<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//x86.se/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://x86.se/fake-captcha-irsf-scam-keitaro-campaigns/</loc>
		<lastmod>2026-04-28T03:51:58+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/pypi-package-1m-monthly-downloads-hacked/</loc>
		<lastmod>2026-04-28T03:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/pypi-package-with-1-1m-monthly-downloads-hacked-to-push-infostealer-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/home-security-giant-adt-data-breach/</loc>
		<lastmod>2026-04-28T03:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/home-security-giant-adt-data-breach-affects-5-5-million-people-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/webinar-spotting-cyberattacks-begin/</loc>
		<lastmod>2026-04-28T03:56:28+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/webinar-spotting-cyberattacks-before-they-begin-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/medtronic-confirms-breach-hackers-claim-million/</loc>
		<lastmod>2026-04-28T03:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/money-launderer-linked-230m-crypto-heist/</loc>
		<lastmod>2026-04-28T03:56:37+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/money-launderer-linked-to-230m-crypto-heist-gets-70-months-in-prison-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/microsoft-says-outlook-com-outage-causing/</loc>
		<lastmod>2026-04-28T03:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/microsoft-says-outlook-com-outage-is-causing-sign-in-failures-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/american-utility-firm-itron-discloses-breach/</loc>
		<lastmod>2026-04-28T03:56:47+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/american-utility-firm-itron-discloses-breach-of-internal-it-network-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/microsoft-rolls-out-revamped-windows-insider/</loc>
		<lastmod>2026-04-28T03:56:55+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/microsoft-rolls-out-revamped-windows-insider-program-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/threat-actor-uses-microsoft-teams-deploy/</loc>
		<lastmod>2026-04-28T03:57:00+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/adt-confirms-data-breach-shinyhunters-leak/</loc>
		<lastmod>2026-04-28T03:57:06+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/adt-confirms-data-breach-after-shinyhunters-leak-threat-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/firestarter-malware-survives-cisco-firewall-updates/</loc>
		<lastmod>2026-04-28T03:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/firestarter-malware-survives-cisco-firewall-updates-security-patches-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/windows-update-gets-controls-reduce-forced/</loc>
		<lastmod>2026-04-28T03:58:36+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/windows-update-gets-new-controls-to-reduce-forced-restarts-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/blackfile-extortion-group-linked-surge-vishing/</loc>
		<lastmod>2026-04-28T03:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/microsoft-roll-out-entra-passkeys-windows/</loc>
		<lastmod>2026-04-28T03:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/us-sanctions-target-cambodian-scam-network/</loc>
		<lastmod>2026-04-28T03:58:48+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/us-sanctions-target-cambodian-scam-network-leaders.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/utilities-tech-supplier-itron-discloses-cyber-attack/</loc>
		<lastmod>2026-04-28T03:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/utilities-tech-supplier-itron-discloses-cyber-attack-operations-unaffected.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/widely-used-browser-extensions-selling-user/</loc>
		<lastmod>2026-04-28T03:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/widely-used-browser-extensions-selling-user-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/most-cybersecurity-professionals-feel-undervalued-underpaid/</loc>
		<lastmod>2026-04-28T03:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/most-cybersecurity-professionals-feel-undervalued-and-underpaid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/researchers-identify-fast16-sabotage-malware-pre-dates/</loc>
		<lastmod>2026-04-28T03:58:53+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/researchers-identify-fast16-sabotage-malware-that-pre-dates-stuxnet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/blackfile-group-targets-retail-hospitality-vishing/</loc>
		<lastmod>2026-04-28T03:58:56+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/blackfile-group-targets-retail-and-hospitality-with-vishing-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/uk-biobank-data-breach-health-data/</loc>
		<lastmod>2026-04-28T03:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/uk-biobank-data-breach-health-data-of-500000-listed-for-sale-in-china.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/ai-rush-reviving-old-cybersecurity-mistakes/</loc>
		<lastmod>2026-04-28T03:58:59+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/ai-rush-is-reviving-old-cybersecurity-mistakes-mandiant-vp-warns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/npm-supply-chain-malware-attack-targets/</loc>
		<lastmod>2026-04-28T03:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/npm-supply-chain-malware-attack-targets-developers-with-worm-like-propagation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/google-favors-general-purpose-gemini-models-cybersecurity/</loc>
		<lastmod>2026-04-28T03:59:02+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/google-favors-general-purpose-gemini-models-over-cybersecurity-specific-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/apple-fixes-ios-notification-bug-exposing/</loc>
		<lastmod>2026-04-28T03:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/apple-fixes-ios-notification-bug-exposing-deleted-messages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/google-introduces-unique-ai-agent-identities/</loc>
		<lastmod>2026-04-28T03:59:05+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/google-introduces-unique-ai-agent-identities-in-new-gemini-enterprise-platform-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/cyber-attacks-surge-annually-education-sector/</loc>
		<lastmod>2026-04-28T03:59:08+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/cyber-attacks-surge-63-annually-in-education-sector.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/researchers-uncover-in-the-wild-prompt-injection-payloads/</loc>
		<lastmod>2026-04-28T03:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/researchers-uncover-10-in-the-wild-prompt-injection-payloads-targeting-ai-agents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/ncsc-backs-passkeys-hailing-era-sign-in/</loc>
		<lastmod>2026-04-28T03:59:11+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/ncsc-backs-passkeys-hailing-a-new-era-of-sign-in.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/macos-native-tools-enable-stealthy-enterprise/</loc>
		<lastmod>2026-04-28T03:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/macos-native-tools-enable-stealthy-enterprise-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/ncsc-unveils-silentglass-plug-in-device-protect/</loc>
		<lastmod>2026-04-28T03:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/ncsc-unveils-silentglass-a-plug-in-device-to-protect-monitors-from-cyber-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/uk-commits-90m-cybersecurity-pushes-resilience/</loc>
		<lastmod>2026-04-28T03:59:15+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/uk-commits-90m-for-cybersecurity-and-pushes-for-resilience-pledge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/surge-silent-subject-phishing-attacks-targets/</loc>
		<lastmod>2026-04-28T03:59:16+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/surge-in-silent-subject-phishing-attacks-targets-vip-users.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/former-ransomware-negotiator-pleads-guilty-working/</loc>
		<lastmod>2026-04-28T03:59:18+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/former-ransomware-negotiator-pleads-guilty-to-working-for-blackcat-cyber-gang.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/attackers-backdoor-codesys-applications-chaining-vulnerabilities/</loc>
		<lastmod>2026-04-28T03:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/attackers-can-backdoor-codesys-applications-by-chaining-vulnerabilities.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/critical-cvss-rce-hijacks-pipecat-voice/</loc>
		<lastmod>2026-04-28T03:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/critical-9-8-cvss-rce-hijacks-pipecat-voice-agents-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/carlson-vasco-b-gnss-receivers-left-open/</loc>
		<lastmod>2026-04-28T03:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/carlson-vasco-b-gnss-receivers-left-open-to-remote-hijack-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/critical-cvss-flaw-exposes-intrado-emergency/</loc>
		<lastmod>2026-04-28T03:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://x86.se/cisa-adds-four-actively-exploited-vulnerabilities/</loc>
		<lastmod>2026-04-28T04:03:38+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/cisa-warns-multiple-simplehelp-vulnerabilities-exploited/</loc>
		<lastmod>2026-04-28T04:03:41+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/hackers-exploiting-cisco-firepower-devices-using/</loc>
		<lastmod>2026-04-28T04:03:44+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/hackers-exploiting-cisco-firepower-devices-using-n-day-vulnerabilities-to-gain-unauthorized-access.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/governments-high-alert-cisa-snuffs-out/</loc>
		<lastmod>2026-04-28T04:03:46+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/governments-on-high-alert-after-cisa-snuffs-out-firestarter-backdoor-on-fed-network.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/academic-exposure-unpatched-flaw-siphoning-student/</loc>
		<lastmod>2026-04-28T04:03:48+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/academic-exposure-the-unpatched-flaw-siphoning-student-data-from-drc-insight-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/cvss-flaw-millions-spring-boot-apps/</loc>
		<lastmod>2026-04-28T04:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/the-9-1-cvss-flaw-why-millions-of-spring-boot-apps-may-be-exposed-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/triple-threat-apache-activemq-vulnerabilities-expose/</loc>
		<lastmod>2026-04-28T04:03:58+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/triple-threat-apache-activemq-vulnerabilities-expose-enterprises-to-rce-and-xss-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/microsoft-beefs-up-remote-desktop-security/</loc>
		<lastmod>2026-04-28T04:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/microsoft-beefs-up-remote-desktop-security-with-hard-to-read-messages-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/xiongmai-ip-camera-vulnerability-let-attackers/</loc>
		<lastmod>2026-04-28T04:04:03+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/xiongmai-ip-camera-vulnerability-let-attackers-bypass-authentication-and-have-remote-access.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/python-vulnerability-allows-out-of-bounds-write-windows/</loc>
		<lastmod>2026-04-28T04:04:05+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/python-vulnerability-allows-out-of-bounds-write-on-windows-systems.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/hackers-exploit-ollama-model-uploads-leak/</loc>
		<lastmod>2026-04-28T04:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/hackers-can-exploit-ollama-model-uploads-to-leak-sensitive-server-data.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/vulnerability-adaptivegrc-software/</loc>
		<lastmod>2026-04-28T04:04:10+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/vulnerability-in-adaptivegrc-software.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/windsurf-ide-extension-drops-malware-via/</loc>
		<lastmod>2026-04-28T04:04:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://x86.se/windows-macos-malware-spreads-via-fake/</loc>
		<lastmod>2026-04-28T04:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/windows-and-macos-malware-spreads-via-fake-claude-code-google-ads-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/global-scam-machines-inside-meta-powered-investment/</loc>
		<lastmod>2026-04-28T04:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/global-scam-machines-inside-a-meta-powered-investment-fraud-ecosystem-spanning-25-countries-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/lummastealer-getting-second-life-alongside-castleloader/</loc>
		<lastmod>2026-04-28T04:07:15+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/02/lummastealer-is-getting-a-second-life-alongside-castleloader-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/helpful-skills-hidden-payloads-bitdefender-labs/</loc>
		<lastmod>2026-04-28T04:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/02/helpful-skills-or-hidden-payloads-bitdefender-labs-dives-deep-into-the-openclaw-malicious-skill-trap-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/android-trojan-campaign-uses-hugging-face/</loc>
		<lastmod>2026-04-28T04:07:37+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/01/android-trojan-campaign-uses-hugging-face-hosting-for-rat-payload-delivery-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/fake-leonardo-dicaprio-movie-torrent-drops/</loc>
		<lastmod>2026-04-28T04:07:47+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2025/12/fake-leonardo-dicaprio-movie-torrent-drops-agent-tesla-through-layered-powershell-chain-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/cve-2025-55182-exploitation-hits-smart-home/</loc>
		<lastmod>2026-04-28T04:07:52+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2025/12/cve-2025-55182-exploitation-hits-the-smart-home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/fake-battlefield-pirated-versions-game-trainers/</loc>
		<lastmod>2026-04-28T04:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2025/11/fake-battlefield-6-pirated-versions-and-game-trainers-used-to-deploy-stealers-and-c2-agents-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/unc6692-hackers-exploit-microsoft-teams-deploy/</loc>
		<lastmod>2026-04-28T04:08:06+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/unc6692-hackers-exploit-microsoft-teams-to-deploy-snow-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/vidar-infostealer-spreads-via-fake-captchas/</loc>
		<lastmod>2026-04-28T04:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/vidar-infostealer-spreads-via-fake-captchas-hides-in-jpeg-and-txt-files-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/microsoft-entra-agent-id-flaw-enabled/</loc>
		<lastmod>2026-04-28T04:08:12+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/microsoft-entra-agent-id-flaw-enabled-tenant-takeover-via-privilege-escalation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/fake-captcha-scam-abuses-verification-clicks/</loc>
		<lastmod>2026-04-28T04:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/fake-captcha-scam-abuses-verification-clicks-to-send-costly-international-texts.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/clickfix-attack-hides-native-windows-tools/</loc>
		<lastmod>2026-04-28T04:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/teampcp-hijacks-bitwarden-cli-uses-dependabot/</loc>
		<lastmod>2026-04-28T04:08:20+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/french-police-arrest-hexdex-hacker-mass/</loc>
		<lastmod>2026-04-28T04:08:28+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/french-police-arrest-hexdex-hacker-over-mass-data-theft-and-leaks-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/harvester-apt-expands-spying-operations-gogra/</loc>
		<lastmod>2026-04-28T04:08:29+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/harvester-apt-expands-spying-operations-with-new-gogra-linux-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/hackers-use-hidden-website-instructions-attacks/</loc>
		<lastmod>2026-04-28T04:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/hackers-use-hidden-website-instructions-in-new-attacks-on-ai-assistants.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/discord-linked-group-accessed-anthropic-s-claude/</loc>
		<lastmod>2026-04-28T04:08:41+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/discord-linked-group-accessed-anthropics-claude-mythos-ai-in-vendor-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/case-dependency-cooldowns-post-axios-world/</loc>
		<lastmod>2026-04-28T04:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/the-case-for-dependency-cooldowns-in-a-post-axios-world.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/unpatchable-vulnerabilities-kubernetes-cve-2020-8562/</loc>
		<lastmod>2026-04-28T04:08:57+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/unpatchable-vulnerabilities-of-kubernetes-cve-2020-8562.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/compromised-axios-npm-package-delivers-cross-platform/</loc>
		<lastmod>2026-04-28T04:10:42+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/compromised-axios-npm-package-delivers-cross-platform-rat.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/robinhood-account-creation-flaw-abused-send/</loc>
		<lastmod>2026-04-28T04:19:44+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/robinhood-account-creation-flaw-abused-to-send-phishing-emails-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/glassworm-malware-attacks-return-via-openvsx/</loc>
		<lastmod>2026-04-28T04:19:48+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/glassworm-malware-attacks-return-via-73-openvsx-sleeper-extensions-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/canada-arrests-three-operating-sms-blaster/</loc>
		<lastmod>2026-04-28T04:19:52+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/canada-arrests-three-for-operating-sms-blaster-device-in-toronto-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/alleged-silk-typhoon-hacker-extradited-us/</loc>
		<lastmod>2026-04-28T04:19:56+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/alleged-silk-typhoon-hacker-extradited-to-us-for-cyberespionage-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/ftc-americans-lost-billion-social-media/</loc>
		<lastmod>2026-04-28T04:20:07+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/ftc-americans-lost-over-2-1-billion-to-social-media-scams-in-2025-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/firestarter-cisco-asa-backdoor/</loc>
		<lastmod>2026-04-28T04:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/firestarter-cisco-asa-backdoor.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/unfiltered-cvss-deserialization-loophole-hijacking-apache/</loc>
		<lastmod>2026-04-28T04:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/unfiltered-the-9-8-cvss-deserialization-loophole-hijacking-apache-mina-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/notepad-vulnerability-allows-attackers-crash-application/</loc>
		<lastmod>2026-04-28T04:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/notepad-vulnerability-allows-attackers-to-crash-application-leak-memory-data.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/zero-click-vulnerability-akamai-uncovers-incomplete-patch/</loc>
		<lastmod>2026-04-28T04:20:33+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/the-zero-click-vulnerability-akamai-uncovers-incomplete-patch-for-apt28-exploit-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/cve-watchtower-weekly-threat-intelligence-briefing/</loc>
		<lastmod>2026-04-28T04:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/the-cve-watchtower-weekly-threat-intelligence-briefing-april-20-april-26-2026-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/chrome-extensions-found-selling-user-data/</loc>
		<lastmod>2026-04-28T04:20:45+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/82-chrome-extensions-found-selling-user-data-6-5-million-users-affected.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/shinyhunters-leaks-data-udemy-zara-7-eleven/</loc>
		<lastmod>2026-04-28T04:20:49+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/04/shinyhunters-leaks-data-of-udemy-zara-7-eleven-in-salesforce-linked-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/litellm-telnyx-compromised-pypi-tracing-teampcp/</loc>
		<lastmod>2026-04-28T04:22:22+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/litellm-and-telnyx-compromised-on-pypi-tracing-the-teampcp-supply-chain-campaign.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/uncovering-agent-logging-gaps-copilot-studio/</loc>
		<lastmod>2026-04-28T04:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/uncovering-agent-logging-gaps-in-copilot-studio.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/behind-console-active-phishing-campaign-targeting/</loc>
		<lastmod>2026-04-28T04:25:31+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/03/behind-the-console-active-phishing-campaign-targeting-aws-console-credentials.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/hook-line-vault-technical-deep-dive/</loc>
		<lastmod>2026-04-28T04:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://x86.se/kubernetes-project-issues-warning-ingress-nginx/</loc>
		<lastmod>2026-04-28T04:32:54+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/02/kubernetes-project-issues-warning-on-ingress-nginx-retirement.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/tech-impersonators-clickfix-macos-infostealers/</loc>
		<lastmod>2026-04-28T04:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/02/tech-impersonators-clickfix-and-macos-infostealers.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/web-traffic-hijacking-nginx-configuration-turns/</loc>
		<lastmod>2026-04-28T04:34:40+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/02/web-traffic-hijacking-when-your-nginx-configuration-turns-malicious.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/openssl-january-security-update-cms-pkcs/</loc>
		<lastmod>2026-04-28T04:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/01/openssl-january-2026-security-update-cms-and-pkcs12-buffer-overflows.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/introducing-ide-shepherd-shield-against-threat-actors/</loc>
		<lastmod>2026-04-28T04:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/01/introducing-ide-shepherd-your-shield-against-threat-actors-lurking-in-your-ide.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/decoding-github-recommendations-npm-maintainers/</loc>
		<lastmod>2026-04-28T04:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2026/01/decoding-the-github-recommendations-for-npm-maintainers.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://x86.se/introducing-pathfinding-cloud/</loc>
		<lastmod>2026-04-28T04:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://x86.se/wp-content/uploads/2025/12/introducing-pathfinding-cloud-8.avif</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->
<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Content Delivery Network Full Site Delivery via cloudflare
Lazy Loading

Served from: x86.se @ 2026-04-28 09:10:35 by W3 Total Cache
-->