<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" generatedBy="WIX">
<url>
<loc>https://www.rescanaassessment.com/post/iran-s-cyberwar-has-begun-targeted-attacks-on-israeli-and-unitronics-ics-ot-systems-threat-intelli</loc>
<lastmod>2026-03-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_78d63bf25ef94f13b475b7a19ab8b6e4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-chrome-145-security-update-patch-addresses-11-critical-vulnerabilities-including-high-sever</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c1415379218c414e8b3a155d4ce4d863~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/operation-macromaze-apt28-exploits-microsoft-office-macros-and-webhook-site-for-spear-phishing-at</loc>
<lastmod>2026-02-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_532ff7581012444f87a917a594744cdd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/malicious-go-module-github-com-xinfeisoft-crypto-targets-ubuntu-and-ci-cd-environments-with-rekoobe</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_38e84b276c974cd88c337b5a102156b2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/for-retailers-suppliers-of-pos-oms-and-crm-systems-are-not-third-party-they-are-actually-teamm</loc>
<lastmod>2026-03-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/f49d5d_6940625e77744a768627d9f012de55af~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/clickfix-campaign-exploits-compromised-websites-to-deliver-mimicrat-remote-access-trojan-targeting-w</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1c821c93ad6340e2ae063408fd4af0b6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2026-21902-vulnerability-in-juniper-networks-ptx-series-routers-running-junos-os-evolve</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dd145d0328414931845abb6bcb495aa9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/olympique-marseille-cyberattack-2026-club-confirms-attempted-website-breach-amid-supporter-data-lea</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f628a488707b433ba42bdf4587454ead~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-forcememo-campaign-supply-chain-attack-targets-github-python-repositories-with-stolen-tok</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fa08194c8e3947a5bffb8eddf6a5af4f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/forticlientems-cve-2026-21643-critical-unauthenticated-sql-injection-vulnerability-allows-remote-co</loc>
<lastmod>2026-02-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_91750fe8c4174a8e94d159efe0913ea7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-pre-auth-rce-vulnerability-cve-2024-12356-in-beyondtrust-remote-support-and-pra-actively</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9b86faeac3904997b73acf31c5cc9488~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/canadian-tire-e-commerce-database-breach-exposes-data-of-38-million-customer-accounts-in-2025</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_457ad8754b5f4fd3a11a2cdaf98f900d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/hims-hers-zendesk-data-breach-2026-okta-sso-compromise-exposes-sensitive-customer-support-informa</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6431d23eed5e4b2c8a75f0af54016cb7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/outpost24-c-suite-spearphishing-incident-analysis-of-7-stage-social-engineering-attack-in-march-202</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_27c97b05120c49de84c753ff37cfab35~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/appsflyer-web-sdk-supply-chain-attack-global-crypto-stealing-javascript-injection-and-mitigation-an</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d8f36641f8524f1e8c45cf0be83aecbd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc3886-cyber-espionage-campaign-exploits-fortinet-and-vmware-zero-days-to-breach-singapore-telecom</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_db39f2ea57134b61ac08cc8503394223~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/trezor-and-ledger-users-targeted-by-sophisticated-snail-mail-phishing-attacks-cryptocurrency-wallet</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8c471d0b953f4996bd952dea33a4e3ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-marimo-python-notebook-rce-vulnerability-cve-2026-39987-exploited-within-10-hours-of-disc</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_53e3916ce27a478eaf6c92bd0d598880~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cpuid-supply-chain-attack-stx-rat-malware-distributed-via-trojanized-cpu-z-and-hwmonitor-downloads</loc>
<lastmod>2026-04-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_04841e0f9bbc4b6e96424da8c7c74c02~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/starbucks-partner-central-data-breach-exposes-sensitive-employee-information-in-credential-phishing</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4e9a570cb19842c7a5044dd30781e1d9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chinese-cyber-espionage-targets-southeast-asian-military-c4i-systems-using-applechris-and-memfun-mal</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b4e3f38e91b74f34a9429e60d2304da1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sap-fs-quo-and-netweaver-vulnerabilities-exposed-in-march-2026-security-patch-day-immediat</loc>
<lastmod>2026-03-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_394662313b45472bbdfd0109284bf8d9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/advantest-corporation-ransomware-attack-2026-cyber-incident-impacting-internal-it-systems-and-suppl</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1074de933db24befaefd1084824830d0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/adobe-acrobat-and-reader-cve-2026-34621-critical-prototype-pollution-vulnerability-actively-exploit</loc>
<lastmod>2026-04-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_59d0db8ad15c40359438bf433b62e2e9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-chrome-147-security-update-patches-60-vulnerabilities-including-critical-webml-remote-code-e</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2dcf258fba264e0caca46394ba0d4236~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-32746-critical-unpatched-vulnerability-in-gnu-inetutils-telnetd-enables-unauthenticated-re</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f5dd5a77e088416eb59bee6e0b1095e5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-assisted-attack-compromises-600-fortinet-fortigate-firewalls-worldwide-in-five-week-campaign</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5e2ae6b3f296424589355d21758e9607~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyberattack-on-poland-s-national-centre-for-nuclear-research-ncbj-attempted-breach-of-maria-react</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e7668b4e142342fe8adf63a87e8b90a3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt28-deploys-beardshell-and-customized-covenant-malware-for-targeted-cyber-espionage-against-the-uk</loc>
<lastmod>2026-03-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e14887ba0b71452298d4d309cf3b0f6b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/massiv-android-banking-trojan-campaign-exploits-fake-iptv-apps-to-target-mobile-users-in-southern-eu</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9976dcb6e0f0436b89a1978abadf4637~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-powered-cyberattack-using-claude-code-compromises-mexico-s-tax-authority-and-government-agencies</loc>
<lastmod>2026-03-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0c4195d9052849bcb7c13c0c4743414b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/warlock-ransomware-exploits-unpatched-microsoft-sharepoint-and-smartermail-servers-tactics-analysi</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b37fd49c5b044b398f06cf8898c1a6fa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/veeam-backup-replication-vulnerabilities-critical-rce-flaws-patched-in-latest-security-update</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_beccaf59d495496eb75a317081cf873c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cisco-sd-wan-zero-day-cve-2026-20127-enables-remote-admin-access-active-exploitation-and</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_49e35cbc4cdb48999e8ce51589acc785~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/us-sanctions-russian-exploit-broker-operation-zero-for-theft-and-sale-of-zero-day-exploits-targeting</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3f315debbcdf467180a4dea26a61fe74~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/south-korean-national-tax-service-exposes-ledger-wallet-seed-leading-to-4-8m-prtg-token-theft</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_765a881dc85e420f8466ae03443f5733~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-chrome-zero-day-vulnerability-cve-2026-2441-actively-exploited-patch-now-to-mitigate-risk</loc>
<lastmod>2026-02-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9c40438097584565abedf70219b74bd3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/quicklens-chrome-extension-supply-chain-attack-cryptocurrency-theft-and-clickfix-malware-campaign-a</loc>
<lastmod>2026-03-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8559409920ea4a13b517662d4d3caaf3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/iranian-cyberav3ngers-target-unitronics-vision-plcs-in-us-critical-infrastructure-amid-rising-geopol</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b7b3527e350448fbbda9a8fdef7f395b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-powered-cyberattack-compromises-600-fortigate-devices-across-55-countries-detailed-threat-analy</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e4a587c04e8c4ec99565032b4bd2a07b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/claude-llm-artifacts-exploited-to-distribute-mac-infostealer-malware-via-clickfix-attack-chain-targe</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e2b71a41282e483096ea7cd2a795aa07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/muddywater-s-dindoor-backdoor-iranian-apt-targets-u-s-organizations-via-deno-runtime-and-cloud-sto</loc>
<lastmod>2026-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_01892853042d440d8d3970e4b998f377~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rockwell-automation-allen-bradley-plcs-nearly-4-000-us-industrial-devices-exposed-to-iranian-cybera</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6bbc9ec15f4b4a0d9e4aa7fb840c9238~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-disrupts-unc2814-gridtide-malware-abusing-google-sheets-api-in-global-telecom-and-government</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ec1f03611d234dabaf16530b37bad30f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shields-up-initiative-how-ai-zero-trust-and-cloud-native-security-are-transforming-cyber-defenses</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d73f091dff344077a0c36666f2d0d994~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/louis-vuitton-dior-and-tiffany-fined-25-million-for-saas-customer-management-data-breaches-in-sou</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5737b41eb03543dbbcf92e69472c14e6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lazarus-group-targets-npm-pypi-and-github-developers-with-fake-job-recruiter-malware-campaign</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dcb75b0ff016403aa2ed05c0d4acf981~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-ai-vulnerabilities-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-re</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ba7466aeeeaa4964b5032b7ece0d4a29~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unsolicitedbooker-apt-targets-kyrgyzstan-and-tajikistan-telecoms-with-lucidoor-and-marssnake-backdoo</loc>
<lastmod>2026-02-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9aea94dbff7b4483b33489f6abf5cba1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cline-cli-2-3-0-supply-chain-attack-openclaw-unauthorized-installation-on-developer-and-ci-cd-syste</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_28975c3bf93345d78152960007775d8f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/crescentharvest-iranian-apt-targets-farsi-speaking-activists-via-chrome-software-reporter-tool-expl</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d33f249cdf944942a34d2c47d2b2980e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cpuid-website-compromised-malware-delivered-via-cpu-z-and-hwmonitor-download-links-in-april-2026</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_43ee29c76e9e4ff18aa0dfb61b64384b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/trend-micro-apex-one-on-premise-critical-rce-vulnerabilities-cve-2025-54948-cve-2025-54987-exploi</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_58940c3203374152b9ab26022655710d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/french-ficoba-bank-account-database-breach-exposes-data-of-1-2-million-accounts-february-2026-incid</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a86369577e2a42198bd235ff4397d331~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-supply-chain-attack-exploits-open-vsx-extensions-to-target-developer-environments</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c78155cfe6e1490db650b406c4155988~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/europol-dismantles-tycoon-2fa-inside-the-takedown-of-a-64-000-attack-phishing-as-a-service-platform</loc>
<lastmod>2026-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_27857d290a874cb99864e4cd4eda74af~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-mississippi-medical-center-restores-epic-ehr-system-after-major-ransomware-attack-and</loc>
<lastmod>2026-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_80bb32f6756f45f485995f7148da64d2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-discovered-by-openai-codex-security-in-gnupg-gnutls-gogs-php-chromium</loc>
<lastmod>2026-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_833d9b0b0f534bf1be4ae37075be6ee1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apple-urgent-security-update-cve-2025-14174-webkit-same-origin-policy-bypass-vulnerability-impacts</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_27538f0d7a7c4799ab0b9e884db35154~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ivanti-epmm-zero-day-exploits-dutch-authorities-confirm-employee-contact-data-breach-in-european-go</loc>
<lastmod>2026-02-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_62bcb482fdde40308b04c6188ecc02d8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/solarwinds-web-help-desk-rce-vulnerabilities-multi-stage-attacks-exploiting-cve-2024-23476-on-expos</loc>
<lastmod>2026-02-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c3a9248754ed4ad7a26492aa36f3a6e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/eu-sanctions-on-chinese-and-iranian-firms-raptor-train-botnet-sms-service-and-olympic-billboard-c</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e8fe5ebde8fb4f5da14651ab18b36bc8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/reynolds-ransomware-exploits-cve-2025-68947-in-nsecsoft-nseckrnl-driver-to-disable-windows-edr-secur</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_acf50d12c08a440795fb54a9ea2e3161~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/promptspy-android-malware-exploits-gemini-ai-for-advanced-persistence-on-android-devices</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fa0dab3e2ede44ba9bccbbbf64cef215~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/technical-analysis-of-canfail-malware-targeting-ukrainian-defense-and-energy-sectors-by-suspected-ru</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_06bb6c2b04f9466c85d8481e044f8af8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ongoing-cyberattack-exploits-sangoma-freepbx-cve-2025-64328-over-900-instances-compromised-by-web-s</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_951a277ef7164541a7bee51971c5188e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-orthanc-dicom-server-vulnerabilities-expose-healthcare-systems-to-crashes-and-remote-code-e</loc>
<lastmod>2026-04-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b78895987c94495b848b07749f0cc4c9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/intuitive-surgical-administrative-network-breach-2026-phishing-attack-exposes-employee-and-customer</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6f5d0826ef60469f9296524120699a1e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/figure-technology-solutions-data-breach-nearly-1-million-user-records-exposed-in-2026-social-engine</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_463ea4efc6f94af9855773b29effaafe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/scarcruft-exploits-zoho-workdrive-and-usb-malware-to-compromise-air-gapped-government-and-defense-ne</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_49fc28c6b97d4ed8a5a139b90faff759~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lexisnexis-aws-data-breach-2026-react2shell-exploit-exposes-legacy-data-in-cloud-hack</loc>
<lastmod>2026-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e9c42bd300684e65993c7d36887cf6ed~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-warns-of-clickfix-attack-sophisticated-dns-lookup-abuse-targets-windows-systems</loc>
<lastmod>2026-02-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c3038f824701410e8791adc4ef1d92c8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/uat-9921-targets-technology-and-financial-sectors-with-voidlink-malware-via-apache-dubbo-vulnerabili</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eea60134d894479cb32c19ecf3bc2b6e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ivanti-connect-secure-policy-secure-and-neurons-zero-day-exploitation-surge-cve-2025-0282-and-cve</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c2fe50414a1449a2ba2ffa054d4ad35a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc1069-targets-cryptocurrency-organizations-with-ai-deepfake-lures-and-multi-stage-malware-on-windo</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6908940889fd4209a29c78920d368f3c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-20127-critical-zero-day-exploited-in-cisco-catalyst-sd-wan-controller-and-manager-by-advan</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_99916d8ec4194a4fb984def96a4ddc9d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortigate-forticloud-sso-authentication-bypass-active-exploitation-of-cve-2025-59718-59719-for-cred</loc>
<lastmod>2026-03-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5f8cf338e17c4f7fbcbbdab360630b96~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/clawjacked-vulnerability-in-openclaw-allows-malicious-websites-to-hijack-local-ai-agents-and-steal-d</loc>
<lastmod>2026-03-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5e5dc91d29ee4d4a818dd926e0e7fdf6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rustywater-iranian-muddywater-apt-targets-israeli-government-and-infrastructure-with-advanced-rust</loc>
<lastmod>2026-02-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5432a31858be49bfbb072774c03d6b09~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/leaknet-ransomware-exploits-clickfix-via-compromised-websites-to-attack-windows-environments-with-de</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9ef88ac892804c92acf1976b49728405~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/manomano-zendesk-data-breach-exposes-38-million-customers-across-europe-incident-analysis-and-secur</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_672ac8b0ad17463db90d959d1bd41afe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/loblaw-companies-limited-data-breach-2026-customer-pii-exposed-in-targeted-attack</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6abd0ca47a2a49148641649ba8672fac~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/february-2026-security-patch-report-microsoft-sap-intel-adobe-and-60-vendors-address-critical</loc>
<lastmod>2026-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_314553affe144b50bce37fc1a8742d13~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/venon-rust-malware-targets-itaú-and-32-other-brazilian-banks-with-advanced-credential-stealing-attac</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4d0f1022f11e49a0826328304d04e077~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fbi-pen-register-and-trap-and-trace-system-breach-investigation-into-suspicious-cyber-activity-targ</loc>
<lastmod>2026-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_aab66931c8c344e58cfe381cc8c3d97b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-23813-critical-authentication-bypass-in-hpe-aruba-aos-cx-allows-remote-admin-password-rese</loc>
<lastmod>2026-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_650c34416f59417fa534bbd0a409874a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-void-geist-multi-stage-malware-targeting-windows-systems-with-xworm-async</loc>
<lastmod>2026-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_79403c0cadab4830b684f268ebcb3499~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt37-s-ruby-jumper-malware-targets-air-gapped-windows-networks-with-usb-based-attacks</loc>
<lastmod>2026-03-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b02fb761910d404280bc422e3b395f35~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/konni-targets-kakaotalk-desktop-with-endrat-multi-stage-phishing-attack-exploits-social-messaging-f</loc>
<lastmod>2026-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cf86d32bad004ea9af6ecc18c6237774~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/global-surge-149-hacktivist-ddos-attacks-target-scada-and-critical-infrastructure-across-16-countri</loc>
<lastmod>2026-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b3f96e6cdb61407e8a4b71325eaafd83~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-gemini-ai-under-attack-apts-and-cybercriminals-exploit-platform-across-the-entire-cyber-kill</loc>
<lastmod>2026-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_69f5b1cdbe2e497c92fe545397e0aa62~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/washington-hotel-japan-ransomware-attack-impact-response-and-cybersecurity-lessons-for-the-hospit</loc>
<lastmod>2026-02-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1bf9da9a460e462881094a4a23426b5b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/learning-about-china-s-military-ai-wish-list-from-open-source-supply-chain-documents</loc>
<lastmod>2026-03-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/f49d5d_3563b06be11044bf9afe8e48084f6bd8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dohdoor-backdoor-attack-uat-10027-targets-windows-systems-in-u-s-education-and-healthcare-sectors</loc>
<lastmod>2026-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4ee9be62eb504c4b8f3a91ce8ded5f1b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/louis-vuitton-dior-and-tiffany-fined-25-million-in-south-korea-over-saas-customer-management-syst</loc>
<lastmod>2026-02-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f4465b840e1c4f46a774d2b9d6bf0013~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-26119-critical-privilege-escalation-vulnerability-in-microsoft-windows-admin-center-patc</loc>
<lastmod>2026-02-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9dde78eff7d44e9faff003963041b455~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/coordinated-state-sponsored-cyber-attacks-target-battlefield-management-and-defense-supply-chains-g</loc>
<lastmod>2026-02-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_09be82c1b223447f8b1bd4572b3c9228~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/digital-frontlines-the-infrastructure-realities-of-the-2026-iran-conflict</loc>
<lastmod>2026-03-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/f49d5d_538ffb6e5dd24f49b87ee69daa55d8fa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2026-2329-vulnerability-in-grandstream-gxp1600-voip-phones-enables-remote-code-executio</loc>
<lastmod>2026-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c9f2485c6c2b4ab99a2ca69a915092a1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/canada-goose-data-breach-shinyhunters-leak-exposes-600-000-customer-records-via-third-party-payment</loc>
<lastmod>2026-02-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8fe9dae388cd4700a74a97fc39d9a9d1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-unauthenticated-rce-vulnerability-cve-2025-69258-in-trend-micro-apex-central-on-prem-wind</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c5483219504b4d238562e91b8a3c2b41~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-exchange-online-incident-report-legitimate-emails-incorrectly-flagged-as-phishing-and-qua</loc>
<lastmod>2026-02-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2bb07d66ce624675b84e1f260c3a595b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/warlock-ransomware-breaches-smartertools-via-smartermail-vulnerabilities-cve-2026-23760-cve-2026-2</loc>
<lastmod>2026-02-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3654456feb81459e9317326a0ba9ad49~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shinyhunters-vishing-attacks-bypass-mfa-to-breach-okta-microsoft-365-and-google-workspace-saas-pla</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_72c19033b799413fb899ca59bb0ec125~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-rce-vulnerability-cve-2025-59470-in-veeam-backup-replication-patch-released-to-prevent</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9ba7e32490b4448e927fd99c3648c048~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/anthropic-claude-opus-4-6-uncovers-critical-vulnerabilities-in-ghostscript-opensc-and-cgif-compre</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a314b693595243b78a89939991081006~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-xss-vulnerability-in-stealc-malware-admin-panel-allows-researchers-to-infiltrate-and-monito</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_16c7ef1be6fd4ac398fba2fd9eaa45fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/breachforums-hacking-forum-database-leak-analysis-of-the-324-000-account-exposure-incident-january</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3ddf3e41849e40688805f1aeea735e7c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exposed-mongodb-servers-remain-prime-targets-for-automated-data-extortion-attacks-and-vulnerability</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7dd8f134040544deb22325117379a818~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/llmjacking-how-hackers-exploit-misconfigured-proxies-to-steal-access-to-paid-llm-services-like-open</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a7a13f8d7ee248b888437b1dba4b5daf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/winrar-path-traversal-vulnerability-cve-2023-38831-ongoing-exploitation-by-apts-and-cybercriminal</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_94c76186ca4144ff81ea89ced18a6b58~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-supply-chain-attack-exploits-open-vsx-registry-to-infect-vscode-extensions-with-advanced-m</loc>
<lastmod>2026-02-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d35cfa69e28048009d48d5b6b87eb6a2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dydx-npm-and-pypi-supply-chain-attack-wallet-stealer-and-rat-malware-compromise-developer-libraries</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_be56e973866f4f41b082692f3511f752~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-cloud-application-integration-exploited-in-sophisticated-multi-stage-phishing-campaign-target</loc>
<lastmod>2026-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_308f1a6c141c44d38a19c39b0cbb94c8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fbi-cisa-and-nsa-warn-of-kimsuky-apt43-using-malicious-qr-codes-in-spear-phishing-attacks-target</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1d28b6be5896483584b70ff5b2822fb3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/zestix-sentap-cybercrime-campaign-targets-sharefile-nextcloud-and-owncloud-via-stolen-credentials</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a2d3d040973d460dbb0eb0d8fc0bf588~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/resecurity-honeypot-incident-analysis-of-scattered-lapsus-hunters-claimed-breach-and-threat-intel</loc>
<lastmod>2026-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d49848388576411a8d8a51a2e4c8911b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-the-european-vulnerability-database-euvd-launch-technical-architecture</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f71651dec5e747959316900a6b232552~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-n8n-vulnerability-cve-2025-68613-9-9-cvss-authenticated-remote-code-execution-risk-and-m</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7fd0473af6004b4fa58213f708e7bd15~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-office-cve-2026-21509-zero-day-emergency-patch-released-to-counter-active-exploitation</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f43ad29692cf44d883c059e849359e05~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sandworm-s-dynowiper-attack-targeting-polish-combined-heat-and-power-and-renewable-energy-management</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9c567960604f4f568f9b048eac6ff1d0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ledger-com-customer-data-exposed-in-global-e-api-breach-technical-analysis-and-mitigation-recommend</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ce58de9c79fa48feb265d45d86f33646~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/bloody-wolf-spear-phishing-campaign-targets-uzbekistan-and-russia-using-netsupport-manager-for-malic</loc>
<lastmod>2026-02-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0c95bb1ac5924f2a9bb82f2b570080b4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/germany-warns-of-sophisticated-signal-phishing-attacks-targeting-politicians-military-and-journali</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a5c93bbd7b7240d3a6caffc9b4b56744~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lotuslite-backdoor-targets-u-s-government-and-policy-organizations-via-venezuela-themed-spear-phish</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d0ee2c08b03244a289918205af03eb59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-fortisiem-critical-cve-2025-64155-vulnerability-unauthenticated-remote-code-execution-expl</loc>
<lastmod>2026-01-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d01ee37549634f6c805f0bfa1233d5c7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2024-20353-zero-day-exploited-by-china-linked-apt-hits-cisco-secure-email-gateway-and-s</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5454ed8ac8ff4ab08032b15b9f822656~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3393-critical-dos-vulnerability-actively-exploited-in-palo-alto-networks-pan-os-firewalls</loc>
<lastmod>2026-01-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a6978b2a6e9f4764a80c8697be00838d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sophisticated-multi-stage-phishing-attack-exploits-microsoft-windows-in-russian-organizations-using</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ff949fac8d1b4f25b3fe81fe06621010~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ivanti-endpoint-manager-mobile-epmm-zero-day-rce-vulnerabilities-cve-2023-35078-cve-2023-35081</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7e396521d6254dc69855afd4e0ae06e7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-24061-critical-authentication-bypass-in-gnu-inetutils-telnetd-exposes-800-000-devices-to-r</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b43012d1aa9841308bb2cff6a7dca7c4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/bridgepay-network-solutions-ransomware-attack-nationwide-payment-gateway-outage-and-impact-analysis</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7601fb6b6ce14438ba4eaaf7075abda7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/soundcloud-data-breach-2025-29-8-million-accounts-exposed-and-indexed-by-have-i-been-pwned</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e50a055180574f2d859f52bdc3e8ae68~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/konni-apt-targets-blockchain-development-environments-with-ai-generated-powershell-malware-via-disco</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_412d0f41f3ec4e50b2eda2118bfb553e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/flickr-data-breach-2026-user-information-exposed-via-third-party-email-service-vulnerability</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f2a315d0905a4773bd48c446e4663a23~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/okta-sso-accounts-targeted-by-sophisticated-vishing-and-adversary-in-the-middle-aitm-phishing-atta</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_057c0d55e0f74e5b923600bd653594ed~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/etsi-en-304-223-the-new-global-standard-for-ai-cybersecurity-and-supply-chain-risk-management</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b1f1f85a3e214ff2b77233075529c2e5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/hugging-face-abused-to-distribute-polymorphic-android-rat-trustbastion-malware-campaign-targeting-as</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_734c1ee3163341398f93a0142a1dae06~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/japan-uk-partnership-strengthens-cybersecurity-and-critical-minerals-supply-chains-amid-rising-chine</loc>
<lastmod>2026-02-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_07ee1af9d2a0442390e868889ea7aa5a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-365-and-exchange-vulnerability-how-misconfigured-email-routing-enables-internal-phishing</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f26f1eb4727148d4bb0676c96dd7b7b6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/breachforums-data-breach-exposes-324-000-user-records-after-mybb-misconfiguration-in-2026</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_29c35c2a6f48494ab2dbb5440075c7f5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/spain-s-ministry-of-science-it-systems-breach-idor-exploit-and-ransomware-attack-disrupts-research</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fd7d3388fd2d438b90e3d4ef2e974bf5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/panera-bread-microsoft-entra-sso-breach-shinyhunters-leak-5-1-million-customer-records-in-2026-data</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a6a9023d2c104e4c90894b7567d79e94~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/gootloader-malware-exploits-windows-zip-handling-with-1-000-part-nested-archives-to-evade-detection</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ff1e380b11e84d3582e847003bc82600~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/clickfix-malware-attacks-targeting-microsoft-windows-fake-captchas-signed-scripts-and-trusted-web</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_264146c0f4d2474198de3d66f636389c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/why-ai-vendor-velocity-is-breaking-third-party-risk</loc>
<lastmod>2026-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/f49d5d_51b2ec0a90bb4f958e6b9cb0d87b99f2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dknife-linux-toolkit-advanced-china-nexus-malware-hijacks-routers-for-network-traffic-interception</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe5bf6b18fdd48babef1e55b256eef44~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-office-zero-day-cve-2026-21509-emergency-patch-released-for-actively-exploited-ole-vulner</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_deb3669eee7e4773a7e59bb5a54e44b5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/illinois-department-of-human-services-mapping-website-data-breach-exposes-information-of-700-000-ind</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e5b4800264b7424fbd17fb258a6a63b5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kyowon-group-ransomware-attack-data-exfiltration-impacts-millions-in-south-korea</loc>
<lastmod>2026-01-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_422ee383f83241e3a76ecb6ac719c155~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-gnu-inetutils-telnetd-vulnerability-cve-2026-24061-allows-remote-root-access-via-authenti</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7d5a8796c9fc4481ada1131b6d6c191b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/zero-day-vulnerability-in-discontinued-d-link-routers-actively-exploited-for-remote-code-execution-a</loc>
<lastmod>2026-01-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8aea596f43344e9695828f4fddffb0c3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-patch-tuesday-january-2026-critical-windows-office-firefox-and-chrome-vulnerabilities</loc>
<lastmod>2026-01-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_39b593f7dde94da0b195adfdc87870cc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/solarwinds-web-help-desk-critical-vulnerabilities-unauthenticated-rce-and-authentication-bypass-fix</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_abfc2df9401b477d96ddb627cac179f6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/teampcp-worm-targets-docker-kubernetes-ray-and-redis-via-react2shell-cve-2025-55182-to-build-crim</loc>
<lastmod>2026-02-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0b78677c0cab4a2ebb31bf680952ee5b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/notepad-update-mechanism-hijacked-supply-chain-attack-delivers-malware-to-targeted-users</loc>
<lastmod>2026-02-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4355f5444f1e4facb8fe5960655c91d7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cert-polska-report-coordinated-cyberattacks-disrupt-poland-s-fortigate-managed-wind-and-solar-farms</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1358c3d7a2db42feb89d0b53100fd366~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt36-transparent-tribe-escalates-cyber-espionage-against-indian-government-and-defense-networks-t</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_78c8a2eeae5d46f596e0582fd6fe98a0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tgr-sta-1030-cyberespionage-shadowguard-linux-rootkit-targets-sap-solution-manager-microsoft-excha</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b10cf6f464af474b928969c07bf23a07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shai-hulud-npm-supply-chain-attack-impact-techniques-and-mitigation-strategies-for-open-source-ec</loc>
<lastmod>2026-02-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5674bd0fee4f437dbb03a70917198e0c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ciro-data-breach-exposes-sensitive-information-of-750-000-canadian-investors-in-major-2025-cyberatta</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a67fc33c5872418ab5863c06a2eaf2bb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-24002-critical-grist-core-vulnerability-enables-remote-code-execution-via-spreadsheet-form</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7d75ca003a4043bc8ef8a037230f0768~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-hawaii-cancer-center-ransomware-attack-data-breach-delayed-notification-and-cyberse</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8ccdafb48e184dfcbc32323649ec939d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/endesa-energía-xxi-data-breach-2026-massive-customer-data-exfiltration-from-commercial-platform</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41372537cc224ad1926ea4985c20b90c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/etsi-en-304-223-baseline-cybersecurity-standard-for-ai-models-and-systems-in-europe</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5d4ca62b3e094bdba11a0e9cc33460a7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/under-armour-customer-data-breach-2025-technical-analysis-of-everest-ransomware-attack-and-exposed</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_60b27a3b637c460aa52d1eb44f017bbe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/stackwarp-cve-2025-29943-critical-sev-snp-vulnerability-in-amd-zen-1-5-cpus-exposes-confidential</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7bde67557c0840a3a5841f17f5ed11e5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/metro4shell-cve-2025-11953-critical-rce-vulnerability-in-react-native-cli-npm-package-actively-ex</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_193655d32d424a0cb65da730fd1b1537~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-malware-exploits-visual-studio-code-and-openvsx-extensions-in-sophisticated-supply-chain-a</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4d01ba44ecaa4dcb8258a9657b3e1cc2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-59718-59719-fortinet-forticloud-sso-authentication-bypass-actively-exploited-on-fully-patc</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4ffe5bf2f0bf49aaadc4216921392270~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/atm-jackpotting-attack-tren-de-aragua-gang-exploits-ploutus-malware-on-legacy-windows-xp-atms-in-us</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9b522b9898f1478a8365a60109767678~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/eurail-data-breach-2026-sensitive-traveler-information-and-discovereu-participant-data-compromised</loc>
<lastmod>2026-01-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_25310a880aef4e0b8694e875efb62e86~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mustang-panda-targets-government-systems-with-coolclient-backdoor-and-infostealer-modules-in-asia-an</loc>
<lastmod>2026-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_631b462158ec44b9b1e09c6fad750bd9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/transparent-tribe-apt36-deploys-advanced-rat-attacks-targeting-indian-government-and-academic-inst</loc>
<lastmod>2026-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a2680848b9e9426ca5478c15db51ea69~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-n8n-supply-chain-attack-malicious-npm-community-nodes-stealing-oauth-tokens-and-credential</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d7e847bc5bb04c28b40fc24425e9575e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/uac-0184-exploits-viber-for-spearphishing-ukrainian-military-and-government-with-remcos-rat-and-hija</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_22b7fd7123314b7c84d2b7c68c4aef0a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/clickfix-attack-exploits-fake-windows-bsod-screens-to-deliver-malware-on-windows-systems</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8999970e7edd455eb748f180635902fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-powered-intrusion-achieves-full-admin-access-in-8-minutes-detailed-analysis-of-aws-cloud-securit</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c87d9201be964258aaf823459ba17168~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/covenant-health-qilin-ransomware-breach-technical-analysis-of-2025-attack-impacting-478-188-patient</loc>
<lastmod>2026-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b69f59983a174c35900745ed97abf833~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2026-23550-critical-wordpress-modular-ds-plugin-vulnerability-actively-exploited-for-admin-acce</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7621414bd4a7468c970a824372a42c9e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-15467-critical-remote-code-execution-vulnerability-in-openssl-patched-update-now-to-prev</loc>
<lastmod>2026-01-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_182e3ccea94e4e3bb85a9d16acc041b7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/whisperpair-bluetooth-fast-pair-vulnerability-cve-2025-36911-exposes-millions-of-audio-accessories</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d90e83e790384b5a8f3752bb37a654a2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/instagram-password-reset-vulnerability-exposes-17-million-accounts-data-leak-analysis-and-mitigatio</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d0a3f313d5eb49af83926657a35dbbad~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-fortinet-fortisiem-vulnerability-cve-2024-23108-actively-exploited-risks-attack-analysis</loc>
<lastmod>2026-01-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_456e4d2dca5c4deca29582cf6af8c5d3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-disrupts-redvds-inside-the-takedown-of-a-global-windows-virtual-server-cybercrime-platfor</loc>
<lastmod>2026-01-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_78f0a7fcf3c7431a860a55aff7a80266~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cisco-unified-communications-zero-day-cve-2024-20253-actively-exploited-millions-of-ente</loc>
<lastmod>2026-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_590985a992e54a579650070f7eeaae8f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/gobruteforcer-botnet-exploits-weak-credentials-in-linux-ftp-mysql-postgresql-and-phpmyadmin-on-cr</loc>
<lastmod>2026-01-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c9e5b7dac3c498b8a1409334807bc9e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/react2shell-critical-cve-2025-55182-remote-code-execution-vulnerability-in-react-native-and-react-s</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b1f7c50e8c6b40aa912daa899ce981a7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-openclaw-ai-assistant-vulnerability-enables-credential-theft-and-browser-session-hijacking</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_492da520ba2d4d2d931e5afc510db067~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-59466-critical-node-js-asynclocalstorage-and-async_hooks-vulnerability-enables-easy-denial</loc>
<lastmod>2026-01-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ac28ba37bc0442c596b96dcaa7ac2da8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/redkitten-apt-targets-microsoft-excel-vulnerabilities-in-cyber-espionage-campaign-against-iranian-hu</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f46d565db55b461bb4b2f2475eaf9bda~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pluggyape-malware-campaign-signal-and-whatsapp-used-by-void-blizzard-to-target-ukrainian-defense-fo</loc>
<lastmod>2026-01-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5c3e7e60d02541219636e4a30fc03ce8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mongodb-mongobleed-vulnerability-cve-2025-14847-critical-memory-leak-bug-under-active-exploitat</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c6b1efb553694b669301bc594ea863af~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/european-commission-investigates-ivanti-epmm-zero-day-cyberattack-exposing-staff-data</loc>
<lastmod>2026-02-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bd59838448b84de5aaf735d630778cbe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kimwolf-android-botnet-massive-infection-of-smart-tvs-iot-devices-and-tv-boxes-via-exposed-adb-an</loc>
<lastmod>2026-01-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b0f4dc81127b48438456d7e8eae46e18~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/escan-antivirus-supply-chain-attack-malicious-update-delivers-malware-to-south-asian-users</loc>
<lastmod>2026-02-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_43153f1803424304ac47e6d7e105340e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-state-hackers-exploit-microsoft-office-cve-2023-36884-vulnerability-within-3-days-of-disclos</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cc8b8f564b504351805fa4aebd6c273a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nationstates-data-breach-report-technical-analysis-of-the-2026-dispatch-search-vulnerability-and-rc</loc>
<lastmod>2026-02-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ecb8c0015d8444e5ba1a8ab736cd933d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt28-exploits-microsoft-office-cve-2026-21509-targeted-espionage-malware-attacks-in-eastern-europe</loc>
<lastmod>2026-02-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_038137ffb5d84abbb70028534b5d64a0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/monroe-university-2024-data-breach-exposes-sensitive-information-of-320-973-individuals-analysis-an</loc>
<lastmod>2026-01-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6e17ee5e7f42474ca12e42594bd607a8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisa-issues-urgent-alert-on-scadabr-cve-2021-26829-vulnerability-exploited-by-hacktivists-in-ics-att</loc>
<lastmod>2025-12-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_198f97664eaf4dd0adba785fc50a8300~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc1549-iranian-apt-targets-microsoft-exchange-and-aerospace-sector-threat-analysis-and-mitigation</loc>
<lastmod>2025-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_475179511fdb4b5f93f02d701c2d7f83~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mixpanel-vendor-incident-what-happened-and-what-organizations-should-do</loc>
<lastmod>2025-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2af6470737f44a408a6a91b4e337ba95~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/asahi-group-holdings-ransomware-attack-qilin-breach-disrupts-japanese-operations-and-exposes-1-5-mi</loc>
<lastmod>2025-11-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bc578923cf1d45cbb93425ee67bbdff4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ddos-cyberattack-disrupts-la-poste-and-la-banque-postale-operations-during-2025-christmas-season</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3cd9fe67faad40c18abd8ea7a1d86b94~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-apt-exploits-npm-supply-chain-to-distribute-ottercookie-malware-via-197-malicious-packa</loc>
<lastmod>2025-11-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_04dd1ce35859460d9b84331453a115d9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-freepbx-vulnerabilities-sql-injection-file-upload-and-authtype-bypass-flaws-enabling-rem</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1fde1546795742e0be9d3e028c106518~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/zero-click-vulnerability-in-perplexity-comet-browser-allows-full-google-drive-deletion-via-crafted-e</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4c4f9bc4f62240548af55b3f879983d2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/soundcloud-security-breach-2025-user-data-stolen-vpn-access-disrupted-and-shinyhunters-extortion</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f61202973447426e92311649b2992a58~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/albiriox-malware-as-a-service-advanced-android-threat-targets-over-400-banking-fintech-and-crypto</loc>
<lastmod>2025-12-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_df5a95968b834bd2a2696f07359a4919~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shai-hulud-npm-supply-chain-attack-640-malicious-packages-compromise-javascript-ecosystem</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b00cac41c9294b689ac36e18a7bee764~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/wired-database-breach-over-2-3-million-subscriber-records-leaked-in-condé-nast-cyberattack</loc>
<lastmod>2025-12-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_77682934711b49a28c6aaf848233e6e8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-fortiweb-cve-2025-58034-critical-os-command-injection-vulnerability-actively-exploited-in</loc>
<lastmod>2025-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bb49e5cf65804f998ef9d8618e1ba795~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/qilin-ransomware-exploits-south-korean-msp-breach-in-korean-leaks-attack-impacting-28-financial-org</loc>
<lastmod>2025-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_755a3f8a91804da48df4909e99f8989a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-entra-defender-and-purview-security-enhancements-for-identity-defense-and-compliance</loc>
<lastmod>2025-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a5456b161e424c4eb4b06e4b5fb94329~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-68260-critical-race-condition-in-rust-based-android-binder-subsystem-affects-linux-kernel</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_92fa8209d9234f13a48e05101e570391~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/uzbekistan-android-users-targeted-wonderland-sms-stealer-malware-campaign-exposes-banking-and-teleg</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7cffe84c6b81430d8aa56717c76f1da2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lastpass-2022-breach-enabled-years-long-cryptocurrency-thefts-with-over-35m-laundered-through-russi</loc>
<lastmod>2025-12-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_29de8cc3965542b281c56cf0c4807426~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-365-under-attack-oauth-device-code-phishing-campaigns-bypass-mfa-and-compromise-accounts</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0501a1782e4147a388e8b9812f3e527b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rondodox-botnet-actively-exploits-react2shell-vulnerability-cve-2025-55182-in-next-js-and-react-se</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2032dafed9c44202b78514f35a974e3c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-14733-critical-watchguard-firebox-firewall-rce-vulnerability-actively-exploited-in-the-wil</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dfdcd555ad034e4786095a0fc0b62044~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/french-soccer-federation-club-administrative-management-software-breach-member-data-stolen-in-crede</loc>
<lastmod>2025-11-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d2896013d30c4a6bb8407c6067e6e1ae~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/marquis-software-solutions-data-breach-sonicwall-vulnerability-exposes-sensitive-data-of-74-us-ban</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1ab64799e629483c8e996f7a44e6907c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-13915-authentication-bypass-vulnerability-in-ibm-api-connect-impact-exploitation</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_22c914074b0d49f5a5c1d6a3f6111db9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dartmouth-college-data-breach-clop-ransomware-exploits-oracle-e-business-suite-zero-day-cve-2025-6</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ab835cb3f1f74a30a8789c34c6e654fa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt28-credential-phishing-campaign-targets-ukr-net-users-technical-analysis-and-threat-intelligence</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fbdcff8d7d3c4fdabace6918c6e2c461~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisa-adds-critical-asus-live-update-supply-chain-vulnerability-to-kev-after-confirmed-exploitation</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_22050a9657094e9fa23ec08ae7755176~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nissan-fukuoka-customer-management-system-data-breach-exposes-21-000-customers-in-red-hat-gitlab-inc</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b0d49f8aebce4cbb94c6f808f07d5533~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-55182-critical-remote-code-execution-vulnerability-in-react-server-components-and-next-js-1</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_950fd28d5cab4a0394806195d9935519~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-cyberattacks-on-tureby-alkestrup-waterworks-and-danish-election-websites-attribution-impac</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a3ba95a4b64c497f85981d208716d72c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-react2shell-vulnerability-cve-2025-55182-cve-2025-66478-enables-unauthenticated-rce-in-r</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d31644af320f40d3b8090c09d1877969~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-41115-scim-vulnerability-in-grafana-enterprise-allows-remote-impersonation-and-pri</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b1a9454bd5a44a73bd452fb4197a0bf6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/leroy-merlin-france-loyalty-program-data-breach-december-2025-security-incident-analysis-and-techni</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3d153f6e70c8435c97c0c78ee83e52c6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/la-poste-and-la-banque-postale-hit-by-pro-russian-noname057-16-ddos-cyberattack-in-december-2025</loc>
<lastmod>2025-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c74c639d611e46baaaecb2002c2974a4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-55182-critical-react-server-components-vulnerability-react2shell-exploited-in-ransomware</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8604574f721c4019a959c71cd08f4883~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/healthcare-industry-pushes-back-on-hipaa-security-rule-overhaul-impact-on-electronic-protected-heal</loc>
<lastmod>2025-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f0979a4e9389476fabe31c25711544f3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/langgrinch-cve-2025-68664-critical-langchain-core-vulnerability-enables-secret-exfiltration-and-c</loc>
<lastmod>2025-12-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_266233e6a73d4e058b15fbdd83a008f2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-ivanti-and-sap-release-critical-security-patches-for-authentication-bypass-and-remote-cod</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1a2ba8b3a6e54191b25e6245f54b4696~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/watchguard-fireware-os-vpn-vulnerability-cve-2025-14733-actively-exploited-urgent-security-alert</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_afb5cd26b0014807aa338bd1ff95a13a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/coupang-data-breach-exposes-33-7-million-users-insider-threat-reveals-major-gaps-in-south-korea-s-d</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9cde72a5910f49c29377127772e51ebc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cloudflare-bot-management-outage-technical-root-cause-analysis-and-impact-of-the-november-18-2025</loc>
<lastmod>2025-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_913a93d2f16640baafb5c9d9bf0eda2e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-command-injection-vulnerability-in-openai-codex-cli-threatens-developer-endpoints-and-suppl</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0688374a8d7d45b0b5e2d40e0767ec6c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/u-s-doj-charges-54-in-ploutus-malware-atm-jackpotting-attacks-targeting-diebold-nixdorf-and-kaligni</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ccca5ca02df74574b467a9a0599c1c1f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/eurofiber-france-customer-data-breach-hacker-attempts-to-sell-compromised-information-from-customer</loc>
<lastmod>2025-11-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1542cf2f06db4f02a66c0112976f7e61~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/countloader-and-gachiloader-malware-targeting-windows-systems-via-cracked-software-and-youtube-campa</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a6a09c966dc0409da2bfecff33a287e1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt31-exploits-yandex-browser-and-cloud-services-in-stealthy-cyberattacks-on-russian-it-sector</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6f30b070babf4e8ebf4bf749837b7b33~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/surge-in-ransomware-attacks-targeting-japanese-manufacturing-sector-qilin-and-kawa4096-exploit-ot-a</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_963a93574999410b89367fa2065684ab~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/european-space-agency-jira-and-bitbucket-breach-hacker-claims-200gb-data-theft-from-external-server</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f0701073c556467ea84a6012e923ac26~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-xxe-vulnerability-cve-2025-66516-cvss-10-0-in-apache-tika-enables-file-disclosure-ssrf</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe7c6265442d483584a2c99307c09101~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/korean-air-employee-data-breach-via-oracle-e-business-suite-zero-day-cve-2025-61882-clop-ransomwa</loc>
<lastmod>2025-12-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3495446b49ab4bfa92f2d5adfc55201c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisco-asyncos-email-security-appliance-zero-day-cve-2025-20393-actively-exploited-in-ongoing-attac</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_09f3ee63b3d64b46b555abdaa8c25d98~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/stealc-v2-infostealer-delivered-via-malicious-blender-3d-asset-files-threat-analysis-and-mitigation</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_295955ecd9a942399a1ec10b140759a4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sierra-wireless-airlink-aleos-router-vulnerability-cve-2018-4063-added-to-cisa-kev-after</loc>
<lastmod>2025-12-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2a182a2557ec4e67b246ebe9d58a8a48~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pennsylvania-attorney-general-s-office-data-breach-ransomware-attack-leads-to-unauthorized-access-a</loc>
<lastmod>2025-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9f9ad25ee3cb402e9f6300f4625ac3d2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shai-hulud-2-0-npm-supply-chain-attack-exposes-trust-wallet-8-5-million-stolen-in-major-cloud-nati</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1d6b7c2a3f89485f8ff3d7cfe983523a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-pennsylvania-data-breach-oracle-e-business-suite-cve-2025-61882-exploit-by-clop-ran</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_65d3fd9124b74c569882224a29582db3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-zero-day-exploited-in-oracle-identity-manager-cve-2025-61757-pre-auth-rce-vulnerability</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a65bb5c7c8c04e18b66a0c4c7ae0d42e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mongodb-mongobleed-vulnerability-cve-2025-14847-critical-unauthenticated-memory-leak-and-data-exp</loc>
<lastmod>2025-12-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1d6537f0db7e40b486752881b76a476b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/aws-cryptomining-attack-threat-intelligence-on-stolen-iam-credentials-fueling-large-scale-ec2-ecs</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_da0599a598d84e619a9d541b1941addd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fake-mas-windows-activation-domain-infects-windows-systems-with-cosmali-loader-and-xworm-powershell</loc>
<lastmod>2025-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fbb3def6833d4b65b14dd7fcdc262b2d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shadowmq-vulnerabilities-over-30-critical-flaws-in-meta-llama-nvidia-tensorrt-llm-vllm-and-other</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_369365c7b4ff41b2bf04959992af2121~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/operation-reddirection-over-2-million-users-compromised-by-malicious-chrome-and-edge-extensions-in</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3bd714f7247145e59affab5056c9d9e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cox-enterprises-data-breach-cl0p-ransomware-exploits-oracle-e-business-suite-zero-day-vulnerability</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ec5b1717dd044fa4807fbeb91889f5cb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/trust-wallet-chrome-extension-supply-chain-attack-7-million-cryptocurrency-theft-via-compromised-v</loc>
<lastmod>2025-12-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_42f36b20d5314ae2b0417bb841184402~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/badbox-2-0-and-vo1d-botnets-android-tv-streaming-box-infections-impacted-models-and-mitigation-st</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c7b87c4410ea42bcaedf8e3d8175e220~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-in-ibm-api-connect-cve-2025-13915-enables-remote-authentication-bypass-and</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6ebe078c6d5f4fbb9f016b181b638cf0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-55182-critical-remote-code-execution-vulnerability-in-react-server-components-and-next-js</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a857aba70cd342e9a2fb3ecb95ceb62a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kimwolf-botnet-massive-android-tv-box-and-iot-malware-threat-exploiting-global-networks</loc>
<lastmod>2026-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_36e424e2cef34378bf96ac0b7352dc49~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-14847-vulnerability-in-mongodb-server-patch-now-to-prevent-remote-code-execution</loc>
<lastmod>2025-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f4eacde59d4b4fa6b61165c89ed5a66f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-tika-cve-2025-66516-xxe-vulnerability-exposes-over-500-instances-after-incomplete-p</loc>
<lastmod>2025-12-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d7854e1193dc4f90b541fb2009ffe36f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/romanian-waters-apele-române-ransomware-attack-bitlocker-disrupts-1-000-it-systems-water-operati</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41751c5bcf10449b8d3179245f36f332~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/salesforce-security-incident-unauthorized-data-access-via-compromised-gainsight-oauth-integrations</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_96cdb6be605f44ab850f50f624c0ed30~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sonicwall-sma-1000-zero-day-attack-chain-cve-2025-23006-and-cve-2025-40602-actively-exploited-patc</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e0f088f130f042eb969cb3c4f80d1c3a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-phoenix-data-breach-exposes-3-5-million-in-oracle-e-business-suite-ebs-zero-day-atta</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4fea08c047854349afa7b595e32bcc7a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pystorerat-malware-campaign-fake-osint-and-gpt-github-repositories-target-security-researchers-and</loc>
<lastmod>2025-12-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ce0b632150fb4d91b3d04d3c098a79c6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/malicious-rust-crate-evm-units-targets-web3-developers-with-os-specific-malware-via-crates-io-supply</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_57c495652d174c159f29d9deca65185c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/askul-corporation-ransomware-attack-740-000-customer-records-stolen-in-ransomhouse-data-breach-of-b</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ddfb1ec4f4ce4487870a27e9aaaf2d92~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shadypanda-browser-extension-attack-4-3-million-chrome-and-edge-users-compromised-in-multi-year-sup</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_31cc02817d6b4cb7a8359090be99c421~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kimsuky-campaign-uses-qr-phishing-to-distribute-docswap-android-malware-via-fake-cj-logistics-delive</loc>
<lastmod>2025-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_67664f709daf44b1958b7b0e102f132a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/iranian-infy-prince-of-persia-apt-returns-new-microsoft-windows-and-office-malware-campaigns-expl</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3289a64efeb64e1ab304e94130542d9f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/iberia-airline-club-loyalty-data-exposed-in-third-party-vendor-breach-incident-analysis-and-mitigat</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c611f0e6d714d02a9f7b53ed5eaa4c6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/700credit-700dealer-com-data-breach-exposes-5-8-million-records-technical-analysis-impact-and-mit</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d4f577de2446439583e738c600e81cc7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/storm-2372-russia-linked-hackers-exploit-microsoft-365-device-code-phishing-for-account-takeovers</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1269ae834bce47ffa7a1cfbcb16fa6d5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tren-de-aragua-atm-jackpotting-ploutus-malware-exploits-kalignite-platform-in-40m-us-attack</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5bbe77fe3d074ac685a4219534bef3e4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-55182-react2shell-chinese-apt-groups-exploit-critical-react-server-components-vulnerabilit</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_02f4fdafea9b41f9932c4f3b4c66b7a2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/errtraffic-how-clickfix-attacks-exploit-fake-browser-glitches-to-compromise-wordpress-joomla-and</loc>
<lastmod>2025-12-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cda4b5a4b2df4f77b79454096d9c832a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/barts-health-nhs-data-breach-cl0p-ransomware-exploits-oracle-e-business-suite-zero-day-cve-2025-61</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c4a136050eb346dd92d1ce9aed6cd6ae~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-driven-phishing-kits-target-microsoft-365-and-european-banks-with-advanced-mfa-bypass-techniques</loc>
<lastmod>2025-12-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_043692030d76432abd668205573abf53~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/watchguard-firebox-zero-day-cve-2025-14733-actively-exploited-threat-intelligence-and-mitigation</loc>
<lastmod>2025-12-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d428e1a846f14cd9acbeba643bb518ae~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-threat-intelligence-report-widespread-exploitation-of-react-server-components-via-cve-2025</loc>
<lastmod>2025-12-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_838383d4bdb644d38a0796f4a8b6520c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/openai-api-user-data-exposed-in-mixpanel-security-breach-incident-analysis-and-impact-report</loc>
<lastmod>2025-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6ec1083ad8914ad88c649f593262bc9b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rainbow-six-siege-massive-breach-mongobleed-exploit-leads-to-unauthorized-distribution-of-billions</loc>
<lastmod>2025-12-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_622682101c6b48eba1d679b12eee4eba~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apple-urgently-patches-webkit-zero-day-vulnerabilities-exploited-in-targeted-attacks-affecting-ios</loc>
<lastmod>2025-12-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_272601cb56ee4e9ea1721912a10bd5b8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/arcanedoor-exploits-cisco-asa-ftd-vpns-and-ransomware-groups-target-enterprise-email-services-in-202</loc>
<lastmod>2025-12-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_04b5cfccb8f449489444d5b4c6b32bfb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pornhub-premium-user-data-breach-mixpanel-hack-leads-to-extortion-and-privacy-risks</loc>
<lastmod>2025-12-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9973e5152c1c4d7c9d75975877e32f8a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/webrat-malware-campaign-targets-security-researchers-via-fake-cve-exploit-pocs-on-github</loc>
<lastmod>2025-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7d2714b5a0e84177ba09ad719cf67526~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/jackfix-attack-targets-windows-and-macos-advanced-social-engineering-bypasses-clickfix-security-con</loc>
<lastmod>2025-11-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9fb04b78329e476481f8644271b14209~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-patches-critical-zero-day-vulnerabilities-cve-2025-48633-and-cve-2025-48572-in-android-13-16</loc>
<lastmod>2025-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3f09e33c0aea4543805713016d18161a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/react2shell-cve-2025-55182-mass-exploitation-of-react-server-components-and-next-js-threatens-77</loc>
<lastmod>2025-12-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41afe5b8dcbc4350b0369470c85d11e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tsundere-botnet-targets-windows-users-with-fake-game-installers-and-ethereum-based-c2-infrastructure</loc>
<lastmod>2025-11-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5aa287d72b5b4fef9d014ac46e943845~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-exposes-whisper-leak-side-channel-attack-topic-inference-vulnerability-in-encrypted-llm-c</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_627c8daaeeab40eda206bca59333526f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/adaptixc2-under-fire-russian-ransomware-gangs-weaponize-open-source-c2-framework-for-advanced-attac</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6faf8731b6974b639e74f8cb6693a8b3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cophish-attack-exploits-microsoft-copilot-studio-to-steal-oauth-tokens-via-malicious-agents</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ecb01819aebc457fa92fa73d3ccc8b87~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/jingle-thief-how-hackers-exploit-microsoft-365-cloud-services-to-steal-millions-in-retail-gift-card</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dbaa239822c54a0ba4119794d5c1b102~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/evolving-clickfix-attacks-targeting-macos-social-engineering-multi-platform-payloads-and-credenti</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ed9645f22b1d4e0c9dddcb5f2f0b2b3b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-pennsylvania-pennkey-sso-breach-exposes-1-2-million-donor-records-in-major-data-leak</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ff944c645ad54181a5b75b51c3f257a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/jabber-zeus-banking-trojan-ukrainian-developer-extradited-to-us-for-major-windows-based-cybercrime</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_07fd8a694392444e81a5f955f8542a27~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/university-of-pennsylvania-we-got-hacked-email-incident-abuse-of-connect-upenn-edu-on-salesforce</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c47f214d37104ec1a1b7edce97c24dd0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/smishing-triad-exploits-sms-phishing-to-target-usps-e-zpass-irs-and-financial-systems-using-194-0</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1d519780eb984da5b7743a9a79ec3a5c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/checkout-com-internal-systems-data-breach-exposes-sensitive-data-following-extortion-attempt</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f073c7f0872e4673abebb12701f8855a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-lazarus-group-uses-trojanized-mupdf-and-notepad-plugins-to-target-european-uav-and-dr</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f397882cd90443eea1950242c60244d6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisco-asa-and-ftd-firewall-vulnerabilities-active-exploitation-of-cve-2025-20333-and-cve-2025-20362</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_da61cd3cdca743fd89a9939f57f5eee2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/anthropic-s-claims-of-claude-ai-automated-cyberattacks-face-industry-skepticism-and-technical-scruti</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1cd6fc1fe1f84fe2902f9a2814aa1b9f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/qilin-agenda-ransomware-targets-windows-and-linux-with-hybrid-byovd-exploit-and-cross-platform-pay</loc>
<lastmod>2025-10-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_358d220a23824b849725f0bded0796db~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tarmageddon-cve-2025-62518-critical-supply-chain-vulnerability-in-async-tar-and-tokio-tar-rust-li</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ed35f93d1d7b4d04ba135818144f8b9c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-59287-vulnerability-in-microsoft-wsus-emergency-patch-issued-to-prevent-remote-co</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cffc743cbdf4474b96dc0439bc0d7c93~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-61932-critical-lanscope-endpoint-manager-vulnerability-actively-exploited-in-cyberattacks</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_118802f6a71a4501a9cc81b56c037856~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/congressional-budget-office-cbo-cisco-asa-firewall-breach-cyberattack-details-impact-and-securi</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b0e16f9f868f4250929c8e12a7474b39~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sessionreaper-cve-2025-54236-active-exploitation-of-critical-adobe-magento-vulnerability-threaten</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_43afbe3f56cb47e4b5fc41fcf745ac53~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fake-solidity-vscode-extension-on-open-vsx-used-to-backdoor-blockchain-developers-and-steal-cryptocu</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cbb0c4c9bced463e9cee36327c751058~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/too-many-secrets-huntress-exposes-credential-theft-and-sensitive-data-sprawl-in-supply-chain-and-ba</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_60e09e19d0014b21ae639725fc8276e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-rce-vulnerability-cve-2025-12735-in-javascript-library-expr-eval-and-expr-eval-fork-ris</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_552d1aad89904f5ea54239203e5baa59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/linkedin-phishing-attack-exploits-microsoft-365-accounts-to-target-finance-executives-with-fake-boar</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f931506c65a74fcc9333143748902262~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/homoglyph-supply-chain-attack-targets-nuget-fake-netherеum-all-package-steals-ethereum-wallet-keys</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bbdca591bfe2427e9e2cd5717551a46e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tiktok-clickfix-attacks-targeting-windows-users-infostealer-malware-delivered-via-powershell-social</loc>
<lastmod>2025-10-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1f7f329716b54ad48cf34f16a2f09a45~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-hackers-target-hospitality-sector-4-300-fake-hotel-booking-sites-created-to-steal-guest-pay</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9f4b346456cc48d9b373950f672a600a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shai-hulud-worm-attack-compromises-npm-registry-over-46-000-malicious-packages-and-widespread-crede</loc>
<lastmod>2025-11-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f153d8585ee244d7a84faf0731aa604e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cargo-freight-cyber-heists-hackers-exploit-screenconnect-and-simplehelp-rmm-tools-to-hijack-logisti</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d4bd208eb9964378aae052615ea59adf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/samsung-galaxy-zero-day-cve-2025-21042-exploited-to-deploy-landfall-android-spyware-via-whatsapp-d</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f11f5b658fc4448095a42fdc223fd121~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/over-250-magento-and-adobe-commerce-stores-compromised-via-cve-2025-54236-sessionreaper-vulnerabilit</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b00a0c75fc3e4f0fbb1276ec8af9515c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/capi-backdoor-new-net-malware-targets-windows-systems-in-russian-automotive-and-e-commerce-sectors</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d34f04bb71df48468c95104ebde05628~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-uncovers-sesameop-malware-openai-assistants-api-abused-for-stealthy-command-and-control-o</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0b429baba7684bcc8b4df2b06aee656b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/threatsday-bulletin-bind-9-dns-poisoning-cve-2025-40778-npm-supply-chain-attack-rust-malware-a</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_303a88665b864ec3800541e05312a020~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cves-impacting-connectwise-automate-urgent-patch-required-to-prevent-aitm-update-attacks</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a22d0c2cf2704e85802cf4ecb160f989~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/china-accuses-us-nsa-of-cyberattacks-targeting-national-time-service-center-2022-2024</loc>
<lastmod>2025-10-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_65a9f670f9ad4ec79eb0e61f6ee9a67e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-patched-in-mozilla-firefox-145-and-google-chrome-142-update-now-to-prevent</loc>
<lastmod>2025-11-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_843b6853fb1a4b26a70ca6a13c1dde1b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc6384-exploits-windows-lnk-vulnerability-cve-2025-9491-to-target-european-diplomatic-entities</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b0b177d5297a4b8fb01a3f28733137ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/envoy-air-data-breach-clop-ransomware-exploits-oracle-e-business-suite-zero-day-cve-2025-61882</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3da2ea60cf924366ba665c9a6270eca8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/f5-big-ip-vulnerabilities-exploited-85-surge-in-us-government-cyberattacks-amid-2025-shutdown</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_52ac3d6641974b04b673262a03e78d8c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/iranian-spearspecter-apt-targets-microsoft-systems-in-defense-and-government-cyber-espionage-campaig</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bf2584738c3a413da3d18cfd8afa83e4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-apts-target-node-js-ecosystem-beavertail-ottercookie-javascript-malware-exploits-npm-s</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9fb6e934cea840d9b30a7bae04b7b218~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-malware-infects-visual-studio-code-extensions-open-vsx-and-github-supply-chain-attack-ana</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_84e3bced3f2f4b41a3cd2e11457ffb9f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-11953-critical-os-command-injection-vulnerability-in-react-native-community-cli-s-metro-de</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cbb0c4c9bced463e9cee36327c751058~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/akira-ransomware-group-exploits-cisco-asa-and-fortinet-vpn-vulnerabilities-to-amass-244-million-in</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_914a0de82e4f4ffb8d35b5836a36d858~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/citrixbleed-2-cve-2025-5777-zero-day-critical-memory-leak-hits-citrix-netscaler-adc-and-gateway-s</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_987fcaca74094515a25ed8c4e912e5b9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tarmageddon-cve-2025-62518-critical-rce-vulnerability-in-rust-async-tar-and-tokio-tar-libraries-t</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_47a0d73f29264a1c9ee294a68056fd69~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/httptroy-backdoor-targets-windows-systems-via-fake-vpn-invoice-in-kimsuky-cyberattack-on-south-korea</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9583da604d1a4d4fa8b6c698c62caf4d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cryptomus-crypto-platform-fined-176m-by-canada-for-facilitating-cybercrime-and-money-laundering</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4f0692adea9649d89935f35645c89484~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/youtube-ghost-network-3-000-malicious-videos-used-to-spread-infostealer-malware-via-compromised-cha</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2f035e2a5d354594b9fdb71a85a9fc07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mss-accuses-nsa-of-multi-stage-cyberattack-using-42-tools-against-china-s-national-time-service-cent</loc>
<lastmod>2025-10-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2d89a9ff761341cea5a3a063a818e596~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/operation-skycloak-tor-enabled-openssh-for-windows-backdoor-targets-defense-and-military-sectors-in</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b2c3a8971cb74804b8a33bd6577481aa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-apts-exploit-json-based-cloud-apis-for-covert-malware-delivery-and-c2-operations</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4e92ed5281ea4cd5a6d5bd19d353bb33~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/crocodilus-android-malware-targets-spain-and-turkey-mutes-alerts-and-drains-2-8m-in-crypto-wallets</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c3786588826543748e00cba0664e9dcb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/operation-forumtroll-italian-spyware-vendor-memento-labs-exploits-chrome-zero-day-cve-2025-2783-i</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d75d3279254548198e9fcb4ec7c4201d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nikkei-slack-data-breach-exposes-personal-information-of-17-000-employees-and-partners-incident-ana</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b243e673857048b3ab93118c68c2b539~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rondodox-botnet-actively-exploits-unpatched-xwiki-server-vulnerabilities-threat-analysis-and-mitiga</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a0888d2df1d54ac993bd6bbad33a4a53~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/landfall-android-spyware-exploiting-cve-2025-21042-zero-day-to-target-samsung-galaxy-devices</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8614dce1b9904ca382d752c7340e136a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-malware-resurfaces-3-malicious-vscode-extensions-discovered-on-openvsx-supply-chain</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_714d7e54f4424d4bb7a908c7d6547129~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/trojanized-eset-av-remover-installers-spread-kalambur-backdoor-in-targeted-phishing-attacks-on-ukrai</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_23f2d44dbd8b4840b0a7c697978d93b0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chinese-apt-groups-exploit-anthropic-ai-to-launch-automated-cyber-espionage-attacks-targeting-micros</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_32af6c11bbf74e4288f0c330a050bd7b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sidewinder-uses-clickonce-to-target-south-asian-diplomatic-entities-via-magtek-readerconfiguration-e</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_33d5945c54b04770aeb47a3143d734c3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-refutes-claims-of-massive-gmail-data-breach-analysis-reveals-stolen-credentials-originated-f</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3e11aaf2c809492dbfd962352cd2e8b4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-privilege-escalation-vulnerabilities-in-ivanti-endpoint-manager-and-zoom-workplace-vdi-clie</loc>
<lastmod>2025-11-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_20bcd8fa388844abbac9a769d2ce64bd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/remote-monitoring-and-management-rmm-tools-exploited-in-logistics-and-freight-cyberattacks-resca</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3e48be1567284c46858e30779724e5f5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-watchguard-fireware-os-vpn-vulnerability-cve-2025-9242-allows-unauthenticated-remote-devi</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_40d15e6fce3b422892629e29e14822a7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/conduent-business-solutions-data-breach-2024-2025-over-10-5-million-affected-across-healthcare-g</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_47f99909507d48978c552a84f256eca7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kimsuky-deploys-httptroy-backdoor-to-target-windows-systems-in-south-korea-via-vpn-invoice-phishing</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b0497af4fa12436cb52651678bd076fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt37-exploits-google-find-hub-to-wipe-android-devices-in-targeted-south-korean-attacks</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6a9537e83154478dafaf3a26d029cb18~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fake-lastpass-death-claims-phishing-campaign-exploits-emergency-access-to-breach-password-vaults</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_33f12c9043714fe78e281128181544b5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-12480-triofox-zero-day-exploited-to-deploy-remote-access-tools-via-antivirus-feature-misus</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d9836a29b38b41799e53a62bd4c87953~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/brash-exploit-critical-chromium-browser-zero-day-enables-instant-dos-via-malicious-url</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_aaf04ebc5b65437db2e971efa6be2bcf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-ransomware-groups-exploit-adaptixc2-advanced-attacks-targeting-windows-linux-and-macos-sy</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_48a1e68af6634e96ad8dc082aa11d945~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt36-deploys-golang-deskrat-malware-via-phishing-against-indian-government-linux-systems</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0e555fcc4991408dba64f175f07577d5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-the-128-million-balancer-v2-defi-exploit-attack-vectors-impact-and-mit</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b8cc5869c075467bbea2e63450a41d75~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/akira-ransomware-as-a-service-campaign-actively-targeting-nutanix-virtual-machines-in-critical-organ</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e6b9e23efe4343a09af4d77daf767065~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/landfall-android-spyware-exploits-cve-2025-21042-zero-day-to-target-samsung-galaxy-devices-via-whats</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b8565832577d4491b7180b71b5c4af29~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/eurojust-led-operation-disrupts-600-million-cryptocurrency-investment-fraud-network-exploiting-fake</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2f6fec5c5a4847f28dbaf498a4e3810d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chrome-zero-day-exploited-memento-spyware-campaign-targets-windows-systems-with-leetagent-and-dante</loc>
<lastmod>2025-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_726c734b1ded4faf984743ef843cf389~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/surge-in-ransomware-and-ddos-attacks-targeting-microsoft-wordpress-and-network-appliances-in-mena</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4c4cb11e61bb4194a103778701de9a69~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-supply-chain-attack-on-open-vsx-registry-technical-analysis-and-mitigation-of-malicious-e</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e9b510c2cb7a4261a93ee5c39de6b61c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nation-state-supply-chain-attack-ribbon-communications-it-network-breach-exposes-telecom-sector-vul</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_adae851ef6ec493b806b0450c9126a94~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apache-openoffice-disputes-akira-ransomware-data-breach-claims-no-evidence-found-of-compromise</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a14cdea83ed84c94a02c14e07155f254~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sesameop-malware-exploits-openai-api-for-c2-in-microsoft-visual-studio-attacks</loc>
<lastmod>2025-11-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8d8c789a383447fa93cc3cfb1db24b20~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-malware-infects-thousands-via-malicious-visual-studio-code-extensions-supply-chain-attack</loc>
<lastmod>2025-11-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b17fe0c60e1048b8820d99d679a8e9dc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/malicious-nuget-packages-plant-time-delayed-logic-bombs-targeting-net-database-and-ics-systems</loc>
<lastmod>2025-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fc57439f54114069a5a38d9b9f1a27bf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/digitalmint-and-sygnia-cybersecurity-insiders-indicted-for-alphv-blackcat-ransomware-attacks-on-crit</loc>
<lastmod>2025-11-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_08b7a2cc0cb54e2985a23cf526d85877~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-teams-targeted-vanilla-tempest-abuses-azure-certificates-in-ransomware-attack-disrupted-b</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_debae7818f394cbdb41ffb61f8cec913~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/hyundai-autoever-america-data-breach-exposes-sensitive-personal-information-in-2025</loc>
<lastmod>2025-11-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_73cc928b720644b9b24d051f56f916f2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/europol-dismantles-simcartel-sim-box-network-used-for-mass-fake-account-creation-and-global-cybercri</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ec101a2f8d84418091c5c42d94442408~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/glassworm-supply-chain-attack-self-spreading-malware-infects-visual-studio-code-vs-code-extension</loc>
<lastmod>2025-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1c2d3ee00d514a84a729ac5e8a99c1fe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/muddywater-targets-mena-government-organizations-with-phoenix-v4-backdoor-in-large-scale-cyber-espio</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6ff4b59ac12b4dca9ab1a344bf3d45de~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/china-linked-tick-group-exploits-lanscope-endpoint-manager-zero-day-cve-2025-61932-in-targeted-att</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_97b43970e9ba4db793d101b01cfe4525~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-lanscope-endpoint-manager-zero-day-vulnerability-cve-2025-61932-actively-exploited-patc</loc>
<lastmod>2025-10-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ae8f1c1563e547f9ad5e01c5237d1653~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/phantomraven-supply-chain-attack-126-malicious-npm-packages-stealing-github-tokens-and-ci-cd-secret</loc>
<lastmod>2025-11-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a123e919d3724cc1adbbde80a9e8e3f9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-zero-day-exploits-target-cisco-ise-and-citrix-netscaler-amazon-uncovers-in-the-wild-attack</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d6ae5f5100164291aea1823b37a7bffd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/logitech-moveit-data-breach-confirmed-after-clop-ransomware-extortion-attack</loc>
<lastmod>2025-11-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_de29ef2818c24d289b462335861d7bde~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/canadian-critical-infrastructure-hack-hacktivists-tamper-with-ics-at-water-oil-and-agriculture-fa</loc>
<lastmod>2025-10-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f1ea3d85e64845a7aa20d0434efea66e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/airstalk-malware-exploits-vmware-workspace-one-uem-apis-in-sophisticated-nation-state-supply-chain-a</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_65662411e5e140e4995fc0d4e22ca874~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-54957-dolby-decoder-vulnerability-enables-zero-click-rce-attacks-on-android-device</loc>
<lastmod>2025-10-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_aebf6db9f03c403a9a839f018e5cd561~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/meduza-stealer-malware-russian-authorities-arrest-suspected-operators-after-astrakhan-government-da</loc>
<lastmod>2025-11-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fb29e77bcb0a4912b7f1840c51409109~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/velociraptor-forensic-tool-exploited-to-deploy-visual-studio-code-for-covert-c2-tunneling-a-cyberse</loc>
<lastmod>2025-08-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e501d21cdfb948719b101f795cdfee8b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/batshadow-group-exploits-windows-systems-with-new-go-based-vampire-bot-malware-targeting-job-seekers</loc>
<lastmod>2025-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_779a2a233fac45a188465555689ed0ef~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/us-offers-10m-reward-for-ukrainian-ransomware-operator-targeting-critical-infrastructure-systems</loc>
<lastmod>2025-09-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f68d37e37ec24f5f87c45638172588a3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/amazon-disrupts-apt29-watering-hole-attack-exploiting-microsoft-device-code-authentication-vulnerabi</loc>
<lastmod>2025-08-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e7666ab2036a44ae9f93501f547e2cd8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mysterious-elephant-apt-k-47-targets-south-asian-government-networks-with-advanced-custom-malware</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_334445f9e4be4ad5b86c03a242d6647f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-analysis-of-docker-desktop-vulnerability-container-escape-host-compromise-and-apt-exploi</loc>
<lastmod>2025-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f7c26501a8644551abc6381c31d0b91e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cloudflare-supply-chain-attack-in-depth-analysis-of-the-salesloft-drift-compromise-impacting-api-cr</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_11c93dbe243d4782a88ec8481ddd08ee~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/zimbra-cve-2025-27915-zero-day-exploited-via-malicious-ics-files-to-breach-brazilian-military-system</loc>
<lastmod>2025-10-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b884b04ff3a94740a2db3e3458177871~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/crash-testing-bas-how-behavioral-analytics-security-validates-real-time-cyber-defense</loc>
<lastmod>2025-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0ba60019b91b45f5b3fd701336b285a4~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/killsec-ransomware-exploits-legacy-rdp-vulnerabilities-at-brazilian-healthcare-software-provider</loc>
<lastmod>2025-09-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fcea11b51523423aa80595a8938ce566~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sonicwall-ssl-vpn-vulnerability-exploited-by-akira-ransomware-comprehensive-analysis-of-misconfigur</loc>
<lastmod>2025-09-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7ece95106f1340b085209f12be33b725~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/zendesk-email-bomb-attacks-exploiting-lax-authentication-and-anonymous-ticket-creation</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a1e400220acb4d8d8c3272a194dc2847~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/salesloft-github-account-compromise-detailed-analysis-of-internal-credential-breach-and-mitigation</loc>
<lastmod>2025-09-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_403039f163e74d9697bebb90a75520ec~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt36-exploits-linux-desktop-files-to-install-malware-on-linux-systems</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8b348bdf2c334725b588f4fcd2f8ca63~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/finwise-bank-insider-breach-exposes-689-000-american-first-finance-customers-through-credential-mism</loc>
<lastmod>2025-09-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_91d1237ee8f345ba9fd6816531d159f2~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/citrix-gear-zero-day-vulnerability-exploited-for-unauthenticated-rce-comprehensive-analysis-and-mit</loc>
<lastmod>2025-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7dbafbe4e4c44e13af38ce65f4a368a3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-adobe-aem-forms-jee-vulnerability-cve-2025-54253-under-active-exploitation-cisa-alerts</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c59e6e766b294a2db02685e5b60ec8c4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/virustotal-exposes-44-undetected-svg-files-leveraging-base64-encoding-to-deploy-phishing-pages-on-we</loc>
<lastmod>2025-09-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b50fd5e07f094ec6826e8abb23f52197~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nevada-cyberattack-on-legacy-databases-disrupts-it-systems-and-forces-state-office-closures</loc>
<lastmod>2025-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0cd5da926e9e422c88831459921c4e30~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/scattered-lapsus-hunters-launch-data-leak-site-targeting-salesforce-massive-oauth-supply-chain-bre</loc>
<lastmod>2025-10-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3b840434a36f4c50924ca16a7a08a76d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/new-phoenix-attack-bypassing-rowhammer-defenses-in-ddr5-memory-systems</loc>
<lastmod>2025-09-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f8216d0cb82747b4a1c00bfcef1b2778~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortra-goanywhere-zero-day-cvss-10-exploit-in-depth-analysis-and-mitigation-strategies</loc>
<lastmod>2025-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bdc70c7c807043b8a04cc81b066f514a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-cybersecurity-report-linux-servers-targeted-by-malware-using-malicious-rar-filenames-to-eva</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_335a089ad5ed4633ab3c49ebc9335bd8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/salesloft-drift-supply-chain-attack-exposes-zscaler-palo-alto-networks-technical-analysis-and-mit</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1676c2b969904660bdc61b41bc0d166f~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-cybersecurity-report-cisco-asa-firewall-zero-day-exploits-using-rayinitiator-and-line</loc>
<lastmod>2025-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6a729fb9484d44558043d1807cefdbde~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortra-s-critical-patch-mitigates-cvss-10-0-remote-code-execution-vulnerability-in-goanywhere-mft</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ebb97b2c942043cb8f4d2bfaf40b038e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/feds-tie-scattered-spider-duo-to-115m-in-ransoms-legacy-system-exploits-in-municipal-and-financial</loc>
<lastmod>2025-09-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_60e101a801674722b96e3eeeeb1279aa~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pixnapping-cve-2025-48561-critical-android-vulnerability-enables-stealthy-theft-of-2fa-codes-and</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_36704d04fc194c719484a603e4d73035~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/click-studios-patch-mitigates-passwordstate-emergency-access-authentication-bypass-vulnerability-exp</loc>
<lastmod>2025-08-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c0f20ed654fb4ff98e64575f638b7d2f~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/taldor-cyber-attack-in-depth-analysis-of-advanced-malware-intrusion-in-industrial-systems</loc>
<lastmod>2025-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_db60d0b7715046628b59680db273df17~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/czech-cyber-agency-warns-chinese-tech-vulnerabilities-in-critical-infrastructure-systems-and-supply</loc>
<lastmod>2025-09-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9fdada6b852a4e1887568cd6e928c249~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-ta585-s-monsterv2-malware-attack-chain-technical-innovations-and-risks</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2ea277df851c4e6f8bb240390c48e922~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sap-netweaver-cvss-10-and-sap-s-4hana-vulnerabilities-apt-exploitation-and-urgent-patchi</loc>
<lastmod>2025-09-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_33de077b098244fcb7756f19d83a822e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chip-programming-firm-data-i-o-ransomware-incident-detailed-analysis-of-phishing-exploits-remote-a</loc>
<lastmod>2025-08-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3778dad90078460794de7491a7f0d7d2~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/over-6-700-private-repositories-exposed-in-nx-supply-chain-attack-misconfigured-access-controls-exp</loc>
<lastmod>2025-09-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c49e34be1cd04e25ae4dea48be9ea49e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-announces-free-windows-10-security-updates-in-europe-for-legacy-system-protection</loc>
<lastmod>2025-09-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e9d133f7c4034789aeb89ce43516da60~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/whatsapp-zero-click-exploit-emergency-update-for-ios-and-macos-cve-2025-55177</loc>
<lastmod>2025-08-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1282542f91184a11a32c570a624d2036~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/phishing-campaign-uses-upcrypter-in-fake-voicemail-emails-to-deliver-rat-payloads-an-in-depth-windo</loc>
<lastmod>2025-08-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f14aa088161545aa9e25498b50f3d22c~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shadowleak-vulnerability-chatgpt-deep-research-agent-flaw-enables-invisible-gmail-email-theft</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1dbfafd642ed4e3fbfba1b0ff7676a9b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/silk-typhoon-exploits-commvault-vulnerabilities-to-breach-north-american-cloud-infrastructures</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b570fdcd44d9469493a1951110122462~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/samsung-android-secure-boot-kernel-integrity-patched-cve-2025-21043-zero-day-exploit-fixed</loc>
<lastmod>2025-09-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5d59399c0e854b1cb6bef26d337e4465~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/scattered-spider-resurgence-financial-sector-targeted-with-microsoft-exchange-server-vulnerabilitie</loc>
<lastmod>2025-09-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ccbaec1b462044ad985052e4a5894333~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mystrodx-backdoor-exploits-dns-and-icmp-to-compromise-netgear-prosafe-series-networks</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_944fad4671134f41b60e4d2687a32b9e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/discord-zendesk-data-breach-2025-support-ticket-system-compromised-by-scattered-lapsus-hunters</loc>
<lastmod>2025-10-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c4747df467074bb68818e575586592b0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lazarus-group-expands-malware-arsenal-with-pondrat-themeforestrat-and-remotepe-threat-analysis-on</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0207ea570f134313b90bc6d859742dbf~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unmasking-gpt-4-powered-malterminal-malware-s-ransomware-and-reverse-shell-exploitation</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_193deaf41362496e92cfb41195ecbdd7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fake-microsoft-teams-installers-delivering-oyster-malware-via-malvertising-comprehensive-threat-ana</loc>
<lastmod>2025-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0164ff17dc6f47a9a3d0dc64550dae10~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-s-android-developer-verification-initiative-blocking-malware-on-google-play</loc>
<lastmod>2025-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3ec1ac5675a5441eaa0af369fcce5a59~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/bk-technologies-it-systems-breach-employee-data-compromised-in-public-safety-communications-cyberat</loc>
<lastmod>2025-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b1f83af7b9824d51aeb37f68ca561f3c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc1549-cyber-attack-linkedin-job-lures-minibike-malware-breach-telecom-remote-management-systems</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a213af12e25d4d008445d9e88e393442~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-5086-in-delmia-apriso-critical-vulnerability-actively-exploited-with-cisa-warning-and-miti</loc>
<lastmod>2025-09-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_db9fb4c403a24dcb9311274090572fc8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/silver-fox-expands-winos-4-0-valleyrat-and-holdinghands-rat-cyber-attacks-to-japan-and-malaysia</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9a70aa8bc0ff4f649c82715258b9af50~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/harvard-university-data-breach-cl0p-ransomware-exploits-oracle-e-business-suite-zero-day-cve-2025</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_667e1957b8a54a65ada91bc38b623817~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-hackers-gamaredon-and-turla-deploy-kazuar-backdoor-against-ukrainian-government-secure-works</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f8bc8bc461d2498ea92a41b31f67505d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mostererat-malware-on-windows-advanced-process-injection-and-security-tool-blocking-uncovered</loc>
<lastmod>2025-09-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d449165a17cf45dfac859d09219a55a3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-cybersecurity-analysis-google-salesforce-attacks-via-third-party-app-vulnerabilities</loc>
<lastmod>2025-08-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8d57b8e35e214df79cbc81376b1c3eee~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/flax-typhoon-exploits-arcgis-servers-chinese-apt-turns-soe-into-persistent-backdoor</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6667e75fb0a546bbbce86148652ddefd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-cybersecurity-report-grok-ai-exploits-us-manufacturing-attacks-and-gmail-security-debunke</loc>
<lastmod>2025-09-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c19d44e2b05b41b187deaa5182194f35~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2025-54236-addressing-adobe-commerce-s-critical-input-sanitization-flaw-for-customer</loc>
<lastmod>2025-09-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_389a2ea829b345dfae2c847277ff3399~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ftc-urges-tech-firms-to-defend-critical-digital-encryption-systems-against-foreign-anti-encryption-d</loc>
<lastmod>2025-08-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eb5c45a4b4904e79b40417fd1d93d216~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/f5-big-ip-breach-2025-nation-state-attack-exposes-source-code-and-undisclosed-vulnerabilities</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2b7aae3434454e6ea5a1b481b54a8805~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-research-in-depth-analysis-of-the-first-ai-powered-ransomware-leveraging-openai-s-gpt-oss-2</loc>
<lastmod>2025-08-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c428b77534f4b57a74f7fccbd01b9c2~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploited-git-vulnerability-exposed-urgent-security-alert-for-git-systems-in-organizations</loc>
<lastmod>2025-08-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d5813af6b47d4029b9f315802f17e0c4~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/gcore-radar-report-2025-gaming-platforms-under-siege-from-sophisticated-ddos-attacks</loc>
<lastmod>2025-09-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ae54ca7b9a294017aef50f29bff9f768~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-edge-ie-mode-exploited-as-backdoor-zero-day-vulnerability-forces-emergency-restrictions</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_89e1352517b34903b3fbdff715d7c938~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-analysis-of-tp-link-firmware-and-whatsapp-vulnerabilities-added-to-the-cisa-kev-catalog</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c4043aaaf90b4a389620dd08da8ace9d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-delmia-factory-software-vulnerability-exploited-in-cyber-attacks-trends</loc>
<lastmod>2025-09-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f418502c15454541a5dff0de72f8e587~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/wealthsimple-supply-chain-attack-how-third-party-software-vulnerabilities-compromised-the-wealthsim</loc>
<lastmod>2025-09-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9f76c279e87c4212869fb9c1e420c488~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/oracle-e-business-suite-zero-day-exploit-leaked-by-shinyhunters-cve-2025-61884-analysis-and-mitigat</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_160c521002dc468a94b0b9cee4b54715~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ghostaction-github-supply-chain-attack-hackers-steal-3-325-secrets-from-a-critical-ci-cd-repository</loc>
<lastmod>2025-09-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e792d3f285f7425bbb000fab5d855dc6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/insightlock-ransomware-breach-how-vc-giant-insight-partners-critical-systems-were-compromised</loc>
<lastmod>2025-09-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_06d4d74ca911428eae69d4ad19be082b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/new-coldriver-malware-campaign-targets-windows-systems-bo-team-and-bearlyfy-join-russia-focused-cyb</loc>
<lastmod>2025-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7e3b8a61fb344c5cb10d4b38d28e2ca6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/malicious-crypto-stealing-vscode-extensions-target-openvsx-and-ai-code-editors-threat-analysis-and</loc>
<lastmod>2025-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e60c38499d1a454083cab091702fcfc1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/jewelbug-chinese-apt-infiltrates-russian-it-service-provider-multi-month-espionage-and-supply-cha</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4dd0dd1f5d984466aace74782311b724~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-analysis-supply-chain-poisoning-of-popular-npm-packages-exploiting-event-stream-ua-parser</loc>
<lastmod>2025-09-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2f19990931e24bccb84650fb3ab8cdbe~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sap-netweaver-as-java-vulnerability-cve-2025-42944-allows-unauthenticated-remote-server-t</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0951c21ce4d74ac3934cb121ed0121e6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-fortigate-ivanti-connect-secure-and-nvidia-gpu-driver-security-updates-in-depth-vulnerab</loc>
<lastmod>2025-09-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_986f2635d3ad4502a707f6165ff1e5e7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-hackers-exploit-akdoortea-backdoor-to-target-cryptodev-toolkit-comprehensive-cybersec</loc>
<lastmod>2025-09-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_02207dfdab28434bb30396969ef88d40~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyberattack-on-iranian-maritime-communication-systems-exploiting-legacy-software-vulnerabilities-wi</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1dd6ea114d6e4a9291fb6019b2abf527~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sorvepotel-malware-comprehensive-analysis-of-self-spreading-whatsapp-threat-targeting-windows-syste</loc>
<lastmod>2025-10-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5e3658c0d227428ab669ae19ab4d3a6e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fake-lastpass-and-bitwarden-breach-alerts-used-in-phishing-campaign-to-hijack-pcs-via-syncro-msp-and</loc>
<lastmod>2025-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c6b849007d643fa99946c6aa56ec069~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sangoma-patches-critical-freepbx-zero-day-vulnerability-exploited-by-hackers-in-depth-cybersecurit</loc>
<lastmod>2025-09-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a7eb062f635b4731a78b849cc7df2a65~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/davita-healthcare-data-breach-analysis-ransomware-attack-exfiltrates-data-of-2-7-million-patients</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe0fc893b68d4e899c1b0e8590dcda5e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/shai-hulud-worm-targets-npm-ecosystem-stealing-secrets-from-180-packages</loc>
<lastmod>2025-09-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_67fba0821293431a83e2f4d75f900698~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/npm-supply-chain-attack-in-depth-analysis-of-the-whimper-exploit-on-debug-and-chalk-packages</loc>
<lastmod>2025-09-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_416e53fed4ca4ff1b47a878526c900a6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/openssl-september-2025-vulnerabilities-critical-cves-enable-private-key-recovery-code-execution-a</loc>
<lastmod>2025-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7af2863ac0194a3bb1a081b609081206~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/asahi-group-holdings-ransomware-attack-2025-digital-order-system-disrupted-nationwide-beer-shortag</loc>
<lastmod>2025-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f11e1c736803422085c9a6d728128bdd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-9074-critical-docker-desktop-container-escape-vulnerability-cvss-9-3-analysis-and-miti</loc>
<lastmod>2025-08-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_95171fdb12324f06b21502388b16df41~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/attackers-season-spam-with-a-touch-of-salt-to-bypass-microsoft-365-and-google-workspace-email-secu</loc>
<lastmod>2025-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8413ac21cdee4aa6a9532ba8b70f0e70~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/draftkings-account-breaches-credential-stuffing-attacks-expose-customer-data-and-financial-risks</loc>
<lastmod>2025-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_21403691a7a845da947116e20d7f618f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/transparent-tribe-s-weaponized-desktop-shortcuts-phishing-attack-compromises-indian-government-netwo</loc>
<lastmod>2025-08-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7504a6cc7372405ead1071a48b1c610b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/s1ngularity-supply-chain-attack-on-nx-build-system-in-depth-analysis-mitigation-strategies</loc>
<lastmod>2025-08-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8308976b004748039f1813b847f4f70a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sni5gect-attack-exposes-5g-signaling-flaws-in-sx-5g-systems-crashing-phones-and-forcing-4g-downgrad</loc>
<lastmod>2025-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ca362cf230b1431f822de29955c4c3a0~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-teams-targeted-in-rhysida-ransomware-campaign-over-200-fraudulent-certificates-revoked-by</loc>
<lastmod>2025-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8b4027d9ca544e32bf71121b24476e85~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/china-linked-plugx-and-bookworm-attacks-on-huawei-u2000-telecom-systems-in-asean-in-depth-cyber-th</loc>
<lastmod>2025-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_336f8cf0ffee4582adb4f901a28c1f3e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chinese-cybercrime-group-exploits-iis-servers-worldwide-for-seo-fraud-and-credential-theft</loc>
<lastmod>2025-10-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2cd5d65689954ababaae49e49486d9e2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/geoserver-exploits-polaredge-tactics-and-the-gayfemboy-push-cybercrime-campaign-a-rescana-cyberse</loc>
<lastmod>2025-08-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d68ce5df99ea4db498515c611a645343~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-the-scattered-spider-vulnerability-in-chrome-v8-firefox-spidermonkey-and-safari-webkit</loc>
<lastmod>2025-09-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0674a88303e94c139a9bd29ee11b5e07~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/canada-dismantles-tradeogre-exchange-40-million-in-cryptocurrency-seized-in-landmark-cybersecurity</loc>
<lastmod>2025-09-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d0891bc2643e4d6abc3dfdb7abd944b2~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sap-s-4hana-cve-2025-42957-critical-vulnerability-analysis-exploitation-in-the-wild-impact-and-mi</loc>
<lastmod>2025-09-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_40c54861a32748aab60ce90e971085b0~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-os-command-injection-vulnerability-in-mitsubishi-electric-smartrtu-detailed-analysis-and-m</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_701433f745214a02be25a9b29296c2a5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/poisonseed-attacker-exploit-exposes-critical-vulnerabilities-in-fido-server-software-and-key-firmwar</loc>
<lastmod>2025-07-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6e870f4b2171432a8d415215d791a06d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dragonforce-ransomware-attack-on-co-op-s-it-networks</loc>
<lastmod>2025-05-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4314b71f0c2745c286d6b065280b32c0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/china-linked-lapdogs-cyber-espionage-campaign-compromises-over-1-000-soho-devices</loc>
<lastmod>2025-06-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bf26c0180789498982461295d382e6fd~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lessons-from-the-iij-breach-strengthening-cybersecurity-for-japanese-enterprises</loc>
<lastmod>2025-04-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d3eae7f9cf6f49cab52a7321314c810a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-hallucinated-dependencies-in-pypi-and-npm-the-2025-slopsquatting-supply-chain-risk-explained</loc>
<lastmod>2025-04-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_53a1a38dd67d40d9b3af66a3070dc9c6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/louis-vuitton-regional-infrastructure-cyberattack-detailed-forensic-analysis-of-coordinated-data-br</loc>
<lastmod>2025-07-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_45504ac0732443d1a684a714dcfab459~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/vulnerabilities-in-asus-driverhub-exposed-cve-2025-3462-and-cve-2025-3463-analysis</loc>
<lastmod>2025-05-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f9548d1e8a304c9ba787a9a1f050af73~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/agentic-ai-s-risky-mcp-backbone-vulnerability-exploitation-affected-systems-and-mitigation-strate</loc>
<lastmod>2025-07-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41d5b080c63446a0890f524e477e9b31~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/xai-developer-s-api-key-leak-exposes-spacex-and-tesla-s-private-llms</loc>
<lastmod>2025-05-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e9e1a86fbf6f40b082250ba458c53c55~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korea-cyber-espionage-github-enterprise-server-attacked-via-diplomat-it-worker-scheme-impacti</loc>
<lastmod>2025-08-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b15409dc405f41fcbec22d848df9eeb1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/gpuhammer-how-the-new-rowhammer-variant-degrades-ai-models-on-nvidia-gpus</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_573bcb14533f4d3897771c0eb9bb0d7d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-osint-cybersecurity-report-china-linked-apt-salt-typhoon-exploits-cisco-ios-xe-vulnerabilit</loc>
<lastmod>2025-06-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2304626448e0468d88fa35a5622e0da6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/iran-national-internet-infrastructure-throttling-cyber-defense-strategy-to-prevent-attacks-amid-reg</loc>
<lastmod>2025-06-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_967b279dab2a47cba1ba880c3ad4eb00~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chrome-may-2025-emergency-update-in-depth-analysis-of-the-fifth-zero-day-vulnerability-in-the-v8-en</loc>
<lastmod>2025-07-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_734b4eb872574fff98cfd0a4f9e70484~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/swissgov-breach-in-depth-analysis-of-switzerland-s-july-2023-ransomware-attack-on-government-system</loc>
<lastmod>2025-07-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1464b796dd94437aae45eb2b2b4c5635~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-in-tenable-network-monitor-update-to-version-6-5-1-to-prevent-exploitation</loc>
<lastmod>2025-05-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_539bccc4e19146ec930cb7f8773d67da~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/broadcom-data-breach-ransomware-attack-on-business-systems-house-highlights-third-party-cybersecuri</loc>
<lastmod>2025-05-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9dbfb4d8538b4ccaac7c6d635313e026~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-niagara-framework-vulnerabilities-remote-code-execution-and-lateral-movement-threats-to-sm</loc>
<lastmod>2025-07-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_07dbdc6d061b4202bd283801254e57e0~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-fortios-and-fortiproxy-zero-day-vulnerability-cve-2024-55591-exploited-in-the-wild</loc>
<lastmod>2025-05-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b4df69a8c44e47d3931aa3e516f79e8c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-patches-toolshell-zero-day-exploit-in-sharepoint-server-cve-2025-53770-in-depth-threat</loc>
<lastmod>2025-07-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cf6f29adf6844425a33b65f019dd0f88~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analyzing-a-10-22m-data-breach-on-legacy-email-systems-ibm-report-insights-into-multi-stage-cybera</loc>
<lastmod>2025-07-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_84db93bfd73e4f898371a99c312ad28c~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analysis-of-apple-core-media-and-coreaudio-zero-day-vulnerabilities-impacting-ios-and-macos-systems</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3916098aa1ac4f6f92bb7221c02dbe69~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-flaw-in-railsafe-scada-systems-13-year-vulnerability-threatens-us-freight-trains</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9faeddc72561400f8df94c920abcb6ab~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ingram-micro-legacy-systems-outage-how-the-safepay-ransomware-attack-disrupted-global-supply-chain</loc>
<lastmod>2025-07-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2f5230fccc7341eca1539ede0eb9850a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/u-s-judiciary-court-electronic-records-service-breach-investigation-no-evidence-of-compromise</loc>
<lastmod>2025-08-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_601baae02d0d4245b71ac86c64ccbf50~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-august-2025-patch-tuesday-fixing-kerberos-zero-day-in-windows-server-active-directory-sys</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3d2948c320de42faa006dac57ad66086~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyberark-and-hashicorp-vault-vulnerabilities-remote-vault-takeover-without-valid-credentials-analys</loc>
<lastmod>2025-08-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f8b7a8675e754cb49739edd6ed8d7283~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/perfektblue-vulnerabilities-in-opensynergy-bluesdk-millions-of-vehicles-at-risk-from-remote-code-ex</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_10de7c74c5714a21bb6f724384d71390~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-laravel-rce-vulnerability-over-600-apps-exposed-by-leaked-app_key-on-github</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7caaa0d7dedf427d85c1fefba4d86bb0~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/grafana-security-alert-critical-xss-vulnerability-cve-2025-4123-urgent-patch-required</loc>
<lastmod>2025-05-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_6c77fcdfda8c4d1fa6c1c8a4d1ae1df8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/patch-now-secure-vmware-tools-from-insecure-file-handling-vulnerability-cve-2025-22247</loc>
<lastmod>2025-05-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe35a804e3414855b79356b9ece575b3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-slopsquatting-and-supply-chain-risk</loc>
<lastmod>2025-05-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b2d1cbfb0b54476e9dd4f5b1e0ec6f10~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/manpower-franchise-headhunting-firm-ransomware-breach-in-depth-analysis-of-the-140k-uk-data-expos</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9adbb031c5334fe3b090380063914635~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyber-espionage-exposes-vulnerabilities-in-aerospace-communications-suite-in-depth-analysis-of-eagl</loc>
<lastmod>2025-07-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4a7a1ee27fd44e07ac95532ca185e65e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-unauthenticated-remote-code-execution-vulnerability-in-cisco-identity-serv</loc>
<lastmod>2025-06-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0fdb9a1c06e04b7fb561766772229838~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/evilvideo-zero-day-vulnerability-in-telegram-for-android</loc>
<lastmod>2025-05-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d29b56393fc1492199ca6b4070002dbc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisco-vishing-attack-employee-data-stolen-from-cisco-it-support-system</loc>
<lastmod>2025-08-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0a92e60fc34141e1a6a3562d54a0610b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-mandates-15-region-crypto-app-licensing-for-play-store-amid-fbi-s-9-9m-scam-warning</loc>
<lastmod>2025-08-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5868a99d26a64e2d9638d4605ae55712~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/defending-cybersecurity-companies-from-advanced-threat-actors-strategies-for-mitigating-risks-from</loc>
<lastmod>2025-05-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_68a0fef7907345fb89b8204efe1b7171~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-fortiweb-patch-release-critical-sql-injection-vulnerability-cve-2025-25257-remediation</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_081373fe1aa242a281572e2c4e739735~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-windows-server-2019-2022-and-2025-updates-resolve-container-launch-failures</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8f1ee7536a6049729bea02a7eeacd46b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/telefónica-internal-systems-data-breach-hacker-leak-exposes-sensitive-data-and-network-vulnerabilit</loc>
<lastmod>2025-07-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_11921740b9d34360b8fa75fc764bfa05~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/swagger-ui-1-0-3-remote-cross-site-scripting-xss-vulnerability-comprehensive-analysis-exploitati</loc>
<lastmod>2025-08-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ea65a02d804a40e8be7bd8cd82397350~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cl-sta-0969-covert-malware-targeting-cisco-unified-communications-manager-in-telecom-networks-durin</loc>
<lastmod>2025-08-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_70cea6eef70743d99721cbd0b5c45131~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/coca-cola-and-ccep-cyber-incident-everest-ransomware-and-gehenna-breach-of-salesforce-data</loc>
<lastmod>2025-06-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7bff291efe68460cbd178c48106f6b4e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/high-severity-vulnerabilities-patched-in-google-chrome-v8-engine-and-mozilla-firefox-rendering-engin</loc>
<lastmod>2025-08-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_66ea100697e84643a45e5c81011bd8f7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/qantas-airlines-api-breach-exploited-vulnerability-exposes-6-million-customer-records</loc>
<lastmod>2025-07-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_38e3278f74b9419e84fb6811683a0049~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/westjet-cyberattack-report-in-depth-analysis-of-the-westjet-mobile-app-breach-and-internal-system-v</loc>
<lastmod>2025-06-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a2b6585b42084046aec75ece5b73dce3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/whispers-of-xz-utils-backdoor-in-legacy-docker-images-comprehensive-analysis-and-mitigation-strateg</loc>
<lastmod>2025-08-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cd06678a5605458ab3ed8151fb08cc9f~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dior-legacy-it-system-breach-in-depth-analysis-of-customer-database-cyberattack</loc>
<lastmod>2025-07-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d1b9dca2d39a4e55ad7428095316d5cb~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chipmaker-patch-tuesday-critical-intel-microcode-amd-firmware-nvidia-driver-vulnerabilities-impa</loc>
<lastmod>2025-08-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e1fe94f4b27b477caa211735d693d596~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/allianz-life-data-breach-1-4-million-u-s-customers-data-compromised-via-cloud-crm-system</loc>
<lastmod>2025-07-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_60ff1166a45e4c5e9b6853f92cad6ca7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cisco-ise-flaw-enabling-unauthenticated-root-access-exploited-by-apt-actors</loc>
<lastmod>2025-07-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_46a624cb4caf424c8796b05dacf23377~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cert-ua-uncovers-lamehug-malware-in-legacy-email-client-software-apt28-leverages-llm-for-advanced-p</loc>
<lastmod>2025-07-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f9047f3d1850410da99a0a84c39d22c7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/uk-sanctions-russian-cyber-actors-for-assassination-linked-attacks-on-microsoft-office-365-and-excha</loc>
<lastmod>2025-07-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0d7fa597a6864241ab921b035551e7ea~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-update-your-prisma-access-browser-to-protect-against-pan-sa-2025-0009</loc>
<lastmod>2025-05-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d2cbb040e7384f8fae375b9495b14595~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/april-2025-adidas-data-breach-supply-chain-attack-via-third-party-customer-service-provider</loc>
<lastmod>2025-05-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_13ff6e96dc9741a3a16fcb9515c6b761~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fire-sale-it-s-a-myth-anyway-it-can-t-be-done-live-free-or-die-hard-2007</loc>
<lastmod>2025-06-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_42aa4badadbf401f91c24709e5264bd4~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/funksec-ransomware-decryptor-released-free-in-depth-cybersecurity-analysis-for-microsoft-exchange-a</loc>
<lastmod>2025-07-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2b913fc127f249d587f01b3f0cff1963~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/u-s-seizes-2-8m-in-crypto-from-zeppelin-ransomware-operator-exploiting-solarwinds-rdp-proxy-vulner</loc>
<lastmod>2025-08-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8d49c09de82047b29d0c9454033d27f1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/hertz-data-breach-exposes-sensitive-customer-information-via-cleo-platform-zero-day-exploits</loc>
<lastmod>2025-04-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_90c2c1cf45f743dbaa3d73dfab081133~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-6543-exploitation-in-citrix-netscaler-devices-evidence-based-breach-analysis-in-the-nether</loc>
<lastmod>2025-08-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ee2965ce6fc84ea1ba39bf3a27a2233e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nippon-steel-industrial-systems-breach-customer-and-employee-data-exposed</loc>
<lastmod>2025-07-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_760f2504810e418d93ca6efcf9af0cd3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitre-aadapt-framework-strengthening-cybersecurity-for-cryptocurrency-digital-wallets-and-blockch</loc>
<lastmod>2025-07-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4433ae985803427da031ce7f1684ef24~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analysis-of-csrf-vulnerability-in-jenkins-lucene-search-plugin-cve-2023-30529</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_83fa86ffbf34428dac327f36b63b3c91~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/charon-ransomware-attacks-middle-eastern-critical-systems-with-sophisticated-apt-level-evasion-tacti</loc>
<lastmod>2025-08-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e7ecf29cbbad4e0dacbe95b3995410c5~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/silk-typhoon-patents-chinese-firms-15-ai-powered-cyber-espionage-tools-targeting-traditional-netw</loc>
<lastmod>2025-07-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1bae1a06044a46ba881c0a23d09c4df6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/chrome-138-update-patches-zero-day-vulnerability-in-google-chrome-critical-memory-corruption-exploi</loc>
<lastmod>2025-07-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7a5845907f014d14adea92805ed2adb1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dprk-and-china-suspected-in-hybrid-cyber-physical-attack-on-south-korean-embassy-s-diplomatic-commun</loc>
<lastmod>2025-08-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f9a7204c4e4e4bee895803abca7586b8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-mitel-authentication-bypass-vulnerability-how-hackers-gain-full-access-to-mivoice-mx-one-s</loc>
<lastmod>2025-07-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_32115388c5c34517bdc6268364fec918~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2025-43300-critical-apple-zero-day-in-ios-ipados-and-macos-exploited-in-targeted-attacks-ur</loc>
<lastmod>2025-08-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_138eaede4e5b4075a15b3970b2cb9d53~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/north-korean-kimsuky-hackers-exploit-bluekeep-vulnerability-in-rdp-systems-comprehensive-data-breac</loc>
<lastmod>2025-08-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_93bbd8c6826944a1826e7a4fca514bd1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/greedybear-attacks-mozilla-ecosystem-1m-crypto-stolen-via-malicious-firefox-wallet-extensions</loc>
<lastmod>2025-08-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_efc9753120c840bfa7d5efdc5dd9369b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/google-dbsc-open-beta-in-chrome-boosts-session-security-with-project-zero-patch-transparency</loc>
<lastmod>2025-07-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_000d247dc5ca4a6ab7316baeff3080f8~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/vodafone-s-45-million-gdpr-penalty-critical-lessons-in-third-party-risk-management-and-iam-for-cis</loc>
<lastmod>2025-06-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_94c28b1850c640ed966d7c5fa2cb46f3~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-announces-launch-of-orion-risk-radar-in-japan-with-frt-and-aspiration</loc>
<lastmod>2025-06-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_83b6f4a86245404ba8e3602474231636~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ibm-x-force-2025-threat-intelligence-index-key-insights-and-what-they-mean-for-your-organization</loc>
<lastmod>2025-04-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_456858425f4f7857577573~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-golden-dmsa-attack-in-windows-server-2025-cross-domain-exploits-and-persistent-access-vuln</loc>
<lastmod>2025-07-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_07dc2af88c6f4721899722a3b872e7e9~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-cybersecurity-report-aeza-sentinel-sanctioned-for-hosting-ransomware-and-infostealer-server</loc>
<lastmod>2025-07-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41687bd5ad674398be1b24c72bb16fbb~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/stealth-backdoor-exploits-in-wordpress-mu-plugins-for-persistent-admin-access</loc>
<lastmod>2025-07-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f0adb8770d9348b492179036bf469243~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/popular-npm-linter-packages-compromised-by-phishing-detailed-malware-dropper-attack-analysis</loc>
<lastmod>2025-07-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_632b154eaf2f4973be9363f9bcc42072~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/echoleak-vulnerability-in-microsoft-365-copilot-in-depth-analysis-of-a-zero-click-prompt-injection</loc>
<lastmod>2025-06-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b94954c7aa4b47d2be430d96af503c73~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-update-for-elastic-s-kibana-cve-2025-25015</loc>
<lastmod>2025-05-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6d028988405941f98b9a4df0bb8a1678~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kelly-benefits-data-breach-550-000-affected-by-a-sophisticated-multi-vector-cyber-attack</loc>
<lastmod>2025-07-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_64b2f28e6d5348a28a9cdd2ad2b3553c~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-analysis-in-cisco-ios-xe-for-wlcs-cve-2025-20188-report</loc>
<lastmod>2025-05-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_99b99a576c4a4c0993e1d7327bdd619a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-5394-exploitation-of-the-alone-wordpress-theme-enables-remote-plugin-hijacking</loc>
<lastmod>2025-07-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c95cc71f5f304bd9a90b2e62698fb959~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/june-2025-patch-tuesday-critical-vulnerabilities-in-microsoft-exchange-server-adobe-acrobat-oracl</loc>
<lastmod>2025-06-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5281c22a3cb247a0ba9efffb820d8b93~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/citrix-adc-and-gateway-emergency-patches-in-depth-vulnerability-analysis-and-mitigation-strategies</loc>
<lastmod>2025-06-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9a0cfb3339be423a9187cc09d56bfd61~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-zero-day-vulnerability-in-sap-netweaver-visual-composer-cve-2025-31324-exploited-in-manufa</loc>
<lastmod>2025-05-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_496497761fe34f138fc16eeb80881795~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cisco-ios-xe-wireless-controller-vulnerability-arbitrary-file-upload-risk</loc>
<lastmod>2025-06-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f326d88c55484ea7b07463451eea8736~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sonicwall-sma-100-critical-vulnerability-patched-in-depth-analysis-of-malware-attacks-and-mitigatio</loc>
<lastmod>2025-07-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_89cc163695bb4949a2370872a64fd3e1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/boosting-eu-digital-sovereignty-and-security-introducing-dns4eu</loc>
<lastmod>2025-06-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e2c3b39fd9a4462c80fbdf9aebc5ad60~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cisco-unified-cm-vulnerability-root-access-via-static-credentials-technical-analysis-m</loc>
<lastmod>2025-07-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7c67347a14b045c19da27e77dec7b95d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/toptal-github-breach-attackers-exploit-outdated-authentication-to-publish-10-malicious-npm-packages</loc>
<lastmod>2025-07-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_25d0a5290179434cb1de5023c15fd929~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/radiology-associates-of-richmond-data-breach-1-4-million-patient-records-compromised-via-remote-acc</loc>
<lastmod>2025-07-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_faa6084eaf6840699cd8ef4661baedc9~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ivanti-epmm-cve-2025-4427-critical-remote-code-execution-vulnerability</loc>
<lastmod>2025-05-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3086a8586a03480eb25cff43f4166bb7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/void-blizzard-cyberespionage-targeting-critical-sectors-and-systems-in-europe-and-north-america</loc>
<lastmod>2025-06-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e769e0b88c1b46c58c9b17d948ac8843~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unc2891-atm-network-breach-4g-raspberry-pi-implant-enables-caketap-rootkit-exploit</loc>
<lastmod>2025-07-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eaf7ddfec7354d74826b7b067e7b6bcc~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/anubis-ransomware-incident-analysis-dual-threat-cyber-attack-with-irreversible-file-wiping-in-healt</loc>
<lastmod>2025-06-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_104350aa7bc44f89acc3b31351d1aea5~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analysis-of-winrar-cve-2025-31334-mitigation-and-exploitation-insights</loc>
<lastmod>2025-04-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eaf750ac46364d2fa0dcc882e9f5509d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-anydesk-cve-2024-12754-essential-strategies-for-combating-privilege-escalation-threats</loc>
<lastmod>2025-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f991940aa86142fb8d46793c8ed01d33~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/samsung-germany-customer-service-ticket-data-leak-infostealer-malware-breach-exposes-270-000-record</loc>
<lastmod>2025-04-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_09a83995c92645e6b00f7dfb0cb8e5f7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-ibm-aix-vulnerabilities-cve-2024-56346-and-cve-2024-56347-immediate-mitigation-required</loc>
<lastmod>2025-03-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3f3c1a73f4db45e2812447f02dc7dbe2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-alert-addressing-the-cisco-openh264-codec-library-vulnerability-cve-2025-27091</loc>
<lastmod>2025-02-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5e3b9e981e8248c3b4d56df29c3410ad~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-technical-analysis-of-the-govchain-data-breach-lessons-and-implications</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_00b11cca636a4b99985b7ddbf32b9f79~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-identified-in-nvidia-hopper-hgx-8-gpu-hmc-cve-2024-0114-and-cve-2024-0141</loc>
<lastmod>2025-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e0e2ef9797ea49e68e9f3fdfb672e3fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-disclosed-in-cisco-identity-services-engine-immediate-updates-required</loc>
<lastmod>2025-02-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e66f5d8d77a8425b97b0f4554ed1d940~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/april-2025-oracle-critical-patch-update-addressing-378-vulnerabilities-across-key-products</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_330d9232ff01485e92cba1f705d16eed~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/japan-s-active-cyberdefense-bill-a-new-era-of-cybersecurity-for-critical-infrastructure</loc>
<lastmod>2025-02-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_47fa5c7aa2c64e07b3033fe70cc5d04b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyber-attack-on-iranian-shipping-lines-impact-on-vsat-systems-and-maritime-operations</loc>
<lastmod>2025-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e5e34b1f635449a8a7002e1b1f607080~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2025-24118-exploiting-race-condition-vulnerabilities-in-macos-kernel</loc>
<lastmod>2025-02-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a7d8d73ac1374c158928c90ecda3ad4e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-fluent-bit-vulnerabilities-cve-2024-50608-and-cve-2024-50609-mitigating-d</loc>
<lastmod>2025-02-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5803cde6de93404ba56ffdbe48aefc03~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cybersecurity-risks-and-national-security-challenges-emerge-as-nist-faces-major-staff-reductions</loc>
<lastmod>2025-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_59a76216b8fd4ff6b714358b00815416~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/servicenow-vulnerabilities-critical-exploits-impacting-israel-and-global-systems</loc>
<lastmod>2025-03-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d34a84cda57b411bae3ee9879ba61338~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ai-driven-espionage-openai-bans-chatgpt-accounts-exploited-by-chinese-apt-groups-in-cyber-spying</loc>
<lastmod>2025-02-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6195e7eb2fc846e4abf468c4131c5ff2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/jenkins-security-alert-addressing-cve-2025-27622-vulnerability-in-ci-cd-environments</loc>
<lastmod>2025-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1578a0f878f440dabe1580ed7b0e9706~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-exploration-of-microsoft-s-majorana-1-quantum-processor-innovations-implications-and-fut</loc>
<lastmod>2025-02-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e87bfb508a2741f4b1fa651b499b99f1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-34990-vulnerability-in-fortiwlm-urgent-mitigation-required</loc>
<lastmod>2024-12-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_18cb0de79b124292baba5a5f2b5e713e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/hamilton-county-tenn-ambulance-data-breach-impact-timeline-and-lessons-learned</loc>
<lastmod>2025-04-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_19722d1097e1408a8a69df4f64d8d269~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/oracle-cloud-breach-supply-chain-impact-via-sso-and-ldap-services-security</loc>
<lastmod>2025-03-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e041dba326234dbea743e5942aea2326~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-fortinet-vulnerabilities-exposed-risks-to-fortianalyzer-fortimanager-fortios-and-fortis</loc>
<lastmod>2025-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7d17958239eb4f39a21c3aa0810adc7b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dell-secure-connect-gateway-security-advisory-critical-vulnerabilities-and-mitigation-strategies-in</loc>
<lastmod>2025-03-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a2d91c827a0243caa757a8c642bb2c7d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-windows-ole-vulnerability-cve-2025-21298-exposes-systems-to-remote-code-execution-threat</loc>
<lastmod>2025-01-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e3cd647d8db5480eb3cd815e0252df30~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-webserver-vulnerability-protect-your-commvault-systems-now</loc>
<lastmod>2025-03-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9ed1003f2586446791a8c7deb9b3509e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-report-on-gitlab-security-updates-critical-vulnerability-mitigations-for-versions-17</loc>
<lastmod>2025-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cf8fb407b21c4fd68761adebe694b5d3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-27607-vulnerability-in-python-json-logger-update-to-prevent-remote-code-execution</loc>
<lastmod>2025-03-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3249fc837eb54c478aada7305e610fb3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-rce-vulnerability-cve-2025-20229-in-splunk-enterprise-and-cloud-patch-now</loc>
<lastmod>2025-03-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_01567b2b175f42b59ad74b5be44368a8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cybersecurity-breach-exposes-lanit-group-s-banking-systems-a-detailed-incident-report</loc>
<lastmod>2025-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_509ee9db3d5f4a5c9fe15c9e6cee6dff~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/bybit-s-1-5-billion-crypto-heist-unraveling-the-cold-wallet-security-breach</loc>
<lastmod>2025-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bce9828b1bc64107a27cf7b7cd7ee0cb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-march-2025-patch-tuesday-zero-day-exploitation-analysis-in-windbg-asp-net-core-and-remo</loc>
<lastmod>2025-03-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_66d8d509db064a868de8d8fcc2b54f63~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/demandscience-data-breach-exposes-122-million-contacts-a-case-study-on-decommissioned-system-vulner</loc>
<lastmod>2024-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1586dc8e592d49fe9e5b2d82358df135~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unveiling-google-s-willow-quantum-chip-a-leap-forward-in-quantum-computing-technology</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_54bcabf4b2614ac2a09953ac75ba1503~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/disa-global-solutions-data-breach-exposes-sensitive-information-of-3-3-million-individuals</loc>
<lastmod>2025-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe7e14afaa084438a465e6741987a5e0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/addressing-the-critical-sql-injection-vulnerability-cve-2025-1094-in-postgresql-risks-exploitation</loc>
<lastmod>2025-02-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_da02a274789d4459810ea7dd7394a3f9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/windows-task-scheduler-vulnerabilities-exploitation-and-mitigation-strategies</loc>
<lastmod>2025-04-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_87233508039e452dba9c5e2a4c9a4d38~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ldap-nightmare-mitigating-cve-2024-49112-vulnerability-in-windows-server</loc>
<lastmod>2025-01-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c8a3633d0fce4562a8e2075c44049b58~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/urgent-fortinet-products-affected-by-severe-security-flaws</loc>
<lastmod>2025-04-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_2ea84a17cd7549dab7cbc4da427f2236~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/transforming-cybersecurity-trend-micro-open-sources-trend-cybertron-ai-model</loc>
<lastmod>2025-03-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a5dbef5f3529480e90b27bce72fcdf46~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vmware-vulnerabilities-in-broadcom-advisory-25390-immediate-patching-required</loc>
<lastmod>2025-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_621471119042426899adf68b0c64ca07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/github-actions-security-breach-tj-actions-changed-files-action-supply-chain-vulnerability-analysis</loc>
<lastmod>2025-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_26f1c9cd0c7b41b087994c8ac5490376~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-in-trend-micro-s-apex-one-products-risks-exploitation-and-mitigation-str</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_29cc4168327b42aeb0e4bc80868a0ed5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mobilità-di-marca-cyberattack-disruption-of-telemaco-ticketing-platform-highlights-security-vulnera</loc>
<lastmod>2025-04-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5f3d167c36c744a591822dac107deb9f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sectoprat-threat-malware-distributed-via-google-ads-masquerading-as-chrome-installer-in-february-20</loc>
<lastmod>2025-02-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e629444401c740c8850f1dd32a142ea7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/decryption-strategies-for-akira-ransomware-on-linux-esxi-systems-using-gpu-powered-brute-force</loc>
<lastmod>2025-03-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7dd5dfc97d964a14a6b83ac776c9e97e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-0108-vulnerability-authentication-bypass-in-palo-alto-networks-pan-os-management</loc>
<lastmod>2025-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f5c6e602148c4c91854a6eded8477dfb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-in-ibm-storage-virtualize-exploitation-risks-and-mitigation-strategies</loc>
<lastmod>2025-03-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7f57cfbb3fdd46aeb218acd7f16024f0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/orange-group-suffers-major-data-breach-hellcat-ransomware-exploits-jira-vulnerabilities</loc>
<lastmod>2025-02-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8efe174c5f984dcea6ca1262ef93efeb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lumma-stealer-click-fix-attack-threat-analysis-and-mitigation-for-windows-systems</loc>
<lastmod>2025-03-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_170fbf5c4e234ee5aef600230020a2ff~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2025-24472-authentication-bypass-vulnerability-in-fortinet-s-fortios-and-f</loc>
<lastmod>2025-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5b3ef5e9fc5c4dabbd12fd4ec6071262~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-zero-day-vulnerability-cve-2025-24085-in-apple-s-core-media-framework-urgent-security-upda</loc>
<lastmod>2025-01-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a251654dc4224c1c8601823dcdb45be5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-traffic-server-vulnerabilities-uncovered-immediate-action-required</loc>
<lastmod>2025-03-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2487de0078844f0f84289f4dd6e82429~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-file-upload-vulnerability-cve-2024-13365-in-cleantalk-wordpress-plugin-exposes-global-risks</loc>
<lastmod>2025-02-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_db5085c5ac1e4fcb897c54b0b815b90c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/october-2023-critical-advisory-cisco-nexus-3000-9000-health-dos-vulnerability-cve-2025-20111</loc>
<lastmod>2025-02-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_053121e37a8b4410bc018fb81960eeec~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unveiling-the-esp32-bluetooth-chip-backdoor-security-vulnerabilities-and-mitigation-strategies</loc>
<lastmod>2025-03-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b83f7a7dfd5743dabcdb4b674f6c0b76~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/urgent-alert-cve-2025-23120-vulnerability-in-veeam-backup-replication-risks-rce-exploitation</loc>
<lastmod>2025-03-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2199005f38ad4aeebb1de9812203b690~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-cybersecurity-analysis-combating-storm-2372-phishing-risks-on-microsoft-systems</loc>
<lastmod>2025-02-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_29c1ab77a51e4216a6d6d5468203086a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/global-alert-cve-2024-27564-vulnerability-in-openai-chatgpt-threatens-critical-sectors</loc>
<lastmod>2025-03-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4e630ef4e3bf4fd399aeab4cf62abd64~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-remote-code-execution-vulnerability-in-winzip-urgent-mitigation-required-for-cve-2025-1240</loc>
<lastmod>2025-02-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_29ae16280c324540bd44cf643ae8ef95~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ntt-communications-order-information-distribution-system-breach-technical-analysis</loc>
<lastmod>2025-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4ed3d6ebb6564b3cbde25ac0147429a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/massachusetts-power-utility-breach-prolonged-volt-typhoon-apt-attack-on-lelwd-s-ot-network</loc>
<lastmod>2025-03-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0464d8d564e944a8890d7291e3988e70~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-f5-big-ip-snmp-vulnerability-cve-2025-21091-threatens-infrastructure-stability</loc>
<lastmod>2025-02-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5df7dde0fbb04d68be6d55ba96d9dca0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-wp-ghost-plugin-vulnerability-urgent-patch-required-to-prevent-rce-threat</loc>
<lastmod>2025-03-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1b29b231f74340c4a0f3ee131e520b41~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2025-20115-cisco-ios-xr-bgp-confederation-dos-vulnerability</loc>
<lastmod>2025-03-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d024152657a9437585cbc3ea4deb3c6e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-alert-cve-2025-24860-vulnerability-in-apache-cassandra-targets-global-sectors</loc>
<lastmod>2025-02-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_27859d76901a43a3a49a4633a6f1199c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2024-35250-apt34-s-privilege-escalation-in-microsoft-windows-systems</loc>
<lastmod>2024-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_786573bbe53e4498ad7e29c9a25a1e59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-technical-analysis-of-the-u-s-treasury-department-breach-beyondtrust-exploitation-an</loc>
<lastmod>2025-01-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_062b24e3d5704192906f39b851aec8dc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/in-depth-technical-analysis-volkswagen-cariad-cloud-misconfiguration-exposes-data-of-800-000-electr</loc>
<lastmod>2024-12-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d2dcd293f4c94955bd0717b8b65dd638~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2021-44207-vulnerability-in-acclaim-usaherds-exploitation-by-apt41-and-mitigation-stra</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9f2de0386ee24cb88fb4848e2bf70ffa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-29927-next-js-authorization-bypass-threat-and-mitigation-strategies</loc>
<lastmod>2025-03-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eb0b1f64066c4f57a09b366ce71cde15~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/passkey-account-takeover-vulnerability-in-mobile-browsers-understanding-cve-2024-9956-and-its-impli</loc>
<lastmod>2025-03-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8d85c53f8d4d41648cade55a46a48a97~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/massive-infostealer-malware-breach-26-million-windows-devices-compromised-bank-cards-leaked</loc>
<lastmod>2025-03-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_85796752dcce4a9eb0641db31383411a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/potential-massive-twitter-x-data-breach-2025-insider-threat-exposes-2-8-billion-accounts</loc>
<lastmod>2025-04-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cdc1adbbd9624d90a0273e67f230e2f1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/x-platform-outage-due-to-massive-cyberattack</loc>
<lastmod>2025-03-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bcb13f3edad444bdb0ebe70d7997f0e9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/salt-typhoon-exploit-campaign-cve-2023-20198-and-cve-2023-20273-targeting-cisco-network-devices</loc>
<lastmod>2025-02-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5b0e545f107a4996a3a9fbc932386a6e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2025-1146-man-in-the-middle-threat-in-crowdstrike-falcon-s-linux-compone</loc>
<lastmod>2025-02-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3f832e908da54265a5bd5c5062800a88~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-command-injection-vulnerability-in-beyondtrust-s-privileged-remote-access-and-remote-suppor</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_52ee2e1e126a4f8bb9f9f2807c1b9287~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/oracle-health-data-breach-impacting-us-healthcare-systems</loc>
<lastmod>2025-03-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9ce563999c3d43a99e372b91e0880100~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unveiling-black-basta-ransomware-leak-insights-into-operations-threats-and-cybersecurity-enhancem</loc>
<lastmod>2025-02-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6fa487bf904b4db48d584a91cd52ce45~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/granite-school-district-security-breach-exposure-of-450-000-student-records-and-system-vulnerabilit</loc>
<lastmod>2024-12-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c003cd1d9f4145f0a3d0001c05decccb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-update-released-for-dell-powerprotect-data-domain-systems-addressing-vulnerabilit</loc>
<lastmod>2025-04-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_af1982e77d584717b6e044bae42b903c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-apache-mina-cve-2024-52046-exposes-systems-to-remote-code-execution</loc>
<lastmod>2024-12-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2396fd9421e749d89c1392abfddae2a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/crushftp-cve-2025-2825-vulnerability-critical-authentication-bypass-exploit-and-mitigation-strategi</loc>
<lastmod>2025-04-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8d9f58184d7e4f049980dbf852e94bef~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2025-26909-vulnerability-in-wp-ghost-plugin-immediate-update-required-for-over-200-000</loc>
<lastmod>2025-03-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_334dd98ef7a04eacbcb3864434a880f5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-kibana-vulnerability-report-urgent-mitigation-needed-for-cve-2025-25015</loc>
<lastmod>2025-03-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fbb9926d0319434ba1e38179058b96fa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/inside-the-mind-of-sidewinder-a-real-world-look-at-a-sophisticated-cyber-adversary</loc>
<lastmod>2025-03-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_89274754ed6a4d959f59071966656759~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/bikur-rofeh-cyber-incident-analyzing-the-vulnerabilities-and-iranian-threats-to-israel-s-emergency</loc>
<lastmod>2025-03-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ceb89ea3650c4115b321a6e889274328~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nascar-ransomware-breach-medusa-attack-exposes-critical-vulnerabilities</loc>
<lastmod>2025-04-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_aeb304ec555541d8ac93b41d700b1402~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2025-21590-in-juniper-networks-junos-os-a-critical-security-threat</loc>
<lastmod>2025-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_87359b536d764f68a21ae8a4c486b5ac~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/japan-airlines-cyberattack-ddos-attack-causes-flight-delays-and-ticket-sales-suspension</loc>
<lastmod>2024-12-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_957a453b81794475b2e3f12d4cbb22bb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-technical-analysis-of-the-change-healthcare-data-breach-alphv-blackcat-exploitation-o</loc>
<lastmod>2024-12-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_80390cbda5494b349300242972e83789~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-cve-2025-0110-vulnerability-analysis-mitigating-os-command-injection-risks-in-palo-al</loc>
<lastmod>2025-02-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_360dd25e5c844e3f9d470059ee0facd3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apple-urgently-patches-cve-2025-24201-zero-day-in-ios-ipados-macos-visionos-and-safari-amid-atta</loc>
<lastmod>2025-03-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_00c025dd748c4803877bc2ef1f00bb0f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/veeam-updater-vulnerability-critical-analysis-of-cve-2025-23114-and-mitigation-strategies</loc>
<lastmod>2025-02-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_54e944e5d85544668b9155e4805ddade~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/microsoft-sysinternals-tools-zero-day-vulnerability-critical-threat-analysis-and-mitigation-strateg</loc>
<lastmod>2025-02-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_017933cbe17944fa89b67f4b3bc8d4b2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/massive-data-breach-exposes-800-000-users-of-andrew-tate-s-the-real-world-online-university</loc>
<lastmod>2025-01-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_05bed73afb36423ea836a6b67c977ebd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/europcar-gitlab-data-breach-impact-on-200-000-customers-and-security-vulnerabilities</loc>
<lastmod>2025-04-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_95e60169cbee47d4bc23e6cad08494cc~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/tenable-plugin-disruption-global-nessus-agent-outage-and-mitigation-strategies</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_97147cfb34a4415bb3301ded632fa7b0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/fortinet-fortigate-firewall-data-leak-belsen-group-exploits-cve-2022-40684-vulnerability</loc>
<lastmod>2025-01-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_05c8df020fe14df69d758d1db3c1049b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2024-3393-vulnerability-in-palo-alto-networks-pan-os-risk-and-mitigation-insights</loc>
<lastmod>2025-01-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_498c1cf87cd04a1696761805cf5955c2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/oracle-weblogic-server-vulnerability-exploitation-and-mitigation-october-2024-cpu-highlights</loc>
<lastmod>2024-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_11f6d3e1a3d04641a942231c80d80054~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/advanced-ai-driven-phishing-threat-exploits-gmail-s-emailgpt-and-chrome-vulnerabilities-october-20</loc>
<lastmod>2024-10-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7c5308fb06314ce897f98c32c9910be1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/prc-cyber-threats-analysis-of-vulnerabilities-in-u-s-telecommunications-infrastructure</loc>
<lastmod>2024-10-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6449d8c11502437f9e559731344138f8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/not-every-third-party-asset-deserves-a-panic-button-announcing-smarter-asset-prioritization-with-re</loc>
<lastmod>2024-11-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_f281f9ddf79148b697a601d736a454f0~mv2.jpeg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/strengthening-cybersecurity-in-facilities-management-addressing-iot-and-it-ot-system-vulnerabilitie</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_94d164a73d0d46d69ad237f74e64114c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/safeguarding-entertainment-and-media-analyzing-cyber-threats-and-mitigation-strategies-for-netflix</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f64510ebcb03463da38196b1ab17d15a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/advanced-persistent-threats-and-data-breaches-in-facility-management-systems-mitigation-strategies</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bb757ae4ee0c42d3aa97dc6eceff22ce~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/toyota-third-party-data-breach-zerosevengroup-exploits-active-directory-vulnerabilities</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0a39bb0ee6df4872a124bee6d30e858f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/safeguarding-media-companies-combatting-cve-2022-26134-vulnerability-in-atlassian-confluence-server</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_01aaa97cd2c74a42a354f493f291efa2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ivanti-csa-vulnerability-cve-2024-11639-maximum-severity-authentication-bypass-report</loc>
<lastmod>2024-12-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c4ac801dfd8c417097118c44922736e5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2022-28615-in-apache-http-server-versions-2-4-53-and-earlier</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b2a6497cbea14037a98ba09ced9ff07b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-in-adobe-experience-manager-cve-2024-26029-threat-analysis-and-mitigation-st</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e2a46f705a8c498e88711e6f9e880a77~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vmware-vcenter-server-vulnerabilities-cve-2024-38812-and-cve-2024-38813-threats-and-mitiga</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ecdf4880b2b44af6a750b5aa47cf9deb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lockbit-ransomware-exploits-citrix-netscaler-vulnerabilities-implications-for-icbc-and-the-financia</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_24ce9ef928b140a58bce903111e1210a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/understanding-the-impact-of-stripedfly-and-coathanger-malware-on-windows-linux-and-android-banking</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_04bfc1dc61d54410aabbf3044b3b193a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/corporate-cyber-preparedness-navigating-the-2023-threat-landscape-with-enhanced-security-and-risk-m</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a1b8c9abc534423c8718bc69db65a528~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sonicwall-sma100-vulnerability-snwlid-2024-0018-immediate-mitigation-required</loc>
<lastmod>2024-12-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a0efef1f6d3f4ec68127fc18b9b96eb8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-fortinet-fortimanager-zero-day-vulnerability-disclosed-by-admins-exploitation-risks-and</loc>
<lastmod>2024-10-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6edd8e0063ef44f9be03e62eeae9ed2f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-10220-protect-your-kubernetes-environments-from-the-latest-critical-kubelet-vulnerability</loc>
<lastmod>2024-11-23</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ed03b5c163f946aca2bf67e140066784~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2024-23113-fortinet-s-fortios-vulnerability-and-exploitation-analysis</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0e35690d87b84025a06bf7b7c59efafe~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2024-28987-in-solarwinds-web-help-desk-exploitation-and-mitigation-strat</loc>
<lastmod>2024-10-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9fbdc47e937044bd85ed5a880895adeb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/heartbleed-vulnerability-cve-2014-0160-ongoing-threat-to-openssl-using-systems-in-finance-health</loc>
<lastmod>2024-10-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8ea67352dc48473c8be4fb13e657b0f1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/indictment-of-sudanese-nationals-unveiling-the-anonymous-sudan-cyberattacks-on-critical-infrastruct</loc>
<lastmod>2024-10-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ca1eaf0608494dbdb586fa495daeae59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-in-vilo-5-mesh-wifi-system-in-depth-cve-2024-40087-analysis</loc>
<lastmod>2024-10-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_88e5e6458fdc46559f82a071bd3c06f6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nvidia-gpu-display-driver-vulnerabilities-critical-cve-2024-0126-risks-and-mitigation-strategies</loc>
<lastmod>2024-11-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_23648acbc8e54422b85fcb4de9f255ad~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nikkei-singapore-server-ransomware-attack-highlights-urgent-need-for-enhanced-cybersecurity-measures</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_11bcf768519e43278e79df332081ba6e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-fortios-session-fixation-vulnerability-fg-ir-23-475-risks-and-mitigation-strategies</loc>
<lastmod>2024-11-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7550cf273f9a490b82f8aa5d0edc56d6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/23andme-data-breach-october-2023-understanding-credential-stuffing-and-mitigation-strategies</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ebe230ca6bf1435e8034ef484e49c2fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/docusign-api-phishing-incident-an-in-depth-analysis-of-financial-data-exploitation</loc>
<lastmod>2024-11-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e81d8ec3511745b08fa0fdb89ac8badd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-buffer-overflow-in-keccak-xkcp-sha-3-implementation-cve-2022-37454</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_faff330f22b6492fa9df13712867bb32~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/russian-speaking-ransomware-group-clop-exploits-zero-day-vulnerability-in-moveit-transfer-compromis</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9adc927488674f44bd37ab6d501dcb96~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-the-3cx-desktop-app-supply-chain-compromise-by-unc4736-in-march-2023</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_074f0a27d9564e649f450b46d558788c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-43093-critical-android-framework-vulnerability-exploited-in-targeted-espionage-campaigns</loc>
<lastmod>2024-11-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d4ca0626ba2c4fd39221f3156ac3b60c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cybersecurity-threat-alert-immediate-action-required-for-dahua-ip-cameras-linux-kernel-a</loc>
<lastmod>2024-11-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3ba09a33df0a4257ba8566f3252bdf75~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unveiling-critical-ivanti-csa-vulnerabilities-nation-state-exploitation-of-cve-2024-8190-and-beyond</loc>
<lastmod>2024-10-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_997db458912043aca3de9e55876899d0~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-paypal-credential-stuffing-attack-key-insights-and-mitigation-strategies</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_977511c07db140519c1ec9523078a811~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/edrsilencer-a-new-threat-to-modern-edr-systems-and-cybersecurity-defenses</loc>
<lastmod>2024-10-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3567d1719e02477f96ef4648ca453aec~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-php-vulnerability-cve-2024-4577-targeted-threat-to-windows-servers-in-asian-locales</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_85fbe152c6db488ea8c217e9bd7d5e68~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2024-10524-impacting-gnu-wget-immediate-mitigation-required</loc>
<lastmod>2024-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_25d943d232844c0ca014d1619cf6f124~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2022-22721-addressing-critical-apache-http-server-vulnerabilities</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ad2694e68c2d473792e114be92e45eb7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/spoutible-api-vulnerability-exposes-sensitive-user-data-a-call-for-robust-cybersecurity-measures</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1fcc9f8445474c7bb57e350b08cd8f89~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/kadokawa-corporation-and-niconico-cyberattack-june-2024-ransomware-breach-and-system-vulnerabilitie</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_150ac361973f489d9a81d63bb7d52145~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apt41-s-strategic-cyber-assault-on-the-gambling-industry-infiltration-techniques-and-defense-strate</loc>
<lastmod>2024-10-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_81e65e7db1ce4c73896794294f2a4f36~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/pan-os-management-interface-vulnerability-pan-sa-2024-0015-remote-code-execution-risk-and-mitigatio</loc>
<lastmod>2024-11-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3e6bf10868f843df83e67e4e6d036972~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2021-27065-mitigating-remote-code-execution-vulnerability-in-microsoft-exc</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe38d3b6f59d4354a35e3f05922f4ec3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/urgent-mitigation-required-addressing-cve-2024-38094-in-microsoft-sharepoint-for-enhanced-cybersecu</loc>
<lastmod>2024-10-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c753b63fb2fe4d3d83d4829ec2fd5a65~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2024-40711-akira-and-fog-ransomware-target-veeam-backup-replication-systems</loc>
<lastmod>2024-10-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e8253f68cfd543a5aa4642a58e62d20a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2024-40711-vulnerability-in-veeam-products-remote-code-execution-exploitation-alert</loc>
<lastmod>2024-10-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_038dac58b0f445bf874ac45b819e82d5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-critical-vulnerabilities-in-splunk-enterprise-svd-2024-1012-advisory-report</loc>
<lastmod>2024-10-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0df293af6b61495787a72a1c4ca1db20~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/insula-s-encounter-with-bianlian-ransomware-a-comprehensive-analysis-of-the-rdp-based-cyber-attack</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_73a34b17232f4686a9bf3d4d6bb3eb9e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2018-1312-protecting-apache-http-server-from-critical-digest-authentication-vulnerab</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7f24425a6b9d43f2a7a45755bc3a963e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-remote-code-execution-vulnerability-in-microsoft-exchange-server-cve-2021-26858-exploited</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_acac351dcc60436183772ba2663e4098~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-http-server-vulnerability-cve-2024-38474-immediate-update-recommended</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_86c714b760ba474d95eba1dbf1b2c255~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2020-1472-zerologon-vulnerability-in-windows-domain-controllers</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0813f2fa2f144943ae7082ba766f607a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cybersecurity-s-growing-influence-on-corporate-credit-ratings-the-case-of-log4shell-vulnerability</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c7cec1df9f934bf288ff996176380a2e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-43451-protecting-windows-systems-from-ntlm-hash-disclosure-vulnerability-targeted-by-russi</loc>
<lastmod>2024-11-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fe27bc47d8d24f86902910f0dcaf8577~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-in-okta-verify-for-ios-understanding-cve-2024-10327-and-mitigation-strategie</loc>
<lastmod>2024-10-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b9e8853a0ea143aa87c00e1939510f97~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mgm-resorts-cyberattack-september-2023-impact-on-operational-systems-and-data-security</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_095e62bed10d48ae84e6a3fd08ab325e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/github-enterprise-server-vulnerability-cve-2024-9487-critical-saml-sso-flaw-and-mitigation-strategi</loc>
<lastmod>2024-10-16</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_22b0a236a79247feba1c7921404fc65f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-remote-code-execution-vulnerability-cve-2024-42448-in-veeam-service-provider-console-immed</loc>
<lastmod>2024-12-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a6f620c36bdd479b8bc014c9d3653825~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/protect-your-systems-critical-apache-http-server-vulnerability-cve-2022-31813-and-mitigation-strate</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2301b3de9ebc4fdc9f9b5107b143afba~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/trello-api-security-breach-15-million-email-addresses-leaked-in-massive-data-exposure</loc>
<lastmod>2024-10-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b05ffa4af5d5480f901ab710c3c156f7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enhancing-credit-ratings-through-robust-cybersecurity-addressing-financial-sector-vulnerabilities</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f8b7a97530b84eb0aab9c931ddcfdfed~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cyber-threats-in-asia-pacific-exploitation-of-microsoft-office-memory-corruption-vulnerability-cve</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_961e4b9c3eb44f5480c1031c7cdcc727~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enhancing-cybersecurity-resilience-in-financial-services-addressing-ai-driven-threats-and-cloud-vul</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ff132ab9a0e34ade9b3a5da161143bae~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2024-20481-addressing-the-dos-vulnerability-in-cisco-asa-and-ftd-software</loc>
<lastmod>2024-10-25</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_65b67a1985724b5ea56062b7a0c62830~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/protecting-the-media-and-entertainment-industry-analyzing-cyber-threats-and-mitigation-strategies-i</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_20eb0f3147724806956fb9be2051f62b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/protecting-entertainment-and-media-analyzing-cyber-threats-and-prevention-strategies-in-the-wake-of</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_51434dbbbf8a4156b442e0e84ef2e1d3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/apple-confirms-critical-zero-day-vulnerabilities-in-intel-based-macs-cve-2024-44308-and-cve-2024-44</loc>
<lastmod>2024-11-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_34d4857459a5485d95a2f830373efb34~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sql-injection-vulnerability-in-sonicwall-sma-100-series-cve-2021-20016-report</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_65ef952069014bb8b5cc59228480d9e9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enhancing-cybersecurity-resilience-in-the-broadcasting-industry-addressing-vulnerabilities-in-inter</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_08019f560a464405b13ddb5475f05c49~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-struts-2-vulnerability-cve-2024-53677-urgent-mitigation-required</loc>
<lastmod>2024-12-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c06efe8543554729947e071a6f3db7c9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/safeguarding-building-automation-systems-addressing-vulnerabilities-in-knx-protocol-and-hvac-integr</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_008d78cd0c574541a3e76da332cd9891~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-2024-cybersecurity-analysis-ivanti-microsoft-and-critical-vulnerabilities-revealed</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_34ece023b96b47ed867bc5f490a896b1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mit-sloan-report-addressing-cloud-misconfigurations-and-ransomware-in-2023-cybersecurity-threats</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41fa169d3dc942b083fb3c35840265a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-windows-error-reporting-service-vulnerability-cve-2024-26169-exploited-by-black-basta-ranso</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1ffe2673949e4360b6b55ca94c44947f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-7-zip-vulnerability-cve-2024-11477</loc>
<lastmod>2024-11-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4971c55c907e498e9eab8db419e75aba~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2024-24919-safeguarding-check-point-quantum-force-security-gateways-from-information</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_929552fda6d84512a13c73fd81cac0db~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-zendesk-email-spoofing-vulnerability-cve-2024-49193-risks-and-mitigation-strategies</loc>
<lastmod>2024-10-14</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1739612d624440b3b8a6ca6ecbcd0a58~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-cyber-threat-analysis-the-impact-of-moveit-vulnerabilities-on-global-sectors-and-miti</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_801df23508d14f1e9eb672eb72d11a77~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cybersecurity-breach-in-japan-s-diplomatic-telegram-system-analysis-and-mitigation-strategies</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_86e89c31d6f24af9955099c61b613747~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2022-41741-vulnerabilities-in-nginx-open-source-and-nginx-plus</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_45d35e3cb03847e6abbecc3fa0490e38~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2024-33879-in-virto-bulk-file-download-5-5-44-for-sharepoint-2019</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c7a7c51fcbe4ac2bb3bb77d0520f6a8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-24919-critical-information-disclosure-vulnerability-in-check-point-security-gateway</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c0efc4d54b494e489b7dcfb998ebd6ba~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-openssh-vulnerability-cve-2023-38408-urgent-security-flaw-in-pkcs-11-feature-requires-imme</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6c781c0136b24fad833f7383bb5c57c1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-citrix-recording-manager-vulnerabilities-cve-2024-8068-cve-2024-8069-urgent-mitigation-r</loc>
<lastmod>2024-11-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_72f6f96d3b534d9780fccdfb58ae8f88~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-and-mitigation-of-cve-2020-14883-vulnerability-in-oracle-weblogic-server</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9c3a575cdc29444b8e7b84376c280788~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sharprhino-malware-exploits-networking-tools-a-critical-threat-to-it-professionals</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2aca9369eb13440f8d96aed78d85dc9d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2020-14882-securing-oracle-weblogic-server-from-exploitation</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_69aff6b93a8b40878990ef39444e8516~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-media-industry-cybersecurity-risks-addressing-cms-platform-vulnerabilities</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eb46a08ac5724fd1b4a7b7c72124c255~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-sandbox-escape-vulnerability-in-servicenow-now-platform-cve-2024-8923-analysis</loc>
<lastmod>2024-11-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1ecbf5220d6b4f818807ac5be065988b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-path-traversal-vulnerability-in-jenkins-cve-2024-23897-detailed-analysis-and-mitigation-st</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_a66422e7701e403fbe3a2e4c040550c1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2021-26855-critical-ssrf-vulnerability-in-microsoft-exchange-server</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0ff4e51883984802a25e37cf1e048256~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-http-server-vulnerability-cve-2024-38476-mitigation-and-protection-strategies</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eb50e3314cd3415abf7b08578cd4a2a6~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-23113-fortinet-vulnerability-exposes-media-companies-to-cyberattacks</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_7c5601e09bff4d7496d2614f9b4ebc9b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/dish-network-ransomware-attack-black-basta-breach-exposes-300-000-employee-records</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cf3ea8fa2f68472fb4a08c38e8f3d9a7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2024-28103-in-ruby-on-rails-action-pack-immediate-patch-recommended</loc>
<lastmod>2024-10-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c5464c23acb049eb8c6582ffedbd882d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2021-26084-protecting-confluence-server-and-data-center-from-cyber-threats-in-the-fi</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_40ae684235bf428391bfe6ce8ff69719~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/lazarus-group-s-exploitation-of-3cxdesktopapp-a-comprehensive-analysis-of-the-march-2023-supply-cha</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d81923a9059f42f9be75e89a0bb5ec46~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-update-for-dell-enterprise-sonic-distribution-addressing-cve-2024-45763-cve-2024</loc>
<lastmod>2024-11-12</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_03ac96688c424e49b4c4b6a18410dc5c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2016-7661-safeguard-your-ios-and-macos-systems</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f3adb7b5bfb1439fbbb7e25ae18b271d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2021-4440-vulnerability-analysis-impact-mitigation-and-security-recommendations</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9dab54e508074bd89a1d5663594b45bf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2021-31207-bypassing-security-in-microsoft-exchange-server</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ea0b5964a6e44059aac4c9f333c8a883~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/assessing-cve-impacts-on-japan-s-economic-security-vulnerabilities-in-manufacturing-and-infrastruct</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_964d1653e54549daabea2b2c3fa26c7a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2023-0669-in-fortra-s-goanywhere-mft-software</loc>
<lastmod>2024-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ac5a9a3dbf3c4dde928ef2aa7d258938~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-46604-remote-code-execution-vulnerability-in-apache-activemq-exploited-by-kinsing</loc>
<lastmod>2024-10-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5b8a1e53f9ec42bba74699f4bea403ff~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mitigating-cve-2022-22960-addressing-high-severity-privilege-escalation-in-vmware-workspace-one-acc</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f0e9dbe09df240dab465e7be0de3b846~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2023-2868-critical-command-injection-vulnerability-in-barracuda-email-security-gateway-exploite</loc>
<lastmod>2024-10-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0ec813124c124871a63b5c7a0abefdac~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-rce-vulnerability-in-vmware-workspace-one-access-cve-2022-22954-analysis</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5709863067ce4674a8a1759b5662a3fd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-and-mitigation-strategies-for-cve-2022-30190-follina-in-microsoft-windows-s</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1ff754dc5b854f07bd4937feae55e7a5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerabilities-unveiled-in-palo-alto-networks-expedition-tool-a-deep-dive-into-cve-2024</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3f44bdba91354f75a2994159cfd614c2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2023-4966-citrix-bleed-in-netscaler-adc-and-gateway-systems</loc>
<lastmod>2024-10-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c31fbdcfd0644a86ab0ea4c153f3bad5~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-27350-vulnerability-in-papercut-ng-and-mf-immediate-patching-required</loc>
<lastmod>2024-10-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_84f439f977ab44438d933e4f1475ae2e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/understanding-cve-2014-6918-mitigating-critical-vulnerabilities-in-bikers-underground-android-app</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3152ed6d297040ff9fef820b9e536163~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-cve-2019-1622-security-implications-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_798b5fce229f4dd182057a812dbadfe3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2022-1388-impacting-f5-networks-big-ip-systems</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_310a8e63dc884de88be4fc099d39d1dd~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-cve-2021-40539-exploitation-in-zoho-manageengine-adselfservice-plus</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2e2d31bdf245470f9252abc7b43ae0be~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-php-remote-file-inclusion-vulnerability-in-lan-management-system-lms-1-9-6-cve-2007-3325</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6d98a92f13854b2a9a4443a5ae9d41e8~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2023-24880-microsoft-windows-smartscreen-vulnerability-and-active-exploita</loc>
<lastmod>2024-09-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4d8ed515153541d4a3acc7f66dbba025~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analyzing-the-impact-on-fujitsu-s-internal-network-systems-following-the-march-2023-cybersecurit</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_129b80ee3b4f437bb25fa8e8717d3fcb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-remote-code-execution-vulnerability-in-microsoft-exchange-server-cve-2021-34473-analysis-a</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_53ab59327abb45e0b0d3b2fd52344198~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-22518-vulnerability-in-atlassian-confluence-immediate-mitigation-required</loc>
<lastmod>2024-10-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dd1f99f6e1c3457a876a4abde868427c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2019-11510-critical-pulse-connect-secure-vpn-vulnerability-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b3186ee25015408299a88d77a484cadb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2020-5902-threat-securing-f5-networks-big-ip-from-remote-code-execution-vulnerability</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c0c05624b70a4578bb1d65ea8ea9427c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enhanced-threat-landscape-kimsuky-s-klogexe-keylogger-and-fpspy-backdoor-targeting-windows-systems</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fb4d444753fa4c09805abe0f774f3244~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-cve-2023-2163-vulnerability-details-impact-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9ef61ab7c58d4e27aa1ecbb7f924fb38~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/eldorado-ransomware-exploits-hte-technologies-industrial-automation-systems-cve-analysis-and-mitig</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_788ea8a0b76a4651ac2a07c36bd4f886~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unveiling-the-229-million-cyber-heist-swift-network-vulnerabilities-and-apt-group-tactics</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6ba6b8c7dff3428ab83f0fe1e96840ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-remote-code-execution-vulnerability-in-zyxel-devices-cve-2023-28771-analysis-and-mitigatio</loc>
<lastmod>2024-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b3a45d987b614a7dbbb7dda0d534d6b7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2021-44228-log4shell-vulnerability-in-apache-log4j-2-impact-exploitation-and-mitigation-strat</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dde5aa7190984ba995c8bec8613b2968~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/atlassian-confluence-vulnerability-cve-2022-26134-critical-rce-threat-overview-and-mitigation-strat</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3cebb780c3484b18a5c83733fb02bf37~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/maritime-ports-cyber-security-threat-an-opensource-analysis</loc>
<lastmod>2024-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1046701d55234b20bb584844a1ec38ee~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/examining-the-sumitomo-mitsui-banking-corporation-cyber-heist-lessons-on-insider-threats-and-creden</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_da1c8f7bcf6049ce8da31aa536a4b512~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-and-mitigation-of-cve-2022-24362-vulnerability-in-foxit-pdf-reader-and-editor</loc>
<lastmod>2024-10-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0dfba68bce8e488fbf54316317c7edde~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-path-traversal-vulnerability-cve-2018-13379-in-fortinet-fortios-ssl-vpn-exploitation-apt</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_192c19dd9a19430e8059571fea12bfd9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-information-disclosure-vulnerability-in-owncloud-s-graph-api-cve-2023-49103-analysis-and-m</loc>
<lastmod>2024-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_179f32fedf2b4e0bad9ae63b6ebcd628~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/suitecrm-vulnerability-alert-cve-2024-36412-puts-psts-sector-at-risk</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_182128fdc04342f4aef0d2219f0d6369~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3410-detailed-analysis-and-mitigation-strategies-for-enhanced-security</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3e15e8a5a64c4431b74bf001444bab3a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2023-46747-in-f5-networks-big-ip-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0167a56537bd497387b151b1ac542735~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-6387-critical-vulnerability-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3ebffb453c3f4b39b024b4bd8587f2a9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/2024-healthcare-cybersecurity-threats-critical-vulnerabilities-in-microsoft-exchange-log4j-and-wi</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fae1a3307d6d461f90e27e151e80875c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/nikkei-ransomware-attack-critical-cve-exposure-and-system-vulnerabilities-in-media-outlets</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d314239bbdf940578d2dc282b00e6e50~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2021-1789-type-confusion-vulnerability-impact-on-apple-systems-and-mitigation-strategi</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c1441325e5594119a9b713675a8a76bb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/high-severity-sql-injection-vulnerability-in-restaurant-reservation-system-1-0-cve-2024-9085</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_371114ff3b7745ae916886ea2c502434~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2023-23397-elevation-of-privilege-in-microsoft-outlook-exploited-globall</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_bc04463ddd4e416cb7e548143a26e9e1~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-and-mitigation-of-cve-2024-30052-in-microsoft-visual-studio-2019-and-2022</loc>
<lastmod>2024-10-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8786c48070154514a8d405629d798b03~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2024-23113-vulnerability-in-fortinet-products-exploitation-impact-and-mitigation-str</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f707d52918ee4e6794b38acd19ec31c2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/sarcoma-ransomware-exploits-zero-day-vulnerability-in-smart-media-group-bulgaria-s-network</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c5bc911d346c431882f5f59c67b6a736~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-2984-detailed-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6b350eac4e154c83b64b13e9757db523~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2022-24682-xss-vulnerability-threatens-zimbra-collaboration-suite-users</loc>
<lastmod>2024-10-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5d76901add0e464aa348621c6adfd46a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2023-26360-in-adobe-coldfusion-enables-arbitrary-code-execution</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f68b8302935b41378d558f935d629839~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2021-20021-exploited-in-sonicwall-email-security-urgent-mitigation-requi</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_138c511ee2cd455a9c84c236bd5d3daf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2023-33246-critical-rce-vulnerability-in-apache-rocketmq-versions-5-1-0-and-below</loc>
<lastmod>2024-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41173aee59bb460189d2d946c9f0659b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-access-control-bypass-in-adobe-coldfusion-cve-2023-29298-exploitation-and-mitigation</loc>
<lastmod>2024-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_98f32ab17c4a4c1593af6ee35b3ce13d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3987-comprehensive-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_40c5eeba59c34f6eba104a8c5935ae88~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2019-19781-vulnerability-in-citrix-adc-and-gateway-risks-and-mitigations</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_9f89eab98d904af18beec062af4b3c23~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/protect-your-systems-understanding-and-mitigating-the-cve-2017-0199-microsoft-office-wordpad-vulner</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_87971d0bf44f4a8bacf659cf655d0f3b~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2021-34523-mitigating-microsoft-exchange-server-s-proxyshell-vulnerability</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5045aa2c72f0434282eced97e1eebab9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2023-20273-command-injection-risk-in-cisco-ios-xe-software-web-u</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5fd7421d2d3b4c16b56c4203c183b0ff~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploited-windows-search-rce-vulnerability-cve-2023-36884-targets-microsoft-office-and-windows-syste</loc>
<lastmod>2024-10-02</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f38cff8de9fb423294839219a9bdc501~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-47246-vulnerability-in-sysaid-on-premise-exploitation-and-mitigation</loc>
<lastmod>2024-09-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dcc26409780a4a55b60bee623182480d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-41265-vulnerability-in-qlik-sense-enterprise-for-windows-remote-code-execution-an</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2cafcc6ad71b4847bf395cb85052d51f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-and-mitigation-strategies-for-the-nikkei-bec-attack-on-nikkei-america-inc</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e48e75ff7be24074962beff21cfcd3de~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-and-mitigation-of-bluekeep-cve-2019-0708-vulnerability-in-windows-systems</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1197bea43f2947d3a6426fc607e6b5bf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2021-40438-ssrf-vulnerability-alert-apache-http-server-exploitation-and-mitigation</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3a2587b543bd4aaf9db58cd71a22bb07~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-security-alert-cve-2024-9082-vulnerability-in-sourcecodester-online-eyewear-shop-v1-0</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3d11dd9e723146fa82739aca16060f18~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/2024-financial-domain-spoofing-surge-ai-driven-threats-targeting-bbva-hsbc-and-paypal</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ec34cfba9c0e4802801982d83b639005~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/understanding-cve-2022-28799-a-comprehensive-analysis-of-the-security-vulnerability</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_64f7f76633ef43539644364e3bb26a1e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-command-injection-vulnerability-in-hpe-aruba-access-points-cve-2024-42506-urgent-mitigat</loc>
<lastmod>2024-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_164321707e3e47948c75371f04d3876a~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2022-2294-high-severity-webrtc-vulnerability-in-google-chrome-exploited-in</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_dd22d94858cc4afbb029693828596236~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2023-27997-in-fortinet-fortios-and-fortiproxy-systems</loc>
<lastmod>2024-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ddd75e11903d40de949c39e86f4e5a86~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-20269-vulnerability-in-cisco-asa-and-ftd-software-ransomware-exploitation-and-mit</loc>
<lastmod>2024-10-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_76ba94d23bad495084d97c2fc39b594e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2021-20038-protect-your-sonicwall-sma-100-series-from-active-exploits</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cbfba669293c44ccbaf3206eee9d92a4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-analysis-of-cve-2023-3519-unauthenticated-rce-vulnerability-in-citrix-netscaler-adc-and-ga</loc>
<lastmod>2024-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_be9114560c5e40d8958cab88fafb66fb~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-understanding-cve-2024-4304-and-its-impact-on-cybersecurity</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2dff7439f77e4042b5f457acacdb8290~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-elevation-of-privilege-vulnerability-in-windows-clfs-driver-cve-2023-28252-analysis-and-mi</loc>
<lastmod>2024-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2bcbd5fd4f7445a99f56c6167cc236cf~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/2024-us-election-cyber-threats-apt-exploitation-of-electoral-systems-and-mitigation-strategies</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_78d6893b4a3a4766b425a973aa7b3024~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-gitlab-vulnerability-cve-2024-9164-urgent-mitigation-for-high-risk-ci-cd-exploit</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c453f827afcf4a7694635e888605a964~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2023-22515-in-atlassian-confluence-exploitation-impact-and-mitigation</loc>
<lastmod>2024-10-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3efe2d2e2cd9402eaa0958ad8c68777c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-cve-2023-35078-authentication-bypass-in-ivanti-endpoint-manager-mobile-epmm</loc>
<lastmod>2024-09-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e62aaf8f27a5472ebd8cd9bdd5e62fac~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2023-4389-detailed-analysis-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_4aa67bb9b4244e4794250a042d9c0ba7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2017-11882-critical-microsoft-office-vulnerability-targeted-by-apts</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_c5fdacd48626405ba0dcbc845da59b7d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-42793-authentication-bypass-in-jetbrains-teamcity-exploited-by-apt-groups</loc>
<lastmod>2024-10-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0c72da2ef95a47b8b89d52f38c9c4afa~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/comprehensive-analysis-of-cve-2021-45046-mitigating-risks-in-apache-log4j-systems</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_74982562bc53416494c2cd401c5f335f~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/analyzing-cve-2022-1234-the-kojima-industries-cyberattack-and-its-impact-on-toyota-production</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_8e9d559f61934288a6dca08b334fc2e9~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2022-3052-heap-buffer-overflow-in-google-chrome-on-chrome-os-and-lacros-mitigation-and</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1de1e1b03b0b4cbf984e243541b73b94~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-path-traversal-vulnerability-cve-2023-41266-in-qlik-sense-enterprise-for-windows-immediate</loc>
<lastmod>2024-09-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b9054d2a70fd49dd8d68c06bff88ddde~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3080-critical-vulnerability-in-asus-routers-exploited-in-record-breaking-ddos-attack</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_41c15ad5952340fbad8e756047b19506~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/exploiting-cve-2021-41773-critical-path-traversal-vulnerability-in-apache-http-server-2-4-49</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b92a862eb3274b60b09241a7216ee110~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2021-26084-ognl-injection-in-atlassian-confluence-server-and-data</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f6283d671c82494680df16fab094c878~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cve-2023-40044-vulnerability-in-ws_ftp-server-remote-code-execution-risk-and-mitigation-st</loc>
<lastmod>2024-09-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ce1932d74a4e483080cc8e09814636b2~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cybersecurity-implications-of-japan-s-economic-security-promotion-act-apt10-threats-and-mitigation</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_2a2cf65fbe6544539065f9d3ee234b73~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-vulnerability-alert-cve-2022-42475-in-fortios-and-fortiproxy-ssl-vpn-exploited-by-apt-grou</loc>
<lastmod>2024-10-04</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e4710320f59143b1be7236a89570ca13~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/wiz-research-finds-critical-toctou-vulnerability-cve-2024-0132-in-nvidia-container-toolkit-includ</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_cffd5e991e46489bb72df7dd2951355d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-cisco-ios-xe-web-ui-vulnerability-cve-2023-20198-immediate-mitigation-required</loc>
<lastmod>2024-10-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0e9015ee31554f37a2f931b12a6f8737~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-apache-http-server-vulnerability-cve-2021-42013-path-traversal-and-rce-threats</loc>
<lastmod>2024-10-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_73cbca4295874a698202b563c7e133c4~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/understanding-cve-2024-5806-vulnerability-details-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c2baecb7afb482e8fdf8b18e3d5a516~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/high-severity-sql-injection-vulnerability-in-floating-chat-widget-wordpress-plugin-cve-2022-3858</loc>
<lastmod>2024-09-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_5326cb7fc0124e99a16d362fa174ad7d~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/japan-s-economic-security-and-cybersecurity-strategy-addressing-supply-chain-and-critical-infrastru</loc>
<lastmod>2024-10-10</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_599781613eea4a1f948ec7f433b82438~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-command-injection-vulnerability-mitigating-cve-2023-20887-in-vmware-aria-operations-for-ne</loc>
<lastmod>2024-09-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6ab20a60761a4e969cb42f150d71164e~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enhancing-soar-platforms-with-machine-learning-for-comprehensive-third-party-risk-management</loc>
<lastmod>2023-03-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_456a637568636466777273~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/building-customer-cyber-security-trust-one-step-at-a-time</loc>
<lastmod>2021-05-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_1bd3edb2d5ec400da77db00cda75744f~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/international-fraud-awareness-week</loc>
<lastmod>2023-11-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_a5ebc245c6ca4a34a9fb14406771734b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/you-don-t-know-what-you-don-t-know</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_14b7e8dd25d841f1a408d7ddc18821bc~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/supply-chain-cyber-attack-on-strategic-logistics-software-company-amital</loc>
<lastmod>2020-12-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_d2c14850d353480f82e9e9b4f2025031~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mapping-your-third-party-providers-based-on-these-simple-rules</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/758c9d_7ac42ca83d3240288893380238d885de~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/the-importance-of-information-assurance-and-cybersecurity-in-a-changing-world</loc>
<lastmod>2021-04-26</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_0a8039b855b442dca38a5f02aa1e4e73~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-servicenow-vulnerabilities</loc>
<lastmod>2024-07-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b097dea852aa4177bd6341df9444ca4e~mv2.webp</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-26169-active-exploitation-of-windows-elevation-of-privilege-flaw</loc>
<lastmod>2024-08-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_34096f087a2f43f5a902edf963b7c9de~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-37285-critical-threat-to-elastic-kibana-users</loc>
<lastmod>2024-09-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_24e87f29c05049259e2dc616bd96c061~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/solarwinds-attack-report</loc>
<lastmod>2021-02-26</lastmod>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/log4shell-what-we-know-and-how-can-you-protect-yourself</loc>
<lastmod>2021-12-22</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_3468624a2d65796d5a316f~mv2_d_6000_4000_s_4_2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/connecting-the-dots</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_3b5deed611dc4cfda508f1abae6a1ac3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/maritime-cyber-security-will-the-ciso-go-down-with-his-ship</loc>
<lastmod>2022-10-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_002d9a5110a1434982632801d969a414~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-2001-detailed-analysis-and-mitigation-strategies-for-the-latest-security-vulnerability</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_decfdb8e317d4238a5dfb062b34e1fb7~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/embracing-the-digital-supply-chain</loc>
<lastmod>2024-05-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/758c9d_c409702a29ec429d86fe9e39649d0e7d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/growing-fines-to-change-the-face-of-third-party-risk-managment</loc>
<lastmod>2022-08-28</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_549e1c43b48f4dc2b9a3e3f285c8ba5a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/what-can-we-learn-from-the-update-of-iso27001-in-2022-on-cyber-security-2024</loc>
<lastmod>2024-09-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_919b0627019748329e12836afc6b1e65~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/managing-cyber-security-programs-how-to-effectively-communicate-success</loc>
<lastmod>2021-05-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_f2643bf928904a4ca91e9a8645f269a1~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/unmasking-business-email-compromise-understanding-identification-and-prevention</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/c74c32c344c44f35b871382c99feabe4.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/type-your-password-one-more-time</loc>
<lastmod>2024-05-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_9e5a91dd24124df288ad3a2eb769f788~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ddos-is-emerging-as-the-state-attack-tool-of-choice-how-should-i-prepare</loc>
<lastmod>2022-11-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_76b459c7895143be9c0a7f0a84d9648d~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/the-ai-bots-are-coming-to-osint</loc>
<lastmod>2022-05-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_536bb0dc35e34faaac7844b301768e3a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/digital-identity-safety</loc>
<lastmod>2024-04-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_524475666a7467364a7051~mv2_d_6000_4000_s_4_2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/remote-work-and-the-implications-of-third-party-risk-management</loc>
<lastmod>2023-02-06</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_9e89cfa751c24103b6e8ed1c335bc836~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/critical-unauthenticated-rce-vulnerability-in-veeam-backup-replication-cve-2024-40711-under-acti</loc>
<lastmod>2024-09-17</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_b766062dcb714deabe9d64d6038d0dd8~mv2.webp</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/rescana-announces-strategic-collaboration-with-cybersecurity-leader-wiz-and-aspiration-japan-to-revo</loc>
<lastmod>2024-08-27</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/758c9d_66ab35240f3349819c537ecdf1a701e4~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-32896-severe-privilege-escalation-flaw-in-android-pixel-devices</loc>
<lastmod>2024-08-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_6cae0a81031e4e219be1601d351c8203~mv2.webp</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/enterprise-security-it-s-a-marathon-not-a-sprint</loc>
<lastmod>2021-06-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_dcc3d07fd03642a7a70a8c7c57d92041~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-4577-php-cgi-os-command-injection-vulnerability</loc>
<lastmod>2024-07-31</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_145301441c2d4735b86600b5b580d7bf~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/why-must-cyber-security-and-digital-transformation-programs-go-hand-in-hand</loc>
<lastmod>2021-06-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/778bc0_9b474a49fae7442b8f0c4d1863bd1d20~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/suppliers-cybersecurity-ranking</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_5646543857355666487738~mv2_d_6000_4000_s_4_2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/windows-wi-fi-vulnerability-cve-2024-30078-mitigation-and-patch-guide</loc>
<lastmod>2024-09-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_aa9543bf54d0454da9d4b70a5eab39b7~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/open-source-intelligence-an-invaluable-tool-for-mergers-and-acquisitions</loc>
<lastmod>2022-09-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ea8995a863864247a3a12446140637a5~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3801-in-depth-analysis-and-mitigation-strategies-for-enhanced-cybersecurity</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_1260ed895bec46288eb2a4f6e790075c~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/think-twice-before-you-post-that-picture-check-out-socmint-social-media-osint</loc>
<lastmod>2022-05-30</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/73c818d494564f33883b5a2ffa08fb46.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/osint-the-go-to-tool-for-cryptocurrency-forensics</loc>
<lastmod>2022-05-20</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_3abaef8aa7a84ed588c9bcca1b71d128~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/ctem-101-understanding-continuous-threat-exposure-management</loc>
<lastmod>2024-08-08</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_0bfc9a3cd7704b31b4a41df7ae83fc97~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/third-party-risk-assessment-fatigue-why-should-you-care</loc>
<lastmod>2021-04-15</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_3c37351b5b854aaeb0ab87b7f650fc0e~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-3687-a-comprehensive-analysis-of-the-latest-security-vulnerability</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_acd8477f187b403bb43001035288b1c3~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/supply-chain-security-in-the-shadow-of-centreon-and-solarigate</loc>
<lastmod>2021-02-18</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_e63c551ea8314ae8ae39bd4e7f74341b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/a-crucial-shield-against-sophisticated-cyber-threats</loc>
<lastmod>2023-10-03</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_a532ad005e474231ac948a49e9390e0a~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-37084-critical-vulnerability-in-spring-cloud-data-flow-patch-now</loc>
<lastmod>2024-09-07</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ccd8ddf0ece348978b9e62a414b71e30~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/horizontal-and-vertical-domain-enumeration</loc>
<lastmod>2022-05-09</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_e6217db284124efb8fd1e482b2b80751~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/together-we-stand</loc>
<lastmod>2023-06-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/758c9d_0ab5f235ea7d4c87b653680e550a5fc6~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2021-40444-a-closer-look-at-the-office-document-exploit</loc>
<lastmod>2024-09-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_81b4e73565df4d78a91cacb772474af3~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/the-dark-side-of-chatgpt-and-implications-for-supply-chain-security</loc>
<lastmod>2023-06-05</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/758c9d_fa2d58254a9a413396375e0398107eaf~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/cve-2024-2389-understanding-the-impact-and-mitigation-strategies</loc>
<lastmod>2024-09-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_07bf29c4e3604ca8bd0d484144db8b59~mv2.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/how-to-protect-against-cve-2016-8020-a-high-severity-linux-code-injection-flaw</loc>
<lastmod>2024-09-01</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_ea4ee22bb0144280a3e599e9310bb774~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/how-a-cyberattack-could-effect-your-company-s-bottom-line</loc>
<lastmod>2022-07-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_511c06671fef427cb3ec08d1a746727b~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/how-to-make-your-small-business-a-hacker-s-nightmare</loc>
<lastmod>2020-12-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_fd0fd0e0a3804aaf886a3671f72c7769~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/windows-tcp-ip-vulnerability-cve-2024-38063-what-you-need-to-know</loc>
<lastmod>2024-08-21</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/eee5a8_eb76db1deb99445586b13d116397debc~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/mind-the-gap-yearly-assessments-for-third-party-supply-chain-vendors</loc>
<lastmod>2024-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_4d594b415a6c7a57364e77~mv2_d_6000_4000_s_4_2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/challenges-in-open-source-intelligence-managing-uncertainty-and-information-quality</loc>
<lastmod>2022-07-24</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/nsplsh_5a5439676a634a6f673655~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/the-olympic-cyber-games</loc>
<lastmod>2022-02-11</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_16a412f18fda4dd6902df2349b3c0222~mv2.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.rescanaassessment.com/post/navigating-the-new-norm-business-led-it-in-the-modern-enterprise</loc>
<lastmod>2023-11-13</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_4456ba5e63714bc79e2a51e9218fd0d1~mv2.jpg</image:loc>
</image:image>
</url>
</urlset>