<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//staging.checkmarx.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://staging.checkmarx.com/blog/redos-regular-expression-denial-of-service/</loc>
		<lastmod>2008-12-20T08:54:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-security-state-of-wordpress-top-50-plugins/</loc>
		<lastmod>2013-06-18T09:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-5-key-benefits-of-source-code-analysis/</loc>
		<lastmod>2014-03-17T10:12:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/faq/what-air-secure-integer-model/</loc>
		<lastmod>2015-01-22T07:47:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/faq/why-application-team-leader/</loc>
		<lastmod>2015-01-22T07:53:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-appsec-how-to-javascript-security-implications/</loc>
		<lastmod>2015-02-23T10:47:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/do-i-have-to-rescan-my-entire-code-base-every-time/</loc>
		<lastmod>2015-02-26T13:47:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/can-you-please-describe-your-product-architecture/</loc>
		<lastmod>2015-02-26T13:47:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-appsec-how-to-application-security-in-continuous-integration/</loc>
		<lastmod>2015-03-03T15:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/application-team-leader/</loc>
		<lastmod>2015-03-15T13:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cdm-media-ciso-summit/</loc>
		<lastmod>2015-03-22T12:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/sales/senior-prepost-sales-engineers/</loc>
		<lastmod>2015-04-22T06:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/senior-engineer-engine/</loc>
		<lastmod>2015-04-28T14:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/product-management-israel/technical-product-manager/</loc>
		<lastmod>2015-04-28T14:23:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/sales-jobs-in-apac-jobs-in-emea/field-sales-engineers-emea-186/</loc>
		<lastmod>2015-05-06T06:45:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/sales-jobs-in-apac-jobs-in-usa/inside-sales-163/</loc>
		<lastmod>2015-05-21T06:53:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/group-manager-rd-182/</loc>
		<lastmod>2015-05-21T07:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/senior-java-developer-199/</loc>
		<lastmod>2015-07-15T15:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/senior-qa-engineer-200/</loc>
		<lastmod>2015-07-15T16:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/sales/sr-business-operations-engineer/</loc>
		<lastmod>2015-07-19T14:43:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/r-d-israel/devops-engineer/</loc>
		<lastmod>2015-07-19T14:49:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/partners/corpus-solutions/</loc>
		<lastmod>2018-10-25T10:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/partners/exclusive-networks/</loc>
		<lastmod>2020-04-12T12:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-current-state-of-appsec-a-notable-survey-to-share/</loc>
		<lastmod>2021-11-10T14:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/cx_rp_appsec-report-21_blog-1024x512-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/kics-first-open-source-project-to-achieve-cis-level-2-certification/</loc>
		<lastmod>2021-11-15T06:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_599806937.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-a-leader-in-the-2022-gartner-magic-quadrant-for-application-security-testing-for-the-5th-consecutive-year/</loc>
		<lastmod>2022-04-21T15:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/04/Final_APRIL21_Gartner2022_Gartner-Blog-Post-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-developers-view-what-exactly-is-modern-application-development/</loc>
		<lastmod>2024-05-22T12:39:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/10/shutterstock_1077839366.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/transforming-security-devops-into-devsecops/</loc>
		<lastmod>2024-05-22T12:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_739242352.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/our-response-to-npm-account-takeover-attacks-chainalert-a-community-backed-open-source-tool/</loc>
		<lastmod>2024-05-22T12:39:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/02/post_thumbnail_1024_512_x2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-practical-example-of-the-power-of-checkmarx-fusion/</loc>
		<lastmod>2024-05-22T12:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_blue_computer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-1-1024x505-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-2-1024x510-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-3-1024x512-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-4-1024x500-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-5-1024x474-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-6-1024x513-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/large-scale-campaign-created-fake-github-projects-clones-with-fake-commit-added-malware/</loc>
		<lastmod>2024-05-22T12:40:53+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_1-1024x572-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_2-1024x963-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_3-1024x473-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_4-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_5-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/most-dangerous-cwes-of-2021/</loc>
		<lastmod>2024-05-22T12:41:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_code-bug.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Screenshot-2022-08-25-062212-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-2-1024x844-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-1-1-1024x926-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Image-9-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/first-known-phishing-attack-against-pypi-users/</loc>
		<lastmod>2024-05-22T12:41:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/blog-python.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_6-1-1024x638-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_1-3-1024x606-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_4-2-1024x591-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_2-3-1024x671-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_3-2-1024x575-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_5-2-1024x421-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-developers-view-what-kind-of-ast-event-correlation-is-needed-in-mad/</loc>
		<lastmod>2024-05-22T12:41:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Blog-image-modern-app-dev.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Screenshot_GitHub-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Headshot_Vince-Power-150x150-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/api-security-exposed-api-endpoint-leaks-over-11-million-telco-customers-data/</loc>
		<lastmod>2024-05-22T12:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/Shutterstock_1357654529.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/1_auto_x2-1024x548-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/1.1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/1-1024x456-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/2-1024x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/whats-old-becomes-new-again-csrf-attacks-on-graphql-apis/</loc>
		<lastmod>2024-05-22T12:41:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Shutterstock_1972986332.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Picture1-1024x425-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Picture2-1024x289-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Picture3-1024x404-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/</loc>
		<lastmod>2024-05-22T12:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/My-project.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_01-1024x550-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_02-1024x614-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_03-1024x614-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_04-1024x566-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_05-1024x614-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_06-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_07-1024x666-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/image_08-1024x598-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/move-over-verbose-error-messages-graphql-apis-are-here/</loc>
		<lastmod>2024-05-22T12:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Shutterstock_1388881433.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture2-1024x421-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture4-1024x209-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Picture2-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links/</loc>
		<lastmod>2024-05-22T12:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_01-1024x638-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_02-1024x347-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_03-1024x666-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_04-1024x835-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_05-1024x772-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image_06-1024x438-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/exploiting-graphql-query-depth/</loc>
		<lastmod>2024-05-22T12:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/01/Shutterstock_685880971.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/navigating-the-microservices-maze-understanding-the-pros-and-cons-of-microservices-architectures/</loc>
		<lastmod>2024-05-22T12:41:49+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/01/Shutterstock_2206612185.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/01/Picture1-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/</loc>
		<lastmod>2024-05-22T12:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Shutterstock_2141340219-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/1-Picture-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/2-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/3-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/4-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/5-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/6-Picture-1024x46-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/7-Picture-1024x229-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/8-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/9-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/10-Picture-1024x188-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/11-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/12-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/13-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/14-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/15-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/16-Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/17-Picture-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ericsson-sensitive-data-exposure-via-trace-axd/</loc>
		<lastmod>2024-05-22T12:42:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Ericsson-Sensitive-Data-Exposure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/unverified-commits-are-you-unknowingly-trusting-attackers-code/</loc>
		<lastmod>2024-05-22T13:48:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/thumb_fake_commit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/about_commits-1024x316-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_2-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/Picture1-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_3-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_4-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/fake_commits_find_email-1024x389-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_5-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_6-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_7-1024x606-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/empower-your-developers-through-gamified-learning-with-checkmarx-codebashing/</loc>
		<lastmod>2024-05-22T15:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/blog_codebashing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure1-1024x553-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure2-1024x507-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure3-1024x512-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure4-1024x510-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure5-1024x508-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure6-1024x511-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Figure7-1024x510-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacking-the-software-supply-chain-with-a-simple-rename/</loc>
		<lastmod>2024-05-22T15:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/Thumbnail-without-text-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/alias-and-directive-overloading-in-graphql/</loc>
		<lastmod>2024-06-09T12:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Shutterstock_2006937560.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/openai-allowed-unlimited-credit-on-new-accounts/</loc>
		<lastmod>2024-06-09T12:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Open_AI_Landing_page.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-fusion-2-0-with-application-risk-management/</loc>
		<lastmod>2024-06-10T11:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/06/App-Risk-Manager-Launch-Blog-v1-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/github-repojacking-weakness-exploited-in-the-wild-by-attackers/</loc>
		<lastmod>2024-06-13T12:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/05/thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-new-stealthier-type-of-typosquatting-attack-spotted-targeting-npm/</loc>
		<lastmod>2024-06-13T13:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/MicrosoftTeams-image-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-checkmarx-api-security/</loc>
		<lastmod>2024-06-19T08:24:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_API_laptop-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-1-API-based-web-application-1024x584-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-2-existing-approaches-1024x560-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-3-shift-left-1024x436-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Option-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Figure-4-press-image-1024x542-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/4-essential-security-skills-for-modern-application-development/</loc>
		<lastmod>2024-06-19T08:25:49+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/01/shutterstock_1893585652.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cocoapods-subdomain-hijacked-this-is-how/</loc>
		<lastmod>2024-07-07T06:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image_1-1024x782-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image_2-1024x782-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image_3-1024x654-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cve-2022-37734-graphql-java-denial-of-service/</loc>
		<lastmod>2024-07-07T08:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Shutterstock_445200349.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20220929-123331-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20220929-124245-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20220929-130925-1024x311-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20220929-131034-1024x170-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20221005-095015-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20221011-092625-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20221010-130031-1024x184-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20221010-130639-1024x215-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20230125-133356-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20230125-133422-1024x369-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/image-20221226-100432-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/from-zero-to-appsec-anti-hero-how-ai-brings-more-security-issues-than-it-fixes/</loc>
		<lastmod>2024-07-07T08:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Shutterstock_728178127.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_1-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_2-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_3-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_5-1024x367-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_6-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_7-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_8-1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_9-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_10-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_11-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_12-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_16-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_17-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/Image_18-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/malicious-pypi-user-strikes-again-with-typosquatting-starjacking-and-unpacks-tailor-made-malware-written-in-c/</loc>
		<lastmod>2024-07-07T08:25:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/thumbnail-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_1-2-1024x630-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Group-2485-1024x1005-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_2-2-1024x459-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Group-2504-1024x412-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Group-2503-1024x228-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Group-2502-1024x310-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/typosquatting-campaign-targeting-pythons-top-packages-dropping-github-hosted-malware-with-dga-capabilities/</loc>
		<lastmod>2024-07-07T10:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/thumbnail-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_1-1-1024x564-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_2-1-1024x555-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Screenshot-2022-08-14-060309-1024x478-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_3-1-1024x748-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_4-1-1024x835-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_5-1-1024x574-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_6-1024x956-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_7-1024x756-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_8-1024x660-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_9-1024x574-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_10-1024x738-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_11-1024x597-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/image_12-1024x654-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Screenshot-2022-08-14-061548-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-cnapps-are-not-enough/</loc>
		<lastmod>2024-07-10T22:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/why_cnapp_not_enough.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/presets-queries-onboarding-the-checkmarx-one-difference/</loc>
		<lastmod>2024-07-22T14:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Blog_presets-and-queries-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/SAST_preset-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/CxAudit-1024x522-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/open-source-licenses-understanding-the-risk-factors/</loc>
		<lastmod>2024-07-28T06:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/04/linkedin_final3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-you-need-an-accurate-parts-list-for-your-software/</loc>
		<lastmod>2024-07-28T06:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/09/shutterstock_2017793921.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-how-and-where-open-source-gets-pulled-into-a-codebase/</loc>
		<lastmod>2024-07-28T06:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/shutterstock_1997565722.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cve-2022-42889-text4shell-vulnerability-breakdown/</loc>
		<lastmod>2024-07-28T07:34:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/Shutterstock_211718251.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/1-2-1024x640-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/2-1-1024x494-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/3-1024x178-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/analysis-of-openssl-cve-2022-3786-and-cve-2022-3602/</loc>
		<lastmod>2024-07-28T07:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Shutterstock_1801183438.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/npm-replicator-remote-code-execution-deserialization/</loc>
		<lastmod>2024-07-28T07:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/shutterstock_1744222322.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacker-caught-hijacking-packages-using-multiple-techniques-to-steal-aws-credentials/</loc>
		<lastmod>2024-08-01T11:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/05/thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/api-security-is-the-new-endpoint-security-2/</loc>
		<lastmod>2024-08-14T10:23:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_API.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-developers-list-of-microservices-risks/</loc>
		<lastmod>2024-08-15T13:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/08/shutterstock_1417006727.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/kpis-in-qa-and-appsec-you-call-it-bug-we-call-it-vulnerability/</loc>
		<lastmod>2024-08-15T13:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/My-project.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/winigroup/</loc>
		<lastmod>2024-08-15T13:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/openssl-cve-2022-3786-food-for-thought-on-the-importance-of-security-scanning/</loc>
		<lastmod>2024-08-15T13:58:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/computer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-1-1024x566-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-5-652x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-4-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/partners/cga-group/</loc>
		<lastmod>2024-08-15T13:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/partners/gss/</loc>
		<lastmod>2024-08-15T13:59:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/shifting-left-no-longer-enough-time-to-shift-everywhere/</loc>
		<lastmod>2024-08-15T14:04:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/Blog-banner_final.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-developers-guide-to-managing-open-source-risks/</loc>
		<lastmod>2024-08-20T07:52:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/09/shutterstock_501303862.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/key-considerations-for-building-a-proper-appsec-program-for-modern-application-development/</loc>
		<lastmod>2024-10-21T15:07:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/Shutterstock_1530452651.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/</loc>
		<lastmod>2024-10-22T19:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/shutterstock_1147086383.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/new-technique-used-by-attackers-in-npm-to-avoid-detection/</loc>
		<lastmod>2024-10-30T12:16:55+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/image_1-1024x443-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/image_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/image_3-1024x774-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-mitre-cve-program-funding-situation-response-from-checkmarx/</loc>
		<lastmod>2025-04-20T06:05:20+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Blog-Checkmarxs-response-to-MITRE-CVE-Program-Funding-Situation_4x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/regional-sales-manager-germany-202/</loc>
		<lastmod>2025-04-22T07:18:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-trinity-of-architects/</loc>
		<lastmod>2025-06-08T11:40:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/frame_12.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/trinityb.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/sm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cvss4-what-you-need-to-know-about-the-latest-version/</loc>
		<lastmod>2025-06-08T11:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/CVSS_blog-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/02/Untitled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/02/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/expanding-appsec-coverage-with-pii-leak-detection-with-checkmarx-hounddog-ai/</loc>
		<lastmod>2025-06-08T11:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/Hounddog_ai_thumbnail-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/blog2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/breaking-bottleneck-how-appsec-reduce-risk-without-slowing-development/</loc>
		<lastmod>2025-06-08T11:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/02/appsec_blog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-one-named-best-devsecops-solution-in-the-2024-devops-dozen-awards/</loc>
		<lastmod>2025-06-08T11:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/TS16-Tools-and-Services-_-Best-DevSecOps-Solution-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/devops-architects-guide-to-developer-friendly-appsec-tools/</loc>
		<lastmod>2025-06-08T11:43:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/Website-Blog-3-Game-Changers.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/elevating-code-security-the-shift-left-approach-with-vorpal-by-checkmarx/</loc>
		<lastmod>2025-06-08T11:43:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/vorpal_blog_2x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Vorpal-Check.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Vorpal-PR-Failure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-the-checkmarx-one-query-editor/</loc>
		<lastmod>2025-06-08T11:43:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/query_blog_2_1_5x-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-16.59.40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-16.58.35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Screenshot-2024-11-25-at-16.55.42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-role-of-security-tools-in-platform-engineering-enhancing-security-in-the-new-devops-era/</loc>
		<lastmod>2025-06-08T12:25:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/platform_engineering_blog_3x-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/unveiling-the-power-of-cloud-insights/</loc>
		<lastmod>2025-06-08T12:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Cloud_Insights_blog.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/unveiling-the-power-of-cloud-insights-img-06.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/make-better-decisions-with-checkmarx-one/</loc>
		<lastmod>2025-06-08T12:31:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/CX1_Analytics_Launch_blog.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-the-future-of-cloud-native-security/</loc>
		<lastmod>2025-06-08T12:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Story_Launch_Blog_Cloud_Native_Application_Security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/ASE-img-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/just-launched-checkmarx-ai-security/</loc>
		<lastmod>2025-06-08T12:32:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/Announcing_AI_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-real-time-ide-scanning-more-secure-code-in-real-time/</loc>
		<lastmod>2025-06-08T12:32:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/Introducing-Real-Time-IDE-Scanning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/sbom-and-the-bill-that-is-coming/</loc>
		<lastmod>2025-06-08T12:32:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/Public-Sector-Advocate-Intro-Post-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/demystifying-code-to-cloud-what-you-need-to-know/</loc>
		<lastmod>2025-06-08T12:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/Code-to-Cloud_blog-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/from-lines-of-code-to-cloud-security-navigating-the-future-of-secure-development/</loc>
		<lastmod>2025-06-08T12:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/First-line-of-code-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/preparing-for-europes-most-extensive-cybersecurity-directive-nis2-what-appsec-teams-need-to-know/</loc>
		<lastmod>2025-06-08T12:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/MicrosoftTeams-image-32-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/apma-the-new-appsec-maturity-model-with-your-success-in-mind/</loc>
		<lastmod>2025-06-08T12:37:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/APPSEC-MATURITY-%E2%80%93-TL-BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/5-tips-to-build-an-impactful-appsec-program-real-world-insights-from-apma-assessments/</loc>
		<lastmod>2025-06-08T12:37:20+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/Top-5-to-improve-Devx_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/2023-a-year-in-review/</loc>
		<lastmod>2025-06-08T13:14:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/Supply-chain-%E2%80%93-Blog-300ppi-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-vulcan-cyber-enabling-customers-to-mitigate-ai-vulnerabilities/</loc>
		<lastmod>2025-06-08T13:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/Vulcan-_-Checkmarx-partner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/get-the-most-out-of-consolidation/</loc>
		<lastmod>2025-06-08T13:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/ASPM_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/automating-vulnerability-remediation-with-checkmarx-one-and-mobb-ai/</loc>
		<lastmod>2025-06-08T13:15:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/Mobb-_-Checkmarx-Integration-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-and-the-ai-revolution-charting-the-future-of-application-security/</loc>
		<lastmod>2025-06-08T13:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/AI_vision_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-truth-behind-zombie-and-shadow-apis/</loc>
		<lastmod>2025-06-08T13:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/Zombie-and-shadow-APIs-%E2%80%93-Blog-300ppi-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/whats-new-in-checkmarx-one-3-0/</loc>
		<lastmod>2025-06-08T13:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/MicrosoftTeams-image-20.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-a-leader-in-the-2023-forrester-wave-for-static-application-security-testing/</loc>
		<lastmod>2025-06-08T13:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/09/MicrosoftTeams-image-14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/best-fix-location-minimize-fix-time-and-maximize-security/</loc>
		<lastmod>2025-06-08T13:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/Version_2.0_blog_banner2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/celebrating-excellence-checkmarx-americas-partner-summit-2023-awards/</loc>
		<lastmod>2025-06-08T13:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/08/partner-summit-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-buzz-around-developer-experience-unlocking-the-potential-of-superior-devex-with-codebashing-2-0/</loc>
		<lastmod>2025-06-08T13:17:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/Version_2.0_blog_banner2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-ai-query-builder-for-sast/</loc>
		<lastmod>2025-06-09T09:51:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/How-to-use-AI-to-write-custom-SAST-queries.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/shift-everywhere-with-checkmarx-one-and-dast/</loc>
		<lastmod>2025-06-09T09:52:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/MicrosoftTeams-image-1-e1743737413834.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/level-up-your-container-security/</loc>
		<lastmod>2025-06-09T09:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/container_security_launch_1_5x.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/container-security-blog-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/container-runtime-insights-to-prioritize-what-matters-most/</loc>
		<lastmod>2025-06-09T09:53:40+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/MicrosoftTeams-image-30.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/kics-from-iac-security-to-cloud-security-posture-and-drift-control/</loc>
		<lastmod>2025-06-09T10:16:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/01/shutterstock_750212500.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-developers-list-of-infrastructure-as-code-iac-risks/</loc>
		<lastmod>2025-06-09T10:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/09/shutterstock_1590824890.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/secret-sprawl-the-silent-threat-to-enterprise-security/</loc>
		<lastmod>2025-06-09T10:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/Exposed-secrets-blog_3x-scaled-e1745549278333.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/exposed-secrets-and-how-to-prevent-them/</loc>
		<lastmod>2025-06-09T10:20:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/Exposed-secrets-blog_3x-scaled-e1745549278333.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/secrets-secrets-are-no-fun-secrets-secrets-stored-in-plain-text-files-hurt-someone-2/</loc>
		<lastmod>2025-06-09T10:20:37+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/MicrosoftTeams-image-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-checkmarx-leads-aspm-market-frost-sullivan-2024-report/</loc>
		<lastmod>2025-06-09T10:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Frost_and_Sullivan_Oct2024_blog-1-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/embracing-aspm-enabling-enterprise-security-excellence/</loc>
		<lastmod>2025-06-09T10:22:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/ASPM_blog.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Embracing-ASPM-img-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Embracing-ASPM-img-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Embracing-ASPM-img-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Embracing-ASPM-img-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/Embracing-ASPM-img-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-wiz-advancing-appsec-with-code-to-cloud-integration/</loc>
		<lastmod>2025-06-09T10:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/blog-static.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/dxc-technology-checkmarx-teaming-for-enterprise-appsec-success/</loc>
		<lastmod>2025-06-09T10:24:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/DXC-Checkmarx-Blog-Header.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/DXC-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-global-codebashing-appsec-training-initiative-by-checkmarx-and-owasp/</loc>
		<lastmod>2025-06-09T10:24:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/04/Codebashing-CXOWASP-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/unifying-the-cyber-risk-lifecycle-with-checkmarx-one-and-brinqa/</loc>
		<lastmod>2025-06-09T10:33:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/06/Brinqa-Announcement-blog_Brinqa-Announcement-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-to-use-infrastructure-as-code-securely-and-avoid-cloud-misconfigurations/</loc>
		<lastmod>2025-06-09T10:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/Checkmarx_Solvo_Blog_1000x450_V1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-as-a-leader-in-software-supply-chain-security-sscs/</loc>
		<lastmod>2025-06-09T10:43:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/Gigaom-SSCS-Radar-Blog_2x-2-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Gigaom-SSCS-Radar-PR-v1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-npm-packages-were-used-to-spread-phishing-links/</loc>
		<lastmod>2025-06-09T10:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/cx-scs-prod.kb_.us-east-1.aws_.found-4-1024x196-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2651-1024x665-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2670-937x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2671-1024x401-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2654-1024x438-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2674-1024x779-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2675-741x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2677-1024x795-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2676-646x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2682-1024x421-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/Group-2680-1024x476-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/top-considerations-for-api-security/</loc>
		<lastmod>2025-06-09T10:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/Top-10-considerations_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-the-checkmarx-docker-desktop-extension/</loc>
		<lastmod>2025-06-09T10:47:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/docker_desktop_extension_5_1_5x.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/aspm-is-for-everyone/</loc>
		<lastmod>2025-06-09T10:49:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/ASPM-in-the-IDE-DevEx-2.0_2x-scaled-e1747023399214.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/blog5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/blog6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-one-harness-sto-orchestrating-security-scanning-in-your-ci-pipeline/</loc>
		<lastmod>2025-07-21T23:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/Harness_thumbnail_2x-1-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/the-risks-of-llm-poisoning-in-ai-powered-development-and-how-to-mitigate-them/</loc>
		<lastmod>2025-07-22T12:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/LLM-poisoning-blog_2x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/cvss-was-built-for-code-not-ai-agents-now-aivss-closes-the-gap/</loc>
		<lastmod>2025-07-24T08:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/Blog-Ken-Huang.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-contextual-blind-spot-why-appsec-keeps-striking-out-in-the-cloud-and-how-cisos-can-fix-it/</loc>
		<lastmod>2025-07-24T08:03:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/AppSec-keeps-striking-in-the-cloud-blog-final_1_5x.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/from-doers-to-decision-makers-engineerings-shift-in-the-age-of-agentic-ai/</loc>
		<lastmod>2025-07-24T08:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/blog_andrew_zigler.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/supply-chain-security/repository-health-monitoring-part-2-essential-practices-for-secure-repositories/</loc>
		<lastmod>2025-07-24T08:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/repository_health_monitoring_blogs_part_2-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/whats-boardish-and-why-you-should-learn-to-speak-it-fluently/</loc>
		<lastmod>2025-07-24T08:05:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/CISO-Priorities-blog-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/blogavi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/tuning-appsec-to-boost-your-dora-metrics/</loc>
		<lastmod>2025-07-24T08:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/blog_dora_2x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-is-your-api-attack-surface/</loc>
		<lastmod>2025-08-11T12:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/blog_API_orange-chair.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/Picture1-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-are-the-challenges-with-securing-apis/</loc>
		<lastmod>2025-08-11T12:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/Blog_API_2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/Picture1-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/just-released-the-future-of-appsec-in-the-era-of-ai-2026-industry-outlook/</loc>
		<lastmod>2025-08-14T15:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/future_of_appsec_blog-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/blog_future_of_appsec_infographics-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/modernizing-appsec-the-shift-from-on-prem-sast-to-a-cloud-native-platform/</loc>
		<lastmod>2025-09-04T11:06:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Migration-kit-Blog-WEB-thumbnail.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/4-common-container-security-misconceptions-and-how-to-avoid-them/</loc>
		<lastmod>2025-09-04T11:41:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/Container-Security-eBook_2x-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/announcing-devgrid-checkmarx-partnership-a-new-era-of-secure-engineering/</loc>
		<lastmod>2025-09-23T08:06:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/Announcing-DevGrid-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-rhythm-of-revolution-ais-role-in-the-next-tech-tipping-point/</loc>
		<lastmod>2025-10-09T14:02:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/July-B5-The-AI-Shifted-SDLC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/supply-chain-security/repository-health-monitoring-part-1-a-cornerstone-of-software-supply-chain-security/</loc>
		<lastmod>2025-10-12T08:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/repository_health_monitoring_blogs_part_1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-a-leader-in-2025-idc-aspm-report/</loc>
		<lastmod>2025-10-16T10:42:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/IDC-MarketScape-for-ASPM-blog-announcement.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/image-7-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-speed-vs-software-security-a-conversation-with-checkmarx-ceo-sandeep-johri-and-idcs-katie-norton/</loc>
		<lastmod>2025-10-16T10:42:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/blog-Katie-Norton_1_5x.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-a-leader-in-the-forrester-wave-static-application-security-testing-solutions-q3-2025/</loc>
		<lastmod>2025-10-16T10:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/Forrester-2025-website-resource-card-thumbnail-v1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/A-blue-and-white-diagram-AI-generated-content-may-be-incorrect_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/when-the-ai-lies-a-new-threat-emerges-for-human-in-the-loop-security/</loc>
		<lastmod>2025-10-21T09:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/ChatGPT-Image-Oct-21-2025-12_28_02-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-once-again-recognized-as-a-2024-customers-choice-for-application-security-testing-by-gartner-peer-insights/</loc>
		<lastmod>2025-10-23T13:46:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/gartner_voc_2024_blog-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-has-been-recognized-as-a-2023-customers-choice-for-application-security-testing-by-gartner-peer-insights/</loc>
		<lastmod>2025-10-23T13:49:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/12/Gartner_Blog-1024x512-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/championing-security-in-a-changing-world-elevate-your-security-posture-with-the-checkmarx-security-champion-program/</loc>
		<lastmod>2025-10-23T13:51:53+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/09/Championing_Security_blog_banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/getting-to-devsecops-how-to-change-culture/</loc>
		<lastmod>2025-10-27T15:51:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/5_dimensions_of_gartner_s_maturity_model_blog_3x-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Devsecops_diagram_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-named-a-leader-for-the-7th-time-in-the-2025-gartner-magic-quadrant-for-application-security-testing/</loc>
		<lastmod>2025-10-27T16:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/gartner_mq_ast_website_resource_and_blog_card_thumbnail_v2-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/Figure1-926x1024-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/vulnerable-by-design-appsec-in-the-agentic-ai-era/</loc>
		<lastmod>2025-10-30T07:04:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/AppSec_in_the_Era_of_Agentic_AI_webinar_web_card_thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/foa_summary_website_thumbnail_-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-is-acsa-defining-ai-code-security-assistance-for-the-enterprise/</loc>
		<lastmod>2025-11-09T09:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/ChatGPT-Image-Oct-20-2025-12_49_28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/the-productivity-security-paradox-of-ai-coding-assistants/</loc>
		<lastmod>2025-11-09T09:44:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/ChatGPT-Image-Oct-26-2025-05_27_31-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-is-writing-your-code-whos-keeping-it-secure/</loc>
		<lastmod>2025-11-10T10:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/image-3-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/ai_is_writing_your_code-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/understanding-epss/</loc>
		<lastmod>2025-11-10T10:50:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/EPSS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/codemender-aardvark-and-the-rise-of-agentic-appsec-what-developers-need-to-know/</loc>
		<lastmod>2025-11-12T10:21:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Untitled-design-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/image-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/image-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/didnt-notice-your-rate-limiting-graphql-batching-attack/</loc>
		<lastmod>2025-11-13T13:50:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/image-4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/text-1024x617-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/text-2-1024x574-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/12/text-3-1024x483-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/top-5-iac-misconfigurations-you-should-avoid/</loc>
		<lastmod>2025-11-13T17:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/MicrosoftTeams-image-6-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/sbom-what-it-is-and-why-you-should-care/</loc>
		<lastmod>2025-11-13T18:20:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_1519001843.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-to-prevent-secrets-from-leaking-out-of-your-dev-pipeline/</loc>
		<lastmod>2025-11-13T18:32:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/Aussie-Football.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/our-vision-securing-the-entire-software-supply-chain/</loc>
		<lastmod>2025-11-13T18:32:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/Supply-chain-%E2%80%93-Blog-300ppi-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/pre-commit-or-pay-later-the-new-cost-of-ai-era-appsec/</loc>
		<lastmod>2025-11-18T14:30:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-18-2025-01_30_52-PM.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/big-30496-Checkmarx-Pre-commit-Blog-Graphics_01_02.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/big-30496-Checkmarx-Pre-commit-Blog-Graphics_02_02-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/big-30496-Checkmarx-Pre-commit-Blog-Graphics_03_02-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/agentic-ai-vulnerability-prevention/</loc>
		<lastmod>2025-11-18T15:16:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/apma-digital-a-new-way-to-develop-appsec-maturity/</loc>
		<lastmod>2025-11-22T15:21:58+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/APMA-Blog-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-cisos-can-finally-get-ahead-of-application-risk/</loc>
		<lastmod>2025-11-22T15:28:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/blog_intro_to_cx_gamechangers.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-is-aspm-and-why-do-you-need-it-in-your-cyber-toolkit/</loc>
		<lastmod>2025-11-22T15:38:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/02/Future_of_AppSec_website_2x-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/static-analysis-of-infrastructure-as-code-with-codefresh-and-checkmarx/</loc>
		<lastmod>2025-11-22T16:02:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/05/shutterstock_1221904888.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/open-source-software-supply-chain-risks-and-attack-vectors-how-checkmarx-can-help/</loc>
		<lastmod>2025-11-22T16:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/Shutterstock_2010249140.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-ai-guided-remediation-for-iac-security-kics/</loc>
		<lastmod>2025-11-22T16:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/06/AI-Launch-blog-banner-3-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/rumors-of-the-developers-demise-have-been-greatly-exaggerated-a-perspective-from-simon-bennetts-software-engineering-expert-at-checkmarx/</loc>
		<lastmod>2025-11-23T09:14:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-18-2025-01_00_54-PM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/safe-refactor-the-faster-safer-way-to-upgrade-vulnerable-packages/</loc>
		<lastmod>2025-11-24T16:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-24-2025-03_37_39-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-future-of-dast/</loc>
		<lastmod>2025-11-24T18:18:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/large-Untitled-Blog-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-influencer-2026-predictions/</loc>
		<lastmod>2025-12-04T16:48:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Facebook-Cover-2026-Predictions-for-Success-Blog-Banner-2-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/leading-the-shift-to-a-continuous-agentic-appsec-checkmarx-acquires-tromzo/</loc>
		<lastmod>2025-12-08T17:04:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Tromzo-Blog_.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/large-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-ai-security-champion-with-auto-remediation-for-sast/</loc>
		<lastmod>2025-12-16T21:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/AI_Security_Champion_for_SAST.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-advances-software-supply-chain-security/</loc>
		<lastmod>2025-12-16T21:42:42+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/blog_sscs_launch_2x-scaled-e1745548480622.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/SSCS-blog-Figure-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/SSCS-blog-Figure-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/SSCS-blog-Figure-3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Secrets-Detection_nobg.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Repository-Health-Small.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-future-of-ai-in-devsecops-advanced-and-automated-security/</loc>
		<lastmod>2025-12-16T21:48:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Security-in-Vibe-Coding_3x-scaled-e1743739306370.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/securing-the-ai-development-lifecycle-from-code-generation-to-deployment/</loc>
		<lastmod>2025-12-16T21:49:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/DevSec_hero-scaled-e1743740393743.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/gene-kim-on-vibe-coding-and-why-devsecops-must-be-ready-for-whats-coming/</loc>
		<lastmod>2025-12-16T21:50:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/blog_gene_kim.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/whats-new-in-checkmarx-april-2023-platform-launch/</loc>
		<lastmod>2025-12-17T14:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/platform-launch-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/its-here-the-global-pulse-on-application-security-report/</loc>
		<lastmod>2025-12-17T14:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/global-pulse-blog-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-tech-partnership-program/</loc>
		<lastmod>2025-12-17T14:18:48+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/General-partner-program-announcement.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/your-new-teammate-doesnt-eat-pizza/</loc>
		<lastmod>2025-12-22T15:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Copy-of-Untitled-Blog-Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Screenshot-2025-12-17-at-14.24.55.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-agentic-future-of-appsec-measuring-impact-and-securing-the-ai-powered-sdlc/</loc>
		<lastmod>2025-12-28T06:06:23+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/image-4-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/confronting-insecure-shadow-ai-six-must-have-capabilities/</loc>
		<lastmod>2025-12-28T06:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Blog-Banner-pt-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-context-is-the-new-code-building-ai-resilient-appsec-from-the-ide/</loc>
		<lastmod>2025-12-28T06:14:20+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Blog-Banner-pt-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/genai-software-supply-chain-security-gap-why-traditional-appsec-cant-keep-up/</loc>
		<lastmod>2025-12-28T06:17:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Copy-of-Untitled-Blog-Banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-roi-of-agentic-ai-appsec/</loc>
		<lastmod>2025-12-29T18:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Copy-of-Blog-Banner-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/future-of-dast-why-ai-generated-code-demands-a-new-strategy/</loc>
		<lastmod>2025-12-29T18:24:37+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Blog-Banner-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-ai-code-generators-cant-secure-its-own-code-and-why-checkmarx-assist-can/</loc>
		<lastmod>2025-12-30T19:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/github_copilot.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-cost-of-ai-velocity-5-actions-dev-leaders-must-take-to-secure-their-codebase-from-ai-vulnerabilities/</loc>
		<lastmod>2025-12-30T19:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/blog_the_costs_of_ai_speed-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/idc-commentary-on-ai-assisted-development-is-a-wake-up-call-for-appsec-leaders/</loc>
		<lastmod>2026-01-11T09:32:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/checkmarx_blog_cover_AI_16x9.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/the-ai-inventory-gap-why-your-organization-has-no-idea-what-ai-assets-are-part-of-your-software-supply-chain/</loc>
		<lastmod>2026-01-15T10:07:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/checkmarx_ai_inventory_gap_16x9.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-agents-and-secure-software-engineering/</loc>
		<lastmod>2026-01-24T18:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/IDC-Commentary-Blog-v1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/3-financial-services-trends-and-how-they-affect-your-application-security/</loc>
		<lastmod>2026-01-24T19:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/04/AWS-blog-image-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-supply-chain-threat-intelligence-the-next-level-of-defense-for-open-source-security/</loc>
		<lastmod>2026-01-24T19:33:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/01/My-project-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/customer-spotlight-pismo-builds-strong-security-culture/</loc>
		<lastmod>2026-01-24T22:02:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/team.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/02/banner-home-1024x320-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/</loc>
		<lastmod>2026-01-24T22:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/thumbnail-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/image_14-1024x408-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/image_17-1024x671-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/automatic-execution-of-code-upon-package-download-on-python-package-manager/</loc>
		<lastmod>2026-01-26T14:34:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_python_automatic-execution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/carbon-990x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Group-2433-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Picture1-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/running-start-devsecops/</loc>
		<lastmod>2026-01-26T14:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2019/02/RunningStart-1024x513-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-open-source-supply-chain-under-assault-new-defenses-are-required/</loc>
		<lastmod>2026-01-26T15:36:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/MicrosoftTeams-image-11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-executive-guide-to-quantifying-agentic-appsec-roi/</loc>
		<lastmod>2026-01-26T15:56:40+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/Copy-of-Blog-Banner-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/reducing-friction-in-appsec-program-adoption-how-checkmarx-one-can-help/</loc>
		<lastmod>2026-01-26T16:45:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/blog_appsec.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/1-1024x448-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/2-1024x752-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/3-1024x569-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/4-1024x645-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/5-1024x447-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/7-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/8-1024x548-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/10-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/11-1024x513-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/12-1024x417-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/13-1024x645-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/when-it-comes-to-cloud-location-matters/</loc>
		<lastmod>2026-01-26T16:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Shutterstock_1945783771.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/goodbye-sdlc-hello-adlc-how-will-appsec-adapt/</loc>
		<lastmod>2026-01-26T18:51:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/check-up-jan-cover.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/appsec-adlc-vs-sdlc.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-query-builder-for-sast-now-generally-available/</loc>
		<lastmod>2026-02-02T10:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/Copy-of-Copy-of-Blog-Banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/stranger-things-happen-with-todays-software/</loc>
		<lastmod>2026-02-03T08:22:29+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/Upside-Down-Appsec-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cuteboi-detected-preparing-a-large-scale-crypto-mining-campaign-on-npm-users/</loc>
		<lastmod>2026-02-03T08:39:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_1-1024x700-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_3-1024x366-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_4-1024x384-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_5-1024x977-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/image_6-1024x898-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/find-and-prioritize-application-vulnerabilities-with-servicenow-and-checkmarx/</loc>
		<lastmod>2026-02-03T08:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/09/Service-Now-_-Checkmarx-Integration-blog_Brinqa-Announcement-blog-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/national-cybersecurity-strategy-game-on/</loc>
		<lastmod>2026-02-03T08:48:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/Public-Sector-Advocate-Intro-Post-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/software-supply-chain-security-leaders-collaborate-and-build-browser-extension-to-help-developers-choose-open-source/</loc>
		<lastmod>2026-02-03T08:51:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/09/Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-ceos-need-to-do-to-be-nist-800-218-ssdf-ready/</loc>
		<lastmod>2026-02-03T08:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/NIST-800-218-regulation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-you-need-to-know-about-nist-800-218-the-secure-software-development-framework/</loc>
		<lastmod>2026-02-03T08:58:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/Public-Sector-Advocate-Intro-Post-02.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/you-can-have-it-all-speed-security-introducing-our-new-sast-engine/</loc>
		<lastmod>2026-02-03T09:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/SAST-New-Engine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/dev-work-got-simpler-with-april25-checkmarx-update/</loc>
		<lastmod>2026-02-10T21:51:04+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Launch-Blog-DevEx-2.0_2x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/image-_2_.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/blog4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-5-hack-that-shook-the-tech-world/</loc>
		<lastmod>2026-02-10T21:54:45+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/30445-Checkmarx-Blog-Post-banner_flat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/malicious-open-source-packages-the-imminent-appsec-threat-for-which-most-enterprises-are-underprepared/</loc>
		<lastmod>2026-02-10T21:55:23+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-4-2025-11_55_04-AM.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/ChatGPT-Image-Nov-4-2025-12_23_21-PM-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/revolutionizing-sca-with-agentic-ai-how-checkmarx-developer-assist-transforms-open-source-security-within-the-ide/</loc>
		<lastmod>2026-02-10T21:58:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Untitled-design-11.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/Learn-more-about-Developer-Assist.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-checkmarx-defends-against-the-shai-hulud-second-coming-malicious-package-campaign/</loc>
		<lastmod>2026-02-10T21:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/image-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/multi-agent-networks-in-appsec-the-future-of-collaborative-autonomous-security/</loc>
		<lastmod>2026-02-11T08:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/multi-Agent-network-in-AppSec-v2_2x-1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-realtime-appsec-improves-developer-productivity/</loc>
		<lastmod>2026-02-11T08:06:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Shifting-AppSec-Left-leading-visual-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Shifting-AppSec-Left-diagram-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Blog-AI-Security-Coding-Assistant-screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Blog-ASPM-in-the-IDE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Blog-Pre-commit-framework-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Blog-Severity-and-State.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/Blog-MTTR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-code-needs-ai-security-why-claudes-announcement-signals-a-bigger-shift/</loc>
		<lastmod>2026-02-24T15:26:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/AI-Code-Needs-AI-Security-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/Untitled-design-22.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/reducing-noise-with-contextual-risk-scoring/</loc>
		<lastmod>2026-02-24T16:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/Blog-Banner-_2_.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/securing-code-no-one-actually-wrote-2/</loc>
		<lastmod>2026-02-24T16:39:22+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/Blog-Banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/confident-developers-are-the-new-security-risk/</loc>
		<lastmod>2026-03-02T11:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/Developer-confidence-is-a-security-risk.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-future-of-appsec-insights-from-development-and-security-professionals/</loc>
		<lastmod>2026-03-17T16:21:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/The-future-of-AppSec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-dast-for-the-ai-coding-era/</loc>
		<lastmod>2026-03-24T15:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/Blog-Banner-_3_.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/reachability-was-a-breakthrough-but-now-its-not-enough/</loc>
		<lastmod>2026-03-25T17:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/Blog-Banner-_4_.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/why-vulnerability-detection-doesnt-scale/</loc>
		<lastmod>2026-03-25T17:06:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/Photocentric-Work-from-Anywhere-Blog-Banner-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/rsac-2026-marked-a-turning-point-for-appsec-the-reason-agentic-security/</loc>
		<lastmod>2026-03-30T08:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/Blog-Banner-1-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/CX-RSAC-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/CX-RSAC-2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-security-update/</loc>
		<lastmod>2026-04-03T18:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/30445-Checkmarx-Blog-Post-banner_flat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/stop-manual-triaging-start-agentic-fixing/</loc>
		<lastmod>2026-04-07T06:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/Copy-of-Blog-Banner-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/bringing-ide-native-appsec-to-kiro-with-checkmarx-one-assist/</loc>
		<lastmod>2026-04-09T12:09:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/One-Assist.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/devsecops-what-devops-needs-to-be-when-it-grows-up/</loc>
		<lastmod>2026-04-10T15:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Web-page-End-The-Guesswork-blog-e1744343906169.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Images-for-the-blog-01-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Images-for-the-blog-02-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Images-for-the-blog-03-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/demystifying-infrastructure-as-code-security-a-technical-deep-dive/</loc>
		<lastmod>2026-04-10T16:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Iac.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/unifying-sast-and-dast-the-key-to-fostering-fearless-innovation/</loc>
		<lastmod>2026-04-10T16:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/SAST-and-Dast_Blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-appsec-managers-guide-to-understanding-the-hidden-threats-of-malicious-code-in-open-source-software/</loc>
		<lastmod>2026-04-10T18:37:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/cover_0122.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-roi-of-sca-reducing-technical-debt-and-enhancing-security/</loc>
		<lastmod>2026-04-10T19:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/cover_0122.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/security-in-vibe-coding/</loc>
		<lastmod>2026-04-13T18:56:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Security-in-Vibe-Coding_3x-scaled-e1743739306370.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/expanding-checkmarx-dast-capabilities-with-zap/</loc>
		<lastmod>2026-04-13T18:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/checkmarx_zap_blog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/sbom-how-to-create-one-using-checkmarx-sca/</loc>
		<lastmod>2026-04-13T20:23:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_1708950202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-new-north-korean-group-emerges-disrupting-the-open-source-ecosystem/</loc>
		<lastmod>2026-04-15T20:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/NK-New-Group.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/image-1024x801.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/make-better-decisions-with-checkmarx-one-img-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/image-3-1024x288.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/trojan-source-vulnerability-get-protection-with-checkmarx-sast/</loc>
		<lastmod>2026-04-15T20:57:31+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_1414311734.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-application-security-guide-to-claude-mythos/</loc>
		<lastmod>2026-04-19T06:26:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/Checkmarx-Application-Security-Guide-to-Claude-Mythos.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/securing-your-ai-supply-chain-your-ai-is-running-but-you-dont-know-what-its-doing/</loc>
		<lastmod>2026-04-19T08:39:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/Screenshot-2026-04-19-112542.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/some-vulnerabilities-dont-have-a-name/</loc>
		<lastmod>2026-04-21T15:49:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/Shutterstock_496099843.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/image1-1024x666-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/image2-1024x516-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/image3-1024x496-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-we-created-an-api-security-ctf/</loc>
		<lastmod>2026-04-21T16:05:45+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Untitled-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/image4-1024x821-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/image5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/image6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/image8-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-sca-now-supports-the-ruby-language/</loc>
		<lastmod>2026-04-21T16:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Shutterstock_2175572731.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/ruby-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/11/Ruby_On_Rails_Logo.svg-1024x387-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-approach-to-software-supply-chain-security/</loc>
		<lastmod>2026-04-21T16:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/Checkmarx-Approach-to-Software-Supply-Chain-Security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/guardrails-for-agentic-development/</loc>
		<lastmod>2026-04-23T04:42:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/ChatGPT-Image-Apr-21_-2026_-08_45_33-AM.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->