<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
        http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog</loc>
        <lastmod>2026-04-03T03:05:21.225Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b89aa271-71e9-4883-b42b-b85a50b20e7f</loc>
        <lastmod>2026-04-03T03:05:21.225Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20Organizational%20Resilience%20and%20Evasive%20Propagation%20in%20Recent%20Security%20Incidents&amp;subtitle=Recent%20developments%20involving%20Hasbro%E2%80%99s%20incident%20response%20and%20the%20Water%20Saci%20campaign%20show%20the%20value%20...</image:loc>
            <image:title>Analyzing Organizational Resilience and Evasive Propagation in Recent Security Incidents</image:title>
            <image:caption>Recent developments involving Hasbro’s incident response and the Water Saci campaign show the value of proactive business continuity and granular email monitoring. By analyzing these events, security teams can refine endpoint protections and test response strategies to safely maintain operations during network disruptions.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-03T03:05:21.225Z</news:publication_date>
            <news:title>Analyzing Organizational Resilience and Evasive Propagation in Recent Security Incidents</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/24ca3b6e-405f-423a-81c9-c218aad3a515</loc>
        <lastmod>2026-04-03T03:05:20.625Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Bank%20Trojan%20&apos;Casbaneiro&apos;%20Utilizes%20Self-Propagating%20Techniques%20Across%20Latin%20America&amp;subtitle=A%20financially%20motivated%20threat%20group%20known%20as%20Water%20Saci%20is%20distributing%20the%20Casbaneiro%20banking%20troj...</image:loc>
            <image:title>Bank Trojan &apos;Casbaneiro&apos; Utilizes Self-Propagating Techniques Across Latin America</image:title>
            <image:caption>A financially motivated threat group known as Water Saci is distributing the Casbaneiro banking trojan across Latin America and Spain. By utilizing self-propagating email scripts and social engineering, the campaign aims to capture credentials, though modern endpoint defenses remain highly effective at disrupting this activity.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-03T03:05:20.625Z</news:publication_date>
            <news:title>Bank Trojan &apos;Casbaneiro&apos; Utilizes Self-Propagating Techniques Across Latin America</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/05282268-447a-4d14-9b63-b4d0db144a5c</loc>
        <lastmod>2026-04-03T03:05:19.225Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Hasbro%20unauthorized%20access%20incident%3A%20Remediation%20and%20business%20continuity%20efforts&amp;subtitle=Hasbro%20recently%20disclosed%20an%20unauthorized%20network%20access%20incident%20but%20successfully%20maintained%20key%20op...</image:loc>
            <image:title>Hasbro unauthorized access incident: Remediation and business continuity efforts</image:title>
            <image:caption>Hasbro recently disclosed an unauthorized network access incident but successfully maintained key operations through proactive business continuity planning. This event illustrates the measurable value of established incident response strategies in minimizing supply chain and production disruptions.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-03T03:05:19.225Z</news:publication_date>
            <news:title>Hasbro unauthorized access incident: Remediation and business continuity efforts</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/142eba32-4cd8-4b07-9231-cf63f796a172</loc>
        <lastmod>2026-04-02T03:27:53.624Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Threat%20Intelligence%20Update%3A%20Axios%20NPM%20Compromise%2C%20TeamPCP%20Cloud%20Operations%2C%20and%20Emerging%20MaaS%20Threats&amp;subtitle=This%20update%20covers%20recent%20shifts%20in%20the%20threat%20situation%2C%20including%20an%20unsafe%20dependency%20discovered%20...</image:loc>
            <image:title>Threat Intelligence Update: Axios NPM Compromise, TeamPCP Cloud Operations, and Emerging MaaS Threats</image:title>
            <image:caption>This update covers recent shifts in the threat situation, including an unsafe dependency discovered in the Axios NPM package, rapid cloud enumeration by TeamPCP, and permission risks in AI agents. We detail the technical mechanics of these operations and provide actionable remediation steps to help security teams harden their environments.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:53.624Z</news:publication_date>
            <news:title>Threat Intelligence Update: Axios NPM Compromise, TeamPCP Cloud Operations, and Emerging MaaS Threats</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d84434fa-f7da-427c-b537-83384c820a19</loc>
        <lastmod>2026-04-02T03:27:53.225Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Tracking%20the%20Resurgence%20of%20Pay2Key%20and%20Pseudo-Ransomware%20Operations&amp;subtitle=An%20analysis%20of%20recent%20intelligence%20detailing%20how%20state-aligned%20actors%20are%20leveraging%20pseudo-ransomwa...</image:loc>
            <image:title>Tracking the Resurgence of Pay2Key and Pseudo-Ransomware Operations</image:title>
            <image:caption>An analysis of recent intelligence detailing how state-aligned actors are leveraging pseudo-ransomware and financially motivated threat actors to obscure destructive operations. We review these evolving tactics and provide actionable guidance to help organizations protect their infrastructure and navigate associated compliance risks.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:53.225Z</news:publication_date>
            <news:title>Tracking the Resurgence of Pay2Key and Pseudo-Ransomware Operations</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/fc07bff1-e7d4-4dd3-85aa-1cdce0174039</loc>
        <lastmod>2026-04-02T03:27:52.825Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=TeamPCP%20expands%20unauthorized%20access%20to%20cloud%20and%20SaaS%20environments%20using%20compromised%20credentials&amp;subtitle=Recent%20supply%20chain%20incidents%20involving%20popular%20open%20source%20tools%20have%20led%20to%20unauthorized%20access%20ac...</image:loc>
            <image:title>TeamPCP expands unauthorized access to cloud and SaaS environments using compromised credentials</image:title>
            <image:caption>Recent supply chain incidents involving popular open source tools have led to unauthorized access across cloud and SaaS platforms. Security teams must rapidly rotate exposed credentials and monitor for anomalous enumeration activity to protect their environments.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:52.825Z</news:publication_date>
            <news:title>TeamPCP expands unauthorized access to cloud and SaaS environments using compromised credentials</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/fdc13099-4baf-4fb4-894d-35c8b63b126c</loc>
        <lastmod>2026-04-02T03:27:52.320Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20AI%20agents%3A%20Addressing%20default%20permission%20risks%20in%20Google%20Cloud%20Vertex%20AI&amp;subtitle=Security%20research%20into%20Google%20Cloud%E2%80%99s%20Vertex%20AI%20platform%20reveals%20how%20excessive%20default%20permissions%20i...</image:loc>
            <image:title>Securing AI agents: Addressing default permission risks in Google Cloud Vertex AI</image:title>
            <image:caption>Security research into Google Cloud’s Vertex AI platform reveals how excessive default permissions in deployed AI agents can lead to unauthorized access to sensitive data and infrastructure. Implementing a &quot;Bring Your Own Service Account&quot; (BYOSA) model allows organizations to enforce least-privilege access and safely integrate agentic AI into their environments.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:52.320Z</news:publication_date>
            <news:title>Securing AI agents: Addressing default permission risks in Google Cloud Vertex AI</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3422bdcc-63b6-4a82-96f4-d870d18a5e5c</loc>
        <lastmod>2026-04-02T03:27:50.525Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Unauthorized%20Modifications%20Identified%20in%20Axios%20NPM%20Package&amp;subtitle=Security%20researchers%20identified%20two%20unauthorized%20versions%20of%20the%20popular%20Axios%20NPM%20package%20that%20intr...</image:loc>
            <image:title>Unauthorized Modifications Identified in Axios NPM Package</image:title>
            <image:caption>Security researchers identified two unauthorized versions of the popular Axios NPM package that introduced a remote access trojan (RAT) through a hidden dependency. Organizations using Axios should review their dependency logs for specific indicators of compromise and verify their recent installation pipelines.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:50.525Z</news:publication_date>
            <news:title>Unauthorized Modifications Identified in Axios NPM Package</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/4a02f922-ddd3-4cbd-918b-4831cc91e91c</loc>
        <lastmod>2026-04-02T03:27:49.326Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Venom%20Stealer%20platform%20automates%20ClickFix%20social%20engineering%20and%20data%20exfiltration&amp;subtitle=Security%20researchers%20have%20identified%20Venom%20Stealer%2C%20a%20malware-as-a-service%20platform%20that%20automates%20C...</image:loc>
            <image:title>Venom Stealer platform automates ClickFix social engineering and data exfiltration</image:title>
            <image:caption>Security researchers have identified Venom Stealer, a malware-as-a-service platform that automates ClickFix social engineering campaigns and cryptocurrency theft. The platform combines deceptive user prompts with continuous data exfiltration, emphasizing the need for organizations to strengthen endpoint execution controls and monitor outbound traffic.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:49.326Z</news:publication_date>
            <news:title>Venom Stealer platform automates ClickFix social engineering and data exfiltration</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/76edb046-f2a5-4ee2-9353-5636dd0665a4</loc>
        <lastmod>2026-04-02T03:27:49.026Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20incidents%20increase%20pressure%20on%20Latin%20American%20government%20agencies&amp;subtitle=Government%20organizations%20in%20Latin%20America%20are%20navigating%20an%20elevated%20volume%20of%20security%20threats%20targ...</image:loc>
            <image:title>Security incidents increase pressure on Latin American government agencies</image:title>
            <image:caption>Government organizations in Latin America are navigating an elevated volume of security threats targeting public infrastructure. Assessing the structural factors behind this trend reveals clear, actionable steps agencies can take to secure legacy systems and protect citizen data.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:49.026Z</news:publication_date>
            <news:title>Security incidents increase pressure on Latin American government agencies</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/6503c969-c5c3-499a-9fb6-cc7c1d5e01bd</loc>
        <lastmod>2026-04-02T03:27:48.725Z</lastmod>
        <changefreq>daily</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Expanding%20the%20Cybersecurity%20Talent%20Pool%20in%20Latin%20America%20to%20Meet%20Growing%20Security%20Needs&amp;subtitle=A%20recent%20survey%20of%20Latin%20American%20security%20practitioners%20reveals%20a%20largely%20self-taught%20workforce.%20By...</image:loc>
            <image:title>Expanding the Cybersecurity Talent Pool in Latin America to Meet Growing Security Needs</image:title>
            <image:caption>A recent survey of Latin American security practitioners reveals a largely self-taught workforce. By adjusting hiring expectations and supporting non-traditional learning paths, organizations can better staff their teams and defend against regional threat activity.</image:caption>
        </image:image>
        <news:news>
            <news:publication>
                <news:name>Triage Security</news:name>
                <news:language>en</news:language>
            </news:publication>
            <news:publication_date>2026-04-02T03:27:48.725Z</news:publication_date>
            <news:title>Expanding the Cybersecurity Talent Pool in Latin America to Meet Growing Security Needs</news:title>
        </news:news>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c5286035-58b3-4ded-8e8d-9870bd7f0f89</loc>
        <lastmod>2026-03-31T03:13:26.307Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20reported%20zero-click%20vulnerability%20in%20Telegram&amp;subtitle=Security%20researchers%20and%20Telegram%20are%20currently%20examining%20a%20reported%20zero-click%20vulnerability%20(ZDI-C...</image:loc>
            <image:title>Evaluating the reported zero-click vulnerability in Telegram</image:title>
            <image:caption>Security researchers and Telegram are currently examining a reported zero-click vulnerability (ZDI-CAN-30207) potentially affecting Android and Linux clients. We outline the technical claims, the vendor&apos;s response, and practical steps organizations and individuals can take to safeguard their communications.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/6b23c7d0-8ad9-40c3-9ac0-71b404d8d225</loc>
        <lastmod>2026-03-31T03:13:25.507Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=F5%20BIG-IP%20vulnerability%20CVE-2025-53521%20reclassified%20as%20RCE%20and%20actively%20targeted&amp;subtitle=A%20vulnerability%20in%20F5&apos;s%20BIG-IP%20Access%20Policy%20Manager%20has%20been%20reclassified%20including%20a%20denial-of-ser...</image:loc>
            <image:title>F5 BIG-IP vulnerability CVE-2025-53521 reclassified as RCE and actively targeted</image:title>
            <image:caption>A vulnerability in F5&apos;s BIG-IP Access Policy Manager has been reclassified including a denial-of-service issue and a critical remote code execution flaw. With active targeting observed in the wild, organizations are advised to prioritize updates and review indicators of compromise.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b02aadc1-d209-4e37-b7d4-b4f262ac858a</loc>
        <lastmod>2026-03-31T03:13:24.808Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=DeepLoad%20credential%20stealer%20uses%20AI-generated%20padding%20and%20ClickFix%20delivery%20to%20evade%20static%20detection&amp;subtitle=Security%20researchers%20have%20identified%20DeepLoad%2C%20a%20new%20malware%20strain%20that%20captures%20credentials%20immedi...</image:loc>
            <image:title>DeepLoad credential stealer uses AI-generated padding and ClickFix delivery to evade static detection</image:title>
            <image:caption>Security researchers have identified DeepLoad, a new malware strain that captures credentials immediately upon execution and uses process injection to evade static scanning. To fully remediate affected hosts, organizations must look beyond standard file cleanup and address persistent WMI event subscriptions.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f0df3405-4885-4ec0-833f-a254c71d6c53</loc>
        <lastmod>2026-03-31T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20recent%20shifts%20in%20persistence%3A%20F5%20APM%20reclassification%20and%20DeepLoad%20evasion%20techniques&amp;subtitle=Unauthorized%20actors%20are%20increasingly%20adapting%20their%20persistence%20and%20evasion%20methods%2C%20utilizing%20AI-ge...</image:loc>
            <image:title>Evaluating recent shifts in persistence: F5 APM reclassification and DeepLoad evasion techniques</image:title>
            <image:caption>Unauthorized actors are increasingly adapting their persistence and evasion methods, utilizing AI-generated code to bypass static analysis and targeting newly reclassified perimeter vulnerabilities. This report details the technical mechanisms behind the DeepLoad credential-theft malware and the escalation of CVE-2025-53521 in F5 BIG-IP systems, providing actionable guidance to protect enterprise environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/315c3f74-cbc6-4b00-b96d-021e23228ec6</loc>
        <lastmod>2026-03-28T03:14:15.450Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20Shift%20Toward%20Evasive%20Targeting%20in%20Core%20Infrastructure%20and%20Mobile%20Environments&amp;subtitle=Recent%20data%20indicates%20that%20high-tier%20vulnerability%20frameworks%20are%20increasingly%20being%20adopted%20by%20broa...</image:loc>
            <image:title>Analyzing the Shift Toward Evasive Targeting in Core Infrastructure and Mobile Environments</image:title>
            <image:caption>Recent data indicates that high-tier vulnerability frameworks are increasingly being adopted by broader threat groups to target telecommunications and OT environments. This report details the shift toward kernel-level evasion and provides proactive remediation strategies for network monitoring and post-quantum cryptographic agility.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/855e8b96-64de-4084-8030-6cf9dffaed49</loc>
        <lastmod>2026-03-28T03:14:15.254Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=The%20Proliferation%20of%20Advanced%20iOS%20Vulnerability%20Frameworks%3A%20Coruna%20and%20DarkSword&amp;subtitle=Two%20sophisticated%20iOS%20vulnerability%20frameworks%2C%20Coruna%20and%20DarkSword%2C%20have%20transitioned%20including%20hi...</image:loc>
            <image:title>The Proliferation of Advanced iOS Vulnerability Frameworks: Coruna and DarkSword</image:title>
            <image:caption>Two sophisticated iOS vulnerability frameworks, Coruna and DarkSword, have transitioned including highly resourced origins to financially motivated threat actors. This shift emphasizes the need for organizations to implement comprehensive mobile visibility and credential protection and defend against advanced lateral movement capabilities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/67f1e0ab-9cdc-48da-b354-e732a1cda69d</loc>
        <lastmod>2026-03-28T03:14:15.056Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Preparing%20for%20Google&apos;s%202029%20post-quantum%20cryptography%20timeline&amp;subtitle=Google%20has%20committed%20to%20integrating%20post-quantum%20cryptography%20(PQC)%20across%20its%20infrastructure%20by%20the...</image:loc>
            <image:title>Preparing for Google&apos;s 2029 post-quantum cryptography timeline</image:title>
            <image:caption>Google has committed to integrating post-quantum cryptography (PQC) across its infrastructure by the end of 2029, with a specific focus on protecting authentication services. Security teams can begin preparing today by conducting cryptographic inventories, building crypto agility, and confirming vendor migration roadmaps.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aafdbfce-f042-4cfa-87e7-18a65b34a2f9</loc>
        <lastmod>2026-03-28T03:14:14.859Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operational%20Technology%20Security%20Incidents%20With%20Physical%20Consequences%20Decline%20by%2025%25&amp;subtitle=A%20recent%20report%20indicates%20a%2025%25%20drop%20in%20physically%20impactful%20OT%20security%20incidents%20in%202025.%20We%20revie...</image:loc>
            <image:title>Operational Technology Security Incidents With Physical Consequences Decline by 25%</image:title>
            <image:caption>A recent report indicates a 25% drop in physically impactful OT security incidents in 2025. We review the data, the underlying factors driving this change, and why event severity remains high despite the lower overall volume.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/ac3fa6da-1e3a-4848-a2be-697ea295255b</loc>
        <lastmod>2026-03-28T03:14:14.660Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Nation-state%20actors%20increasingly%20target%20exposed%20IP%20cameras%20for%20intelligence%20and%20physical%20targeting&amp;subtitle=Recent%20geopolitical%20conflicts%20have%20driven%20threat%20actors%20to%20leverage%20compromised%20internet-connected%20c...</image:loc>
            <image:title>Nation-state actors increasingly target exposed IP cameras for intelligence and physical targeting</image:title>
            <image:caption>Recent geopolitical conflicts have driven threat actors to leverage compromised internet-connected cameras and cyber-physical systems for operational visibility. Security researchers emphasize that organizations must actively manage shadow IT and secure legacy IoT devices to avoid exposure in opportunistic scanning campaigns.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f23b8e7e-785f-4f6e-a28a-89fcfd0b32f9</loc>
        <lastmod>2026-03-28T03:14:14.462Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Red%20Menshen%20evolves%20BPFdoor%20implant%20to%20maintain%20covert%20access%20in%20global%20telecommunications&amp;subtitle=The%20advanced%20persistent%20threat%20group%20Red%20Menshen%20has%20upgraded%20its%20BPFdoor%20Linux%20kernel%20implant%20to%20be...</image:loc>
            <image:title>Red Menshen evolves BPFdoor implant to maintain covert access in global telecommunications</image:title>
            <image:caption>The advanced persistent threat group Red Menshen has upgraded its BPFdoor Linux kernel implant to better evade detection within telecommunications, government, and critical infrastructure networks. By hiding triggers in standard HTTPS and ICMP traffic, the malware presents new visibility challenges that require security teams to adopt proactive, kernel-level threat hunting.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1632b9c8-5e82-42ca-8b78-fb895d53ac56</loc>
        <lastmod>2026-03-27T03:14:07.211Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Accelerated%20Threat%20Timelines%3A%20Managing%20Risks%20in%20AI%20Frameworks%20and%20Global%20Supply%20Chains&amp;subtitle=Recent%20vulnerabilities%20in%20AI%20frameworks%20and%20regulatory%20shifts%20in%20hardware%20procurement%20demonstrate%20a%20...</image:loc>
            <image:title>Accelerated Threat Timelines: Managing Risks in AI Frameworks and Global Supply Chains</image:title>
            <image:caption>Recent vulnerabilities in AI frameworks and regulatory shifts in hardware procurement demonstrate a shrinking window for defensive response. This report outlines active risks across software and physical supply chains, providing actionable mitigations to help security teams maintain resilient, verified environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/797f6f1d-8c52-43e7-a3d4-969978bec88c</loc>
        <lastmod>2026-03-27T03:14:07.011Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20Role%20of%20Intermediaries%20in%20the%20Commercial%20Surveillance%20Market&amp;subtitle=The%20supply%20chain%20for%20commercial%20surveillance%20technology%20is%20growing%20increasingly%20complex%20due%20to%20a%20net...</image:loc>
            <image:title>Analyzing the Role of Intermediaries in the Commercial Surveillance Market</image:title>
            <image:caption>The supply chain for commercial surveillance technology is growing increasingly complex due to a network of third-party intermediaries. A recent Atlantic Council report details how these brokers and resellers obscure visibility, complicating regulatory efforts while highlighting the need for stricter &quot;Know Your Vendor&quot; requirements.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/e96f9a28-051e-424b-9813-85a7c8d6023a</loc>
        <lastmod>2026-03-27T03:14:06.813Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20AI%20models%20for%20software%20dependency%20decisions&amp;subtitle=Recent%20analysis%20indicates%20that%20organizations%20relying%20on%20large%20language%20models%20for%20software%20dependenc...</image:loc>
            <image:title>Evaluating AI models for software dependency decisions</image:title>
            <image:caption>Recent analysis indicates that organizations relying on large language models for software dependency upgrades may inadvertently introduce or maintain vulnerabilities. Integrating real-time ecosystem intelligence is necessary to ensure AI-assisted development tools provide accurate, secure remediation guidance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/dca5435d-bee4-48df-b656-b4a7e2bef9cb</loc>
        <lastmod>2026-03-27T03:14:06.613Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Critical%20Vulnerability%20in%20Langflow%20AI%20Platform%20Requires%20Immediate%20Remediation&amp;subtitle=A%20critical%20code%20injection%20flaw%20in%20the%20Langflow%20AI%20framework%20(CVE-2026-33017)%20allows%20unauthenticated%20...</image:loc>
            <image:title>Critical Vulnerability in Langflow AI Platform Requires Immediate Remediation</image:title>
            <image:caption>A critical code injection flaw in the Langflow AI framework (CVE-2026-33017) allows unauthenticated remote code execution. With active scanning and unauthorized access attempts observed within 24 hours of disclosure, organizations must upgrade to version 1.9.0 and implement runtime defenses immediately.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/e3921f5e-a7e6-4627-b246-1acfe74e79d9</loc>
        <lastmod>2026-03-27T03:14:06.416Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20Security%20Impact%20of%20the%20FCC&apos;s%20Router%20Ban&amp;subtitle=The%20FCC&apos;s%20recent%20decision%20to%20halt%20approvals%20for%20specific%20foreign-made%20routers%20aims%20to%20protect%20nation...</image:loc>
            <image:title>Evaluating the Security Impact of the FCC&apos;s Router Ban</image:title>
            <image:caption>The FCC&apos;s recent decision to halt approvals for specific foreign-made routers aims to protect national infrastructure, but industry researchers caution it could complicate hardware replacement cycles. Organizations can maintain strong defensive postures by focusing on operational security fundamentals while the hardware market adapts.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d4044e73-7f44-4f68-81f7-4c2aee40272e</loc>
        <lastmod>2026-03-26T03:20:50.958Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evolving%20Defense%20Methodologies%20and%20AI%20Automation%20at%20RSAC%202026&amp;subtitle=An%20analysis%20of%20security%20developments%20discussed%20at%20RSAC%202026%2C%20focusing%20on%20the%20acceleration%20of%20AI-driv...</image:loc>
            <image:title>Evolving Defense Methodologies and AI Automation at RSAC 2026</image:title>
            <image:caption>An analysis of security developments discussed at RSAC 2026, focusing on the acceleration of AI-driven threat methodologies and the necessary shift toward automated, human-validated defensive workflows. The findings emphasize the importance of verifiable software supply chains and deliberate attribution strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a33b5920-c628-4c84-8e2b-33a1eda53cc7</loc>
        <lastmod>2026-03-26T03:20:50.650Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20technical%20impact%20and%20claims%20of%20Iran-aligned%20threat%20actors%20in%20the%20Gulf%20region&amp;subtitle=While%20politically%20motivated%20threat%20groups%20aligned%20with%20Iran%20claim%20to%20have%20caused%20widespread%20disrupti...</image:loc>
            <image:title>Evaluating the technical impact and claims of Iran-aligned threat actors in the Gulf region</image:title>
            <image:caption>While politically motivated threat groups aligned with Iran claim to have caused widespread disruption in the Gulf region, technical evidence indicates their material impact remains limited. This analysis examines how these groups use supply chain compromises and public relations tactics to overstate their access, and outlines how security teams can protect their infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a712dbd3-36f4-442e-b3e7-295bdc860614</loc>
        <lastmod>2026-03-26T03:20:50.258Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Former%20NSA%20Directors%20Discuss%20Policy%20Thresholds%20for%20Cyber%20Operations%20at%20RSAC%202026&amp;subtitle=A%20panel%20of%20four%20former%20National%20Security%20Agency%20directors%20at%20RSAC%202026%20examined%20US%20strategy%20on%20state...</image:loc>
            <image:title>Former NSA Directors Discuss Policy Thresholds for Cyber Operations at RSAC 2026</image:title>
            <image:caption>A panel of four former National Security Agency directors at RSAC 2026 examined US strategy on state-level cyber operations, the thresholds for military response, and the current state of public-private collaboration in cybersecurity.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d2f8d56a-3042-4f39-bbb6-c038b7258d9a</loc>
        <lastmod>2026-03-26T03:20:49.558Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=SANS%202026%3A%20Top%20five%20emerging%20threat%20methodologies%20and%20defensive%20strategies&amp;subtitle=At%20the%20RSAC%202026%20Conference%2C%20SANS%20researchers%20detailed%20five%20ways%20threat%20actors%20are%20integrating%20artif...</image:loc>
            <image:title>SANS 2026: Top five emerging threat methodologies and defensive strategies</image:title>
            <image:caption>At the RSAC 2026 Conference, SANS researchers detailed five ways threat actors are integrating artificial intelligence into their operations. The findings emphasize the need for enhanced operational technology visibility, verifiable supply chain data, and AI-supported defensive workflows to maintain organizational security.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/e12912e6-d037-40c3-a096-d814508fe32f</loc>
        <lastmod>2026-03-26T03:20:49.157Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Threat%20Actors%20Impersonate%20Palo%20Alto%20Networks%20Recruiters%20in%20Employment%20Fraud%20Campaign&amp;subtitle=Unauthorized%20actors%20are%20targeting%20senior-level%20professionals%20with%20a%20sophisticated%20social%20engineering...</image:loc>
            <image:title>Threat Actors Impersonate Palo Alto Networks Recruiters in Employment Fraud Campaign</image:title>
            <image:caption>Unauthorized actors are targeting senior-level professionals with a sophisticated social engineering campaign that mimics the Palo Alto Networks recruitment process. By understanding this methodology and recognizing manufactured bureaucratic barriers, organizations and candidates can better safeguard their professional identities and financial security.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/cfff76e4-fcbb-41cf-9485-c1fe9df1fcf1</loc>
        <lastmod>2026-03-26T03:20:48.757Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Navigating%20the%20risks%20of%20public%20threat%20actor%20attribution&amp;subtitle=Security%20leaders%20at%20RSAC%202026%20evaluated%20the%20complexities%20of%20public%20threat%20actor%20attribution.%20While%20i...</image:loc>
            <image:title>Navigating the risks of public threat actor attribution</image:title>
            <image:caption>Security leaders at RSAC 2026 evaluated the complexities of public threat actor attribution. While identifying the source of a security incident can provide valuable context, definitive public statements carry distinct risks for an affected organization&apos;s communication strategy and risk management.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c2f45872-d53f-4ca7-b5df-0d10ebd7e86f</loc>
        <lastmod>2026-03-26T03:20:48.257Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=European%20officials%20lead%20AI%20and%20regulatory%20discussions%20at%20RSAC%202026&amp;subtitle=Following%20the%20withdrawal%20of%20US%20federal%20agencies%20from%20RSAC%202026%2C%20European%20cybersecurity%20leaders%20engag...</image:loc>
            <image:title>European officials lead AI and regulatory discussions at RSAC 2026</image:title>
            <image:caption>Following the withdrawal of US federal agencies from RSAC 2026, European cybersecurity leaders engaged the private sector to establish security standards for AI-generated code and prepare for the upcoming EU Cyber Resilience Act.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f3e433a5-2991-472c-a735-1c7993bbe9c1</loc>
        <lastmod>2026-03-25T03:16:19.695Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Developer%20Environments%20Against%20Emerging%20Supply%20Chain%20and%20AI%20Assistant%20Vulnerabilities&amp;subtitle=Recent%20supply%20chain%20incidents%20and%20newly%20identified%20vulnerabilities%20in%20AI%20coding%20assistants%20present%20s...</image:loc>
            <image:title>Securing Developer Environments Against Emerging Supply Chain and AI Assistant Vulnerabilities</image:title>
            <image:caption>Recent supply chain incidents and newly identified vulnerabilities in AI coding assistants present significant risks to developer workstations. By enforcing strict isolation for AI-automated tasks and adopting proactive secret management, security teams can effectively safeguard the software development life cycle from unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3955be3e-eb63-4668-a299-9be186c07c3e</loc>
        <lastmod>2026-03-25T03:16:19.495Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Threat%20actors%20distribute%20compromised%20GitHub%20packages%20using%20OpenClaw%20and%20gaming%20lures&amp;subtitle=A%20large-scale%20operation%20tracked%20as%20%22TroyDen&apos;s%20Lure%20Factory%22%20is%20distributing%20more%20than%20300%20compromise...</image:loc>
            <image:title>Threat actors distribute compromised GitHub packages using OpenClaw and gaming lures</image:title>
            <image:caption>A large-scale operation tracked as &quot;TroyDen&apos;s Lure Factory&quot; is distributing more than 300 compromised GitHub packages via artificial intelligence-generated lures. Security teams must look beyond automated sandbox analysis to identify these dual-component threats before they enter the software supply chain.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c5541bb8-ff50-42d4-89ad-5fac0f527b5d</loc>
        <lastmod>2026-03-25T03:16:19.196Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Reevaluating%20endpoint%20security%20in%20the%20era%20of%20AI%20coding%20assistants&amp;subtitle=Recent%20research%20presented%20at%20RSAC%202026%20identifies%20systemic%20vulnerabilities%20in%20popular%20AI%20coding%20assi...</image:loc>
            <image:title>Reevaluating endpoint security in the era of AI coding assistants</image:title>
            <image:caption>Recent research presented at RSAC 2026 identifies systemic vulnerabilities in popular AI coding assistants that bypass traditional endpoint defenses. By adjusting configurations and establishing zero-trust policies for developer environments, organizations can safely integrate these tools while maintaining reliable security visibility.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9f3cbe61-909a-4fdf-972d-81136daad191</loc>
        <lastmod>2026-03-25T03:16:18.796Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Checkmarx%20KICS%20and%20VS%20Code%20plugins%20affected%20by%20widening%20supply%20chain%20security%20incident&amp;subtitle=Following%20a%20recent%20incident%20involving%20the%20Trivy%20security%20scanner%2C%20threat%20actors%20have%20introduced%20info...</image:loc>
            <image:title>Checkmarx KICS and VS Code plugins affected by widening supply chain security incident</image:title>
            <image:caption>Following a recent incident involving the Trivy security scanner, threat actors have introduced infostealing malware into Checkmarx KICS, OpenVSX plugins, and the Litellm Python package. Organizations can protect their CI/CD pipelines by identifying exposed secrets and rotating credentials immediately.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8030b0a7-dc50-4c60-b585-6eab2c669a54</loc>
        <lastmod>2026-03-24T03:13:47.291Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20the%20Supply%20Chain%20and%20AI%20Integration%3A%20Analysis%20of%20the%20Trivy%20Exposure%20and%20PureLog%20Campaign&amp;subtitle=Recent%20security%20incidents%20affecting%20the%20Trivy%20CI%2FCD%20ecosystem%20and%20ongoing%20PureLog%20infostealer%20campai...</image:loc>
            <image:title>Securing the Supply Chain and AI Integration: Analysis of the Trivy Exposure and PureLog Campaign</image:title>
            <image:caption>Recent security incidents affecting the Trivy CI/CD ecosystem and ongoing PureLog infostealer campaigns require immediate attention and specific configuration changes. Alongside these active developments, early trials of AI integration in security operations show measurable efficiency gains, provided organizations implement strict human-on-the-loop governance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/fbd65e65-0179-44e5-b3de-4f515255bce6</loc>
        <lastmod>2026-03-24T03:13:46.991Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Threat%20actors%20conceal%20PureLog%20infostealer%20in%20copyright%20infringement%20notices&amp;subtitle=A%20targeted%20phishing%20campaign%20is%20using%20localized%20copyright%20infringement%20notices%20to%20distribute%20the%20Pur...</image:loc>
            <image:title>Threat actors conceal PureLog infostealer in copyright infringement notices</image:title>
            <image:caption>A targeted phishing campaign is using localized copyright infringement notices to distribute the PureLog infostealer. By employing a multi-stage, fileless execution process, threat actors aim to bypass traditional defenses and access sensitive data in critical sectors.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/afcb3a85-b614-4245-83f7-0cc6689bb73a</loc>
        <lastmod>2026-03-24T03:13:46.291Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=CISOs%20Evaluate%20the%20Human%20Role%20in%20AI-Powered%20Security%20at%20RSAC%202026&amp;subtitle=Security%20leaders%20from%20Google%20Cloud%2C%20Vodafone%2C%20and%20PayPal%20outline%20methodologies%20for%20integrating%20AI%20sa...</image:loc>
            <image:title>CISOs Evaluate the Human Role in AI-Powered Security at RSAC 2026</image:title>
            <image:caption>Security leaders from Google Cloud, Vodafone, and PayPal outline methodologies for integrating AI safely, evaluating the balance between automated defenses, scalable guardrails, and necessary human oversight.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5d730f47-8420-4268-a90e-1b093933bf5d</loc>
        <lastmod>2026-03-24T03:13:45.891Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20incident%20involving%20open-source%20Trivy%20components%20and%20CI%2FCD%20environments&amp;subtitle=An%20unauthorized%20party%20compromised%20specific%20open-source%20components%20of%20the%20Trivy%20security%20scanner%2C%20mod...</image:loc>
            <image:title>Security incident involving open-source Trivy components and CI/CD environments</image:title>
            <image:caption>An unauthorized party compromised specific open-source components of the Trivy security scanner, modifying existing GitHub Action tags to collect sensitive CI/CD secrets. Organizations using affected Trivy components during the exposure window should immediately audit their pipelines and rotate accessible credentials.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5c644040-88ec-495d-8815-fd5ca066803f</loc>
        <lastmod>2026-03-24T03:13:45.674Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20AI%20in%20the%20SOC%3A%20Operational%20Metrics%20and%20Governance%20from%20RSAC%202026&amp;subtitle=Enterprise%20security%20leaders%20from%20the%20financial%20and%20manufacturing%20sectors%20shared%20results%20from%20a%20six-m...</image:loc>
            <image:title>Evaluating AI in the SOC: Operational Metrics and Governance from RSAC 2026</image:title>
            <image:caption>Enterprise security leaders from the financial and manufacturing sectors shared results from a six-month trial integrating AI into their Security Operations Centers. The findings demonstrate that while large language models effectively reduce analyst fatigue and time-to-discovery, safe deployment requires strict read-only architectures and human-in-the-loop governance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/91fe8aef-f29a-4d3e-bf7b-386f27b9c26a</loc>
        <lastmod>2026-03-21T03:17:49.556Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20the%20Execution%20Layer%3A%20Remediation%20Strategies%20for%20Emerging%20Edge%20and%20Identity%20Vulnerabilities&amp;subtitle=Recent%20advisories%20for%20Oracle%20and%20Cisco%20infrastructure%2C%20alongside%20evolving%20ransomware%20methodologies%2C%20...</image:loc>
            <image:title>Securing the Execution Layer: Remediation Strategies for Emerging Edge and Identity Vulnerabilities</image:title>
            <image:caption>Recent advisories for Oracle and Cisco infrastructure, alongside evolving ransomware methodologies, require immediate attention from enterprise security teams. This briefing outlines the technical mechanisms of these vulnerabilities and provides actionable mitigation strategies to protect identity management systems and edge devices.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/7c3ed62b-ac78-413d-b70c-2ea191dd6290</loc>
        <lastmod>2026-03-21T03:17:49.353Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=EU%20implements%20sanctions%20against%20technology%20firms%20in%20China%20and%20Iran%20for%20malicious%20cyber%20activities&amp;subtitle=The%20European%20Council%20has%20applied%20restrictive%20measures%20to%20three%20organizations%20and%20two%20individuals%20for...</image:loc>
            <image:title>EU implements sanctions against technology firms in China and Iran for malicious cyber activities</image:title>
            <image:caption>The European Council has applied restrictive measures to three organizations and two individuals for their roles in unauthorized access campaigns against European infrastructure. The action reflects a structured regulatory response to state-sponsored operations and supply chain risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2e17a619-a8d5-45fa-8b9b-68eba0d37441</loc>
        <lastmod>2026-03-21T03:17:49.156Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Addressing%20architectural%20security%20risks%20in%20Model%20Context%20Protocol%20integrations&amp;subtitle=The%20integration%20of%20the%20Model%20Context%20Protocol%20(MCP)%20shifts%20large%20language%20models%20from%20text%20generator...</image:loc>
            <image:title>Addressing architectural security risks in Model Context Protocol integrations</image:title>
            <image:caption>The integration of the Model Context Protocol (MCP) shifts large language models from text generators to autonomous execution engines, introducing distinct architectural risks. Organizations adopting MCP must implement structural defenses, such as behavioral baselines and strict access controls, to protect enterprise data from unauthorized instructions.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3c9e533d-6f43-4fce-9731-bd446ba46ce8</loc>
        <lastmod>2026-03-21T03:17:48.756Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Interlock%20Ransomware%20Group%20Targets%20Cisco%20Enterprise%20Firewalls%20via%20CVE-2026-20131&amp;subtitle=A%20critical%20vulnerability%20in%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)%20software%20is%20being%20leverage...</image:loc>
            <image:title>Interlock Ransomware Group Targets Cisco Enterprise Firewalls via CVE-2026-20131</image:title>
            <image:caption>A critical vulnerability in Cisco Secure Firewall Management Center (FMC) software is being leveraged by the Interlock ransomware group. Organizations using affected Cisco products should apply available patches immediately to protect their networks from unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/eaf07f04-d3e0-47b1-b0fa-965f3f1d3953</loc>
        <lastmod>2026-03-21T03:17:48.157Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20an%20Exposed%20Beast%20Ransomware%20Server%20and%20Shared%20Toolsets&amp;subtitle=Security%20researchers%20recently%20analyzed%20an%20exposed%20server%20belonging%20to%20the%20Beast%20ransomware%20group%2C%20re...</image:loc>
            <image:title>Analysis of an Exposed Beast Ransomware Server and Shared Toolsets</image:title>
            <image:caption>Security researchers recently analyzed an exposed server belonging to the Beast ransomware group, revealing a reliance on common administrative tools for unauthorized access. This discovery provides organizations with actionable data to strengthen defenses by monitoring dual-use applications and implementing resilient backup strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/08fd0825-6797-4a1b-a245-3276d77393cb</loc>
        <lastmod>2026-03-21T03:17:47.756Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Oracle%20issues%20out-of-band%20patch%20for%20critical%20Fusion%20Middleware%20vulnerability&amp;subtitle=Oracle%20has%20released%20a%20special%20security%20alert%20for%20CVE-2026-21992%2C%20a%20CVSS%209.8%20vulnerability%20in%20Fusion%20...</image:loc>
            <image:title>Oracle issues out-of-band patch for critical Fusion Middleware vulnerability</image:title>
            <image:caption>Oracle has released a special security alert for CVE-2026-21992, a CVSS 9.8 vulnerability in Fusion Middleware that allows unauthenticated remote code execution. Organizations using Oracle Identity Manager and Web Services Manager should prioritize applying the provided updates to protect enterprise environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d709c52c-87df-4d48-84be-fcbcc872b20e</loc>
        <lastmod>2026-03-19T03:18:46.980Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20Convergence%20of%20State-Level%20Methodologies%20and%20Enterprise%20Security%20Risks&amp;subtitle=Recent%20security%20disclosures%20detail%20advanced%20methodologies%20transitioning%20into%20financially%20motivated%20c...</image:loc>
            <image:title>Evaluating the Convergence of State-Level Methodologies and Enterprise Security Risks</image:title>
            <image:caption>Recent security disclosures detail advanced methodologies transitioning into financially motivated campaigns across mobile, desktop, and AI environments. This update provides technical context on these findings and actionable steps to help organizations protect their infrastructure and user data.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1b01c6ea-a4d7-4d6c-989b-3cd3355649d5</loc>
        <lastmod>2026-03-19T03:18:46.768Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Addressing%20communication%20gaps%20between%20technical%20and%20business%20teams&amp;subtitle=Effective%20cybersecurity%20relies%20on%20strong%20collaboration%20between%20technical%20and%20non-technical%20personnel...</image:loc>
            <image:title>Addressing communication gaps between technical and business teams</image:title>
            <image:caption>Effective cybersecurity relies on strong collaboration between technical and non-technical personnel. Security professionals Rebecca and Kevin Grapsy outline how organizations can overcome communication barriers by aligning shared goals and building trust.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/24e9cc4f-63de-4e19-9319-931689801f6e</loc>
        <lastmod>2026-03-19T03:18:46.262Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Assessing%20the%20data%20privacy%20risks%20of%20social%20media%20tracking%20pixels&amp;subtitle=Recent%20security%20research%20indicates%20that%20default%20configurations%20in%20Meta%20and%20TikTok%20tracking%20pixels%20of...</image:loc>
            <image:title>Assessing the data privacy risks of social media tracking pixels</image:title>
            <image:caption>Recent security research indicates that default configurations in Meta and TikTok tracking pixels often collect sensitive user data before consent is granted. Organizations must rigorously review and restrict these third-party integrations to protect user privacy and maintain regulatory compliance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5a2a168b-4298-4907-8284-33401d4798d2</loc>
        <lastmod>2026-03-19T03:18:45.868Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=SideWinder%20Threat%20Group%20Expands%20Espionage%20Operations%20Across%20Southeast%20Asia&amp;subtitle=Security%20researchers%20have%20observed%20the%20SideWinder%20threat%20group%20expanding%20its%20intelligence-gathering%20...</image:loc>
            <image:title>SideWinder Threat Group Expands Espionage Operations Across Southeast Asia</image:title>
            <image:caption>Security researchers have observed the SideWinder threat group expanding its intelligence-gathering operations into Indonesia and Thailand. By understanding the group&apos;s dynamic infrastructure rotation and shifting defensive strategies including static indicators and behavioral techniques, organizations can better protect their networks against these persistent campaigns.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/7f1f2b50-cb54-4777-9fe3-83b0cddb3e9f</loc>
        <lastmod>2026-03-19T03:18:45.557Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20&apos;Claudy%20Day&apos;%20Vulnerability%20Chain%20in%20Claude%20AI&amp;subtitle=Researchers%20from%20Oasis%20Security%20recently%20identified%20a%20chain%20of%20three%20vulnerabilities%20in%20Anthropic&apos;s%20...</image:loc>
            <image:title>Evaluating the &apos;Claudy Day&apos; Vulnerability Chain in Claude AI</image:title>
            <image:caption>Researchers from Oasis Security recently identified a chain of three vulnerabilities in Anthropic&apos;s Claude AI that could allow unauthorized parties to access sensitive user data. This report details the mechanics of the exposure and offers actionable guidance for organizations deploying AI agents with access to enterprise systems.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8263b465-8c77-40a5-914b-2be9e5a025fb</loc>
        <lastmod>2026-03-19T03:18:44.756Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=DarkSword%3A%20Mobile%20Vulnerability%20Chain%20Targets%20Broad%20Range%20of%20iOS%20Users&amp;subtitle=Security%20researchers%20have%20identified%20DarkSword%2C%20a%20sophisticated%20iOS%20vulnerability%20chain%20affecting%20iO...</image:loc>
            <image:title>DarkSword: Mobile Vulnerability Chain Targets Broad Range of iOS Users</image:title>
            <image:caption>Security researchers have identified DarkSword, a sophisticated iOS vulnerability chain affecting iOS versions 18.4 through 18.7. By understanding its deployment methods and dual-use targeting, organizations can better protect their mobile fleets through timely updates and enhanced configuration protocols.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5fe5eb73-25f2-46af-a581-02edefcfedf1</loc>
        <lastmod>2026-03-19T03:18:44.156Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Technical%20Analysis%20of%20the%20SnappyClient%20C2%20Implant%20and%20Delivery%20Mechanisms&amp;subtitle=Recent%20analysis%20of%20the%20SnappyClient%20command-and-control%20(C2)%20implant%20details%20its%20evasion%20techniques%2C...</image:loc>
            <image:title>Technical Analysis of the SnappyClient C2 Implant and Delivery Mechanisms</image:title>
            <image:caption>Recent analysis of the SnappyClient command-and-control (C2) implant details its evasion techniques, delivery via HijackLoader, and data collection capabilities. Security teams can use these findings to improve detection of long-term, stealthy unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a91be385-8440-4333-aee3-9b14131cc8a4</loc>
        <lastmod>2026-03-18T03:16:55.854Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evasion%20Through%20Normalcy%3A%20The%20Shift%20Toward%20Identity-Based%20Compromise%20and%20Session%20Takeovers&amp;subtitle=Threat%20actors%20are%20increasingly%20bypassing%20traditional%20perimeter%20defenses%20by%20leveraging%20stolen%20credent...</image:loc>
            <image:title>Evasion Through Normalcy: The Shift Toward Identity-Based Compromise and Session Takeovers</image:title>
            <image:caption>Threat actors are increasingly bypassing traditional perimeter defenses by leveraging stolen credentials and active session cookies to authenticate directly into environments. This analysis covers the evolving tactics in credential theft, the pivot toward native administration tools, and practical guidance for strengthening identity verification and behavioral baselining.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3b6b06dc-9104-4688-905f-b6a130d987cc</loc>
        <lastmod>2026-03-18T03:16:55.643Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Warlock%20threat%20group%20updates%20post-compromise%20methodologies&amp;subtitle=The%20Warlock%20threat%20group%20has%20refined%20its%20network%20intrusion%20methodology%2C%20integrating%20new%20evasion%20tool...</image:loc>
            <image:title>Warlock threat group updates post-compromise methodologies</image:title>
            <image:caption>The Warlock threat group has refined its network intrusion methodology, integrating new evasion tools and kernel-level tampering techniques. Understanding these operational shifts helps security teams strengthen defenses around public-facing assets and monitor for advanced post-compromise activity.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aa53518f-53e5-42ff-a504-bf2d5c730e92</loc>
        <lastmod>2026-03-18T03:16:55.432Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=7-stage%20phishing%20campaign%20targets%20security%20firm%20Outpost24&amp;subtitle=Threat%20actors%20launched%20a%20highly%20evasive%20credential%20collection%20campaign%20against%20an%20Outpost24%20executiv...</image:loc>
            <image:title>7-stage phishing campaign targets security firm Outpost24</image:title>
            <image:caption>Threat actors launched a highly evasive credential collection campaign against an Outpost24 executive, chaining trusted services like Cisco and Nylas to bypass email security. By analyzing the 7-stage redirect sequence, organizations can better understand how to implement layered defenses and zero-trust principles against phishing-as-a-service operations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3f941d8c-fd23-4500-853d-658e64b18c92</loc>
        <lastmod>2026-03-18T03:16:55.148Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Shifting%20Extortion%20Economics%20Drive%20Threat%20Actors%20Toward%20Native%20Tooling&amp;subtitle=Declining%20ransomware%20payment%20rates%20are%20prompting%20threat%20actors%20to%20alter%20their%20methodologies.%20Recent%20...</image:loc>
            <image:title>Shifting Extortion Economics Drive Threat Actors Toward Native Tooling</image:title>
            <image:caption>Declining ransomware payment rates are prompting threat actors to alter their methodologies. Recent telemetry indicates a strong operational shift away from custom malware toward the abuse of native system tools, requiring organizations to focus on identity controls and behavioral baselining.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/85217d63-662f-4cb9-bba0-cc6302aea1cb</loc>
        <lastmod>2026-03-18T03:16:54.433Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Credential%20Theft%20and%20Session%20Hijacking%20Emerge%20as%20Primary%20Initial%20Access%20Vectors&amp;subtitle=Recent%202025%20threat%20data%20indicates%20that%20unauthorized%20parties%20increasingly%20rely%20on%20stolen%20credentials%20...</image:loc>
            <image:title>Credential Theft and Session Hijacking Emerge as Primary Initial Access Vectors</image:title>
            <image:caption>Recent 2025 threat data indicates that unauthorized parties increasingly rely on stolen credentials and active session cookies rather than traditional perimeter bypasses. This analysis reviews the intelligence and outlines actionable steps for organizations to shift toward continuous identity monitoring and phishing-resistant authentication.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/781ac8c2-5532-4b1c-8e88-463ebc27a442</loc>
        <lastmod>2026-03-17T03:09:42.280Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Tracking%20the%20Misuse%20of%20Legitimate%20Infrastructure%20in%20Recent%20Security%20Campaigns&amp;subtitle=Recent%20developments%20show%20an%20increasing%20reliance%20by%20unauthorized%20parties%20on%20trusted%20cloud%20services%2C%20I...</image:loc>
            <image:title>Tracking the Misuse of Legitimate Infrastructure in Recent Security Campaigns</image:title>
            <image:caption>Recent developments show an increasing reliance by unauthorized parties on trusted cloud services, IDE extensions, and SaaS chat platforms to maintain persistence and bypass standard visibility. This report details the technical mechanisms behind these campaigns—including dead-drop resolvers and transitive dependencies—and provides actionable guidance for securing affected environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a1d597cb-c73b-489c-8864-c4b38a47ab74</loc>
        <lastmod>2026-03-17T03:09:42.011Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Threat%20actors%20leverage%20LiveChat%20services%20to%20harvest%20payment%20and%20personal%20data&amp;subtitle=Malicious%20actors%20are%20increasingly%20misusing%20the%20LiveChat%20customer%20support%20platform%20to%20conduct%20real-ti...</image:loc>
            <image:title>Threat actors leverage LiveChat services to harvest payment and personal data</image:title>
            <image:caption>Malicious actors are increasingly misusing the LiveChat customer support platform to conduct real-time social engineering. This article examines two recent campaigns identified by Cofense that impersonate trusted brands to harvest sensitive user data, offering guidance on strengthening organizational defenses against conversational phishing.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/23fb2e22-5a56-482a-8a77-59fb2ae42ed1</loc>
        <lastmod>2026-03-17T03:09:41.802Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=GlassWorm%20Campaign%20Uses%20Transitive%20Dependencies%20to%20Compromise%20Open%20VSX%20Packages&amp;subtitle=Recent%20security%20research%20indicates%20the%20GlassWorm%20campaign%20has%20evolved%20to%20use%20transitive%20dependencies...</image:loc>
            <image:title>GlassWorm Campaign Uses Transitive Dependencies to Compromise Open VSX Packages</image:title>
            <image:caption>Recent security research indicates the GlassWorm campaign has evolved to use transitive dependencies within the Open VSX ecosystem. By leveraging extensionPack and extensionDependencies, unauthorized components can bypass initial reviews, highlighting the need for organizations to audit developer tooling updates and dependency chains.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1abd4bf0-da0f-45da-8784-b9dd3b8816f7</loc>
        <lastmod>2026-03-17T03:09:41.579Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20CL-STA-1087%20campaign%3A%20Long-term%20persistence%20in%20Southeast%20Asian%20military%20networks&amp;subtitle=Security%20researchers%20have%20detailed%20a%20multi-year%20cyberespionage%20campaign%20targeting%20Southeast%20Asian%20mi...</image:loc>
            <image:title>Analyzing the CL-STA-1087 campaign: Long-term persistence in Southeast Asian military networks</image:title>
            <image:caption>Security researchers have detailed a multi-year cyberespionage campaign targeting Southeast Asian military organizations. By understanding the threat actors&apos; use of custom backdoors and legitimate cloud services, organizations can better secure their environments against similar persistence mechanisms.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2ea89243-bb6b-49a3-ad3a-86f52b0f46a7</loc>
        <lastmod>2026-03-14T03:12:29.234Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Accelerated%20Vulnerability%20Operationalization%20Requires%20Shift%20to%20Automated%20Posture%20Enforcement&amp;subtitle=Recent%20data%20from%20cloud%20providers%20and%20infrastructure%20vendors%20indicates%20a%20significant%20reduction%20in%20the...</image:loc>
            <image:title>Accelerated Vulnerability Operationalization Requires Shift to Automated Posture Enforcement</image:title>
            <image:caption>Recent data from cloud providers and infrastructure vendors indicates a significant reduction in the response window for newly disclosed vulnerabilities. Security teams must transition from relying on public proof-of-concept testing to implementing automated virtual patching and identity-centric controls.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5cb8a947-108c-4290-bbcc-d59adba78353</loc>
        <lastmod>2026-03-14T03:12:28.825Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20PixRevolution%3A%20Real-Time%20Interception%20of%20Brazil&apos;s%20Pix%20Payment%20System&amp;subtitle=Security%20researchers%20have%20identified%20PixRevolution%2C%20a%20strain%20of%20Android%20banking%20malware%20that%20interce...</image:loc>
            <image:title>Analysis of PixRevolution: Real-Time Interception of Brazil&apos;s Pix Payment System</image:title>
            <image:caption>Security researchers have identified PixRevolution, a strain of Android banking malware that intercepts instant payments by streaming device screens to remote operators. Defending against this requires organizations to integrate device-level threat visibility directly into their fraud detection workflows to identify unauthorized access before transactions complete.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/64fe2a14-dddd-48ce-b262-280eacdff0a8</loc>
        <lastmod>2026-03-14T03:12:28.535Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Software%20Vulnerabilities%20Surpass%20Credential%20Issues%20for%20Initial%20Access%20in%20Google%20Cloud&amp;subtitle=Threat%20actors%20increasingly%20target%20user-managed%20cloud%20software%20rather%20than%20credentials%20for%20initial%20ac...</image:loc>
            <image:title>Software Vulnerabilities Surpass Credential Issues for Initial Access in Google Cloud</image:title>
            <image:caption>Threat actors increasingly target user-managed cloud software rather than credentials for initial access. This shift indicates a need for organizations to adopt rapid, automated patching and identity-centric defenses to protect cloud environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/4c1478f4-6eff-4ea9-a265-336c0b181bcd</loc>
        <lastmod>2026-03-14T03:12:28.318Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Prioritizing%20Cisco%20SD-WAN%20Vulnerabilities%3A%20Navigating%20PoC%20Reliability%20and%20Hidden%20Risks&amp;subtitle=Security%20teams%20managing%20Cisco%20Catalyst%20SD-WAN%20environments%20face%20a%20complex%20scene%20of%20new%20vulnerabiliti...</image:loc>
            <image:title>Prioritizing Cisco SD-WAN Vulnerabilities: Navigating PoC Reliability and Hidden Risks</image:title>
            <image:caption>Security teams managing Cisco Catalyst SD-WAN environments face a complex scene of new vulnerabilities and unreliable proof-of-concept data. By evaluating verified research and securing hidden risks like CVE-2026-20133, organizations can effectively protect their network infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a906d073-a689-4813-bed8-c8607559aaf7</loc>
        <lastmod>2026-03-13T03:17:22.719Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Adapting%20Defenses%20to%20Operational%20Blending%20Between%20State%20Actors%20and%20Commodity%20Cybercrime&amp;subtitle=Recent%20technical%20analysis%20indicates%20that%20state-sponsored%20groups%20are%20actively%20utilizing%20commodity%20cyb...</image:loc>
            <image:title>Adapting Defenses to Operational Blending Between State Actors and Commodity Cybercrime</image:title>
            <image:caption>Recent technical analysis indicates that state-sponsored groups are actively utilizing commodity cybercrime infrastructure to accelerate disruptive operations. By understanding this operational blending, security teams can better prioritize commodity malware alerts and reinforce their identity and recovery infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f536c6a6-5091-4b18-a156-b8ae950ba5ca</loc>
        <lastmod>2026-03-13T03:17:22.228Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20Stryker%20Security%20Incident%20and%20Lessons%20for%20Global%20Disaster%20Recovery&amp;subtitle=A%20recent%20security%20incident%20involving%20destructive%20malware%20at%20medical%20technology%20provider%20Stryker%20demo...</image:loc>
            <image:title>Analyzing the Stryker Security Incident and Lessons for Global Disaster Recovery</image:title>
            <image:caption>A recent security incident involving destructive malware at medical technology provider Stryker demonstrates the necessity of isolated identity infrastructure and tested business continuity plans. By examining this event, organizations can strengthen their resilience against total-loss scenarios in complex, multinational environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f2ba52cf-1cb2-4e76-be5d-f9110da8f25c</loc>
        <lastmod>2026-03-13T03:17:21.734Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evolving%20US%20Policy%20and%20the%20Commercial%20Surveillance%20Industry&amp;subtitle=A%20review%20of%20recent%20regulatory%20shifts%20concerning%20commercial%20surveillance%20tools%2C%20detailing%20changes%20in%20...</image:loc>
            <image:title>Evolving US Policy and the Commercial Surveillance Industry</image:title>
            <image:caption>A review of recent regulatory shifts concerning commercial surveillance tools, detailing changes in federal contracts and corporate acquisitions that impact organizational threat models and global security postures.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/66d24983-e73a-4134-9c0d-153b23470cb0</loc>
        <lastmod>2026-03-13T03:17:21.318Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Iranian%20Intelligence%20Integrates%20Criminal%20Infrastructure%20to%20Expand%20Digital%20Operations&amp;subtitle=Analysis%20of%20recent%20security%20incidents%20reveals%20that%20Iran&apos;s%20Ministry%20of%20Intelligence%20and%20Security%20(MOI...</image:loc>
            <image:title>Iranian Intelligence Integrates Criminal Infrastructure to Expand Digital Operations</image:title>
            <image:caption>Analysis of recent security incidents reveals that Iran&apos;s Ministry of Intelligence and Security (MOIS) is actively utilizing commercial criminal tools and access brokers. Organizations must adjust their threat models, as activity resembling standard financially motivated crime may actually mask destructive state-directed operations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/ef4704df-34d6-4b5e-aebb-a5cfd54843a9</loc>
        <lastmod>2026-03-12T03:23:28.796Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20Recent%20Physical%20Cloud%20Disruptions%2C%20Targeted%20Campaigns%2C%20and%20CI%2FCD%20Pipeline%20Risks&amp;subtitle=Recent%20events%20spanning%20physical%20cloud%20disruptions%20in%20the%20Middle%20East%2C%20state-sponsored%20campaigns%20in%20Q...</image:loc>
            <image:title>Evaluating Recent Physical Cloud Disruptions, Targeted Campaigns, and CI/CD Pipeline Risks</image:title>
            <image:caption>Recent events spanning physical cloud disruptions in the Middle East, state-sponsored campaigns in Qatar, and supply chain incidents demonstrate the need for geographic resilience and strict credential auditing. This review provides technical indicators and structural guidance to help security teams protect their infrastructure and CI/CD pipelines.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2c7f56f5-d081-4e46-9727-c46a126becfc</loc>
        <lastmod>2026-03-12T03:23:28.396Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Cloud%20Resilience%20and%20Geographic%20Risk%20Following%20Middle%20East%20Infrastructure%20Disruptions&amp;subtitle=Recent%20physical%20impacts%20to%20major%20cloud%20data%20centers%20demonstrate%20that%20cloud%20infrastructure%20carries%20th...</image:loc>
            <image:title>Cloud Resilience and Geographic Risk Following Middle East Infrastructure Disruptions</image:title>
            <image:caption>Recent physical impacts to major cloud data centers demonstrate that cloud infrastructure carries the same geographic and kinetic risks as other physical assets. Organizations are advised to distinguish between high availability and true resilience by evaluating their disaster recovery, latency requirements, and data sovereignty strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2c843eb9-9b6a-45f5-958e-ac85cc9958e2</loc>
        <lastmod>2026-03-12T03:23:28.187Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Chinese-nexus%20threat%20actors%20shift%20focus%20to%20Qatari%20entities%20amid%20regional%20conflict&amp;subtitle=Following%20recent%20geopolitical%20events%20in%20the%20Middle%20East%2C%20security%20researchers%20have%20observed%20a%20shift%20...</image:loc>
            <image:title>Chinese-nexus threat actors shift focus to Qatari entities amid regional conflict</image:title>
            <image:caption>Following recent geopolitical events in the Middle East, security researchers have observed a shift in targeting by Chinese-nexus threat actors toward organizations in Qatar. This activity relies on conflict-themed lures to deploy remote access tools, demonstrating the need for organizations to reinforce foundational security controls like endpoint detection and response (EDR) and multifactor authentication (MFA).</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9f771f54-7c4e-4ed3-b455-aa64d2cfb206</loc>
        <lastmod>2026-03-12T03:23:27.897Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Xygeni%20GitHub%20Action%20Compromised%20via%20Tag%20Poisoning&amp;subtitle=An%20unauthorized%20party%20gained%20access%20to%20a%20widely%20used%20GitHub%20Action%20maintained%20by%20Xygeni%2C%20leveraging%20...</image:loc>
            <image:title>Xygeni GitHub Action Compromised via Tag Poisoning</image:title>
            <image:caption>An unauthorized party gained access to a widely used GitHub Action maintained by Xygeni, leveraging compromised credentials to manipulate a mutable release tag. The incident emphasizes the need for strict identity management and release immutability within CI/CD pipelines.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/addb3058-cdcd-406a-a54b-29052810ee75</loc>
        <lastmod>2026-03-12T03:23:27.487Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=INC%20Ransomware%20Operations%20Target%20Oceania%20Healthcare%20Sector&amp;subtitle=Cybersecurity%20authorities%20in%20Australia%2C%20New%20Zealand%2C%20and%20Tonga%20have%20issued%20a%20joint%20advisory%20detailin...</image:loc>
            <image:title>INC Ransomware Operations Target Oceania Healthcare Sector</image:title>
            <image:caption>Cybersecurity authorities in Australia, New Zealand, and Tonga have issued a joint advisory detailing how the INC ransomware operation is gaining unauthorized access to regional healthcare networks. By reviewing the group&apos;s methodologies, security teams can better implement the foundational access controls and monitoring required to protect critical patient care facilities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3f7b4d74-e223-40c8-8b7d-66f0b585b7b1</loc>
        <lastmod>2026-03-11T03:27:39.784Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20the%20March%20security%20updates%2C%20cloud%20guest%20access%20risks%2C%20and%20evolving%20persistence%20methodologies&amp;subtitle=While%20the%20March%20Microsoft%20update%20cycle%20presents%20a%20manageable%20volume%20of%20standard%20elevations%2C%20security...</image:loc>
            <image:title>Evaluating the March security updates, cloud guest access risks, and evolving persistence methodologies</image:title>
            <image:caption>While the March Microsoft update cycle presents a manageable volume of standard elevations, security teams must address parallel risks in specific business workflows. Immediate priorities include hardening Salesforce guest access configurations and implementing protective measures against new EDR-disabling tools targeting recruitment pipelines.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/767b0ae1-4a2a-4ce4-963d-157d0e485a08</loc>
        <lastmod>2026-03-11T03:27:39.588Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=&apos;BlackSanta&apos;%20threat%20campaign%20targets%20HR%20workflows%20to%20bypass%20EDR%20protections&amp;subtitle=A%20newly%20documented%20threat%20campaign%20utilizes%20resume-themed%20files%20and%20steganography%20to%20deliver%20the%20Bla...</image:loc>
            <image:title>&apos;BlackSanta&apos; threat campaign targets HR workflows to bypass EDR protections</image:title>
            <image:caption>A newly documented threat campaign utilizes resume-themed files and steganography to deliver the BlackSanta evasion tool, specifically targeting human resources pipelines. The campaign relies on vulnerable kernel drivers to bypass endpoint security, demonstrating why organizations must extend strict endpoint hardening and monitoring to their recruitment workflows.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/dd2b25b3-0991-4ee6-89d0-e6f349257835</loc>
        <lastmod>2026-03-11T03:27:38.988Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Sednit%20threat%20group%20resumes%20use%20of%20custom%20espionage%20toolkits&amp;subtitle=Recent%20analysis%20reveals%20that%20the%20Sednit%20threat%20group%20has%20returned%20to%20deploying%20specialized%20implants%2C...</image:loc>
            <image:title>Sednit threat group resumes use of custom espionage toolkits</image:title>
            <image:caption>Recent analysis reveals that the Sednit threat group has returned to deploying specialized implants, using a dual-tool strategy and legitimate cloud services to maintain unauthorized access to Ukrainian networks. Organizations can improve their defensive posture by understanding the group&apos;s updated methods for command-and-control communications and initial access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/fa85aa01-d4ca-4904-ac85-34513644db11</loc>
        <lastmod>2026-03-11T03:27:38.488Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Salesforce%20Experience%20Cloud%20against%20unauthorized%20guest%20user%20access&amp;subtitle=Unauthorized%20parties%20are%20leveraging%20excessively%20permissive%20guest%20user%20configurations%20in%20Salesforce%20E...</image:loc>
            <image:title>Securing Salesforce Experience Cloud against unauthorized guest user access</image:title>
            <image:caption>Unauthorized parties are leveraging excessively permissive guest user configurations in Salesforce Experience Cloud to access sensitive CRM data. By applying least-privilege principles and auditing API exposure, organizations can systematically protect their environments from these data collection efforts.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5b769330-f458-493c-9aa5-ef26cb7b279d</loc>
        <lastmod>2026-03-11T03:27:37.787Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Microsoft%20patches%2083%20vulnerabilities%20in%20March%20security%20update&amp;subtitle=Microsoft&apos;s%20March%20security%20update%20addresses%2083%20vulnerabilities%2C%20including%20an%20AI-discovered%20flaw%20and%20...</image:loc>
            <image:title>Microsoft patches 83 vulnerabilities in March security update</image:title>
            <image:caption>Microsoft&apos;s March security update addresses 83 vulnerabilities, including an AI-discovered flaw and several remote code execution issues. Security experts recommend processing this release through standard testing cycles, as it lacks the severity that typically requires emergency deployment.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/324a04cd-875e-4325-ac5c-09d2264a7d8f</loc>
        <lastmod>2026-03-10T03:24:01.303Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Adapting%20Defense%20Postures%20to%20the%20New%20Federal%20Cyber%20Strategy%20and%20Developer-Targeted%20Campaigns&amp;subtitle=A%20shift%20in%20federal%20cybersecurity%20policy%20and%20the%20emergence%20of%20campaigns%20targeting%20developer%20environme...</image:loc>
            <image:title>Adapting Defense Postures to the New Federal Cyber Strategy and Developer-Targeted Campaigns</image:title>
            <image:caption>A shift in federal cybersecurity policy and the emergence of campaigns targeting developer environments require organizations to adapt their protective strategies. By examining the mechanics of InstallFix operations and the persistent techniques of CL-UNK-1068, security teams can implement targeted telemetry and standardize workflows to safeguard critical infrastructure and the engineering pipeline.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/80212123-8edf-4ce4-9d4e-606a50fcb939</loc>
        <lastmod>2026-03-10T03:24:01.108Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20CL-UNK-1068%20Operations%20Targeting%20Asian%20Critical%20Infrastructure&amp;subtitle=Since%20at%20least%202020%2C%20a%20threat%20actor%20tracked%20as%20CL-UNK-1068%20has%20maintained%20unauthorized%20access%20across...</image:loc>
            <image:title>Analysis of CL-UNK-1068 Operations Targeting Asian Critical Infrastructure</image:title>
            <image:caption>Since at least 2020, a threat actor tracked as CL-UNK-1068 has maintained unauthorized access across critical infrastructure sectors in Asia. By leveraging open-source tools and living-off-the-land techniques, the group focuses on credential theft and data exfiltration. This analysis outlines the group&apos;s methodology and provides actionable guidance to help organizations secure their environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8a25702e-a63f-4d29-b0f3-3d7d5c56a3b4</loc>
        <lastmod>2026-03-10T03:24:00.688Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Deceptive%20&apos;InstallFix&apos;%20Campaigns%20Target%20Developer%20Environments%20via%20Cloned%20AI%20Tool%20Sites&amp;subtitle=A%20newly%20identified%20social%20engineering%20technique%20relies%20on%20deceptive%20search%20advertisements%20to%20distrib...</image:loc>
            <image:title>Deceptive &apos;InstallFix&apos; Campaigns Target Developer Environments via Cloned AI Tool Sites</image:title>
            <image:caption>A newly identified social engineering technique relies on deceptive search advertisements to distribute unauthorized command-line installation scripts. Security teams must ensure developers verify package sources to protect enterprise environments from credential theft.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/99107789-fb9d-4319-874e-88e6c76b54d3</loc>
        <lastmod>2026-03-10T03:24:00.387Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=White%20House%20Cyber%20Strategy%20Emphasizes%20Preemptive%20Deterrence%20and%20Deregulation&amp;subtitle=The%20new%20federal%20cyber%20strategy%20outlines%20a%20shift%20toward%20proactive%20disruption%20of%20threat%20actors%2C%20reduce...</image:loc>
            <image:title>White House Cyber Strategy Emphasizes Preemptive Deterrence and Deregulation</image:title>
            <image:caption>The new federal cyber strategy outlines a shift toward proactive disruption of threat actors, reduced regulatory compliance burdens, and modernized infrastructure. Security leaders should anticipate changes in federal coordination and reporting expectations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f1c9a96b-b8da-4f01-9dbb-bf1b9e448b76</loc>
        <lastmod>2026-03-08T04:05:27.332Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=AI-Assisted%20Network%20Operations%3A%20Analyzing%20the%20Impact%20on%20Reconnaissance%20and%20Lateral%20Movement&amp;subtitle=Recent%20findings%20including%20a%20widespread%20security%20incident%20within%20the%20Mexican%20government%20demonstrate%20h...</image:loc>
            <image:title>AI-Assisted Network Operations: Analyzing the Impact on Reconnaissance and Lateral Movement</image:title>
            <image:caption>Recent findings including a widespread security incident within the Mexican government demonstrate how unauthorized parties are using commercial large language models and automate network reconnaissance and credential testing. For defensive teams, this necessitates a shift toward stricter identity-based access controls and machine-speed observability to protect sensitive environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/99740993-b53c-4a44-99b2-3a8d35819b4f</loc>
        <lastmod>2026-03-08T04:05:27.030Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20Role%20of%20Commercial%20AI%20in%20Recent%20Government%20Security%20Incidents&amp;subtitle=Recent%20unauthorized%20access%20to%20Mexican%20government%20systems%20provides%20concrete%20data%20on%20how%20commercial%20la...</image:loc>
            <image:title>Analyzing the Role of Commercial AI in Recent Government Security Incidents</image:title>
            <image:caption>Recent unauthorized access to Mexican government systems provides concrete data on how commercial large language models can accelerate the efficiency of unauthorized groups. Understanding these methodologies helps organizations adapt their defenses and prioritize systemic resilience against automated reconnaissance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/48d7f359-3aa2-40a3-aaf4-be402edb2986</loc>
        <lastmod>2026-03-07T04:13:37.429Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Addressing%20the%20Convergence%20of%20AI-Driven%20Insider%20Threats%20and%20Cyber-Kinetic%20Operations&amp;subtitle=Recent%20intelligence%20reveals%20that%20threat%20actors%20are%20operationalizing%20AI%20to%20scale%20fraudulent%20employmen...</image:loc>
            <image:title>Addressing the Convergence of AI-Driven Insider Threats and Cyber-Kinetic Operations</image:title>
            <image:caption>Recent intelligence reveals that threat actors are operationalizing AI to scale fraudulent employment schemes and integrating edge device compromises into physical military doctrines. This briefing details the tactics used by DPRK and Iranian-aligned clusters and provides actionable guidance to help organizations secure their hiring pipelines and external infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/63f8a0ec-8fb4-4e1a-a0cc-57fb01a7c1e5</loc>
        <lastmod>2026-03-07T04:13:36.928Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20convergence%20of%20cyber%20and%20kinetic%20operations%20in%20the%20Middle%20East&amp;subtitle=Threat%20intelligence%20indicates%20an%20increasing%20integration%20of%20digital%20operations%20and%20physical%20military%20...</image:loc>
            <image:title>Analyzing the convergence of cyber and kinetic operations in the Middle East</image:title>
            <image:caption>Threat intelligence indicates an increasing integration of digital operations and physical military action by state-aligned actors. Organizations can mitigate related risks by prioritizing security updates for actively targeted edge devices, particularly IP cameras.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/25794c3b-df37-4a03-9266-4dcaa5d2b498</loc>
        <lastmod>2026-03-07T04:13:36.128Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=North%20Korean%20Threat%20Actors%20Apply%20AI%20to%20Scale%20Fraudulent%20IT%20Worker%20Schemes&amp;subtitle=Threat%20actors%20linked%20to%20North%20Korea%20are%20integrating%20artificial%20intelligence%20into%20their%20workflows%20to%20...</image:loc>
            <image:title>North Korean Threat Actors Apply AI to Scale Fraudulent IT Worker Schemes</image:title>
            <image:caption>Threat actors linked to North Korea are integrating artificial intelligence into their workflows to bypass hiring verification and maintain unauthorized access. By understanding how these groups use large language models and generated media, organizations can partner across security and human resources teams to strengthen their screening and identity validation processes.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1bd26710-da2f-4c21-aadd-0af0d8fcc241</loc>
        <lastmod>2026-03-06T04:23:09.029Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Adapting%20to%20High-Volume%20Automated%20Threats%20and%20Edge%20Infrastructure%20Vulnerabilities&amp;subtitle=Recent%20data%20indicates%20a%20shift%20toward%20high-volume%2C%20automated%20threat%20generation%20alongside%20the%20takedown...</image:loc>
            <image:title>Adapting to High-Volume Automated Threats and Edge Infrastructure Vulnerabilities</image:title>
            <image:caption>Recent data indicates a shift toward high-volume, automated threat generation alongside the takedown of the Tycoon 2FA credential harvesting platform. We review these changing tactics, critical edge infrastructure vulnerabilities in Cisco systems, and the structural defenses required to protect modern environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/4eff7461-54c3-4318-95c9-ee4fd60524f5</loc>
        <lastmod>2026-03-06T04:23:08.627Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20regional%20threat%20landscapes%3A%20Latin%20America%20experiences%20twice%20the%20volume%20of%20US%20security%20incidents&amp;subtitle=Recent%20threat%20intelligence%20indicates%20organizations%20in%20Latin%20America%20face%20an%20average%20of%203%2C100%20securit...</image:loc>
            <image:title>Evaluating regional threat landscapes: Latin America experiences twice the volume of US security incidents</image:title>
            <image:caption>Recent threat intelligence indicates organizations in Latin America face an average of 3,100 security threats per week. Understanding these regional differences in threat delivery and sector focus helps security teams allocate resources and strengthen defenses effectively.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9a220cd3-e0c1-4dce-83d0-3178801be788</loc>
        <lastmod>2026-03-06T04:23:08.429Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Cisco%20addresses%2048%20firewall%20vulnerabilities%2C%20including%20two%20critical%20FMC%20findings&amp;subtitle=Cisco%20has%20released%20updates%20to%20address%2048%20vulnerabilities%20across%20its%20firewall%20ecosystem%2C%20prioritizing...</image:loc>
            <image:title>Cisco addresses 48 firewall vulnerabilities, including two critical FMC findings</image:title>
            <image:caption>Cisco has released updates to address 48 vulnerabilities across its firewall ecosystem, prioritizing two critical flaws in the Secure Firewall Management Center (FMC). Organizations are advised to apply the latest software versions to safeguard their network perimeters and prevent unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/0cb6f35d-871b-41c1-94dc-60cab842c34b</loc>
        <lastmod>2026-03-06T04:23:08.129Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Coordinated%20Global%20Operation%20Disrupts%20Tycoon%202FA%20Phishing%20Platform&amp;subtitle=Europol%20and%20private-sector%20partners%20recently%20dismantled%20the%20infrastructure%20of%20Tycoon%202FA%2C%20a%20prominen...</image:loc>
            <image:title>Coordinated Global Operation Disrupts Tycoon 2FA Phishing Platform</image:title>
            <image:caption>Europol and private-sector partners recently dismantled the infrastructure of Tycoon 2FA, a prominent phishing-as-a-service platform. This operation neutralizes a major source of adversary-in-the-middle (AitM) campaigns and reinforces the critical need for organizations to adopt phishing-resistant authentication methods.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/391d134c-2872-48af-92ef-8dd506ac1e3b</loc>
        <lastmod>2026-03-06T04:23:07.730Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=State-sponsored%20group%20adopts%20AI-assisted%20code%20generation%20for%20malware%20operations&amp;subtitle=The%20Pakistan-linked%20threat%20group%20APT36%20is%20leveraging%20AI-assisted%20%22vibe-coding%22%20to%20generate%20high%20volu...</image:loc>
            <image:title>State-sponsored group adopts AI-assisted code generation for malware operations</image:title>
            <image:caption>The Pakistan-linked threat group APT36 is leveraging AI-assisted &quot;vibe-coding&quot; to generate high volumes of malicious software in niche programming languages. While the resulting code is often logically flawed, this automated approach aims to overwhelm standard detection baselines, highlighting the need for foundational network security and active monitoring.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aaa4932f-49d5-4311-aacc-47df6ae1f0b5</loc>
        <lastmod>2026-03-05T04:24:54.129Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Management%20Planes%3A%20Mitigating%20Risks%20in%20VMware%20Aria%20Operations%20and%20Emerging%20Regional%20Campaigns&amp;subtitle=Recent%20security%20developments%20highlight%20elevated%20risks%20to%20infrastructure%20management%20platforms%20and%20non...</image:loc>
            <image:title>Securing Management Planes: Mitigating Risks in VMware Aria Operations and Emerging Regional Campaigns</image:title>
            <image:caption>Recent security developments highlight elevated risks to infrastructure management platforms and non-human identities. Organizations must prioritize patching VMware Aria Operations against CVE-2026-22719 while auditing internal authentication mechanisms to defend against sophisticated, region-specific operations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/88791138-2351-4e64-bf01-07000b7eddec</loc>
        <lastmod>2026-03-05T04:24:53.830Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20non-human%20identities%20and%20AI%20agent%20workloads%20in%20modern%20environments&amp;subtitle=As%20AI%20agents%20and%20non-human%20identities%20expand%20across%20cloud%20infrastructure%2C%20traditional%20static%20authent...</image:loc>
            <image:title>Securing non-human identities and AI agent workloads in modern environments</image:title>
            <image:caption>As AI agents and non-human identities expand across cloud infrastructure, traditional static authentication methods introduce significant security risks. This overview examines upcoming research on modernizing workload identity through dynamic credentials, short-lived access, and open standards.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3cdd7534-8580-4ec0-b16e-a84c2ee6c59a</loc>
        <lastmod>2026-03-05T04:24:53.130Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Assessing%20the%20operations%20and%20infrastructure%20of%20the%20Sloppy%20Lemming%20threat%20actor&amp;subtitle=A%20detailed%20analysis%20of%20the%20evolving%20tactics%20and%20custom%20Rust-based%20tooling%20used%20by%20the%20Sloppy%20Lemming...</image:loc>
            <image:title>Assessing the operations and infrastructure of the Sloppy Lemming threat actor</image:title>
            <image:caption>A detailed analysis of the evolving tactics and custom Rust-based tooling used by the Sloppy Lemming threat actor to target critical infrastructure in South Asia. We review their infrastructure expansion and provide insights to help organizations safeguard their environments against these specific execution sequences.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/13e57ac7-1898-46a9-9176-21df7aa1f1c9</loc>
        <lastmod>2026-03-05T04:24:52.644Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Silver%20Dragon%20threat%20group%20targets%20government%20entities%20in%20Southeast%20Asia%20and%20Europe&amp;subtitle=Researchers%20have%20identified%20Silver%20Dragon%2C%20a%20threat%20group%20linked%20to%20APT41%2C%20conducting%20cyber-espionag...</image:loc>
            <image:title>Silver Dragon threat group targets government entities in Southeast Asia and Europe</image:title>
            <image:caption>Researchers have identified Silver Dragon, a threat group linked to APT41, conducting cyber-espionage operations against government organizations in Southeast Asia and Europe. By utilizing phishing campaigns and vulnerable public-facing servers, the group gains initial access before hijacking legitimate system services to establish long-term persistence.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/165c0a77-dc17-47f8-b69d-bd09e1439d2e</loc>
        <lastmod>2026-03-05T04:24:51.930Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Addressing%20CVE-2026-22719%3A%20Command%20Injection%20Vulnerability%20in%20VMware%20Aria%20Operations&amp;subtitle=A%20high-severity%20command%20injection%20vulnerability%20in%20VMware%20Aria%20Operations%20(CVE-2026-22719)%20has%20promp...</image:loc>
            <image:title>Addressing CVE-2026-22719: Command Injection Vulnerability in VMware Aria Operations</image:title>
            <image:caption>A high-severity command injection vulnerability in VMware Aria Operations (CVE-2026-22719) has prompted updates including Broadcom and an addition to the CISA KEV catalog. We strongly recommend organizations apply the available patches or implement the provided script workaround and protect their virtual infrastructure from unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c08d27e0-3700-430e-baa0-3da31fc6b8ad</loc>
        <lastmod>2026-03-04T04:28:50.522Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Briefing%3A%20Regional%20Cyber%20Escalation%2C%20ShadowV2%20Botnet%20Activity%2C%20and%20March%202026%20Mobile%20Vulnerabilities&amp;subtitle=This%20briefing%20covers%20recent%20state-aligned%20digital%20activity%20affecting%20critical%20infrastructure%2C%20mitiga...</image:loc>
            <image:title>Security Briefing: Regional Cyber Escalation, ShadowV2 Botnet Activity, and March 2026 Mobile Vulnerabilities</image:title>
            <image:caption>This briefing covers recent state-aligned digital activity affecting critical infrastructure, mitigation steps for the ShadowV2 botnet, and critical patching priorities for the Android ecosystem. We provide actionable guidance to help defensive teams harden cloud assets and manage mobile device risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/6325082c-dba5-48a9-9314-26ce2f4b692a</loc>
        <lastmod>2026-03-04T04:28:50.130Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Elevated%20Cyber%20Risk%20and%20Defensive%20Guidance%20Following%20Middle%20East%20Military%20Escalation&amp;subtitle=Recent%20kinetic%20military%20operations%20in%20the%20Middle%20East%20have%20prompted%20a%20surge%20in%20retaliatory%20cyber%20ope...</image:loc>
            <image:title>Elevated Cyber Risk and Defensive Guidance Following Middle East Military Escalation</image:title>
            <image:caption>Recent kinetic military operations in the Middle East have prompted a surge in retaliatory cyber operations targeting critical infrastructure and cloud environments globally. We recommend security teams review these observed tactics to strengthen their defenses and protect their organizations against DDoS campaigns, data wiping, and unauthorized network access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/0dcda786-3d32-4ed2-bf7f-321086c18367</loc>
        <lastmod>2026-03-04T04:28:49.221Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Qualcomm%20Zero-Day%20Vulnerability%20Observed%20in%20Targeted%20Android%20Activity&amp;subtitle=Google%E2%80%99s%20March%202026%20Android%20security%20bulletin%20addresses%20over%20100%20vulnerabilities%2C%20prioritizing%20a%20hig...</image:loc>
            <image:title>Qualcomm Zero-Day Vulnerability Observed in Targeted Android Activity</image:title>
            <image:caption>Google’s March 2026 Android security bulletin addresses over 100 vulnerabilities, prioritizing a high-severity Qualcomm graphics kernel flaw and a critical privilege escalation issue. Security teams should evaluate the risk of chained techniques and coordinate with device manufacturers to verify patch deployment.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/830a120b-9aeb-415b-ac81-0fd29d4e5627</loc>
        <lastmod>2026-03-04T04:28:48.521Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Assessing%20privacy%20risks%20in%20vehicle%20tire%20pressure%20monitoring%20systems&amp;subtitle=Security%20researchers%20have%20demonstrated%20that%20unencrypted%20wireless%20transmissions%20from%20standard%20tire%20pr...</image:loc>
            <image:title>Assessing privacy risks in vehicle tire pressure monitoring systems</image:title>
            <image:caption>Security researchers have demonstrated that unencrypted wireless transmissions from standard tire pressure sensors can expose vehicle location and movement patterns. This finding demonstrates the need for secure-by-design architectures in automotive telemetry.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/02c57731-ed53-412d-a966-412c63bf83e9</loc>
        <lastmod>2026-03-03T04:23:15.784Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Evaluating%20Security%20Boundaries%20in%20Agentic%20AI%20Integrations&amp;subtitle=Recent%20disclosures%20involving%20OpenClaw%20and%20Google%20Gemini%20demonstrate%20how%20autonomous%20AI%20agents%20alter%20t...</image:loc>
            <image:title>Evaluating Security Boundaries in Agentic AI Integrations</image:title>
            <image:caption>Recent disclosures involving OpenClaw and Google Gemini demonstrate how autonomous AI agents alter traditional security boundaries between the browser and local operating system. Security teams can protect these environments by adopting strict capability models, implementing continuous behavioral verification, and treating local agent traffic with the same rigor as external services.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/032ed31c-ba38-4998-9736-c3b00edfab20</loc>
        <lastmod>2026-03-03T04:23:15.184Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Google%20resolves%20privilege%20escalation%20vulnerability%20in%20Chrome&apos;s%20Gemini%20AI%20panel&amp;subtitle=Google%20has%20patched%20a%20high-severity%20vulnerability%20(CVE-2026-0628)%20in%20the%20Chrome%20browser%E2%80%99s%20Gemini%20AI%20i...</image:loc>
            <image:title>Google resolves privilege escalation vulnerability in Chrome&apos;s Gemini AI panel</image:title>
            <image:caption>Google has patched a high-severity vulnerability (CVE-2026-0628) in the Chrome browser’s Gemini AI integration. The resolution prevents unsafe extensions from bypassing security boundaries to access sensitive system resources, reinforcing the need for continuous security validation in agentic AI environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aa4ae282-e506-431d-aed2-865ddf4918a0</loc>
        <lastmod>2026-03-03T04:23:14.901Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Europol%20coordinates%20international%20action%20against%20&apos;The%20Com&apos;%20network%20through%20Project%20Compass&amp;subtitle=An%20international%20law%20enforcement%20operation%20has%20resulted%20in%2030%20arrests%20connected%20to%20&apos;The%20Com%2C&apos;%20a%20dece...</image:loc>
            <image:title>Europol coordinates international action against &apos;The Com&apos; network through Project Compass</image:title>
            <image:caption>An international law enforcement operation has resulted in 30 arrests connected to &apos;The Com,&apos; a decentralized network involved in unauthorized access and extortion. This development illustrates the value of cross-border collaboration and identity-centric security measures in protecting organizations and vulnerable individuals.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/431e281a-3057-42d5-a0ed-c95aaf90db9d</loc>
        <lastmod>2026-03-03T04:23:13.884Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=OpenClaw%20vulnerability%20clarifies%20security%20requirements%20for%20local%20AI%20agents&amp;subtitle=A%20recently%20patched%20vulnerability%20in%20the%20OpenClaw%20AI%20agent%20allowed%20unauthorized%20websites%20to%20gain%20cont...</image:loc>
            <image:title>OpenClaw vulnerability clarifies security requirements for local AI agents</image:title>
            <image:caption>A recently patched vulnerability in the OpenClaw AI agent allowed unauthorized websites to gain control of local deployments via WebSocket connections. Organizations using OpenClaw should update to version 2026.2.25 and implement strict capability models to secure non-human identities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5073208d-862e-48cf-87fc-6ed945443a51</loc>
        <lastmod>2026-03-01T04:03:33.439Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20Claude%20Code%20Security%3A%20Managing%20Risks%20in%20Agentic%20AI%20Development%20Tools&amp;subtitle=The%20release%20of%20Anthropic%E2%80%99s%20Claude%20Code%20Security%20introduces%20powerful%20logic-based%20vulnerability%20detect...</image:loc>
            <image:title>Analyzing Claude Code Security: Managing Risks in Agentic AI Development Tools</image:title>
            <image:caption>The release of Anthropic’s Claude Code Security introduces powerful logic-based vulnerability detection but also highlights the need to secure development tools. This analysis covers the tool&apos;s capabilities, recent security findings by Check Point Research, and actionable steps to protect your development environment.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5baced09-7174-41b4-83dc-bb66ed19348f</loc>
        <lastmod>2026-03-01T04:03:33.238Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%3A%20Claude%20Code%20Security%20Capabilities%20and%20Implementation%20Risks&amp;subtitle=Anthropic&apos;s%20new%20agentic%20coding%20tool%20offers%20logic-based%20vulnerability%20detection%2C%20but%20early%20adoption%20r...</image:loc>
            <image:title>Analysis: Claude Code Security Capabilities and Implementation Risks</image:title>
            <image:caption>Anthropic&apos;s new agentic coding tool offers logic-based vulnerability detection, but early adoption requires careful validation. We examine its potential to strengthen codebases, the market&apos;s reaction, and the critical security flaws researchers recently identified within the tool itself.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/74bc7ad9-48da-4097-9429-5686ee737147</loc>
        <lastmod>2026-02-28T04:18:38.769Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operational%20Resilience%3A%20Bridging%20the%20Gap%20Between%20Security%20Protocols%20and%20Clinical%20Continuity&amp;subtitle=Recent%20incidents%20in%20healthcare%20and%20preparations%20for%20major%20global%20events%20demonstrate%20that%20digital%20dep...</image:loc>
            <image:title>Operational Resilience: Bridging the Gap Between Security Protocols and Clinical Continuity</image:title>
            <image:caption>Recent incidents in healthcare and preparations for major global events demonstrate that digital dependency is a fundamental safety issue. This analysis explores the practical realities of operating in an analog state and the importance of visibility in complex environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9368e3e1-4df8-49b1-a96c-3c0f88b672f3</loc>
        <lastmod>2026-02-28T04:18:38.454Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Building%20Feedback%20Loops%20Through%20Incident%20Transparency&amp;subtitle=Security%20experts%20advocate%20for%20a%20shift%20in%20how%20the%20industry%20handles%20incident%20reporting%2C%20arguing%20that%20d...</image:loc>
            <image:title>Building Feedback Loops Through Incident Transparency</image:title>
            <image:caption>Security experts advocate for a shift in how the industry handles incident reporting, arguing that detailed, transparent feedback loops are essential for collective defense. By analyzing the mechanics of past failures, organizations can move beyond compliance checklists to implement evidence-based risk reduction.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d67f2e7f-0ebd-4420-8dc7-b7be5b789a33</loc>
        <lastmod>2026-02-28T04:18:37.965Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Wireless%20and%20Drone%20Infrastructure%20for%20Major%20International%20Events&amp;subtitle=As%20the%202026%20FIFA%20World%20Cup%20approaches%2C%20security%20professionals%20must%20address%20the%20convergence%20of%20civili...</image:loc>
            <image:title>Securing Wireless and Drone Infrastructure for Major International Events</image:title>
            <image:caption>As the 2026 FIFA World Cup approaches, security professionals must address the convergence of civilian wireless networks and advanced drone capabilities. This analysis outlines the necessary defensive layers for protecting complex radio-frequency environments against surveillance and disruption.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/667b5469-a9ff-4877-9a25-7fd987373898</loc>
        <lastmod>2026-02-28T04:18:37.055Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operational%20Resilience%20in%20Healthcare%3A%20Examining%20Incident%20Response%20in%20Fiction%20and%20Reality&amp;subtitle=Recent%20parallels%20between%20fictional%20media%20and%20real-world%20security%20incidents%20highlight%20critical%20challe...</image:loc>
            <image:title>Operational Resilience in Healthcare: Examining Incident Response in Fiction and Reality</image:title>
            <image:caption>Recent parallels between fictional media and real-world security incidents highlight critical challenges in healthcare continuity. Industry experts analyze the operational impact of ransomware and the necessity of sturdy downtime procedures to protect patient safety.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/af0d480b-fef2-4178-b7c6-e770ec8df600</loc>
        <lastmod>2026-02-27T04:22:11.213Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Critical%20Cisco%20SD-WAN%20Vulnerabilities%20and%20Evolving%20Vendor%20Liability&amp;subtitle=A%20critical%20authentication%20bypass%20in%20Cisco%20SD-WAN%20requires%20immediate%20attention%20from%20security%20teams%2C%20c...</image:loc>
            <image:title>Critical Cisco SD-WAN Vulnerabilities and Evolving Vendor Liability</image:title>
            <image:caption>A critical authentication bypass in Cisco SD-WAN requires immediate attention from security teams, coinciding with a shift in legal standards for vendor liability. We analyze the technical mitigations for CVE-2026-20127, the implications of the Marquis v. SonicWall litigation, and new supply chain risks in AI development tools.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b20d9f8c-39da-49e7-8ab1-46b436a62bd0</loc>
        <lastmod>2026-02-27T04:22:11.012Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Telephone-Oriented%20Attack%20Delivery%20(TOAD)%20Evasion%20Techniques&amp;subtitle=New%20research%20indicates%20that%20multi-channel%20threats%2C%20specifically%20Telephone-Oriented%20Attack%20Delivery%20(...</image:loc>
            <image:title>Analysis of Telephone-Oriented Attack Delivery (TOAD) Evasion Techniques</image:title>
            <image:caption>New research indicates that multi-channel threats, specifically Telephone-Oriented Attack Delivery (TOAD), are effectively bypassing secure email gateways by leveraging legitimate phone numbers as payloads. This analysis reviews the mechanics of these evasion techniques and offers architectural and procedural recommendations for strengthening defense.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b5cec4e2-7e81-4fc5-becf-5e72d838b12f</loc>
        <lastmod>2026-02-27T04:22:10.412Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Update%3A%20Addressing%20Configuration%20Vulnerabilities%20in%20Claude%20Code&amp;subtitle=Security%20researchers%20have%20identified%20and%20helped%20resolve%20three%20vulnerabilities%20in%20Anthropic%E2%80%99s%20Claude%20...</image:loc>
            <image:title>Security Update: Addressing Configuration Vulnerabilities in Claude Code</image:title>
            <image:caption>Security researchers have identified and helped resolve three vulnerabilities in Anthropic’s Claude Code tool that could allow unauthorized command execution via project configuration files. Users are advised to update to the latest version to ensure their development environments remain secure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/7feafbae-02bd-4559-ac46-ed6b8d02c6ba</loc>
        <lastmod>2026-02-27T04:22:10.122Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Remediation%20Guidance%20for%20Cisco%20Catalyst%20SD-WAN%20Authentication%20Vulnerabilities&amp;subtitle=Cisco%20has%20released%20critical%20updates%20for%20Catalyst%20SD-WAN%20components%20following%20the%20discovery%20of%20a%20zero...</image:loc>
            <image:title>Remediation Guidance for Cisco Catalyst SD-WAN Authentication Vulnerabilities</image:title>
            <image:caption>Cisco has released critical updates for Catalyst SD-WAN components following the discovery of a zero-day vulnerability used in conjunction with legacy flaws. This analysis covers the technical methodology observed in these campaigns and provides actionable steps to secure management interfaces.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/310ecb88-2ec3-43e1-aaea-9bd5258583d0</loc>
        <lastmod>2026-02-27T04:22:09.613Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Marquis%20v.%20SonicWall%3A%20Liability%20and%20Vendor%20Responsibility%20in%20Security%20Incidents&amp;subtitle=A%20recent%20lawsuit%20filed%20by%20a%20fintech%20company%20against%20its%20security%20vendor%20highlights%20the%20evolving%20lega...</image:loc>
            <image:title>Marquis v. SonicWall: Liability and Vendor Responsibility in Security Incidents</image:title>
            <image:caption>A recent lawsuit filed by a fintech company against its security vendor highlights the evolving legal standards for third-party risk. This analysis examines the implications for vendor accountability, &quot;reasonable cybersecurity&quot; definitions, and the importance of solid service level agreements.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/09d191bc-b06a-4ea8-87ce-eb9bf037943f</loc>
        <lastmod>2026-02-26T04:33:57.111Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Adapting%20Defense%20Strategies%20for%20Automated%20Risks%20and%20Developer%20Targeting&amp;subtitle=New%20data%20indicates%20a%20shift%20in%20how%20unauthorized%20groups%20utilize%20AI%20for%20operations%20and%20target%20developer...</image:loc>
            <image:title>Adapting Defense Strategies for Automated Risks and Developer Targeting</image:title>
            <image:caption>New data indicates a shift in how unauthorized groups utilize AI for operations and target developer environments. This analysis covers the latest findings on infrastructure decentralization, specific technical vectors in IDEs, and the necessity of automated containment protocols.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1bc8261c-142a-4e03-a118-05e5c82e4dad</loc>
        <lastmod>2026-02-26T04:33:56.613Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operation%20Red%20Card%202.0%3A%20Collaborative%20Defense%20and%20Intelligence%20Sharing%20in%20Africa&amp;subtitle=International%20cooperation%20between%20law%20enforcement%20and%20private%20security%20partners%20has%20successfully%20dis...</image:loc>
            <image:title>Operation Red Card 2.0: Collaborative Defense and Intelligence Sharing in Africa</image:title>
            <image:caption>International cooperation between law enforcement and private security partners has successfully disrupted significant fraud infrastructure across 16 African nations. The operation demonstrates the effectiveness of structured threat intelligence sharing in mitigating transnational financial risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c5cefbe4-63dc-4fa8-a5ac-060376d65b1e</loc>
        <lastmod>2026-02-26T04:33:56.412Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=New%20OTI%20Impact%20Score%20Standardizes%20Measurement%20of%20Operational%20Technology%20Incidents&amp;subtitle=A%20new%20methodology%20released%20at%20S4x26%20introduces%20a%20quantitative%20framework%20for%20assessing%20the%20severity%20o...</image:loc>
            <image:title>New OTI Impact Score Standardizes Measurement of Operational Technology Incidents</image:title>
            <image:caption>A new methodology released at S4x26 introduces a quantitative framework for assessing the severity of operational technology (OT) security events. By analyzing severity, reach, and duration, the OTI Impact Score aims to help organizations and insurers align resources with actual business impact.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d468d97c-ea18-4fae-883b-045603ed88b6</loc>
        <lastmod>2026-02-26T04:33:55.912Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Protecting%20Developer%20Workflows%20from%20Compromised%20Next.js%20Repositories&amp;subtitle=Microsoft%20researchers%20have%20identified%20a%20campaign%20using%20compromised%20Next.js%20repositories%20to%20establish...</image:loc>
            <image:title>Protecting Developer Workflows from Compromised Next.js Repositories</image:title>
            <image:caption>Microsoft researchers have identified a campaign using compromised Next.js repositories to establish remote access within developer environments. This analysis outlines the technical execution paths used in these social engineering incidents and provides guidance for securing development workflows.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3ff03f72-1849-4809-83dd-32bf26455eca</loc>
        <lastmod>2026-02-26T04:33:55.709Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=RAMP%20Disruption%20Leads%20to%20Decentralization%20in%20Ransomware-as-a-Service%20Operations&amp;subtitle=Following%20the%20law%20enforcement%20seizure%20of%20the%20RAMP%20forum%2C%20the%20ransomware%20ecosystem%20is%20shifting%20toward...</image:loc>
            <image:title>RAMP Disruption Leads to Decentralization in Ransomware-as-a-Service Operations</image:title>
            <image:caption>Following the law enforcement seizure of the RAMP forum, the ransomware ecosystem is shifting toward fragmented, higher-security platforms. This analysis examines emerging coordination hubs and outlines how security teams can adapt their intelligence monitoring.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/89cdfe7d-72ab-45b8-8bf9-8349557fecda</loc>
        <lastmod>2026-02-26T04:33:55.511Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Generative%20AI%20Integration%20in%20State-Aligned%20Influence%20Operations&amp;subtitle=New%20findings%20from%20OpenAI%20reveal%20how%20state-affiliated%20actors%20are%20integrating%20Large%20Language%20Models%20(L...</image:loc>
            <image:title>Analysis of Generative AI Integration in State-Aligned Influence Operations</image:title>
            <image:caption>New findings from OpenAI reveal how state-affiliated actors are integrating Large Language Models (LLMs) into influence campaigns. This analysis covers observed tactics from Chinese and Russian operators, including the automation of content generation and administrative workflows.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/18ef50c4-f15a-474d-bf1c-c152b90ba667</loc>
        <lastmod>2026-02-25T04:09:57.040Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Accelerated%20Breakout%20Times%20and%20Identity-Centric%20Threats&amp;subtitle=New%20data%20indicates%20the%20average%20time%20to%20lateral%20movement%20has%20contracted%20to%2029%20minutes%2C%20driven%20by%20malw...</image:loc>
            <image:title>Analysis of Accelerated Breakout Times and Identity-Centric Threats</image:title>
            <image:caption>New data indicates the average time to lateral movement has contracted to 29 minutes, driven by malware-free intrusions and valid credential usage. This analysis outlines the shift toward identity-based tradecraft and provides guidance on hardening defenses against rapid, authorized-pathway access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/85c9eb31-42a4-4a72-88a8-ae5c7547c41b</loc>
        <lastmod>2026-02-25T04:09:56.675Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Lazarus%20Group%20Activity%20Involving%20Medusa%20Ransomware&amp;subtitle=Research%20identifies%20a%20new%20collaboration%20between%20North%20Korean%20state-sponsored%20actors%20and%20the%20Medusa%20r...</image:loc>
            <image:title>Analysis of Lazarus Group Activity Involving Medusa Ransomware</image:title>
            <image:caption>Research identifies a new collaboration between North Korean state-sponsored actors and the Medusa ransomware operation. This analysis covers the technical indicators, attribution challenges, and defensive considerations for organizations in critical sectors.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9338dc79-5d47-4905-987f-e69f7f518b7d</loc>
        <lastmod>2026-02-25T04:09:56.478Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Breakout%20Times%20Contract%20to%2029%20Minutes%20as%20Identity-Based%20Incidents%20Accelerate&amp;subtitle=New%20data%20indicates%20that%20threat%20actors%20now%20pivot%20laterally%20within%20compromised%20networks%20in%20under%2030%20mi...</image:loc>
            <image:title>Breakout Times Contract to 29 Minutes as Identity-Based Incidents Accelerate</image:title>
            <image:caption>New data indicates that threat actors now pivot laterally within compromised networks in under 30 minutes on average. This acceleration, driven by the use of valid credentials and unmanaged devices, requires security teams to focus on speed and identity governance to maintain effective defense.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/687f78a5-f908-444c-b585-ef3f6da234b4</loc>
        <lastmod>2026-02-24T04:25:36.052Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Mitigating%20Automated%20Threats%20and%20Physical%20Compromise%20in%20Legacy%20Infrastructure&amp;subtitle=Recent%20data%20indicates%20a%20convergence%20of%20physical%20security%20risks%20and%20AI-scaled%20automation%20targeting%20le...</image:loc>
            <image:title>Mitigating Automated Threats and Physical Compromise in Legacy Infrastructure</image:title>
            <image:caption>Recent data indicates a convergence of physical security risks and AI-scaled automation targeting legacy systems. This analysis reviews 2025 trends—from ATM jackpotting to automated firewall reconnaissance—and outlines the fundamental controls required to protect critical infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5f5fd222-1ba3-478e-a97f-352eaedc020d</loc>
        <lastmod>2026-02-24T04:25:35.750Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20AI-Augmented%20Access%20to%20FortiGate%20Infrastructure&amp;subtitle=Recent%20research%20identifies%20a%20campaign%20where%20threat%20actors%20utilized%20generative%20AI%20to%20scale%20unauthoriz...</image:loc>
            <image:title>Analysis of AI-Augmented Access to FortiGate Infrastructure</image:title>
            <image:caption>Recent research identifies a campaign where threat actors utilized generative AI to scale unauthorized access to over 600 FortiGate devices. This analysis reviews the operational methods involved and outlines essential configuration changes to protect management interfaces and backup infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b7540a19-d672-4139-8de2-503e8890d610</loc>
        <lastmod>2026-02-24T04:25:35.255Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Historical%20Cryptography%20and%20Modern%20Defense%3A%20Lessons%20from%20the%20Enigma&amp;subtitle=A%20look%20at%20the%20enduring%20relevance%20of%20the%20Enigma%20machine%20for%20security%20professionals%2C%20highlighting%20how%20...</image:loc>
            <image:title>Historical Cryptography and Modern Defense: Lessons from the Enigma</image:title>
            <image:caption>A look at the enduring relevance of the Enigma machine for security professionals, highlighting how historical failures in validation and human factors inform modern protective strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/cbcb8c23-3ada-43dd-bc5d-76b0bcb4771c</loc>
        <lastmod>2026-02-24T04:25:34.952Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=MuddyWater%20%22Operation%20Olalampo%22%20Deploys%20AI-Generated%20Code%20and%20Custom%20Malware&amp;subtitle=New%20research%20identifies%20a%20campaign%20by%20the%20MuddyWater%20threat%20group%20targeting%20organizations%20in%20the%20Mid...</image:loc>
            <image:title>MuddyWater &quot;Operation Olalampo&quot; Deploys AI-Generated Code and Custom Malware</image:title>
            <image:caption>New research identifies a campaign by the MuddyWater threat group targeting organizations in the Middle East and Africa with novel malware strains. Analysis reveals the use of AI-generated code segments and legitimate RMM tools, highlighting the need for rigorous endpoint monitoring and email defense.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/97f12e85-093c-4763-8686-3a927da29b91</loc>
        <lastmod>2026-02-24T04:25:34.451Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%202025%20ATM%20Jackpotting%20Trends%20and%20Mitigation%20Strategies&amp;subtitle=Recent%20FBI%20data%20indicates%20a%20significant%20rise%20in%20physical%20ATM%20compromises%20known%20as%20%22jackpotting.%22%20Thi...</image:loc>
            <image:title>Analysis of 2025 ATM Jackpotting Trends and Mitigation Strategies</image:title>
            <image:caption>Recent FBI data indicates a significant rise in physical ATM compromises known as &quot;jackpotting.&quot; This analysis reviews the technical mechanisms behind these incidents, including XFS manipulation and Ploutus malware, and outlines defense-in-depth strategies for financial institutions.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/13da1921-0b07-42d1-b6e4-f8d825b74c29</loc>
        <lastmod>2026-02-21T04:19:43.304Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20React2Shell%20Reconnaissance%20Patterns%20and%20AI%20Infrastructure%20Risks&amp;subtitle=New%20telemetry%20indicates%20a%2045-day%20window%20between%20initial%20scanning%20and%20active%20compromise%20attempts%20for%20...</image:loc>
            <image:title>Analyzing React2Shell Reconnaissance Patterns and AI Infrastructure Risks</image:title>
            <image:caption>New telemetry indicates a 45-day window between initial scanning and active compromise attempts for the React2Shell vulnerability. This analysis covers the detection of the ILovePoop toolkit, remediation strategies for Next.js environments, and parallel infrastructure risks emerging in autonomous AI deployments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/ef6e763b-94e8-496d-afb4-e7efd29a0931</loc>
        <lastmod>2026-02-21T04:19:42.999Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Latin%20America%E2%80%99s%20Cyber%20Maturity%20and%20Evolving%20Threat%20Environment%20(2025)&amp;subtitle=Rapid%20digitalization%20in%20Latin%20America%20has%20outpaced%20security%20governance%2C%20creating%20a%20complex%20environme...</image:loc>
            <image:title>Analysis of Latin America’s Cyber Maturity and Evolving Threat Environment (2025)</image:title>
            <image:caption>Rapid digitalization in Latin America has outpaced security governance, creating a complex environment for defenders. This analysis reviews recent data on regional threat activity, including a significant rise in ransomware events and financial fraud, and outlines the structural steps required to strengthen resilience.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/0cc03246-f120-4068-9c00-0233705d9458</loc>
        <lastmod>2026-02-21T04:19:42.799Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Infrastructure%20Vulnerabilities%20in%20the%20AI%20Stack%3A%20A%20Five-Layer%20Risk%20Analysis&amp;subtitle=Recent%20research%20reveals%20that%20security%20risks%20in%20AI%20deployments%20extend%20well%20beyond%20prompt%20injection%2C%20a...</image:loc>
            <image:title>Infrastructure Vulnerabilities in the AI Stack: A Five-Layer Risk Analysis</image:title>
            <image:caption>Recent research reveals that security risks in AI deployments extend well beyond prompt injection, affecting the underlying infrastructure including training data and hardware. This analysis outlines a five-layer threat model and offers strategies for securing the AI supply chain against systemic vulnerabilities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/7dd873a6-a9da-4a02-9dbb-0b4da4c67098</loc>
        <lastmod>2026-02-21T04:19:42.505Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Autonomous%20AI%20Agents%3A%20Mitigating%20Scope%20and%20Policy%20Bypasses&amp;subtitle=Autonomous%20AI%20agents%20optimize%20for%20task%20completion%2C%20often%20bypassing%20soft%20guardrails%20and%20security%20poli...</image:loc>
            <image:title>Securing Autonomous AI Agents: Mitigating Scope and Policy Bypasses</image:title>
            <image:caption>Autonomous AI agents optimize for task completion, often bypassing soft guardrails and security policies in the process. This analysis explores recent findings on agent behavior and outlines how organizations can apply Zero Trust principles and environment segmentation to prevent unintended data exposure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3423c26e-5c9e-49dc-b24f-624adef928d0</loc>
        <lastmod>2026-02-21T04:19:41.999Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Persistent%20React2Shell%20Reconnaissance%20and%20Mitigation%20Strategies&amp;subtitle=New%20telemetry%20indicates%20that%20sophisticated%20reconnaissance%20toolkits%20are%20actively%20scanning%20for%20the%20Rea...</image:loc>
            <image:title>Analysis of Persistent React2Shell Reconnaissance and Mitigation Strategies</image:title>
            <image:caption>New telemetry indicates that sophisticated reconnaissance toolkits are actively scanning for the React2Shell vulnerability (CVE-2025-55182). This analysis covers the evolving tradecraft, specific targeting of critical sectors, and the technical visibility challenges that complicate remediation in Next.js environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/33485176-8f9b-45e9-9b2f-9b6e8218045e</loc>
        <lastmod>2026-02-20T04:17:44.411Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Protecting%20Build%20Pipelines%20and%20Identity%20Systems%20from%20Automated%20Threats&amp;subtitle=Recent%20incidents%20involving%20the%20Cline%20npm%20package%20and%20the%20Starkiller%20phishing%20platform%20highlight%20the%20...</image:loc>
            <image:title>Protecting Build Pipelines and Identity Systems from Automated Threats</image:title>
            <image:caption>Recent incidents involving the Cline npm package and the Starkiller phishing platform highlight the evolving risks in software supply chains and identity management. This analysis covers the mechanics of prompt injection in CI/CD workflows and provides guidance on defending against reverse proxy architectures.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/e34935d1-839f-49b9-8b26-62976c41d13f</loc>
        <lastmod>2026-02-20T04:17:43.912Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%3A%20High-Volume%20Fraud%20Operations%20Target%20South%20African%20Digital%20Economy&amp;subtitle=Recent%20data%20from%20the%20Global%20Anti-Scam%20Alliance%20indicates%20that%20South%20African%20users%20face%20some%20of%20the%20h...</image:loc>
            <image:title>Analysis: High-Volume Fraud Operations Target South African Digital Economy</image:title>
            <image:caption>Recent data from the Global Anti-Scam Alliance indicates that South African users face some of the highest frequencies of fraud attempts globally. This analysis reviews the 2025 statistics, the operational incentives driving high-volume social engineering, and the systemic changes required to improve asset recovery.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/0e0072c8-7a2d-4012-8104-7495ff6a8b0b</loc>
        <lastmod>2026-02-20T04:17:43.438Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Cloud%20Storage%20Misconfiguration%20at%20Abu%20Dhabi%20Finance%20Week%20Results%20in%20Data%20Exposure&amp;subtitle=Security%20researchers%20identified%20an%20unsecured%20cloud%20storage%20instance%20containing%20sensitive%20identity%20do...</image:loc>
            <image:title>Cloud Storage Misconfiguration at Abu Dhabi Finance Week Results in Data Exposure</image:title>
            <image:caption>Security researchers identified an unsecured cloud storage instance containing sensitive identity documents for approximately 700 attendees of a major financial summit. The incident highlights the critical importance of cloud configuration management in protecting high-profile data.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8142e088-d14c-4484-95ef-b4a8d243ea97</loc>
        <lastmod>2026-02-20T04:17:43.213Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Starkiller%3A%20Reverse%20Proxy%20Phishing-as-a-Service%20and%20MFA%20Evasion&amp;subtitle=Research%20into%20the%20%22Starkiller%22%20Phishing-as-a-Service%20platform%20reveals%20a%20professionalized%20toolset%20cap...</image:loc>
            <image:title>Analysis of Starkiller: Reverse Proxy Phishing-as-a-Service and MFA Evasion</image:title>
            <image:caption>Research into the &quot;Starkiller&quot; Phishing-as-a-Service platform reveals a professionalized toolset capable of bypassing traditional static detection and multifactor authentication. Defensive strategies must shift toward behavioral and identity-aware monitoring to counter reverse proxy architectures.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aac51ab2-aa2c-4cce-91f3-62c091498daa</loc>
        <lastmod>2026-02-20T04:17:41.113Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Supply%20Chain%20Compromise%20in%20Cline%20v2.3.0%20Leads%20to%20Unauthorized%20OpenClaw%20Installation&amp;subtitle=Security%20researchers%20identified%20a%20supply%20chain%20compromise%20in%20the%20Cline%20npm%20package%20version%202.3.0%2C%20wh...</image:loc>
            <image:title>Supply Chain Compromise in Cline v2.3.0 Leads to Unauthorized OpenClaw Installation</image:title>
            <image:caption>Security researchers identified a supply chain compromise in the Cline npm package version 2.3.0, which briefly distributed an unauthorized installation of the OpenClaw AI agent. This report details the technical mechanism of the compromise, the risks associated with the installed software, and the necessary remediation steps for affected development environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/190f7155-edc6-43ea-bf7c-5f3f20bab92b</loc>
        <lastmod>2026-02-19T04:12:21.009Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%3A%20Automated%20Social%20Engineering%20and%20Critical%20Infrastructure%20Vulnerabilities&amp;subtitle=Recent%20findings%20indicate%20a%20convergence%20of%20AI-driven%20fraud%20mechanics%20and%20persistent%20vulnerabilities%20i...</image:loc>
            <image:title>Analysis: Automated Social Engineering and Critical Infrastructure Vulnerabilities</image:title>
            <image:caption>Recent findings indicate a convergence of AI-driven fraud mechanics and persistent vulnerabilities in critical business hardware. This report analyzes the technical details of these emerging threats and outlines specific remediation steps for Dell and Grandstream appliances.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/aa4002f8-25b9-4e4f-97a0-0d6c204d1515</loc>
        <lastmod>2026-02-19T04:12:20.718Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Hard-Coded%20Credentials%20in%20Dell%20RecoverPoint%20Allow%20Root%20Access%20(CVE-2026-22769)&amp;subtitle=Security%20researchers%20have%20identified%20a%20critical%20vulnerability%20in%20Dell%20RecoverPoint%20for%20Virtual%20Machi...</image:loc>
            <image:title>Hard-Coded Credentials in Dell RecoverPoint Allow Root Access (CVE-2026-22769)</image:title>
            <image:caption>Security researchers have identified a critical vulnerability in Dell RecoverPoint for Virtual Machines that allows unauthenticated root access via hard-coded credentials. This report details the technical mechanism, observed activity by threat group UNC6201, and immediate remediation steps for affected organizations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/f996f125-d54f-4c1d-ad0b-daffb30bc6e1</loc>
        <lastmod>2026-02-19T04:12:20.410Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Remediating%20Critical%20Buffer%20Overflow%20Vulnerabilities%20in%20Grandstream%20VoIP%20Infrastructure&amp;subtitle=A%20critical%20vulnerability%20in%20Grandstream%20GXP1600%20series%20phones%20allows%20for%20unauthenticated%20remote%20code...</image:loc>
            <image:title>Remediating Critical Buffer Overflow Vulnerabilities in Grandstream VoIP Infrastructure</image:title>
            <image:caption>A critical vulnerability in Grandstream GXP1600 series phones allows for unauthenticated remote code execution. This analysis covers the technical details of CVE-2026-2329 and provides actionable guidance for securing VoIP assets through segmentation and patching.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3a00edd7-f492-4bbe-b601-c69e4d019e09</loc>
        <lastmod>2026-02-19T04:12:20.110Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Imitation%20Gemini%20Chatbots%20in%20Cryptocurrency%20Fraud&amp;subtitle=Security%20researchers%20have%20identified%20a%20sophisticated%20campaign%20utilizing%20custom%20AI%20chatbots%20to%20simula...</image:loc>
            <image:title>Analysis of Imitation Gemini Chatbots in Cryptocurrency Fraud</image:title>
            <image:caption>Security researchers have identified a sophisticated campaign utilizing custom AI chatbots to simulate Google&apos;s Gemini assistant. This analysis details how threat actors are automating social engineering to promote fraudulent cryptocurrency schemes and provides indicators for detection.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/faa535d4-339f-4d98-b61a-33adf8fd46f0</loc>
        <lastmod>2026-02-18T04:23:09.742Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operational%20Shifts%20Toward%20Persistence%20and%20the%20Misuse%20of%20Legitimate%20Tools&amp;subtitle=Recent%20telemetry%20indicates%20a%20move%20away%20from%20disruptive%20noise%20toward%20long-term%20persistence%20using%20%22Liv...</image:loc>
            <image:title>Operational Shifts Toward Persistence and the Misuse of Legitimate Tools</image:title>
            <image:caption>Recent telemetry indicates a move away from disruptive noise toward long-term persistence using &quot;Living-off-the-Land&quot; tactics. This analysis reviews findings from Singapore and Poland to help security teams adjust detection strategies against the misuse of trusted administrative utilities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/ecd6cc18-5a09-463d-ad24-9e3fdf023493</loc>
        <lastmod>2026-02-18T04:23:09.343Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%3A%20Social%20Engineering%20Campaigns%20Pivot%20to%20DNS%20Lookup%20Abuse&amp;subtitle=Recent%20observations%20indicate%20that%20social%20engineering%20campaigns%20are%20shifting%20tactics%20to%20bypass%20tradit...</image:loc>
            <image:title>Analysis: Social Engineering Campaigns Pivot to DNS Lookup Abuse</image:title>
            <image:caption>Recent observations indicate that social engineering campaigns are shifting tactics to bypass traditional security filters. This analysis covers how threat actors now utilize the Windows `nslookup` command to deliver unauthorized payloads and provides guidance on detection and prevention.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/760562af-24c4-4828-b468-375b678fb6ae</loc>
        <lastmod>2026-02-18T04:23:08.748Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Shift%20in%20Tactics%3A%20The%20Rising%20Abuse%20of%20Remote%20Monitoring%20and%20Management%20Tools&amp;subtitle=Recent%20security%20research%20indicates%20a%20significant%20operational%20shift%20as%20threat%20actors%20increasingly%20lev...</image:loc>
            <image:title>Shift in Tactics: The Rising Abuse of Remote Monitoring and Management Tools</image:title>
            <image:caption>Recent security research indicates a significant operational shift as threat actors increasingly leverage legitimate enterprise software over custom malware. This analysis covers the 277% surge in RMM tool abuse and outlines defensive strategies for distinguishing unauthorized activity from routine administration.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/3c59d903-5024-4f33-9c76-dfbff9f8e928</loc>
        <lastmod>2026-02-18T04:23:08.449Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Resilience%20in%20Decentralized%20Energy%3A%20Analyzing%20the%20Poland%20Grid%20Incident&amp;subtitle=A%20recent%20security%20incident%20targeting%20Poland%E2%80%99s%20renewable%20energy%20sector%20highlights%20the%20shifting%20focus%20...</image:loc>
            <image:title>Resilience in Decentralized Energy: Analyzing the Poland Grid Incident</image:title>
            <image:caption>A recent security incident targeting Poland’s renewable energy sector highlights the shifting focus of threat actors toward decentralized infrastructure. This analysis reviews the technical vectors, including edge device vulnerabilities and firmware corruption, and outlines defense strategies for operational technology environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9545b982-ef0a-4eda-a3da-23a8031f13f7</loc>
        <lastmod>2026-02-18T04:23:07.750Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20Keenadu%3A%20Supply%20Chain%20Compromise%20in%20Android%20Firmware&amp;subtitle=Security%20researchers%20have%20identified%20%22Keenadu%2C%22%20a%20malicious%20component%20embedded%20in%20the%20firmware%20of%20An...</image:loc>
            <image:title>Analyzing Keenadu: Supply Chain Compromise in Android Firmware</image:title>
            <image:caption>Security researchers have identified &quot;Keenadu,&quot; a malicious component embedded in the firmware of Android devices from multiple manufacturers. This analysis outlines the technical mechanism involving the Zygote process, the connection to known botnet infrastructure, and the necessary steps for remediation.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/9fb6714a-eb1f-419d-91cb-d3121fd96585</loc>
        <lastmod>2026-02-18T04:23:07.050Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Singapore%20Defense%20Operation%20Secures%20Telecommunications%20Sector%20Against%20Targeted%20Espionage&amp;subtitle=A%20coordinated%2011-month%20operation%20by%20Singapore%E2%80%99s%20Cyber%20Security%20Agency%20and%20four%20major%20telecommunicati...</image:loc>
            <image:title>Singapore Defense Operation Secures Telecommunications Sector Against Targeted Espionage</image:title>
            <image:caption>A coordinated 11-month operation by Singapore’s Cyber Security Agency and four major telecommunications providers successfully neutralized unauthorized access by a sophisticated threat actor, preventing data exfiltration and service disruption.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/de1c7434-b9b3-46b9-82e4-62d22f6d1709</loc>
        <lastmod>2026-02-17T04:08:52.596Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20High-Fidelity%20Impersonation%20and%20Browser-Based%20Data%20Exposure%20Campaigns&amp;subtitle=Recent%20telemetry%20indicates%20a%20shift%20in%20how%20unauthorized%20parties%20target%20enterprise%20access%2C%20utilizing%20p...</image:loc>
            <image:title>Analysis of High-Fidelity Impersonation and Browser-Based Data Exposure Campaigns</image:title>
            <image:caption>Recent telemetry indicates a shift in how unauthorized parties target enterprise access, utilizing precision-engineered login replicas and deceptive browser extensions. This report outlines the technical mechanisms behind &quot;Operation DoppelBrand&quot; and &quot;AiFrame&quot; and provides specific mitigation strategies for security teams.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/63f1fdb3-413f-4b0d-9b4a-10f639808df2</loc>
        <lastmod>2026-02-17T04:08:52.198Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Unauthorized%20Browser%20Extensions%20Mimic%20AI%20Tools%20to%20Exfiltrate%20User%20Data&amp;subtitle=Security%20researchers%20have%20identified%20a%20campaign%20of%20over%2030%20deceptive%20Chrome%20extensions%20masquerading%20...</image:loc>
            <image:title>Unauthorized Browser Extensions Mimic AI Tools to Exfiltrate User Data</image:title>
            <image:caption>Security researchers have identified a campaign of over 30 deceptive Chrome extensions masquerading as AI assistants. These tools, installed by over 260,000 users, utilize iframe injection to capture sensitive data while proxying legitimate LLM responses.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/e35316ed-a4b9-448e-8a47-9ffbb626883c</loc>
        <lastmod>2026-02-17T04:08:50.898Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Operation%20DoppelBrand%3A%20Analysis%20of%20Fortune%20500%20Brand%20Impersonation%20and%20Credential%20Collection&amp;subtitle=Security%20researchers%20have%20identified%20a%20sophisticated%20campaign%2C%20designated%20Operation%20DoppelBrand%2C%20tar...</image:loc>
            <image:title>Operation DoppelBrand: Analysis of Fortune 500 Brand Impersonation and Credential Collection</image:title>
            <image:caption>Security researchers have identified a sophisticated campaign, designated Operation DoppelBrand, targeting major financial and technology sectors. This analysis outlines the group&apos;s infrastructure, the use of remote management tools for persistence, and recommended defensive strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/19530403-fe15-4418-ad2d-518854060b1b</loc>
        <lastmod>2026-02-14T04:13:37.651Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Strengthening%20Trust%20Architecture%3A%20Drivers%2C%20Edge%20Devices%2C%20and%20AI%20Agents&amp;subtitle=Recent%20analysis%20identifies%20critical%20risks%20in%20kernel%20drivers%2C%20perimeter%20hardware%2C%20and%20AI%20orchestratio...</image:loc>
            <image:title>Strengthening Trust Architecture: Drivers, Edge Devices, and AI Agents</image:title>
            <image:caption>Recent analysis identifies critical risks in kernel drivers, perimeter hardware, and AI orchestration. This guide outlines how security teams can close these visibility gaps and enforce stricter controls across the enterprise.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/660cb76a-6e09-46db-8e1b-00fbc225c1d1</loc>
        <lastmod>2026-02-14T04:13:37.151Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Considerations%20for%20Multi-Agent%20AI%20Orchestration&amp;subtitle=As%20organizations%20adopt%20autonomous%20AI%20agents%20and%20orchestration%20platforms%2C%20security%20teams%20must%20address...</image:loc>
            <image:title>Security Considerations for Multi-Agent AI Orchestration</image:title>
            <image:caption>As organizations adopt autonomous AI agents and orchestration platforms, security teams must address new risks related to credential management and automated decision-making. This analysis outlines the challenges of multi-agent environments and provides frameworks for maintaining visibility and control.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/df52cc8d-5b26-46d6-8595-6c4cc474a062</loc>
        <lastmod>2026-02-14T04:13:36.250Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20the%20Defense%20Industrial%20Base%20Against%20State-Sponsored%20Threats&amp;subtitle=Recent%20analysis%20indicates%20a%20strategic%20shift%20by%20state-sponsored%20actors%20toward%20pre-positioning%20within%20...</image:loc>
            <image:title>Securing the Defense Industrial Base Against State-Sponsored Threats</image:title>
            <image:caption>Recent analysis indicates a strategic shift by state-sponsored actors toward pre-positioning within defense networks and targeting edge infrastructure. This report outlines the specific techniques used against the Defense Industrial Base and offers guidance on securing edge devices and personnel against persistent intrusion attempts.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a6a04546-127e-4e70-84c6-288774af48e2</loc>
        <lastmod>2026-02-14T04:13:35.551Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20the%20Bring-Your-Own-Vulnerable-Driver%20Defense%20Gap&amp;subtitle=Security%20researchers%20are%20observing%20an%20increase%20in%20threat%20actors%20leveraging%20legacy%20drivers%20to%20bypass%20...</image:loc>
            <image:title>Analyzing the Bring-Your-Own-Vulnerable-Driver Defense Gap</image:title>
            <image:caption>Security researchers are observing an increase in threat actors leveraging legacy drivers to bypass endpoint protection. This analysis explores the technical constraints facing operating system vendors and outlines configuration strategies to strengthen kernel-level defenses.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/d97ce322-a850-42a9-9970-ae324b6d01eb</loc>
        <lastmod>2026-02-13T04:10:16.349Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Critical%20Defense%20Priorities%3A%20Edge%20Infrastructure%20and%20AI%20Data%20Integrity&amp;subtitle=Security%20teams%20face%20two%20converging%20priorities%3A%20securing%20traditional%20edge%20management%20interfaces%20again...</image:loc>
            <image:title>Critical Defense Priorities: Edge Infrastructure and AI Data Integrity</image:title>
            <image:caption>Security teams face two converging priorities: securing traditional edge management interfaces against active unauthorized access and protecting the integrity of generative AI workflows. We analyze recent findings regarding Ivanti EPMM and AI recommendation manipulation to provide actionable defensive guidance.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2d1b45db-936c-4652-8e9e-e19d115330a7</loc>
        <lastmod>2026-02-13T04:10:15.849Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Senegal%20Biometric%20Incident%20Highlights%20Alignment%20of%20Digital%20Ambition%20with%20Security%20Maturity&amp;subtitle=A%20significant%20security%20incident%20involving%20Senegal&apos;s%20national%20biometric%20database%20demonstrate%20the%20crit...</image:loc>
            <image:title>Senegal Biometric Incident Highlights Alignment of Digital Ambition with Security Maturity</image:title>
            <image:caption>A significant security incident involving Senegal&apos;s national biometric database demonstrate the critical need for reliable data governance. This analysis examines the technical factors behind the exposure and discusses how nations can better align digital transformation efforts with cybersecurity maturity.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/21862a2f-5e58-42dc-bb12-f6aa59b2f994</loc>
        <lastmod>2026-02-13T04:10:15.249Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Safeguarding%20AI%20Assistants%20Against%20Recommendation%20Manipulation&amp;subtitle=New%20research%20identifies%20a%20technique%20where%20external%20entities%20manipulate%20AI%20memory%20through%20%22Summarize%20...</image:loc>
            <image:title>Safeguarding AI Assistants Against Recommendation Manipulation</image:title>
            <image:caption>New research identifies a technique where external entities manipulate AI memory through &quot;Summarize with AI&quot; links, potentially biasing future recommendations. Security teams can mitigate this risk by understanding how URL parameters influence Large Language Model (LLM) persistence and implementing targeted detection strategies.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/81eea674-4c25-4f88-8314-ae98e3082a67</loc>
        <lastmod>2026-02-13T04:10:14.449Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Securing%20Edge%20Management%3A%20Analysis%20of%20Ivanti%20EPMM%20Critical%20Vulnerabilities&amp;subtitle=Recent%20security%20incidents%20involving%20Ivanti%20Endpoint%20Manager%20Mobile%20(EPMM)%20highlight%20the%20critical%20nee...</image:loc>
            <image:title>Securing Edge Management: Analysis of Ivanti EPMM Critical Vulnerabilities</image:title>
            <image:caption>Recent security incidents involving Ivanti Endpoint Manager Mobile (EPMM) highlight the critical need for sturdy edge defense. This analysis reviews the technical details of CVE-2026-1281 and CVE-2026-1340, observed threat activity, and strategic recommendations for hardening management infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/348262c4-59b5-49b2-b68f-dbb911e3114c</loc>
        <lastmod>2026-02-12T04:04:10.973Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20UNC1069%3A%20Synthetic%20Media%20and%20%22ClickFix%22%20Tactics%20in%20the%20Cryptocurrency%20Sector&amp;subtitle=New%20research%20identifies%20a%20shift%20in%20social%20engineering%20tactics%20targeting%20the%20Web3%20ecosystem%2C%20utilizin...</image:loc>
            <image:title>Analysis of UNC1069: Synthetic Media and &quot;ClickFix&quot; Tactics in the Cryptocurrency Sector</image:title>
            <image:caption>New research identifies a shift in social engineering tactics targeting the Web3 ecosystem, utilizing compromised legitimate accounts and AI-generated media to bypass standard verification. This report outlines the operational methodology and provides defensive strategies to mitigate these risks.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8cf80932-70d8-40a7-a872-a815feec39f3</loc>
        <lastmod>2026-02-12T04:04:10.776Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=UNC1069%20Utilizes%20AI-Driven%20Social%20Engineering%20to%20Target%20Cryptocurrency%20Organizations&amp;subtitle=New%20research%20identifies%20a%20financially%20motivated%20threat%20actor%20leveraging%20synthetic%20media%20and%20%22ClickFi...</image:loc>
            <image:title>UNC1069 Utilizes AI-Driven Social Engineering to Target Cryptocurrency Organizations</image:title>
            <image:caption>New research identifies a financially motivated threat actor leveraging synthetic media and &quot;ClickFix&quot; tactics to compromise Web3 and cryptocurrency firms. This analysis outlines the social engineering methodology—including fake Zoom interfaces and deepfake video—and provides guidance for detecting these intrusion attempts.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/2d10ec7e-2e4b-4b26-964b-fe30f9a3a2c1</loc>
        <lastmod>2026-02-11T21:58:52.944Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Defensive%20Priority%3A%20February%202026%20Patch%20Cycle%20and%20Infrastructure%20Analysis&amp;subtitle=A%20technical%20analysis%20of%20the%20February%202026%20Microsoft%20security%20update%20and%20emerging%20trends%20in%20administr...</image:loc>
            <image:title>Defensive Priority: February 2026 Patch Cycle and Infrastructure Analysis</image:title>
            <image:caption>A technical analysis of the February 2026 Microsoft security update and emerging trends in administrative tool misuse. We examine critical defensive steps for Windows ecosystems, SolarWinds WHD, and shifting patterns in operational technology.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/10a3a1c4-a751-4721-8e0a-fb4edbd1f2ff</loc>
        <lastmod>2026-02-11T21:58:51.549Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20SmarterTools%20Security%20Incident%20and%20Remediation%20Strategies%20for%20CVE-2026-24423&amp;subtitle=SmarterTools%20recently%20addressed%20a%20security%20incident%20involving%20the%20Warlock%20threat%20group%20and%20vulnerabi...</image:loc>
            <image:title>Analysis of SmarterTools Security Incident and Remediation Strategies for CVE-2026-24423</image:title>
            <image:caption>SmarterTools recently addressed a security incident involving the Warlock threat group and vulnerabilities in SmarterMail. This analysis covers the technical details of the vulnerabilities, the threat actor&apos;s methodology, and the protective measures required to secure mail server environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/67a304ee-d80e-47b4-8aea-5e873fecdeeb</loc>
        <lastmod>2026-02-11T21:58:51.246Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analyzing%20&apos;Living-off-the-Plant&apos;%20Techniques%20in%20Operational%20Technology&amp;subtitle=Emerging%20research%20indicates%20that%20threat%20actors%20are%20moving%20beyond%20generic%20IT%20exploits%20to%20leverage%20nat...</image:loc>
            <image:title>Analyzing &apos;Living-off-the-Plant&apos; Techniques in Operational Technology</image:title>
            <image:caption>Emerging research indicates that threat actors are moving beyond generic IT exploits to leverage native Operational Technology (OT) protocols. This analysis explores &quot;Living-off-the-Plant&quot; techniques and how organizations can use deep process comprehension to strengthen their defenses.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/7d68918b-61cf-4d24-8097-7e7511cf5b3b</loc>
        <lastmod>2026-02-11T21:58:50.346Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Bulletin%3A%20Microsoft%20Addresses%20Six%20Actively%20Exploited%20Zero-Days%20in%20February%20Update&amp;subtitle=Microsoft&apos;s%20latest%20security%20update%20addresses%2059%20vulnerabilities%2C%20including%20six%20zero-days%20with%20confir...</image:loc>
            <image:title>Security Bulletin: Microsoft Addresses Six Actively Exploited Zero-Days in February Update</image:title>
            <image:caption>Microsoft&apos;s latest security update addresses 59 vulnerabilities, including six zero-days with confirmed active exploitation. Security teams are advised to prioritize these patches, particularly those affecting Windows Shell, MSHTML, and Office, to strengthen defenses against unauthorized access.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a7f4b8a2-6bf0-431d-8c20-ad37d53e57df</loc>
        <lastmod>2026-02-11T21:58:50.144Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20ZeroDayRAT%3A%20Mobile%20Surveillance%20and%20MFA%20Bypass%20Capabilities&amp;subtitle=New%20research%20identifies%20a%20modular%20mobile%20surveillance%20tool%20available%20via%20Telegram%20that%20combines%20info...</image:loc>
            <image:title>Analysis of ZeroDayRAT: Mobile Surveillance and MFA Bypass Capabilities</image:title>
            <image:caption>New research identifies a modular mobile surveillance tool available via Telegram that combines information stealing with real-time monitoring. This analysis covers the malware&apos;s distribution methods, technical capabilities regarding MFA bypass, and implications for enterprise mobile security.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/85043ea4-0d45-47af-9ae1-a83aa03b02ea</loc>
        <lastmod>2026-02-11T21:58:49.846Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=SolarWinds%20Web%20Help%20Desk%20Vulnerabilities%20and%20Exposure%20Management&amp;subtitle=Recent%20findings%20indicate%20active%20utilization%20of%20vulnerabilities%20in%20SolarWinds%20Web%20Help%20Desk.%20This%20ana...</image:loc>
            <image:title>SolarWinds Web Help Desk Vulnerabilities and Exposure Management</image:title>
            <image:caption>Recent findings indicate active utilization of vulnerabilities in SolarWinds Web Help Desk. This analysis covers observed intrusion techniques, including the use of legitimate administrative tools for persistence, and outlines essential mitigation strategies for securing exposed instances.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8535d666-b539-4987-8f13-ad85fe9c04ad</loc>
        <lastmod>2026-02-11T21:58:49.246Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Regional%20Variance%20in%20Telnet%20Traffic%20Reduction%20and%20Infrastructure%20Filtering&amp;subtitle=Recent%20data%20indicates%20a%20significant%20global%20drop%20in%20Telnet%20traffic%20following%20infrastructure%20changes%20b...</image:loc>
            <image:title>Regional Variance in Telnet Traffic Reduction and Infrastructure Filtering</image:title>
            <image:caption>Recent data indicates a significant global drop in Telnet traffic following infrastructure changes by internet backbone providers. However, the Asia-Pacific region has seen a slower rate of reduction, signaling a continued need for organizations to actively manage legacy protocol exposure and migrate to secure alternatives like SSH.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/96a6fbc7-8c77-4307-bb14-ea29491713fd</loc>
        <lastmod>2026-02-11T21:58:48.746Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Assessing%20the%20Environmental%20Impact%20of%20Cybersecurity%20Infrastructure&amp;subtitle=New%20research%20indicates%20that%20backup%20systems%20and%20identity%20management%20account%20for%20nearly%20half%20of%20the%20cy...</image:loc>
            <image:title>Assessing the Environmental Impact of Cybersecurity Infrastructure</image:title>
            <image:caption>New research indicates that backup systems and identity management account for nearly half of the cybersecurity industry&apos;s carbon footprint. We examine how security leaders can optimize infrastructure to support sustainability goals without compromising risk management.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/48def799-ea8f-46db-9f12-85494c2900cb</loc>
        <lastmod>2025-12-26T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Chrome%20Zero-Day%20and%20Critical%20Veeam%20Vulnerability%20require%20immediate%20patching&amp;subtitle=New%20findings%20confirm%20active%20exploitation%20of%20a%20Chrome%20zero-day%20alongside%20a%20critical%20RCE%20vulnerability...</image:loc>
            <image:title>Chrome Zero-Day and Critical Veeam Vulnerability require immediate patching</image:title>
            <image:caption>New findings confirm active exploitation of a Chrome zero-day alongside a critical RCE vulnerability in Veeam Backup &amp; Replication. This update outlines the technical nature of these risks and provides specific guidance for securing browser endpoints and backup infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/26430068-4d3a-43ac-83b7-a5abfb82ad0e</loc>
        <lastmod>2025-12-25T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Guidance%20on%20Check%20Point%20CVE-2024-24919%20and%20Snowflake%20Identity%20Risks&amp;subtitle=A%20critical%20information%20disclosure%20vulnerability%20in%20Check%20Point%20Security%20Gateways%20and%20increased%20crede...</image:loc>
            <image:title>Guidance on Check Point CVE-2024-24919 and Snowflake Identity Risks</image:title>
            <image:caption>A critical information disclosure vulnerability in Check Point Security Gateways and increased credential-based activity in cloud environments require immediate attention. This brief outlines the technical risks, recommended remediation steps, and strategies for strengthening identity verification.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/1109fb45-128f-4368-b784-21edd7add8a0</loc>
        <lastmod>2025-12-24T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Advisory%3A%20Hardening%20Management%20Interfaces%20Against%20Active%20CVE-2024-47575%20and%20Edge%20Risks&amp;subtitle=Analysis%20of%20the%20critical%20zero-day%20vulnerability%20in%20Fortinet%E2%80%99s%20FortiManager%20and%20concurrent%20risks%20in%20S...</image:loc>
            <image:title>Security Advisory: Hardening Management Interfaces Against Active CVE-2024-47575 and Edge Risks</image:title>
            <image:caption>Analysis of the critical zero-day vulnerability in Fortinet’s FortiManager and concurrent risks in SonicWall and Cisco environments. This advisory provides technical details and immediate steps to secure administrative planes and identity perimeters.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/b6197d3d-decd-4e4d-ac85-1b556bce4bb6</loc>
        <lastmod>2025-12-23T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Remediation%20Strategies%20for%20Ivanti%20Connect%20Secure%20and%20AnyDesk%20Incidents&amp;subtitle=Recent%20security%20incidents%20involving%20Ivanti%20Connect%20Secure%20and%20AnyDesk%20require%20immediate%20defensive%20ac...</image:loc>
            <image:title>Remediation Strategies for Ivanti Connect Secure and AnyDesk Incidents</image:title>
            <image:caption>Recent security incidents involving Ivanti Connect Secure and AnyDesk require immediate defensive action. This guide details the technical scope of CVE-2024-21893 and the AnyDesk production compromise, providing specific steps to harden edge devices and manage certificate revocations.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/a6184f9b-10de-4fcc-b0c7-609ead08de96</loc>
        <lastmod>2025-12-22T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Mitigating%20Authentication%20Bypasses%20and%20Persistence%20Techniques%20in%20Critical%20Systems&amp;subtitle=Analysis%20of%20recent%20security%20findings%20regarding%20Fortinet%20and%20Chrome%20vulnerabilities%2C%20alongside%20update...</image:loc>
            <image:title>Mitigating Authentication Bypasses and Persistence Techniques in Critical Systems</image:title>
            <image:caption>Analysis of recent security findings regarding Fortinet and Chrome vulnerabilities, alongside updated intelligence on state-sponsored persistence tactics. This report provides detection logic and remediation steps for protecting perimeter and critical infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/620de0be-5ab4-438c-b57e-64f39e1c94fc</loc>
        <lastmod>2025-12-21T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Addressing%20Risks%20in%20Arc%20Browser%20Customizations%20and%20Ivanti%20Cloud%20Services%20Appliance&amp;subtitle=Security%20teams%20are%20currently%20managing%20two%20distinct%20priorities%3A%20a%20now-patched%20remote%20code%20execution%20f...</image:loc>
            <image:title>Addressing Risks in Arc Browser Customizations and Ivanti Cloud Services Appliance</image:title>
            <image:caption>Security teams are currently managing two distinct priorities: a now-patched remote code execution flaw in the Arc browser and active unauthorized activity targeting legacy Ivanti appliances. This update analyzes the technical mechanisms behind these findings and outlines immediate protective steps for affected infrastructure.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/eeedd3c8-5e8a-43e3-bf3c-f292824215e8</loc>
        <lastmod>2025-12-20T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Guidance%20on%20Check%20Point%20Gateway%20Vulnerability%20(CVE-2024-24919)%20and%20Snowflake%20Identity%20Security&amp;subtitle=Security%20teams%20are%20responding%20to%20two%20concurrent%20developments%3A%20a%20critical%20zero-day%20in%20Check%20Point%20Sec...</image:loc>
            <image:title>Guidance on Check Point Gateway Vulnerability (CVE-2024-24919) and Snowflake Identity Security</image:title>
            <image:caption>Security teams are responding to two concurrent developments: a critical zero-day in Check Point Security Gateways and targeted data access affecting Snowflake customers. This brief outlines the technical nature of these risks and provides immediate steps to secure network edges and cloud identities.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/8f4bad5d-952a-4649-b69a-e3dde786a3f4</loc>
        <lastmod>2025-12-18T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=SonicWall%20Releases%20Advisory%20for%20SMA1000%20Vulnerabilities%20and%20Associated%20Exploitation%20Activity&amp;subtitle=SonicWall%20has%20disclosed%20a%20new%20vulnerability%20in%20its%20SMA1000%20access%20platform%20affecting%20the%20appliance%20m...</image:loc>
            <image:title>SonicWall Releases Advisory for SMA1000 Vulnerabilities and Associated Exploitation Activity</image:title>
            <image:caption>SonicWall has disclosed a new vulnerability in its SMA1000 access platform affecting the appliance management console. This article details the technical findings, the observed chaining with previous vulnerabilities, and the critical steps required to secure affected environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/c6335834-25cf-4c73-8118-3841619c627d</loc>
        <lastmod>2025-12-18T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Persistence%20Mechanisms%20in%20Long-Standing%20&apos;Prince%20of%20Persia&apos;%20Threat%20Activity&amp;subtitle=New%20research%20confirms%20that%20the%20%22Prince%20of%20Persia%22%20threat%20group%20remains%20active%2C%20utilizing%20advanced%20cr...</image:loc>
            <image:title>Analysis of Persistence Mechanisms in Long-Standing &apos;Prince of Persia&apos; Threat Activity</image:title>
            <image:caption>New research confirms that the &quot;Prince of Persia&quot; threat group remains active, utilizing advanced cryptographic verification to protect its command-and-control infrastructure. This analysis examines the group&apos;s evolved toolset and the operational security measures that have sustained its activities for nearly two decades.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/67816c8b-6564-4e63-a58a-8f0748eb6e9e</loc>
        <lastmod>2025-12-18T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=SonicWall%20Vulnerability%20Chaining%20and%20Prince%20of%20Persia%20Persistence%20Mechanisms&amp;subtitle=New%20developments%20in%20network%20security%20require%20attention%20to%20two%20distinct%20areas%3A%20critical%20patching%20for%20...</image:loc>
            <image:title>SonicWall Vulnerability Chaining and Prince of Persia Persistence Mechanisms</image:title>
            <image:caption>New developments in network security require attention to two distinct areas: critical patching for SonicWall SMA1000 appliances and updated detection logic for the &quot;Prince of Persia&quot; threat group. This brief outlines the necessary remediation steps and analyzes how recent malware campaigns are evolving to bypass traditional sinkholing techniques.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5de81f81-a14e-4bb2-8299-16a8123ff2df</loc>
        <lastmod>2025-12-17T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Afripol%20Strengthens%20Regional%20Cooperation%20to%20Address%20Cyber%20Risks&amp;subtitle=Law%20enforcement%20representatives%20from%20over%2040%20African%20nations%20convened%20to%20standardize%20digital%20evidenc...</image:loc>
            <image:title>Afripol Strengthens Regional Cooperation to Address Cyber Risks</image:title>
            <image:caption>Law enforcement representatives from over 40 African nations convened to standardize digital evidence procedures and enhance cross-border collaboration. This initiative aims to close jurisdictional gaps and improve response capabilities against transnational threat actors.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/ed5c8e58-2e04-4ce7-b548-860421e742e3</loc>
        <lastmod>2025-12-17T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Critical%20Authentication%20Vulnerabilities%20Identified%20in%20Fortinet%20Platforms&amp;subtitle=New%20security%20findings%20in%20FortiOS%20and%20related%20products%20allow%20for%20authentication%20bypass%20via%20crafted%20SA...</image:loc>
            <image:title>Critical Authentication Vulnerabilities Identified in Fortinet Platforms</image:title>
            <image:caption>New security findings in FortiOS and related products allow for authentication bypass via crafted SAML messages. This advisory outlines the technical scope, observed activity, and immediate steps required to secure administrative interfaces.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/6a098351-a3ee-4ff1-a18b-383c5bfe5d44</loc>
        <lastmod>2025-12-17T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Analysis%20of%20Cellik%3A%20Android%20Malware%20Using%20Legitimate%20Apps%20for%20Evasion&amp;subtitle=New%20research%20identifies%20Cellik%2C%20a%20remote%20access%20tool%20that%20wraps%20malicious%20payloads%20inside%20legitimate...</image:loc>
            <image:title>Analysis of Cellik: Android Malware Using Legitimate Apps for Evasion</image:title>
            <image:caption>New research identifies Cellik, a remote access tool that wraps malicious payloads inside legitimate Android applications to evade detection. Understanding its distribution method—which relies on social engineering rather than software vulnerabilities—is essential for securing mobile environments.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/5e49e8b0-b311-4418-8b17-dabc1f8f7270</loc>
        <lastmod>2025-12-17T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=PHARE%20Benchmark%20Analysis%3A%20Disparities%20in%20LLM%20Safety%20and%20Robustness&amp;subtitle=New%20data%20including%20the%20PHARE%20LLM%20benchmark%20reveals%20significant%20variance%20in%20how%20large%20language%20models...</image:loc>
            <image:title>PHARE Benchmark Analysis: Disparities in LLM Safety and Robustness</image:title>
            <image:caption>New data including the PHARE LLM benchmark reveals significant variance in how large language models handle security challenges. This analysis highlights the efficacy of different alignment strategies and provides organizations with performance metrics and guide secure model selection.</image:caption>
        </image:image>
    </url>
    <url>
        <loc>https://wwwbeta.triagesecurity.ai/blog/698c116a-5491-441f-b94b-d323f359e599</loc>
        <lastmod>2025-12-17T00:00:00.000Z</lastmod>
        <changefreq>weekly</changefreq>
        <priority>0.8</priority>
        <image:image>
            <image:loc>https://wwwbeta.triagesecurity.ai/marketing/og?title=Security%20Advisory%3A%20Management%20Plane%20Risks%20in%20Fortinet%2C%20AWS%2C%20and%20Mobile%20Environments&amp;subtitle=Critical%20vulnerabilities%20in%20Fortinet%20authentication%20and%20new%20persistence%20tactics%20in%20AWS%20highlight%20the...</image:loc>
            <image:title>Security Advisory: Management Plane Risks in Fortinet, AWS, and Mobile Environments</image:title>
            <image:caption>Critical vulnerabilities in Fortinet authentication and new persistence tactics in AWS highlight the need for rigorous management plane security. This advisory details specific remediation steps for CVE-2025-59718 and outlines detection strategies for emerging cloud and mobile threats.</image:caption>
        </image:image>
    </url>
</urlset>