lastmod>2025-12-19T07:43:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/denmark-blames-russia-for-destructive.html</loc>
			<lastmod>2025-12-19T07:42:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/19/stealth-in-layers-unmasking-the.html</loc>
			<lastmod>2025-12-19T07:41:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/how-china-built-its-manhattan.html</loc>
			<lastmod>2025-12-18T13:24:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/million-could-be-affected-in.html</loc>
			<lastmod>2025-12-18T11:30:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/pay-the-ransom-or-hackers.html</loc>
			<lastmod>2025-12-18T11:28:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/bennett-concedes-cyber-breach-after.html</loc>
			<lastmod>2025-12-18T11:26:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/uat-actively-targets-cisco-secure.html</loc>
			<lastmod>2025-12-18T09:25:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/natos-battle-for-cloud-sovereignty.html</loc>
			<lastmod>2025-12-18T09:24:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/european-police-bust-ukrainebased-call.html</loc>
			<lastmod>2025-12-18T09:24:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/ghostposter-attacks-hide-malicious-javascript.html</loc>
			<lastmod>2025-12-18T09:23:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/cellik-android-malware-builds-malicious.html</loc>
			<lastmod>2025-12-18T09:22:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/an-upgrade-in-ransomhouse-encryption.html</loc>
			<lastmod>2025-12-18T09:21:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/does-openai-expect-upcoming-ai.html</loc>
			<lastmod>2025-12-18T09:21:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/two-chrome-flaws-could-be.html</loc>
			<lastmod>2025-12-18T09:20:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/18/gachiloader-defeating-nodejs-malware-with.html</loc>
			<lastmod>2025-12-18T09:19:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/new-spyware-discovered-on-belarusian.html</loc>
			<lastmod>2025-12-17T15:16:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/kimwolf-botnet-hijacks-million-android.html</loc>
			<lastmod>2025-12-17T15:14:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/russian-bluedelta-hackers-ran-phishing.html</loc>
			<lastmod>2025-12-17T15:12:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/chinese-hackers-hijack-european-networks.html</loc>
			<lastmod>2025-12-17T15:12:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/whatsapp-device-linking-abused-in.html</loc>
			<lastmod>2025-12-17T15:10:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/cisco-email-security-appliances-rooted.html</loc>
			<lastmod>2025-12-17T15:09:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/startup-investigation-reveals-peerreviewed-papers.html</loc>
			<lastmod>2025-12-17T12:49:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/hack-reveals-reviewer-identities-for.html</loc>
			<lastmod>2025-12-17T11:34:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/billion-records-exposed-in-massive.html</loc>
			<lastmod>2025-12-17T11:33:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/the-doubleblind-signal-a-security.html</loc>
			<lastmod>2025-12-17T11:18:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/amazon-exposes-yearslong-gru-cyber.html</loc>
			<lastmod>2025-12-17T09:26:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/new-santastealer-malware-steals-data.html</loc>
			<lastmod>2025-12-17T09:25:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/why-hypervisors-are-a-ransomware.html</loc>
			<lastmod>2025-12-17T09:24:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/most-parked-domains-now-serving.html</loc>
			<lastmod>2025-12-17T09:23:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/android-threats-in-when-your.html</loc>
			<lastmod>2025-12-17T09:22:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/ink-dragon-expands-with-new.html</loc>
			<lastmod>2025-12-17T09:21:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/microsoft-to-kill-rc-in.html</loc>
			<lastmod>2025-12-17T08:43:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/jumpcloud-remote-assist-vulnerability-can.html</loc>
			<lastmod>2025-12-17T08:42:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/european-authorities-dismantle-call-center.html</loc>
			<lastmod>2025-12-17T08:41:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/photo-booth-flaw-exposes-peoples.html</loc>
			<lastmod>2025-12-17T08:40:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/featured-urban-vpn-caught-stealing.html</loc>
			<lastmod>2025-12-17T08:39:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/17/httpsxcomaiatmetastatuss-metas-ai-at-meta.html</loc>
			<lastmod>2025-12-17T08:38:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/16/mozilla-names-new-ceo-firefox.html</loc>
			<lastmod>2025-12-16T18:53:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/16/why-servicenow-is-eyeing-a.html</loc>
			<lastmod>2025-12-16T06:39:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/16/user-data-compromised-in-soundcloud.html</loc>
			<lastmod>2025-12-16T06:35:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/16/fortinet-fortigate-under-active-attack.html</loc>
			<lastmod>2025-12-16T06:33:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/16/google-is-discontinuing-its-dark.html</loc>
			<lastmod>2025-12-16T06:33:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/credit-data-breach-impacts-million.html</loc>
			<lastmod>2025-12-15T15:22:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/nationstate-and-cybercrime-exploits-tied.html</loc>
			<lastmod>2025-12-15T15:21:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/makop-ransomware-guloader-and-privilege.html</loc>
			<lastmod>2025-12-15T15:20:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/marquis-data-breach-impacts-over.html</loc>
			<lastmod>2025-12-15T15:19:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/breachforums-reemerges-claims-french-govt.html</loc>
			<lastmod>2025-12-15T11:33:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/askul-says-sets-of-data.html</loc>
			<lastmod>2025-12-15T11:31:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/experts-found-an-unsecured-tb.html</loc>
			<lastmod>2025-12-15T11:30:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/fake-osint-and-gpt-utility.html</loc>
			<lastmod>2025-12-15T07:58:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/cisa-adds-actively-exploited-sierra.html</loc>
			<lastmod>2025-12-15T07:57:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/apple-fixes-two-zeroday-flaws.html</loc>
			<lastmod>2025-12-15T07:55:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/multiple-threat-actors-exploit-reactshell.html</loc>
			<lastmod>2025-12-15T07:54:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/15/abuse-of-iso-mounting-to.html</loc>
			<lastmod>2025-12-15T07:53:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/13/new-react-rsc-vulnerabilities-enable.html</loc>
			<lastmod>2025-12-13T21:45:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/13/fake-one-battle-after-another.html</loc>
			<lastmod>2025-12-13T21:45:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/13/free-unofficial-patches-are-available.html</loc>
			<lastmod>2025-12-13T21:44:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/13/technical-analysis-of-the-blackforce.html</loc>
			<lastmod>2025-12-13T21:43:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/13/google-and-apple-roll-out.html</loc>
			<lastmod>2025-12-13T00:14:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/why-ai-agents-failed-to.html</loc>
			<lastmod>2025-12-12T07:49:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/nvidia-builds-location-verification-tech.html</loc>
			<lastmod>2025-12-12T07:49:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/lawmaker-calls-facial-recognition-on.html</loc>
			<lastmod>2025-12-12T07:48:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/realword-thirdparty-risk-examples.html</loc>
			<lastmod>2025-12-12T07:47:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/researcher-claims-salt-typhoon-spies.html</loc>
			<lastmod>2025-12-12T07:46:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/hackers-reportedly-breach-developer-involved.html</loc>
			<lastmod>2025-12-12T07:45:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/new-byovd-loader-behind-deadlock.html</loc>
			<lastmod>2025-12-12T07:44:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/how-whaling-attacks-target-top.html</loc>
			<lastmod>2025-12-12T07:43:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/12/consentfix-attack-hijacks-microsoft-accounts.html</loc>
			<lastmod>2025-12-12T07:43:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/canadian-military-intelligence-member-charged.html</loc>
			<lastmod>2025-12-11T18:50:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/docker-hub-images-leak-auth.html</loc>
			<lastmod>2025-12-11T11:29:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/south-african-state-security-agency.html</loc>
			<lastmod>2025-12-11T11:28:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/hardening-the-hypervisor-practical-defenses.html</loc>
			<lastmod>2025-12-11T07:42:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/multiplatform-ransomware-written-in-rust.html</loc>
			<lastmod>2025-12-11T07:41:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/cracking-valleyrat.html</loc>
			<lastmod>2025-12-11T07:40:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/eff-launches-age-verification-hub.html</loc>
			<lastmod>2025-12-11T07:39:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/ransomware-victim-warning-the-streisand.html</loc>
			<lastmod>2025-12-11T07:39:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/russias-flagship-airline-hacked-through.html</loc>
			<lastmod>2025-12-11T07:38:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/thousands-of-exposed-secrets-found.html</loc>
			<lastmod>2025-12-11T07:37:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/https-certificate-industry-phasing-out.html</loc>
			<lastmod>2025-12-11T07:36:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/microsoft-wont-fix-net-rce.html</loc>
			<lastmod>2025-12-11T07:35:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/russialinked-attacks-targeting-meat-processing.html</loc>
			<lastmod>2025-12-11T07:34:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/new-droidlock-malware-locks-android.html</loc>
			<lastmod>2025-12-11T07:33:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/11/selfhosted-gits-battered-in-day.html</loc>
			<lastmod>2025-12-11T07:32:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/hospice-firm-eye-care-practice.html</loc>
			<lastmod>2025-12-10T11:19:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/apt-cyber-threat-profile-and.html</loc>
			<lastmod>2025-12-10T11:16:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/uncovering-hidden-forensic-evidence-in.html</loc>
			<lastmod>2025-12-10T07:21:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/inside-shanya-a-packerasaservice-fueling.html</loc>
			<lastmod>2025-12-10T07:20:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/graybravos-castleloader-activity-clusters-target.html</loc>
			<lastmod>2025-12-10T07:20:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/infostealer-has-entered-the-chat.html</loc>
			<lastmod>2025-12-10T07:19:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/goodbye-dark-telegram-blocks-are.html</loc>
			<lastmod>2025-12-10T07:18:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/geminijack-the-google-gemini-zeroclick.html</loc>
			<lastmod>2025-12-10T07:17:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/ransomware-iab-abuses-edr-for.html</loc>
			<lastmod>2025-12-10T07:16:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/10/malicious-vscode-extensions-on-microsofts.html</loc>
			<lastmod>2025-12-10T07:16:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/gartner-calls-for-pause-on.html</loc>
			<lastmod>2025-12-09T12:28:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/shanya-the-packerasaservice-powering-the.html</loc>
			<lastmod>2025-12-09T12:26:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/new-geminijack-click-flaw-in.html</loc>
			<lastmod>2025-12-09T12:24:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/leakdataorg-publishes-personal-data-of.html</loc>
			<lastmod>2025-12-09T12:23:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/employee-error-leads-to-ixio.html</loc>
			<lastmod>2025-12-09T12:22:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/petco-data-breach-exposes-ssns.html</loc>
			<lastmod>2025-12-09T12:20:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/space-bears-ransomware-claims-comcast.html</loc>
			<lastmod>2025-12-09T12:19:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/09/dartmouth-data-breach-exposes-social.html</loc>
			<lastmod>2025-12-09T12:18:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/researcher-finds-chinese-kvm-has.html</loc>
			<lastmod>2025-12-08T14:29:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/poland-arrests-ukrainians-utilizing-advanced.html</loc>
			<lastmod>2025-12-08T14:28:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/muddywater-deploys-udpgangster-backdoor-in.html</loc>
			<lastmod>2025-12-08T12:02:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/december-patch-tuesday-forecast-and.html</loc>
			<lastmod>2025-12-08T12:01:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/tricentury-eye-care-data-breach.html</loc>
			<lastmod>2025-12-08T11:56:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/uk-intelligence-warns-ai-prompt.html</loc>
			<lastmod>2025-12-08T11:55:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/scammers-harvesting-facebook-photos-to.html</loc>
			<lastmod>2025-12-08T11:54:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/major-drug-research-company-confirms.html</loc>
			<lastmod>2025-12-08T11:51:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/risky-bulletin-apts-go-after.html</loc>
			<lastmod>2025-12-08T11:50:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/researchers-track-dozens-of-organizations.html</loc>
			<lastmod>2025-12-08T11:48:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/x-cuts-off-the-european.html</loc>
			<lastmod>2025-12-08T09:39:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/attempts-to-bypass-cdns.html</loc>
			<lastmod>2025-12-08T09:38:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/portugal-updates-cybercrime-law-to.html</loc>
			<lastmod>2025-12-08T09:37:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/phishing-privileges-and-passwords-why.html</loc>
			<lastmod>2025-12-08T09:36:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/death-to-onetime-text-codes.html</loc>
			<lastmod>2025-12-08T09:35:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/08/security-and-privacy-are-not.html</loc>
			<lastmod>2025-12-08T09:24:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/06/ai-provenance-or-silent-tracking.html</loc>
			<lastmod>2025-12-06T23:17:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/critical-xxe-bug-cve-cvss.html</loc>
			<lastmod>2025-12-05T15:21:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/fbi-warns-of-virtual-kidnapping.html</loc>
			<lastmod>2025-12-05T15:20:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/chinese-nationstate-groups-tied-to.html</loc>
			<lastmod>2025-12-05T15:19:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/zeroclick-agentic-browser-attack-can.html</loc>
			<lastmod>2025-12-05T15:16:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/how-genai-is-powering-defenders.html</loc>
			<lastmod>2025-12-05T09:36:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/intellexas-prolific-zeroday-exploits-continue.html</loc>
			<lastmod>2025-12-05T09:36:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/valleyrat-campaign-targets-job-seekers.html</loc>
			<lastmod>2025-12-05T09:35:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/silver-foxs-russian-ruse-valleyrat.html</loc>
			<lastmod>2025-12-05T09:34:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/french-ngo-reporters-without-borders.html</loc>
			<lastmod>2025-12-05T09:32:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/05/critical-rsc-bugs-in-react.html</loc>
			<lastmod>2025-12-05T09:31:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/asus-confirms-vendor-breach-as.html</loc>
			<lastmod>2025-12-04T15:21:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/silver-fox-uses-fake-microsoft.html</loc>
			<lastmod>2025-12-04T15:20:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/how-scammers-use-fake-insurance.html</loc>
			<lastmod>2025-12-04T15:19:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/cisa-warns-of-chinese-brickstorm.html</loc>
			<lastmod>2025-12-04T15:18:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/virginia-brothers-charged-with-hacking.html</loc>
			<lastmod>2025-12-04T15:17:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/russia-blocks-facetime-and-snapchat.html</loc>
			<lastmod>2025-12-04T15:16:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/british-officials-seek-to-expand.html</loc>
			<lastmod>2025-12-04T15:14:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/phishing-attempt-against-reporters-without.html</loc>
			<lastmod>2025-12-04T15:13:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/webxr-flaw-hits-billion-chromium.html</loc>
			<lastmod>2025-12-04T11:56:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/post-office-avoids-fine-over.html</loc>
			<lastmod>2025-12-04T11:54:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/microsoft-mitigates-windows-lnk-flaw.html</loc>
			<lastmod>2025-12-04T11:43:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/malicious-rust-crate-evmunits-serves.html</loc>
			<lastmod>2025-12-04T11:42:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/the-browser-defense-playbook.html</loc>
			<lastmod>2025-12-04T11:41:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/how-attackers-use-real-it.html</loc>
			<lastmod>2025-12-04T11:40:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/the-dragonforce-cartel-scattered-spider.html</loc>
			<lastmod>2025-12-04T11:39:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/india-backs-off-mandatory-cyber.html</loc>
			<lastmod>2025-12-04T11:38:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/04/fbi-warns-of-surge-in.html</loc>
			<lastmod>2025-12-04T11:36:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/tsa-warningdo-not-use-these.html</loc>
			<lastmod>2025-12-03T18:02:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/endtoend-encrypted-smart-toilet-camera.html</loc>
			<lastmod>2025-12-03T17:54:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/marketing-and-compliance-software-vendor.html</loc>
			<lastmod>2025-12-03T14:05:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/of-phishing-websites-are-protected.html</loc>
			<lastmod>2025-12-03T14:04:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/vg-mirai-botnet-evolves-this.html</loc>
			<lastmod>2025-12-03T12:20:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/aisuru-botnet-behind-new-recordbreaking.html</loc>
			<lastmod>2025-12-03T12:19:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/small-numbers-of-notepad-users.html</loc>
			<lastmod>2025-12-03T12:18:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/the-state-of-ransomware-in.html</loc>
			<lastmod>2025-12-03T12:16:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/deep-dive-into-dragonforce-ransomware.html</loc>
			<lastmod>2025-12-03T12:15:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/brazil-hit-by-banking-trojan.html</loc>
			<lastmod>2025-12-03T12:14:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/year-long-shadypanda-attack-spied.html</loc>
			<lastmod>2025-12-03T12:10:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/tridentlocker-hits-bpost-gb-leaked.html</loc>
			<lastmod>2025-12-03T12:09:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/mixpanel-cyberattack-exposes-client-data.html</loc>
			<lastmod>2025-12-03T12:08:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/netmarble-confirms-additional-leak-of.html</loc>
			<lastmod>2025-12-03T12:07:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/penn-and-phoenix-universities-disclose.html</loc>
			<lastmod>2025-12-03T12:06:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/03/everest-ransomware-claims-asus-breach.html</loc>
			<lastmod>2025-12-03T12:05:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/02/sleeper-browser-extensions-woke-up.html</loc>
			<lastmod>2025-12-02T18:50:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/02/how-a-noisy-ransomware-intrusion.html</loc>
			<lastmod>2025-12-02T06:06:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/01/huge-password-breach-exposes-billions.html</loc>
			<lastmod>2025-12-01T11:31:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/01/why-people-keep-flocking-to.html</loc>
			<lastmod>2025-12-01T07:46:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/01/the-wired-guide-to-digital.html</loc>
			<lastmod>2025-12-01T07:45:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/12/01/how-cvss-v-works-characterizing.html</loc>
			<lastmod>2025-12-01T07:42:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/29/free-scanner-to-check-if.html</loc>
			<lastmod>2025-11-29T20:33:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/29/ms-teams-guest-access-can.html</loc>
			<lastmod>2025-11-29T20:32:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/29/evil-twin-wifi-attacks.html</loc>
			<lastmod>2025-11-29T20:31:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/29/now-hackers-start-hacking-us.html</loc>
			<lastmod>2025-11-29T11:37:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/29/coupang-data-leak-jumps-to.html</loc>
			<lastmod>2025-11-29T11:35:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/microsoft-to-block-unauthorized-scripts.html</loc>
			<lastmod>2025-11-28T07:48:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/asahi-confirms-nearly-two-million.html</loc>
			<lastmod>2025-11-28T07:46:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/ransomware-elevates-cybersecurity-to-national.html</loc>
			<lastmod>2025-11-28T07:45:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/zendesk-users-targeted-as-scattered.html</loc>
			<lastmod>2025-11-28T07:44:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/akiras-sonicwall-exploits-are-disrupting.html</loc>
			<lastmod>2025-11-28T07:43:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/fcc-warns-broadcasters-after-emergency.html</loc>
			<lastmod>2025-11-28T07:41:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/the-mystery-oast-host-behind.html</loc>
			<lastmod>2025-11-28T07:39:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/28/popular-forge-library-receives-fix.html</loc>
			<lastmod>2025-11-28T07:38:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/netmarble-data-breach-exposes-million.html</loc>
			<lastmod>2025-11-27T11:15:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/openai-alerts-users-to-data.html</loc>
			<lastmod>2025-11-27T11:14:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/cyber-threat-intelligence-report-nov.html</loc>
			<lastmod>2025-11-27T08:38:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/old-tech-new-vulnerabilities-ntlm.html</loc>
			<lastmod>2025-11-27T08:04:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/influencers-in-the-crosshairs.html</loc>
			<lastmod>2025-11-27T08:02:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/the-golden-scale-tis-the.html</loc>
			<lastmod>2025-11-27T07:59:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/fake-linkedin-jobs-trick-mac.html</loc>
			<lastmod>2025-11-27T07:58:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/lifetime-access-to-aiforevil-wormgpt.html</loc>
			<lastmod>2025-11-27T07:56:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/asus-warns-of-new-critical.html</loc>
			<lastmod>2025-11-27T07:54:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/27/botnet-takes-advantage-of-aws.html</loc>
			<lastmod>2025-11-27T07:52:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/house-energy-and-commerce-committee.html</loc>
			<lastmod>2025-11-26T17:36:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/dell-controlvault-lasso-glinet-vulnerabilities.html</loc>
			<lastmod>2025-11-26T17:35:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/the-golden-scale-tis-the.html</loc>
			<lastmod>2025-11-26T17:33:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/akiras-sonicwall-hacks-are-taking.html</loc>
			<lastmod>2025-11-26T17:32:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/new-shadowv-botnet-malware-used.html</loc>
			<lastmod>2025-11-26T17:30:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/tor-switches-to-new-counter.html</loc>
			<lastmod>2025-11-26T07:44:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/malicious-llms.html</loc>
			<lastmod>2025-11-26T07:43:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/advanced-security-isnt-stopping-ancient.html</loc>
			<lastmod>2025-11-26T07:42:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/email-hacks-continue-to-plague.html</loc>
			<lastmod>2025-11-26T07:41:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/cybercriminals-stole-m-by-impersonating.html</loc>
			<lastmod>2025-11-26T07:40:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/cisa-warns-of-active-spyware.html</loc>
			<lastmod>2025-11-26T07:39:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/shahulud-the-second-coming.html</loc>
			<lastmod>2025-11-26T07:38:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/26/with-friends-like-these-china.html</loc>
			<lastmod>2025-11-26T07:37:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/cheap-device-bypasses-amd-intel.html</loc>
			<lastmod>2025-11-25T18:02:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/uk-parliamentary-committee-recommends-software.html</loc>
			<lastmod>2025-11-25T17:58:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/hackers-knock-out-systems-at.html</loc>
			<lastmod>2025-11-25T07:52:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/matrix-push-c-abuses-browser.html</loc>
			<lastmod>2025-11-25T07:51:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/shadowpad-malware-actively-exploits-wsus.html</loc>
			<lastmod>2025-11-25T07:50:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/clickfix-gets-creative-malware-buried.html</loc>
			<lastmod>2025-11-25T07:49:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/25/shaihulud-supply-chain-attack.html</loc>
			<lastmod>2025-11-25T07:48:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/malicious-blender-model-files-deliver.html</loc>
			<lastmod>2025-11-24T17:44:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/shadowray-turns-ai-clusters-into.html</loc>
			<lastmod>2025-11-24T17:43:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/jpmorgan-citi-morgan-stanley-client.html</loc>
			<lastmod>2025-11-24T13:37:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/i-run-a-red-team.html</loc>
			<lastmod>2025-11-24T12:56:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/new-fluent-bit-flaws-expose.html</loc>
			<lastmod>2025-11-24T12:55:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/europes-aifuelled-glp-scam.html</loc>
			<lastmod>2025-11-24T09:07:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/cloudflares-onestopshop-convenience-takes-down.html</loc>
			<lastmod>2025-11-24T09:07:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/analyzing-the-latest-sneakyfa-browserinthebrowser.html</loc>
			<lastmod>2025-11-24T09:06:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/cryptographers-cancel-election-results.html</loc>
			<lastmod>2025-11-24T09:04:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/how-to-know-if-your.html</loc>
			<lastmod>2025-11-24T09:00:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/cox-enterprises-discloses-oracle-ebusiness.html</loc>
			<lastmod>2025-11-24T09:00:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/shinyhunters-does-not-like-salesforce.html</loc>
			<lastmod>2025-11-24T08:59:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/24/gmail-can-read-your-emails.html</loc>
			<lastmod>2025-11-24T08:58:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/23/harvard-alumni-department-database-hacked.html</loc>
			<lastmod>2025-11-23T11:44:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/23/iberia-discloses-customer-data-leak.html</loc>
			<lastmod>2025-11-23T11:44:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/x-has-quietly-introduced-a.html</loc>
			<lastmod>2025-11-22T21:36:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/budget-samsung-phones-shipped-with.html</loc>
			<lastmod>2025-11-22T16:20:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/understanding-cloud-persistence.html</loc>
			<lastmod>2025-11-22T16:19:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/toddycat-your-hidden-email-assistant.html</loc>
			<lastmod>2025-11-22T16:17:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/123525.html</loc>
			<lastmod>2025-11-22T12:35:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/matrix-push-c-uses-browser.html</loc>
			<lastmod>2025-11-22T12:34:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/github-aliasroboticscai-cybersecurity-ai-cai.html</loc>
			<lastmod>2025-11-22T12:33:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/22/chinalinked-apt-launches-stealthy-cyberattacks.html</loc>
			<lastmod>2025-11-22T12:30:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/crowdstrike-catches-insider-feeding-information.html</loc>
			<lastmod>2025-11-21T12:30:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/ai-changing-entrylevel-work-can.html</loc>
			<lastmod>2025-11-21T12:27:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/fake-calendar-invites-are-spreading.html</loc>
			<lastmod>2025-11-21T12:25:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/grafana-patches-cvss-scim-flaw.html</loc>
			<lastmod>2025-11-21T12:23:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/recognizing-and-responding-to-cyber.html</loc>
			<lastmod>2025-11-21T08:37:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/hacking-ev-chargers-by-attacking.html</loc>
			<lastmod>2025-11-21T08:35:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/squarex-and-perplexity-quarrel-over.html</loc>
			<lastmod>2025-11-21T08:32:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/chinese-cyberspies-deploy-badaudio-malware.html</loc>
			<lastmod>2025-11-21T08:31:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/ransomware-gangs-seize-a-new.html</loc>
			<lastmod>2025-11-21T08:29:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/what-did-we-learn-from.html</loc>
			<lastmod>2025-11-21T08:27:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/massive-data-leak-hits-italian.html</loc>
			<lastmod>2025-11-21T08:25:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/google-brings-airdrop-compatibility-to.html</loc>
			<lastmod>2025-11-21T08:23:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/sliver-c-insecure-default-network.html</loc>
			<lastmod>2025-11-21T08:22:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/21/google-begins-showing-ads-in.html</loc>
			<lastmod>2025-11-21T08:09:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/sneakyfa-phishing-tool-adds-ability.html</loc>
			<lastmod>2025-11-20T22:26:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/salesforce-investigates-new-incident-echoing.html</loc>
			<lastmod>2025-11-20T19:15:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/shinyhunters-hack-salesforce-instances-via.html</loc>
			<lastmod>2025-11-20T19:13:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/enisa-is-now-a-cve.html</loc>
			<lastmod>2025-11-20T19:12:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/salesforce-cuts-off-access-to.html</loc>
			<lastmod>2025-11-20T19:10:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/north-korean-operatives-running-fake.html</loc>
			<lastmod>2025-11-20T19:09:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/uk-drug-funds-flowed-into.html</loc>
			<lastmod>2025-11-20T19:08:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/depthfirst-esbuilds-xss-bug-that.html</loc>
			<lastmod>2025-11-20T19:07:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/new-sturnus-banking-trojan-targets.html</loc>
			<lastmod>2025-11-20T19:03:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/nso-seeks-to-overturn-whatsapp.html</loc>
			<lastmod>2025-11-20T19:02:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/pakistan-creates-first-secure-mobile.html</loc>
			<lastmod>2025-11-20T11:12:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/hacker-selling-alleged-samsung-medison.html</loc>
			<lastmod>2025-11-20T11:11:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/researchers-claim-largest-leak-ever.html</loc>
			<lastmod>2025-11-20T11:09:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/hacked-by-trojan-indian-hacker.html</loc>
			<lastmod>2025-11-20T11:08:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/new-sonicwall-sonicos-flaw-allows.html</loc>
			<lastmod>2025-11-20T11:05:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/iranian-apt-hacks-helped-direct.html</loc>
			<lastmod>2025-11-20T10:16:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/breaking-oracles-identity-manager-preauth.html</loc>
			<lastmod>2025-11-20T10:13:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/hostile-states-are-using-cyber.html</loc>
			<lastmod>2025-11-20T10:03:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/plushdaemon-compromises-network-devices-for.html</loc>
			<lastmod>2025-11-20T10:02:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/hackers-actively-exploiting-zip.html</loc>
			<lastmod>2025-11-20T10:01:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/meet-shinyspdr-new-ransomwareasaservice-created.html</loc>
			<lastmod>2025-11-20T09:59:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/operation-wrthug-the-global-espionage.html</loc>
			<lastmod>2025-11-20T09:58:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/cloudflare-blames-outage-on-internal.html</loc>
			<lastmod>2025-11-20T09:57:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/20/anatomy-of-an-akira-ransomware.html</loc>
			<lastmod>2025-11-20T09:55:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/european-commission-simplification-proposal-would.html</loc>
			<lastmod>2025-11-19T14:34:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/operation-wrthug-hijacks-asus-routers.html</loc>
			<lastmod>2025-11-19T14:32:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/exploiting-a-preauth-rce-in.html</loc>
			<lastmod>2025-11-19T14:31:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/breaking-down-s-ransomware.html</loc>
			<lastmod>2025-11-19T07:58:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/npm-malware-campaign.html</loc>
			<lastmod>2025-11-19T07:56:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/19/shadowray.html</loc>
			<lastmod>2025-11-19T07:53:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/mi-warns-lawmakers-that-chinese.html</loc>
			<lastmod>2025-11-18T17:17:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/more-work-for-admins-as.html</loc>
			<lastmod>2025-11-18T17:16:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/airlines-will-shut-down-program.html</loc>
			<lastmod>2025-11-18T17:14:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/aclu-and-eff-sue-a.html</loc>
			<lastmod>2025-11-18T17:13:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-18T17:13:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/fortinet-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-18T17:12:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/new-technique-shows-gaps-in.html</loc>
			<lastmod>2025-11-18T17:11:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/a-miracle-a-company-says.html</loc>
			<lastmod>2025-11-18T11:09:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/fortinets-silent-patch-sparks-alarm.html</loc>
			<lastmod>2025-11-18T11:08:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/iranian-hackers-use-deeproot-and.html</loc>
			<lastmod>2025-11-18T11:07:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/princeton-university-data-breach-impacts.html</loc>
			<lastmod>2025-11-18T11:06:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/pennsylvania-attorney-general-confirms-data.html</loc>
			<lastmod>2025-11-18T11:04:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-11-18T11:03:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/zyxel-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-18T11:02:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/internet-slowly-recovers-after-farreaching.html</loc>
			<lastmod>2025-11-18T11:00:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/largestever-cloud-ddos-attack.html</loc>
			<lastmod>2025-11-18T08:10:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/cursor-issue-paves-way-for.html</loc>
			<lastmod>2025-11-18T08:09:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/eurofiber-france-warns-of-breach.html</loc>
			<lastmod>2025-11-18T08:08:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/new-evalusion-clickfix-campaign.html</loc>
			<lastmod>2025-11-18T08:05:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/analysis-of-unc.html</loc>
			<lastmod>2025-11-18T08:03:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/18/dutch-police-seizes-servers.html</loc>
			<lastmod>2025-11-18T08:02:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/17/windows-kb-esu-update-may.html</loc>
			<lastmod>2025-11-17T09:27:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/17/hardened-containers-look-to-eliminate.html</loc>
			<lastmod>2025-11-17T09:26:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/17/how-code-reuse-spread-critical.html</loc>
			<lastmod>2025-11-17T09:25:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/americans-plead-guilty-to-helping.html</loc>
			<lastmod>2025-11-16T13:20:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/rondodox-exploits-unpatched-xwiki-servers.html</loc>
			<lastmod>2025-11-16T13:19:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/a-turning-point-for-cyber.html</loc>
			<lastmod>2025-11-16T11:42:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/fortinet-releases-security-advisory-for.html</loc>
			<lastmod>2025-11-16T11:34:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-16T11:33:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/digital-doppelgangers-anatomy-of-evolving.html</loc>
			<lastmod>2025-11-16T11:31:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/worm-flooding-npm-registry-with.html</loc>
			<lastmod>2025-11-16T11:29:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/multiple-vulnerabilities-in-gosign-desktop.html</loc>
			<lastmod>2025-11-16T11:27:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/google-sues-operators-of-lighthouse.html</loc>
			<lastmod>2025-11-16T11:25:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/document-tech-firm-hit-as.html</loc>
			<lastmod>2025-11-16T11:24:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/16/doj-continues-crackdown-on-north.html</loc>
			<lastmod>2025-11-16T11:23:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/15/somalia-reels-after-massive-evisa.html</loc>
			<lastmod>2025-11-15T12:57:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/splunk-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-14T15:30:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/microsoft-edge-security-advisory-av.html</loc>
			<lastmod>2025-11-14T15:29:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/the-good-the-bad-and.html</loc>
			<lastmod>2025-11-14T15:29:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/millions-of-sites-at-risk.html</loc>
			<lastmod>2025-11-14T15:27:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/researchers-find-serious-ai-bugs.html</loc>
			<lastmod>2025-11-14T15:26:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/be-careful-responding-to-unexpected.html</loc>
			<lastmod>2025-11-14T15:25:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-14T15:25:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/samsung-mobile-security-advisory-av.html</loc>
			<lastmod>2025-11-14T15:24:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/fortinet-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-14T15:24:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/cisa-warns-of-active-attacks.html</loc>
			<lastmod>2025-11-14T15:23:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/north-korean-hackers-turn-json.html</loc>
			<lastmod>2025-11-14T15:22:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/personal-details-of-tate-galleries.html</loc>
			<lastmod>2025-11-14T15:21:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/critical-cve-flaw-lets-hackers.html</loc>
			<lastmod>2025-11-14T15:21:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/us-strike-force-takes-aim.html</loc>
			<lastmod>2025-11-14T15:20:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/deepwatch-axonius-carry-out-steep.html</loc>
			<lastmod>2025-11-14T15:19:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/cyber-threat-intelligence-report-nov.html</loc>
			<lastmod>2025-11-14T13:25:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/checkoutcom-hacked-shinyhunters-breached-cloud.html</loc>
			<lastmod>2025-11-14T11:29:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/chinese-tech-firm-leak-reportedly.html</loc>
			<lastmod>2025-11-14T11:28:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/clp-ransomware-group-allegedly-claims.html</loc>
			<lastmod>2025-11-14T11:27:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/the-ad-blocker-that-fights.html</loc>
			<lastmod>2025-11-14T08:11:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/state-of-ransomware-in-q.html</loc>
			<lastmod>2025-11-14T07:38:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/google-is-easing-up-on.html</loc>
			<lastmod>2025-11-14T07:37:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/fortinet-zeroday-exploited.html</loc>
			<lastmod>2025-11-14T07:36:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/orgs-move-to-sso-passkeys.html</loc>
			<lastmod>2025-11-14T07:35:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/cisa-warns-feds-to-fully.html</loc>
			<lastmod>2025-11-14T07:34:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/14/washington-post-data-breach-impacts.html</loc>
			<lastmod>2025-11-14T07:34:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/13/adnauseam-adnauseam-is-a-free.html</loc>
			<lastmod>2025-11-13T23:13:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/13/cybersecurity-firm-deepwatch-lays-off.html</loc>
			<lastmod>2025-11-13T21:59:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/13/b-email-addresses-and-b.html</loc>
			<lastmod>2025-11-13T21:52:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/cisa-adds-three-known-exploited.html</loc>
			<lastmod>2025-11-12T23:32:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/german-extremist-arrested.html</loc>
			<lastmod>2025-11-12T23:31:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/hackers-exploited-citrix-cisco-ise.html</loc>
			<lastmod>2025-11-12T23:31:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/danabot-malware-is-back.html</loc>
			<lastmod>2025-11-12T23:30:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/hackers-abuse-triofox-antivirus.html</loc>
			<lastmod>2025-11-12T23:29:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/russian-hacker-admits-helping-yanluowang.html</loc>
			<lastmod>2025-11-12T11:53:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/australias-spy-chief-warns-of.html</loc>
			<lastmod>2025-11-12T11:36:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/judge-rules-flock-surveillance-images.html</loc>
			<lastmod>2025-11-12T11:35:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/phishing-tool-uses-smart-redirects.html</loc>
			<lastmod>2025-11-12T11:32:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/hyundai-data-breach-may-have.html</loc>
			<lastmod>2025-11-12T11:29:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/another-chinese-security-firm-has.html</loc>
			<lastmod>2025-11-12T11:28:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/taiwan-amendment-to-personal-data.html</loc>
			<lastmod>2025-11-12T07:36:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/chipmaker-patch-tuesday-over-vulnerabilities.html</loc>
			<lastmod>2025-11-12T07:35:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/update-now-november-patch-tuesday.html</loc>
			<lastmod>2025-11-12T07:34:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/highseverity-vulnerabilities-patched-by-ivanti.html</loc>
			<lastmod>2025-11-12T07:33:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/synnovis-notifying-uk-providers-of.html</loc>
			<lastmod>2025-11-12T07:32:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/clickfix-may-be-the-biggest.html</loc>
			<lastmod>2025-11-12T07:27:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/gootloader-is-back-using-a.html</loc>
			<lastmod>2025-11-12T07:26:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/glassworm-returns.html</loc>
			<lastmod>2025-11-12T07:25:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/owasp-highlights-supply-chain-risks.html</loc>
			<lastmod>2025-11-12T07:24:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/cisa-orders-feds-to-patch.html</loc>
			<lastmod>2025-11-12T07:23:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/quantum-route-redirect-phaas.html</loc>
			<lastmod>2025-11-12T07:23:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/apt-hackers-abuse-google-find.html</loc>
			<lastmod>2025-11-12T07:22:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/12/globallogic-warns-employees-of-data.html</loc>
			<lastmod>2025-11-12T07:21:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/iranianbacked-cyber-toufan-hacks-israeli.html</loc>
			<lastmod>2025-11-11T11:43:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/tehranlinked-hacking-group-leaks-technical.html</loc>
			<lastmod>2025-11-11T11:42:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/healthcare-firm-apparently-hit-by.html</loc>
			<lastmod>2025-11-11T11:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/samsung-mobile-devices-outofbounds-write.html</loc>
			<lastmod>2025-11-11T09:05:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/threat-hunting-vs-threat-intelligence.html</loc>
			<lastmod>2025-11-11T09:04:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/hack-halts-dutch-broadcaster.html</loc>
			<lastmod>2025-11-11T09:03:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/clickfix-campaign-targets-hotels-spurs.html</loc>
			<lastmod>2025-11-11T09:02:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/11/reasons-why-attackers-are-phishing.html</loc>
			<lastmod>2025-11-11T09:01:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/nationwide-us-government-shutdown-travel.html</loc>
			<lastmod>2025-11-07T09:38:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/danish-authorities-in-rush-to.html</loc>
			<lastmod>2025-11-07T09:13:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/gootloader-malware-is-back-with.html</loc>
			<lastmod>2025-11-07T09:12:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/eset-apt-activity-report-q.html</loc>
			<lastmod>2025-11-07T09:12:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/malicious-infrastructure-finds-stability-with.html</loc>
			<lastmod>2025-11-07T09:11:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/07/china-sentences-myanmar-scam-kingpins.html</loc>
			<lastmod>2025-11-07T09:10:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/crossed-wires-a-case-study.html</loc>
			<lastmod>2025-11-06T09:14:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/how-an-attacker-drained-m.html</loc>
			<lastmod>2025-11-06T09:13:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/advances-in-threat-actor-usage.html</loc>
			<lastmod>2025-11-06T09:12:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/securing-critical-infrastructure.html</loc>
			<lastmod>2025-11-06T09:11:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/us-sanctions-more-north-koreans.html</loc>
			<lastmod>2025-11-06T09:11:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/ms-pegs-cyberattack-cleanup-costs.html</loc>
			<lastmod>2025-11-06T09:10:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/06/polish-loan-platform-hacked.html</loc>
			<lastmod>2025-11-06T09:09:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/my-serviceottawa-data-breach-affects.html</loc>
			<lastmod>2025-11-04T20:50:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/how-to-optout-of-airlines.html</loc>
			<lastmod>2025-11-04T15:31:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/apple-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-04T15:29:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-04T15:29:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/europol-and-eurojust-dismantle-million.html</loc>
			<lastmod>2025-11-04T15:28:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/google-fixed-a-critical-remote.html</loc>
			<lastmod>2025-11-04T15:26:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/tenable-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-04T15:26:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/how-to-disable-windows-recall.html</loc>
			<lastmod>2025-11-04T15:25:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/hypervisors-the-next-big-target.html</loc>
			<lastmod>2025-11-04T15:24:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/analysis-of-ngate-malware-campaign.html</loc>
			<lastmod>2025-11-04T07:48:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/fewer-data-breaches-in-australia.html</loc>
			<lastmod>2025-11-04T07:45:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/hundreds-of-residents-details-shared.html</loc>
			<lastmod>2025-11-04T07:43:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/ubiquiti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-11-04T07:41:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/new-dante-spyware-linked-to.html</loc>
			<lastmod>2025-11-04T07:40:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/threat-actors-weaponize-judicial-documents.html</loc>
			<lastmod>2025-11-04T07:39:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/crooks-exploit-rmm-software-to.html</loc>
			<lastmod>2025-11-04T07:38:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/operation-skycloak-deploys-torenabled-openssh.html</loc>
			<lastmod>2025-11-04T07:37:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/apple-patches-webkit-vulnerabilities-securityweek.html</loc>
			<lastmod>2025-11-04T07:36:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/google-big-sleep-found-five.html</loc>
			<lastmod>2025-11-04T07:35:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/new-backdoor-sesameop-abuses-openai.html</loc>
			<lastmod>2025-11-04T07:34:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/former-ransomware-negotiators-allegedly-targeted.html</loc>
			<lastmod>2025-11-04T07:33:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/data-theft-hits-behavioral-health.html</loc>
			<lastmod>2025-11-04T07:32:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/04/badcandy-implant-hits-cisco-devices.html</loc>
			<lastmod>2025-11-04T07:31:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/us-appeals-court-lowers-burden.html</loc>
			<lastmod>2025-11-03T18:39:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/new-httptroy-backdoor-poses-as.html</loc>
			<lastmod>2025-11-03T18:38:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/hacktivists-increasingly-target-industrial-control.html</loc>
			<lastmod>2025-11-03T18:37:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/rhysida-ransomware-exploits-microsoft-certificate.html</loc>
			<lastmod>2025-11-03T18:36:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/cyberespionage-campaign-mirroring-sandworm-ttps.html</loc>
			<lastmod>2025-11-03T18:36:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/you-may-be-getting-a.html</loc>
			<lastmod>2025-11-03T11:56:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/scans-for-port-tcp.html</loc>
			<lastmod>2025-11-03T07:37:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/03/drawn-to-danger-windows-graphics.html</loc>
			<lastmod>2025-11-03T07:36:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/university-of-pennsylvania-says-it.html</loc>
			<lastmod>2025-11-02T13:25:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/veradigms-breach-claims-under-scrutiny.html</loc>
			<lastmod>2025-11-02T13:24:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/webinsecurity-blog-dead-domain-discovery.html</loc>
			<lastmod>2025-11-02T08:10:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/chinalinked-unc-exploits-windows-zeroday.html</loc>
			<lastmod>2025-11-02T08:09:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/new-kurdish-hacktivists-hezi-rash.html</loc>
			<lastmod>2025-11-02T08:08:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/badcandy-webshell-threatens-unpatched-cisco.html</loc>
			<lastmod>2025-11-02T08:07:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/ukrainian-extradited-to-us-over.html</loc>
			<lastmod>2025-11-02T08:06:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/02/denmark-withdraws-chat-control-proposal.html</loc>
			<lastmod>2025-11-02T08:05:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/01/proton-exposes-million-stolen-credentials.html</loc>
			<lastmod>2025-11-01T20:45:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/01/russia-arrests-meduza-stealer-developers.html</loc>
			<lastmod>2025-11-01T11:29:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/01/massive-great-firewall-leak-exposes.html</loc>
			<lastmod>2025-11-01T11:28:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/01/nearly-billion-personal-data-points.html</loc>
			<lastmod>2025-11-01T11:28:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/11/01/hackers-threaten-to-leak-data.html</loc>
			<lastmod>2025-11-01T11:26:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/31/top-attacks-and-breaches.html</loc>
			<lastmod>2025-10-31T07:22:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/31/hungarian-and-belgian-diplomatic-entities.html</loc>
			<lastmod>2025-10-31T06:49:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/31/wordpress-security-plugin-exposes-private.html</loc>
			<lastmod>2025-10-31T06:48:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/31/cisa-and-nsa-share-tips.html</loc>
			<lastmod>2025-10-31T06:47:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/31/hezi-rash-rising-kurdish-hacktivist.html</loc>
			<lastmod>2025-10-31T06:46:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/how-scammers-use-your-data.html</loc>
			<lastmod>2025-10-30T15:33:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/yearlong-nationstate-hack-hits-us.html</loc>
			<lastmod>2025-10-30T15:32:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/brush-exploit-can-cause-any.html</loc>
			<lastmod>2025-10-30T15:30:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/spywareplugged-chatgpt-dalle-and-whatsapp.html</loc>
			<lastmod>2025-10-30T15:29:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/nydfs-releases-guidance-on-thirdparty.html</loc>
			<lastmod>2025-10-30T15:28:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/massive-surge-of-nfc-relay.html</loc>
			<lastmod>2025-10-30T15:24:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/top-attacks-and-breaches.html</loc>
			<lastmod>2025-10-30T07:03:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/experts-reports-sharp-increase-in.html</loc>
			<lastmod>2025-10-30T06:48:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/ransomware-hackers-look-for-new.html</loc>
			<lastmod>2025-10-30T06:47:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/oracle-ebs-attack-victims-may.html</loc>
			<lastmod>2025-10-30T06:47:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/firms-see-surge-in-aipowered.html</loc>
			<lastmod>2025-10-30T06:46:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/microsoft-dns-outage-impacts-azure.html</loc>
			<lastmod>2025-10-30T06:45:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/aisuru-botnet-shifts-from-ddos.html</loc>
			<lastmod>2025-10-30T06:44:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/data-leak-outs-students-of.html</loc>
			<lastmod>2025-10-30T05:49:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/linkedin-gives-you-until-monday.html</loc>
			<lastmod>2025-10-30T05:47:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/microsoft-azure-cloud-apps-shut.html</loc>
			<lastmod>2025-10-30T05:46:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/varonis-lays-off-of-staff.html</loc>
			<lastmod>2025-10-30T05:44:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/30/hospital-system-flaws-could-leak.html</loc>
			<lastmod>2025-10-30T05:43:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/top-attacks-and-breaches.html</loc>
			<lastmod>2025-10-29T07:24:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/bots-bread-and-the-battle.html</loc>
			<lastmod>2025-10-29T06:18:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/scammers-target-international-students-by.html</loc>
			<lastmod>2025-10-29T06:16:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/new-attack-targets-ddr-memory.html</loc>
			<lastmod>2025-10-29T06:12:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/npm-packages-caught-stealing-developer.html</loc>
			<lastmod>2025-10-29T06:10:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/chrome-to-turn-https-on.html</loc>
			<lastmod>2025-10-29T06:09:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/suspected-nationstate-threat-actor-uses.html</loc>
			<lastmod>2025-10-29T06:08:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/ad-and-pr-giant-dentsu.html</loc>
			<lastmod>2025-10-29T06:07:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/xwiki-vulnerability-exploited-in-cryptocurrency.html</loc>
			<lastmod>2025-10-29T06:06:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/openai-restructures-nonprofit-foundation-retains.html</loc>
			<lastmod>2025-10-29T06:05:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/warnings-mount-over-windows-server.html</loc>
			<lastmod>2025-10-29T06:03:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/aktia-bank-has-been-fined.html</loc>
			<lastmod>2025-10-29T05:57:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/active-water-saci-campaign-spreading.html</loc>
			<lastmod>2025-10-29T05:54:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/jingle-thief-highlights-retail-cyber.html</loc>
			<lastmod>2025-10-29T05:54:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/new-herodotus-android-malware-fakes.html</loc>
			<lastmod>2025-10-29T05:53:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/new-atroposia-malware-comes-with.html</loc>
			<lastmod>2025-10-29T05:52:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/bidi-swap-the-bidirectional-text.html</loc>
			<lastmod>2025-10-29T05:51:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/crypto-wasted-bluenoroffs-ghost-mirage.html</loc>
			<lastmod>2025-10-29T05:51:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/29/around-countries-sign-new-un.html</loc>
			<lastmod>2025-10-29T05:50:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/veeam-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-28T14:08:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/poc-code-drops-for-remotely.html</loc>
			<lastmod>2025-10-28T14:08:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/more-collins-aerospace-hacking-fallout.html</loc>
			<lastmod>2025-10-28T14:07:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/iranian-intellinked-cybersecurity-school-hit.html</loc>
			<lastmod>2025-10-28T14:05:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/ransomware-profits-drop-as-victims.html</loc>
			<lastmod>2025-10-28T07:04:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/italian-spyware-vendor-linked-to.html</loc>
			<lastmod>2025-10-28T07:03:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/qnap-warns-of-critical-aspnet.html</loc>
			<lastmod>2025-10-28T07:02:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/svenska-kraftnt-has-been-the.html</loc>
			<lastmod>2025-10-28T07:02:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/the-forumtroll-and-his-colleagues.html</loc>
			<lastmod>2025-10-28T06:59:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/hackers-steal-discord-accounts-with.html</loc>
			<lastmod>2025-10-28T06:59:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/the-state-of-exposure-management.html</loc>
			<lastmod>2025-10-28T06:58:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/28/uncovering-qilin-attack-methods-exposed.html</loc>
			<lastmod>2025-10-28T06:56:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/safepay-ransomware-group-claims-the.html</loc>
			<lastmod>2025-10-27T11:22:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/ai-writes-code-like-a.html</loc>
			<lastmod>2025-10-27T11:17:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/wordfence-blocks-m-attacks-exploiting.html</loc>
			<lastmod>2025-10-27T11:15:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/chrome-zeroday-exploitation-linked-to.html</loc>
			<lastmod>2025-10-27T11:14:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/ransomware-payments-dropped-in-q.html</loc>
			<lastmod>2025-10-27T11:13:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/states-sign-first-global-un.html</loc>
			<lastmod>2025-10-27T11:11:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-27T11:10:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-27T11:10:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-27T11:09:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/new-hyperrat-android-malware-sold.html</loc>
			<lastmod>2025-10-27T11:08:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/massive-chinalinked-smishing-campaign-leveraged.html</loc>
			<lastmod>2025-10-27T11:07:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/crafted-urls-can-trick-openai.html</loc>
			<lastmod>2025-10-27T11:06:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/how-to-turn-off-meta.html</loc>
			<lastmod>2025-10-27T11:05:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/domewatch-leak-exposed-personal-data.html</loc>
			<lastmod>2025-10-27T11:03:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/new-firefox-extensions-required-to.html</loc>
			<lastmod>2025-10-27T07:20:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/27/x-to-retire-twittercom-users.html</loc>
			<lastmod>2025-10-27T07:19:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/25/openai-is-connecting-all-company.html</loc>
			<lastmod>2025-10-25T13:24:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/25/sneaky-mermaid-attack-in-microsoft.html</loc>
			<lastmod>2025-10-25T13:07:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/25/amazon-says-automation-bug-caused.html</loc>
			<lastmod>2025-10-25T13:04:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/25/microsoft-teams-will-start-snitching.html</loc>
			<lastmod>2025-10-25T13:02:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/25/claude-memory-just-launched-and.html</loc>
			<lastmod>2025-10-25T12:57:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/chatgpt-was-down-thursday-what.html</loc>
			<lastmod>2025-10-24T07:04:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/hackers-posing-as-kyrgyz-officials.html</loc>
			<lastmod>2025-10-24T07:04:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/hackers-exploiting-critical-sessionreaper-flaw.html</loc>
			<lastmod>2025-10-24T07:03:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/pwnown-day-hackers-exploit-zerodays.html</loc>
			<lastmod>2025-10-24T07:02:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/iranian-hackers-targeted-over-govt.html</loc>
			<lastmod>2025-10-24T07:02:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/north-korean-lazarus-hackers-targeted.html</loc>
			<lastmod>2025-10-24T07:01:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/spoofed-ai-sidebars-can-trick.html</loc>
			<lastmod>2025-10-24T07:01:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/24/i-ditched-linux-for-windows.html</loc>
			<lastmod>2025-10-24T07:00:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/veeam-to-buy-securiti-ai.html</loc>
			<lastmod>2025-10-22T08:18:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/foreign-hackers-breached-a-us.html</loc>
			<lastmod>2025-10-22T08:14:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/russia-pressures-apple-to-make.html</loc>
			<lastmod>2025-10-22T08:13:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/hackers-exploit-zerodays-on-first.html</loc>
			<lastmod>2025-10-22T08:12:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/polaredge-targets-cisco-asus-qnap.html</loc>
			<lastmod>2025-10-22T08:12:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/salt-typhoon-targets-european-telecom.html</loc>
			<lastmod>2025-10-22T08:11:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/us-court-blocks-spyware-maker.html</loc>
			<lastmod>2025-10-22T08:11:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/selfpropagating-glassworm-attacks-vs-code.html</loc>
			<lastmod>2025-10-22T08:10:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/is-your-car-a-byod.html</loc>
			<lastmod>2025-10-22T08:09:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/22/dnseu-private-dns-service-shuts.html</loc>
			<lastmod>2025-10-22T08:09:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/21/satellites-are-leaking-the-worlds.html</loc>
			<lastmod>2025-10-21T15:33:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/21/the-web-page-discusses-the.html</loc>
			<lastmod>2025-10-21T13:38:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/21/prisoner-hacks-his-prison-it.html</loc>
			<lastmod>2025-10-21T12:09:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/21/russian-hackers-suspected-of-leaking.html</loc>
			<lastmod>2025-10-21T12:08:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/21/hundreds-of-masked-ice-agents.html</loc>
			<lastmod>2025-10-21T12:07:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/muji-suspends-online-store-due.html</loc>
			<lastmod>2025-10-20T17:31:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-20T15:48:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-20T15:48:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/capi-backdoor-targets-russias-auto.html</loc>
			<lastmod>2025-10-20T15:47:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/chinese-gangs-made-over-billion.html</loc>
			<lastmod>2025-10-20T15:46:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/hackers-say-they-have-personal.html</loc>
			<lastmod>2025-10-20T15:45:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-20T15:44:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/microsoft-edge-security-advisory-av.html</loc>
			<lastmod>2025-10-20T15:43:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-10-20T15:43:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/connectwise-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-20T15:42:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/aws-outage-takes-half-the.html</loc>
			<lastmod>2025-10-20T15:42:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/uk-ministry-of-defense-probes.html</loc>
			<lastmod>2025-10-20T15:40:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/windows-refugees-flock-to-linux.html</loc>
			<lastmod>2025-10-20T06:31:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/extortion-and-ransomware-drive-over.html</loc>
			<lastmod>2025-10-20T06:30:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/europol-dismantles-sim-farm-network.html</loc>
			<lastmod>2025-10-20T06:29:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/american-airlines-subsidiary-envoy-confirms.html</loc>
			<lastmod>2025-10-20T06:28:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/20/google-ads-for-fake-homebrew.html</loc>
			<lastmod>2025-10-20T06:27:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/winos-hackers-expand-to-japan.html</loc>
			<lastmod>2025-10-18T15:33:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/chinese-hackers-blamed-for-severe.html</loc>
			<lastmod>2025-10-18T11:13:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/envoy-air-targeted-in-oraclelinked.html</loc>
			<lastmod>2025-10-18T11:10:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/notorious-hacker-group-doxxes-ice.html</loc>
			<lastmod>2025-10-18T11:08:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/us-scrambles-to-patch-f.html</loc>
			<lastmod>2025-10-18T10:26:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/crossborder-phishing-attacks-spreads-across.html</loc>
			<lastmod>2025-10-18T10:25:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/prosper-market-data-breach-affects.html</loc>
			<lastmod>2025-10-18T10:23:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/18/madman-theory-spurs-crazy-scattered.html</loc>
			<lastmod>2025-10-18T10:22:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/orion-by-kagi-pairs-safariclass.html</loc>
			<lastmod>2025-10-17T08:04:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/080549.html</loc>
			<lastmod>2025-10-17T07:05:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/extortion-and-ransomware-drive-over.html</loc>
			<lastmod>2025-10-17T07:05:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/microsoft-revokes-certs-used-to.html</loc>
			<lastmod>2025-10-17T06:56:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/prosper-data-breach-puts-million.html</loc>
			<lastmod>2025-10-17T06:56:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/highest-ever-severity-score-assigned.html</loc>
			<lastmod>2025-10-17T06:55:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/hackers-steal-sensitive-data-from.html</loc>
			<lastmod>2025-10-17T06:53:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/email-bombs-exploit-lax-authentication.html</loc>
			<lastmod>2025-10-17T06:53:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/machine-learning-meets-malware-how.html</loc>
			<lastmod>2025-10-17T06:48:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/microsoft-disrupts-ransomware-attacks-targeting.html</loc>
			<lastmod>2025-10-17T06:47:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/074724.html</loc>
			<lastmod>2025-10-17T06:47:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/qilin-ransomware-and-the-ghost.html</loc>
			<lastmod>2025-10-17T06:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/north-korean-hackers-seen-using.html</loc>
			<lastmod>2025-10-17T06:46:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/gladinet-fixes-actively-exploited-zeroday.html</loc>
			<lastmod>2025-10-17T06:45:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/researchers-report-rare-intrusion-by.html</loc>
			<lastmod>2025-10-17T06:45:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/shifts-in-the-underground-the.html</loc>
			<lastmod>2025-10-17T06:44:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/operation-zero-disco-attackers-exploit.html</loc>
			<lastmod>2025-10-17T06:44:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/17/yikes-watchguard-fireware-os-ikev.html</loc>
			<lastmod>2025-10-17T06:43:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/misconfigured-netcorecloud-server-exposed-b.html</loc>
			<lastmod>2025-10-16T15:34:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/key-to-qilins-ransomware-success.html</loc>
			<lastmod>2025-10-16T15:32:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/helium-browser.html</loc>
			<lastmod>2025-10-16T10:51:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/cisco-routers-hacked-for-rootkit.html</loc>
			<lastmod>2025-10-16T07:03:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/signal-in-the-noise-what.html</loc>
			<lastmod>2025-10-16T06:21:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/16/from-detection-to-patch-fortra.html</loc>
			<lastmod>2025-10-16T06:13:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/qilin-ransomware-announced-new-victims.html</loc>
			<lastmod>2025-10-15T16:51:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-10-15T16:50:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-15T16:49:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/al-security-incident-impacting-f.html</loc>
			<lastmod>2025-10-15T16:49:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/archivetoday-inside-the-web-archiving.html</loc>
			<lastmod>2025-10-15T16:15:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/microsoft-security-advisory-october-monthly.html</loc>
			<lastmod>2025-10-15T11:12:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/adobe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-15T11:11:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/maverick-a-new-banking-trojan.html</loc>
			<lastmod>2025-10-15T11:10:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/elasticsearch-leak-exposes-billion-records.html</loc>
			<lastmod>2025-10-15T11:09:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/fortinet-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-15T11:08:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/over-vs-code-extensions-exposed.html</loc>
			<lastmod>2025-10-15T11:06:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/ncsc-warns-companies-to-prepare.html</loc>
			<lastmod>2025-10-15T11:05:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/f-data-breach-nationstate-attackers.html</loc>
			<lastmod>2025-10-15T11:04:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/f-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-15T11:03:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/dsv-targeted-by-new-logisticsfocused.html</loc>
			<lastmod>2025-10-15T07:06:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/mango-warns-of-data-breach.html</loc>
			<lastmod>2025-10-15T07:04:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/prepare-for-californias-data-breach.html</loc>
			<lastmod>2025-10-15T07:03:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/vietnam-airlines-reports-data-breach.html</loc>
			<lastmod>2025-10-15T07:00:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/lynch-carpenter-investigates-claims-in.html</loc>
			<lastmod>2025-10-15T06:59:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/canadian-tire-says-customer-info.html</loc>
			<lastmod>2025-10-15T06:58:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/highseverity-vulnerabilities-patched-by-fortinet.html</loc>
			<lastmod>2025-10-15T06:55:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/red-hat-ai-helps-enterprises.html</loc>
			<lastmod>2025-10-15T06:54:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/phantomvai-loader-delivers-a-range.html</loc>
			<lastmod>2025-10-15T06:52:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/mysterious-elephant-apt-ttps-and.html</loc>
			<lastmod>2025-10-15T06:51:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/microsoft-patches-three-zerodays-actively.html</loc>
			<lastmod>2025-10-15T06:50:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/fake-google-job-offer-email.html</loc>
			<lastmod>2025-10-15T06:47:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/071641.html</loc>
			<lastmod>2025-10-15T06:16:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/chinese-gang-used-arcgis-as.html</loc>
			<lastmod>2025-10-15T06:15:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/british-govt-agents-demand-action.html</loc>
			<lastmod>2025-10-15T06:15:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/supply-chain-attacks-moving-from.html</loc>
			<lastmod>2025-10-15T06:14:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/secure-boot-bypass-risk-threatens.html</loc>
			<lastmod>2025-10-15T06:14:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/confidential-virtual-machine-flaw-amd.html</loc>
			<lastmod>2025-10-15T06:13:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/microsoft-restricts-ie-mode-access.html</loc>
			<lastmod>2025-10-15T06:13:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/15/microsoft-october-patch-tuesday-fixes.html</loc>
			<lastmod>2025-10-15T06:12:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/visas-trusted-agent-protocol-sets.html</loc>
			<lastmod>2025-10-14T11:47:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/rmpocalypse-single-byte-write-shatters.html</loc>
			<lastmod>2025-10-14T11:46:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/pixelstealing-pixnapping-attack-targets-android.html</loc>
			<lastmod>2025-10-14T11:45:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-14T11:43:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/man-stores-aigenerated-robot-porn.html</loc>
			<lastmod>2025-10-14T11:43:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-14T11:41:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-14T11:40:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-10-14T11:39:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/levelblue-acquires-cybereason-to-expand.html</loc>
			<lastmod>2025-10-14T11:38:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/ivanti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-14T11:37:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/sap-security-advisory-october-monthly.html</loc>
			<lastmod>2025-10-14T11:36:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/europe-postpones-chat-control-vote.html</loc>
			<lastmod>2025-10-14T11:35:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/prorussian-twonet-hacktivists-target-water.html</loc>
			<lastmod>2025-10-14T11:34:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/chinese-owners-locked-out-of.html</loc>
			<lastmod>2025-10-14T11:33:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/anthony-albaneses-phone-number-is.html</loc>
			<lastmod>2025-10-14T11:23:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/hackers-leak-medical-reports-after.html</loc>
			<lastmod>2025-10-14T11:22:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/university-of-st-thomas-data.html</loc>
			<lastmod>2025-10-14T11:21:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/k-hongkongers-data-leaked-after.html</loc>
			<lastmod>2025-10-14T11:20:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/revealed-hundreds-of-passwords-linked.html</loc>
			<lastmod>2025-10-14T11:19:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/built-to-fail-the-structural.html</loc>
			<lastmod>2025-10-14T08:47:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/ukraine-takes-steps-to-launch.html</loc>
			<lastmod>2025-10-14T06:36:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/why-signals-postquantum-makeover-is.html</loc>
			<lastmod>2025-10-14T06:36:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/harvard-investigating-breach-linked-to.html</loc>
			<lastmod>2025-10-14T06:35:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/new-rustbased-malware-chaosbot-uses.html</loc>
			<lastmod>2025-10-14T06:34:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/massive-multicountry-botnet-targets-rdp.html</loc>
			<lastmod>2025-10-14T06:34:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/fear-and-loathing-in-the.html</loc>
			<lastmod>2025-10-14T06:33:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/14/sonicwall-vpn-accounts-breached-using.html</loc>
			<lastmod>2025-10-14T06:32:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/123856.html</loc>
			<lastmod>2025-10-13T11:38:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/071935.html</loc>
			<lastmod>2025-10-13T06:19:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/google-mandiant-expose-malware-and.html</loc>
			<lastmod>2025-10-13T06:19:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/extortion-group-leaks-millions-of.html</loc>
			<lastmod>2025-10-13T06:18:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/esentire-uncovers-chaosbot-a-rustbased.html</loc>
			<lastmod>2025-10-13T06:17:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/spanish-authorities-dismantle-gxc-team.html</loc>
			<lastmod>2025-10-13T06:16:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/astaroth-trojan-abuses-github-to.html</loc>
			<lastmod>2025-10-13T06:16:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/researchers-warn-rondodox-botnet-is.html</loc>
			<lastmod>2025-10-13T06:15:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/invoicely-database-leak-exposes-sensitive.html</loc>
			<lastmod>2025-10-13T06:14:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/this-free-productivity-app-became.html</loc>
			<lastmod>2025-10-13T06:03:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/cybersecurity-newsletter-weekly-discord-red.html</loc>
			<lastmod>2025-10-13T06:00:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/this-simple-devilsadvocate-prompt-turned.html</loc>
			<lastmod>2025-10-13T05:59:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/13/windows-october-security-update-adds.html</loc>
			<lastmod>2025-10-13T05:57:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/12/goodbye-to-ai-meta-ceo.html</loc>
			<lastmod>2025-10-12T15:34:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/12/nintendo-allegedly-hacked-by-crimson.html</loc>
			<lastmod>2025-10-12T12:32:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/multiple-wordpress-vulnerabilities-affect-travel.html</loc>
			<lastmod>2025-10-11T18:37:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/happy-gilmore-producer-buys-spyware.html</loc>
			<lastmod>2025-10-11T18:19:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/wireless-power-banks-recalled-in.html</loc>
			<lastmod>2025-10-11T18:05:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/hyperliquid-user-loses-million-to.html</loc>
			<lastmod>2025-10-11T13:24:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/breachforums-seized-but-hackers-say.html</loc>
			<lastmod>2025-10-11T13:23:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/11/hackers-leak-qantas-data-containing.html</loc>
			<lastmod>2025-10-11T13:22:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/clplinked-hackers-breach-dozens-of.html</loc>
			<lastmod>2025-10-10T11:28:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/saas-breaches-start-with-tokens.html</loc>
			<lastmod>2025-10-10T07:35:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/074835.html</loc>
			<lastmod>2025-10-10T06:48:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/how-we-trained-an-ml.html</loc>
			<lastmod>2025-10-10T06:47:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/how-your-ai-chatbot-can.html</loc>
			<lastmod>2025-10-10T06:47:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/responding-to-cloud-incidents-a.html</loc>
			<lastmod>2025-10-10T06:46:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/global-cyber-threats-september-attack.html</loc>
			<lastmod>2025-10-10T06:46:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/discord-says-users-had-government.html</loc>
			<lastmod>2025-10-10T06:45:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/hacktivists-target-critical-infrastructure-hit.html</loc>
			<lastmod>2025-10-10T06:44:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/kubernetes-kicks-down-azure-front.html</loc>
			<lastmod>2025-10-10T06:43:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/sonicwall-breach-hits-every-cloud.html</loc>
			<lastmod>2025-10-10T06:43:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/10/rondodox-botnet-targets-nday-flaws.html</loc>
			<lastmod>2025-10-10T06:42:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/the-evolution-of-chaos-ransomware.html</loc>
			<lastmod>2025-10-09T11:14:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/the-clickfix-factory-first-exposure.html</loc>
			<lastmod>2025-10-09T11:14:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/new-filefix-attack-uses-cache.html</loc>
			<lastmod>2025-10-09T11:13:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/lockbit-qilin-dragonforce-join-forces.html</loc>
			<lastmod>2025-10-09T11:11:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/microsoft-outage-blocks-access-to.html</loc>
			<lastmod>2025-10-09T11:10:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/employees-regularly-paste-company-secrets.html</loc>
			<lastmod>2025-10-09T11:09:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/crimson-collective-hackers-target-aws.html</loc>
			<lastmod>2025-10-09T11:08:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/salesforce-says-it-wont-pay.html</loc>
			<lastmod>2025-10-09T11:07:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/russian-hackers-turn-to-ai.html</loc>
			<lastmod>2025-10-09T11:07:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/09/germany-slams-brakes-on-eus.html</loc>
			<lastmod>2025-10-09T11:05:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/too-salty-to-handle-exposing.html</loc>
			<lastmod>2025-10-08T08:11:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/security-concerns-shadow-vibe-coding.html</loc>
			<lastmod>2025-10-08T08:11:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/hospital-insider-breach-lasted-years.html</loc>
			<lastmod>2025-10-08T08:10:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/russia-blocks-mobile-internet-for.html</loc>
			<lastmod>2025-10-08T08:09:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/draftkings-warns-users-of-credential.html</loc>
			<lastmod>2025-10-08T07:33:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/ransomware-group-claims-attack-on.html</loc>
			<lastmod>2025-10-08T07:33:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/severe-figma-mcp-vulnerability-lets.html</loc>
			<lastmod>2025-10-08T07:32:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/openai-finds-growing-exploitation-of.html</loc>
			<lastmod>2025-10-08T07:30:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/north-korean-hackers-stole-over.html</loc>
			<lastmod>2025-10-08T07:30:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/brazil-data-protection-authority-becomes.html</loc>
			<lastmod>2025-10-08T07:28:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/08/vietnam-releasing-draft-ai-law.html</loc>
			<lastmod>2025-10-08T07:26:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/of-adults-say-theyve-had.html</loc>
			<lastmod>2025-10-06T16:07:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/deloitte-will-refund-australian-government.html</loc>
			<lastmod>2025-10-06T16:04:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/phishers-target-password-users-with.html</loc>
			<lastmod>2025-10-06T14:31:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/spyware-in-fake-signal-and.html</loc>
			<lastmod>2025-10-06T14:30:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/redis-security-advisory-av-canadian.html</loc>
			<lastmod>2025-10-06T14:29:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/daily-cyber-threat-intelligence-briefing.html</loc>
			<lastmod>2025-10-06T07:09:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/renault-informs-customers-of-supply.html</loc>
			<lastmod>2025-10-06T06:06:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/parkmobile-pays-each-for-data.html</loc>
			<lastmod>2025-10-06T06:05:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/nsw-flood-victims-personal-details.html</loc>
			<lastmod>2025-10-06T06:04:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/researchers-find-and-help-fix.html</loc>
			<lastmod>2025-10-06T06:02:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/ai-chatbots-that-butter-you.html</loc>
			<lastmod>2025-10-06T05:59:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/from-threats-to-apology-hackers.html</loc>
			<lastmod>2025-10-06T05:59:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/hacked-ford-screens-put-antirto.html</loc>
			<lastmod>2025-10-06T05:58:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/zimbra-users-targeted-in-zeroday.html</loc>
			<lastmod>2025-10-06T05:57:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/oracle-ebusiness-suite-zeroday-exploited.html</loc>
			<lastmod>2025-10-06T05:56:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/beer-giant-asahi-says-data.html</loc>
			<lastmod>2025-10-06T05:56:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/patch-now-dell-unityvsa-flaw.html</loc>
			<lastmod>2025-10-06T05:54:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/data-breach-at-doctors-imaging.html</loc>
			<lastmod>2025-10-06T05:53:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/06/android-spyware-targets-uae-messaging.html</loc>
			<lastmod>2025-10-06T05:52:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/agentic-ai-is-reshaping-cybersecurity.html</loc>
			<lastmod>2025-10-05T17:04:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/inside-the-trinity-of-chaos.html</loc>
			<lastmod>2025-10-05T11:32:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/bill-c-what-operators-of.html</loc>
			<lastmod>2025-10-05T11:29:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/i-have-your-nudes-and.html</loc>
			<lastmod>2025-10-05T11:27:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/firefighter-recruitment-site-hack-exposes.html</loc>
			<lastmod>2025-10-05T11:25:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/discord-customer-service-data-breach.html</loc>
			<lastmod>2025-10-05T11:24:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/05/almost-billion-salesforce-records-stolen.html</loc>
			<lastmod>2025-10-05T11:23:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/cyberattack-on-israeli-hospital-leaks.html</loc>
			<lastmod>2025-10-03T11:42:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/thirdparty-data-breach-hits-harrods.html</loc>
			<lastmod>2025-10-03T11:40:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/hacking-group-claims-theft-of.html</loc>
			<lastmod>2025-10-03T11:19:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/klopatra-exposing-a-new-android.html</loc>
			<lastmod>2025-10-03T06:44:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/uat-chinesespeaking-cybercrime-group-targets.html</loc>
			<lastmod>2025-10-03T06:43:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/european-parliamentarians-implore-eu-leadership.html</loc>
			<lastmod>2025-10-03T06:42:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/03/ukrainian-defenders-report-rise-in.html</loc>
			<lastmod>2025-10-03T06:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/m-breach-letters-set-to.html</loc>
			<lastmod>2025-10-02T07:13:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/red-hat-confirms-security-incident.html</loc>
			<lastmod>2025-10-02T07:11:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/eu-threat-landscape-hacktivism-ddos.html</loc>
			<lastmod>2025-10-02T07:09:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/google-says-mandiant-google-threat.html</loc>
			<lastmod>2025-10-02T07:08:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/threat-actors-leveraging-senior-travel.html</loc>
			<lastmod>2025-10-02T07:06:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/zurich-urges-national-cybersecurity-metrics.html</loc>
			<lastmod>2025-10-02T06:59:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/federal-cyber-agency-warns-of.html</loc>
			<lastmod>2025-10-02T06:56:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/cyber-group-extorts-executives-after.html</loc>
			<lastmod>2025-10-02T06:55:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/why-burnout-is-a-growing.html</loc>
			<lastmod>2025-10-02T06:54:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/businesses-overconfident-about-withstanding-cyber.html</loc>
			<lastmod>2025-10-02T06:51:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/rhadamanthys-x-walk-through-the.html</loc>
			<lastmod>2025-10-02T06:50:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/totolink-xr-three-new-vulnerabilities.html</loc>
			<lastmod>2025-10-02T06:49:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/forensic-journey-hunting-evil-within.html</loc>
			<lastmod>2025-10-02T06:49:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/intel-and-amd-trusted-enclaves.html</loc>
			<lastmod>2025-10-02T06:48:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/china-imposes-onehour-reporting-rule.html</loc>
			<lastmod>2025-10-02T06:47:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/north-koreas-it-workers-expand.html</loc>
			<lastmod>2025-10-02T06:46:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/02/hackers-exploit-milesight-routers-to.html</loc>
			<lastmod>2025-10-02T06:45:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/us-auto-insurance-platform-claimpix.html</loc>
			<lastmod>2025-10-01T11:23:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/latest-airline-security-breach-leaks.html</loc>
			<lastmod>2025-10-01T11:21:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/hack-of-us-surveillance-provider.html</loc>
			<lastmod>2025-10-01T11:18:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/cyber-threat-intelligence-report-oct.html</loc>
			<lastmod>2025-10-01T09:48:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/tech-companies-should-be-shielded.html</loc>
			<lastmod>2025-10-01T06:25:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/cybercrime-observations-from-the-frontlines.html</loc>
			<lastmod>2025-10-01T06:24:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/you-name-it-vmware-elevates.html</loc>
			<lastmod>2025-10-01T06:23:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/matrixpdf-puts-gmail-users-at.html</loc>
			<lastmod>2025-10-01T06:22:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/phantom-taurus-a-new-chinese.html</loc>
			<lastmod>2025-10-01T06:22:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/uk-police-just-seized-billion.html</loc>
			<lastmod>2025-10-01T06:21:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/apple-fixes-critical-font-processing.html</loc>
			<lastmod>2025-10-01T06:21:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/cisa-sounds-alarm-on-critical.html</loc>
			<lastmod>2025-10-01T06:20:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/10/01/ais-scaling-recipe-how-a.html</loc>
			<lastmod>2025-10-01T03:30:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/explains-how-apples-engine-mandate.html</loc>
			<lastmod>2025-09-29T12:51:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/medusa-ransomware-claims-comcast-data.html</loc>
			<lastmod>2025-09-29T11:41:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/cti-briefing-publicly-disclosed-incidents.html</loc>
			<lastmod>2025-09-29T09:55:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/pointer-leaks-through-pointerkeyed-data.html</loc>
			<lastmod>2025-09-29T08:19:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/deceptivedevelopment-from-primitive-crypto-theft.html</loc>
			<lastmod>2025-09-29T08:18:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/fake-microsoft-teams-installers-push.html</loc>
			<lastmod>2025-09-29T08:16:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/jaguar-land-rover-to-resume.html</loc>
			<lastmod>2025-09-29T06:20:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/first-malicious-mcp-server-found.html</loc>
			<lastmod>2025-09-29T06:18:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/microsoft-flags-aidriven-phishing-llmcrafted.html</loc>
			<lastmod>2025-09-29T06:17:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/dutch-teens-arrested-for-allegedly.html</loc>
			<lastmod>2025-09-29T06:16:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/akira-ransomware-bypasses-mfa-on.html</loc>
			<lastmod>2025-09-29T06:15:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/29/abusing-notions-ai-agent-for.html</loc>
			<lastmod>2025-09-29T06:14:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/28/report-finds-copilot-accesses-millions.html</loc>
			<lastmod>2025-09-28T13:35:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/28/forcedleak-flaw-in-salesforce-agentforce.html</loc>
			<lastmod>2025-09-28T11:27:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/27/you-can-claim-up-to.html</loc>
			<lastmod>2025-09-27T11:18:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/27/company-that-sells-spyware-for.html</loc>
			<lastmod>2025-09-27T11:15:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/27/hackers-threaten-parents-get-nursery.html</loc>
			<lastmod>2025-09-27T11:14:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/archer-health-data-leak-exposes.html</loc>
			<lastmod>2025-09-26T11:09:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/salesforce-patches-critical-forcedleak-bug.html</loc>
			<lastmod>2025-09-26T11:08:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/nursery-hackers-leak-families-data.html</loc>
			<lastmod>2025-09-26T11:06:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/cyber-threat-intelligence-report-sept.html</loc>
			<lastmod>2025-09-26T08:21:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/coldriver-updates-arsenal-with-baitswitch.html</loc>
			<lastmod>2025-09-26T07:33:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/bookworm-to-stately-taurus-using.html</loc>
			<lastmod>2025-09-26T07:32:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/retail-at-risk-how-one.html</loc>
			<lastmod>2025-09-26T07:32:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/tech-overtakes-gaming-as-top.html</loc>
			<lastmod>2025-09-26T07:31:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/two-malicious-rust-crates-impersonate.html</loc>
			<lastmod>2025-09-26T07:30:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/xcsset-evolves-again-analyzing-the.html</loc>
			<lastmod>2025-09-26T07:29:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/new-lockbit-targets-windows-linux.html</loc>
			<lastmod>2025-09-26T07:29:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/microsoft-will-offer-free-windows.html</loc>
			<lastmod>2025-09-26T07:28:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/ncsc-warns-of-persistent-malware.html</loc>
			<lastmod>2025-09-26T07:27:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/supplemental-direction-ed-core-dump.html</loc>
			<lastmod>2025-09-26T07:27:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/cisa-directs-federal-agencies-to.html</loc>
			<lastmod>2025-09-26T07:26:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/detection-guide-for-continued-attacks.html</loc>
			<lastmod>2025-09-26T07:25:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/26/cisco-event-response-continued-attacks.html</loc>
			<lastmod>2025-09-26T07:24:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/25/claimpix-data-leak-exposes-million.html</loc>
			<lastmod>2025-09-25T13:04:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/25/huge-theft-reportedly-sees-tb.html</loc>
			<lastmod>2025-09-25T13:03:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/25/threatsday-bulletin-rootkit-patch-federal.html</loc>
			<lastmod>2025-09-25T13:03:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/how-rainyday-turian-and-a.html</loc>
			<lastmod>2025-09-24T21:10:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/nearly-half-of-businesses-suffered.html</loc>
			<lastmod>2025-09-24T21:09:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/imds-abused-hunting-rare-behaviors.html</loc>
			<lastmod>2025-09-24T21:09:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/lovense-vulnerabilities-insecure-adult-toys.html</loc>
			<lastmod>2025-09-24T21:08:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/ai-vs-ai-detecting-an.html</loc>
			<lastmod>2025-09-24T21:08:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/rednovember-targets-government-defense-and.html</loc>
			<lastmod>2025-09-24T21:07:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/malicious-fezbox-npm-package-steals.html</loc>
			<lastmod>2025-09-24T21:07:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/international-antifraud-crackdown-recovers-more.html</loc>
			<lastmod>2025-09-24T21:06:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/shadowv-an-emerging-ddos-for.html</loc>
			<lastmod>2025-09-24T21:05:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/another-brickstorm-stealthy-backdoor-enabling.html</loc>
			<lastmod>2025-09-24T21:05:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/is-this-bad-this-feels.html</loc>
			<lastmod>2025-09-24T21:04:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/github-notifications-abused-to-impersonate.html</loc>
			<lastmod>2025-09-24T21:03:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/cisco-warns-of-ios-zeroday.html</loc>
			<lastmod>2025-09-24T21:03:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-24T14:30:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/drupal-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-24T14:30:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/hackers-obfuscated-malware-with-verbose.html</loc>
			<lastmod>2025-09-24T14:30:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/iranian-cyber-group-targets-european.html</loc>
			<lastmod>2025-09-24T10:17:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/man-arrested-in-connection-with.html</loc>
			<lastmod>2025-09-24T10:07:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/technical-analysis-of-zloader-updates.html</loc>
			<lastmod>2025-09-24T08:17:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/operation-rewrite-chinesespeaking-threat-actors.html</loc>
			<lastmod>2025-09-24T08:17:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/github-moves-to-tighten-npm.html</loc>
			<lastmod>2025-09-24T08:16:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/new-edrfreeze-tool-uses-windows.html</loc>
			<lastmod>2025-09-24T08:15:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/major-cyber-threat-detection-vendors.html</loc>
			<lastmod>2025-09-24T08:14:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/researchers-earn-for-ltf-exploit.html</loc>
			<lastmod>2025-09-24T08:13:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/cisa-shares-lessons-learned-from.html</loc>
			<lastmod>2025-09-24T08:13:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/24/cloudflare-mitigates-new-recordbreaking-tbps.html</loc>
			<lastmod>2025-09-24T08:12:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/us-secret-service-dismantles-imminent.html</loc>
			<lastmod>2025-09-23T10:20:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/cisa-warns-of-attacks-exploiting.html</loc>
			<lastmod>2025-09-23T08:47:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/badiis-malware-uses-seo-poisoning.html</loc>
			<lastmod>2025-09-23T08:45:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/shadowv-botnet-targets-misconfigured-aws.html</loc>
			<lastmod>2025-09-23T08:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/fifty-years-of-open-source.html</loc>
			<lastmod>2025-09-23T08:03:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/ransomware-attack-linked-to-museum.html</loc>
			<lastmod>2025-09-23T08:02:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/verified-steam-game-steals-streamers.html</loc>
			<lastmod>2025-09-23T08:01:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/stellantis-detects-breach-at-thirdparty.html</loc>
			<lastmod>2025-09-23T08:00:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/nimbus-manticore-deploys-new-malware.html</loc>
			<lastmod>2025-09-23T08:00:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/23/how-to-gain-control-of.html</loc>
			<lastmod>2025-09-23T07:59:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/cyber-threat-intelligence-sept.html</loc>
			<lastmod>2025-09-22T11:32:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/apples-iphone-cameras-blend-hardware.html</loc>
			<lastmod>2025-09-22T07:19:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/unc-hacks-devices-in-telecom.html</loc>
			<lastmod>2025-09-22T05:52:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/065147.html</loc>
			<lastmod>2025-09-22T05:51:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/plastic-people-plastic-cards-synthetic.html</loc>
			<lastmod>2025-09-22T05:51:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/researchers-uncover-gptpowered-malterminal-malware.html</loc>
			<lastmod>2025-09-22T05:49:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/largescale-attack-targeting-macs-via.html</loc>
			<lastmod>2025-09-22T05:48:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/the-golaxy-papers-inside-chinas.html</loc>
			<lastmod>2025-09-22T05:48:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/unmasking-akira-the-ransomware-tactics.html</loc>
			<lastmod>2025-09-22T05:47:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/22/european-airports-struggle-to-fix.html</loc>
			<lastmod>2025-09-22T05:46:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/cyber-threat-intelligence-sept.html</loc>
			<lastmod>2025-09-19T07:21:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/one-token-to-rule-them.html</loc>
			<lastmod>2025-09-19T06:07:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/new-attack-on-chatgpt-research.html</loc>
			<lastmod>2025-09-19T06:07:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/copycop-deepens-its-playbook-with.html</loc>
			<lastmod>2025-09-19T06:06:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/070557.html</loc>
			<lastmod>2025-09-19T06:05:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/update-your-chrome-today-google.html</loc>
			<lastmod>2025-09-19T06:05:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/russland-und-china-nehmen-deutsche.html</loc>
			<lastmod>2025-09-19T04:10:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/russian-hackers-gamaredon-and-turla.html</loc>
			<lastmod>2025-09-19T04:03:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/19/filefix-campaign-uses-facebook-suspension.html</loc>
			<lastmod>2025-09-19T04:01:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/knowbe-report-reveals-uk-retail.html</loc>
			<lastmod>2025-09-18T15:55:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/tiffany-data-breach-impacts-thousands.html</loc>
			<lastmod>2025-09-18T11:17:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/linkedin-now-uses-your-data.html</loc>
			<lastmod>2025-09-18T11:15:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-09-18T11:13:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-18T11:13:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/chatgpt-targeted-in-serverside-data.html</loc>
			<lastmod>2025-09-18T11:12:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/study-finds-million-medical-devices.html</loc>
			<lastmod>2025-09-18T11:10:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/cyber-threat-intelligence-report-sept.html</loc>
			<lastmod>2025-09-18T08:44:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/north-korean-operation-uses-chatgpt.html</loc>
			<lastmod>2025-09-18T05:46:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/vc-giant-insight-partners-warns.html</loc>
			<lastmod>2025-09-18T05:45:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/064518.html</loc>
			<lastmod>2025-09-18T05:45:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/malicious-pypi-packages-deliver-silentsync.html</loc>
			<lastmod>2025-09-18T05:44:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/064411.html</loc>
			<lastmod>2025-09-18T05:44:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/from-clickfix-to-metastealer-dissecting.html</loc>
			<lastmod>2025-09-18T05:43:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/going-underground-chinaaligned-ta-conducts.html</loc>
			<lastmod>2025-09-18T05:43:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/mapping-the-infrastructure-and-malware.html</loc>
			<lastmod>2025-09-18T05:42:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/microsoft-seizes-websites-to-disrupt.html</loc>
			<lastmod>2025-09-18T05:41:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/sonicwall-warns-customers-to-reset.html</loc>
			<lastmod>2025-09-18T05:40:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/18/shaihulud-worm-compromises-npm-ecosystem.html</loc>
			<lastmod>2025-09-18T05:40:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/personal-data-of-mln-people.html</loc>
			<lastmod>2025-09-17T11:10:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/lotte-card-data-breach-impacts.html</loc>
			<lastmod>2025-09-17T11:09:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/google-rolls-out-new-windows.html</loc>
			<lastmod>2025-09-17T07:18:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/how-people-are-using-chatgpt.html</loc>
			<lastmod>2025-09-17T07:16:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/filefix-in-the-wild-new.html</loc>
			<lastmod>2025-09-17T06:22:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/smokeloader-rises-from-the-ashes.html</loc>
			<lastmod>2025-09-17T06:22:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/deniability-by-design-dnsdriven-insights.html</loc>
			<lastmod>2025-09-17T06:21:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/google-nukes-android-malware-apps.html</loc>
			<lastmod>2025-09-17T06:20:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/chaotic-deputy-critical-vulnerabilities-in.html</loc>
			<lastmod>2025-09-17T06:19:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/threat-spotlight-shinyhunters-targets-salesforce.html</loc>
			<lastmod>2025-09-17T06:19:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/revengehotels-a-new-wave-of.html</loc>
			<lastmod>2025-09-17T06:17:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/house-lawmakers-move-to-extend.html</loc>
			<lastmod>2025-09-17T06:17:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/apple-backports-fix-for-cve.html</loc>
			<lastmod>2025-09-17T06:16:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/scattered-spider-resurfaces-with-financial.html</loc>
			<lastmod>2025-09-17T05:28:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/17/jaguar-land-rover-extends-production.html</loc>
			<lastmod>2025-09-17T05:27:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/selfreplicating-worm-hits-npm-packages.html</loc>
			<lastmod>2025-09-16T15:27:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/browserbased-attacks-security-teams-need.html</loc>
			<lastmod>2025-09-16T15:24:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/microsoft-will-force-install-the.html</loc>
			<lastmod>2025-09-16T15:21:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/hive-aka-mustang-panda-drops.html</loc>
			<lastmod>2025-09-16T05:51:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/065035.html</loc>
			<lastmod>2025-09-16T05:50:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/new-phoenix-attack-bypasses-rowhammer.html</loc>
			<lastmod>2025-09-16T05:50:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/ukraine-claims-cyberattacks-on-russian.html</loc>
			<lastmod>2025-09-16T05:49:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/shiny-tools-shallow-checks-how.html</loc>
			<lastmod>2025-09-16T05:48:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/google-confirms-hackers-gained-access.html</loc>
			<lastmod>2025-09-16T05:47:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/16/national-charged-in-finnish-psychotherapy.html</loc>
			<lastmod>2025-09-16T05:47:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/brac-bank-denies-involvement-in.html</loc>
			<lastmod>2025-09-15T12:28:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/chinas-great-firewall-suffers-its.html</loc>
			<lastmod>2025-09-15T12:27:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/gucci-balenciaga-and-alexander-mcqueen.html</loc>
			<lastmod>2025-09-15T12:26:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/trusted-connections-hidden-risks-token.html</loc>
			<lastmod>2025-09-15T08:13:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/fbi-warns-of-unc-and.html</loc>
			<lastmod>2025-09-15T08:12:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/indian-call-center-scammers-partner.html</loc>
			<lastmod>2025-09-15T08:11:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/data-destruction-done-wrong-could.html</loc>
			<lastmod>2025-09-15T08:11:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/whitecobra-floods-vscode-market-with.html</loc>
			<lastmod>2025-09-15T08:10:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/google-gemini-is-the-top.html</loc>
			<lastmod>2025-09-15T05:05:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/new-voidproxy-phishing-service-targets.html</loc>
			<lastmod>2025-09-15T05:03:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/openai-realizes-it-made-a.html</loc>
			<lastmod>2025-09-15T04:57:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/new-yurei-ransomware-variant-discovered.html</loc>
			<lastmod>2025-09-15T04:19:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/cyber-attackers-use-images-builtin.html</loc>
			<lastmod>2025-09-15T04:18:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/acr-stealer-uncovering-attack-chains.html</loc>
			<lastmod>2025-09-15T04:17:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/bitdefender-discovers-chinalinked-malware-apdr.html</loc>
			<lastmod>2025-09-15T04:16:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/philippine-military-company-spied-upon.html</loc>
			<lastmod>2025-09-15T04:15:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/evolving-cyber-threats-and-ransomware.html</loc>
			<lastmod>2025-09-15T04:12:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/hacker-breaks-into-oncampus-smart.html</loc>
			<lastmod>2025-09-15T04:11:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/inc-ransom-group-claimed-the.html</loc>
			<lastmod>2025-09-15T04:09:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/ciro-data-breach-included-personal.html</loc>
			<lastmod>2025-09-15T04:08:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/why-neglected-assets-are-the.html</loc>
			<lastmod>2025-09-15T04:05:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/uk-ico-finds-students-behind.html</loc>
			<lastmod>2025-09-15T04:04:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/seo-poisoning-campaign-targets-chinese.html</loc>
			<lastmod>2025-09-15T04:03:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/15/scattered-lapsus-hunters-announces-closure.html</loc>
			<lastmod>2025-09-15T04:02:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/proton-mail-suspended-journalist-accounts.html</loc>
			<lastmod>2025-09-13T18:27:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/hybridpetya-ransomware-dodges-uefi-secure.html</loc>
			<lastmod>2025-09-13T18:21:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/kbs-exclusive-parliamentary-mobile-carrier.html</loc>
			<lastmod>2025-09-13T13:39:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/how-everyday-apps-leak-more.html</loc>
			<lastmod>2025-09-13T13:37:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/vietnam-investigates-cyberattack-on-creditors.html</loc>
			<lastmod>2025-09-13T13:36:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/microsoft-is-axing-this-android.html</loc>
			<lastmod>2025-09-13T07:07:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/from-india-to-iran-countries.html</loc>
			<lastmod>2025-09-13T07:05:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/13/us-places-million-bounty-on.html</loc>
			<lastmod>2025-09-13T07:02:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/cisa-unveiled-a-new-vision.html</loc>
			<lastmod>2025-09-12T14:29:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/your-android-phones-most-powerful.html</loc>
			<lastmod>2025-09-12T08:52:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/blurring-the-lines-intrusion-shows.html</loc>
			<lastmod>2025-09-12T08:51:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/vidar-infostealer-back-with-a.html</loc>
			<lastmod>2025-09-12T08:50:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/bulletproof-host-stark-industries-evades.html</loc>
			<lastmod>2025-09-12T08:50:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/akira-ransomware-crims-abusing-trifecta.html</loc>
			<lastmod>2025-09-12T08:49:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/apple-warns-customers-targeted-in.html</loc>
			<lastmod>2025-09-12T08:49:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/antiddos-outfit-walloped-by-record.html</loc>
			<lastmod>2025-09-12T08:48:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/us-warns-hidden-radios-may.html</loc>
			<lastmod>2025-09-12T08:47:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/new-vmscape-attack-breaks-guesthost.html</loc>
			<lastmod>2025-09-12T08:47:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/swiss-government-looks-to-undercut.html</loc>
			<lastmod>2025-09-12T08:46:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/12/brussels-faces-privacy-crossroads-over.html</loc>
			<lastmod>2025-09-12T08:44:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/fast-food-giant-exposed-after.html</loc>
			<lastmod>2025-09-11T11:09:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/unlocking-hidden-capabilities-in-wifi.html</loc>
			<lastmod>2025-09-11T08:17:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/091736.html</loc>
			<lastmod>2025-09-11T08:17:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/why-xss-still-matters-msrcs.html</loc>
			<lastmod>2025-09-11T08:16:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/maturing-the-cyber-threat-intelligence.html</loc>
			<lastmod>2025-09-11T08:15:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/mostererat-deployed-anydesktightvnc-for-covert.html</loc>
			<lastmod>2025-09-11T08:15:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/adaptixc-a-new-opensource-framework.html</loc>
			<lastmod>2025-09-11T08:14:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/unmasking-the-gentlemen-ransomware-tactics.html</loc>
			<lastmod>2025-09-11T08:13:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/cyber-resilience-matters-as-much.html</loc>
			<lastmod>2025-09-11T08:13:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/us-investors-in-spyware-firms.html</loc>
			<lastmod>2025-09-11T08:12:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/billion-packets-per-second-ddos.html</loc>
			<lastmod>2025-09-11T05:37:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/remote-carplay-hack-puts-drivers.html</loc>
			<lastmod>2025-09-11T05:36:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/chillyhell-macos-malware-resurfaces-using.html</loc>
			<lastmod>2025-09-11T05:35:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/063426.html</loc>
			<lastmod>2025-09-11T05:34:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/11/feds-release-updated-hipaa-security.html</loc>
			<lastmod>2025-09-11T05:33:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/inc-ransom-claims-breach-of.html</loc>
			<lastmod>2025-09-10T11:22:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/hello-gym-data-leak-exposes.html</loc>
			<lastmod>2025-09-10T11:22:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/is-the-browser-becoming-the.html</loc>
			<lastmod>2025-09-10T08:13:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/091306.html</loc>
			<lastmod>2025-09-10T08:13:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/nokia-successor-hmd-spawns-secure.html</loc>
			<lastmod>2025-09-10T08:12:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/surge-in-networks-scans-targeting.html</loc>
			<lastmod>2025-09-10T08:11:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/more-packages-poisoned-in-npm.html</loc>
			<lastmod>2025-09-10T08:11:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/sap-warns-of-highseverity-vulnerabilities.html</loc>
			<lastmod>2025-09-10T08:09:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/the-finnish-transport-and-communications.html</loc>
			<lastmod>2025-09-10T08:08:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/10/canada-cyberattack-emails-phone-numbers.html</loc>
			<lastmod>2025-09-10T07:18:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/plex-tells-users-to-reset.html</loc>
			<lastmod>2025-09-09T11:52:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/massive-combo-list-m-surfaces.html</loc>
			<lastmod>2025-09-09T11:50:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/tenable-confirms-data-leak-amid.html</loc>
			<lastmod>2025-09-09T11:47:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/hack-of-boris-johnson-exposes.html</loc>
			<lastmod>2025-09-09T11:45:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/salt-typhoon-and-unc-silent.html</loc>
			<lastmod>2025-09-09T08:16:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/google-admits-the-open-web.html</loc>
			<lastmod>2025-09-09T08:16:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/how-huge-breach-started-drift.html</loc>
			<lastmod>2025-09-09T08:15:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/cyberattack-on-jaguar-land-rover.html</loc>
			<lastmod>2025-09-09T08:14:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/09/hackers-hijack-npm-packages-with.html</loc>
			<lastmod>2025-09-09T08:14:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/windows-most-used-and-attacked.html</loc>
			<lastmod>2025-09-08T13:12:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/mostererat-targets-windows-uses-anydesk.html</loc>
			<lastmod>2025-09-08T12:48:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/134635.html</loc>
			<lastmod>2025-09-08T12:46:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-08T12:45:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/134435.html</loc>
			<lastmod>2025-09-08T12:44:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-08T12:43:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/gpugate-malware-uses-google-ads.html</loc>
			<lastmod>2025-09-08T12:43:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/chinese-spies-impersonated-us-lawmaker.html</loc>
			<lastmod>2025-09-08T12:42:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-09-08T12:40:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-09-08T12:39:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/flattery-can-make-ai-chatbots.html</loc>
			<lastmod>2025-09-08T12:39:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/burger-king-uses-copyright-law.html</loc>
			<lastmod>2025-09-08T12:37:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/virustotal-finds-hidden-malware-phishing.html</loc>
			<lastmod>2025-09-08T06:09:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/age-verification-is-a-windfall.html</loc>
			<lastmod>2025-09-08T06:06:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/the-new-math-of-quantum.html</loc>
			<lastmod>2025-09-08T06:06:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/taking-down-booters-the-catandmouse.html</loc>
			<lastmod>2025-09-08T06:05:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/ais-not-reasoning-at-all.html</loc>
			<lastmod>2025-09-08T06:05:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/08/icloud-calendar-abused-to-send.html</loc>
			<lastmod>2025-09-08T06:04:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/07/chinabacked-hackers-almost-certainly-targeted.html</loc>
			<lastmod>2025-09-07T01:33:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/microsoft-opensources-bill-gates-basic.html</loc>
			<lastmod>2025-09-06T15:11:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/an-mdr-analysis-of-the.html</loc>
			<lastmod>2025-09-06T15:10:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/ghostredirector-poisons-windows-servers-backdoors.html</loc>
			<lastmod>2025-09-06T15:10:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/nexar-dashcam-video-database-hacked.html</loc>
			<lastmod>2025-09-06T15:09:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/czech-warning-highlights-china-stealing.html</loc>
			<lastmod>2025-09-06T15:09:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/06/cyberattack-forces-jaguar-land-rover.html</loc>
			<lastmod>2025-09-06T15:08:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/sextortion-risk-alert-as-infostealer.html</loc>
			<lastmod>2025-09-05T06:32:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/russias-apt-targets-microsoft-outlook.html</loc>
			<lastmod>2025-09-05T06:32:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/blast-radius-of-salesloft-drift.html</loc>
			<lastmod>2025-09-05T06:31:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/073118.html</loc>
			<lastmod>2025-09-05T06:31:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/threat-actors-abuse-xs-grok.html</loc>
			<lastmod>2025-09-05T06:30:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/05/tire-giant-bridgestone-confirms-cyberattack.html</loc>
			<lastmod>2025-09-05T06:30:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/threat-hunting-should-be-part.html</loc>
			<lastmod>2025-09-04T14:56:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/pseudonymised-data-could-fall-outside.html</loc>
			<lastmod>2025-09-04T14:55:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/addressing-the-unauthorized-issuance-of.html</loc>
			<lastmod>2025-09-04T14:54:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/ghostredirector-hacks-windows-servers-using.html</loc>
			<lastmod>2025-09-04T14:53:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/russian-apt-deploys-notdoor-outlook.html</loc>
			<lastmod>2025-09-04T14:52:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/cybercriminals-exploit-xs-grok-ai.html</loc>
			<lastmod>2025-09-04T07:32:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/popular-android-vpn-apps-found.html</loc>
			<lastmod>2025-09-04T07:30:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/scattered-lapsus-hunters-demand-google.html</loc>
			<lastmod>2025-09-04T07:09:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/dutch-lab-cancer-screening-hack.html</loc>
			<lastmod>2025-09-04T07:08:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/eu-court-preserves-euus-data.html</loc>
			<lastmod>2025-09-04T07:07:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/matrixorg-homeserver-grinds-to-a.html</loc>
			<lastmod>2025-09-04T06:34:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/073347.html</loc>
			<lastmod>2025-09-04T06:33:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/nick-andersen-appointed-to-cisa.html</loc>
			<lastmod>2025-09-04T06:33:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/iranian-hackers-exploit-embassy-email.html</loc>
			<lastmod>2025-09-04T06:32:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/android-security-alert-google-patches.html</loc>
			<lastmod>2025-09-04T06:31:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/threat-actors-weaponize-hexstrike-ai.html</loc>
			<lastmod>2025-09-04T06:31:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/navy-federal-credit-union-backup.html</loc>
			<lastmod>2025-09-04T06:30:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/silver-fox-apt-abuses-windows.html</loc>
			<lastmod>2025-09-04T06:29:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/hackers-grab-m-using-brazils.html</loc>
			<lastmod>2025-09-04T06:29:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/wordpress-woes-continue-amid-clickfix.html</loc>
			<lastmod>2025-09-04T06:28:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/04/whatsapp-bug-anchors-targeted-zeroclick.html</loc>
			<lastmod>2025-09-04T06:28:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/critical-starts-cyber-research-unit.html</loc>
			<lastmod>2025-09-03T13:36:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/cloudflare-confirms-data-breach-linked.html</loc>
			<lastmod>2025-09-03T11:18:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/misconfigured-server-leaks-gb-of.html</loc>
			<lastmod>2025-09-03T11:16:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/drift-tool-taken-offline-after.html</loc>
			<lastmod>2025-09-03T11:16:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/palo-alto-networks-data-breach.html</loc>
			<lastmod>2025-09-03T06:15:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/no-google-did-not-warn.html</loc>
			<lastmod>2025-09-03T06:14:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/03/cloudflare-blocks-largest-recorded-ddos.html</loc>
			<lastmod>2025-09-03T06:14:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/zscaler-confirms-limited-data-exposure.html</loc>
			<lastmod>2025-09-02T07:23:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/silver-fox-apt-exploits-signed.html</loc>
			<lastmod>2025-09-02T07:22:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/ukrainian-network-fdn-launches-massive.html</loc>
			<lastmod>2025-09-02T07:21:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/austrias-interior-ministry-sees-email.html</loc>
			<lastmod>2025-09-02T07:20:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/law-enforcement-operation-seizes-fake.html</loc>
			<lastmod>2025-09-02T07:19:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/planning-for-mandatory-multifactor-authentication.html</loc>
			<lastmod>2025-09-02T07:16:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/spanish-government-cancels-m-contract.html</loc>
			<lastmod>2025-09-02T07:15:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/09/02/amazon-disrupts-russian-apt-hackers.html</loc>
			<lastmod>2025-09-02T07:14:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/31/transunion-data-breach-may-have.html</loc>
			<lastmod>2025-08-31T07:07:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/31/google-issues-another-warning-for.html</loc>
			<lastmod>2025-08-31T07:05:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/31/fbi-cyber-cop-salt-typhoon.html</loc>
			<lastmod>2025-08-31T07:01:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/31/amazon-blocks-apt-campaign-targeting.html</loc>
			<lastmod>2025-08-31T07:00:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/30/whatsapp-issues-emergency-update-for.html</loc>
			<lastmod>2025-08-30T18:42:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/30/pentagon-probes-microsofts-use-of.html</loc>
			<lastmod>2025-08-30T18:41:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/30/cisa-aaa-global-advisory-on.html</loc>
			<lastmod>2025-08-30T18:15:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/30/interlock-ransomware-the-cyber-threat.html</loc>
			<lastmod>2025-08-30T18:10:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/30/germanys-highest-court-has-reignited.html</loc>
			<lastmod>2025-08-30T18:01:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/ais-energy-challenge-efficiency-gains.html</loc>
			<lastmod>2025-08-29T07:18:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/dutch-intelligence-agencies-report-country.html</loc>
			<lastmod>2025-08-29T06:40:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/shadow-it-is-expanding-your.html</loc>
			<lastmod>2025-08-29T06:39:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/cephalus-ransomware-what-you-need.html</loc>
			<lastmod>2025-08-29T06:39:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/appsuite-pdf-editor-backdoor-a.html</loc>
			<lastmod>2025-08-29T06:38:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/the-resurgence-of-iot-malware.html</loc>
			<lastmod>2025-08-29T06:38:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/29/chasing-the-silver-fox-cat.html</loc>
			<lastmod>2025-08-29T06:37:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/googles-ai-hurricane-model-impresses.html</loc>
			<lastmod>2025-08-28T15:19:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/googles-notebooklm-updates-audio-and.html</loc>
			<lastmod>2025-08-28T15:15:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/hackers-steal-data-from-salesforce.html</loc>
			<lastmod>2025-08-28T08:22:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/transunion-data-breach-hits-million.html</loc>
			<lastmod>2025-08-28T08:20:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/sensitive-medical-marijuana-patient-data.html</loc>
			<lastmod>2025-08-28T08:19:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/incident-response-planning-linked-to.html</loc>
			<lastmod>2025-08-28T08:17:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/ai-is-making-dark-web.html</loc>
			<lastmod>2025-08-28T08:14:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/google-previews-cyber-disruption-unit.html</loc>
			<lastmod>2025-08-28T08:12:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/openai-says-its-scanning-users.html</loc>
			<lastmod>2025-08-28T07:46:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/nsa-ncsc-and-allies-detailed.html</loc>
			<lastmod>2025-08-28T06:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/the-role-of-enterprise-email.html</loc>
			<lastmod>2025-08-28T06:50:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/claude-ai-chatbot-abused-to.html</loc>
			<lastmod>2025-08-28T06:49:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/nx-npm-packages-poisoned-in.html</loc>
			<lastmod>2025-08-28T06:42:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/fbi-warns-chinese-hacking-campaign.html</loc>
			<lastmod>2025-08-28T06:41:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/governments-tech-companies-meet-in.html</loc>
			<lastmod>2025-08-28T06:41:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/hundreds-of-swedish-municipalities-impacted.html</loc>
			<lastmod>2025-08-28T06:40:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/storm-hits-enterprise-with-cloudbased.html</loc>
			<lastmod>2025-08-28T06:39:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/salesloft-breached-to-steal-oauth.html</loc>
			<lastmod>2025-08-28T06:38:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/new-report-sheds-light-on.html</loc>
			<lastmod>2025-08-28T06:38:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/how-threat-actors-are-rizzing.html</loc>
			<lastmod>2025-08-28T06:37:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/28/an-apt-through-your-webcam.html</loc>
			<lastmod>2025-08-28T06:36:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/new-zeroday-startup-offers-million.html</loc>
			<lastmod>2025-08-27T19:53:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/china-linked-silk-typhoon-targeted.html</loc>
			<lastmod>2025-08-27T06:49:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/eset-warns-of-promptlock-the.html</loc>
			<lastmod>2025-08-27T06:48:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/blind-eagles-five-clusters-target.html</loc>
			<lastmod>2025-08-27T06:47:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/vulnerability-landscape-analysis-for-q.html</loc>
			<lastmod>2025-08-27T06:46:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/google-to-verify-all-android.html</loc>
			<lastmod>2025-08-27T06:42:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/hackers-lay-in-wait-then.html</loc>
			<lastmod>2025-08-27T06:41:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/074121.html</loc>
			<lastmod>2025-08-27T06:41:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/the-hidden-risk-of-consumer.html</loc>
			<lastmod>2025-08-27T06:40:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/nissan-confirms-design-studio-data.html</loc>
			<lastmod>2025-08-27T06:39:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/hook-android-trojan-adds-ransomware.html</loc>
			<lastmod>2025-08-27T06:39:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/cisa-warns-of-actively-exploited.html</loc>
			<lastmod>2025-08-27T06:38:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/27/zipline-campaign-advanced-social-engineering.html</loc>
			<lastmod>2025-08-27T06:37:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/tech-jobs-in-canada-market.html</loc>
			<lastmod>2025-08-26T17:55:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/docker-desktop-vulnerability-leads-to.html</loc>
			<lastmod>2025-08-26T08:44:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/study-reveals-tiktok-alibaba-temu.html</loc>
			<lastmod>2025-08-26T08:41:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/mixshell-malware-delivered-via-contact.html</loc>
			<lastmod>2025-08-26T08:40:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/nevada-state-offices-halts-services.html</loc>
			<lastmod>2025-08-26T08:39:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/farmers-insurance-aflac-report-data.html</loc>
			<lastmod>2025-08-26T08:38:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/new-android-malware-poses-as.html</loc>
			<lastmod>2025-08-26T07:01:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/new-gmail-phishing-attack-uses.html</loc>
			<lastmod>2025-08-26T07:00:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/bug-bounties-the-good-the.html</loc>
			<lastmod>2025-08-26T07:00:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/malicious-go-module-poses-as.html</loc>
			<lastmod>2025-08-26T06:59:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/malicious-android-apps-with-m.html</loc>
			<lastmod>2025-08-26T06:52:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/aws-cloudflare-digital-ocean-and.html</loc>
			<lastmod>2025-08-26T06:52:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/phishing-campaign-targeting-companies-via.html</loc>
			<lastmod>2025-08-26T06:51:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/26/phishing-in-the-classroom-emails.html</loc>
			<lastmod>2025-08-26T06:50:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/25/social-media-apps-may-know.html</loc>
			<lastmod>2025-08-25T17:09:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/24/k-exposed-after-sleep-therapy.html</loc>
			<lastmod>2025-08-24T12:32:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/24/uzbekistan-airline-hack-reveals-data.html</loc>
			<lastmod>2025-08-24T12:31:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/24/hackers-claim-millions-of-paypal.html</loc>
			<lastmod>2025-08-24T12:29:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/24/engineered-to-fail-the-dna.html</loc>
			<lastmod>2025-08-24T12:20:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/24/zuckerberg-freezes-ai-hiring-amid.html</loc>
			<lastmod>2025-08-24T12:14:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/23/simple-labels-to-supercharge-your.html</loc>
			<lastmod>2025-08-23T12:48:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/23/rural-health-system-in-michigan.html</loc>
			<lastmod>2025-08-23T11:31:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/22/coinbase-ceo-fired-employees-who.html</loc>
			<lastmod>2025-08-22T14:40:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/chinas-great-firewall-blocked-all.html</loc>
			<lastmod>2025-08-21T20:38:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/a-huge-number-of-grok.html</loc>
			<lastmod>2025-08-21T18:24:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/openai-ceo-sam-altman-concedes.html</loc>
			<lastmod>2025-08-21T12:40:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/nearly-m-ssns-and-health.html</loc>
			<lastmod>2025-08-21T09:49:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/microsoft-restricts-chinese-firms-access.html</loc>
			<lastmod>2025-08-21T09:48:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/aws-trusted-advisor-flaw-allowed.html</loc>
			<lastmod>2025-08-21T09:47:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/104548.html</loc>
			<lastmod>2025-08-21T09:45:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/orange-belgium-data-breach-impacts.html</loc>
			<lastmod>2025-08-21T09:45:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/apple-patches-zeroday-exploited-in.html</loc>
			<lastmod>2025-08-21T09:43:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/russian-espionage-group-exploits-old.html</loc>
			<lastmod>2025-08-21T09:42:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/using-lightweight-llms-to-cut.html</loc>
			<lastmod>2025-08-21T09:40:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/europol-says-qilin-ransomware-reward.html</loc>
			<lastmod>2025-08-21T09:38:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/phishing-in-the-cloud-sendgrid.html</loc>
			<lastmod>2025-08-21T09:37:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/from-impact-to-action-turning.html</loc>
			<lastmod>2025-08-21T09:36:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/simswapper-scattered-spider-hacker-gets.html</loc>
			<lastmod>2025-08-21T09:35:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/microsoft-lays-out-its-quantumsafe.html</loc>
			<lastmod>2025-08-21T09:34:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/21/fake-employees-pose-real-security.html</loc>
			<lastmod>2025-08-21T09:32:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/russian-cyberattack-in-the-netherlands.html</loc>
			<lastmod>2025-08-20T16:18:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/travel-esims-secretly-route-traffic.html</loc>
			<lastmod>2025-08-20T16:10:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/mozilla-security-advisory-av-canadian.html</loc>
			<lastmod>2025-08-20T06:04:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/asian-orgs-shift-cybersecurity-requirements.html</loc>
			<lastmod>2025-08-20T06:03:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/apache-activemq-flaw-exploited-to.html</loc>
			<lastmod>2025-08-20T06:02:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/ios-security-features-you-should.html</loc>
			<lastmod>2025-08-20T06:01:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/intel-employee-data-exposed-by.html</loc>
			<lastmod>2025-08-20T06:00:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/google-fixed-chrome-flaw-found.html</loc>
			<lastmod>2025-08-20T05:59:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/north-korea-uses-github-in.html</loc>
			<lastmod>2025-08-20T05:58:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/malaysia-proposed-new-regulatory-framework.html</loc>
			<lastmod>2025-08-20T05:57:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/united-states-internet-across-borders.html</loc>
			<lastmod>2025-08-20T05:56:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/exploit-for-critical-sap-netweaver.html</loc>
			<lastmod>2025-08-20T05:53:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/guess-who-would-be-stupid.html</loc>
			<lastmod>2025-08-20T05:52:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/us-intel-chief-celebrates-uk.html</loc>
			<lastmod>2025-08-20T05:51:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/20/why-returning-to-the-office.html</loc>
			<lastmod>2025-08-20T05:49:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/grok-exposes-underlying-prompts-for.html</loc>
			<lastmod>2025-08-18T09:33:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/internetwide-vulnerability-enables-giant-ddos.html</loc>
			<lastmod>2025-08-18T09:32:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/noodlophile-infostealer-is-hiding-behind.html</loc>
			<lastmod>2025-08-18T09:31:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/defending-against-cloud-threats-across.html</loc>
			<lastmod>2025-08-18T09:29:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/top-israeli-cybersecurity-director-arrested.html</loc>
			<lastmod>2025-08-18T06:30:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/ermac-source-code-leak-reveals.html</loc>
			<lastmod>2025-08-18T06:29:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/colt-technology-faces-multiday-outage.html</loc>
			<lastmod>2025-08-18T06:28:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/threat-actor-claims-to-sell.html</loc>
			<lastmod>2025-08-18T06:26:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/human-resources-firm-workday-disclosed.html</loc>
			<lastmod>2025-08-18T06:24:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/us-seizes-million-from-zeppelin.html</loc>
			<lastmod>2025-08-18T06:23:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/18/wirelesstap-automatic-transcription-of-phone.html</loc>
			<lastmod>2025-08-18T06:21:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/16/discover-a-smoother-youtube-experience.html</loc>
			<lastmod>2025-08-16T22:33:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/220005.html</loc>
			<lastmod>2025-08-15T21:00:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/215800.html</loc>
			<lastmod>2025-08-15T20:58:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/crypto-ransomware-group-blends-legitimate.html</loc>
			<lastmod>2025-08-15T07:21:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/bookingcom-phishing-campaign-uses-sneaky.html</loc>
			<lastmod>2025-08-15T07:20:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/hackers-reportedly-compromise-canadian-house.html</loc>
			<lastmod>2025-08-15T07:20:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/fccs-data-breach-reporting-rules.html</loc>
			<lastmod>2025-08-15T07:19:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/15/fortinet-warns-of-fortisiem-preauth.html</loc>
			<lastmod>2025-08-15T07:18:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/russian-hackers-breach-norwegian-dam.html</loc>
			<lastmod>2025-08-14T07:49:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/house-of-commons-breach-highlights.html</loc>
			<lastmod>2025-08-14T07:45:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/k-vanished-questrade-case-exposes.html</loc>
			<lastmod>2025-08-14T07:41:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/westjet-breach-exposes-passport-data.html</loc>
			<lastmod>2025-08-14T07:34:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/zoom-patches-critical-windows-flaw.html</loc>
			<lastmod>2025-08-14T07:30:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/madeyoureset-http-vulnerability-enables-massive.html</loc>
			<lastmod>2025-08-14T07:28:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/of-enterprise-passwords-can-be.html</loc>
			<lastmod>2025-08-14T07:26:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/for-you-can-buy-stolen.html</loc>
			<lastmod>2025-08-14T07:25:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/14/feds-issue-more-hipaa-guidance.html</loc>
			<lastmod>2025-08-14T07:23:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/xai-has-announced-that-grok.html</loc>
			<lastmod>2025-08-13T13:50:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/the-art-of-iteration-how.html</loc>
			<lastmod>2025-08-13T09:27:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/openais-prompt-optimizer.html</loc>
			<lastmod>2025-08-13T09:19:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/microsoft-august-patch-tuesday-fixes.html</loc>
			<lastmod>2025-08-13T06:52:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/sleepwalk-a-sophisticated-way-to.html</loc>
			<lastmod>2025-08-13T06:51:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/manpower-discloses-data-breach-affecting.html</loc>
			<lastmod>2025-08-13T06:51:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/new-ransomware-charon-uses-earth.html</loc>
			<lastmod>2025-08-13T06:50:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/north-korean-kimsuky-hackers-exposed.html</loc>
			<lastmod>2025-08-13T06:50:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/13/curly-comrades-cyberspies-hit-govt.html</loc>
			<lastmod>2025-08-13T06:49:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/apt-groups-are-getting-personal.html</loc>
			<lastmod>2025-08-12T06:59:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/key-takeaways-from-black-hat.html</loc>
			<lastmod>2025-08-12T06:58:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/sap-patches-critical-shana-vulnerability.html</loc>
			<lastmod>2025-08-12T06:56:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/dutch-investigators-blame-multiple-threat.html</loc>
			<lastmod>2025-08-12T06:55:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/keys-to-the-kingdom-erlangotp.html</loc>
			<lastmod>2025-08-12T06:51:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/from-clickfixto-command-a-full.html</loc>
			<lastmod>2025-08-12T06:50:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/muddywaters-darkbit-ransomware-cracked-for.html</loc>
			<lastmod>2025-08-12T06:50:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/over-exchange-servers-unpatched-against.html</loc>
			<lastmod>2025-08-12T06:49:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/update-winrar-tools-now-romcom.html</loc>
			<lastmod>2025-08-12T06:49:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/12/ransomware-diaries-volume-i-had.html</loc>
			<lastmod>2025-08-12T06:48:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/11/uwa-hit-by-major-data.html</loc>
			<lastmod>2025-08-11T11:09:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/malicious-ruby-gems-downloaded-times.html</loc>
			<lastmod>2025-08-10T21:02:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/google-calendar-invites-let-researchers.html</loc>
			<lastmod>2025-08-10T21:02:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/def-con-hackers-plug-security.html</loc>
			<lastmod>2025-08-10T21:02:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/badcam-linuxbased-lenovo-webcam-bugs.html</loc>
			<lastmod>2025-08-10T20:59:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/agentflayer-click-exploit-abuses-chatgpt.html</loc>
			<lastmod>2025-08-10T20:58:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/new-winddos-flaws-let-attackers.html</loc>
			<lastmod>2025-08-10T20:57:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/uk-proxy-traffic-surges-as.html</loc>
			<lastmod>2025-08-10T20:54:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/north-korean-cyberespionage-group-scarcruft.html</loc>
			<lastmod>2025-08-10T20:54:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/eu-law-to-protect-journalists.html</loc>
			<lastmod>2025-08-10T20:53:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/scammers-massmailing-the-efimer-trojan.html</loc>
			<lastmod>2025-08-10T20:52:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/us-judiciary-confirms-breach-of.html</loc>
			<lastmod>2025-08-10T20:52:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/us-confirms-takedown-of-blacksuit.html</loc>
			<lastmod>2025-08-10T20:51:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/cartels-may-be-able-to.html</loc>
			<lastmod>2025-08-10T20:51:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/embargo-ransomware-gang-has-handled.html</loc>
			<lastmod>2025-08-10T20:50:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/courts-service-covered-up-it.html</loc>
			<lastmod>2025-08-10T20:49:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/encryption-made-for-police-and.html</loc>
			<lastmod>2025-08-10T20:49:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/adult-sites-are-stashing-exploit.html</loc>
			<lastmod>2025-08-10T20:49:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/10/winrar-zeroday-exploited-to-plant.html</loc>
			<lastmod>2025-08-10T20:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/09/tea-app-slammed-with-ten.html</loc>
			<lastmod>2025-08-09T13:03:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/09/how-to-get-your-share.html</loc>
			<lastmod>2025-08-09T13:02:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/openai-ceo-sam-altman-joined.html</loc>
			<lastmod>2025-08-08T09:12:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/certeu-critical-vulnerabilities-in-microsoft.html</loc>
			<lastmod>2025-08-08T08:14:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/certeu-crushftp-zeroday-exploited-in.html</loc>
			<lastmod>2025-08-08T08:13:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/certeu-high-severity-vulnerability-in.html</loc>
			<lastmod>2025-08-08T08:12:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/cisa-adds-three-known-exploited.html</loc>
			<lastmod>2025-08-08T08:11:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/cisa-releases-ten-industrial-control.html</loc>
			<lastmod>2025-08-08T08:10:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/trend-micro-security-advisory-av.html</loc>
			<lastmod>2025-08-08T08:07:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-08-08T08:07:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/splunk-security-advisory-av-canadian.html</loc>
			<lastmod>2025-08-08T08:06:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/microsoft-exchange-security-advisory-av.html</loc>
			<lastmod>2025-08-08T08:05:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/ssl-vpn-vulnerability-impacting-gen.html</loc>
			<lastmod>2025-08-08T08:05:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/critical-zerodays-crack-open-cyberark.html</loc>
			<lastmod>2025-08-08T08:00:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/luxembourg-probes-reported-attack-on.html</loc>
			<lastmod>2025-08-08T07:59:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/french-telecom-firm-bouygues-says.html</loc>
			<lastmod>2025-08-08T07:16:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/columbia-university-data-breach-impacts.html</loc>
			<lastmod>2025-08-08T07:15:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/leaked-credentials-up-what-attackers.html</loc>
			<lastmod>2025-08-08T07:14:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/greedybear-fake-crypto-wallet-extensions.html</loc>
			<lastmod>2025-08-08T07:14:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/how-devin-ai-can-leak.html</loc>
			<lastmod>2025-08-08T07:12:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/adult-sites-trick-users-into.html</loc>
			<lastmod>2025-08-08T07:10:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/privilege-escalation-issue-in-amazon.html</loc>
			<lastmod>2025-08-08T07:08:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/shared-secret-edr-killer-in.html</loc>
			<lastmod>2025-08-08T06:41:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/unmasking-socgholish-silent-push-untangles.html</loc>
			<lastmod>2025-08-08T06:41:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/unveiling-a-new-variant-of.html</loc>
			<lastmod>2025-08-08T06:40:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/microsoft-discloses-exchange-server-flaw.html</loc>
			<lastmod>2025-08-08T06:40:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/08/new-infection-chain-and-confuserexbased.html</loc>
			<lastmod>2025-08-08T06:39:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/122249.html</loc>
			<lastmod>2025-08-07T11:22:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/122147.html</loc>
			<lastmod>2025-08-07T11:21:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/black-hat-usa-summary-of.html</loc>
			<lastmod>2025-08-07T11:20:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/microsoft-urges-admins-to-plug.html</loc>
			<lastmod>2025-08-07T11:19:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/venice-film-festival-hacked-attendee.html</loc>
			<lastmod>2025-08-07T11:17:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/bigone-hack-m-vanishes-without.html</loc>
			<lastmod>2025-08-07T11:15:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/hacker-accesses-millions-of-imdatacenter.html</loc>
			<lastmod>2025-08-07T11:15:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/air-france-and-klm-confirm.html</loc>
			<lastmod>2025-08-07T11:14:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/atts-ceo-john-stankey-recently.html</loc>
			<lastmod>2025-08-07T09:23:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/openais-new-gpt-models-announced.html</loc>
			<lastmod>2025-08-07T09:06:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/driver-of-destruction-how-a.html</loc>
			<lastmod>2025-08-07T06:49:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/when-good-accounts-go-bad.html</loc>
			<lastmod>2025-08-07T06:48:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/new-ghost-calls-tactic-abuses.html</loc>
			<lastmod>2025-08-07T06:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/certua-warns-of-htadelivered-c.html</loc>
			<lastmod>2025-08-07T06:47:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/google-suffers-data-breach-in.html</loc>
			<lastmod>2025-08-07T06:47:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/07/project-ak-uncovering-a-link.html</loc>
			<lastmod>2025-08-07T06:46:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/ukraine-claims-to-have-hacked.html</loc>
			<lastmod>2025-08-06T11:45:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/shared-secret-edr-killer-in.html</loc>
			<lastmod>2025-08-06T11:44:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/trend-micro-security-advisory-av.html</loc>
			<lastmod>2025-08-06T11:41:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/attackers-exploit-critical-trend-micro.html</loc>
			<lastmod>2025-08-06T11:40:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/whatsapp-cracks-down-on-m.html</loc>
			<lastmod>2025-08-06T11:39:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/google-and-cisco-report-crm.html</loc>
			<lastmod>2025-08-06T11:38:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/dialysis-company-davita-says-more.html</loc>
			<lastmod>2025-08-06T07:01:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/cve-mcpoison-cursor-ide-persistent.html</loc>
			<lastmod>2025-08-06T07:00:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/adobe-issues-emergency-fixes-for.html</loc>
			<lastmod>2025-08-06T06:59:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/cisco-user-data-stolen-in.html</loc>
			<lastmod>2025-08-06T06:59:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/unmasking-the-viral-evolution-of.html</loc>
			<lastmod>2025-08-06T06:58:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/revault-when-your-soc-turns.html</loc>
			<lastmod>2025-08-06T06:58:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/critical-android-vulnerabilities-patchedupdate-as.html</loc>
			<lastmod>2025-08-06T06:57:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/sonicwall-urges-admins-to-disable.html</loc>
			<lastmod>2025-08-06T06:56:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/passwords-credit-card-data-and.html</loc>
			<lastmod>2025-08-06T06:01:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/leaked-chatgpt-conversations-show-people.html</loc>
			<lastmod>2025-08-06T05:58:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/06/national-newswatch-chatgpt-could-be.html</loc>
			<lastmod>2025-08-06T05:53:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/05/cyber-threat-intelligence-report-aug.html</loc>
			<lastmod>2025-08-05T07:57:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/malicious-packages-across-opensource-registries.html</loc>
			<lastmod>2025-08-04T21:44:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/proton-fixes-authenticator-bug-leaking.html</loc>
			<lastmod>2025-08-04T21:43:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/ghost-in-the-zip-new.html</loc>
			<lastmod>2025-08-04T21:42:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/ransomware-gangs-join-attacks-targeting.html</loc>
			<lastmod>2025-08-04T21:41:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/hacking-group-drkrmy-claimed-the.html</loc>
			<lastmod>2025-08-04T13:46:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/nvidia-triton-bugs-let-unauthenticated.html</loc>
			<lastmod>2025-08-04T13:45:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/northwest-radiologists-data-breach-hits.html</loc>
			<lastmod>2025-08-04T13:44:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/new-jsceal-malware-targets-millions.html</loc>
			<lastmod>2025-08-04T13:44:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/vietnamese-hackers-use-pxa-stealer.html</loc>
			<lastmod>2025-08-04T13:42:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/us-announces-million-for-state.html</loc>
			<lastmod>2025-08-04T13:41:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/cybersecurity-ma-roundup-deals-announced.html</loc>
			<lastmod>2025-08-04T13:40:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/sonicwall-firewalls-targeted-in-ransomware.html</loc>
			<lastmod>2025-08-04T13:37:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/vipres-email-threattrends-report-q.html</loc>
			<lastmod>2025-08-04T13:12:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/nationstate-group-clsta-targeted-southeast.html</loc>
			<lastmod>2025-08-04T13:11:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/inside-storm-the-ransomware-operator.html</loc>
			<lastmod>2025-08-04T13:10:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/04/crowdstrike-threat-hunting-report-ai.html</loc>
			<lastmod>2025-08-04T12:43:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/03/ai-still-writing-vulnerable-code.html</loc>
			<lastmod>2025-08-03T20:16:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/03/ir-trends-q-phishing-attacks.html</loc>
			<lastmod>2025-08-03T20:15:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/03/new-linux-backdoor-plague-bypasses.html</loc>
			<lastmod>2025-08-03T15:07:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/03/anthropic-filesystem-mcp-server-directory.html</loc>
			<lastmod>2025-08-03T15:05:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/lionishackers-threat-actors-exfiltrating-and.html</loc>
			<lastmod>2025-08-02T18:41:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/clsta-installs-covert-malware-in.html</loc>
			<lastmod>2025-08-02T18:40:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/critical-oauthproxy-vulnerability-cve-lets.html</loc>
			<lastmod>2025-08-02T18:36:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/what-singapores-first-public-cyber.html</loc>
			<lastmod>2025-08-02T18:34:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/new-shade-bios-technique-beats.html</loc>
			<lastmod>2025-08-02T09:43:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/microsoft-oauth-app-impersonation-campaign.html</loc>
			<lastmod>2025-08-02T09:42:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/pihole-discloses-data-breach-triggered.html</loc>
			<lastmod>2025-08-02T09:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/china-says-us-spies-exploited.html</loc>
			<lastmod>2025-08-02T09:41:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/before-toolshell-exploring-storms-previous.html</loc>
			<lastmod>2025-08-02T09:40:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/02/sonicwall-firewall-devices-hit-in.html</loc>
			<lastmod>2025-08-02T09:39:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/mozilla-has-warned-addon-developers.html</loc>
			<lastmod>2025-08-01T19:46:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/the-state-of-ransomware-q.html</loc>
			<lastmod>2025-08-01T07:40:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/china-accuses-nvidia-of-backdoor.html</loc>
			<lastmod>2025-08-01T07:27:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/google-project-zero-launches-reporting.html</loc>
			<lastmod>2025-08-01T07:13:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/researchers-have-found-that-in.html</loc>
			<lastmod>2025-08-01T07:10:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/08/01/the-hidden-backbone-of-the.html</loc>
			<lastmod>2025-08-01T07:04:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/phishing-with-proofpoint-cyber-attack.html</loc>
			<lastmod>2025-07-31T21:15:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/cyber-threats-surge-in-australia.html</loc>
			<lastmod>2025-07-31T21:13:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/dark-web-profile-safepay-ransomware.html</loc>
			<lastmod>2025-07-31T21:10:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/bill-c-revives-canadian-cyber.html</loc>
			<lastmod>2025-07-31T21:07:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/ransomware-up-credential-theft-up.html</loc>
			<lastmod>2025-07-31T21:05:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/autocolor-backdoor-how-darktrace-thwarted.html</loc>
			<lastmod>2025-07-31T21:02:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/russian-hackers-pose-as-cyber.html</loc>
			<lastmod>2025-07-31T20:59:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/31/hackers-plant-g-raspberry-pi.html</loc>
			<lastmod>2025-07-31T20:57:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/kyrgyzstan-to-control-international-internet.html</loc>
			<lastmod>2025-07-30T19:24:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/palo-alto-networks-security-advisory.html</loc>
			<lastmod>2025-07-30T11:39:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/unit-global-incident-response-report.html</loc>
			<lastmod>2025-07-30T09:29:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/apple-patches-safari-vulnerability-also.html</loc>
			<lastmod>2025-07-30T09:26:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/minnesota-activates-national-guard-in.html</loc>
			<lastmod>2025-07-30T09:25:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/flaw-in-vibe-coding-platform.html</loc>
			<lastmod>2025-07-30T09:24:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/cost-of-data-breach-in.html</loc>
			<lastmod>2025-07-30T09:22:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/trickbot-behind-more-than-million.html</loc>
			<lastmod>2025-07-30T09:21:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/chinese-firms-linked-to-silk.html</loc>
			<lastmod>2025-07-30T09:20:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-07-30T09:19:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/sonicwall-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-30T09:19:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/inc-ransomware-claims-tb-data.html</loc>
			<lastmod>2025-07-30T09:18:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/hunt-for-weak-spots-in.html</loc>
			<lastmod>2025-07-30T09:16:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/its-official-palo-alto-networks.html</loc>
			<lastmod>2025-07-30T09:15:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/zscaler-threatlabz-report-ransomware-data.html</loc>
			<lastmod>2025-07-30T09:13:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/safepay-ransomware-group-threatens-to.html</loc>
			<lastmod>2025-07-30T09:06:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/lovense-zeroday-flaw-exposes-user.html</loc>
			<lastmod>2025-07-30T07:03:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/httpschatgptcomcacacceaccd.html</loc>
			<lastmod>2025-07-30T06:59:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/chatgpt-agent-passes-i-am.html</loc>
			<lastmod>2025-07-30T06:54:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/gunra-ransomware-expands-with-powerful.html</loc>
			<lastmod>2025-07-30T06:51:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/30/cyberattack-on-orange-disrupts-telecom.html</loc>
			<lastmod>2025-07-30T06:45:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/why-palo-alto-networks-is.html</loc>
			<lastmod>2025-07-29T14:54:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/cyber-threat-intelligence-report-jul.html</loc>
			<lastmod>2025-07-29T08:11:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/existential-dread-in-sonicwall-sma.html</loc>
			<lastmod>2025-07-29T07:12:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/unc-revisiting-tactics-of-a.html</loc>
			<lastmod>2025-07-29T07:08:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/sploitlight-macos-vulnerability-exposes-apple.html</loc>
			<lastmod>2025-07-29T07:01:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/naval-group-probes-alleged-tb.html</loc>
			<lastmod>2025-07-29T06:56:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/when-threat-intelligence-overload-becomes.html</loc>
			<lastmod>2025-07-29T06:53:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/29/proukraine-hacktivists-claim-cyberattack-on.html</loc>
			<lastmod>2025-07-29T05:37:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/ai-coding-assistants-cause-data.html</loc>
			<lastmod>2025-07-28T08:57:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/muddled-libra-evolves-into-enterprisescale.html</loc>
			<lastmod>2025-07-28T08:51:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/growing-concerns-over-ais-impact.html</loc>
			<lastmod>2025-07-28T08:45:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/homograph-email-attacks-use-lookalike.html</loc>
			<lastmod>2025-07-28T08:39:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/scattered-spider-hackers-exploit-vmware.html</loc>
			<lastmod>2025-07-28T08:32:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/chaos-ransomware-group-emerges-following.html</loc>
			<lastmod>2025-07-28T08:26:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/big-news-in-ai-gpt.html</loc>
			<lastmod>2025-07-28T08:14:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/hacker-plants-three-strains-of.html</loc>
			<lastmod>2025-07-28T05:59:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/emerging-threat-actor-warlock-ransomware.html</loc>
			<lastmod>2025-07-28T05:56:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/flaw-allowing-website-takeover-found.html</loc>
			<lastmod>2025-07-28T05:53:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/chinalinked-group-fire-ant-exploits.html</loc>
			<lastmod>2025-07-28T05:52:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/scattered-spider-hijacks-vmware-esxi.html</loc>
			<lastmod>2025-07-28T05:51:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/critical-flaws-in-niagara-framework.html</loc>
			<lastmod>2025-07-28T05:49:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/arizona-woman-jailed-for-helping.html</loc>
			<lastmod>2025-07-28T05:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/28/allianz-life-data-breach-exposed.html</loc>
			<lastmod>2025-07-28T05:46:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/on-chan.html</loc>
			<lastmod>2025-07-25T17:59:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/statesponsored-exploits-the-microsoft-sharepoint.html</loc>
			<lastmod>2025-07-25T09:19:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/understanding-http-unavailable-for-legal.html</loc>
			<lastmod>2025-07-25T09:07:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/the-eff-is-but-the.html</loc>
			<lastmod>2025-07-25T07:13:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/what-makes-great-threat-intelligence.html</loc>
			<lastmod>2025-07-25T07:13:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/unmasking-the-new-chaos-raas.html</loc>
			<lastmod>2025-07-25T07:11:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/hacker-sneaks-infostealer-malware-into.html</loc>
			<lastmod>2025-07-25T07:10:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/aipowered-phishing-how-deepfakes-and.html</loc>
			<lastmod>2025-07-25T07:01:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/no-patch-for-flaw-exposing.html</loc>
			<lastmod>2025-07-25T07:00:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/chinese-spies-target-networking-and.html</loc>
			<lastmod>2025-07-25T06:59:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/overcoming-risks-from-chinese-genai.html</loc>
			<lastmod>2025-07-25T06:55:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/25/sophisticated-koske-linux-malware-developed.html</loc>
			<lastmod>2025-07-25T06:54:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/24/from-help-desk-to-hypervisor.html</loc>
			<lastmod>2025-07-24T07:58:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/24/hijacked-npm-package-is-exposes.html</loc>
			<lastmod>2025-07-24T07:53:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/24/toolshell-fallout-chinese-hackers-exploit.html</loc>
			<lastmod>2025-07-24T07:47:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/24/surging-cyber-threats-comparative-insights.html</loc>
			<lastmod>2025-07-24T07:12:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/whofi-researchers-use-wifi-signal.html</loc>
			<lastmod>2025-07-23T07:00:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/healthcare-giant-ameos-discloses-major.html</loc>
			<lastmod>2025-07-23T06:57:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/phishing-in-q-microsoft-leads.html</loc>
			<lastmod>2025-07-23T06:52:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/china-nationstate-actors-target-sharepoint.html</loc>
			<lastmod>2025-07-23T05:55:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/coyote-trojan-first-to-use.html</loc>
			<lastmod>2025-07-23T05:53:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/china-introduces-national-cyber-id.html</loc>
			<lastmod>2025-07-23T05:52:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/of-organizations-experienced-data-leakage.html</loc>
			<lastmod>2025-07-23T05:51:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/researchers-found-nearly-incidents-of.html</loc>
			<lastmod>2025-07-23T05:47:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/google-launches-oss-rebuild-to.html</loc>
			<lastmod>2025-07-23T05:44:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/lumma-stealer-malware-returns-after.html</loc>
			<lastmod>2025-07-23T05:43:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/chinese-hackers-evolution-from-vandals.html</loc>
			<lastmod>2025-07-23T05:40:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/23/introducing-lumo-the-ai-where.html</loc>
			<lastmod>2025-07-23T05:39:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/sophos-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-22T11:08:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/dell-says-data-leaked-by.html</loc>
			<lastmod>2025-07-22T11:07:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/mozilla-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-22T11:07:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/joint-advisory-issued-on-protecting.html</loc>
			<lastmod>2025-07-22T11:06:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/agentic-ai-from-automation-to.html</loc>
			<lastmod>2025-07-22T11:00:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/credential-theft-and-remote-access.html</loc>
			<lastmod>2025-07-22T09:32:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/cisco-confirms-active-exploits-targeting.html</loc>
			<lastmod>2025-07-22T09:31:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/new-us-rule-mandates-cybersecurity.html</loc>
			<lastmod>2025-07-22T09:25:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/shutdown-season-the-q-internet.html</loc>
			<lastmod>2025-07-22T09:13:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/dior-says-personal-information-stolen.html</loc>
			<lastmod>2025-07-22T09:12:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/chinabacked-apt-attack-surfaces-in.html</loc>
			<lastmod>2025-07-22T09:10:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/the-ciso-code-of-conduct.html</loc>
			<lastmod>2025-07-22T09:09:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/microsoft-digital-escorts-reveal-crucial.html</loc>
			<lastmod>2025-07-22T09:06:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/data-shows-of-employees-account.html</loc>
			<lastmod>2025-07-22T09:01:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/cursors-denylist-exposes-the-risks.html</loc>
			<lastmod>2025-07-22T08:54:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/cybersecurity-jobs-available-right-now.html</loc>
			<lastmod>2025-07-22T08:53:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/uk-blames-russias-infamous-fancy.html</loc>
			<lastmod>2025-07-22T08:52:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/isc-bind-security-advisory-av.html</loc>
			<lastmod>2025-07-22T08:51:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/grafana-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-22T08:51:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/world-leaks-claims-dell-data.html</loc>
			<lastmod>2025-07-22T08:50:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-07-22T08:49:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-22T08:49:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/iranlinked-dchspy-android-malware-masquerades.html</loc>
			<lastmod>2025-07-22T08:48:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/dark-web-listings-expose-fujitsu.html</loc>
			<lastmod>2025-07-22T08:47:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/control-systems-cisa-ics-security.html</loc>
			<lastmod>2025-07-22T08:46:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/chinalinked-hackers-launch-targeted-espionage.html</loc>
			<lastmod>2025-07-22T08:46:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-22T08:45:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/poland-investigates-sabotage-after-air.html</loc>
			<lastmod>2025-07-22T07:33:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/fitify-user-data-leaked-including.html</loc>
			<lastmod>2025-07-22T06:05:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/tsa-warns-all-smartphone-usersdo.html</loc>
			<lastmod>2025-07-22T06:03:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/22/microsoft-server-hack-hit-about.html</loc>
			<lastmod>2025-07-22T06:01:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/surveillance-firm-bypasses-ss-defences.html</loc>
			<lastmod>2025-07-21T11:54:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/cve-remote-access-risk-in.html</loc>
			<lastmod>2025-07-21T11:46:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/startup-sells-stolen-data-from.html</loc>
			<lastmod>2025-07-21T11:43:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/crushftp-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-21T11:42:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/iranian-apt-targets-android-users.html</loc>
			<lastmod>2025-07-21T11:42:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/microsoft-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-21T11:34:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/aflac-cyberattack-exposes-sensitive-customer.html</loc>
			<lastmod>2025-07-21T11:26:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/chinese-malware-campaign-uses-domains.html</loc>
			<lastmod>2025-07-21T09:55:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/huntress-uncovers-crux-ransomware-variant.html</loc>
			<lastmod>2025-07-21T09:35:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/dell-confirms-breach-of-demo.html</loc>
			<lastmod>2025-07-21T09:29:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/dutch-justice-department-severs-internet.html</loc>
			<lastmod>2025-07-21T09:21:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/louis-vuitton-investigated-in-hong.html</loc>
			<lastmod>2025-07-21T09:14:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/jamie-siminoffs-return-to-ring.html</loc>
			<lastmod>2025-07-21T08:50:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/singapore-confirms-chinese-statebacked-hackers.html</loc>
			<lastmod>2025-07-21T08:30:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/popular-javascript-libraries-compromised-in.html</loc>
			<lastmod>2025-07-21T08:22:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/malicious-aur-packages-used-to.html</loc>
			<lastmod>2025-07-21T08:15:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/belgian-police-print-cybercrime-warnings.html</loc>
			<lastmod>2025-07-21T07:52:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/chinas-expanding-cyber-offensive-private.html</loc>
			<lastmod>2025-07-21T07:45:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/cloudflare-fends-off-million-ddos.html</loc>
			<lastmod>2025-07-21T07:35:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/21/critical-microsoft-sharepoint-zerodays-exploited.html</loc>
			<lastmod>2025-07-21T07:26:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/20/coindcx-hacked-threat-actors-walk.html</loc>
			<lastmod>2025-07-20T12:58:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/20/inquiry-launched-after-identities-of.html</loc>
			<lastmod>2025-07-20T12:57:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/nodejs-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-19T11:15:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/missouri-adopts-new-data-breach.html</loc>
			<lastmod>2025-07-19T11:14:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/nearly-mcp-servers-possess-no.html</loc>
			<lastmod>2025-07-19T11:12:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/ung-group-hits-china-hong.html</loc>
			<lastmod>2025-07-19T11:11:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/authorities-released-free-decryptor-for.html</loc>
			<lastmod>2025-07-19T11:08:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/threat-actors-scanning-for-apps.html</loc>
			<lastmod>2025-07-19T11:06:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/hackers-exploit-fido-mfa-with.html</loc>
			<lastmod>2025-07-19T11:04:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/botnet-abuses-github-repositories-to.html</loc>
			<lastmod>2025-07-19T11:03:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/19/using-ai-to-combat-cryptocurrency.html</loc>
			<lastmod>2025-07-19T10:58:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/us-house-bans-whatsapp-over.html</loc>
			<lastmod>2025-07-18T11:40:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/government-info-security-news-training.html</loc>
			<lastmod>2025-07-18T09:36:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/golden-dmsa-flaw-exposes-firms.html</loc>
			<lastmod>2025-07-18T09:34:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/dermatology-imaging-hacks-expose-million.html</loc>
			<lastmod>2025-07-18T09:33:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/google-sues-alleged-operators-of.html</loc>
			<lastmod>2025-07-18T08:13:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/ghostcontainer-backdoor-targets-microsoft-exchange.html</loc>
			<lastmod>2025-07-18T08:06:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/matanbuchus-loader-enables-stealth-ransomware.html</loc>
			<lastmod>2025-07-18T07:59:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/coop-breach-exposes-data-of.html</loc>
			<lastmod>2025-07-18T07:46:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/russianbacked-malware-uses-ai-to.html</loc>
			<lastmod>2025-07-18T07:39:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/canada-uk-launch-m-cyber.html</loc>
			<lastmod>2025-07-18T07:25:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/18/russias-mandatory-imei-registration-a.html</loc>
			<lastmod>2025-07-18T07:15:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/adoption-agency-leaks-over-a.html</loc>
			<lastmod>2025-07-17T11:26:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/north-korea-floods-npm-registry.html</loc>
			<lastmod>2025-07-17T05:53:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/ghostcontainer-backdoor-for-exchange-servers.html</loc>
			<lastmod>2025-07-17T05:51:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/oracle-patches-vulnerabilities-with-july.html</loc>
			<lastmod>2025-07-17T05:50:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/episource-breach-exposes-health-data.html</loc>
			<lastmod>2025-07-17T05:49:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/chinese-hackers-breached-us-national.html</loc>
			<lastmod>2025-07-17T05:48:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/cambodia-makes-arrests-in-latest.html</loc>
			<lastmod>2025-07-17T05:47:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/ukrainian-hackers-claim-to-have.html</loc>
			<lastmod>2025-07-17T05:43:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/cloudflare-says-outage-not-caused.html</loc>
			<lastmod>2025-07-17T05:42:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/is-your-router-secretly-working.html</loc>
			<lastmod>2025-07-17T05:42:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/unmasking-asyncrat-navigating-the-labyrinth.html</loc>
			<lastmod>2025-07-17T05:41:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/talos-ir-ransomware-engagements-and.html</loc>
			<lastmod>2025-07-17T05:40:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/google-fixes-actively-exploited-sandbox.html</loc>
			<lastmod>2025-07-17T05:40:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/new-fortinet-fortiweb-hacks-likely.html</loc>
			<lastmod>2025-07-17T05:39:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/17/global-operation-targets-noname-prorussian.html</loc>
			<lastmod>2025-07-17T05:38:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/doge-denizen-marko-elez-leaked.html</loc>
			<lastmod>2025-07-16T07:44:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/north-korean-xorindex-malware-hidden.html</loc>
			<lastmod>2025-07-16T07:43:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/police-disrupt-diskstation-ransomware-gang.html</loc>
			<lastmod>2025-07-16T07:42:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/konfety-returns-classic-mobile-threat.html</loc>
			<lastmod>2025-07-16T07:42:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/attackers-now-scanning-extensively-for.html</loc>
			<lastmod>2025-07-16T07:41:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/how-criminal-networks-exploit-insider.html</loc>
			<lastmod>2025-07-16T07:40:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/mitre-launches-aadapt-framework-for.html</loc>
			<lastmod>2025-07-16T07:40:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/16/uk-launches-vulnerability-research-program.html</loc>
			<lastmod>2025-07-16T07:39:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/15/why-hackers-hack-exploring-what.html</loc>
			<lastmod>2025-07-15T07:01:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/15/gigabyte-motherboards-vulnerable-to-uefi.html</loc>
			<lastmod>2025-07-15T07:00:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/15/behind-the-clouds-attackers-targeting.html</loc>
			<lastmod>2025-07-15T07:00:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/15/forensic-journey-breaking-down-the.html</loc>
			<lastmod>2025-07-15T06:59:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/15/interlock-ransomware-adopts-filefix-method.html</loc>
			<lastmod>2025-07-15T06:58:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/14/spain-awards-huawei-contracts-to.html</loc>
			<lastmod>2025-07-14T06:52:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/14/google-gemini-flaw-hijacks-email.html</loc>
			<lastmod>2025-07-14T06:51:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/14/infostealersasaservice-push-identity-hacks-to.html</loc>
			<lastmod>2025-07-14T06:51:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/14/fix-the-click-preventing-the.html</loc>
			<lastmod>2025-07-14T06:50:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/14/donot-apt-hits-european-ministry.html</loc>
			<lastmod>2025-07-14T06:50:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/13/bd-anonymous-team-is-a.html</loc>
			<lastmod>2025-07-13T08:04:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/12/arrested-in-romania-for-million.html</loc>
			<lastmod>2025-07-12T12:55:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/12/leaked-shellter-elite-tool-now.html</loc>
			<lastmod>2025-07-12T12:54:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/12/iranian-hack-leaks-data-on.html</loc>
			<lastmod>2025-07-12T12:53:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/11/hour-cyber-incident-summary-incident.html</loc>
			<lastmod>2025-07-11T22:16:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/11/turkey-bans-global-esim-providers.html</loc>
			<lastmod>2025-07-11T20:56:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/11/black-yak-faces-billion-won.html</loc>
			<lastmod>2025-07-11T11:52:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/11/paddy-power-data-breach-everything.html</loc>
			<lastmod>2025-07-11T11:51:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/canadian-media-giant-rogers-named.html</loc>
			<lastmod>2025-07-09T17:11:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/ailock-ransomware-what-you-need.html</loc>
			<lastmod>2025-07-09T16:43:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/threat-actor-targeting-indian-defense.html</loc>
			<lastmod>2025-07-09T16:41:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/servicenow-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-09T16:38:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/citrix-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-09T16:37:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/gitlab-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-09T16:36:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/jenkins-security-advisory-av-canadian.html</loc>
			<lastmod>2025-07-09T16:35:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/new-ai-malware-poc-reliably.html</loc>
			<lastmod>2025-07-09T16:33:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/palo-alto-networks-security-advisory.html</loc>
			<lastmod>2025-07-09T16:32:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/serious-flaws-patched-in-model.html</loc>
			<lastmod>2025-07-09T16:30:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/customer-names-addresses-device-ids.html</loc>
			<lastmod>2025-07-09T13:14:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/avantic-medical-lab-hacked-patient.html</loc>
			<lastmod>2025-07-09T13:13:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/nearly-records-leaked-in-major.html</loc>
			<lastmod>2025-07-09T13:12:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/this-is-scary-iranian-hack.html</loc>
			<lastmod>2025-07-09T13:11:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/nearly-people-were-impacted-by.html</loc>
			<lastmod>2025-07-09T07:21:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/beware-of-bert-new-ransomware.html</loc>
			<lastmod>2025-07-09T07:20:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/android-malware-anatsa-infiltrates-google.html</loc>
			<lastmod>2025-07-09T07:19:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/malicious-chrome-extensions-with-m.html</loc>
			<lastmod>2025-07-09T07:17:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/09/nerc-cip-is-approvedheres-what.html</loc>
			<lastmod>2025-07-09T07:16:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/free-onboarding-checklists-to-set.html</loc>
			<lastmod>2025-07-08T12:22:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/italian-police-arrested-a-chinese.html</loc>
			<lastmod>2025-07-08T12:21:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/phishing-scams-can-deceive-large.html</loc>
			<lastmod>2025-07-08T12:20:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/sap-security-advisory-july-monthly.html</loc>
			<lastmod>2025-07-08T12:18:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/hackers-shellter-infostealers-in-red.html</loc>
			<lastmod>2025-07-08T12:17:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/malicious-pull-request-targets-developers.html</loc>
			<lastmod>2025-07-08T12:16:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/citrixbleed-exploitation-started-midjune-how.html</loc>
			<lastmod>2025-07-08T10:01:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/stolen-identities-now-the-biggest.html</loc>
			<lastmod>2025-07-08T09:16:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/end-of-life-for-microsoft.html</loc>
			<lastmod>2025-07-08T09:15:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/pakistans-transparent-tribe-hits-indian.html</loc>
			<lastmod>2025-07-08T09:14:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/ransomware-negotiator-investigated-over-criminal.html</loc>
			<lastmod>2025-07-08T09:12:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/deconstructing-racf-in-zos-and.html</loc>
			<lastmod>2025-07-08T09:11:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/infostealersasaservice-push-identity-hacks-to.html</loc>
			<lastmod>2025-07-08T09:10:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/exploits-technical-details-released-for.html</loc>
			<lastmod>2025-07-08T09:09:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/sap-patches-critical-flaws-that.html</loc>
			<lastmod>2025-07-08T09:08:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/employee-arrested-after-brazils-central.html</loc>
			<lastmod>2025-07-08T06:00:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/cyberattack-deals-blow-to-russian.html</loc>
			<lastmod>2025-07-08T06:00:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/russias-st-petersburg-hit-by.html</loc>
			<lastmod>2025-07-08T05:59:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/chrome-store-features-extension-poisoned.html</loc>
			<lastmod>2025-07-08T05:58:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/batavia-windows-spyware-campaign-targets.html</loc>
			<lastmod>2025-07-08T05:57:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/08/free-certificates-for-ip-addresses.html</loc>
			<lastmod>2025-07-08T05:57:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/07/hijacking-ollamas-signed-installer-for.html</loc>
			<lastmod>2025-07-07T15:56:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/05/csis-issues-espionage-alert-about.html</loc>
			<lastmod>2025-07-05T20:22:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/05/a-threat-actor-claimed-mcdonalds.html</loc>
			<lastmod>2025-07-05T11:45:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/05/brazils-central-bank-service-provider.html</loc>
			<lastmod>2025-07-05T11:44:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/nighteagle-apt-exploits-microsoft-exchange.html</loc>
			<lastmod>2025-07-04T16:14:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/technical-difficulties-or-cyber-attack.html</loc>
			<lastmod>2025-07-04T16:13:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/critical-sudo-bugs-expose-major.html</loc>
			<lastmod>2025-07-04T16:12:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/faster-not-bigger-new-rt.html</loc>
			<lastmod>2025-07-04T16:11:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/louis-vuitton-korea-suffers-cyberattack.html</loc>
			<lastmod>2025-07-04T11:32:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/hacker-leaks-telefnica-data-allegedly.html</loc>
			<lastmod>2025-07-04T11:31:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/europes-euvd-could-shake-up.html</loc>
			<lastmod>2025-07-04T07:15:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/interpol-identifies-west-africa-as.html</loc>
			<lastmod>2025-07-04T07:14:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/prorussian-hacktivism-shifting-alliances-new.html</loc>
			<lastmod>2025-07-04T07:14:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/big-techs-mixed-response-to.html</loc>
			<lastmod>2025-07-04T07:13:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/navigating-heightened-cyber-risks-from.html</loc>
			<lastmod>2025-07-04T07:13:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/apwg-phishing-activity-trends-report.html</loc>
			<lastmod>2025-07-04T07:12:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/macos-nimdoor-dprk-threat-actors.html</loc>
			<lastmod>2025-07-04T07:11:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/junes-dark-gift-the-rise.html</loc>
			<lastmod>2025-07-04T07:10:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/04/okta-observes-v-ai-tool.html</loc>
			<lastmod>2025-07-04T07:10:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/hunters-international-ransomware-shuts-down.html</loc>
			<lastmod>2025-07-03T14:38:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/columbia-university-student-data-stolen.html</loc>
			<lastmod>2025-07-03T13:33:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/toronto-businesses-lose-thousands-of.html</loc>
			<lastmod>2025-07-03T08:31:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/ontario-health-agency-begins-informing.html</loc>
			<lastmod>2025-07-03T07:29:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/second-espionagelinked-cyberattack-hits-icc.html</loc>
			<lastmod>2025-07-03T07:27:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/kelly-benefits-data-breach-has.html</loc>
			<lastmod>2025-07-03T07:24:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/europol-shuts-down-archetyp-market.html</loc>
			<lastmod>2025-07-03T07:23:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/n-korean-hackers-drop-nimdoor.html</loc>
			<lastmod>2025-07-03T07:22:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/cisco-warns-of-hardcoded-credentials.html</loc>
			<lastmod>2025-07-03T07:21:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/undetectable-android-spyware-backfires-leaks.html</loc>
			<lastmod>2025-07-03T07:21:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/chinese-hackers-exploited-ivanti-flaw.html</loc>
			<lastmod>2025-07-03T07:20:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/irans-robert-hack-targets-trump.html</loc>
			<lastmod>2025-07-03T07:19:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/brave-new-kernel-microsoft-previews.html</loc>
			<lastmod>2025-07-03T07:18:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/mandiant-is-reporting-that-the.html</loc>
			<lastmod>2025-07-03T07:10:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/03/calgarys-public-transit-system-is.html</loc>
			<lastmod>2025-07-03T07:09:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/uk-eyes-new-laws-as.html</loc>
			<lastmod>2025-07-02T21:26:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/clp-cybercrime-gangs-data-exfiltration.html</loc>
			<lastmod>2025-07-02T21:25:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/silent-push-uncovers-chinese-fake.html</loc>
			<lastmod>2025-07-02T21:25:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/can-you-trust-that-verified.html</loc>
			<lastmod>2025-07-02T21:24:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/houken-seeking-a-path-by.html</loc>
			<lastmod>2025-07-02T21:24:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/like-seo-llms-may-soon.html</loc>
			<lastmod>2025-07-02T21:23:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/weve-all-been-wrong-phishing.html</loc>
			<lastmod>2025-07-02T21:23:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/devman-ransomware-analysis-of-new.html</loc>
			<lastmod>2025-07-02T08:11:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/paywalls-are-common-in-online.html</loc>
			<lastmod>2025-07-02T07:30:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/qantas-discloses-cyberattack-amid-scattered.html</loc>
			<lastmod>2025-07-02T07:21:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/australias-qantas-says-million-customer.html</loc>
			<lastmod>2025-07-02T07:15:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/hackers-make-hay-smart-tractors.html</loc>
			<lastmod>2025-07-02T07:01:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/att-now-lets-you-lock.html</loc>
			<lastmod>2025-07-02T07:00:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/giftedcrooks-strategic-pivot-from-browser.html</loc>
			<lastmod>2025-07-02T06:59:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/russian-bulletproof-hosting-service-aeza.html</loc>
			<lastmod>2025-07-02T06:59:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/jasper-sleet-north-korean-remote.html</loc>
			<lastmod>2025-07-02T06:58:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/02/hundreds-of-laptops-bank-accounts.html</loc>
			<lastmod>2025-07-02T06:58:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/01/incident-qilin-ransomware-group-leads.html</loc>
			<lastmod>2025-07-01T18:37:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/07/01/iran-threatens-to-release-gb.html</loc>
			<lastmod>2025-07-01T12:19:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/30/android-threats-rise-sharply-with.html</loc>
			<lastmod>2025-06-30T21:54:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/30/sophos-the-state-of-ransomware.html</loc>
			<lastmod>2025-06-30T21:54:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/30/eu-reinforces-its-cybersecurity-with.html</loc>
			<lastmod>2025-06-30T21:52:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/30/225237.html</loc>
			<lastmod>2025-06-30T21:52:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/30/facebook-is-starting-to-feed.html</loc>
			<lastmod>2025-06-30T12:30:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/29/ottawa-orders-chinese-tech-firm.html</loc>
			<lastmod>2025-06-29T10:00:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/texas-centers-for-infectious-disease.html</loc>
			<lastmod>2025-06-28T11:10:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/million-records-allegedly-from-verizon.html</loc>
			<lastmod>2025-06-28T11:10:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/private-key-leaks-and-frontend.html</loc>
			<lastmod>2025-06-28T11:09:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/data-of-k-patients-was.html</loc>
			<lastmod>2025-06-28T11:09:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/forget-chatgpt-and-gemini-this.html</loc>
			<lastmod>2025-06-28T06:58:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/google-pixel-sales-banned-in.html</loc>
			<lastmod>2025-06-28T06:54:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/ontario-investigating-alleged-data-breach.html</loc>
			<lastmod>2025-06-28T06:51:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/chinese-group-silver-fox-uses.html</loc>
			<lastmod>2025-06-28T06:48:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/microsoft-edge-security-advisory-av.html</loc>
			<lastmod>2025-06-28T06:47:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-28T06:47:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/oneclik-apt-campaign-targets-energy.html</loc>
			<lastmod>2025-06-28T06:46:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/in-other-news-norway-dam.html</loc>
			<lastmod>2025-06-28T06:45:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/some-brother-printers-have-a.html</loc>
			<lastmod>2025-06-28T06:44:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/fake-docusign-email-hides-tricky.html</loc>
			<lastmod>2025-06-28T06:44:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/the-good-the-bad-and.html</loc>
			<lastmod>2025-06-28T06:42:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/mongodb-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-28T06:41:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/malicious-ai-models-are-behind.html</loc>
			<lastmod>2025-06-28T06:40:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/fbi-warns-of-scattered-spiders.html</loc>
			<lastmod>2025-06-28T06:38:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/misconfigured-ai-servers-expose-data.html</loc>
			<lastmod>2025-06-28T06:37:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/28/berlin-regulator-orders-apple-google.html</loc>
			<lastmod>2025-06-28T06:35:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/threat-spotlight-cve-citrix-bleed.html</loc>
			<lastmod>2025-06-26T16:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/copyright-cases-should-not-threaten.html</loc>
			<lastmod>2025-06-26T16:47:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/ai-evasion-the-next-frontier.html</loc>
			<lastmod>2025-06-26T08:43:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/sextortion-email-scammers-increase-their.html</loc>
			<lastmod>2025-06-26T08:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/ransomware-attack-contributed-to-patients.html</loc>
			<lastmod>2025-06-26T08:42:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/iranian-educated-manticore-targets-leading.html</loc>
			<lastmod>2025-06-26T08:41:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/chinanexus-lapdogs-network-thrives-on.html</loc>
			<lastmod>2025-06-26T08:40:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/is-my-phone-infected-with.html</loc>
			<lastmod>2025-06-26T08:40:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/xor-marks-the-flaw-in.html</loc>
			<lastmod>2025-06-26T08:39:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/noauth-abuse-alert-full-account.html</loc>
			<lastmod>2025-06-26T08:39:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/new-citrixbleed-netscaler-flaw-let.html</loc>
			<lastmod>2025-06-26T08:38:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/new-wave-of-fake-interviews.html</loc>
			<lastmod>2025-06-26T08:38:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/dire-wolf-strikes-new-ransomware.html</loc>
			<lastmod>2025-06-26T08:37:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/cybercriminal-abuse-of-large-language.html</loc>
			<lastmod>2025-06-26T08:37:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/iranian-apt-hackers-targeting-israeli.html</loc>
			<lastmod>2025-06-26T05:51:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/clickfix-attacks-skyrocketing-more-than.html</loc>
			<lastmod>2025-06-26T05:50:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/064847.html</loc>
			<lastmod>2025-06-26T05:48:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/26/crowdstrike-is-cutting-jobs-in.html</loc>
			<lastmod>2025-06-26T05:47:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/25/how-safe-is-telegram-proton.html</loc>
			<lastmod>2025-06-25T06:35:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/25/xbow-an-autonomous-penetration-tester.html</loc>
			<lastmod>2025-06-25T05:50:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/trezors-support-platform-abused-in.html</loc>
			<lastmod>2025-06-24T21:40:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/leak-of-data-belonging-to.html</loc>
			<lastmod>2025-06-24T21:40:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/attackers-wield-signed-connectwise-installers.html</loc>
			<lastmod>2025-06-24T21:39:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/why-a-classic-mcp-server.html</loc>
			<lastmod>2025-06-24T21:38:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/dissecting-a-malicious-havoc-sample.html</loc>
			<lastmod>2025-06-24T21:37:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/beware-of-fake-sonicwall-vpn.html</loc>
			<lastmod>2025-06-24T21:37:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/black-hat-seo-poisoning-search.html</loc>
			<lastmod>2025-06-24T21:36:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/russialinked-apt-use-signal-chats.html</loc>
			<lastmod>2025-06-24T21:35:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/24/how-us-cyber-ops-may.html</loc>
			<lastmod>2025-06-24T06:53:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/canada-says-telcos-were-breached.html</loc>
			<lastmod>2025-06-23T22:16:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/spy-agency-says-it-improperly.html</loc>
			<lastmod>2025-06-23T09:13:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/fedex-founder-fred-smith-a.html</loc>
			<lastmod>2025-06-23T09:09:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/canada-says-network-devices-compromised.html</loc>
			<lastmod>2025-06-23T09:04:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/violenceasaservice-encrypted-apps-used-in.html</loc>
			<lastmod>2025-06-23T06:55:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/iran-confirmed-it-shut-down.html</loc>
			<lastmod>2025-06-23T06:54:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/qilin-ransomware-gang-now-offers.html</loc>
			<lastmod>2025-06-23T06:53:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/of-new-hires-click-on.html</loc>
			<lastmod>2025-06-23T06:52:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/the-new-sparkkitty-trojan-spy.html</loc>
			<lastmod>2025-06-23T06:51:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/iranlinked-threat-actors-cyber-fattah.html</loc>
			<lastmod>2025-06-23T06:50:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/weekly-recap-chrome-day-tbps.html</loc>
			<lastmod>2025-06-23T06:49:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/zyxel-devices-hit-by-active.html</loc>
			<lastmod>2025-06-23T06:48:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/critical-citrix-netscaler-bug-fixed.html</loc>
			<lastmod>2025-06-23T06:47:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/oxford-city-council-suffers-breach.html</loc>
			<lastmod>2025-06-23T06:41:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/critical-openvpn-driver-vulnerability-allows.html</loc>
			<lastmod>2025-06-23T06:40:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/analyzing-serpentinecloud-threat-actors-abuse.html</loc>
			<lastmod>2025-06-23T06:39:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/cobalt-strike-operators-leverage-powershell.html</loc>
			<lastmod>2025-06-23T06:38:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/23/why-us-and-israel-airstrikes.html</loc>
			<lastmod>2025-06-23T06:37:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/a-look-at-tinker-black.html</loc>
			<lastmod>2025-06-21T21:47:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/is-b-for-backdoor-preauth.html</loc>
			<lastmod>2025-06-21T21:47:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/cybercriminals-target-smart-homes-as.html</loc>
			<lastmod>2025-06-21T21:46:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/hackers-post-dozens-of-malicious.html</loc>
			<lastmod>2025-06-21T21:45:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/microsoft-to-remove-legacy-drivers.html</loc>
			<lastmod>2025-06-21T18:02:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/russian-dairy-supply-disrupted-by.html</loc>
			<lastmod>2025-06-21T18:02:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/resurgence-of-the-prometei-botnet.html</loc>
			<lastmod>2025-06-21T18:02:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/bitopro-exchange-links-lazarus-hackers.html</loc>
			<lastmod>2025-06-21T18:02:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/krispy-kreme-over-people-had.html</loc>
			<lastmod>2025-06-21T18:01:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/looks-like-aflac-is-the.html</loc>
			<lastmod>2025-06-21T18:01:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/qilin-ransomware-top-dogs-treat.html</loc>
			<lastmod>2025-06-21T18:00:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/21/how-cyber-warfare-changes-the.html</loc>
			<lastmod>2025-06-21T18:00:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/your-address-is-out-there.html</loc>
			<lastmod>2025-06-20T16:23:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/172202.html</loc>
			<lastmod>2025-06-20T16:22:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/microsoft-edge-security-advisory-av.html</loc>
			<lastmod>2025-06-20T16:21:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/uk-passes-data-use-and.html</loc>
			<lastmod>2025-06-20T16:20:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/hype-alert-the-largest-data.html</loc>
			<lastmod>2025-06-20T16:19:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/banana-squad-hides-datastealing-malware.html</loc>
			<lastmod>2025-06-20T06:41:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/telecom-giant-viasat-breached-by.html</loc>
			<lastmod>2025-06-20T06:40:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/israeltied-predatory-sparrow-hackers-are.html</loc>
			<lastmod>2025-06-20T06:40:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/20/takeover-of-british-russia-experts.html</loc>
			<lastmod>2025-06-20T06:38:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-19T19:51:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/paragon-commercial-spyware-infects-prominent.html</loc>
			<lastmod>2025-06-19T19:50:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/defending-the-internet-how-cloudflare.html</loc>
			<lastmod>2025-06-19T19:49:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/over-two-thirds-of-msps.html</loc>
			<lastmod>2025-06-19T19:48:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/serpentinecloud-uses-cloudflare-tunnels-in.html</loc>
			<lastmod>2025-06-19T09:10:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/chainlink-phishing-how-trusted-domains.html</loc>
			<lastmod>2025-06-19T09:10:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/beyondtrust-warns-of-preauth-rce.html</loc>
			<lastmod>2025-06-19T09:09:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/new-linux-udisks-flaw-lets.html</loc>
			<lastmod>2025-06-19T09:09:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/scammers-hijack-websites-of-bank.html</loc>
			<lastmod>2025-06-19T09:08:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/famous-chollima-deploying-python-version.html</loc>
			<lastmod>2025-06-19T09:08:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/fake-minecraft-mods-distributed-by.html</loc>
			<lastmod>2025-06-19T09:07:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/new-campaigns-distribute-malware-via.html</loc>
			<lastmod>2025-06-19T07:46:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/iranisrael-war-triggers-a-maelstrom.html</loc>
			<lastmod>2025-06-19T07:00:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/a-new-breed-of-mobile.html</loc>
			<lastmod>2025-06-19T06:59:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/hackers-claim-leak-of-million.html</loc>
			<lastmod>2025-06-19T06:58:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/cve-in-langflow-exploited-to.html</loc>
			<lastmod>2025-06-19T06:57:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/russian-apt-exploits-gmail-app.html</loc>
			<lastmod>2025-06-19T06:57:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/securitys-blind-spot-shadow-ai.html</loc>
			<lastmod>2025-06-19T06:56:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/highseverity-vulnerabilities-patched-by-cisco.html</loc>
			<lastmod>2025-06-19T06:55:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/how-cve-and-cve-enable.html</loc>
			<lastmod>2025-06-19T06:54:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/upandcoming-ransomware-group-anubis-has.html</loc>
			<lastmod>2025-06-19T06:52:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/iranian-crypto-exchange-nobitex-exploited.html</loc>
			<lastmod>2025-06-19T06:51:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/cybercrime-gang-hacks-major-health.html</loc>
			<lastmod>2025-06-19T06:50:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/19/ubs-hit-by-darknet-data.html</loc>
			<lastmod>2025-06-19T06:49:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/scania-confirms-insurance-claim-data.html</loc>
			<lastmod>2025-06-17T21:32:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/us-offering-million-for-info.html</loc>
			<lastmod>2025-06-17T21:32:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/proisrael-hacking-group-claims-to.html</loc>
			<lastmod>2025-06-17T21:31:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/critical-langflow-vulnerability-cve-actively.html</loc>
			<lastmod>2025-06-17T21:31:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/malicious-chimera-turns-larcenous-on.html</loc>
			<lastmod>2025-06-17T21:30:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/hacker-steals-million-cockli-user.html</loc>
			<lastmod>2025-06-17T21:30:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/asus-armoury-crate-bug-lets.html</loc>
			<lastmod>2025-06-17T21:29:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/exploring-a-new-kimjongrat-stealer.html</loc>
			<lastmod>2025-06-17T21:28:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/the-proxy-warfare-unmasking-russias.html</loc>
			<lastmod>2025-06-17T21:28:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/suspected-chinese-hackers-targeted-the.html</loc>
			<lastmod>2025-06-17T08:38:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/water-curse-targets-infosec-pros.html</loc>
			<lastmod>2025-06-17T08:37:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/microsoft-adds-export-option-to.html</loc>
			<lastmod>2025-06-17T08:36:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/million-people-affected-by-data.html</loc>
			<lastmod>2025-06-17T08:35:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/17/security-is-only-as-strong.html</loc>
			<lastmod>2025-06-17T08:34:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/black-basta-leaks-highlight-phishing.html</loc>
			<lastmod>2025-06-16T06:46:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/offline-extraction-of-symantec-account.html</loc>
			<lastmod>2025-06-16T06:44:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/canadian-airline-westjet-hit-by.html</loc>
			<lastmod>2025-06-16T06:42:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/fog-ransomware-group-uses-unconventional.html</loc>
			<lastmod>2025-06-16T06:41:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/new-predator-spyware-infrastructure-revealed.html</loc>
			<lastmod>2025-06-16T06:40:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/anubis-ransomware-packs-a-wiper.html</loc>
			<lastmod>2025-06-16T06:40:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/microsoftsigned-firmware-module-bypasses-secure.html</loc>
			<lastmod>2025-06-16T06:38:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/16/a-recent-cnbc-analysis-why.html</loc>
			<lastmod>2025-06-16T06:37:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/15/healthcare-data-breach-exposes-million.html</loc>
			<lastmod>2025-06-15T11:27:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/14/over-websites-infected-with-jsfiretruck.html</loc>
			<lastmod>2025-06-14T21:25:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/14/anubis-a-closer-look-at.html</loc>
			<lastmod>2025-06-14T21:25:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/14/paraguay-suffered-data-breach-million.html</loc>
			<lastmod>2025-06-14T11:41:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/14/genea-fertility-data-leak-blackmail.html</loc>
			<lastmod>2025-06-14T11:39:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/13/morning-cyber-summary-show-thinking.html</loc>
			<lastmod>2025-06-13T10:42:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/paragon-spyware-activity-found-on.html</loc>
			<lastmod>2025-06-12T21:47:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/sncf-connect-allegedly-breached-millions.html</loc>
			<lastmod>2025-06-12T21:46:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/phishing-sites-posing-as-deepseek.html</loc>
			<lastmod>2025-06-12T07:29:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/over-microsoft-entra-id-accounts.html</loc>
			<lastmod>2025-06-12T06:50:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/interpol-targets-infostealers-ips-taken.html</loc>
			<lastmod>2025-06-12T06:49:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/palo-alto-networks-patches-privilege.html</loc>
			<lastmod>2025-06-12T06:48:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/surge-in-cyberattacks-targeting-journalists.html</loc>
			<lastmod>2025-06-12T06:47:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/echoleak-ai-attack-enabled-theft.html</loc>
			<lastmod>2025-06-12T06:46:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/hackers-target-job-recruiters-through.html</loc>
			<lastmod>2025-06-12T06:45:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/ai-is-your-new-coworker.html</loc>
			<lastmod>2025-06-12T06:43:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/bruteforce-attacks-target-apache-tomcat.html</loc>
			<lastmod>2025-06-12T06:41:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/operation-secure-disrupts-global-infostealer.html</loc>
			<lastmod>2025-06-12T06:40:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/microsoft-slows-windows-h-patch.html</loc>
			<lastmod>2025-06-12T06:40:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/ciso-who-helped-unmask-badbox.html</loc>
			<lastmod>2025-06-12T06:39:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/found-in-the-wild-secure.html</loc>
			<lastmod>2025-06-12T06:39:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/stealth-falcon-apt-exploits-microsoft.html</loc>
			<lastmod>2025-06-12T06:38:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/12/073754.html</loc>
			<lastmod>2025-06-12T06:37:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/morning-cyber-summary-incident-microsoft.html</loc>
			<lastmod>2025-06-11T08:33:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/adobe-releases-patch-fixing-vulnerabilities.html</loc>
			<lastmod>2025-06-11T06:57:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/microsoft-security-advisory-june-monthly.html</loc>
			<lastmod>2025-06-11T06:57:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-06-11T06:56:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/adobe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-11T06:56:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-06-11T06:55:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/stealth-falcon-apt-exploits-microsoft.html</loc>
			<lastmod>2025-06-11T06:54:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/ntlm-reflection-is-dead-long.html</loc>
			<lastmod>2025-06-11T06:53:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/indias-security-leaders-struggle-to.html</loc>
			<lastmod>2025-06-11T06:52:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/of-all-llm-usage-is.html</loc>
			<lastmod>2025-06-11T06:51:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/new-browservenom-malware-being-distributed.html</loc>
			<lastmod>2025-06-11T06:49:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/microsoft-fixes-zeroday-exploited-for.html</loc>
			<lastmod>2025-06-11T06:48:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/11/chinalinked-hackers-target-cybersecurity-firms.html</loc>
			<lastmod>2025-06-11T06:47:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/afternoon-update-ncident-fbi-warns.html</loc>
			<lastmod>2025-06-10T12:48:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/algerian-group-jabaroot-claims-hack.html</loc>
			<lastmod>2025-06-10T11:39:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/morning-update-incident-ransomware-attack.html</loc>
			<lastmod>2025-06-10T08:00:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/vulnerability-in-danabot-malware-c.html</loc>
			<lastmod>2025-06-10T06:51:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/follow-the-smoke-chinanexus-threat.html</loc>
			<lastmod>2025-06-10T06:50:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/stolen-ticketmaster-data-from-snowflake.html</loc>
			<lastmod>2025-06-10T06:49:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/horse-racings-governing-body-hit.html</loc>
			<lastmod>2025-06-10T06:47:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/trump-cybersecurity-order-reverses-biden.html</loc>
			<lastmod>2025-06-10T06:37:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/ai-threats-leave-secops-teams.html</loc>
			<lastmod>2025-06-10T06:35:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/chinalinked-threat-actor-targeted-orgs.html</loc>
			<lastmod>2025-06-10T06:34:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/rare-werewolf-apt-uses-legitimate.html</loc>
			<lastmod>2025-06-10T06:33:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/the-evolution-of-linux-binaries.html</loc>
			<lastmod>2025-06-10T06:33:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/researcher-found-flaw-to-discover.html</loc>
			<lastmod>2025-06-10T06:32:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/russialinked-pathwiper-malware-hits-ukrainian.html</loc>
			<lastmod>2025-06-10T06:31:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/sensitive-information-stolen-in-sensata.html</loc>
			<lastmod>2025-06-10T06:30:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/10/critical-vulnerability-patched-in-sap.html</loc>
			<lastmod>2025-06-10T06:29:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/incident-united-natural-foods-unfi.html</loc>
			<lastmod>2025-06-09T14:23:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/imessage-zeroclick-attacks-suspected-in.html</loc>
			<lastmod>2025-06-09T13:39:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-06-09T13:38:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-09T13:38:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-09T13:38:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-09T13:37:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/new-ai-tool-targets-critical.html</loc>
			<lastmod>2025-06-09T13:37:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/143629.html</loc>
			<lastmod>2025-06-09T13:36:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/limited-canva-creator-data-exposed.html</loc>
			<lastmod>2025-06-09T13:35:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/chinese-hackers-and-user-lapses.html</loc>
			<lastmod>2025-06-09T13:34:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/sentinelone-sees-no-breach-after.html</loc>
			<lastmod>2025-06-09T13:33:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/morning-cyber-security-summary-incident.html</loc>
			<lastmod>2025-06-09T06:48:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/how-global-threat-actors-are.html</loc>
			<lastmod>2025-06-09T06:44:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/fbi-alert-number-ipsa-home.html</loc>
			<lastmod>2025-06-09T06:43:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/russian-spies-are-analyzing-data.html</loc>
			<lastmod>2025-06-09T06:42:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/09/new-mirai-botnet-infect-tbk.html</loc>
			<lastmod>2025-06-09T06:42:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/08/hackers-using-fake-it-support.html</loc>
			<lastmod>2025-06-08T19:06:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/08/eu-prepares-for-transnational-cyberattacks.html</loc>
			<lastmod>2025-06-08T19:05:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/08/experts-found-billion-user-records.html</loc>
			<lastmod>2025-06-08T12:47:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/07/alphabet-ceo-sundar-pichai-dismisses.html</loc>
			<lastmod>2025-06-07T20:30:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/07/can-we-still-tell-whats.html</loc>
			<lastmod>2025-06-07T20:27:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/07/microsoft-says-it-is-ending.html</loc>
			<lastmod>2025-06-07T20:25:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/07/openai-takes-down-covert-operations.html</loc>
			<lastmod>2025-06-07T20:23:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/morning-briefing-incident-ukraine-hacks.html</loc>
			<lastmod>2025-06-06T07:21:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/us-offers-m-for-tips.html</loc>
			<lastmod>2025-06-06T07:13:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/hacker-arrested-for-breaching-hosting.html</loc>
			<lastmod>2025-06-06T07:12:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/ukrainian-carriers-are-leasing-their.html</loc>
			<lastmod>2025-06-06T07:12:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/newly-identified-wiper-malware-pathwiper.html</loc>
			<lastmod>2025-06-06T07:11:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/bidencash-darknet-forum-taken-down.html</loc>
			<lastmod>2025-06-06T07:11:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/bladedfeline-whispering-in-the-dark.html</loc>
			<lastmod>2025-06-06T07:10:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/06/cisco-warns-of-ise-and.html</loc>
			<lastmod>2025-06-06T07:10:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/interlock-ransomware-claims-kettering-health.html</loc>
			<lastmod>2025-06-05T12:06:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/hackers-leak-million-att-records.html</loc>
			<lastmod>2025-06-05T12:04:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/researchers-bypass-deepfake-detection-with.html</loc>
			<lastmod>2025-06-05T07:13:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/creating-the-right-organisational-culture.html</loc>
			<lastmod>2025-06-05T07:13:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/hacker-targets-other-hackers-and.html</loc>
			<lastmod>2025-06-05T07:13:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/acreed-infostealer-poised-to-replace.html</loc>
			<lastmod>2025-06-05T07:12:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/hewlett-packard-enterprise-warns-of.html</loc>
			<lastmod>2025-06-05T07:12:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/05/morning-summary-incident-lee-enterprises.html</loc>
			<lastmod>2025-06-05T07:12:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/amazon-to-invest-b-in.html</loc>
			<lastmod>2025-06-04T19:04:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/attackers-impersonate-ruby-packages-to.html</loc>
			<lastmod>2025-06-04T11:30:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/google-exposes-vishing-group-unc.html</loc>
			<lastmod>2025-06-04T11:29:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/lumma-stealer-malware-resurgence-challenges.html</loc>
			<lastmod>2025-06-04T11:28:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/rajkot-civic-bodys-gis-website.html</loc>
			<lastmod>2025-06-04T11:26:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/m-records-allegedly-stolen-in.html</loc>
			<lastmod>2025-06-04T11:25:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/code-bug-at-compliance-firm.html</loc>
			<lastmod>2025-06-04T11:24:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/hostbased-logs-containerbased-threats-how.html</loc>
			<lastmod>2025-06-04T06:39:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/man-pleads-guilty-to-swatting.html</loc>
			<lastmod>2025-06-04T06:39:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/nso-appeals-whatsapp-decision-says.html</loc>
			<lastmod>2025-06-04T06:38:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/the-north-face-warns-customers.html</loc>
			<lastmod>2025-06-04T06:38:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/meta-and-yandex-are-deanonymizing.html</loc>
			<lastmod>2025-06-04T06:38:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/04/google-patches-new-chrome-zeroday.html</loc>
			<lastmod>2025-06-04T06:37:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/data-breaches-in-the-last.html</loc>
			<lastmod>2025-06-03T07:59:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/over-vulnerabilities-patched-in-android.html</loc>
			<lastmod>2025-06-03T07:09:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/vet-opensource-software-supply-chain.html</loc>
			<lastmod>2025-06-03T07:08:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/new-chrome-zeroday-actively-exploited.html</loc>
			<lastmod>2025-06-03T07:07:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/victims-risk-asyncrat-infection-after.html</loc>
			<lastmod>2025-06-03T07:02:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/080232.html</loc>
			<lastmod>2025-06-03T07:02:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/russian-market-emerges-as-a.html</loc>
			<lastmod>2025-06-03T07:02:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/malaysian-home-ministers-whatsapp-hacked.html</loc>
			<lastmod>2025-06-03T07:01:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/03/qualcomm-fixes-three-adreno-gpu.html</loc>
			<lastmod>2025-06-03T07:01:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/thousands-of-asus-routers-compromised.html</loc>
			<lastmod>2025-06-02T15:57:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/threat-actor-claims-tiktok-breach.html</loc>
			<lastmod>2025-06-02T15:56:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/hacktivists-statesponsored-groups-step-up.html</loc>
			<lastmod>2025-06-02T15:54:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/crowdstrike-and-microsoft-collaborate-to.html</loc>
			<lastmod>2025-06-02T15:49:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-02T15:46:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-02T15:44:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-02T15:41:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/preinstalled-apps-on-ulefone-krgermatz.html</loc>
			<lastmod>2025-06-02T15:40:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/nearly-million-users-switch-mobile.html</loc>
			<lastmod>2025-06-02T11:03:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/data-breaches-affected-million-patient.html</loc>
			<lastmod>2025-06-02T11:01:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/adidas-canada-hit-with-data.html</loc>
			<lastmod>2025-06-02T11:00:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/new-alleged-breaches-bank-banten.html</loc>
			<lastmod>2025-06-02T10:57:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/the-secret-defense-strategy-of.html</loc>
			<lastmod>2025-06-02T10:54:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/iranian-robbinhood-ransomware-operator-pleads.html</loc>
			<lastmod>2025-06-02T10:51:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-06-02T10:50:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-06-02T10:49:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/qualcomm-flags-exploitation-of-adreno.html</loc>
			<lastmod>2025-06-02T10:48:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/uk-military-to-establish-new.html</loc>
			<lastmod>2025-06-02T08:30:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/us-probes-effort-to-impersonate.html</loc>
			<lastmod>2025-06-02T08:29:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/meta-says-it-disrupted-influence.html</loc>
			<lastmod>2025-06-02T08:29:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/why-is-china-deep-in.html</loc>
			<lastmod>2025-06-02T08:28:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/us-sanctions-cloud-provider-funnull.html</loc>
			<lastmod>2025-06-02T08:28:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/germany-doxxes-conti-ransomware-and.html</loc>
			<lastmod>2025-06-02T08:27:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/australian-ransomware-victims-now-must.html</loc>
			<lastmod>2025-06-02T08:27:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/police-takes-down-avcheck-site.html</loc>
			<lastmod>2025-06-02T08:26:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/ddos-incident-disrupts-internet-for.html</loc>
			<lastmod>2025-06-02T08:25:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/british-man-charged-in-us.html</loc>
			<lastmod>2025-06-02T08:24:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/exploit-details-for-max-severity.html</loc>
			<lastmod>2025-06-02T08:24:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/chinese-spying-on-dutch-industries.html</loc>
			<lastmod>2025-06-02T08:24:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/06/02/hidden-bear-the-gru-hackers.html</loc>
			<lastmod>2025-06-02T08:23:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/30/deloitte-data-breach-alleged-leak.html</loc>
			<lastmod>2025-05-30T16:16:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/30/prominent-private-hospital-group-in.html</loc>
			<lastmod>2025-05-30T16:15:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/30/million-passwords-leaked-for-google.html</loc>
			<lastmod>2025-05-30T16:14:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/30/over-people-have-personal-info.html</loc>
			<lastmod>2025-05-30T16:14:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/30/massive-data-leak-exposes-million.html</loc>
			<lastmod>2025-05-30T16:13:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/malicious-npm-packages-leak-network.html</loc>
			<lastmod>2025-05-26T21:24:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/222407.html</loc>
			<lastmod>2025-05-26T21:24:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/bad-actors-target-gen-z.html</loc>
			<lastmod>2025-05-26T12:11:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/what-the-uks-new-cyber.html</loc>
			<lastmod>2025-05-26T12:09:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/chinalinked-apt-unc-started-exploiting.html</loc>
			<lastmod>2025-05-26T12:08:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/cisa-flags-commvault-zeroday-as.html</loc>
			<lastmod>2025-05-26T12:07:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/of-soc-teams-are-overworked.html</loc>
			<lastmod>2025-05-26T12:06:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/researchers-drop-poc-for-fortinet.html</loc>
			<lastmod>2025-05-26T12:05:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/breaking-rsa-encryption-just-got.html</loc>
			<lastmod>2025-05-26T12:04:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/the-cia-secretly-ran-a.html</loc>
			<lastmod>2025-05-26T12:03:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-05-26T12:02:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-05-26T12:02:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-05-26T12:02:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/over-malicious-npm-and-vs.html</loc>
			<lastmod>2025-05-26T12:01:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/malicious-npm-packages-target-react.html</loc>
			<lastmod>2025-05-26T07:33:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/ghostspy-webbased-android-rat-advanced.html</loc>
			<lastmod>2025-05-26T07:33:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/vicioustrap-infiltrate-control-lure-turning.html</loc>
			<lastmod>2025-05-26T07:33:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/083248.html</loc>
			<lastmod>2025-05-26T07:32:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/26/tracking-the-cost-of-quantum.html</loc>
			<lastmod>2025-05-26T07:32:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/over-of-companies-sacrifice-hybrid.html</loc>
			<lastmod>2025-05-25T18:14:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/hackers-use-tiktok-videos-to.html</loc>
			<lastmod>2025-05-25T18:13:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/badsuccessor-exploits-windows-server-flaw.html</loc>
			<lastmod>2025-05-25T18:12:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/silent-ransom-group-targeting-law.html</loc>
			<lastmod>2025-05-25T18:10:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/hackers-use-fake-vpn-and.html</loc>
			<lastmod>2025-05-25T18:10:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/initial-access-brokers-targeted-in.html</loc>
			<lastmod>2025-05-25T18:09:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/reconnaissance-campaign-active-on-npm.html</loc>
			<lastmod>2025-05-25T18:07:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/operation-raptor-led-to-the.html</loc>
			<lastmod>2025-05-25T18:06:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/researchers-cause-gitlab-ai-developer.html</loc>
			<lastmod>2025-05-25T17:06:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/25/cybercrime-is-orders-of-magnitude.html</loc>
			<lastmod>2025-05-25T17:06:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/scarcity-signals-are-rare-activities.html</loc>
			<lastmod>2025-05-23T21:48:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/defendants-federally-charged-in-connection.html</loc>
			<lastmod>2025-05-23T21:47:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/nova-scotia-power-victim-of.html</loc>
			<lastmod>2025-05-23T16:48:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/massive-data-breach-exposes-million.html</loc>
			<lastmod>2025-05-23T16:44:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/microsoft-has-simply-given-us.html</loc>
			<lastmod>2025-05-23T06:38:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/antiledger-malware-the-battle-for.html</loc>
			<lastmod>2025-05-23T06:38:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/uat-exploits-cityworks-zeroday-vulnerability.html</loc>
			<lastmod>2025-05-23T06:38:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/russiaaligned-tag-targets-tajikistan-with.html</loc>
			<lastmod>2025-05-23T06:37:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/chinanexus-threat-actor-actively-exploiting.html</loc>
			<lastmod>2025-05-23T06:37:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/23/russian-hacker-group-killnet-returns.html</loc>
			<lastmod>2025-05-23T06:37:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/phishing-campaign-impersonates-bookingcom-delivers.html</loc>
			<lastmod>2025-05-22T18:05:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/europes-entryexit-system-ees-guide.html</loc>
			<lastmod>2025-05-22T13:23:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/windows-server-flaw-a-shortcut.html</loc>
			<lastmod>2025-05-22T07:36:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/credit-washing-and-synthetic-id.html</loc>
			<lastmod>2025-05-22T07:34:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/dragos-industrial-ransomware-analysis-q.html</loc>
			<lastmod>2025-05-22T07:29:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/brand-impersonation-online-ads-and.html</loc>
			<lastmod>2025-05-22T07:29:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/dero-miner-zombies-biting-through.html</loc>
			<lastmod>2025-05-22T07:28:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/badsuccessor-abusing-dmsa-to-escalate.html</loc>
			<lastmod>2025-05-22T07:28:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/lumma-infostealers-infrastructure-seized-during.html</loc>
			<lastmod>2025-05-22T07:27:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/asia-produces-more-apt-actors.html</loc>
			<lastmod>2025-05-22T07:27:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/uk-police-looking-at-range.html</loc>
			<lastmod>2025-05-22T07:27:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/eu-sanctions-target-individuals-organizations.html</loc>
			<lastmod>2025-05-22T07:26:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/a-familiar-playbook-with-a.html</loc>
			<lastmod>2025-05-22T07:26:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/22/ongoing-ivanti-hijack-bug-exploitation.html</loc>
			<lastmod>2025-05-22T07:26:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/074611.html</loc>
			<lastmod>2025-05-21T06:46:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/dutch-government-passes-law-to.html</loc>
			<lastmod>2025-05-21T06:45:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/windows-s-most-important-new.html</loc>
			<lastmod>2025-05-21T06:45:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/threat-analysis-malicious-npm-package.html</loc>
			<lastmod>2025-05-21T06:44:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/duping-cloud-functions-an-emerging.html</loc>
			<lastmod>2025-05-21T06:44:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/the-sting-of-fake-kling.html</loc>
			<lastmod>2025-05-21T06:43:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/fake-chrome-extensions-found-hijacking.html</loc>
			<lastmod>2025-05-21T06:43:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/freshly-discovered-bug-in-openpgpjs.html</loc>
			<lastmod>2025-05-21T06:42:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/fake-keepass-password-manager-leads.html</loc>
			<lastmod>2025-05-21T06:42:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/major-russian-state-services-disrupted.html</loc>
			<lastmod>2025-05-21T06:41:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/21/ransomware-attack-on-food-distributor.html</loc>
			<lastmod>2025-05-21T06:41:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/red-hat-has-officially-released.html</loc>
			<lastmod>2025-05-20T10:10:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/recollapse-is-a-helper-tool.html</loc>
			<lastmod>2025-05-20T10:06:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/the-persistence-problem-why-exposed.html</loc>
			<lastmod>2025-05-20T08:40:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/when-llms-get-personal-info.html</loc>
			<lastmod>2025-05-20T08:39:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/solarwinds-security-chief-on-the.html</loc>
			<lastmod>2025-05-20T08:39:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/hackers-earn-for-zerodays-at.html</loc>
			<lastmod>2025-05-20T08:38:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/arla-foods-confirms-cyberattack-disrupts.html</loc>
			<lastmod>2025-05-20T08:38:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/how-walmart-plans-to-scale.html</loc>
			<lastmod>2025-05-20T06:44:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/netflix-reportedly-weaving-genai-ads.html</loc>
			<lastmod>2025-05-20T06:41:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/a-tencentbacked-startup-has-brought.html</loc>
			<lastmod>2025-05-20T06:39:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/how-saudi-arabia-is-protecting.html</loc>
			<lastmod>2025-05-20T06:37:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/anthropic-lawyers-apologize-to-court.html</loc>
			<lastmod>2025-05-20T06:35:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/uk-and-european-union-agree.html</loc>
			<lastmod>2025-05-20T06:30:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/research-tracked-malicious-email-every.html</loc>
			<lastmod>2025-05-20T04:54:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/printer-company-procolored-served-infected.html</loc>
			<lastmod>2025-05-20T04:49:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/andme-sale-shows-your-genetic.html</loc>
			<lastmod>2025-05-20T04:48:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/telegram-gave-authorities-data-on.html</loc>
			<lastmod>2025-05-20T04:45:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/ddosecrets-adds-gb-of-telemessage.html</loc>
			<lastmod>2025-05-20T04:44:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/ethical-hackers-exploited-zeroday-vulnerabilities.html</loc>
			<lastmod>2025-05-20T04:43:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/cybersecurity-jobs-available-right-now.html</loc>
			<lastmod>2025-05-20T04:42:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/sarcoma-ransomware-unveiled-anatomy-of.html</loc>
			<lastmod>2025-05-20T04:40:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/government-organizations-lose-nearly-a.html</loc>
			<lastmod>2025-05-20T04:39:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/gobased-malware-deploys-xmrig-miner.html</loc>
			<lastmod>2025-05-20T04:39:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/hackers-nab-years-of-uk.html</loc>
			<lastmod>2025-05-20T04:38:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/20/proposed-gdpr-revisions-stokes-privacy.html</loc>
			<lastmod>2025-05-20T04:36:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/microsoft-layoffs-highlight-aidriven-hiring.html</loc>
			<lastmod>2025-05-18T05:58:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/attacker-specialization-puts-threat-modeling.html</loc>
			<lastmod>2025-05-18T05:55:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/dynamic-dns-emerges-as-goto.html</loc>
			<lastmod>2025-05-18T05:54:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/australian-human-rights-commission-leaks.html</loc>
			<lastmod>2025-05-18T05:53:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/pwnown-berlin-day-two-researcher.html</loc>
			<lastmod>2025-05-18T05:52:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/beware-a-threat-actor-could.html</loc>
			<lastmod>2025-05-18T05:51:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/shields-up-us-retailers-scattered.html</loc>
			<lastmod>2025-05-18T05:49:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/experts-found-rogue-devices-including.html</loc>
			<lastmod>2025-05-18T05:48:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/former-us-govt-employees-targeted.html</loc>
			<lastmod>2025-05-18T05:47:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/agentic-ai-tech-firm-says.html</loc>
			<lastmod>2025-05-18T05:46:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/18/lockbit-leaks-reveal-drive-to.html</loc>
			<lastmod>2025-05-18T05:45:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/this-white-paper-offers-a.html</loc>
			<lastmod>2025-05-10T17:00:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/americans-affected-as-major-data.html</loc>
			<lastmod>2025-05-10T12:08:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/pakistani-cyber-offensive-hits-indian.html</loc>
			<lastmod>2025-05-10T12:07:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/threat-brief-cve-the-article.html</loc>
			<lastmod>2025-05-10T07:54:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/google-pays-billion-to-texas.html</loc>
			<lastmod>2025-05-10T07:54:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/10/aws-pushes-aipowered-threat-detection.html</loc>
			<lastmod>2025-05-10T07:53:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/cloudflare-ceo-warns-ai-and.html</loc>
			<lastmod>2025-05-09T17:49:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/malware-scammers-target-hr-professionals.html</loc>
			<lastmod>2025-05-09T11:04:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/a-closer-look-at-plugvalley.html</loc>
			<lastmod>2025-05-09T11:03:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/the-top-threat-actor-groups.html</loc>
			<lastmod>2025-05-09T11:02:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/mandiant-links-dragonforce-ransomware-attacks.html</loc>
			<lastmod>2025-05-09T11:01:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/threat-actor-bypass-sentinelone-edr.html</loc>
			<lastmod>2025-05-09T10:59:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/bank-data-breach-blamed-on.html</loc>
			<lastmod>2025-05-09T10:58:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/ransomware-what-the-lockbit-data.html</loc>
			<lastmod>2025-05-09T10:57:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/american-income-life-insurance-data.html</loc>
			<lastmod>2025-05-09T10:56:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/data-breach-confirmed-by-insight.html</loc>
			<lastmod>2025-05-09T10:55:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/chinese-cyber-menace-exceeds-threat.html</loc>
			<lastmod>2025-05-09T10:48:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/no-cyber-threat-to-india.html</loc>
			<lastmod>2025-05-09T10:45:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/how-security-has-changed-the.html</loc>
			<lastmod>2025-05-09T10:42:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/impacted-by-valsoft-data-breach.html</loc>
			<lastmod>2025-05-09T10:38:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/fake-ai-platforms-deliver-malware.html</loc>
			<lastmod>2025-05-09T10:37:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/llm-prompt-injection-whats-the.html</loc>
			<lastmod>2025-05-09T10:35:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/insider-risk-revisited-espionage-encryption.html</loc>
			<lastmod>2025-05-09T10:34:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/legacy-login-in-microsoft-entra.html</loc>
			<lastmod>2025-05-09T10:34:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/cybercriminal-services-target-endoflife-routers.html</loc>
			<lastmod>2025-05-09T10:32:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/initial-access-brokers-target-brazil.html</loc>
			<lastmod>2025-05-09T10:31:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/no-fairy-tale-ending-powerschools.html</loc>
			<lastmod>2025-05-09T10:28:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/tdsb-says-it-got-ransom.html</loc>
			<lastmod>2025-05-09T07:53:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/microsoft-employees-are-banned-from.html</loc>
			<lastmod>2025-05-09T07:52:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/tone-deaf-us-tech-company.html</loc>
			<lastmod>2025-05-09T07:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/education-giant-pearson-hit-by.html</loc>
			<lastmod>2025-05-09T07:46:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/millions-of-canadians-health-data.html</loc>
			<lastmod>2025-05-09T07:36:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/countries-begin-natos-locked-shields.html</loc>
			<lastmod>2025-05-09T06:30:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/using-ai-to-stop-tech.html</loc>
			<lastmod>2025-05-09T06:30:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/malicious-pypi-package-targets-discord.html</loc>
			<lastmod>2025-05-09T06:29:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/cyber-criminals-impersonate-payroll-hr.html</loc>
			<lastmod>2025-05-09T06:29:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/spam-campaign-targeting-brazil-abuses.html</loc>
			<lastmod>2025-05-09T06:29:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/multilayered-email-attack-how-a.html</loc>
			<lastmod>2025-05-09T06:28:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/cisco-patches-cve-cvss-in.html</loc>
			<lastmod>2025-05-09T06:28:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/09/lockbit-ransomware-gang-hacked-victim.html</loc>
			<lastmod>2025-05-09T06:27:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/seeing-clearly-understanding-and-addressing.html</loc>
			<lastmod>2025-05-07T21:44:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/news-news-briefs-cybercrime-get.html</loc>
			<lastmod>2025-05-07T21:44:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/hacks-of-uk-retailers-are.html</loc>
			<lastmod>2025-05-07T21:43:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/europol-shuts-down-six-ddosforhire.html</loc>
			<lastmod>2025-05-07T21:43:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/iranian-cyber-actors-impersonate-model.html</loc>
			<lastmod>2025-05-07T21:43:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/224231.html</loc>
			<lastmod>2025-05-07T21:42:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/inferno-drainer-reloaded-deep-dive.html</loc>
			<lastmod>2025-05-07T21:42:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/agenda-ransomware-group-adds-smokeloader.html</loc>
			<lastmod>2025-05-07T21:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/sysowned-your-friendly-support-ticket.html</loc>
			<lastmod>2025-05-07T21:41:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/224119.html</loc>
			<lastmod>2025-05-07T21:41:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/israeli-spyware-giant-nso-group.html</loc>
			<lastmod>2025-05-07T21:40:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/coldriver-using-new-malware-to.html</loc>
			<lastmod>2025-05-07T21:40:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/threat-actor-claims-to-leak.html</loc>
			<lastmod>2025-05-07T12:31:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/trumps-deportation-airline-just-got.html</loc>
			<lastmod>2025-05-07T12:31:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/billion-passwords-leaked-in-reused.html</loc>
			<lastmod>2025-05-07T12:30:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/linux-wiper-malware-hidden-in.html</loc>
			<lastmod>2025-05-07T06:48:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/canary-exploit-tool-for-cve.html</loc>
			<lastmod>2025-05-07T06:48:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/074743.html</loc>
			<lastmod>2025-05-07T06:47:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/lampion-is-back-with-clickfix.html</loc>
			<lastmod>2025-05-07T06:46:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/dragonforce-ransomware-redefining-hybrid-extortion.html</loc>
			<lastmod>2025-05-07T06:46:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/here-comes-mirai-iot-devices.html</loc>
			<lastmod>2025-05-07T06:45:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/defending-against-unc-cybercrime-hardening.html</loc>
			<lastmod>2025-05-07T06:44:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/07/android-fixes-vulnerabilities-including-one.html</loc>
			<lastmod>2025-05-07T06:44:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/05/incidents-impacting-retailers-recommendations-from.html</loc>
			<lastmod>2025-05-05T07:24:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/05/microsoft-ends-authenticator-password-autofill.html</loc>
			<lastmod>2025-05-05T07:22:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/04/wget-to-wipeout-malicious-go.html</loc>
			<lastmod>2025-05-04T18:31:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/04/us-charges-yemeni-hacker-behind.html</loc>
			<lastmod>2025-05-04T18:30:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/04/ransomware-attacks-up-but-payments.html</loc>
			<lastmod>2025-05-04T18:30:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/04/patients-left-in-the-dark.html</loc>
			<lastmod>2025-05-04T11:33:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/03/ransomware-group-threatens-cobb-county.html</loc>
			<lastmod>2025-05-03T12:01:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/coop-confirms-data-theft-after.html</loc>
			<lastmod>2025-05-02T22:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/exploring-pleak-an-algorithmic-method.html</loc>
			<lastmod>2025-05-02T22:41:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/attackers-ramp-up-efforts-targeting.html</loc>
			<lastmod>2025-05-02T22:41:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/white-house-proposes-million-cut.html</loc>
			<lastmod>2025-05-02T22:40:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/uncovering-mintsloader-with-recorded-future.html</loc>
			<lastmod>2025-05-02T22:39:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/i-stealc-you-tracking-the.html</loc>
			<lastmod>2025-05-02T22:39:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/prorussia-hacktivists-bombard-dutch-public.html</loc>
			<lastmod>2025-05-02T22:38:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/backdoor-found-in-popular-ecommerce.html</loc>
			<lastmod>2025-05-02T22:38:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/us-indicts-black-kingdom-ransomware.html</loc>
			<lastmod>2025-05-02T22:37:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/sonicboom-from-stolen-tokens-to.html</loc>
			<lastmod>2025-05-02T22:37:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/wikipedia-says-it-will-use.html</loc>
			<lastmod>2025-05-02T18:19:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/zelle-outage-fednow-apple-card.html</loc>
			<lastmod>2025-05-02T18:16:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/microsoft-ditches-passwords-by-default.html</loc>
			<lastmod>2025-05-02T18:14:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/amazon-unveils-nova-premier-ai.html</loc>
			<lastmod>2025-05-02T18:12:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/external-payments-now-allowed-by.html</loc>
			<lastmod>2025-05-02T18:10:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/deepseek-quietly-updates-opensource-model.html</loc>
			<lastmod>2025-05-02T18:09:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/parttime-job-platform-albamon-reports.html</loc>
			<lastmod>2025-05-02T11:19:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/disney-hack-man-pleads-guilty.html</loc>
			<lastmod>2025-05-02T11:19:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/when-threat-actors-behave-like.html</loc>
			<lastmod>2025-05-02T09:57:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/ransomware-debris-an-analysis-of.html</loc>
			<lastmod>2025-05-02T09:56:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/fortiguard-incident-response-team-detects.html</loc>
			<lastmod>2025-05-02T09:56:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/analyzing-cve-a-macos-securityscoped.html</loc>
			<lastmod>2025-05-02T09:56:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/thewizards-apt-group-uses-slaac.html</loc>
			<lastmod>2025-05-02T09:55:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/apple-notifies-victims-in-countries.html</loc>
			<lastmod>2025-05-02T09:55:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/harrods-the-next-uk-retailer.html</loc>
			<lastmod>2025-05-02T09:55:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/02/polands-state-registry-temporarily-blocked.html</loc>
			<lastmod>2025-05-02T09:54:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/ticket-resale-platform-tickettocash-left.html</loc>
			<lastmod>2025-05-01T11:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/million-ssns-may-have-been.html</loc>
			<lastmod>2025-05-01T11:42:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/hacking-in-space-not-as.html</loc>
			<lastmod>2025-05-01T06:41:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/age-verification-in-the-european.html</loc>
			<lastmod>2025-05-01T06:41:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/windows-rdp-lets-you-log.html</loc>
			<lastmod>2025-05-01T06:41:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/gremlin-stealer-new-stealer-on.html</loc>
			<lastmod>2025-05-01T06:40:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/uk-retailer-coop-shuts-down.html</loc>
			<lastmod>2025-05-01T06:40:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/microsoft-gets-twitchy-over-talk.html</loc>
			<lastmod>2025-05-01T06:39:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/google-play-sees-decline-in.html</loc>
			<lastmod>2025-05-01T06:39:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/hive-group-targets-russian-firms.html</loc>
			<lastmod>2025-05-01T06:37:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/sentinelone-targeted-by-north-korean.html</loc>
			<lastmod>2025-05-01T06:36:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/new-research-reveals-of-appsec.html</loc>
			<lastmod>2025-05-01T06:34:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/world-password-day-should-you.html</loc>
			<lastmod>2025-05-01T06:33:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/chinese-apts-adversaryinthemiddle-tool-dissected.html</loc>
			<lastmod>2025-05-01T06:32:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/05/01/city-of-long-beach-says.html</loc>
			<lastmod>2025-05-01T06:32:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/data-breach-disclosed-by-urbanone.html</loc>
			<lastmod>2025-04-30T11:40:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/commvault-says-recent-breach-didnt.html</loc>
			<lastmod>2025-04-30T11:37:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/hertz-data-breach-exposed-customers.html</loc>
			<lastmod>2025-04-30T11:36:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/somnia-anesthesia-firm-gets-m.html</loc>
			<lastmod>2025-04-30T11:35:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/ascension-discloses-new-data-breach.html</loc>
			<lastmod>2025-04-30T11:32:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/former-disney-employee-sentenced-to.html</loc>
			<lastmod>2025-04-30T08:43:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/spotlight-on-rsac-how-to.html</loc>
			<lastmod>2025-04-30T08:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/spotlight-on-rsac-the-one.html</loc>
			<lastmod>2025-04-30T08:42:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/spotlight-on-rsac-china-is.html</loc>
			<lastmod>2025-04-30T08:41:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/spotlight-on-rsac-china-now.html</loc>
			<lastmod>2025-04-30T08:41:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/whatsapp-says-inapp-ai-tools.html</loc>
			<lastmod>2025-04-30T08:41:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/aigenerated-code-could-be-a.html</loc>
			<lastmod>2025-04-30T08:41:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/amazon-launches-its-first-internet.html</loc>
			<lastmod>2025-04-30T08:40:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/hackers-ramp-up-scans-for.html</loc>
			<lastmod>2025-04-30T08:40:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/hello-days-my-old-friend.html</loc>
			<lastmod>2025-04-30T08:40:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/france-blames-russian-military-intelligence.html</loc>
			<lastmod>2025-04-30T08:39:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-30T06:49:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/shadow-role-vulnerability-in-aws.html</loc>
			<lastmod>2025-04-30T06:48:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/indian-court-orders-action-to.html</loc>
			<lastmod>2025-04-30T06:47:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/of-organizations-face-vulnerability-remediation.html</loc>
			<lastmod>2025-04-30T06:46:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/nt-analyzer-can-help-determine.html</loc>
			<lastmod>2025-04-30T06:45:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/meta-launches-llamafirewall-framework-to.html</loc>
			<lastmod>2025-04-30T06:44:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/airplay-vulnerabilities-expose-apple-devices.html</loc>
			<lastmod>2025-04-30T06:43:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/france-blames-russia-for-cyberattacks.html</loc>
			<lastmod>2025-04-30T06:42:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/ransomhub-went-dark-april-affiliates.html</loc>
			<lastmod>2025-04-30T06:41:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/meta-releases-llama-ai-open.html</loc>
			<lastmod>2025-04-30T06:40:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/china-hackers-used-trojanized-uyghureditpp.html</loc>
			<lastmod>2025-04-30T06:39:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/30/adapting-to-ai-the-future.html</loc>
			<lastmod>2025-04-30T06:38:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/29/sentinelone-uncovers-chinese-espionage-campaign.html</loc>
			<lastmod>2025-04-29T14:09:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/29/k-aussies-have-had-their.html</loc>
			<lastmod>2025-04-29T11:28:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/29/how-to-use-generative-ai.html</loc>
			<lastmod>2025-04-29T08:54:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/29/employee-benefits-firm-says-million.html</loc>
			<lastmod>2025-04-29T08:07:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/29/threat-actors-hacking-sap-critical.html</loc>
			<lastmod>2025-04-29T08:06:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/researchers-secretly-ran-a-massive.html</loc>
			<lastmod>2025-04-28T21:07:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/jokerotp-dismantled-after-phishing-attacks.html</loc>
			<lastmod>2025-04-28T09:24:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/active-exploitation-of-sap-netweaver.html</loc>
			<lastmod>2025-04-28T09:23:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/million-affected-by-verisource-data.html</loc>
			<lastmod>2025-04-28T09:21:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/in-the-age-of-ai.html</loc>
			<lastmod>2025-04-28T09:19:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/braves-cookiecrumbler-tool-taps-community.html</loc>
			<lastmod>2025-04-28T09:19:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/how-to-spot-fake-online.html</loc>
			<lastmod>2025-04-28T09:18:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/ai-is-getting-creepy-good.html</loc>
			<lastmod>2025-04-28T09:18:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/dragonforce-expands-ransomware-model-with.html</loc>
			<lastmod>2025-04-28T09:18:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/hackers-access-sensitive-sim-card.html</loc>
			<lastmod>2025-04-28T09:17:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/28/woocommerce-admins-targeted-by-fake.html</loc>
			<lastmod>2025-04-28T09:17:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/27/fss-investigates-hacking-incidents-at.html</loc>
			<lastmod>2025-04-27T16:07:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/27/mod-investigates-major-security-breach.html</loc>
			<lastmod>2025-04-27T16:06:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/27/americans-exposed-as-massive-medical.html</loc>
			<lastmod>2025-04-27T16:06:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/27/transforming-cyber-strategies-to-shape.html</loc>
			<lastmod>2025-04-27T10:08:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/27/an-entire-company-was-staffed.html</loc>
			<lastmod>2025-04-27T09:59:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/26/oregon-deq-wont-say-if.html</loc>
			<lastmod>2025-04-26T12:46:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/26/interlock-ransomware-say-it-stole.html</loc>
			<lastmod>2025-04-26T12:45:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/human-error-causes-alarming-rise.html</loc>
			<lastmod>2025-04-25T12:06:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/blue-shield-leaked-millions-of.html</loc>
			<lastmod>2025-04-25T12:05:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/hackers-claim-tiktok-breach-leak.html</loc>
			<lastmod>2025-04-25T12:04:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/data-leak-fatigue-may-cause.html</loc>
			<lastmod>2025-04-25T08:31:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/european-manufacturing-data-breaches-up.html</loc>
			<lastmod>2025-04-25T08:29:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/ai-impact-on-data-breach.html</loc>
			<lastmod>2025-04-25T08:26:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/microsoft-purges-millions-of-cloud.html</loc>
			<lastmod>2025-04-25T08:25:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/deepseek-breach-opens-floodgates-to.html</loc>
			<lastmod>2025-04-25T08:24:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/all-major-genai-models-vulnerable.html</loc>
			<lastmod>2025-04-25T08:22:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/a-new-version-of-triada.html</loc>
			<lastmod>2025-04-25T08:22:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/new-critical-sap-netweaver-flaw.html</loc>
			<lastmod>2025-04-25T08:21:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/south-korean-companies-targeted-by.html</loc>
			<lastmod>2025-04-25T08:20:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/phishing-kit-darcula-gets-lethal.html</loc>
			<lastmod>2025-04-25T08:19:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/inside-the-verizon-dbir-five.html</loc>
			<lastmod>2025-04-25T08:18:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/vehicles-face-more-attacks-times.html</loc>
			<lastmod>2025-04-25T08:18:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/the-good-the-bad-and.html</loc>
			<lastmod>2025-04-25T08:17:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/hacks-targeting-cloud-single-signon.html</loc>
			<lastmod>2025-04-25T08:16:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/north-korean-hackers-use-russian.html</loc>
			<lastmod>2025-04-25T08:16:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/25/yale-new-haven-health-notifying.html</loc>
			<lastmod>2025-04-25T08:15:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/24/of-threat-groups-active-in.html</loc>
			<lastmod>2025-04-24T10:54:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/24/zoom-attack-tricks-victims-into.html</loc>
			<lastmod>2025-04-24T10:49:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/24/fbi-confirms-billion-losses-to.html</loc>
			<lastmod>2025-04-24T10:48:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/24/kelly-benefits-notifying-nearly-of.html</loc>
			<lastmod>2025-04-24T10:47:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/24/cves-exploited-in-q-within.html</loc>
			<lastmod>2025-04-24T10:44:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/thirdparty-data-breaches-rise-almost.html</loc>
			<lastmod>2025-04-23T14:28:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/california-is-about-to-run.html</loc>
			<lastmod>2025-04-23T14:27:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/whatsapp-launches-privacy-tool-to.html</loc>
			<lastmod>2025-04-23T14:23:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/notice-of-data-breach-blue.html</loc>
			<lastmod>2025-04-23T14:22:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/files-deleted-from-github-repos.html</loc>
			<lastmod>2025-04-23T07:40:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/uk-utility-cyberattacks-rose-from.html</loc>
			<lastmod>2025-04-23T07:39:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/australian-businesses-gear-up-for.html</loc>
			<lastmod>2025-04-23T07:39:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/senior-cisa-advisers-announce-exits.html</loc>
			<lastmod>2025-04-23T07:38:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/23/russian-chinese-hackers-targeted-dutch.html</loc>
			<lastmod>2025-04-23T07:37:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/sk-telecom-reports-hacking-incident.html</loc>
			<lastmod>2025-04-22T11:38:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/japan-warns-of-hundreds-of.html</loc>
			<lastmod>2025-04-22T11:38:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/microsoft-entra-id-lockouts-after.html</loc>
			<lastmod>2025-04-22T08:00:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/sslcom-scrambles-to-patch-certificate.html</loc>
			<lastmod>2025-04-22T07:42:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/russian-host-proton-tied-to.html</loc>
			<lastmod>2025-04-22T07:41:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/reborn-cybercrime-marketplace-cracked-appears.html</loc>
			<lastmod>2025-04-22T07:40:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/22/whats-in-store-for-the.html</loc>
			<lastmod>2025-04-22T07:39:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/urgent-warning-to-all-b.html</loc>
			<lastmod>2025-04-21T12:38:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/rogue-npm-packages-mimic-telegram.html</loc>
			<lastmod>2025-04-21T06:51:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/whistleblower-complaint-exposes-doge-cybersecurity.html</loc>
			<lastmod>2025-04-21T06:51:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/could-ransomware-survive-without-cryptocurrency.html</loc>
			<lastmod>2025-04-21T06:51:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/chinese-apt-mustang-panda-debuts.html</loc>
			<lastmod>2025-04-21T06:50:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/interlock-ransomware-gang-pushes-fake.html</loc>
			<lastmod>2025-04-21T06:50:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/widespread-microsoft-entra-lockouts-tied.html</loc>
			<lastmod>2025-04-21T06:48:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/21/multistage-malware-attack-uses-jse.html</loc>
			<lastmod>2025-04-21T06:47:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/19/baltimore-city-states-attorneys-office.html</loc>
			<lastmod>2025-04-19T11:38:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/19/thousands-of-uk-users-of.html</loc>
			<lastmod>2025-04-19T11:38:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/18/canada-warns-cyber-defenders-to.html</loc>
			<lastmod>2025-04-18T08:15:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/crazyhunter-campaign-targets-taiwanese-critical.html</loc>
			<lastmod>2025-04-17T08:36:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/latest-mustang-panda-arsenal-toneshell.html</loc>
			<lastmod>2025-04-17T08:35:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/max-severity-bug-in-apache.html</loc>
			<lastmod>2025-04-17T08:35:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/task-scheduler-new-vulnerabilities-for.html</loc>
			<lastmod>2025-04-17T08:34:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/cve-ntlm-exploit-in-the.html</loc>
			<lastmod>2025-04-17T08:34:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/cisa-extends-cve-program-contract.html</loc>
			<lastmod>2025-04-17T08:33:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/funding-expires-for-key-cyber.html</loc>
			<lastmod>2025-04-17T08:33:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/zoom-video-conferencing-app-down.html</loc>
			<lastmod>2025-04-17T07:41:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/chinese-threat-group-unc-caught.html</loc>
			<lastmod>2025-04-17T07:39:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/new-version-of-mysterysnail-rat.html</loc>
			<lastmod>2025-04-17T07:38:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/chinese-apt-mustang-panda-updates.html</loc>
			<lastmod>2025-04-17T07:36:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/backoffice-servicer-says-dual-hacks.html</loc>
			<lastmod>2025-04-17T07:34:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/uk-fines-law-firm-pounds.html</loc>
			<lastmod>2025-04-17T07:32:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/17/cybersecurity-alarms-sound-over-loss.html</loc>
			<lastmod>2025-04-17T07:32:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/krebs-organizational-announcement-chris-krebs.html</loc>
			<lastmod>2025-04-16T18:31:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/cra-accounts-hacked-after-social.html</loc>
			<lastmod>2025-04-16T11:34:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/chinese-android-phones-shipped-with.html</loc>
			<lastmod>2025-04-16T08:22:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/enhanced-version-of-bpfdoor-linux.html</loc>
			<lastmod>2025-04-16T08:21:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/microsoft-joins-google-and-yahoo.html</loc>
			<lastmod>2025-04-16T08:20:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/squarex-to-uncover-data-splicing.html</loc>
			<lastmod>2025-04-16T08:19:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/16/chinese-hackers-deploy-stealthy-fileless.html</loc>
			<lastmod>2025-04-16T08:18:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/of-firms-say-pentesting-is.html</loc>
			<lastmod>2025-04-15T07:45:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/075220.html</loc>
			<lastmod>2025-04-15T06:52:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/hertz-discloses-data-breach-linked.html</loc>
			<lastmod>2025-04-15T06:51:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/critical-flaws-fixed-in-nagios.html</loc>
			<lastmod>2025-04-15T06:51:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/china-pursuing-alleged-us-operatives.html</loc>
			<lastmod>2025-04-15T06:50:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/new-malware-variant-identified-resolverrat.html</loc>
			<lastmod>2025-04-15T06:47:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/pakistanlinked-hackers-expand-targets-in.html</loc>
			<lastmod>2025-04-15T06:47:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/bpfdoors-hidden-controller-used-against.html</loc>
			<lastmod>2025-04-15T06:47:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/medusa-ransomware-gang-claims-to.html</loc>
			<lastmod>2025-04-15T06:46:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/fakeupdates-still-the-most-common.html</loc>
			<lastmod>2025-04-15T06:46:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/the-most-dangerous-hackers-youve.html</loc>
			<lastmod>2025-04-15T06:44:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/hacktivism-resurges-but-dont-be.html</loc>
			<lastmod>2025-04-15T06:44:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/15/chan-down-updates-thousands-of.html</loc>
			<lastmod>2025-04-15T05:56:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/an-official-statement-in-response.html</loc>
			<lastmod>2025-04-14T16:13:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/slow-pisces-targets-developers-with.html</loc>
			<lastmod>2025-04-14T11:25:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-04-14T11:24:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/ai-hallucinations-create-a-new.html</loc>
			<lastmod>2025-04-14T11:23:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/malicious-npm-packages-target-paypal.html</loc>
			<lastmod>2025-04-14T11:22:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-14T11:21:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/davita-hit-by-ransomware-attack.html</loc>
			<lastmod>2025-04-14T11:21:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/resolverrat-campaign-targets-healthcare-pharma.html</loc>
			<lastmod>2025-04-14T11:20:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-14T11:19:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/attackers-maintaining-access-to-fully.html</loc>
			<lastmod>2025-04-14T11:18:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/psychiatric-documents-with-sensitive-patient.html</loc>
			<lastmod>2025-04-14T11:16:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/top-us-lab-testing-firm.html</loc>
			<lastmod>2025-04-14T11:15:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/skcom-allegedly-hacked-by-qilin.html</loc>
			<lastmod>2025-04-14T11:14:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/14/elon-musk-million-private-jet.html</loc>
			<lastmod>2025-04-14T11:13:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/12/trump-exempts-phones-computers-chips.html</loc>
			<lastmod>2025-04-12T08:57:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/11/pentagon-to-terminate-billion-in.html</loc>
			<lastmod>2025-04-11T07:29:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/095036.html</loc>
			<lastmod>2025-04-10T08:50:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/094545.html</loc>
			<lastmod>2025-04-10T08:45:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/court-document-reveals-locations-of.html</loc>
			<lastmod>2025-04-10T06:39:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/germany-links-cyberattack-on-research.html</loc>
			<lastmod>2025-04-10T06:39:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/police-detains-smokeloader-malware-customers.html</loc>
			<lastmod>2025-04-10T06:38:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/the-us-treasurys-occ-disclosed.html</loc>
			<lastmod>2025-04-10T06:38:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/leak-exposes-black-bastas-influence.html</loc>
			<lastmod>2025-04-10T06:38:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/10/oracle-says-obsolete-servers-hacked.html</loc>
			<lastmod>2025-04-10T06:37:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/09/new-mirai-botnet-behind-surge.html</loc>
			<lastmod>2025-04-09T06:47:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/09/hellcat-ransomware-hits-firms-using.html</loc>
			<lastmod>2025-04-09T06:47:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/09/threat-actors-setting-up-persistent.html</loc>
			<lastmod>2025-04-09T06:46:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/09/neptune-rat-variant-spreads-via.html</loc>
			<lastmod>2025-04-09T06:46:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/09/that-massive-github-supply-chain.html</loc>
			<lastmod>2025-04-09T06:46:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/android-zeroday-bugs-under-active.html</loc>
			<lastmod>2025-04-08T20:58:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-08T20:57:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/fortinet-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-08T20:57:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/ivanti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-08T20:57:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/adobe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-08T20:56:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html</loc>
			<lastmod>2025-04-08T20:56:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/medusa-ransomware-claims-nascar-breach.html</loc>
			<lastmod>2025-04-08T20:55:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/microsoft-drops-another-massive-patch.html</loc>
			<lastmod>2025-04-08T20:55:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/occ-email-system-breach-described.html</loc>
			<lastmod>2025-04-08T20:54:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/russian-apt-hacker-observed-deploying.html</loc>
			<lastmod>2025-04-08T20:54:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/alleged-scattered-spider-simswapper-must.html</loc>
			<lastmod>2025-04-08T06:57:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/everest-ransomwares-dark-web-leak.html</loc>
			<lastmod>2025-04-08T06:56:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/russia-arrests-ceo-of-tech.html</loc>
			<lastmod>2025-04-08T06:56:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/nist-calls-time-on-older.html</loc>
			<lastmod>2025-04-08T06:56:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/08/windows-remote-desktop-protocol-remote.html</loc>
			<lastmod>2025-04-08T06:55:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/news-alert-spycloud-study-shows.html</loc>
			<lastmod>2025-04-07T11:24:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/kellogg-discloses-data-breach-cybernews.html</loc>
			<lastmod>2025-04-07T11:22:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/someone-hacked-ransomware-gang-everests.html</loc>
			<lastmod>2025-04-07T11:21:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/adaptive-security-inside-openais-first.html</loc>
			<lastmod>2025-04-07T08:56:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/europcar-gitlab-breach-exposes-data.html</loc>
			<lastmod>2025-04-07T08:52:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/unmasking-encrypthub-help-from-chatgpt.html</loc>
			<lastmod>2025-04-07T08:51:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/lazarus-expands-malicious-npm-campaign.html</loc>
			<lastmod>2025-04-07T08:50:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/07/carding-tool-abusing-woocommerce-api.html</loc>
			<lastmod>2025-04-07T08:49:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/05/openai-ceo-forced-to-delay.html</loc>
			<lastmod>2025-04-05T14:36:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/05/call-records-of-millions-exposed.html</loc>
			<lastmod>2025-04-05T07:16:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/opsec-failure-exposes-coquetttes-malware.html</loc>
			<lastmod>2025-04-04T07:36:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/083558.html</loc>
			<lastmod>2025-04-04T07:35:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/certua-reports-of-attacks-in.html</loc>
			<lastmod>2025-04-04T07:35:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/sonatype-warns-of-open-source.html</loc>
			<lastmod>2025-04-04T07:34:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/hackers-leverage-microsoft-teams-message.html</loc>
			<lastmod>2025-04-04T07:33:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/thousands-of-android-phones-found.html</loc>
			<lastmod>2025-04-04T07:32:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/hacker-claims-twilios-sendgrid-data.html</loc>
			<lastmod>2025-04-04T07:25:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/stolen-in-australian-super-fund.html</loc>
			<lastmod>2025-04-04T07:24:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/whats-new-in-the-cost.html</loc>
			<lastmod>2025-04-04T07:21:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/bayhealth-medical-center-investigated-by.html</loc>
			<lastmod>2025-04-04T07:19:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/compromised-spotbugs-token-led-to.html</loc>
			<lastmod>2025-04-04T06:36:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/ohmydc-oidc-misconfigurations-in-cicd.html</loc>
			<lastmod>2025-04-04T06:35:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/critical-apache-parquet-vulnerability-leads.html</loc>
			<lastmod>2025-04-04T06:34:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/have-we-reached-a-distroless.html</loc>
			<lastmod>2025-04-04T06:33:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/eu-pushes-for-backdoors-in.html</loc>
			<lastmod>2025-04-04T06:32:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/04/fake-passport-generated-by-chatgpt.html</loc>
			<lastmod>2025-04-04T06:31:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/texas-state-bar-warns-of.html</loc>
			<lastmod>2025-04-03T21:40:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/hackers-hit-ukrainian-state-agencies.html</loc>
			<lastmod>2025-04-03T21:40:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/israel-enters-stage-of-cyber.html</loc>
			<lastmod>2025-04-03T21:40:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/threat-actors-leverage-tax-season.html</loc>
			<lastmod>2025-04-03T21:39:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/us-australia-canada-warn-of.html</loc>
			<lastmod>2025-04-03T21:39:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/223852.html</loc>
			<lastmod>2025-04-03T21:38:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/ivanti-patches-connect-secure-zeroday.html</loc>
			<lastmod>2025-04-03T21:38:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/millions-of-free-vpn-users.html</loc>
			<lastmod>2025-04-03T21:36:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/hunters-international-ransomware-gang-rebranding.html</loc>
			<lastmod>2025-04-03T12:23:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/attackers-are-leveraging-cisco-smart.html</loc>
			<lastmod>2025-04-03T12:22:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/hellcat-ransomware-what-you-need.html</loc>
			<lastmod>2025-04-03T12:20:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/evilcorp-join-with-ransomhub-to.html</loc>
			<lastmod>2025-04-03T12:20:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/hackers-exploit-stripe-api-for.html</loc>
			<lastmod>2025-04-03T12:19:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/localhost-dangers-cors-and-dns.html</loc>
			<lastmod>2025-04-03T12:18:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/ivanti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-03T12:18:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/03/chinese-apt-pounces-on-misdiagnosed.html</loc>
			<lastmod>2025-04-03T12:17:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/new-advanced-fins-anubis-backdoor.html</loc>
			<lastmod>2025-04-02T17:54:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/arrested-as-dark-webs-largest.html</loc>
			<lastmod>2025-04-02T17:53:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/andy-yen-gegen-revisionsplan-des.html</loc>
			<lastmod>2025-04-02T16:24:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/chinas-famoussparrow-apt-hits-americas.html</loc>
			<lastmod>2025-04-02T14:19:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/google-calendar-leading-to-phishing.html</loc>
			<lastmod>2025-04-02T14:16:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/tmobile-shows-users-the-names.html</loc>
			<lastmod>2025-04-02T14:14:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-02T14:11:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/jenkins-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-02T14:11:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/china-regulator-proposes-amendments-to.html</loc>
			<lastmod>2025-04-02T11:43:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/uk-sets-out-new-cyber.html</loc>
			<lastmod>2025-04-02T08:24:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/xss-to-rce-by-abusing.html</loc>
			<lastmod>2025-04-02T08:23:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/092345.html</loc>
			<lastmod>2025-04-02T08:23:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/as-cisa-downsizes-where-can.html</loc>
			<lastmod>2025-04-02T08:23:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/japan-bolsters-cybersecurity-safeguards-with.html</loc>
			<lastmod>2025-04-02T08:23:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/092250.html</loc>
			<lastmod>2025-04-02T08:22:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/critical-auth-bypass-bug-in.html</loc>
			<lastmod>2025-04-02T08:22:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/evolution-of-sophisticated-phishing-tactics.html</loc>
			<lastmod>2025-04-02T08:22:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/cyber-security-and-resilience-policy.html</loc>
			<lastmod>2025-04-02T08:21:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-04-02T06:54:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/vmware-security-advisory-av-canadian.html</loc>
			<lastmod>2025-04-02T06:54:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/malaysian-airports-ransomware-attack-a.html</loc>
			<lastmod>2025-04-02T06:53:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/new-lazarus-group-scam-targets.html</loc>
			<lastmod>2025-04-02T06:52:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/data-leak-of-twitter-x.html</loc>
			<lastmod>2025-04-02T06:50:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/the-ripple-effects-of-marylands.html</loc>
			<lastmod>2025-04-02T06:48:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/new-study-ranks-platforms-by.html</loc>
			<lastmod>2025-04-02T06:47:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/apple-backported-fixes-for-three.html</loc>
			<lastmod>2025-04-02T06:45:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/oracle-health-warnt-vor-datenleck.html</loc>
			<lastmod>2025-04-02T06:44:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/it-takes-two-the-sophos.html</loc>
			<lastmod>2025-04-02T06:43:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/google-brings-endtoend-encrypted-emails.html</loc>
			<lastmod>2025-04-02T06:40:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/uk-government-previews-cybersecurity-legislation.html</loc>
			<lastmod>2025-04-02T06:38:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/02/canon-printer-flaw-enables-remote.html</loc>
			<lastmod>2025-04-02T06:37:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/vitenas-cosmetic-surgery-patient-data.html</loc>
			<lastmod>2025-04-01T11:32:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/exclusive-royal-mail-suffers-alleged.html</loc>
			<lastmod>2025-04-01T11:30:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/samsung-customer-support-tickets-leak.html</loc>
			<lastmod>2025-04-01T11:29:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/a-major-data-leak-in.html</loc>
			<lastmod>2025-04-01T08:21:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/the-pirkanmaa-welfare-region-in.html</loc>
			<lastmod>2025-04-01T08:20:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/oracle-cloud-users-urged-to.html</loc>
			<lastmod>2025-04-01T08:18:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/check-point-confirms-breach-but.html</loc>
			<lastmod>2025-04-01T08:18:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/091803.html</loc>
			<lastmod>2025-04-01T08:18:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/phishing-platform-lucid-behind-wave.html</loc>
			<lastmod>2025-04-01T08:17:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/the-espionage-toolkit-of-earth.html</loc>
			<lastmod>2025-04-01T08:17:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/091639.html</loc>
			<lastmod>2025-04-01T08:16:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/smoked-out-emmenhtal-spreads-smokeloader.html</loc>
			<lastmod>2025-04-01T08:16:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/russian-hackers-exploit-cve-via.html</loc>
			<lastmod>2025-04-01T07:40:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/04/01/trend-micro-open-sources-ai.html</loc>
			<lastmod>2025-04-01T07:37:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/30/samsung-tickets-data-leak-infostealers.html</loc>
			<lastmod>2025-03-30T13:40:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/30/oracle-cloud-data-breach-six.html</loc>
			<lastmod>2025-03-30T08:14:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/30/oracle-orcl-warns-health-customers.html</loc>
			<lastmod>2025-03-30T08:14:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/30/resurge-malware-exploits-ivanti-flaw.html</loc>
			<lastmod>2025-03-30T08:12:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/223611.html</loc>
			<lastmod>2025-03-29T21:36:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/evilginx-tool-still-bypasses-mfa.html</loc>
			<lastmod>2025-03-29T14:14:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/ubuntu-namespace-vulnerability-should-be.html</loc>
			<lastmod>2025-03-29T14:13:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/blacklock-ransomware-exposed-after-researchers.html</loc>
			<lastmod>2025-03-29T14:13:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/squarex-discloses-browsernative-ransomware-that.html</loc>
			<lastmod>2025-03-29T14:12:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/experts-warn-of-the-new.html</loc>
			<lastmod>2025-03-29T14:11:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/uk-software-firm-fined-million.html</loc>
			<lastmod>2025-03-29T14:10:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/hellenic-open-university-hit-by.html</loc>
			<lastmod>2025-03-29T12:10:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/29/twitter-x-hit-by-data.html</loc>
			<lastmod>2025-03-29T12:09:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/secure-encryption-and-online-anonymity.html</loc>
			<lastmod>2025-03-28T18:46:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/darkweb-actors-claim-to-have.html</loc>
			<lastmod>2025-03-28T12:32:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/russia-arrests-three-for-allegedly.html</loc>
			<lastmod>2025-03-28T06:52:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/dozens-of-solar-inverter-flaws.html</loc>
			<lastmod>2025-03-28T06:52:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/new-atlantis-aio-platform-automates.html</loc>
			<lastmod>2025-03-28T06:52:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/ukraines-state-railway-restores-online.html</loc>
			<lastmod>2025-03-28T06:52:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/28/european-officials-increasingly-certain-baltic.html</loc>
			<lastmod>2025-03-28T06:51:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/oracle-customers-confirm-data-stolen.html</loc>
			<lastmod>2025-03-27T20:33:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/uks-first-permanent-facial-recognition.html</loc>
			<lastmod>2025-03-27T16:38:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/top-trump-officials-have-private.html</loc>
			<lastmod>2025-03-27T11:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/identity-of-hacker-behind-nsw.html</loc>
			<lastmod>2025-03-27T11:45:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/streamelements-discloses-thirdparty-data-breach.html</loc>
			<lastmod>2025-03-27T11:45:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/malaysian-pm-says-no-way.html</loc>
			<lastmod>2025-03-27T10:56:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/arkana-security-group-claims-the.html</loc>
			<lastmod>2025-03-27T10:56:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/sites-compromised-by-javascript-injection.html</loc>
			<lastmod>2025-03-27T10:55:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/new-cybercrime-tool-atlantis-aio.html</loc>
			<lastmod>2025-03-27T10:54:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/the-cost-of-delay-privacy.html</loc>
			<lastmod>2025-03-27T10:53:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/cisa-warns-of-sitecore-rce.html</loc>
			<lastmod>2025-03-27T10:51:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/surge-in-gen-aibased-threats.html</loc>
			<lastmod>2025-03-27T09:50:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/etsi-releases-security-standard-for.html</loc>
			<lastmod>2025-03-27T09:46:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/redcurl-shifts-from-espionage-to.html</loc>
			<lastmod>2025-03-27T09:44:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/internet-archive-archiveorg-goes-down.html</loc>
			<lastmod>2025-03-27T09:44:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/security-expert-troy-hunt-hit.html</loc>
			<lastmod>2025-03-27T09:43:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/new-readerupdate-malware-variants-target.html</loc>
			<lastmod>2025-03-27T09:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/project-zero-blasting-past-webp.html</loc>
			<lastmod>2025-03-27T09:41:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/vmware-sues-siemens-for-allegedly.html</loc>
			<lastmod>2025-03-27T06:44:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/074353.html</loc>
			<lastmod>2025-03-27T06:43:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/security-tech-that-can-make.html</loc>
			<lastmod>2025-03-27T06:43:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/uk-warns-of-emerging-threat.html</loc>
			<lastmod>2025-03-27T06:43:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/operation-forumtroll-apt-attack-with.html</loc>
			<lastmod>2025-03-27T06:42:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/new-windows-zeroday-leaks-ntlm.html</loc>
			<lastmod>2025-03-27T06:42:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/27/crushftp-warns-users-to-patch.html</loc>
			<lastmod>2025-03-27T06:42:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/are-cellphones-really-putting-our.html</loc>
			<lastmod>2025-03-26T07:50:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/europe-is-looking-for-alternatives.html</loc>
			<lastmod>2025-03-26T06:58:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/us-weakens-disinformation-defenses-as.html</loc>
			<lastmod>2025-03-26T06:58:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/weaver-ant-the-web-shell.html</loc>
			<lastmod>2025-03-26T06:57:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/as-nationstate-hacking-becomes-more.html</loc>
			<lastmod>2025-03-26T06:57:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/draytek-routers-worldwide-go-into.html</loc>
			<lastmod>2025-03-26T06:56:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/26/075641.html</loc>
			<lastmod>2025-03-26T06:56:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/25/cloudflare-incident-on-march-on.html</loc>
			<lastmod>2025-03-25T12:05:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/25/microsoft-gives-security-copilot-some.html</loc>
			<lastmod>2025-03-25T12:04:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/china-bans-facial-recognition-in.html</loc>
			<lastmod>2025-03-24T17:08:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/new-tenable-report-finds-deepseek.html</loc>
			<lastmod>2025-03-24T06:56:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/microsoft-trusted-signing-service-abused.html</loc>
			<lastmod>2025-03-24T06:55:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/new-report-looks-at-cyber.html</loc>
			<lastmod>2025-03-24T06:53:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/cyber-wars-are-the-new.html</loc>
			<lastmod>2025-03-24T06:52:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/cyber-group-says-it-disrupted.html</loc>
			<lastmod>2025-03-24T06:51:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/digital-resilience-and-cyber-security.html</loc>
			<lastmod>2025-03-24T06:50:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/resilience-thirdparty-risk-involved-in.html</loc>
			<lastmod>2025-03-24T06:48:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/the-importance-of-cyber-security.html</loc>
			<lastmod>2025-03-24T06:47:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/industry-leaders-urge-insurance-sector.html</loc>
			<lastmod>2025-03-24T06:47:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/ongoing-cyber-attacks-exploit-critical.html</loc>
			<lastmod>2025-03-24T06:46:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/nearly-m-hit-by-spyx.html</loc>
			<lastmod>2025-03-24T06:45:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/data-breach-at-western-alliance.html</loc>
			<lastmod>2025-03-24T06:44:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/is-the-middle-easts-race.html</loc>
			<lastmod>2025-03-24T06:43:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/california-ag-reminds-andme-customers.html</loc>
			<lastmod>2025-03-24T06:42:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/auto-insurer-fined-for-data.html</loc>
			<lastmod>2025-03-24T06:41:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/what-happens-to-your-data.html</loc>
			<lastmod>2025-03-24T06:39:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/andme-files-for-bankruptcy-in.html</loc>
			<lastmod>2025-03-24T06:38:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/lafayette-federal-credit-union-data.html</loc>
			<lastmod>2025-03-24T06:37:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/albabat-ransomware-expands-targets-abuses.html</loc>
			<lastmod>2025-03-24T06:35:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/critical-nextjs-vulnerability-allows-attackers.html</loc>
			<lastmod>2025-03-24T06:35:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/crossborder-data-compliance-navigating-public.html</loc>
			<lastmod>2025-03-24T06:34:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/top-scam-techniques-what-you.html</loc>
			<lastmod>2025-03-24T06:34:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/cloak-ransomware-group-hacked-the.html</loc>
			<lastmod>2025-03-24T06:33:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/finders-keypers-opensource-aws-kms.html</loc>
			<lastmod>2025-03-24T06:32:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/cloud-providers-arent-delivering-on.html</loc>
			<lastmod>2025-03-24T06:31:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/abyssworker-a-new-edrkiller-in.html</loc>
			<lastmod>2025-03-24T06:30:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/the-looming-quantum-threat-ncsc.html</loc>
			<lastmod>2025-03-24T06:30:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/24/cbc-news-has-uncovered-a.html</loc>
			<lastmod>2025-03-24T06:27:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/what-google-chrome-knows-about.html</loc>
			<lastmod>2025-03-23T20:13:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/uat-atp-group-targets-critical.html</loc>
			<lastmod>2025-03-23T12:25:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/chinese-hackers-exploit-unpatched-servers.html</loc>
			<lastmod>2025-03-23T12:24:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/fake-out-babuk-ransomware-group.html</loc>
			<lastmod>2025-03-23T12:24:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/hacker-pulls-off-m-theft.html</loc>
			<lastmod>2025-03-23T11:29:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/oracle-cloud-hit-by-massive.html</loc>
			<lastmod>2025-03-23T11:29:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/no-need-to-hack-when.html</loc>
			<lastmod>2025-03-23T11:27:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/over-million-applicants-data-leaked.html</loc>
			<lastmod>2025-03-23T11:27:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/23/oracle-denies-breach-after-hacker.html</loc>
			<lastmod>2025-03-23T11:26:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/new-elevenbot-ddos-botnet-compromises.html</loc>
			<lastmod>2025-03-21T17:29:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/polymarket-where-insight-meets-incentive.html</loc>
			<lastmod>2025-03-21T12:58:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/violent-chatgpt-hallucination-sparks-gdpr.html</loc>
			<lastmod>2025-03-21T09:09:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/hottest-it-security-certs-for.html</loc>
			<lastmod>2025-03-21T09:08:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/developers-apply-these-mitigations-first.html</loc>
			<lastmod>2025-03-21T09:06:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/pennsylvania-state-education-association-data.html</loc>
			<lastmod>2025-03-21T09:05:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/signal-threatens-to-leave-france.html</loc>
			<lastmod>2025-03-21T09:05:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/atlassian-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-21T09:03:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/israeli-spyware-graphite-targeted-whatsapp.html</loc>
			<lastmod>2025-03-21T09:03:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/how-to-build-and-maintain.html</loc>
			<lastmod>2025-03-21T09:01:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/new-llm-jailbreak-technique-can.html</loc>
			<lastmod>2025-03-21T09:01:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/rooted-androids-x-more-likely.html</loc>
			<lastmod>2025-03-21T08:59:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/hp-brings-quantumsafe-encryption-to.html</loc>
			<lastmod>2025-03-21T08:59:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/brand-impersonation-is-of-browser.html</loc>
			<lastmod>2025-03-21T08:58:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/dark-web-profile-fsociety-flocker.html</loc>
			<lastmod>2025-03-21T08:57:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/new-windows-zeroday-feared-abused.html</loc>
			<lastmod>2025-03-21T08:56:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/new-knowbe-report-reveals-a.html</loc>
			<lastmod>2025-03-21T08:55:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/list-of-countries-which-are.html</loc>
			<lastmod>2025-03-21T08:54:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/euro-semi-firms-push-for.html</loc>
			<lastmod>2025-03-21T08:51:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/are-we-closing-the-gender.html</loc>
			<lastmod>2025-03-21T08:51:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/blacklock-ransomware-what-you-need.html</loc>
			<lastmod>2025-03-21T08:51:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/unboxing-anubis-exploring-the-stealthy.html</loc>
			<lastmod>2025-03-21T08:50:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/hellcat-hackers-go-on-a.html</loc>
			<lastmod>2025-03-21T08:50:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/21/ransomhub-ransomware-uses-new-betruger.html</loc>
			<lastmod>2025-03-21T08:50:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/incident-nightspire-ransomware-attack-on.html</loc>
			<lastmod>2025-03-20T13:43:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/certua-warns-dark-crystal-rat.html</loc>
			<lastmod>2025-03-20T07:45:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/chinese-militarylinked-companies-dominate-us.html</loc>
			<lastmod>2025-03-20T07:43:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/of-leaked-secrets-remain-active.html</loc>
			<lastmod>2025-03-20T07:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/india-is-top-global-target.html</loc>
			<lastmod>2025-03-20T07:41:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/leaked-black-basta-chats-suggest.html</loc>
			<lastmod>2025-03-20T07:40:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/whatsapp-fixed-zeroday-used-to.html</loc>
			<lastmod>2025-03-20T07:38:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/google-chrome-security-advisory-av.html</loc>
			<lastmod>2025-03-20T07:38:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/nationstate-hackers-exploit-unpatched-windows.html</loc>
			<lastmod>2025-03-20T07:37:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/veeam-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-20T07:36:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/20/jenkins-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-20T07:36:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/phishingbased-attacks-have-risen-yearoveryear.html</loc>
			<lastmod>2025-03-19T14:30:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/chinese-hacking-group-mirrorface-targeting.html</loc>
			<lastmod>2025-03-19T14:30:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/windows-shortcut-zeroday-zdican-exploited.html</loc>
			<lastmod>2025-03-19T14:29:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/spyclouds-identity-exposure-report-reveals.html</loc>
			<lastmod>2025-03-19T14:28:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/scareware-combined-with-phishing-in.html</loc>
			<lastmod>2025-03-19T14:27:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/sperm-bank-breach-deposits-data.html</loc>
			<lastmod>2025-03-19T14:26:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/clearfake-infects-sites-uses-fake.html</loc>
			<lastmod>2025-03-19T14:25:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/major-teachers-union-breach-leaks.html</loc>
			<lastmod>2025-03-19T11:41:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/clp-hackers-leak-k-bank.html</loc>
			<lastmod>2025-03-19T11:40:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/tesla-owners-doxxed-by-dogequest.html</loc>
			<lastmod>2025-03-19T11:40:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/extortion-reboot-ransomware-crew-threatens.html</loc>
			<lastmod>2025-03-19T11:39:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/github-action-hack-likely-led.html</loc>
			<lastmod>2025-03-19T11:39:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/how-to-secure-your-information.html</loc>
			<lastmod>2025-03-19T06:45:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/new-arcane-stealer-spreading-via.html</loc>
			<lastmod>2025-03-19T06:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/19/top-passwords-hackers-use-to.html</loc>
			<lastmod>2025-03-19T06:40:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/new-ad-fraud-campaign-exploits.html</loc>
			<lastmod>2025-03-18T11:41:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/fake-deepseek-ai-installers-websites.html</loc>
			<lastmod>2025-03-18T11:40:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/flashpoint-global-threat-intelligence-report.html</loc>
			<lastmod>2025-03-18T11:39:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/new-critical-ami-bmc-vulnerability.html</loc>
			<lastmod>2025-03-18T11:39:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/cloudflare-expands-security-portfolio-with.html</loc>
			<lastmod>2025-03-18T11:38:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/statesponsored-apts-exploiting-lnk-files.html</loc>
			<lastmod>2025-03-18T11:37:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/identity-attacks-and-infostealers-dominate.html</loc>
			<lastmod>2025-03-18T11:36:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/actively-exploited-chatgpt-bug-puts.html</loc>
			<lastmod>2025-03-18T11:35:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/new-rules-file-backdoor-attack.html</loc>
			<lastmod>2025-03-18T11:34:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/b-loss-estimated-from-potential.html</loc>
			<lastmod>2025-03-18T11:34:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/google-releases-major-update-for.html</loc>
			<lastmod>2025-03-18T11:32:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/google-purchases-wiz-in-b.html</loc>
			<lastmod>2025-03-18T11:31:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/chinese-hackers-target-european-diplomats.html</loc>
			<lastmod>2025-03-18T11:30:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/in-people-do-nothing-to.html</loc>
			<lastmod>2025-03-18T08:18:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/announcing-osvscanner-v-vulnerability-scanner.html</loc>
			<lastmod>2025-03-18T08:17:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/stilachirat-analysis-from-system-reconnaissance.html</loc>
			<lastmod>2025-03-18T08:17:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/bitm-up-session-stealing-in.html</loc>
			<lastmod>2025-03-18T08:17:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/critical-rce-flaw-in-apache.html</loc>
			<lastmod>2025-03-18T08:16:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/18/large-enterprises-scramble-after-supplychain.html</loc>
			<lastmod>2025-03-18T08:16:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/fbi-warns-malware-hidden-in.html</loc>
			<lastmod>2025-03-17T11:48:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/autosur-breach-fivem-database-leak.html</loc>
			<lastmod>2025-03-17T08:15:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/github-action-compromise-puts-cicd.html</loc>
			<lastmod>2025-03-17T08:14:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/european-cyber-report-more-ddos.html</loc>
			<lastmod>2025-03-17T08:13:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/free-file-converter-malware-scam.html</loc>
			<lastmod>2025-03-17T08:12:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/social-media-and-email-hacking.html</loc>
			<lastmod>2025-03-17T08:12:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/arctic-wolf-warns-of-ongoing.html</loc>
			<lastmod>2025-03-17T08:11:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/asyncrat-surges-in-global-malware.html</loc>
			<lastmod>2025-03-17T08:10:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/intelmq-opensource-tool-for-collecting.html</loc>
			<lastmod>2025-03-17T08:10:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/welcome-to-security-week-security.html</loc>
			<lastmod>2025-03-17T08:08:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/jailbreaking-is-mostly-simpler-than.html</loc>
			<lastmod>2025-03-17T06:37:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/17/new-akira-ransomware-decryptor-cracks.html</loc>
			<lastmod>2025-03-17T06:36:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/16/denmarks-postal-service-ends-letter.html</loc>
			<lastmod>2025-03-16T13:25:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/16/malicious-adobe-docusign-oauth-apps.html</loc>
			<lastmod>2025-03-16T09:31:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/15/manus-ai-chinas-bold-step.html</loc>
			<lastmod>2025-03-15T15:32:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/15/084247.html</loc>
			<lastmod>2025-03-15T07:42:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/15/gsma-confirms-endtoend-encryption-for.html</loc>
			<lastmod>2025-03-15T07:42:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/15/remote-access-infra-remains-riskiest.html</loc>
			<lastmod>2025-03-15T07:42:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/15/inside-bruted-black-basta-raas.html</loc>
			<lastmod>2025-03-15T07:41:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/merz-wins-support-for-surge.html</loc>
			<lastmod>2025-03-14T20:01:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/everything-you-say-to-your.html</loc>
			<lastmod>2025-03-14T19:07:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/pirate-bay-backer-carl-lundstrm.html</loc>
			<lastmod>2025-03-14T09:53:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/openai-says-its-impossible-to.html</loc>
			<lastmod>2025-03-14T06:14:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/were-thinking-about-deploying-ai.html</loc>
			<lastmod>2025-03-14T06:10:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/gitlab-addressed-critical-auth-bypass.html</loc>
			<lastmod>2025-03-14T06:05:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/one-put-request-to-own.html</loc>
			<lastmod>2025-03-14T06:04:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/a-new-era-of-attacks.html</loc>
			<lastmod>2025-03-14T06:02:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/how-security-teams-should-respond.html</loc>
			<lastmod>2025-03-14T05:59:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/guardz-reveals-details-of-an.html</loc>
			<lastmod>2025-03-14T05:58:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/fbi-alerts-gmail-users-over.html</loc>
			<lastmod>2025-03-14T05:57:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/new-massjacker-malware-targets-piracy.html</loc>
			<lastmod>2025-03-14T05:56:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/microsoft-uncovers-new-xcsset-macos.html</loc>
			<lastmod>2025-03-14T05:55:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/14/eu-seeks-us-assurances-on.html</loc>
			<lastmod>2025-03-14T05:54:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/breach-roundup-the-ivanti-patch.html</loc>
			<lastmod>2025-03-13T16:15:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/groups-from-china-russia-iran.html</loc>
			<lastmod>2025-03-13T16:14:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/fbi-and-cisa-urge-enabling.html</loc>
			<lastmod>2025-03-13T16:13:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/ransomware-hits-record-high-surge.html</loc>
			<lastmod>2025-03-13T16:11:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cisco-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-13T16:10:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/tata-technologies-tb-data-breach.html</loc>
			<lastmod>2025-03-13T12:58:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/new-york-sues-allstate-over.html</loc>
			<lastmod>2025-03-13T12:56:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/new-era-enterprises-confirms-recent.html</loc>
			<lastmod>2025-03-13T12:56:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/massive-data-breach-israelis-covid.html</loc>
			<lastmod>2025-03-13T12:55:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/dvids-news-eye-on-the.html</loc>
			<lastmod>2025-03-13T12:50:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/has-deepseeks-open-source-ai.html</loc>
			<lastmod>2025-03-13T12:49:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/check-point-uncovers-s-biggest.html</loc>
			<lastmod>2025-03-13T12:46:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/fcc-launches-national-security-unit.html</loc>
			<lastmod>2025-03-13T12:45:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/vc-investment-in-cyber-startups.html</loc>
			<lastmod>2025-03-13T12:44:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cyber-security-sectoral-analysis-reveals.html</loc>
			<lastmod>2025-03-13T12:13:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/denmark-raises-cyber-threat-level.html</loc>
			<lastmod>2025-03-13T12:11:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cyberattacks-a-bigger-threat-to.html</loc>
			<lastmod>2025-03-13T12:11:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cps-data-breach-expert-chimes.html</loc>
			<lastmod>2025-03-13T12:09:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/joint-report-on-publicly-available.html</loc>
			<lastmod>2025-03-13T06:34:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/android-devices-track-you-before.html</loc>
			<lastmod>2025-03-13T06:33:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/volt-typhoon-hackers-were-in.html</loc>
			<lastmod>2025-03-13T06:33:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/signal-no-longer-cooperating-with.html</loc>
			<lastmod>2025-03-13T06:33:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/picklescan-vulnerabilities-could-let-hackers.html</loc>
			<lastmod>2025-03-13T06:12:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/nist-finalizes-differential-privacy-rules.html</loc>
			<lastmod>2025-03-13T06:12:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/chinalinked-apt-unc-targets-eol.html</loc>
			<lastmod>2025-03-13T06:11:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/new-bill-aims-to-strengthen.html</loc>
			<lastmod>2025-03-13T06:10:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/uae-guidelines-offer-blueprint-for.html</loc>
			<lastmod>2025-03-13T06:08:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/generative-ai-red-teaming-tips.html</loc>
			<lastmod>2025-03-13T06:07:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/warning-expiring-root-certificate-may.html</loc>
			<lastmod>2025-03-13T06:06:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/meta-warns-of-freetype-vulnerability.html</loc>
			<lastmod>2025-03-13T06:05:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/medusa-ransomware-hit-over-critical.html</loc>
			<lastmod>2025-03-13T06:04:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/openai-operator-agent-used-in.html</loc>
			<lastmod>2025-03-13T06:04:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/head-mare-and-twelve-joint.html</loc>
			<lastmod>2025-03-13T06:03:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cisa-defunds-threatsharing-hubs-for.html</loc>
			<lastmod>2025-03-13T06:02:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/zut-alors-surge-in-cyberattacks.html</loc>
			<lastmod>2025-03-13T06:01:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/how-effective-is-the-edpb.html</loc>
			<lastmod>2025-03-13T06:00:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/what-is-scm-security-configuration.html</loc>
			<lastmod>2025-03-13T05:59:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/cisa-and-partners-release-cybersecurity.html</loc>
			<lastmod>2025-03-13T05:58:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/over-ips-exploiting-multiple-ssrf.html</loc>
			<lastmod>2025-03-13T05:58:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/nist-selects-hqc-as-backup.html</loc>
			<lastmod>2025-03-13T05:57:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/china-russia-iran-and-north.html</loc>
			<lastmod>2025-03-13T05:56:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/multiple-vulnerabilities-in-google-android.html</loc>
			<lastmod>2025-03-13T05:55:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/multiple-vulnerabilities-in-mozilla-products.html</loc>
			<lastmod>2025-03-13T05:54:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/13/google-unveils-gemma-opensource-ai.html</loc>
			<lastmod>2025-03-13T05:50:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/tata-technologies-data-breach-leaks.html</loc>
			<lastmod>2025-03-12T11:39:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/trump-nominates-sean-plankey-to.html</loc>
			<lastmod>2025-03-12T06:59:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/internet-shutdowns-at-record-high.html</loc>
			<lastmod>2025-03-12T06:59:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/aiassisted-fake-github-repositories-fuel.html</loc>
			<lastmod>2025-03-12T06:58:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/previously-unidentified-botnet-infects-unpatched.html</loc>
			<lastmod>2025-03-12T06:58:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/new-xcsset-malware-adds-new.html</loc>
			<lastmod>2025-03-12T06:58:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/critical-php-rce-vulnerability-mass.html</loc>
			<lastmod>2025-03-12T06:57:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/new-ballista-botnet-spreads-using.html</loc>
			<lastmod>2025-03-12T05:56:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/how-generative-ai-can-strengthen.html</loc>
			<lastmod>2025-03-12T05:54:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/apple-released-a-security-update.html</loc>
			<lastmod>2025-03-12T05:51:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/065118.html</loc>
			<lastmod>2025-03-12T05:51:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/apple-releases-patch-for-webkit.html</loc>
			<lastmod>2025-03-12T05:50:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/deepfake-ceo-video-rocks-youtube.html</loc>
			<lastmod>2025-03-12T05:47:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/march-patch-tuesday-warnings-act.html</loc>
			<lastmod>2025-03-12T05:46:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/lazarus-group-hid-backdoor-in.html</loc>
			<lastmod>2025-03-12T05:45:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/12/lookout-discovers-north-korean-apt.html</loc>
			<lastmod>2025-03-12T05:42:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/google-enhances-data-privacy-with.html</loc>
			<lastmod>2025-03-11T19:06:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/apple-fixed-the-third-actively.html</loc>
			<lastmod>2025-03-11T18:51:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/whopping-number-of-microsoft-zerodays.html</loc>
			<lastmod>2025-03-11T18:50:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/microsoft-security-advisory-march-monthly.html</loc>
			<lastmod>2025-03-11T18:47:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/silk-typhoon-hackers-indicted-schneier.html</loc>
			<lastmod>2025-03-11T18:46:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/sap-security-advisory-march-monthly.html</loc>
			<lastmod>2025-03-11T18:44:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/top-free-apis-for-cybersecurity.html</loc>
			<lastmod>2025-03-11T18:43:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/sap-patches-highseverity-vulnerabilities-in.html</loc>
			<lastmod>2025-03-11T18:41:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/edimax-says-no-patches-coming.html</loc>
			<lastmod>2025-03-11T18:40:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/ballista-botnet-exploits-unpatched-tplink.html</loc>
			<lastmod>2025-03-11T18:38:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/gitguardian-report-of-leaked-secrets.html</loc>
			<lastmod>2025-03-11T18:37:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/steganography-explained-how-xworm-hides.html</loc>
			<lastmod>2025-03-11T07:10:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/x-users-report-login-troubles.html</loc>
			<lastmod>2025-03-11T07:08:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/almost-million-business-and-home.html</loc>
			<lastmod>2025-03-11T07:06:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/apt-blind-eagle-targets-colombian.html</loc>
			<lastmod>2025-03-11T07:05:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-11T07:04:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/red-hat-security-advisory-av.html</loc>
			<lastmod>2025-03-11T07:04:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/over-malicious-packages-found-exploiting.html</loc>
			<lastmod>2025-03-11T07:02:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-11T07:01:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/080004.html</loc>
			<lastmod>2025-03-11T07:00:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/global-expansion-in-generative-ai.html</loc>
			<lastmod>2025-03-11T06:59:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/could-the-belsen-group-be.html</loc>
			<lastmod>2025-03-11T06:57:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/blind-eagle-and-justice-for.html</loc>
			<lastmod>2025-03-11T06:56:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/critical-php-vulnerability-under-mass.html</loc>
			<lastmod>2025-03-11T06:55:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/north-korealinked-apt-moonstone-used.html</loc>
			<lastmod>2025-03-11T06:55:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/what-do-organisations-need-to.html</loc>
			<lastmod>2025-03-11T06:54:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/people-impacted-across-four-healthcare.html</loc>
			<lastmod>2025-03-11T06:53:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/githubhosted-malware-infects-m-windows.html</loc>
			<lastmod>2025-03-11T06:52:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/swiss-critical-sector-faces-new.html</loc>
			<lastmod>2025-03-10T23:30:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/musk-blames-x-outages-on.html</loc>
			<lastmod>2025-03-10T23:30:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/fortinet-identifies-malicious-packages-in.html</loc>
			<lastmod>2025-03-10T23:30:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/sidewinder-targets-the-maritime-and.html</loc>
			<lastmod>2025-03-10T23:29:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/11/north-korean-hackers-cash-out.html</loc>
			<lastmod>2025-03-10T23:29:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/the-evolution-and-challenges-of.html</loc>
			<lastmod>2025-03-10T10:46:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/generative-ai-fuels-a-new.html</loc>
			<lastmod>2025-03-10T10:07:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/airlines-tighten-restrictions-on-power.html</loc>
			<lastmod>2025-03-10T08:17:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/meet-rayhunter-a-new-open.html</loc>
			<lastmod>2025-03-10T07:59:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/the-digital-illusion-millennials-and.html</loc>
			<lastmod>2025-03-10T07:59:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/gen-z-facing-increased-cybersecurity.html</loc>
			<lastmod>2025-03-10T07:58:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/uk-quietly-scrubs-encryption-advice.html</loc>
			<lastmod>2025-03-10T07:57:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/youtubers-extorted-via-copyright-strikes.html</loc>
			<lastmod>2025-03-10T07:57:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/a-brandnew-botnet-is-delivering.html</loc>
			<lastmod>2025-03-10T07:57:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/majority-of-orgs-hit-by.html</loc>
			<lastmod>2025-03-10T06:03:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/seqrites-cyber-threat-report-highlights.html</loc>
			<lastmod>2025-03-10T06:01:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/up-to-million-reward-offers.html</loc>
			<lastmod>2025-03-10T06:00:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/businesses-set-to-fail-if.html</loc>
			<lastmod>2025-03-10T05:59:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/055647.html</loc>
			<lastmod>2025-03-10T05:56:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/polish-supervisory-authority-publishes-updated.html</loc>
			<lastmod>2025-03-10T05:55:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/data-breach-alert-edelson-lechtzin.html</loc>
			<lastmod>2025-03-10T05:54:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/bank-of-america-sounds-alarm.html</loc>
			<lastmod>2025-03-10T05:50:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/rubrik-discloses-server-breach-compromise.html</loc>
			<lastmod>2025-03-10T05:49:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/berkeley-research-group-suffers-cyber.html</loc>
			<lastmod>2025-03-10T05:49:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/thousands-of-public-school-workers.html</loc>
			<lastmod>2025-03-10T05:47:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/federman-sherwood-investigates-rivers-casino.html</loc>
			<lastmod>2025-03-10T05:47:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/feds-seized-million-in-crypto.html</loc>
			<lastmod>2025-03-10T05:45:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/silentcryptominer-infects-russian-users-via.html</loc>
			<lastmod>2025-03-10T05:44:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/10/global-crackdown-slashes-cobalt-strike.html</loc>
			<lastmod>2025-03-10T05:43:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/ntt-suffered-a-data-breach.html</loc>
			<lastmod>2025-03-09T22:10:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/developer-guilty-of-using-kill.html</loc>
			<lastmod>2025-03-09T22:09:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/akira-ransomware-gang-used-unsecured.html</loc>
			<lastmod>2025-03-09T22:09:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/new-chirp-tool-uses-audio.html</loc>
			<lastmod>2025-03-09T22:08:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/malicious-github-repositories-linked-to.html</loc>
			<lastmod>2025-03-09T22:07:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/westjet-updates-carryon-baggage-policy.html</loc>
			<lastmod>2025-03-09T17:42:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/112354.html</loc>
			<lastmod>2025-03-09T11:23:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/09/thousands-of-israeli-gun-owners.html</loc>
			<lastmod>2025-03-09T11:20:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/08/undocumented-backdoor-found-in-bluetooth.html</loc>
			<lastmod>2025-03-08T20:23:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/08/encrypthub-opsec-failures-reveal-ttps.html</loc>
			<lastmod>2025-03-08T09:40:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/08/chinese-apt-silk-typhoon-exploits.html</loc>
			<lastmod>2025-03-08T09:39:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/08/elastic-patches-critical-kibana-flaw.html</loc>
			<lastmod>2025-03-08T09:39:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/07/211345.html</loc>
			<lastmod>2025-03-07T21:13:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/07/massive-botnet-that-appeared-overnight.html</loc>
			<lastmod>2025-03-07T17:16:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/07/five-eyes-alliance-crumbling-after.html</loc>
			<lastmod>2025-03-07T16:37:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/layoff-report-shows-the-doges.html</loc>
			<lastmod>2025-03-06T19:50:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/breach-roundup-us-sanctions-iranbased.html</loc>
			<lastmod>2025-03-06T16:10:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/ransomware-threat-mailed-in-letters.html</loc>
			<lastmod>2025-03-06T16:08:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/credential-leaks-enterprise-risk-and.html</loc>
			<lastmod>2025-03-06T16:07:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/house-passes-bill-requiring-federal.html</loc>
			<lastmod>2025-03-06T16:06:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/top-ai-deepfake-detection-tools.html</loc>
			<lastmod>2025-03-06T16:05:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/elastic-releases-urgent-fix-for.html</loc>
			<lastmod>2025-03-06T16:05:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/encrypthub-deploys-ransomware-and-stealer.html</loc>
			<lastmod>2025-03-06T16:04:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/medusa-ransomware-hits-victims-in.html</loc>
			<lastmod>2025-03-06T16:04:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/fbi-warns-of-data-extortion.html</loc>
			<lastmod>2025-03-06T16:03:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/digg-is-relaunching-after-sale.html</loc>
			<lastmod>2025-03-06T13:35:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/google-rolls-out-ai-scam.html</loc>
			<lastmod>2025-03-06T07:15:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/tripwire-patch-priority-index-for.html</loc>
			<lastmod>2025-03-06T07:13:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/two-venezuelans-arrested-in-us.html</loc>
			<lastmod>2025-03-06T07:12:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/ransomware-group-claims-attack-on.html</loc>
			<lastmod>2025-03-06T07:11:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/06/prohibited-practices-under-the-ai.html</loc>
			<lastmod>2025-03-06T07:10:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/05/youtube-premium-lite-adfree-viewing.html</loc>
			<lastmod>2025-03-05T13:54:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/05/scammers-take-over-social-media.html</loc>
			<lastmod>2025-03-05T09:38:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/05/polyglot-files-used-to-spread.html</loc>
			<lastmod>2025-03-05T09:37:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/05/vmware-fixed-three-actively-exploited.html</loc>
			<lastmod>2025-03-05T09:37:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/05/jamf-buys-identity-automation-expands.html</loc>
			<lastmod>2025-03-05T09:36:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/new-polyglot-malware-hits-aviation.html</loc>
			<lastmod>2025-03-04T22:06:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/new-microsoft-outage-impacts-teams.html</loc>
			<lastmod>2025-03-04T20:22:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/researchers-link-cactus-ransomware-tactics.html</loc>
			<lastmod>2025-03-04T17:49:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/mozilla-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-04T17:49:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/cisa-issues-warning-against-qilin.html</loc>
			<lastmod>2025-03-04T17:48:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/vmware-security-flaws-exploited-in.html</loc>
			<lastmod>2025-03-04T17:47:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/japanese-cancer-hospital-confirms-breach.html</loc>
			<lastmod>2025-03-04T12:42:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/new-chinese-zhong-stealer-infects.html</loc>
			<lastmod>2025-03-04T09:10:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/how-new-ai-agents-will.html</loc>
			<lastmod>2025-03-04T09:07:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/top-free-vulnerability-intelligence-platforms.html</loc>
			<lastmod>2025-03-04T09:05:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/suspected-iranian-hackers-used-compromised.html</loc>
			<lastmod>2025-03-04T09:04:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/over-isp-ips-targeted-in.html</loc>
			<lastmod>2025-03-04T09:02:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/open-source-security-risks-continue.html</loc>
			<lastmod>2025-03-04T08:41:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/googles-march-android-security-update.html</loc>
			<lastmod>2025-03-04T08:39:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/the-new-ransomware-groups-shaking.html</loc>
			<lastmod>2025-03-04T08:38:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-04T08:37:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-04T08:36:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-03-04T08:36:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/judges-are-fed-up-with.html</loc>
			<lastmod>2025-03-04T08:35:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/nearly-api-keys-and-passwords.html</loc>
			<lastmod>2025-03-04T08:34:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/microsoft-unveils-finalized-eu-data.html</loc>
			<lastmod>2025-03-04T08:34:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/083338.html</loc>
			<lastmod>2025-03-04T08:33:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/cisa-tags-windows-cisco-vulnerabilities.html</loc>
			<lastmod>2025-03-04T08:33:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/latam-orgs-face-more-attacks.html</loc>
			<lastmod>2025-03-04T06:57:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-03-04T06:56:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/hackers-use-clickfix-trick-to.html</loc>
			<lastmod>2025-03-04T06:54:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/tiktok-major-investigation-launched-into.html</loc>
			<lastmod>2025-03-04T06:53:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/04/nearly-m-records-related-to.html</loc>
			<lastmod>2025-03-04T06:52:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/mexico-resort-illnesses-more-canadians.html</loc>
			<lastmod>2025-03-03T10:06:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/darknet-tor-network-security-executive.html</loc>
			<lastmod>2025-03-03T09:00:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/darknet-markets-see-btc-inflow.html</loc>
			<lastmod>2025-03-03T08:31:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/new-malware-exploits-fake-updates.html</loc>
			<lastmod>2025-03-03T08:29:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/black-basta-and-cactus-ransomware.html</loc>
			<lastmod>2025-03-03T08:28:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/kenyas-cyber-threat-landscape-the.html</loc>
			<lastmod>2025-03-03T08:26:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/geopolitics-ai-and-generational-shifts.html</loc>
			<lastmod>2025-03-03T08:24:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/exercise-cyber-marvel-brings-together.html</loc>
			<lastmod>2025-03-03T08:23:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/zapier-breach-caused-by-a.html</loc>
			<lastmod>2025-03-03T08:20:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/cyber-attacks-data-breaches-in.html</loc>
			<lastmod>2025-03-03T08:18:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/lynch-carpenter-investigates-claims-in.html</loc>
			<lastmod>2025-03-03T08:17:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/info-accessed-in-rainbow-board.html</loc>
			<lastmod>2025-03-03T08:16:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/pros-and-cons-of-using.html</loc>
			<lastmod>2025-03-03T08:14:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/ransomware-access-playbook-what-black.html</loc>
			<lastmod>2025-03-03T08:13:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/081153.html</loc>
			<lastmod>2025-03-03T08:11:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/cleveland-municipal-court-remains-closed.html</loc>
			<lastmod>2025-03-03T08:11:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/the-mobile-threat-landscape-in.html</loc>
			<lastmod>2025-03-03T08:10:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/latest-dark-web-findings-discord.html</loc>
			<lastmod>2025-03-03T08:08:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/indian-stock-broker-angel-one.html</loc>
			<lastmod>2025-03-03T08:07:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/as-trump-warms-to-putin.html</loc>
			<lastmod>2025-03-03T07:44:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/ransomware-gangs-exploit-paragon-partition.html</loc>
			<lastmod>2025-03-03T07:44:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/03/massive-security-gaps-discovered-in.html</loc>
			<lastmod>2025-03-03T07:02:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/qilin-ransomware-gang-claimed-responsibility.html</loc>
			<lastmod>2025-03-02T23:01:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/us-cyber-command-reportedly-pauses.html</loc>
			<lastmod>2025-03-02T23:01:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/to-identify-suspect-in-idaho.html</loc>
			<lastmod>2025-03-02T19:44:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/beware-of-chineselanguage-robocall-scams.html</loc>
			<lastmod>2025-03-02T12:30:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/wireshark-wireshark-release-notes.html</loc>
			<lastmod>2025-03-02T11:17:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/02/researchers-make-scary-discovery-about.html</loc>
			<lastmod>2025-03-02T11:15:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/german-government-denies-foreign-election.html</loc>
			<lastmod>2025-03-01T23:46:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/uk-silence-over-apple-back.html</loc>
			<lastmod>2025-03-01T23:46:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/fake-captcha-pdfs-spread-lumma.html</loc>
			<lastmod>2025-03-01T23:45:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/new-white-house-plan-to.html</loc>
			<lastmod>2025-03-01T23:45:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/top-most-probable-ways-a.html</loc>
			<lastmod>2025-03-01T17:45:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/aifueled-tax-scams-on-the.html</loc>
			<lastmod>2025-03-01T17:44:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/police-arrests-suspects-tied-to.html</loc>
			<lastmod>2025-03-01T17:44:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/vod-malware-botnet-grows-to.html</loc>
			<lastmod>2025-03-01T17:43:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/serbian-police-used-cellebrite-zeroday.html</loc>
			<lastmod>2025-03-01T17:43:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/how-to-prove-to-auditors.html</loc>
			<lastmod>2025-03-01T16:17:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/ways-to-get-your-business.html</loc>
			<lastmod>2025-03-01T16:10:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/toronto-zoo-says-patrons-transaction.html</loc>
			<lastmod>2025-03-01T15:51:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/microsoft-disrupted-a-global-cybercrime.html</loc>
			<lastmod>2025-03-01T15:32:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/the-new-face-of-executive.html</loc>
			<lastmod>2025-03-01T10:39:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/03/01/ibm-closes-b-hashicorp-acquisition.html</loc>
			<lastmod>2025-03-01T08:03:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/28/tokyo-government-to-introduce-fourday.html</loc>
			<lastmod>2025-02-28T21:55:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/28/marc-benioff-says-salesforce-will.html</loc>
			<lastmod>2025-02-28T09:35:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/28/cloudflares-transparency-reports-now-live.html</loc>
			<lastmod>2025-02-28T09:32:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/belgium-investigating-intelligence-agency-hack.html</loc>
			<lastmod>2025-02-27T16:11:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/cleveland-court-remains-closed-after.html</loc>
			<lastmod>2025-02-27T16:10:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/federal-government-announces-latest-national.html</loc>
			<lastmod>2025-02-27T16:09:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/millions-of-avast-antivirus-software.html</loc>
			<lastmod>2025-02-27T16:02:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/apple-might-be-forced-to.html</loc>
			<lastmod>2025-02-27T15:43:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/things-to-know-about-ai.html</loc>
			<lastmod>2025-02-27T12:58:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/silver-fox-apt-uses-winos.html</loc>
			<lastmod>2025-02-27T12:57:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/chinese-apt-uses-vpn-bug.html</loc>
			<lastmod>2025-02-27T12:55:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/beware-of-fake-cybersecurity-audits.html</loc>
			<lastmod>2025-02-27T12:55:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/gen-ai-accelerates-triage-of.html</loc>
			<lastmod>2025-02-27T12:54:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/hackers-can-crack-into-car.html</loc>
			<lastmod>2025-02-27T12:53:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/the-hidden-cost-of-compliance.html</loc>
			<lastmod>2025-02-27T12:52:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/angry-likho-apt-resurfaces-with.html</loc>
			<lastmod>2025-02-27T12:52:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/of-enterprise-genai-usage-is.html</loc>
			<lastmod>2025-02-27T12:51:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/new-tgtoxic-banking-trojan-variant.html</loc>
			<lastmod>2025-02-27T12:50:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/nuna-baby-essentials-sends-data.html</loc>
			<lastmod>2025-02-27T08:35:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/rxsight-files-notice-of-data.html</loc>
			<lastmod>2025-02-27T08:35:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/levi-korsinsky-llp-investigates-ardysslife.html</loc>
			<lastmod>2025-02-27T08:35:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/cardiology-of-virginia-files-notice.html</loc>
			<lastmod>2025-02-27T08:32:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/bluesights-breach-barometer-report-reveals.html</loc>
			<lastmod>2025-02-27T08:32:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/medical-billing-specialists-announces-data.html</loc>
			<lastmod>2025-02-27T08:31:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/hacker-responsible-for-international-data.html</loc>
			<lastmod>2025-02-27T08:30:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/freddie-mac-data-breach-compromises.html</loc>
			<lastmod>2025-02-27T08:30:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/connally-memorial-medical-center-notifies.html</loc>
			<lastmod>2025-02-27T08:29:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/via-credit-union-viacu-data.html</loc>
			<lastmod>2025-02-27T08:29:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/christensen-group-insurance-begins-sending.html</loc>
			<lastmod>2025-02-27T08:28:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/yes-communities-sends-data-breach.html</loc>
			<lastmod>2025-02-27T08:27:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/decisionfi-sends-data-breach-letters.html</loc>
			<lastmod>2025-02-27T08:26:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/082603.html</loc>
			<lastmod>2025-02-27T08:26:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/how-hackers-ruined-a-disney.html</loc>
			<lastmod>2025-02-27T08:25:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/data-of-mil-gs-shop.html</loc>
			<lastmod>2025-02-27T08:24:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/federman-sherwood-investigates-via-credit.html</loc>
			<lastmod>2025-02-27T08:23:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/phishing-trends-tell-us-what.html</loc>
			<lastmod>2025-02-27T08:21:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/cisco-patches-vulnerabilities-in-nexus.html</loc>
			<lastmod>2025-02-27T08:21:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/critical-microsoft-partner-center-vulnerability.html</loc>
			<lastmod>2025-02-27T08:20:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/lotus-blossom-espionage-group-targets.html</loc>
			<lastmod>2025-02-27T08:19:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/squidoor-suspected-chinese-threat-actors.html</loc>
			<lastmod>2025-02-27T08:18:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/dragonforce-ransomware-group-is-targeting.html</loc>
			<lastmod>2025-02-27T08:17:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/crowdstrike-global-threat-report-beware.html</loc>
			<lastmod>2025-02-27T08:16:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/north-korea-was-responsible-for.html</loc>
			<lastmod>2025-02-27T05:05:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/polaredge-botnet-exploits-cisco-and.html</loc>
			<lastmod>2025-02-27T05:01:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/27/lockbit-ransomware-gang-sends-a.html</loc>
			<lastmod>2025-02-27T05:00:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/gitlab-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-26T22:38:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/silent-breaches-and-supply-chain.html</loc>
			<lastmod>2025-02-26T15:28:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/building-a-securityminded-development-team.html</loc>
			<lastmod>2025-02-26T15:27:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/encrypthub-breaches-orgs-to-deploy.html</loc>
			<lastmod>2025-02-26T15:26:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/cellebrite-cuts-off-serbia-over.html</loc>
			<lastmod>2025-02-26T15:25:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/cve-cisco-application-policy-infrastructure.html</loc>
			<lastmod>2025-02-26T15:24:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/qualcomm-doubles-android-security-patch.html</loc>
			<lastmod>2025-02-26T15:23:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/hackers-exploited-krpano-framework-flaw.html</loc>
			<lastmod>2025-02-26T15:22:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/152044.html</loc>
			<lastmod>2025-02-26T15:20:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/the-adversarial-misuse-of-ai.html</loc>
			<lastmod>2025-02-26T15:20:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/signal-threatens-to-exit-sweden.html</loc>
			<lastmod>2025-02-26T15:19:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/an-icloud-backdoor-would-make.html</loc>
			<lastmod>2025-02-26T15:19:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/billion-rows-of-stolen-records.html</loc>
			<lastmod>2025-02-26T15:18:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/ghostwriter-campaign-targets-ukrainian-government.html</loc>
			<lastmod>2025-02-26T15:17:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/soc-the-evolution-of-the.html</loc>
			<lastmod>2025-02-26T15:15:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/three-password-cracking-techniques-and.html</loc>
			<lastmod>2025-02-26T15:15:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/certua-warns-of-uac-attacks.html</loc>
			<lastmod>2025-02-26T15:14:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/chinese-hackers-got-into-republican.html</loc>
			<lastmod>2025-02-26T15:12:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/orange-group-confirms-breach-after.html</loc>
			<lastmod>2025-02-26T15:11:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/background-check-provider-data-breach.html</loc>
			<lastmod>2025-02-26T06:52:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/the-top-dark-web-telegram.html</loc>
			<lastmod>2025-02-26T06:52:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/how-skillsbased-hiring-can-help.html</loc>
			<lastmod>2025-02-26T06:51:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/leader-of-north-korean-hackers.html</loc>
			<lastmod>2025-02-26T06:50:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/26/silver-fox-apt-hides-valleyrat.html</loc>
			<lastmod>2025-02-26T06:49:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/signal-lmnar-sverige-om-regeringens.html</loc>
			<lastmod>2025-02-25T18:59:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/anobis-a-new-ransomwarethreat-kela.html</loc>
			<lastmod>2025-02-25T07:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/active-malware-campaigns-in-q.html</loc>
			<lastmod>2025-02-25T07:51:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/security-alert-critical-flaws-in.html</loc>
			<lastmod>2025-02-25T07:50:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/predatory-app-downloaded-times-from.html</loc>
			<lastmod>2025-02-25T07:49:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/key-updates-in-the-owasp.html</loc>
			<lastmod>2025-02-25T07:48:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/how-to-achieve-compliance-with.html</loc>
			<lastmod>2025-02-25T07:48:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/truesightsys-driver-variants-exploited-to.html</loc>
			<lastmod>2025-02-25T07:47:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/russia-warns-financial-sector-organizations.html</loc>
			<lastmod>2025-02-25T07:45:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/google-to-replace-sms-authentication.html</loc>
			<lastmod>2025-02-25T07:45:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/avoiding-vendor-lockin-when-using.html</loc>
			<lastmod>2025-02-25T07:44:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/fatalrat-phishing-attacks-target-apac.html</loc>
			<lastmod>2025-02-25T07:43:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/two-actively-exploited-security-flaws.html</loc>
			<lastmod>2025-02-25T07:42:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/autocolor-an-emerging-and-evasive.html</loc>
			<lastmod>2025-02-25T07:41:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/zeroday-bug-pops-up-in.html</loc>
			<lastmod>2025-02-25T07:39:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/25/silent-killers-unmasking-a-largescale.html</loc>
			<lastmod>2025-02-25T07:38:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/chinas-latest-surveillance-tech-a.html</loc>
			<lastmod>2025-02-24T20:16:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-24T14:55:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/hackers-use-google-docs-and.html</loc>
			<lastmod>2025-02-24T14:54:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/surveillance-pricing-is-evil-and.html</loc>
			<lastmod>2025-02-24T14:53:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/security-roundup-february-bh-consulting.html</loc>
			<lastmod>2025-02-24T14:53:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/how-apt-naming-conventions-make.html</loc>
			<lastmod>2025-02-24T14:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-24T14:51:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/silent-killers-unmasking-a-largescale.html</loc>
			<lastmod>2025-02-24T14:50:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/talos-no-cisco-zero-days.html</loc>
			<lastmod>2025-02-24T14:01:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/massive-botnet-hits-microsoft-accounts.html</loc>
			<lastmod>2025-02-24T09:44:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/seraph-stealer-malware-hits-the.html</loc>
			<lastmod>2025-02-24T09:43:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/australia-bans-kaspersky-software-over.html</loc>
			<lastmod>2025-02-24T09:42:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/making-sense-of-australias-new.html</loc>
			<lastmod>2025-02-24T09:42:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/fake-github-projects-distribute-stealers.html</loc>
			<lastmod>2025-02-24T09:41:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/cybercrooks-exploit-url-manipulation-in.html</loc>
			<lastmod>2025-02-24T09:41:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/spylend-android-malware-downloaded-times.html</loc>
			<lastmod>2025-02-24T09:36:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/google-chrome-disables-ublock-origin.html</loc>
			<lastmod>2025-02-24T09:36:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/leaked-files-tie-chinese-cybersecurity.html</loc>
			<lastmod>2025-02-24T09:35:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/notorious-crooks-broke-into-a.html</loc>
			<lastmod>2025-02-24T09:35:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/what-the-bybit-hack-means.html</loc>
			<lastmod>2025-02-24T09:30:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/beware-paypal-new-address-feature.html</loc>
			<lastmod>2025-02-24T09:30:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/how-password-managers-enhance-security.html</loc>
			<lastmod>2025-02-24T09:24:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/24/confluence-exploit-leads-to-lockbit.html</loc>
			<lastmod>2025-02-24T09:23:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/23/labour-will-use-ai-to.html</loc>
			<lastmod>2025-02-23T08:46:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/23/data-leak-at-thermomix-data.html</loc>
			<lastmod>2025-02-23T07:51:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/apple-withdraws-strong-encryption-feature.html</loc>
			<lastmod>2025-02-22T17:14:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/feds-fine-eyeglass-retailer-m.html</loc>
			<lastmod>2025-02-22T17:08:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/signal-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-22T17:06:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/fbi-and-cisa-warn-about.html</loc>
			<lastmod>2025-02-22T17:05:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/openai-bans-accounts-misusing-chatgpt.html</loc>
			<lastmod>2025-02-22T17:03:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/google-unveils-new-quantumsafe-digital.html</loc>
			<lastmod>2025-02-22T17:02:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/clinical-research-firm-exposes-million.html</loc>
			<lastmod>2025-02-22T17:01:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/hackers-claim-data-breach-at.html</loc>
			<lastmod>2025-02-22T17:00:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/leaked-files-tie-chinese-cybersecurity.html</loc>
			<lastmod>2025-02-22T16:59:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/crypto-exchange-bybit-says-it.html</loc>
			<lastmod>2025-02-22T16:58:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/health-administrators-sued-over-email.html</loc>
			<lastmod>2025-02-22T16:57:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/22/in-other-news-black-basta.html</loc>
			<lastmod>2025-02-22T16:56:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/huge-data-leak-exposes-million.html</loc>
			<lastmod>2025-02-21T16:09:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/sudbury-board-reveals-extent-of.html</loc>
			<lastmod>2025-02-21T16:08:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/moscow-isnt-racing-to-let.html</loc>
			<lastmod>2025-02-21T14:29:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/the-complete-guide-to-osint.html</loc>
			<lastmod>2025-02-21T12:35:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/beverly-hills-plastic-surgeon-sued.html</loc>
			<lastmod>2025-02-21T12:34:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/123247.html</loc>
			<lastmod>2025-02-21T12:32:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/123201.html</loc>
			<lastmod>2025-02-21T12:32:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/chinese-apt-exploits-cisco-ios.html</loc>
			<lastmod>2025-02-21T12:31:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/new-report-state-of-secure.html</loc>
			<lastmod>2025-02-21T12:30:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/how-to-backdoor-large-language.html</loc>
			<lastmod>2025-02-21T12:29:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/chinalinked-attackers-exploit-check-point.html</loc>
			<lastmod>2025-02-21T12:28:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/pci-dss-mandates-dmarc-by.html</loc>
			<lastmod>2025-02-21T12:27:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/122628.html</loc>
			<lastmod>2025-02-21T12:26:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/us-army-soldier-linked-to.html</loc>
			<lastmod>2025-02-21T07:45:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/updated-shadowpad-malware-leads-to.html</loc>
			<lastmod>2025-02-21T07:44:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/phishing-attack-hides-javascript-using.html</loc>
			<lastmod>2025-02-21T07:44:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/cisa-and-fbi-ghost-ransomware.html</loc>
			<lastmod>2025-02-21T07:44:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/21/weathering-the-storm-in-the.html</loc>
			<lastmod>2025-02-21T07:43:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/hp-adds-minutes-waiting-time.html</loc>
			<lastmod>2025-02-20T14:13:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/south-korea-confirms-deepseek-sent.html</loc>
			<lastmod>2025-02-20T12:16:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/uk-healthcare-giant-hcrg-confirms.html</loc>
			<lastmod>2025-02-20T11:29:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/managed-healthcare-defense-contractor-to.html</loc>
			<lastmod>2025-02-20T07:29:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/cracked-garrys-mod-beamngdrive-games.html</loc>
			<lastmod>2025-02-20T07:28:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/ecuadors-legislature-says-hackers-attempted.html</loc>
			<lastmod>2025-02-20T07:28:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/how-phished-data-turns-into.html</loc>
			<lastmod>2025-02-20T07:27:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/signals-of-trouble-multiple-russiaaligned.html</loc>
			<lastmod>2025-02-20T07:27:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/stately-taurus-activity-in-southeast.html</loc>
			<lastmod>2025-02-20T06:49:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/darcula-phishing-kit-can-now.html</loc>
			<lastmod>2025-02-20T06:48:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/happy-information-governance-day-data.html</loc>
			<lastmod>2025-02-20T06:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/inside-a-lockbit-ransomware-attack.html</loc>
			<lastmod>2025-02-20T06:45:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/understanding-owasps-top-list-of.html</loc>
			<lastmod>2025-02-20T06:44:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/ghost-ransomware-targeting-obsolete-it.html</loc>
			<lastmod>2025-02-20T06:44:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/darktrace-report-highlights-the-growing.html</loc>
			<lastmod>2025-02-20T06:42:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/increase-in-endpoint-malware-detections.html</loc>
			<lastmod>2025-02-20T06:42:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/064116.html</loc>
			<lastmod>2025-02-20T06:41:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/20/064032.html</loc>
			<lastmod>2025-02-20T06:40:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/googles-new-policy-tracks-all.html</loc>
			<lastmod>2025-02-19T20:35:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/github-alexoslabsslackleak-slack-leak-scans.html</loc>
			<lastmod>2025-02-19T20:08:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/vc-firm-insight-partners-hacked.html</loc>
			<lastmod>2025-02-19T14:33:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/us-agencies-and-defense-contractors.html</loc>
			<lastmod>2025-02-19T14:32:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/us-coast-guard-hack-leads.html</loc>
			<lastmod>2025-02-19T12:21:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/australian-ivf-clinic-is-hacked.html</loc>
			<lastmod>2025-02-19T12:20:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/hydro-customers-see-personal-information.html</loc>
			<lastmod>2025-02-19T12:19:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/us-utility-giant-says-moveit.html</loc>
			<lastmod>2025-02-19T12:19:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/earth-preta-mixes-legitimate-and.html</loc>
			<lastmod>2025-02-19T09:10:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/090945.html</loc>
			<lastmod>2025-02-19T09:09:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/indian-authorities-seize-loot-from.html</loc>
			<lastmod>2025-02-19T09:09:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/cyberattack-likely-to-have-material.html</loc>
			<lastmod>2025-02-19T09:09:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/luxembourg-restricted-access-to-the.html</loc>
			<lastmod>2025-02-19T07:48:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/how-russian-hackers-are-exploiting.html</loc>
			<lastmod>2025-02-19T07:47:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/malaysias-data-sharing-bill-pioneering.html</loc>
			<lastmod>2025-02-19T07:46:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/attackers-are-chaining-flaws-to.html</loc>
			<lastmod>2025-02-19T07:45:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/north-koreas-kimsuky-attacks-rivals.html</loc>
			<lastmod>2025-02-19T07:44:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/hard-drives-containing-sensitive-medical.html</loc>
			<lastmod>2025-02-19T07:42:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/mozilla-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-19T07:41:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/blacklock-ransomware-onslaught-what-to.html</loc>
			<lastmod>2025-02-19T07:41:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/citrix-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-19T07:40:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/new-openssh-flaws-enable-maninthemiddle.html</loc>
			<lastmod>2025-02-19T07:40:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/juniper-networks-security-advisory-av.html</loc>
			<lastmod>2025-02-19T07:40:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/chinese-hackers-exploit-mavinjectexe-to.html</loc>
			<lastmod>2025-02-19T07:39:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/19/ransomware-attack-hits-michigan-casinos.html</loc>
			<lastmod>2025-02-19T07:39:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/opensourcing-r-deepseekr-a-powerful.html</loc>
			<lastmod>2025-02-18T20:39:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/microstrategy-acquires-additional-btc-at.html</loc>
			<lastmod>2025-02-18T15:23:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/thomson-reuters-wins-ai-copyright.html</loc>
			<lastmod>2025-02-18T15:20:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/china-builds-planetary-defence-team.html</loc>
			<lastmod>2025-02-18T15:18:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/saudis-neom-datavolt-to-build.html</loc>
			<lastmod>2025-02-18T15:16:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/new-digital-protections-for-kids.html</loc>
			<lastmod>2025-02-18T15:15:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/x-is-blocking-links-to.html</loc>
			<lastmod>2025-02-18T15:11:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/mistral-saba-mistral-ai-mistral.html</loc>
			<lastmod>2025-02-18T15:09:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/new-frigidstealer-malware-targets-macos.html</loc>
			<lastmod>2025-02-18T09:57:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/palo-alto-networks-confirms-exploitation.html</loc>
			<lastmod>2025-02-18T09:55:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/got-a-microsoft-teams-invite.html</loc>
			<lastmod>2025-02-18T09:43:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/winnti-apt-targets-japanese-firms.html</loc>
			<lastmod>2025-02-18T09:42:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/alarming-dark-web-leak-backs.html</loc>
			<lastmod>2025-02-18T09:41:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/the-biggest-cybersecurity-threats-to.html</loc>
			<lastmod>2025-02-18T09:40:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/zerofox-forecast-dark-web-ransomware.html</loc>
			<lastmod>2025-02-18T09:39:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/ai-data-breach-will-surge.html</loc>
			<lastmod>2025-02-18T09:38:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/ftc-settlement-requires-disconnection-of.html</loc>
			<lastmod>2025-02-18T09:27:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/18/chase-will-soon-block-zelle.html</loc>
			<lastmod>2025-02-18T09:15:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/openai-to-launch-gpt-in.html</loc>
			<lastmod>2025-02-17T17:18:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/baidu-to-make-latest-ernie.html</loc>
			<lastmod>2025-02-17T17:16:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/anthropic-prepares-new-claude-hybrid.html</loc>
			<lastmod>2025-02-17T17:14:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/sam-altman-gpt-to-be.html</loc>
			<lastmod>2025-02-17T17:12:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/russian-drone-attack-damages-chernobyl.html</loc>
			<lastmod>2025-02-17T17:11:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/openai-removes-certain-chatgpt-content.html</loc>
			<lastmod>2025-02-17T17:09:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/the-impact-of-artificial-intelligence.html</loc>
			<lastmod>2025-02-17T17:08:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/tencent-testing-deepseek-to-add.html</loc>
			<lastmod>2025-02-17T17:05:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/microsoft-uncovers-new-xcsset-macos.html</loc>
			<lastmod>2025-02-17T12:27:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/atlas-of-surveillance-the-eff.html</loc>
			<lastmod>2025-02-17T12:26:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/control-systems-cisa-ics-security.html</loc>
			<lastmod>2025-02-17T12:25:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/ubuntu-security-advisory-av.html</loc>
			<lastmod>2025-02-17T12:25:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/dell-security-advisory-av.html</loc>
			<lastmod>2025-02-17T12:25:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/ibm-security-advisory-av.html</loc>
			<lastmod>2025-02-17T12:25:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/akira-ransomware-is-now-targeting.html</loc>
			<lastmod>2025-02-17T11:33:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/chatgpt-operator-prompt-injection-exploits.html</loc>
			<lastmod>2025-02-17T11:32:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/new-finaldraft-malware-spotted-in.html</loc>
			<lastmod>2025-02-17T11:31:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/eagerbee-advanced-backdoor-attacks-on.html</loc>
			<lastmod>2025-02-17T11:31:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/european-union-european-commission-releases.html</loc>
			<lastmod>2025-02-17T11:30:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/european-union-ai-act-provisions.html</loc>
			<lastmod>2025-02-17T11:29:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/singapore-personal-data-protection-commission.html</loc>
			<lastmod>2025-02-17T11:29:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/servers-of-bulletproof-hosting-service.html</loc>
			<lastmod>2025-02-17T11:27:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/massive-data-exposure-at-mars.html</loc>
			<lastmod>2025-02-17T11:27:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/downloads-of-deepseeks-ai-apps.html</loc>
			<lastmod>2025-02-17T11:26:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/112556.html</loc>
			<lastmod>2025-02-17T11:25:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/prorussia-collective-noname-launched-a.html</loc>
			<lastmod>2025-02-17T11:25:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/massive-swiss-medical-leak-binance.html</loc>
			<lastmod>2025-02-17T11:24:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/advanced-ransomware-evasion-techniques-in.html</loc>
			<lastmod>2025-02-17T11:23:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/new-golangbased-backdoor-uses-telegram.html</loc>
			<lastmod>2025-02-17T11:23:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/ransomware-gangs-extort-victims-hours.html</loc>
			<lastmod>2025-02-17T11:22:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/how-to-evaluate-and-mitigate.html</loc>
			<lastmod>2025-02-17T11:22:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/17/samsung-brings-in-quantum-safe.html</loc>
			<lastmod>2025-02-17T11:21:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/ransomhub-never-sleeps-episode-the.html</loc>
			<lastmod>2025-02-16T22:41:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/crypto-scam-revenue-pig-butchering.html</loc>
			<lastmod>2025-02-16T22:41:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/subnautica-fake-playtest-links-sent.html</loc>
			<lastmod>2025-02-16T22:40:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/new-finaldraft-malware-abuses-outlook.html</loc>
			<lastmod>2025-02-16T22:40:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/sandisks-new-gen-ssd-offers.html</loc>
			<lastmod>2025-02-16T20:59:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/police-risk-losing-societys-trust.html</loc>
			<lastmod>2025-02-16T19:09:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/texas-investigating-deepseek-for-violating.html</loc>
			<lastmod>2025-02-16T19:08:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/malicious-piratefi-game-infects-steam.html</loc>
			<lastmod>2025-02-16T19:08:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/hackers-exploit-authentication-bypass-in.html</loc>
			<lastmod>2025-02-16T19:07:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/apple-maps-might-start-showing.html</loc>
			<lastmod>2025-02-16T14:28:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/myanmar-militia-says-ready-to.html</loc>
			<lastmod>2025-02-16T12:03:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/storm-used-the-device-code.html</loc>
			<lastmod>2025-02-16T12:02:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/why-private-equity-is-now.html</loc>
			<lastmod>2025-02-16T11:59:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/16/breaking-news-massive-vaniitys-leak.html</loc>
			<lastmod>2025-02-16T11:57:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/15/coast-guard-suffers-data-breach.html</loc>
			<lastmod>2025-02-15T23:55:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/15/doge-exposes-oncesecret-government-networks.html</loc>
			<lastmod>2025-02-15T22:09:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/i-used-sunno-ai-to.html</loc>
			<lastmod>2025-02-14T22:38:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/reddit-will-lock-some-content.html</loc>
			<lastmod>2025-02-14T17:54:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/ransomhub-the-new-king-of.html</loc>
			<lastmod>2025-02-14T17:50:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/stealing-firmware-from-overtheair-updates.html</loc>
			<lastmod>2025-02-14T17:49:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/emulating-the-criminal-adversary-fin.html</loc>
			<lastmod>2025-02-14T17:48:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/lazarus-group-deploys-marstech-javascript.html</loc>
			<lastmod>2025-02-14T17:47:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/virginia-attorney-generals-office-struck.html</loc>
			<lastmod>2025-02-14T17:43:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/clearml-and-nvidia-vulns-cisco.html</loc>
			<lastmod>2025-02-14T17:42:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/arizona-police-procedures-exposed-in.html</loc>
			<lastmod>2025-02-14T11:42:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/hacker-leaks-account-data-of.html</loc>
			<lastmod>2025-02-14T11:41:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/doxbin-data-breach-hackers-leak.html</loc>
			<lastmod>2025-02-14T11:41:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/puppygirl-hacker-polycule-leaks-over.html</loc>
			<lastmod>2025-02-14T11:18:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/top-advanced-persistent-threat-apt.html</loc>
			<lastmod>2025-02-14T09:46:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/threat-actors-are-using-legitimate.html</loc>
			<lastmod>2025-02-14T09:45:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/xerox-versalink-c-multifunction-printer.html</loc>
			<lastmod>2025-02-14T09:44:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/its-time-to-move-beyond.html</loc>
			<lastmod>2025-02-14T09:43:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/sonicwall-firewall-vulnerability-exploited-after.html</loc>
			<lastmod>2025-02-14T09:42:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/salt-typhoon-targeting-old-cisco.html</loc>
			<lastmod>2025-02-14T09:42:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/whoami-name-confusion-attacks-can.html</loc>
			<lastmod>2025-02-14T09:41:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/14/microsoft-study-finds-relying-on.html</loc>
			<lastmod>2025-02-14T09:38:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/unpatched-cisco-devices-still-getting.html</loc>
			<lastmod>2025-02-13T13:30:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/lawyers-caught-citing-aihallucinated-cases.html</loc>
			<lastmod>2025-02-13T13:30:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/unusual-attack-linked-to-chinese.html</loc>
			<lastmod>2025-02-13T13:29:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/north-korean-hackers-spotted-using.html</loc>
			<lastmod>2025-02-13T13:28:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/chinalinked-apts-tool-employed-in.html</loc>
			<lastmod>2025-02-13T13:27:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/deepseek-exposes-major-cybersecurity-blind.html</loc>
			<lastmod>2025-02-13T13:26:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/cve-postgresql-psql-sql-injection.html</loc>
			<lastmod>2025-02-13T13:26:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/astaroth-phishing-kit-bypasses-fa.html</loc>
			<lastmod>2025-02-13T13:25:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/north-korean-apt-uses-powershell.html</loc>
			<lastmod>2025-02-13T13:24:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/dark-web-profile-fog-ransomware.html</loc>
			<lastmod>2025-02-13T13:24:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/hackers-are-targeting-your-password.html</loc>
			<lastmod>2025-02-13T08:39:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/watergate-hotel-hit-with-data.html</loc>
			<lastmod>2025-02-13T08:35:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/samoa-warns-of-apt-hackers.html</loc>
			<lastmod>2025-02-13T08:34:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/ransomware-gangs-shifting-tactics-to.html</loc>
			<lastmod>2025-02-13T08:33:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/michigan-casino-chain-forced-to.html</loc>
			<lastmod>2025-02-13T08:31:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/scams-targeting-lovers-or-the.html</loc>
			<lastmod>2025-02-13T08:17:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/hacker-who-hijacked-secs-x.html</loc>
			<lastmod>2025-02-13T08:17:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/google-fixes-flaw-that-could.html</loc>
			<lastmod>2025-02-13T08:16:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/researchers-find-new-exploit-bypassing.html</loc>
			<lastmod>2025-02-13T08:16:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/dprk-hackers-dupe-targets-into.html</loc>
			<lastmod>2025-02-13T08:15:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/ransomware-isnt-always-about-the.html</loc>
			<lastmod>2025-02-13T08:15:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/cybercrime-a-multifaceted-national-security.html</loc>
			<lastmod>2025-02-13T08:15:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/palo-alto-networks-patches-authentication.html</loc>
			<lastmod>2025-02-13T07:03:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/finaldraft-malware-exploits-microsoft-graph.html</loc>
			<lastmod>2025-02-13T07:02:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/sarcoma-ransomware-gang-claims-the.html</loc>
			<lastmod>2025-02-13T07:01:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/of-vulnerabilities-are-abused-before.html</loc>
			<lastmod>2025-02-13T07:00:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/russialinked-seashell-blizzard-intensifies-cyber.html</loc>
			<lastmod>2025-02-13T07:00:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/what-security-teams-need-to.html</loc>
			<lastmod>2025-02-13T06:59:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/the-uks-secret-icloud-backdoor.html</loc>
			<lastmod>2025-02-13T06:58:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/over-million-fortune-employee-accounts.html</loc>
			<lastmod>2025-02-13T06:56:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/did-you-download-this-steam.html</loc>
			<lastmod>2025-02-13T06:52:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/the-badpilot-campaign-seashell-blizzard.html</loc>
			<lastmod>2025-02-13T06:51:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/13/sophos-lays-off-of-staff.html</loc>
			<lastmod>2025-02-13T06:49:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/microsoft-uncovers-sandworm-subgroups-global.html</loc>
			<lastmod>2025-02-12T21:54:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/palo-alto-networks-security-advisory.html</loc>
			<lastmod>2025-02-12T21:53:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/massive-tb-data-leak-exposes.html</loc>
			<lastmod>2025-02-12T21:53:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/reflected-xss-in-main-search.html</loc>
			<lastmod>2025-02-12T21:52:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/japan-goes-on-offense-with.html</loc>
			<lastmod>2025-02-12T21:51:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/ransomware-groups-made-less-money.html</loc>
			<lastmod>2025-02-12T08:11:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/russian-military-hackers-deploy-malicious.html</loc>
			<lastmod>2025-02-12T08:11:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/russian-bulletproof-hosting-service-zservers.html</loc>
			<lastmod>2025-02-12T08:11:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/over-keriocontrol-firewalls-exposed-to.html</loc>
			<lastmod>2025-02-12T08:10:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/microsofts-february-patch-a-lighter.html</loc>
			<lastmod>2025-02-12T08:10:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/12/sonicwall-firewall-exploit-lets-hackers.html</loc>
			<lastmod>2025-02-12T08:09:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/cisco-rejects-kraken-ransomwares-data.html</loc>
			<lastmod>2025-02-11T22:49:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/sap-security-advisory-february-monthly.html</loc>
			<lastmod>2025-02-11T22:48:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/ivanti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-11T22:47:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/fortinet-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-11T22:47:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/microsoft-security-advisory-february-monthly.html</loc>
			<lastmod>2025-02-11T22:28:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/adobe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-11T22:26:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/how-autogenerated-passwords-in-sitevision.html</loc>
			<lastmod>2025-02-11T22:26:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/openssl-patched-highseverity-flaw-cve.html</loc>
			<lastmod>2025-02-11T22:25:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-11T22:25:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/omnigpt-ai-chatbot-alleged-breach.html</loc>
			<lastmod>2025-02-11T22:24:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/microsoft-fixes-vulnerabilities-including-zerodays.html</loc>
			<lastmod>2025-02-11T22:24:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/attackers-exploit-a-new-zeroday.html</loc>
			<lastmod>2025-02-11T22:23:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/080744.html</loc>
			<lastmod>2025-02-11T08:07:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/sky-ecc-encrypted-service-distributors.html</loc>
			<lastmod>2025-02-11T08:07:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/arrested-as-police-dismantle-base.html</loc>
			<lastmod>2025-02-11T08:06:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/hackers-exploit-google-tag-manager.html</loc>
			<lastmod>2025-02-11T08:06:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/zimbra-releases-security-updates-for.html</loc>
			<lastmod>2025-02-11T08:06:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/apple-fixes-zeroday-exploited-in.html</loc>
			<lastmod>2025-02-11T08:05:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/why-security-leaders-must-ensure.html</loc>
			<lastmod>2025-02-11T07:09:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/progress-software-patches-highseverity-loadmaster.html</loc>
			<lastmod>2025-02-11T07:08:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/11/jeep-introduces-popup-ads-that.html</loc>
			<lastmod>2025-02-11T07:07:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/sha-hash-calculation-from-data.html</loc>
			<lastmod>2025-02-10T22:49:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-10T22:49:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-10T22:48:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-10T22:48:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/apple-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-10T22:48:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/cyberattack-disrupts-lee-newspapers-operations.html</loc>
			<lastmod>2025-02-10T22:47:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/apple-ios-day-vulnerability-exploited.html</loc>
			<lastmod>2025-02-10T22:46:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/netsupport-rat-grant-attackers-full.html</loc>
			<lastmod>2025-02-10T11:45:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-02-10T11:45:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/major-cyber-attacks-in-review.html</loc>
			<lastmod>2025-02-10T11:44:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/malicious-ml-models-found-on.html</loc>
			<lastmod>2025-02-10T11:43:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/analyst-burnout-is-an-advanced.html</loc>
			<lastmod>2025-02-10T11:41:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/russia-vanishing-from-the-net.html</loc>
			<lastmod>2025-02-10T11:40:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/kraken-ransomware-strikes-cisco-servers.html</loc>
			<lastmod>2025-02-10T11:39:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/edge-devices-face-surge-in.html</loc>
			<lastmod>2025-02-10T11:38:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/handala-hackers-claim-israeli-police.html</loc>
			<lastmod>2025-02-10T11:37:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/hackers-exploit-anydesk-vulnerability-to.html</loc>
			<lastmod>2025-02-10T06:33:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/xe-hacker-group-exploits-veracore.html</loc>
			<lastmod>2025-02-10T06:32:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/a-week-in-security-february.html</loc>
			<lastmod>2025-02-10T06:31:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/cisco-data-breach-new-ransomware.html</loc>
			<lastmod>2025-02-10T06:30:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/quishing-the-emerging-threat-of.html</loc>
			<lastmod>2025-02-10T06:29:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/solarwinds-taken-private-in-billion.html</loc>
			<lastmod>2025-02-10T06:28:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/massive-openai-leak-wordpress-admin.html</loc>
			<lastmod>2025-02-10T06:28:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/massive-brute-force-attack-targets.html</loc>
			<lastmod>2025-02-10T06:27:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/marvel-game-vulnerability-exposes-pcs.html</loc>
			<lastmod>2025-02-10T06:26:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/information-of-stolen-in-ransomware.html</loc>
			<lastmod>2025-02-10T06:25:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/10/movistaro-deja-a-sus-clientes.html</loc>
			<lastmod>2025-02-10T06:23:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/09/secret-taliban-records-published-online.html</loc>
			<lastmod>2025-02-09T22:49:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/09/brave-now-lets-you-inject.html</loc>
			<lastmod>2025-02-09T22:49:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/09/malicious-ai-models-on-hugging.html</loc>
			<lastmod>2025-02-09T22:49:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/09/google-cloud-build-vulnerability-enables.html</loc>
			<lastmod>2025-02-09T22:48:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/09/econet-refutes-data-breach-claims.html</loc>
			<lastmod>2025-02-09T11:39:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/exposed-ollama-apis-leave-deepseek.html</loc>
			<lastmod>2025-02-08T23:13:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/chinesespeaking-group-manipulates-seo-with.html</loc>
			<lastmod>2025-02-08T23:13:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/apple-missed-screenshotsnooping-malware-in.html</loc>
			<lastmod>2025-02-08T23:13:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/label-maker-avery-says-ransomware.html</loc>
			<lastmod>2025-02-08T23:12:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/googles-dmarc-push-pays-off.html</loc>
			<lastmod>2025-02-08T12:01:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/cybercriminals-weaponize-graphics-files-in.html</loc>
			<lastmod>2025-02-08T12:01:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/hackers-exploit-cityworks-rce-bug.html</loc>
			<lastmod>2025-02-08T12:00:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/using-capa-rules-for-android.html</loc>
			<lastmod>2025-02-08T12:00:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/nowsecure-uncovers-multiple-security-and.html</loc>
			<lastmod>2025-02-08T11:59:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/cloudflare-outage-caused-by-botched.html</loc>
			<lastmod>2025-02-08T11:59:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/hewlett-packard-enterprise-confirms-data.html</loc>
			<lastmod>2025-02-08T11:59:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/microsoft-stock-japans-softbank-poised.html</loc>
			<lastmod>2025-02-08T11:08:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/08/cloudflare-incident-on-february-cloudflare.html</loc>
			<lastmod>2025-02-08T11:00:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/uk-orders-apple-to-let.html</loc>
			<lastmod>2025-02-07T12:43:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/federal-government-bans-chinese-ai.html</loc>
			<lastmod>2025-02-07T09:09:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/dark-web-profile-tortoiseshell-apt.html</loc>
			<lastmod>2025-02-07T08:40:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/breach-roundup-hacker-claims-million.html</loc>
			<lastmod>2025-02-07T08:40:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/impacted-by-data-breaches-at.html</loc>
			<lastmod>2025-02-07T08:39:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/ciscos-ise-bugs-could-allow.html</loc>
			<lastmod>2025-02-07T08:38:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/uk-engineering-giant-imi-hit.html</loc>
			<lastmod>2025-02-07T08:38:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/attackers-compromise-iis-servers-by.html</loc>
			<lastmod>2025-02-07T08:37:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/07/information-of-stolen-in-crippling.html</loc>
			<lastmod>2025-02-07T08:37:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/06/ios-app-store-apps-with.html</loc>
			<lastmod>2025-02-06T10:04:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/06/critical-cisco-ise-vulnerabilities-patched.html</loc>
			<lastmod>2025-02-06T08:24:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/06/five-eyes-releases-guidance-on.html</loc>
			<lastmod>2025-02-06T08:22:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/06/thailand-to-cut-off-power.html</loc>
			<lastmod>2025-02-06T08:21:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/poisoned-go-programming-language-package.html</loc>
			<lastmod>2025-02-05T09:11:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/russian-cyber-research-companies-post.html</loc>
			<lastmod>2025-02-05T09:11:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/analyzing-elfsshdinjectoratr-with-a-human.html</loc>
			<lastmod>2025-02-05T09:10:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/macos-flexibleferret-further-variants-of.html</loc>
			<lastmod>2025-02-05T09:10:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/cve-ukrainian-organizations-targeted-in.html</loc>
			<lastmod>2025-02-05T09:09:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/netgear-warns-users-to-patch.html</loc>
			<lastmod>2025-02-05T09:09:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/stealers-on-the-rise-a.html</loc>
			<lastmod>2025-02-05T09:09:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/chinese-infrastructure-laundering-abuses-aws.html</loc>
			<lastmod>2025-02-05T09:08:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/million-requests-later-we-made.html</loc>
			<lastmod>2025-02-05T09:08:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/05/cyber-agencies-share-security-guidance.html</loc>
			<lastmod>2025-02-05T09:08:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/managing-software-risk-in-a.html</loc>
			<lastmod>2025-02-04T16:50:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/tangerine-turkey-cryptocurrency-mining-worm.html</loc>
			<lastmod>2025-02-04T16:48:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/coyote-banking-trojan-targets-brazilian.html</loc>
			<lastmod>2025-02-04T16:47:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/cisa-adds-four-known-exploited.html</loc>
			<lastmod>2025-02-04T16:46:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/massive-data-leak-exposes-billion.html</loc>
			<lastmod>2025-02-04T14:24:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/beware-of-stealers-disguised-as.html</loc>
			<lastmod>2025-02-04T13:29:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/132849.html</loc>
			<lastmod>2025-02-04T13:28:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/cve-a-case-study-on.html</loc>
			<lastmod>2025-02-04T13:28:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/deepseek-ai-tools-impersonated-by.html</loc>
			<lastmod>2025-02-04T13:28:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/kazakhstan-to-audit-foreign-ministry.html</loc>
			<lastmod>2025-02-04T13:27:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/a-new-phishing-campaign-is.html</loc>
			<lastmod>2025-02-04T07:46:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/surge-in-infostealer-attacks-threatens.html</loc>
			<lastmod>2025-02-04T07:40:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/stealers-on-the-rise-a.html</loc>
			<lastmod>2025-02-04T07:39:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/hackers-exploiting-zip-zeroday-vulnerability.html</loc>
			<lastmod>2025-02-04T07:38:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/warning-phishing-campaign-targets-germany.html</loc>
			<lastmod>2025-02-04T07:37:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/rat-race-valleyrat-malware-targets.html</loc>
			<lastmod>2025-02-04T07:37:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/hackers-impersonate-deepseek-to-distribute.html</loc>
			<lastmod>2025-02-04T07:36:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/picus-security-finds-x-increase.html</loc>
			<lastmod>2025-02-04T07:35:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/chinese-algorithm-claimed-to-boost.html</loc>
			<lastmod>2025-02-04T07:32:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/salesforce-crm-cutting-roles-while.html</loc>
			<lastmod>2025-02-04T07:31:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/ublock-origin-is-dead-for.html</loc>
			<lastmod>2025-02-04T07:29:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/td-bank-confirms-data-breach.html</loc>
			<lastmod>2025-02-04T07:27:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/crtc-lets-top-telecoms-piggyback.html</loc>
			<lastmod>2025-02-04T07:20:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/cloudflare-is-making-it-easier.html</loc>
			<lastmod>2025-02-04T07:18:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-04T07:14:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-04T07:13:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-02-04T07:13:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/total-fines-imposed-by-eu.html</loc>
			<lastmod>2025-02-04T07:12:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/introducing-orbit-scan-targets-and.html</loc>
			<lastmod>2025-02-04T07:11:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/macos-flexibleferret-further-variants-of.html</loc>
			<lastmod>2025-02-04T07:10:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/deepseek-blocked-in-us-federal.html</loc>
			<lastmod>2025-02-04T07:09:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/04/new-research-from-incogni-ranks.html</loc>
			<lastmod>2025-02-04T07:09:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/ai-company-asks-job-applicants.html</loc>
			<lastmod>2025-02-03T16:13:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/cisco-finds-deepseek-r-highly.html</loc>
			<lastmod>2025-02-03T16:12:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/ev-charging-stations-vulnerable-to.html</loc>
			<lastmod>2025-02-03T16:11:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/click-phishing-campaign-targets-highprofile.html</loc>
			<lastmod>2025-02-03T16:11:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/sophos-acquires-secureworks-sophos-news.html</loc>
			<lastmod>2025-02-03T16:09:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/crazy-evil-gang-runs-over.html</loc>
			<lastmod>2025-02-03T16:07:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/cves-exploited-in-reflecting-a.html</loc>
			<lastmod>2025-02-03T16:05:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-02-03T16:03:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/hundreds-of-thousands-hit-by.html</loc>
			<lastmod>2025-02-03T16:03:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/coyote-malware-expands-reach-now.html</loc>
			<lastmod>2025-02-03T16:02:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/insurance-company-globe-life-notifying.html</loc>
			<lastmod>2025-02-03T16:01:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/million-impacted-by-data-breach.html</loc>
			<lastmod>2025-02-03T14:42:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/how-the-proposed-hisaa-law.html</loc>
			<lastmod>2025-02-03T14:41:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/of-it-leaders-fear-major.html</loc>
			<lastmod>2025-02-03T14:40:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/crazy-evil-gang-targets-crypto.html</loc>
			<lastmod>2025-02-03T14:39:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/forrester-report-the-complexities-of.html</loc>
			<lastmod>2025-02-03T14:39:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/criminals-increase-attack-speed-by.html</loc>
			<lastmod>2025-02-03T14:38:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/baddns-opensource-tool-checks-for.html</loc>
			<lastmod>2025-02-03T14:37:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/doj-dutch-authorities-seize-domains.html</loc>
			<lastmod>2025-02-03T14:36:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/amd-microcode-signature-verification-vulnerability.html</loc>
			<lastmod>2025-02-03T14:35:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/03/active-exploitation-of-macos-kernel.html</loc>
			<lastmod>2025-02-03T14:27:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/cyber-security-trends-for-cyber.html</loc>
			<lastmod>2025-02-02T17:27:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/subscribe-to-read-the-eu.html</loc>
			<lastmod>2025-02-02T17:22:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/more-chatgpt-jailbreaks-are-evading.html</loc>
			<lastmod>2025-02-02T17:16:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/microsoft-is-killing-its-free.html</loc>
			<lastmod>2025-02-02T17:14:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/deepseek-might-not-be-as.html</loc>
			<lastmod>2025-02-02T17:13:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/microsofts-free-offer-deadlinemillions-of.html</loc>
			<lastmod>2025-02-02T17:07:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/ransomware-attack-hit-indian-multinational.html</loc>
			<lastmod>2025-02-02T17:05:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/malicious-intent-exploiting-gpu-vulnerabilities.html</loc>
			<lastmod>2025-02-02T17:04:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/02/list-of-products-from-the.html</loc>
			<lastmod>2025-02-02T16:20:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/clickfix-vs-traditional-download-in.html</loc>
			<lastmod>2025-02-01T11:58:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/backdoor-in-chinesemade-healthcare-monitoring.html</loc>
			<lastmod>2025-02-01T11:57:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/meta-confirms-zeroclick-whatsapp-spyware.html</loc>
			<lastmod>2025-02-01T11:56:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/beyondtrust-zeroday-breach-exposed-saas.html</loc>
			<lastmod>2025-02-01T11:55:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/us-and-dutch-authorities-dismantle.html</loc>
			<lastmod>2025-02-01T11:54:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/texas-governor-orders-ban-on.html</loc>
			<lastmod>2025-02-01T11:54:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/israeli-spyware-firm-paragon-linked.html</loc>
			<lastmod>2025-02-01T11:53:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/casio-and-other-websites-hit.html</loc>
			<lastmod>2025-02-01T11:52:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/another-healthcare-data-breach-compromised.html</loc>
			<lastmod>2025-02-01T11:50:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/02/01/exclusive-apex-custom-software-hacked.html</loc>
			<lastmod>2025-02-01T11:50:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/google-offers-voluntary-exit-to.html</loc>
			<lastmod>2025-01-31T16:22:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/openai-omini-openai-openai-is.html</loc>
			<lastmod>2025-01-31T16:20:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/northbay-health-data-breach-impacts.html</loc>
			<lastmod>2025-01-31T08:07:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/google-bans-malicious-android-app.html</loc>
			<lastmod>2025-01-31T08:06:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/vmware-offers-fixes-to-severe.html</loc>
			<lastmod>2025-01-31T08:05:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/ny-blood-center-attack-disrupts.html</loc>
			<lastmod>2025-01-31T08:04:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/chatgpto-contains-security-bypass-vulnerability.html</loc>
			<lastmod>2025-01-31T07:37:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/lumma-stealers-githubbased-delivery-explored.html</loc>
			<lastmod>2025-01-31T07:36:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/google-over-nationstate-threat-groups.html</loc>
			<lastmod>2025-01-31T07:36:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/new-aquabotv-botnet-malware-targets.html</loc>
			<lastmod>2025-01-31T07:36:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/new-syncjacking-attack-hijacks-devices.html</loc>
			<lastmod>2025-01-31T07:35:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/no-need-to-rsvp-a.html</loc>
			<lastmod>2025-01-31T07:35:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/microsoft-advertisers-phished-via-malicious.html</loc>
			<lastmod>2025-01-31T07:35:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/31/banshee-a-stealer-targeting-macos.html</loc>
			<lastmod>2025-01-31T07:34:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/backdoor-found-in-two-healthcare.html</loc>
			<lastmod>2025-01-30T18:51:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/unique-click-deanonymization-attack-targeting.html</loc>
			<lastmod>2025-01-30T08:20:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/deepseek-ai-database-exposed-over.html</loc>
			<lastmod>2025-01-30T07:13:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/phishing-campaign-baits-hook-with.html</loc>
			<lastmod>2025-01-30T06:56:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/lynx-ransomware-group-industrializes-cybercrime.html</loc>
			<lastmod>2025-01-30T06:56:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/windows-s-h-january-update.html</loc>
			<lastmod>2025-01-30T06:14:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/nordvpns-new-feature-gets-around.html</loc>
			<lastmod>2025-01-30T06:11:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/apples-new-game-changer-iphone.html</loc>
			<lastmod>2025-01-30T06:10:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/microsoft-ceo-ai-scaling-laws.html</loc>
			<lastmod>2025-01-30T06:02:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/security-roundup-january-bh-consulting.html</loc>
			<lastmod>2025-01-30T06:02:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/unpatched-php-voyager-flaws-leave.html</loc>
			<lastmod>2025-01-30T06:01:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/30/operation-talent-fbi-seizes-nulledto.html</loc>
			<lastmod>2025-01-30T05:59:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/it-services-vendor-hack-affects.html</loc>
			<lastmod>2025-01-29T19:06:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/clsta-an-espionage-operation-against.html</loc>
			<lastmod>2025-01-29T19:05:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/russian-uac-targets-europe-and.html</loc>
			<lastmod>2025-01-29T19:04:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/threat-actors-using-google-gemini.html</loc>
			<lastmod>2025-01-29T19:04:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/us-cisa-adds-apple-products.html</loc>
			<lastmod>2025-01-29T19:03:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/isc-bind-security-advisory-av.html</loc>
			<lastmod>2025-01-29T19:02:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/fbi-seizes-leading-hacking-forums.html</loc>
			<lastmod>2025-01-29T19:02:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/these-are-the-worst-pin.html</loc>
			<lastmod>2025-01-29T19:01:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/mishing-cyber-attack-from-malicious.html</loc>
			<lastmod>2025-01-29T19:00:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/old-ways-of-vendor-risk.html</loc>
			<lastmod>2025-01-29T19:00:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/teamviewer-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-29T18:59:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/top-exploited-vulnerabilities-of-socradar.html</loc>
			<lastmod>2025-01-29T18:58:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/aquabot-botnet-targeting-vulnerable-mitel.html</loc>
			<lastmod>2025-01-29T18:57:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/new-phishing-campaign-targets-users.html</loc>
			<lastmod>2025-01-29T18:57:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/canadas-privacy-landscape-saw-significant.html</loc>
			<lastmod>2025-01-29T07:29:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/hackers-claim-nd-breach-at.html</loc>
			<lastmod>2025-01-29T07:28:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/unmasking-fleshstealer-a-new-infostealer.html</loc>
			<lastmod>2025-01-29T07:27:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/oauth-flaw-exposed-airline-users.html</loc>
			<lastmod>2025-01-29T07:26:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/unknown-threat-actor-targeting-juniper.html</loc>
			<lastmod>2025-01-29T07:25:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/only-of-organizations-fully-recover.html</loc>
			<lastmod>2025-01-29T07:24:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/api-supply-chain-attacks-surge.html</loc>
			<lastmod>2025-01-29T07:23:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/cybersecurity-crisis-in-numbers-help.html</loc>
			<lastmod>2025-01-29T07:23:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/building-resilience-against-zeroday-threats.html</loc>
			<lastmod>2025-01-29T07:22:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/uac-expands-cyber-attacks-to.html</loc>
			<lastmod>2025-01-29T07:21:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/how-lazarus-group-built-a.html</loc>
			<lastmod>2025-01-29T07:20:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/exworker-arrested-after-shutdown-of.html</loc>
			<lastmod>2025-01-29T07:20:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/critical-cacti-security-flaw-cve.html</loc>
			<lastmod>2025-01-29T07:19:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/simplehelp-remote-access-software-exploited.html</loc>
			<lastmod>2025-01-29T07:16:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/071614.html</loc>
			<lastmod>2025-01-29T07:16:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/smiths-group-scrambling-to-restore.html</loc>
			<lastmod>2025-01-29T07:15:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/is-deepseek-safe-a-qa.html</loc>
			<lastmod>2025-01-29T07:14:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/looking-back-to-look-forward.html</loc>
			<lastmod>2025-01-29T07:11:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/exxonmobil-lobbyist-caught-hacking-climate.html</loc>
			<lastmod>2025-01-29T07:10:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/purecrypter-deploys-agent-tesla-and.html</loc>
			<lastmod>2025-01-29T07:05:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/bitwarden-makes-it-harder-to.html</loc>
			<lastmod>2025-01-29T07:05:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/deepseek-halts-new-signups-amid.html</loc>
			<lastmod>2025-01-29T07:05:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/microsoft-tests-edge-scareware-blocker.html</loc>
			<lastmod>2025-01-29T07:04:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/29/apple-users-update-your-devices.html</loc>
			<lastmod>2025-01-29T07:04:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/apple-chips-can-be-hacked.html</loc>
			<lastmod>2025-01-28T17:04:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/lets-secure-insurance-failed-to.html</loc>
			<lastmod>2025-01-28T13:56:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/prompt-injection-tricks-ai-into.html</loc>
			<lastmod>2025-01-28T07:51:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/south-korea-sees-cyberattack-damage.html</loc>
			<lastmod>2025-01-28T07:50:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/faridabad-police-arrest-cyber-criminals.html</loc>
			<lastmod>2025-01-28T07:41:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/cyberattacks-on-the-tech-supply.html</loc>
			<lastmod>2025-01-28T07:40:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/eu-sanctions-three-russians-for.html</loc>
			<lastmod>2025-01-28T07:37:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/smiths-group-manages-cyber-security.html</loc>
			<lastmod>2025-01-28T07:37:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/tech-selloff-deepens-as-deepseek.html</loc>
			<lastmod>2025-01-28T07:34:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/now-apple-tells-us-how.html</loc>
			<lastmod>2025-01-28T07:32:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/swedish-authorities-seize-vessel-in.html</loc>
			<lastmod>2025-01-28T07:30:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/sonicwalls-zeroday-provokes-patch-alerts.html</loc>
			<lastmod>2025-01-28T07:29:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/microsoft-teams-phishing-attack-alerts.html</loc>
			<lastmod>2025-01-28T07:23:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/technical-analysis-of-xloader-versions.html</loc>
			<lastmod>2025-01-28T07:23:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/mintsloader-delivers-stealc-malware-and.html</loc>
			<lastmod>2025-01-28T07:23:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/ransomware-gang-uses-ssh-tunnels.html</loc>
			<lastmod>2025-01-28T07:22:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/deepseeks-popular-ai-app-is.html</loc>
			<lastmod>2025-01-28T06:05:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/meta-ai-tracks-canadians-on.html</loc>
			<lastmod>2025-01-28T05:58:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/attackers-exploit-pdfs-in-sophisticated.html</loc>
			<lastmod>2025-01-28T05:35:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/invisibleferret-everything-about-lazarus-apts.html</loc>
			<lastmod>2025-01-28T05:34:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/compliance-scorecard-version-simplifies-compliance.html</loc>
			<lastmod>2025-01-28T05:33:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/data-protection-day-three-takeaways.html</loc>
			<lastmod>2025-01-28T05:32:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/a-method-to-assess-forgivable.html</loc>
			<lastmod>2025-01-28T05:31:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/dark-web-profile-funksec-socradar.html</loc>
			<lastmod>2025-01-28T05:28:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/eu-sanctions-russian-nationals-for.html</loc>
			<lastmod>2025-01-28T05:28:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/toprated-chinese-ai-app-deepseek.html</loc>
			<lastmod>2025-01-28T05:27:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/28/nursing-home-rehab-chain-says.html</loc>
			<lastmod>2025-01-28T05:27:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/esxi-ransomware-attacks-use-ssh.html</loc>
			<lastmod>2025-01-27T06:51:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/cisos-top-cybersecurity-priorities-for.html</loc>
			<lastmod>2025-01-27T06:50:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/hackers-allegedly-stole-m-from.html</loc>
			<lastmod>2025-01-27T06:50:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/gamacopy-mimics-gamaredon-tactics-in.html</loc>
			<lastmod>2025-01-27T06:50:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/a-strategic-approach-to-container.html</loc>
			<lastmod>2025-01-27T06:49:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/mintsloader-delivers-stealc-malware-and.html</loc>
			<lastmod>2025-01-27T06:48:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/how-to-use-apples-app.html</loc>
			<lastmod>2025-01-27T06:47:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/cobalt-strike-and-a-pair.html</loc>
			<lastmod>2025-01-27T06:46:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/27/abusing-multicast-poisoning-for-preauthenticated.html</loc>
			<lastmod>2025-01-27T06:45:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/recent-reports-have-highlighted-that.html</loc>
			<lastmod>2025-01-26T15:58:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/cisco-warns-of-a-clamav.html</loc>
			<lastmod>2025-01-26T14:07:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/metas-llama-framework-flaw-exposes.html</loc>
			<lastmod>2025-01-26T14:05:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/openai-launches-ai-agent-operator.html</loc>
			<lastmod>2025-01-26T14:03:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/patching-lags-for-vulnerabilities-targeted.html</loc>
			<lastmod>2025-01-26T14:02:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/massive-data-leak-of-information.html</loc>
			<lastmod>2025-01-26T14:00:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/unitedhealth-groups-massive-data-breach.html</loc>
			<lastmod>2025-01-26T14:00:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/26/talktalk-investigates-breach-after-data.html</loc>
			<lastmod>2025-01-26T13:59:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/25/american-national-insurance-company-anico.html</loc>
			<lastmod>2025-01-25T12:38:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/25/crunchyroll-password-leaks-whats-happening.html</loc>
			<lastmod>2025-01-25T12:37:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/openai-launches-operator-an-ai.html</loc>
			<lastmod>2025-01-24T17:46:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/introducing-ghostgptthe-new-cybercrime-ai.html</loc>
			<lastmod>2025-01-24T16:39:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/bitcards-the-dark-side-of.html</loc>
			<lastmod>2025-01-24T09:57:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/m-was-the-average-cost.html</loc>
			<lastmod>2025-01-24T09:07:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/new-law-could-mean-prison.html</loc>
			<lastmod>2025-01-24T09:06:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/belgium-private-investigation-act-how.html</loc>
			<lastmod>2025-01-24T09:04:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/nearly-half-of-cisos-now.html</loc>
			<lastmod>2025-01-24T09:03:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/state-of-saas-backup-and.html</loc>
			<lastmod>2025-01-24T09:02:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/ransacked-over-security-flaws-found.html</loc>
			<lastmod>2025-01-24T09:00:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/a-new-wave-of-ransomware.html</loc>
			<lastmod>2025-01-24T08:57:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/24/north-korean-fake-it-workers.html</loc>
			<lastmod>2025-01-24T08:56:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/misinformation-is-no-global-risk.html</loc>
			<lastmod>2025-01-23T22:11:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/data-breach-hitting-powerschool-looks.html</loc>
			<lastmod>2025-01-23T22:10:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/hackers-imitate-kremlinlinked-group-to.html</loc>
			<lastmod>2025-01-23T22:09:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/lumma-stealer-fake-captchas-new.html</loc>
			<lastmod>2025-01-23T22:09:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/hellcat-and-morpheus-two-brands.html</loc>
			<lastmod>2025-01-23T22:09:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/pandoras-box-vulnerabilities-found-in.html</loc>
			<lastmod>2025-01-23T22:09:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/the-jmagic-show-magic-packets.html</loc>
			<lastmod>2025-01-23T22:08:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/subaru-security-flaws-exposed-its.html</loc>
			<lastmod>2025-01-23T22:08:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/fortigate-config-leaks-victims-email.html</loc>
			<lastmod>2025-01-23T22:07:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/sonicwall-urges-immediate-patch-for.html</loc>
			<lastmod>2025-01-23T22:07:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/researchers-say-new-attack-could.html</loc>
			<lastmod>2025-01-23T22:07:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/will-see-a-rise-of.html</loc>
			<lastmod>2025-01-23T09:25:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/targeted-supply-chain-attack-against.html</loc>
			<lastmod>2025-01-23T09:24:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/092355.html</loc>
			<lastmod>2025-01-23T09:23:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/hackers-exploit-zeroday-in-cnpilot.html</loc>
			<lastmod>2025-01-23T09:23:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/oracle-releases-january-patch-to.html</loc>
			<lastmod>2025-01-23T09:23:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/cisco-warns-of-denial-of.html</loc>
			<lastmod>2025-01-23T09:23:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/sonicwall-cve-ssl-vpn-session.html</loc>
			<lastmod>2025-01-23T09:22:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/threat-actors-chained-vulnerabilities-in.html</loc>
			<lastmod>2025-01-23T09:22:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/plushdaemon-compromises-supply-chain-of.html</loc>
			<lastmod>2025-01-23T09:21:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/from-qualitative-to-quantifiable-transforming.html</loc>
			<lastmod>2025-01-23T09:20:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/enisa-embedding-resilience-in-critical.html</loc>
			<lastmod>2025-01-23T09:20:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/iran-and-russia-deepen-cyber.html</loc>
			<lastmod>2025-01-23T09:20:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/23/tr-unused-domain-names-and.html</loc>
			<lastmod>2025-01-23T09:19:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/this-corporate-data-breach-lasted.html</loc>
			<lastmod>2025-01-22T18:31:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/ransomware-groups-abuse-microsoft-services.html</loc>
			<lastmod>2025-01-22T17:15:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/us-experiences-of-global-utilities.html</loc>
			<lastmod>2025-01-22T12:41:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/ftc-finalizes-coppa-rule-amendments.html</loc>
			<lastmod>2025-01-22T12:40:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/medical-device-company-tells-hospitals.html</loc>
			<lastmod>2025-01-22T12:40:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/mastercard-dns-error-went-unnoticed.html</loc>
			<lastmod>2025-01-22T12:39:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/microsoft-subject-to-email-bombing.html</loc>
			<lastmod>2025-01-22T10:15:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/oracle-quarterly-critical-patches-issued.html</loc>
			<lastmod>2025-01-22T10:15:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/redline-vidar-and-raccoon-malware.html</loc>
			<lastmod>2025-01-22T10:14:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/russian-ransomware-hackers-increasingly-posing.html</loc>
			<lastmod>2025-01-22T10:13:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/of-privacy-professionals-cite-lack.html</loc>
			<lastmod>2025-01-22T10:12:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/kaspersky-finds-us-cybersecurity-budgets.html</loc>
			<lastmod>2025-01-22T10:12:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/cloudflare-issue-can-leak-chat.html</loc>
			<lastmod>2025-01-22T10:11:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-22T10:10:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/recordbreaking-tbps-ddos-attack-and.html</loc>
			<lastmod>2025-01-22T10:10:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/the-fall-and-rise-of.html</loc>
			<lastmod>2025-01-22T10:09:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-01-22T10:08:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/medusa-ransomware-what-you-need.html</loc>
			<lastmod>2025-01-22T10:08:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/chatgpt-api-flaws-could-allow.html</loc>
			<lastmod>2025-01-22T10:07:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/multiple-vulnerabilities-in-amazon-web.html</loc>
			<lastmod>2025-01-22T09:29:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/atlassians-bitbucket-cloud-went-down.html</loc>
			<lastmod>2025-01-22T09:28:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/092752.html</loc>
			<lastmod>2025-01-22T09:27:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/certua-warns-of-cyber-scams.html</loc>
			<lastmod>2025-01-22T09:27:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/ai-tool-geospy-analyzes-images.html</loc>
			<lastmod>2025-01-22T09:27:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/why-maintaining-data-cleanliness-is.html</loc>
			<lastmod>2025-01-22T09:26:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/zip-fixes-bug-that-bypasses.html</loc>
			<lastmod>2025-01-22T09:26:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/russian-telecom-giant-rostelecom-investigates.html</loc>
			<lastmod>2025-01-22T09:26:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/092552.html</loc>
			<lastmod>2025-01-22T09:25:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/patch-procrastination-leaves-fortinet-firewalls.html</loc>
			<lastmod>2025-01-22T09:25:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/mass-campaign-of-murdoc-botnet.html</loc>
			<lastmod>2025-01-22T09:25:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/22/indian-strategic-studies-cias-chatbot.html</loc>
			<lastmod>2025-01-22T06:55:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/netflix-raises-prices-including-first.html</loc>
			<lastmod>2025-01-21T22:02:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/president-trump-scraps-bidens-ai.html</loc>
			<lastmod>2025-01-21T07:29:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/fortinets-state-of-cloud-security.html</loc>
			<lastmod>2025-01-21T07:28:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/sophos-mdr-tracks-two-ransomware.html</loc>
			<lastmod>2025-01-21T07:27:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/medusa-ransomware-what-you-need.html</loc>
			<lastmod>2025-01-21T07:26:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/pngplug-loader-delivers-valleyrat-malware.html</loc>
			<lastmod>2025-01-21T07:25:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/fleet-opensource-platform-for-it.html</loc>
			<lastmod>2025-01-21T07:24:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/cybersecurity-jobs-available-right-now.html</loc>
			<lastmod>2025-01-21T07:23:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/ciso-guide-to-password-security.html</loc>
			<lastmod>2025-01-21T07:22:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/hackers-deploy-malicious-npm-packages.html</loc>
			<lastmod>2025-01-21T07:19:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/how-much-does-your-electric.html</loc>
			<lastmod>2025-01-21T07:19:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/cyber-security-challenges-emerge-from.html</loc>
			<lastmod>2025-01-21T07:18:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/hpe-investigates-breach-as-hacker.html</loc>
			<lastmod>2025-01-21T07:18:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/ukraine-restores-state-registers-after.html</loc>
			<lastmod>2025-01-21T07:17:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/21/donot-team-linked-to-new.html</loc>
			<lastmod>2025-01-21T07:17:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/philippines-arrests-chinese-national-suspected.html</loc>
			<lastmod>2025-01-20T19:03:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/belsen-group-leaks-fortigate-firewall.html</loc>
			<lastmod>2025-01-20T19:02:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/unsecured-tunneling-protocols-expose-million.html</loc>
			<lastmod>2025-01-20T19:00:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/handala-threat-actor-group-key.html</loc>
			<lastmod>2025-01-20T09:28:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/cyber-threats-are-battlefield-for.html</loc>
			<lastmod>2025-01-20T07:34:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/new-iot-botnet-launching-largescale.html</loc>
			<lastmod>2025-01-20T07:33:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/windows-common-log-file-system.html</loc>
			<lastmod>2025-01-20T07:32:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/researchers-identify-principles-to-reduce.html</loc>
			<lastmod>2025-01-20T07:31:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/poc-exploit-released-for-qnap.html</loc>
			<lastmod>2025-01-20T07:30:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/new-android-malware-mimics-chat.html</loc>
			<lastmod>2025-01-20T07:29:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/cyber-attack-cost-synnovis-estimated.html</loc>
			<lastmod>2025-01-20T07:28:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/why-social-engineering-is-still.html</loc>
			<lastmod>2025-01-20T07:27:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/philippines-fortifies-cyber-defense-partnering.html</loc>
			<lastmod>2025-01-20T07:26:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/us-nordicbaltic-allies-focus-on.html</loc>
			<lastmod>2025-01-20T07:24:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/tougher-enforcement-measures-on-cyber.html</loc>
			<lastmod>2025-01-20T07:23:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/microsoft-just-renamed-office-on.html</loc>
			<lastmod>2025-01-20T07:20:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/aws-pledges-to-spend-b.html</loc>
			<lastmod>2025-01-20T07:19:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/harry-potter-publisher-breached-millions.html</loc>
			<lastmod>2025-01-20T07:18:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/most-common-fourdigit-pin-numbers.html</loc>
			<lastmod>2025-01-20T07:09:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/how-star-blizzard-exploits-whatsapp.html</loc>
			<lastmod>2025-01-20T07:07:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/hpe-investigating-breach-claims-after.html</loc>
			<lastmod>2025-01-20T07:06:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/certua-warns-against-security-audit.html</loc>
			<lastmod>2025-01-20T07:05:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/otelier-data-breach-triggers-serious.html</loc>
			<lastmod>2025-01-20T07:04:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/how-organizations-can-secure-their.html</loc>
			<lastmod>2025-01-20T07:03:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/20/one-in-ten-genai-prompts.html</loc>
			<lastmod>2025-01-20T07:02:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/19/tiktok-ban-takes-hold-data.html</loc>
			<lastmod>2025-01-19T11:31:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/tiktok-has-officially-shut-down.html</loc>
			<lastmod>2025-01-18T23:42:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/amazon-is-changing-how-it.html</loc>
			<lastmod>2025-01-18T20:39:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/small-threatintel-digest-of-interesting.html</loc>
			<lastmod>2025-01-18T18:39:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/one-of-the-largest-data.html</loc>
			<lastmod>2025-01-18T12:16:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/iot-security-explainer-series-atlantic.html</loc>
			<lastmod>2025-01-18T11:06:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/types-of-cyber-attacks-cyber.html</loc>
			<lastmod>2025-01-18T11:01:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/check-point-softwares-security-report.html</loc>
			<lastmod>2025-01-18T10:59:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/un-aviation-agency-icao-suffers.html</loc>
			<lastmod>2025-01-18T10:58:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/hhsc-notifies-public-regarding-privacy.html</loc>
			<lastmod>2025-01-18T10:57:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/delawares-multistate-tax-inc-files.html</loc>
			<lastmod>2025-01-18T10:56:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/internal-state-data-breach-exposes.html</loc>
			<lastmod>2025-01-18T10:56:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/change-healthcare-ransomware-attack-data.html</loc>
			<lastmod>2025-01-18T10:55:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/otelier-data-breach-exposes-info.html</loc>
			<lastmod>2025-01-18T10:53:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/microsofts-latest-onprem-azure-is.html</loc>
			<lastmod>2025-01-18T10:52:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/yubico-issues-security-advisory-as.html</loc>
			<lastmod>2025-01-18T10:51:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/google-begins-requiring-javascript-for.html</loc>
			<lastmod>2025-01-18T10:49:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/tiktok-says-it-will-go.html</loc>
			<lastmod>2025-01-18T10:46:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/recall-thousands-of-printers-sold.html</loc>
			<lastmod>2025-01-18T10:25:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/ibm-to-buy-oracle-consultancy.html</loc>
			<lastmod>2025-01-18T10:23:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/warning-as-paypal-cyberattacks-continuewhat.html</loc>
			<lastmod>2025-01-18T10:19:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/bc-lawsuit-accuses-telus-of.html</loc>
			<lastmod>2025-01-18T10:18:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/the-dark-web-economy-a.html</loc>
			<lastmod>2025-01-18T10:09:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/18/us-hits-back-against-chinas.html</loc>
			<lastmod>2025-01-18T10:07:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/employees-enter-sensitive-data-into.html</loc>
			<lastmod>2025-01-17T18:54:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/new-york-proposes-doing-background.html</loc>
			<lastmod>2025-01-17T13:37:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/jailing-negligent-management-boards-eus.html</loc>
			<lastmod>2025-01-17T13:35:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/in-other-news-lawsuits-and.html</loc>
			<lastmod>2025-01-17T13:33:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/tiktok-ban-switching-to-rednote.html</loc>
			<lastmod>2025-01-17T13:33:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/wolf-haldenstein-data-breach-impacts.html</loc>
			<lastmod>2025-01-17T13:32:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/whatsapp-spear-phishing-campaign-uses.html</loc>
			<lastmod>2025-01-17T13:31:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/opting-out-of-gmails-gemini.html</loc>
			<lastmod>2025-01-17T13:30:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/critical-flaws-in-wgshpt-switches.html</loc>
			<lastmod>2025-01-17T13:30:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/the-good-the-bad-and.html</loc>
			<lastmod>2025-01-17T13:29:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/att-hack-exposes-agents-call.html</loc>
			<lastmod>2025-01-17T12:37:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/clop-ransomware-gang-names-dozens.html</loc>
			<lastmod>2025-01-17T12:36:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/russian-apt-phishes-kazakh-govt.html</loc>
			<lastmod>2025-01-17T08:35:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/european-privacy-group-sues-tiktok.html</loc>
			<lastmod>2025-01-17T08:34:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/bitwarden-unveils-native-mobile-applications.html</loc>
			<lastmod>2025-01-17T08:33:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/state-of-network-threat-detection.html</loc>
			<lastmod>2025-01-17T08:32:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/new-sneaky-fa-phishing-kit.html</loc>
			<lastmod>2025-01-17T08:30:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/us-announces-sanctions-against-north.html</loc>
			<lastmod>2025-01-17T08:29:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/dora-arrives-heres-what-you.html</loc>
			<lastmod>2025-01-17T08:29:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/google-releases-open-source-library.html</loc>
			<lastmod>2025-01-17T08:28:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/poor-patching-regime-is-opening.html</loc>
			<lastmod>2025-01-17T08:27:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/abandoned-online-domains-unlock-services.html</loc>
			<lastmod>2025-01-17T08:26:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/threat-brief-cve-and-cve.html</loc>
			<lastmod>2025-01-17T08:25:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/17/biden-administration-will-leave-it.html</loc>
			<lastmod>2025-01-17T08:23:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/221145.html</loc>
			<lastmod>2025-01-16T22:11:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/new-star-blizzard-spearphishing-campaign.html</loc>
			<lastmod>2025-01-16T22:11:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/doubletap-campaign-russianexus-apt-possibly.html</loc>
			<lastmod>2025-01-16T22:10:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/microsoft-patches-windows-to-eliminate.html</loc>
			<lastmod>2025-01-16T22:10:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/governments-call-for-spyware-regulations.html</loc>
			<lastmod>2025-01-16T22:10:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/pythonbased-malware-powers-ransomhub-ransomware.html</loc>
			<lastmod>2025-01-16T22:09:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/cisa-shares-guidance-for-microsoft.html</loc>
			<lastmod>2025-01-16T22:09:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/the-current-state-of-ransomware.html</loc>
			<lastmod>2025-01-16T22:09:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/nb-liquor-cyber-security-woes.html</loc>
			<lastmod>2025-01-16T12:19:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/gootloader-inside-out-sophos-news.html</loc>
			<lastmod>2025-01-16T12:17:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/russian-cyberspies-caught-spearphishing-with.html</loc>
			<lastmod>2025-01-16T12:16:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/clop-ransomware-exploits-cleo-file.html</loc>
			<lastmod>2025-01-16T12:15:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/avery-had-credit-card-skimmer.html</loc>
			<lastmod>2025-01-16T12:15:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/one-active-directory-account-can.html</loc>
			<lastmod>2025-01-16T12:14:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/incorporating-ai-agents-into-soc.html</loc>
			<lastmod>2025-01-16T12:13:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/millions-of-internet-hosts-vulnerable.html</loc>
			<lastmod>2025-01-16T12:12:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/the-mystery-of-the-m.html</loc>
			<lastmod>2025-01-16T11:36:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/final-biden-cybersecurity-eo-uses.html</loc>
			<lastmod>2025-01-16T08:42:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/impacted-by-data-breach-at.html</loc>
			<lastmod>2025-01-16T08:41:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/pumakit-a-sophisticated-linux-rootkit.html</loc>
			<lastmod>2025-01-16T08:41:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/cyber-insights-identities-securityweek-in.html</loc>
			<lastmod>2025-01-16T08:40:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/ftc-orders-godaddy-to-fix.html</loc>
			<lastmod>2025-01-16T08:39:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/researchers-find-exploit-allowing-ntlmv.html</loc>
			<lastmod>2025-01-16T08:38:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/hackers-hide-malware-in-images.html</loc>
			<lastmod>2025-01-16T08:37:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/configuration-files-for-fortinet-firewalls.html</loc>
			<lastmod>2025-01-16T08:37:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/us-healthcare-data-breaches-incidents.html</loc>
			<lastmod>2025-01-16T08:36:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/mikrotik-botnet-relies-on-dns.html</loc>
			<lastmod>2025-01-16T08:35:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/new-uefi-secure-boot-bypass.html</loc>
			<lastmod>2025-01-16T08:35:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/plugx-malware-deleted-from-thousands.html</loc>
			<lastmod>2025-01-16T08:34:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/scammers-exploit-california-wildfires-posing.html</loc>
			<lastmod>2025-01-16T08:33:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/researcher-uncovers-critical-flaws-in.html</loc>
			<lastmod>2025-01-16T08:32:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/siem-buyers-guide-top-security.html</loc>
			<lastmod>2025-01-16T08:32:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/oreilly-tech-trends-ai-skills.html</loc>
			<lastmod>2025-01-16T08:31:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/north-korea-targeting-software-developers.html</loc>
			<lastmod>2025-01-16T08:30:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/doj-fbi-dismantle-malware-used.html</loc>
			<lastmod>2025-01-16T08:30:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/ransomhub-affiliates-exploit-aigenerated-python.html</loc>
			<lastmod>2025-01-16T08:29:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/uk-government-seeking-to-turbocharge.html</loc>
			<lastmod>2025-01-16T08:29:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/threat-actor-leaked-config-files.html</loc>
			<lastmod>2025-01-16T08:28:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/cisa-warns-second-beyondtrust-vulnerability.html</loc>
			<lastmod>2025-01-16T08:27:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/16/gsocket-gambling-scavenger-how-hackers.html</loc>
			<lastmod>2025-01-16T08:26:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/15/replit-ceo-on-ai-breakthroughs.html</loc>
			<lastmod>2025-01-15T17:12:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/microsoft-releases-january-security-updates.html</loc>
			<lastmod>2025-01-14T17:49:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/meta-announces-cuts-targeting-low.html</loc>
			<lastmod>2025-01-14T14:48:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/snyk-says-malicious-npm-packages.html</loc>
			<lastmod>2025-01-14T11:54:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/fbi-deletes-more-than-plugx.html</loc>
			<lastmod>2025-01-14T11:53:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/beware-cybersecurity-tech-thats-past.html</loc>
			<lastmod>2025-01-14T11:53:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/sap-security-advisory-january-monthly.html</loc>
			<lastmod>2025-01-14T11:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/sap-patches-critical-vulnerabilities-in.html</loc>
			<lastmod>2025-01-14T11:51:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/todyl-ids-foreign-threat-actors.html</loc>
			<lastmod>2025-01-14T08:49:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/verizon-provides-update-on-salt.html</loc>
			<lastmod>2025-01-14T08:48:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/us-japan-south-korea-warn.html</loc>
			<lastmod>2025-01-14T08:46:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/location-tracking-company-unacast-tells.html</loc>
			<lastmod>2025-01-14T08:45:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/nhs-ransomware-hack-caused-patient.html</loc>
			<lastmod>2025-01-14T08:45:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/apple-iphone-usbc-hackedwhat-users.html</loc>
			<lastmod>2025-01-14T08:44:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/apple-security-researcher-says-latest.html</loc>
			<lastmod>2025-01-14T08:43:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/scam-city-is-growing-how.html</loc>
			<lastmod>2025-01-14T08:41:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/robinhood-to-pay-million-sec.html</loc>
			<lastmod>2025-01-14T08:39:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/a-breach-of-gravy-analytics.html</loc>
			<lastmod>2025-01-14T08:39:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/the-evolution-of-ransomware-from.html</loc>
			<lastmod>2025-01-14T08:32:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/insurance-company-accused-of-using.html</loc>
			<lastmod>2025-01-14T08:28:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/an-overview-of-the-nominet.html</loc>
			<lastmod>2025-01-14T08:27:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/new-codefinger-ransomware-exploits-aws.html</loc>
			<lastmod>2025-01-14T08:27:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/cisa-warns-of-second-beyondtrust.html</loc>
			<lastmod>2025-01-14T08:26:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/one-step-ahead-in-cyber.html</loc>
			<lastmod>2025-01-14T08:26:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/082506.html</loc>
			<lastmod>2025-01-14T08:25:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/malicious-kong-ingress-controller-image.html</loc>
			<lastmod>2025-01-14T08:24:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/illicit-huione-telegram-market-surpasses.html</loc>
			<lastmod>2025-01-14T08:23:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/zeroday-vulnerability-suspected-in-attacks.html</loc>
			<lastmod>2025-01-14T08:22:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/russianlinked-hackers-target-kazakhstan-in.html</loc>
			<lastmod>2025-01-14T08:22:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/gen-ai-strategies-put-cisos.html</loc>
			<lastmod>2025-01-14T08:21:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/intelbroker-unmasked-kelas-indepth-analysis.html</loc>
			<lastmod>2025-01-14T08:21:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/ai-insights-threat-detection-and.html</loc>
			<lastmod>2025-01-14T08:19:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/14/infostealer-infections-lead-to-telefonica.html</loc>
			<lastmod>2025-01-14T08:18:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/hotel-chain-ditches-google-search.html</loc>
			<lastmod>2025-01-13T18:59:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/new-amazon-ransomware-attackrecovery-impossible.html</loc>
			<lastmod>2025-01-13T17:08:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/xais-grok-ios-app-has.html</loc>
			<lastmod>2025-01-13T15:23:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/a-comprehensive-analysis-of-global.html</loc>
			<lastmod>2025-01-13T15:16:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/the-recent-openai-web-crawler.html</loc>
			<lastmod>2025-01-13T15:12:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/texas-sues-allstate-alleging-it.html</loc>
			<lastmod>2025-01-13T13:39:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/cyberattackers-hide-infostealers-in-youtube.html</loc>
			<lastmod>2025-01-13T13:38:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/attackers-are-encrypting-aws-s.html</loc>
			<lastmod>2025-01-13T13:38:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/telefonica-breach-exposes-jira-tickets.html</loc>
			<lastmod>2025-01-13T13:37:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/control-systems-cisa-ics-security.html</loc>
			<lastmod>2025-01-13T13:36:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-13T13:36:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/the-new-rules-for-ai.html</loc>
			<lastmod>2025-01-13T13:36:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-13T13:35:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-13T13:35:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/the-shifting-landscape-of-open.html</loc>
			<lastmod>2025-01-13T13:35:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/infostealer-masquerades-as-poc-code.html</loc>
			<lastmod>2025-01-13T13:34:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/eu-law-enforcement-training-agency.html</loc>
			<lastmod>2025-01-13T13:33:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/133227.html</loc>
			<lastmod>2025-01-13T13:32:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/cisa-and-us-and-international.html</loc>
			<lastmod>2025-01-13T13:31:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/nb-liquor-stores-open-for.html</loc>
			<lastmod>2025-01-13T07:29:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/telcos-removing-huawei-equipment-left.html</loc>
			<lastmod>2025-01-13T07:15:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/global-cybersecurity-outlook-navigating-through.html</loc>
			<lastmod>2025-01-13T07:14:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/asmlbacked-dutch-university-suspends-classes.html</loc>
			<lastmod>2025-01-13T07:13:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/microsoft-rules-out-layoffs-in.html</loc>
			<lastmod>2025-01-13T06:58:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/phishing-texts-trick-apple-imessage.html</loc>
			<lastmod>2025-01-13T06:57:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/white-house-moves-to-restrict.html</loc>
			<lastmod>2025-01-13T06:46:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/what-is-vulnerability-management-tripwire.html</loc>
			<lastmod>2025-01-13T06:45:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/the-billion-wakeup-call-cybersecurity.html</loc>
			<lastmod>2025-01-13T06:44:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/dux-human-health-breach-us.html</loc>
			<lastmod>2025-01-13T06:44:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/a-week-in-security-january.html</loc>
			<lastmod>2025-01-13T06:43:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/wordpress-skimmers-evade-detection-by.html</loc>
			<lastmod>2025-01-13T06:42:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/13/chainsaw-opensource-tool-for-hunting.html</loc>
			<lastmod>2025-01-13T06:41:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/12/noname-targets-italy-again-after.html</loc>
			<lastmod>2025-01-12T20:18:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/11/fake-poc-exploit-targets-cybersecurity.html</loc>
			<lastmod>2025-01-11T10:26:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/11/muddling-meerkat-linked-to-domain.html</loc>
			<lastmod>2025-01-11T10:25:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/11/microsoft-sues-hacking-group-exploiting.html</loc>
			<lastmod>2025-01-11T10:24:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/telefnica-confirms-internal-ticketing-system.html</loc>
			<lastmod>2025-01-10T21:59:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/powerschool-data-breach-what-to.html</loc>
			<lastmod>2025-01-10T21:57:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/powerschools-breach-fallacy-paying-criminals.html</loc>
			<lastmod>2025-01-10T21:55:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/report-chinese-hackers-breached-cfius.html</loc>
			<lastmod>2025-01-10T21:54:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/russia-carves-out-commercial-surveillance.html</loc>
			<lastmod>2025-01-10T21:52:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/slovakias-land-registry-hit-by.html</loc>
			<lastmod>2025-01-10T21:52:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/apps-that-are-spying-on.html</loc>
			<lastmod>2025-01-10T21:50:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/baymark-health-services-sends-breach.html</loc>
			<lastmod>2025-01-10T21:50:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/juniper-networks-security-advisory-av.html</loc>
			<lastmod>2025-01-10T21:49:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/the-good-the-bad-and.html</loc>
			<lastmod>2025-01-10T21:49:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/in-other-news-bank-of.html</loc>
			<lastmod>2025-01-10T21:48:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/chinese-apt-group-is-ransacking.html</loc>
			<lastmod>2025-01-10T21:47:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/harnessing-ai-for-proactive-threat.html</loc>
			<lastmod>2025-01-10T09:25:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/green-bay-packers-online-pro.html</loc>
			<lastmod>2025-01-10T09:25:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/us-treasury-hack-linked-to.html</loc>
			<lastmod>2025-01-10T09:24:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/uk-internet-domain-registry-nominet.html</loc>
			<lastmod>2025-01-10T09:24:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/major-addiction-treatment-firm-baymark.html</loc>
			<lastmod>2025-01-10T07:39:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/funksec-alleged-top-ransomware-group.html</loc>
			<lastmod>2025-01-10T07:38:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/major-cyber-attacks-in-review.html</loc>
			<lastmod>2025-01-10T07:37:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/google-project-zero-researcher-uncovers.html</loc>
			<lastmod>2025-01-10T07:36:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/reddelta-deploys-plugx-malware-to.html</loc>
			<lastmod>2025-01-10T07:35:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/crowdstrike-warns-of-phishing-scam.html</loc>
			<lastmod>2025-01-10T07:34:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/january-patch-tuesday-forecast-changes.html</loc>
			<lastmod>2025-01-10T07:34:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/new-banshee-malware-targeting-macos.html</loc>
			<lastmod>2025-01-10T07:33:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/huge-changes-predicted-for-the.html</loc>
			<lastmod>2025-01-10T07:32:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/sec-rule-confusion-continues-to.html</loc>
			<lastmod>2025-01-10T07:31:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/10/the-sbi-fake-banking-app.html</loc>
			<lastmod>2025-01-10T07:30:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/people-think-ai-images-of.html</loc>
			<lastmod>2025-01-09T14:39:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/new-mirai-botnet-targets-industrial.html</loc>
			<lastmod>2025-01-09T14:38:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/space-bears-ransomware-what-you.html</loc>
			<lastmod>2025-01-09T14:37:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/groupgreeting-ecard-site-attacked-in.html</loc>
			<lastmod>2025-01-09T14:35:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/new-banshee-stealer-variant-bypasses.html</loc>
			<lastmod>2025-01-09T14:34:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/medical-billing-firm-medusind-says.html</loc>
			<lastmod>2025-01-09T14:34:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/mirrorface-leverages-anel-and-noopdoor.html</loc>
			<lastmod>2025-01-09T14:32:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/discovering-splinter-a-first-look.html</loc>
			<lastmod>2025-01-09T07:35:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/exploitation-of-new-ivanti-vpn.html</loc>
			<lastmod>2025-01-09T07:33:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/zeroday-vulnerability-in-sonicwall-ssl.html</loc>
			<lastmod>2025-01-09T07:32:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/th-january-threat-intelligence-report.html</loc>
			<lastmod>2025-01-09T07:30:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/lessons-from-a-year-of.html</loc>
			<lastmod>2025-01-09T06:30:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/law-firm-kotz-sangster-wysocki.html</loc>
			<lastmod>2025-01-09T06:29:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/excelsior-orthopaedics-files-notice-of.html</loc>
			<lastmod>2025-01-09T06:28:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/school-districts-impacted-by-powerschool.html</loc>
			<lastmod>2025-01-09T06:28:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/ott-cone-redpath-provides-notice.html</loc>
			<lastmod>2025-01-09T06:28:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/medusind-inc-data-breach-exposes.html</loc>
			<lastmod>2025-01-09T06:28:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/pediatric-home-service-files-official.html</loc>
			<lastmod>2025-01-09T06:27:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/cyber-breach-response-best-practices.html</loc>
			<lastmod>2025-01-09T06:27:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/major-data-breach-hits-nc.html</loc>
			<lastmod>2025-01-09T06:25:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/powerschool-discloses-breach-affecting-hosted.html</loc>
			<lastmod>2025-01-09T06:23:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/united-nations-aviation-agency-hacked.html</loc>
			<lastmod>2025-01-09T06:21:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/hong-kong-the-first-draft.html</loc>
			<lastmod>2025-01-09T06:20:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/soc-scalability-how-ai-supports.html</loc>
			<lastmod>2025-01-09T06:19:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/its-time-businesses-address-the.html</loc>
			<lastmod>2025-01-09T06:18:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/soar-buyers-guide-security-orchestration.html</loc>
			<lastmod>2025-01-09T06:17:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/vipre-security-shares-cybersecurity-trends.html</loc>
			<lastmod>2025-01-09T06:16:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/cybersecurity-in-global-conflict-grownup.html</loc>
			<lastmod>2025-01-09T06:13:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/061306.html</loc>
			<lastmod>2025-01-09T06:13:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/top-malware-threats-to-prepare.html</loc>
			<lastmod>2025-01-09T06:12:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/09/india-readies-overhauled-national-data.html</loc>
			<lastmod>2025-01-09T06:12:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/google-starts-tracking-all-your.html</loc>
			<lastmod>2025-01-08T20:08:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/microsoft-plans-job-cuts-and.html</loc>
			<lastmod>2025-01-08T20:05:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/highpaying-security-career-choosing-a.html</loc>
			<lastmod>2025-01-08T20:00:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/european-court-fines-european-commission.html</loc>
			<lastmod>2025-01-08T19:59:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/sonicwall-warns-of-an-exploitable.html</loc>
			<lastmod>2025-01-08T19:58:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/green-bay-packers-fans-sacked.html</loc>
			<lastmod>2025-01-08T19:56:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/new-research-enhancing-botnet-detection.html</loc>
			<lastmod>2025-01-08T19:55:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/palo-alto-networks-security-advisory.html</loc>
			<lastmod>2025-01-08T19:54:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/ivanti-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-08T19:54:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/russian-internet-provider-confirms-its.html</loc>
			<lastmod>2025-01-08T19:53:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/abandoned-backdoors-how-malicious-infrastructure.html</loc>
			<lastmod>2025-01-08T13:09:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/sonicwall-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-08T13:09:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/japan-and-philippines-face-cyber.html</loc>
			<lastmod>2025-01-08T13:08:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/japan-links-chinese-hacker-mirrorface.html</loc>
			<lastmod>2025-01-08T13:08:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/the-us-cyber-trust-mark.html</loc>
			<lastmod>2025-01-08T13:06:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/new-paypal-phishing-scam-exploits.html</loc>
			<lastmod>2025-01-08T13:05:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/end-of-the-year-report.html</loc>
			<lastmod>2025-01-08T13:04:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/walker-co-schools-alerting-parents.html</loc>
			<lastmod>2025-01-08T09:04:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/northeast-rehabilitation-hospital-network-data.html</loc>
			<lastmod>2025-01-08T09:03:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/openvpn-connect-vulnerability-let-attackers.html</loc>
			<lastmod>2025-01-08T08:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/google-warns-of-legit-vpn.html</loc>
			<lastmod>2025-01-08T08:45:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/thousands-impacted-by-casio-data.html</loc>
			<lastmod>2025-01-08T08:37:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/scammers-impersonate-authorities-to-swipe.html</loc>
			<lastmod>2025-01-08T07:55:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/insider-threat-tackling-the-complex.html</loc>
			<lastmod>2025-01-08T07:54:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/gravy-analytics-breach-puts-millions.html</loc>
			<lastmod>2025-01-08T07:53:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/millions-of-email-servers-exposed.html</loc>
			<lastmod>2025-01-08T07:52:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/075154.html</loc>
			<lastmod>2025-01-08T07:51:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/fcc-launches-cyber-trust-mark.html</loc>
			<lastmod>2025-01-08T07:51:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/the-biggest-data-breach-fines.html</loc>
			<lastmod>2025-01-08T07:50:24-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/ransomware-targeting-infrastructure-hits-telecom.html</loc>
			<lastmod>2025-01-08T07:49:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/08/statefunded-actors-are-driving-the.html</loc>
			<lastmod>2025-01-08T07:48:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/meta-opensources-byte-latent-transformer.html</loc>
			<lastmod>2025-01-07T20:01:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/microsoft-declares-the-year-of.html</loc>
			<lastmod>2025-01-07T19:55:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/the-unlicensed-onedrive-fun-ends.html</loc>
			<lastmod>2025-01-07T19:50:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/from-m-in-ransom-to.html</loc>
			<lastmod>2025-01-07T19:47:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/cyber-attack-on-kingston-police.html</loc>
			<lastmod>2025-01-07T19:39:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/threat-actors-breached-the-argentinas.html</loc>
			<lastmod>2025-01-07T14:59:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/hackers-claim-massive-breach-of.html</loc>
			<lastmod>2025-01-07T14:58:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/the-deepfake-threat-just-got.html</loc>
			<lastmod>2025-01-07T14:56:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/two-ransomware-groups-claimed-they.html</loc>
			<lastmod>2025-01-07T11:55:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/financial-data-leaked-in-city.html</loc>
			<lastmod>2025-01-07T11:54:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/dell-hpe-mediatek-patch-vulnerabilities.html</loc>
			<lastmod>2025-01-07T08:31:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/critical-infrastructure-ransomware-attack-tracker.html</loc>
			<lastmod>2025-01-07T07:59:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/comprehensive-guide-to-ioc-enrichment.html</loc>
			<lastmod>2025-01-07T07:58:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/us-adds-tencent-to-the.html</loc>
			<lastmod>2025-01-07T07:57:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/gen-ai-is-transforming-the.html</loc>
			<lastmod>2025-01-07T07:56:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/us-military-allocated-about-billion.html</loc>
			<lastmod>2025-01-07T07:55:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/icao-investigates-data-breach-as.html</loc>
			<lastmod>2025-01-07T07:04:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/cyberbro-opensource-tool-extracts-iocs.html</loc>
			<lastmod>2025-01-07T07:03:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/moxa-devices-vulnerable-to-cyberattacks.html</loc>
			<lastmod>2025-01-07T07:03:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/chinas-salt-typhoon-adds-to.html</loc>
			<lastmod>2025-01-07T07:02:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-07T07:01:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/hpe-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-07T07:01:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/telegram-hands-us-authorities-data.html</loc>
			<lastmod>2025-01-07T07:01:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/dell-security-advisory-av-canadian.html</loc>
			<lastmod>2025-01-07T07:00:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/hackers-reportedly-compromise-argentinas-airport.html</loc>
			<lastmod>2025-01-07T07:00:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/ransomware-attacks-on-germany-fraunhofer.html</loc>
			<lastmod>2025-01-07T06:58:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/england-residents-asked-to-reboot.html</loc>
			<lastmod>2025-01-07T06:58:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/violent-hackers-are-using-uhaul.html</loc>
			<lastmod>2025-01-07T06:57:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/nessus-scanner-agents-went-offline.html</loc>
			<lastmod>2025-01-07T06:56:25-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/out-with-the-old-in.html</loc>
			<lastmod>2025-01-07T06:55:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2025-01-07T06:54:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/cybersecurity-ma-roundup-deals-announced.html</loc>
			<lastmod>2025-01-07T06:54:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/top-incident-response-certifications-to.html</loc>
			<lastmod>2025-01-07T06:53:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/dark-web-profile-kairos-extortion.html</loc>
			<lastmod>2025-01-07T06:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/07/tenable-disables-nessus-agents-over.html</loc>
			<lastmod>2025-01-07T06:51:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/06/gs-retail-announced-a-data.html</loc>
			<lastmod>2025-01-06T11:22:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/new-york-citys-new-congestion.html</loc>
			<lastmod>2025-01-05T21:45:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/microsoft-to-spend-billion-on.html</loc>
			<lastmod>2025-01-05T21:44:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/hospitals-in-china-overwhelmed-by.html</loc>
			<lastmod>2025-01-05T21:41:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/critical-rising-risk-attack-alertchange.html</loc>
			<lastmod>2025-01-05T21:36:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/ibm-canada-has-opened-its.html</loc>
			<lastmod>2025-01-05T21:31:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/scientists-built-a-proton-battery.html</loc>
			<lastmod>2025-01-05T11:44:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/05/longtime-tenable-ceo-netwitness-head.html</loc>
			<lastmod>2025-01-05T10:53:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/the-us-surgeon-general-has.html</loc>
			<lastmod>2025-01-04T22:23:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/japanese-businesses-hit-by-a.html</loc>
			<lastmod>2025-01-04T21:16:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/researchers-uncover-nuclei-vulnerability-enabling.html</loc>
			<lastmod>2025-01-04T21:15:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/playfulghost-delivered-via-phishing-and.html</loc>
			<lastmod>2025-01-04T21:15:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/firescam-infostealing-malware-supports-spyware.html</loc>
			<lastmod>2025-01-04T21:14:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/04/thousands-of-buggy-beyondtrust-systems.html</loc>
			<lastmod>2025-01-04T21:14:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/no-need-to-hack-when.html</loc>
			<lastmod>2025-01-03T17:21:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/richmond-university-medical-center-data.html</loc>
			<lastmod>2025-01-03T17:13:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/atos-contractor-for-french-military.html</loc>
			<lastmod>2025-01-03T17:12:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/metasploit-annual-wrapup-rapid-blog.html</loc>
			<lastmod>2025-01-03T17:12:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/shredos-is-an-entire-os.html</loc>
			<lastmod>2025-01-03T17:10:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/multipath-tcp-revolutionizing-connectivity-one.html</loc>
			<lastmod>2025-01-03T17:09:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/dark-web-monitoring-tools-and.html</loc>
			<lastmod>2025-01-03T17:09:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/npm-package-disguised-as-an.html</loc>
			<lastmod>2025-01-03T17:08:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/new-york-hospital-says-ransomware.html</loc>
			<lastmod>2025-01-03T17:07:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/around-m-pop-and-imap.html</loc>
			<lastmod>2025-01-03T17:07:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/ldapnightmare-poc-exploit-crashes-lsass.html</loc>
			<lastmod>2025-01-03T17:06:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/critical-deadline-update-old-net.html</loc>
			<lastmod>2025-01-03T17:06:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/apple-accused-of-collecting-user.html</loc>
			<lastmod>2025-01-03T17:05:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/diving-into-azure-lateral-movement.html</loc>
			<lastmod>2025-01-03T17:04:34-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/every-minute-records-are-compromised.html</loc>
			<lastmod>2025-01-03T17:03:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/active-directory-flaw-can-crash.html</loc>
			<lastmod>2025-01-03T17:02:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/un-general-assembly-adopts-cybercrime.html</loc>
			<lastmod>2025-01-03T17:01:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/volkswagen-massive-data-leak-caused.html</loc>
			<lastmod>2025-01-03T17:00:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/fake-zip-exploit-code-traced.html</loc>
			<lastmod>2025-01-03T16:59:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/japans-largest-mobile-carrier-says.html</loc>
			<lastmod>2025-01-03T16:58:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/doubleclickjacking-allows-clickjacking-on-major.html</loc>
			<lastmod>2025-01-03T16:58:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/volkswagen-breach-exposes-data-of.html</loc>
			<lastmod>2025-01-03T16:57:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/03/dozens-of-chrome-extensions-hacked.html</loc>
			<lastmod>2025-01-03T16:56:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/02/lumen-reports-that-it-has.html</loc>
			<lastmod>2025-01-02T13:02:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/02/squarex-researchers-expose-oauth-attack.html</loc>
			<lastmod>2025-01-02T13:01:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/02/kata-containers-opensource-container-runtime.html</loc>
			<lastmod>2025-01-02T13:00:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/02/hacked-on-christmas-dephoto-starts.html</loc>
			<lastmod>2025-01-02T12:30:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/02/chatgpt-calling-and-messaging-chatgpt.html</loc>
			<lastmod>2025-01-02T12:27:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/air-fryer-espionage-raises-data.html</loc>
			<lastmod>2025-01-01T10:57:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/fortiguard-labs-links-new-ec.html</loc>
			<lastmod>2025-01-01T10:56:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/cybersecurity-news-headlines-trending-on.html</loc>
			<lastmod>2025-01-01T10:55:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/finland-identifies-seven-suspects-among.html</loc>
			<lastmod>2025-01-01T10:54:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/airelated-security-trends-to-watch.html</loc>
			<lastmod>2025-01-01T10:53:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/clickfix-campaign-fake-google-meet.html</loc>
			<lastmod>2025-01-01T10:53:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/water-makara-campaign-a-sophisticated.html</loc>
			<lastmod>2025-01-01T10:52:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/dark-web-profile-gamaredon-apt.html</loc>
			<lastmod>2025-01-01T10:51:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/top-ways-hackers-broke-into.html</loc>
			<lastmod>2025-01-01T10:51:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/chinese-apt-exploits-beyondtrust-api.html</loc>
			<lastmod>2025-01-01T10:50:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/chinese-hackers-accessed-us-treasury.html</loc>
			<lastmod>2025-01-01T10:49:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/misconfigured-kubernetes-rbac-in-azure.html</loc>
			<lastmod>2025-01-01T10:48:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/us-army-soldier-arrested-in.html</loc>
			<lastmod>2025-01-01T10:47:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/hottest-cybersecurity-opensource-tools-of.html</loc>
			<lastmod>2025-01-01T10:46:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/new-hipaa-rules-mandate-hour.html</loc>
			<lastmod>2025-01-01T10:46:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2025/01/01/an-x-user-claimed-a.html</loc>
			<lastmod>2025-01-01T10:45:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/30/study-finds-ai-can-guess.html</loc>
			<lastmod>2024-12-30T18:59:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/a-boy-created-aigenerated-porn.html</loc>
			<lastmod>2024-12-28T11:20:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/the-threat-of-sim-swapping.html</loc>
			<lastmod>2024-12-28T11:15:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/us-finalizes-rule-throttling-bulk.html</loc>
			<lastmod>2024-12-28T07:22:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/white-house-clears-hipaa-security.html</loc>
			<lastmod>2024-12-28T07:22:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/attack-surface-threat-intelligence-report.html</loc>
			<lastmod>2024-12-28T07:21:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/blue-yonder-says-november-ransomware.html</loc>
			<lastmod>2024-12-28T07:20:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/us-adds-th-telecom-company.html</loc>
			<lastmod>2024-12-28T07:19:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/north-korean-hackers-deploy-ottercookie.html</loc>
			<lastmod>2024-12-28T07:19:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/prioritizing-patching-a-deep-dive.html</loc>
			<lastmod>2024-12-28T07:18:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/volkswagen-data-breach-of-electric.html</loc>
			<lastmod>2024-12-28T07:17:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/apache-security-advisory-av-canadian.html</loc>
			<lastmod>2024-12-28T07:16:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/palo-alto-networks-security-advisory.html</loc>
			<lastmod>2024-12-28T07:16:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/top-identity-attacks-in-protecting.html</loc>
			<lastmod>2024-12-28T07:15:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/the-best-the-worst-and.html</loc>
			<lastmod>2024-12-28T07:15:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/defining-defying-cybersecurity-staff-burnout.html</loc>
			<lastmod>2024-12-28T07:14:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/in-ai-its-changed-the.html</loc>
			<lastmod>2024-12-28T07:12:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/28/whats-new-in-cloudflare-masque.html</loc>
			<lastmod>2024-12-28T07:12:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/quantum-computing-advances-in-put.html</loc>
			<lastmod>2024-12-27T09:00:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/cloud-atlas-deploys-vbcloud-malware.html</loc>
			<lastmod>2024-12-27T08:57:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/dark-web-profile-storm-void.html</loc>
			<lastmod>2024-12-27T08:57:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/palo-alto-releases-patch-for.html</loc>
			<lastmod>2024-12-27T08:56:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/ficora-and-kaiten-botnets-exploit.html</loc>
			<lastmod>2024-12-27T08:55:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/apache-mina-cve-cvss-flaw.html</loc>
			<lastmod>2024-12-27T08:54:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/the-future-of-data-and.html</loc>
			<lastmod>2024-12-27T08:53:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/27/law-enforcement-agencies-see-ai.html</loc>
			<lastmod>2024-12-27T08:52:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/reflecting-on-humanitys-incredible-pace.html</loc>
			<lastmod>2024-12-26T20:18:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/netflix-is-suing-broadcoms-vmware.html</loc>
			<lastmod>2024-12-26T14:55:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/a-new-mirai-botnet-variant.html</loc>
			<lastmod>2024-12-26T13:12:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/sec-disclosures-up-but-not.html</loc>
			<lastmod>2024-12-26T13:11:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/the-intersection-of-ai-and.html</loc>
			<lastmod>2024-12-26T13:09:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/defense-giant-general-dynamics-says.html</loc>
			<lastmod>2024-12-26T13:09:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/clp-ransomware-group-to-name.html</loc>
			<lastmod>2024-12-26T13:08:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/researchers-uncover-dark-web-operation.html</loc>
			<lastmod>2024-12-26T13:07:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/dark-web-profile-trinity-ransomware.html</loc>
			<lastmod>2024-12-26T13:06:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/ddos-attacks-surge-as-africa.html</loc>
			<lastmod>2024-12-26T13:05:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/cloud-security-report-fortinet-cybersecurity.html</loc>
			<lastmod>2024-12-26T13:04:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/26/how-are-you-securing-your.html</loc>
			<lastmod>2024-12-26T12:45:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/cybersecurity-resolutions-skill-sets-to.html</loc>
			<lastmod>2024-12-25T23:10:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/ios-devices-more-exposed-to.html</loc>
			<lastmod>2024-12-25T23:09:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/seo-poisoning-how-scammers-turn.html</loc>
			<lastmod>2024-12-25T23:09:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/pittsburgh-regional-transit-attributes-recent.html</loc>
			<lastmod>2024-12-25T23:08:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/irans-christmas-cyber-attack-on.html</loc>
			<lastmod>2024-12-25T23:07:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/jals-system-under-cyberattack-domestic.html</loc>
			<lastmod>2024-12-25T22:50:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/researchers-uncover-pypi-packages-stealing.html</loc>
			<lastmod>2024-12-25T14:18:22-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/clop-ransomware-is-now-extorting.html</loc>
			<lastmod>2024-12-25T14:17:40-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/sweden-says-china-denied-request.html</loc>
			<lastmod>2024-12-25T14:17:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/the-cyberwar-playbook-tricks-used.html</loc>
			<lastmod>2024-12-25T10:53:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/irans-charming-kitten-deploys-bellacpp.html</loc>
			<lastmod>2024-12-25T10:52:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/top-phishing-tricks-attackers-use.html</loc>
			<lastmod>2024-12-25T10:51:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/critical-sql-injection-vulnerability-in.html</loc>
			<lastmod>2024-12-25T10:43:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/25/ruijie-networks-cloud-platform-flaws.html</loc>
			<lastmod>2024-12-25T10:43:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/faa-halts-all-american-airlines.html</loc>
			<lastmod>2024-12-24T17:56:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/microsoft-teams-rooms-introduces-digital.html</loc>
			<lastmod>2024-12-24T17:54:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/this-vpn-sells-access-to.html</loc>
			<lastmod>2024-12-24T17:52:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/how-will-health-data-privacy.html</loc>
			<lastmod>2024-12-24T17:41:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/online-extortion-gang-clop-threatens.html</loc>
			<lastmod>2024-12-24T17:39:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/postman-workspaces-leak-api-keys.html</loc>
			<lastmod>2024-12-24T17:38:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/python-malware-in-zebo-and.html</loc>
			<lastmod>2024-12-24T17:37:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/adobe-security-advisory-av-canadian.html</loc>
			<lastmod>2024-12-24T17:36:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-just-evil.html</loc>
			<lastmod>2024-12-24T09:02:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-cosmicbeetle-noname.html</loc>
			<lastmod>2024-12-24T09:01:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-apt-socradar.html</loc>
			<lastmod>2024-12-24T09:01:00-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-spacebears-socradar.html</loc>
			<lastmod>2024-12-24T09:00:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-dark-angels.html</loc>
			<lastmod>2024-12-24T08:59:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-lockbit-ransomware.html</loc>
			<lastmod>2024-12-24T08:58:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-shinyhunters-socradar.html</loc>
			<lastmod>2024-12-24T08:58:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-blackcat-alphv.html</loc>
			<lastmod>2024-12-24T08:57:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-hunters-international.html</loc>
			<lastmod>2024-12-24T08:56:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-inc-ransom.html</loc>
			<lastmod>2024-12-24T08:55:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-ymir-ransomware.html</loc>
			<lastmod>2024-12-24T08:55:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-usersec-socradar.html</loc>
			<lastmod>2024-12-24T08:54:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-killsec-socradar.html</loc>
			<lastmod>2024-12-24T08:54:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-ransomhub-socradar.html</loc>
			<lastmod>2024-12-24T08:53:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-evil-corp.html</loc>
			<lastmod>2024-12-24T08:52:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/dark-web-profile-bashe-apt.html</loc>
			<lastmod>2024-12-24T08:50:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/american-addiction-centers-data-breach.html</loc>
			<lastmod>2024-12-24T08:49:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/when-the-world-logs-off.html</loc>
			<lastmod>2024-12-24T08:48:53-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/north-korean-hackers-pull-off.html</loc>
			<lastmod>2024-12-24T08:47:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/apache-tomcat-vulnerability-cve-exposes.html</loc>
			<lastmod>2024-12-24T08:46:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/is-going-to-be-a.html</loc>
			<lastmod>2024-12-24T08:45:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/nonhuman-identities-gain-momentum-requires.html</loc>
			<lastmod>2024-12-24T08:44:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/24/why-hackers-love-weekend-and.html</loc>
			<lastmod>2024-12-24T08:42:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/turmoil-besets-phishingasaservice-toolkit-rockstar.html</loc>
			<lastmod>2024-12-23T16:11:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/a-vulnerability-in-apache-struts.html</loc>
			<lastmod>2024-12-23T16:10:11-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/ribridges-data-breach-what-ri.html</loc>
			<lastmod>2024-12-23T13:43:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/brightline-data-breach-class-action.html</loc>
			<lastmod>2024-12-23T13:42:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/mcdonalds-delivery-customers-put-at.html</loc>
			<lastmod>2024-12-23T13:41:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/duke-energy-hit-by-major.html</loc>
			<lastmod>2024-12-23T13:41:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/alta-resources-corporation-provides-notice.html</loc>
			<lastmod>2024-12-23T13:40:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/november-healthcare-data-breach-report.html</loc>
			<lastmod>2024-12-23T13:39:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/records-of-nearly-americans-exposed.html</loc>
			<lastmod>2024-12-23T13:38:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/us-cracks-down-on-china.html</loc>
			<lastmod>2024-12-23T11:21:23-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/mcafee-predicts-cyber-threats-as.html</loc>
			<lastmod>2024-12-23T11:20:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/malaysian-eatery-operator-arrested-for.html</loc>
			<lastmod>2024-12-23T11:18:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/advent-of-cyber-day-tryhackme.html</loc>
			<lastmod>2024-12-23T11:17:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/navigating-the-cyber-threat-landscape.html</loc>
			<lastmod>2024-12-23T11:15:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/organizations-need-to-get-real.html</loc>
			<lastmod>2024-12-23T11:14:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/north-korean-hackers-tied-to.html</loc>
			<lastmod>2024-12-23T11:12:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/beware-of-shadow-ai-shadow.html</loc>
			<lastmod>2024-12-23T11:11:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/ibm-security-advisory-av-canadian.html</loc>
			<lastmod>2024-12-23T11:10:41-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/ubuntu-security-advisory-av-canadian.html</loc>
			<lastmod>2024-12-23T11:10:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/middle-east-cyberwar-rages-on.html</loc>
			<lastmod>2024-12-23T11:09:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/global-elections-in-internet-traffic.html</loc>
			<lastmod>2024-12-23T11:08:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/government-to-name-key-witness.html</loc>
			<lastmod>2024-12-23T11:07:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/ai-could-generate-malware-variants.html</loc>
			<lastmod>2024-12-23T11:06:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/vulnerability-summary-for-the-week.html</loc>
			<lastmod>2024-12-23T11:05:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/million-impacted-by-ransomware-attack.html</loc>
			<lastmod>2024-12-23T11:04:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/supply-chain-attack-hits-rspack.html</loc>
			<lastmod>2024-12-23T11:03:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/cloud-atlas-using-a-new.html</loc>
			<lastmod>2024-12-23T11:02:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/security-controls-keeping-up-with.html</loc>
			<lastmod>2024-12-23T11:01:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/phishing-report-findings-call-for.html</loc>
			<lastmod>2024-12-23T11:00:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/top-zeroday-exploitation-trends-of.html</loc>
			<lastmod>2024-12-23T10:53:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/lazarus-apt-targeted-employees-at.html</loc>
			<lastmod>2024-12-23T10:52:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/top-ransomware-attacks-and-data.html</loc>
			<lastmod>2024-12-23T10:51:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/maximizing-the-impact-of-cybercrime.html</loc>
			<lastmod>2024-12-23T10:50:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/how-companies-can-fight-ransomware.html</loc>
			<lastmod>2024-12-23T10:49:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/23/macports-remote-code-execution-advisory.html</loc>
			<lastmod>2024-12-23T10:48:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/beware-feb-diabolic.html</loc>
			<lastmod>2024-12-22T10:00:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/ways-i-use.html</loc>
			<lastmod>2024-12-22T09:56:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/leading-ai-chatbots.html</loc>
			<lastmod>2024-12-22T09:52:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/days-of-openai.html</loc>
			<lastmod>2024-12-22T09:48:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/week-in-review.html</loc>
			<lastmod>2024-12-22T09:45:29-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/the-uks-cybersecurity.html</loc>
			<lastmod>2024-12-22T09:44:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/badbox-rapidly-grows.html</loc>
			<lastmod>2024-12-22T09:43:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/22/albania-to-close.html</loc>
			<lastmod>2024-12-22T09:42:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/google-ceo-sundar.html</loc>
			<lastmod>2024-12-21T09:23:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/largest-data-breach.html</loc>
			<lastmod>2024-12-21T08:36:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/ascension-health-data.html</loc>
			<lastmod>2024-12-21T08:31:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/ledger-users-targeted.html</loc>
			<lastmod>2024-12-21T08:28:59-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/the-breachies-the.html</loc>
			<lastmod>2024-12-21T08:27:27-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/chinese-national-cyber.html</loc>
			<lastmod>2024-12-21T08:24:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/hackney-council-cyberattack.html</loc>
			<lastmod>2024-12-21T08:24:06-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/openai-announces-new.html</loc>
			<lastmod>2024-12-21T08:19:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/the-feds-have.html</loc>
			<lastmod>2024-12-21T08:14:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/metasploit-weekly-wrapup.html</loc>
			<lastmod>2024-12-21T08:07:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/sophos-security-advisory.html</loc>
			<lastmod>2024-12-21T08:06:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/lockbit-ransomware-developer.html</loc>
			<lastmod>2024-12-21T08:05:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/ukraines-state-registers.html</loc>
			<lastmod>2024-12-21T08:04:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/21/builderai-database-misconfiguration.html</loc>
			<lastmod>2024-12-21T08:03:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/20/how-generative-ai.html</loc>
			<lastmod>2024-12-20T18:50:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/critical-flaws-expose.html</loc>
			<lastmod>2024-12-19T08:15:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/us-eyes-ban.html</loc>
			<lastmod>2024-12-19T08:14:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/the-year-of.html</loc>
			<lastmod>2024-12-19T08:13:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/exploring-vulnerable-windows.html</loc>
			<lastmod>2024-12-19T08:12:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/silent-heists-the.html</loc>
			<lastmod>2024-12-19T08:12:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/fortinet-warns-of.html</loc>
			<lastmod>2024-12-19T08:11:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/lazarus-targets-nuclearrelated.html</loc>
			<lastmod>2024-12-19T08:10:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/are-threat-feeds.html</loc>
			<lastmod>2024-12-19T08:07:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/banking-utilities-api.html</loc>
			<lastmod>2024-12-19T08:06:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/in-potential-reversal.html</loc>
			<lastmod>2024-12-19T08:06:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/apt-group-used.html</loc>
			<lastmod>2024-12-19T08:05:19-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/apache-security-advisory.html</loc>
			<lastmod>2024-12-19T08:04:35-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/19/threat-actors-are.html</loc>
			<lastmod>2024-12-19T08:03:55-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/regional-care-data.html</loc>
			<lastmod>2024-12-18T15:41:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/european-companies-hit.html</loc>
			<lastmod>2024-12-18T15:41:01-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/apt-hackers-target.html</loc>
			<lastmod>2024-12-18T15:39:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/dark-web-market.html</loc>
			<lastmod>2024-12-18T15:38:30-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/beyondtrust-issues-urgent.html</loc>
			<lastmod>2024-12-18T15:37:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/the-mask-apt.html</loc>
			<lastmod>2024-12-18T15:36:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/effective-phishing-campaign.html</loc>
			<lastmod>2024-12-18T15:36:05-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/data-sovereignty-in.html</loc>
			<lastmod>2024-12-18T15:35:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/nearly-wordpress-credentials.html</loc>
			<lastmod>2024-12-18T15:34:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/lesson-from-latest.html</loc>
			<lastmod>2024-12-18T15:33:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/thai-police-systems.html</loc>
			<lastmod>2024-12-18T15:32:04-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/texas-tech-fumbles.html</loc>
			<lastmod>2024-12-18T15:31:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/hackers-leak-partial.html</loc>
			<lastmod>2024-12-18T15:30:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/cisa-directs-federal.html</loc>
			<lastmod>2024-12-18T15:29:31-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/namibias-state-telecom.html</loc>
			<lastmod>2024-12-18T15:28:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/million-payment-card.html</loc>
			<lastmod>2024-12-18T15:27:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/azure-data-factory.html</loc>
			<lastmod>2024-12-18T15:25:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/fbi-warns-of.html</loc>
			<lastmod>2024-12-18T15:25:02-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/foxit-security-advisory.html</loc>
			<lastmod>2024-12-18T15:23:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/canadas-top-cybersecurity.html</loc>
			<lastmod>2024-12-18T15:22:42-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/dhs-says-china.html</loc>
			<lastmod>2024-12-18T15:21:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/hackers-use-fake.html</loc>
			<lastmod>2024-12-18T15:20:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/hackers-use-microsoft.html</loc>
			<lastmod>2024-12-18T15:20:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/18/uncovering-gstreamer-secrets.html</loc>
			<lastmod>2024-12-18T15:18:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/texas-tech-university.html</loc>
			<lastmod>2024-12-17T08:30:39-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/bitter-apt-targets.html</loc>
			<lastmod>2024-12-17T08:29:32-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/unveiling-indias-cyber.html</loc>
			<lastmod>2024-12-17T08:28:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/the-mask-apt.html</loc>
			<lastmod>2024-12-17T08:27:10-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/the-domino-effect.html</loc>
			<lastmod>2024-12-17T08:26:21-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/cisa-and-fbi.html</loc>
			<lastmod>2024-12-17T08:25:07-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/ddosforhire-operations-shut.html</loc>
			<lastmod>2024-12-17T08:24:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/european-union-sanctions.html</loc>
			<lastmod>2024-12-17T08:23:28-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/winntilike-glutton-backdoor.html</loc>
			<lastmod>2024-12-17T08:22:36-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/dirty-dag-new.html</loc>
			<lastmod>2024-12-17T08:21:47-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/cicada-ransomware-claims.html</loc>
			<lastmod>2024-12-17T08:20:57-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/fourteen-north-korean.html</loc>
			<lastmod>2024-12-17T08:20:12-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/black-hat-europe.html</loc>
			<lastmod>2024-12-17T08:18:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/cve-vulnerability-impacting.html</loc>
			<lastmod>2024-12-17T08:18:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/ubuntu-security-advisory.html</loc>
			<lastmod>2024-12-17T08:17:52-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/eu-issues-firstever.html</loc>
			<lastmod>2024-12-17T08:17:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/ibm-security-advisory.html</loc>
			<lastmod>2024-12-17T08:16:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/android-zeroday-exploited.html</loc>
			<lastmod>2024-12-17T08:15:48-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/vulnerability-summary-for.html</loc>
			<lastmod>2024-12-17T08:15:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/microsoft-teams-vishing.html</loc>
			<lastmod>2024-12-17T08:14:18-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/17/a-defenders-guide.html</loc>
			<lastmod>2024-12-17T08:13:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/citrix-warns-of.html</loc>
			<lastmod>2024-12-16T12:54:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/dell-security-advisory.html</loc>
			<lastmod>2024-12-16T12:52:54-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/deceptionads-delivers-m.html</loc>
			<lastmod>2024-12-16T12:49:03-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/hpe-security-advisory.html</loc>
			<lastmod>2024-12-16T12:48:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/threat-landscape-statistics.html</loc>
			<lastmod>2024-12-16T12:47:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/major-auto-parts.html</loc>
			<lastmod>2024-12-16T12:46:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/srp-federal-credit.html</loc>
			<lastmod>2024-12-16T12:46:17-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/rydox-cybercrime-marketplace.html</loc>
			<lastmod>2024-12-16T12:45:50-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/cve-assigned-to.html</loc>
			<lastmod>2024-12-16T12:45:14-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/evasive-nodejs-loader.html</loc>
			<lastmod>2024-12-16T12:44:38-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/people-impacted-by.html</loc>
			<lastmod>2024-12-16T12:43:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/security-probllms-in.html</loc>
			<lastmod>2024-12-16T12:43:15-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/amazon-refuses-microsoft.html</loc>
			<lastmod>2024-12-16T12:42:33-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/rhode-island-suffers.html</loc>
			<lastmod>2024-12-16T12:41:45-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/cisa-requests-public.html</loc>
			<lastmod>2024-12-16T12:40:58-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/new-investment-scam.html</loc>
			<lastmod>2024-12-16T12:40:08-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/cybersecurity-in-a.html</loc>
			<lastmod>2024-12-16T12:39:20-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/dark-market-overview.html</loc>
			<lastmod>2024-12-16T12:38:37-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/security-experts-respond.html</loc>
			<lastmod>2024-12-16T12:37:49-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/the-top-state.html</loc>
			<lastmod>2024-12-16T12:36:43-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/new-glutton-malware.html</loc>
			<lastmod>2024-12-16T12:36:13-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/multiple-flaws-in.html</loc>
			<lastmod>2024-12-16T12:34:56-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/lw-roundtable-lessons.html</loc>
			<lastmod>2024-12-16T12:34:16-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/ukrainian-minors-recruited.html</loc>
			<lastmod>2024-12-16T12:33:26-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/cellebrite-unlocked-this.html</loc>
			<lastmod>2024-12-16T12:32:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/security-leaders-top.html</loc>
			<lastmod>2024-12-16T12:31:51-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/eset-ransomhub-most.html</loc>
			<lastmod>2024-12-16T12:30:44-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/16/malicious-ad-distributes.html</loc>
			<lastmod>2024-12-16T12:29:46-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/15/securing-against-shopping.html</loc>
			<lastmod>2024-12-15T11:54:09-05:00</lastmod>
		</url>
	<url>
			<loc>https://threatintel.cc/2024/12/15/elastic-security-lab.html</loc>
			<lastmod>2024-12-15T11:52:49-05:00</lastmod>
		</url>
	
</urlset>
