<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://staging.checkmarx.com/wp-content/plugins/wpseo-video/xml-video-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
	<url>
		<loc>https://staging.checkmarx.com/blog/github-repojacking-weakness-exploited-in-the-wild-by-attackers/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/xrafnrkKfEg</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/05/xrafnrkkfeg.jpg</video:thumbnail_loc>
			<video:duration>167</video:duration>
			<video:view_count>650</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[GitHub RepoJacking Weakness Exploited in the Wild by Attackers - Checkmarx.com]]></video:title>
			<video:publication_date>2022-05-27T18:12:12+00:00</video:publication_date>
			<video:description><![CDATA[A logical flaw in GitHub allows attackers to take control over thousands of repositories, enabling the poisoning of popular open-source packages. This flaw is yet to be fixed and the steps to exploit it were recently published, making it highly likely that we will see more of these in the near future.]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[article]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jossefharush/'>Jossef Harush</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cocoapods-subdomain-hijacked-this-is-how/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/Y4fHn6ozx-A</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2023/03/y4fhn6ozx-a.jpg</video:thumbnail_loc>
			<video:duration>77</video:duration>
			<video:view_count>249</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[CocoaPods Subdomain Hijacked: This is How - Checkmarx.com]]></video:title>
			<video:publication_date>2023-03-02T15:00:00+00:00</video:publication_date>
			<video:description><![CDATA[In a subdomain hijacking attack, the attacker can find forgotten settings on free hosting websites such as GitHub Pages, which are not mapped anymore. The weak validation grants attackers permission to use those subdomains.]]></video:description>
			<video:tag><![CDATA[Application Security Testing]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[article]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jossefharush/'>Jossef Harush</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacker-caught-hijacking-packages-using-multiple-techniques-to-steal-aws-credentials/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/Jsue3QoeXtE</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/05/jsue3qoexte.jpg</video:thumbnail_loc>
			<video:duration>205</video:duration>
			<video:view_count>400</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Attacker Caught Hijacking Packages Using Multiple Techniques to Steal AWS Credentials]]></video:title>
			<video:publication_date>2022-05-25T17:11:02+00:00</video:publication_date>
			<video:description><![CDATA[This recent incident is part of a growing trend of attacks in open-source packages. These attackers arent limited to one language, showing the need for a central repository, as we said in our previous blog post.]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[article]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jossefharush/'>Jossef Harush</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/this-new-supply-chain-attack-technique-can-trojanize-all-your-cli-commands/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/-GTOOrYniFE</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/gtoorynife.jpg</video:thumbnail_loc>
			<video:duration>78</video:duration>
			<video:view_count>270</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Command-Jacking: The New Supply Chain Attack Technique]]></video:title>
			<video:publication_date>2024-10-14T11:00:00+00:00</video:publication_date>
			<video:description><![CDATA[Malicious actors can exploit Python entry points in several ways to trick users into executing harmful code. We'll explore Command-Jacking.]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Attack Technique]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/yehudagelb/'>Yehuda Gelb</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/python-packages-leverage-github-to-deploy-fileless-malware/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/9jxtJAOyRTI</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2023/12/9jxtjaoyrti.jpg</video:thumbnail_loc>
			<video:duration>1782</video:duration>
			<video:view_count>536</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Python Packages Leverage GitHub to Deploy Fileless Malware]]></video:title>
			<video:publication_date>2023-12-22T12:00:00+00:00</video:publication_date>
			<video:description><![CDATA[The threat actors behind these packages deviated from conventional tactics, introducing a nuanced twist in their approach. The first notable tactic was the exploitation of GitHub, a platform synonymous with trust and reliability within the developer community, to disseminate their malicious code. The packages themselves were mere vessels; the actual malicious content was not embedded within them but distributed through them.]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Breaking News]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Python]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[Python Packages Leverage GitHub to Deploy Fileless Malware]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/yehudagelb/'>Yehuda Gelb</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-hidden-dangers-of-abandoned-digital-assets-in-open-source-ecosystems/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/Y4fHn6ozx-A</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/y4fhn6ozx-a.jpg</video:thumbnail_loc>
			<video:duration>77</video:duration>
			<video:view_count>251</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Dangers of Abandoned Digital Assets in Open-Source Ecosystems]]></video:title>
			<video:publication_date>2024-02-08T12:00:00+00:00</video:publication_date>
			<video:description><![CDATA[The digital ocean on which many of us including the world's largest corporations rely on, is filled with hidden dangers, particularly in the open-source ecosystem. One such peril that often does not get the attention it deserves is the threat posed by abandoned digital assets.]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[cybersecurity]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[Dangers of Abandoned Digital Assets in Open-Source]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/yehudagelb/'>Yehuda Gelb</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/all-you-need-to-know-about-spring-framework-vulnerabilities/</loc>
		<video:video>
			<video:title><![CDATA[All You Need to Know about Spring Framework Vulnerabilities]]></video:title>
			<video:publication_date>2022-03-31T19:08:15+00:00</video:publication_date>
			<video:description><![CDATA[On March 29th, 2022, two separate RCE (Remote Code Execution) vulnerabilities related to different Spring projects were published and discussed all over the internet. In addition, a third vulnerability in a Spring project was disclosed - this time a DoS (Denial of Services) vulnerability. There were also some rumors regarding an unconfirmed deserialization weakness in Spring Core, that could lead to an RCE.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/CVE-2022-22963.mov</video:content_loc>
			<video:duration>18</video:duration>
			<video:width>2708</video:width>
			<video:height>1468</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/MicrosoftTeams-image-14-1.png</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[article]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/alex/'>Alex Livshiz</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/amazon-quickly-fixed-a-vulnerability-in-ring-android-app-that-could-expose-users-camera-recordings/</loc>
		<video:video>
			<video:title><![CDATA[Amazon Quickly Fixed a Vulnerability in Ring Android App]]></video:title>
			<video:publication_date>2022-08-18T10:00:00+00:00</video:publication_date>
			<video:description><![CDATA[Checkmarx's researchers found that the Ring Android app could have allowed a malicious to expose their personal data]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/RingCam_v5_comp_5.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_Amazon.jpg</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[article]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/erezy/'>Erez Yalon</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/critical-xss-vulnerabilities-identified-on-gallup-com/</loc>
		<video:video>
			<video:title><![CDATA[XSS Vulnerabilities Identified on Gallup’s website]]></video:title>
			<video:publication_date>2024-09-10T11:05:35+00:00</video:publication_date>
			<video:description><![CDATA[Discover critical XSS vulnerabilities found on Gallup.com, how they impact security, and steps for protection. Learn more in our latest blog update.]]></video:description>
			<video:player_loc>https://player.vimeo.com/video/1007774943</video:player_loc>
			<video:duration>227</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/GullUp_Blog-scaled.webp</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Gallup Website XSS Vulnerabilities]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/checkmarx-security-research-team/'>Checkmarx Security Research Team</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/with-2fa-enabled-npm-package-lottie-player-taken-over-by-attackers/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/8z60oet__H4</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/8z60oet__h4.jpg</video:thumbnail_loc>
			<video:duration>10</video:duration>
			<video:view_count>55</video:view_count>
			<video:width>480</video:width>
			<video:height>360</video:height>
			<video:title><![CDATA[With 2FA Enabled: NPM Package lottie-player Taken Over by Attackers]]></video:title>
			<video:publication_date>2024-10-31T13:13:26+00:00</video:publication_date>
			<video:description><![CDATA[Malicious code by the Lottie-player found in the NPM package, Multifactor authentication - 2FA couldn't prevent the attack.]]></video:description>
			<video:tag><![CDATA[Checkmarx Security Research Team]]></video:tag>
			<video:tag><![CDATA[NPM Package Take-over Attack]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jossefharush/'>Jossef Harush</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-real-time-ide-scanning-more-secure-code-in-real-time/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/jTB3XccEtuU</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/jtb3xccetuu.jpg</video:thumbnail_loc>
			<video:duration>92</video:duration>
			<video:view_count>921</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Introducing Real Time IDE Scanning]]></video:title>
			<video:publication_date>2024-05-05T22:00:00+00:00</video:publication_date>
			<video:description><![CDATA[This is a plugin for Visual Studio Code, and it scans in milliseconds, providing instant responsiveness in the IDE and even can scan source code repositories. In internal tests, we scanned over 1 million lines of code in under 10 seconds  much faster than other developer-friendly solutions. ]]></video:description>
			<video:tag><![CDATA[AI]]></video:tag>
			<video:tag><![CDATA[AI Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[developer experience]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[IDE Scanning]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Introducing Real Time IDE Scanning – More Secure Code in Real Time]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-ai-query-builder-for-sast/</loc>
		<video:video>
			<video:title><![CDATA[AI Query Builder for SAST]]></video:title>
			<video:publication_date>2023-05-31T11:31:31+00:00</video:publication_date>
			<video:description><![CDATA[Explore how to use artificial intelligence to write custom queries with the new AI Query Builder for SAST.]]></video:description>
			<video:player_loc>https://player.vimeo.com/video/829704221</video:player_loc>
			<video:duration>18</video:duration>
			<video:width>426</video:width>
			<video:height>240</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/How-to-use-AI-to-write-custom-SAST-queries.jpg</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[awareness]]></video:tag>
			<video:tag><![CDATA[data exposure]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Vulnerability]]></video:tag>
			<video:tag><![CDATA[AI Query Builder for SAST]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/rsa-2025/</loc>
		<video:video>
			<video:title><![CDATA[RSA Conference 2025]]></video:title>
			<video:publication_date>2025-03-21T12:18:38+00:00</video:publication_date>
			<video:description><![CDATA[Join Checkmarx at RSA Conference 2025 at Booth #942. Book a meeting today! Meet the leaders, special swag, and more. Book your meeting!]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/Moblie_Hero_04_Clean.mp4</video:content_loc>
			<video:duration>4</video:duration>
			<video:width>822</video:width>
			<video:height>1462</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/RSA_LP_preview_image_3x-scaled.webp</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/mcarena/'>Dmitry Makarski</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/modernizing-appsec-the-shift-from-on-prem-sast-to-a-cloud-native-platform/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/feqKwUftMbM</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/feqkwuftmbm-1.jpg</video:thumbnail_loc>
			<video:duration>233</video:duration>
			<video:view_count>972</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Modernizing AppSec: The Shift from On-Prem SAST to a Cloud-Native Platform ]]></video:title>
			<video:publication_date>2025-05-26T12:17:02+00:00</video:publication_date>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[checkmarx one]]></video:tag>
			<video:tag><![CDATA[CxSAST]]></video:tag>
			<video:tag><![CDATA[SAST]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/ai-is-writing-your-code-whos-keeping-it-secure/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/jTB3XccEtuU</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/jtb3xccetuu.jpg</video:thumbnail_loc>
			<video:duration>92</video:duration>
			<video:view_count>925</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[2025 CISO Guide to Securing AI-Generated Code]]></video:title>
			<video:publication_date>2025-06-12T11:47:30+00:00</video:publication_date>
			<video:description><![CDATA[Learn how CISOs secure AI-generated code with real-time IDE scanning and governance. Discover Checkmarx One’s solutions for safe AI coding]]></video:description>
			<video:tag><![CDATA[AI-Generated Code]]></video:tag>
			<video:tag><![CDATA[AI code]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/agentic-ai-vulnerability-prevention/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/2pli6kNcdMw</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/2pli6kncdmw.jpg</video:thumbnail_loc>
			<video:duration>220</video:duration>
			<video:view_count>765</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Stop Chasing Vulnerabilities - Let Agentic AI Prevent Them]]></video:title>
			<video:publication_date>2025-11-17T22:13:27+00:00</video:publication_date>
			<video:description><![CDATA[Developers use Agentic AI, for in-context guidance and automated remediation to prevent vulnerabilities before they reach production.]]></video:description>
			<video:tag><![CDATA[Agentic AI]]></video:tag>
			<video:tag><![CDATA[Autonomous Remediation]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[SAST]]></video:tag>
			<video:tag><![CDATA[Vulnerability Remediation]]></video:tag>
			<video:tag><![CDATA[Agentic AI vulnerability prevention]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/introducing-ai-security-champion-with-auto-remediation-for-sast/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/tmZN7k0cdPM</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/tmzn7k0cdpm.jpg</video:thumbnail_loc>
			<video:duration>102</video:duration>
			<video:view_count>1134</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Introducing AI Security Champion with Auto-Remediation for SAST]]></video:title>
			<video:publication_date>2024-05-05T22:00:00+00:00</video:publication_date>
			<video:description><![CDATA[Checkmarx's AI Security Champion with auto-remediation for SAST, provides guidance and a suggested fix for identified vulnerabilities]]></video:description>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Codebashing]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Introducing AI Security Champion with Auto-Remediation for SAST]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/avihein/'>Avi Hein</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/</loc>
		<video:video>
			<video:title><![CDATA[LofyGang - Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year - Checkmarx.com]]></video:title>
			<video:publication_date>2022-10-07T13:00:00+00:00</video:publication_date>
			<video:description><![CDATA[The Checkmarx Labs supply chain security research team finds attack group LofyGang linked to several software supply chain incidents reported this year by Sonatype, Jfrog, and Securelist.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/blog_video_1_compressed-480.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/10/thumbnail-1.png</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Article]]></video:tag>
			<video:tag><![CDATA[Awareness]]></video:tag>
			<video:tag><![CDATA[Checkmarx Application Security Platform]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jossefharush/'>Jossef Harush</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-we-created-an-api-security-ctf/</loc>
		<video:video>
			<video:title><![CDATA[How We Created an API Security CTF - Checkmarx.com]]></video:title>
			<video:publication_date>2022-09-28T18:56:59+00:00</video:publication_date>
			<video:description><![CDATA[Check out this summary of Checkmarx CTF event hosted at DefCon30 and an overview on c{api}tal: A built-to-be-vulnerable API application based on the OWASP Top 10 API risks.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/video1-1.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/09/Untitled-1.png</video:thumbnail_loc>
			<video:tag><![CDATA[API Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Article]]></video:tag>
			<video:tag><![CDATA[Awareness]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/ravidmazon/'>Ravid Mazon</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/early-access-agentic-ai/</loc>
		<video:video>
			<video:title><![CDATA[Early Access: Checkmarx Agentic AI - Checkmarx]]></video:title>
			<video:publication_date>2025-04-23T07:33:27+00:00</video:publication_date>
			<video:description><![CDATA[Register for early access to AI-powered, IDE-native AppSec agents shaping the future of enterprise security, from identification and analysis, to remediation of security vulnerabilities.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Alpha-Test-–-HEVC.mov</video:content_loc>
			<video:duration>3</video:duration>
			<video:width>1600</video:width>
			<video:height>1600</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com</video:thumbnail_loc>
			<video:tag><![CDATA[Checkmarx Agentic AI]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/mcarena/'>Dmitry Makarski</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cuteboi-detected-preparing-a-large-scale-crypto-mining-campaign-on-npm-users/</loc>
		<video:video>
			<video:title><![CDATA[CuteBoi Detected Preparing a Large-Scale Crypto Mining Campaign on NPM Users]]></video:title>
			<video:publication_date>2022-07-06T11:00:00+00:00</video:publication_date>
			<video:description><![CDATA[Checkmarx SCS team detected over 1200 npm packages released to the registry by over a thousand different user accounts. This was done using automation which includes the ability to pass NPM 2FA challenge. This cluster of packages seems to be a part of an attacker experimenting at this point.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/main.720.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2022/07/thumbnail.png</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[Article]]></video:tag>
			<video:tag><![CDATA[Awareness]]></video:tag>
			<video:tag><![CDATA[Developer]]></video:tag>
			<video:tag><![CDATA[English]]></video:tag>
			<video:tag><![CDATA[Leadership]]></video:tag>
			<video:tag><![CDATA[Open-Source Security]]></video:tag>
			<video:tag><![CDATA[SSCS]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/aviadgershon/'>Aviad Gershon</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/ai-llm-tools-in-application-security/revolutionizing-sca-with-agentic-ai-how-checkmarx-developer-assist-transforms-open-source-security-within-the-ide/</loc>
		<video:video>
			<video:player_loc>https://www.youtube.com/embed/PtE_iQ1V0Kc</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/pte_iq1v0kc.jpg</video:thumbnail_loc>
			<video:duration>257</video:duration>
			<video:view_count>649</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:title><![CDATA[Revolutionizing SCA With Agentic AI: How Checkmarx Developer Assist Transforms Open-Source Security Within the IDE ]]></video:title>
			<video:publication_date>2025-11-19T14:22:06+00:00</video:publication_date>
			<video:description><![CDATA[Discover how to use agentic AI to deliver real-time SCA inside the IDE—catching malicious packages instantly and automating safe fixes]]></video:description>
			<video:tag><![CDATA[developer assist]]></video:tag>
			<video:tag><![CDATA[SCA]]></video:tag>
			<video:tag><![CDATA[suspicious packages]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/checkmarx-team/'>Checkmarx Team</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/hugs-from-strangers-ai-model-confusion-supply-chain-attack/</loc>
		<video:video>
			<video:title><![CDATA[AI Model Confusion: An LLM/AI Model Supply Chain Attack - Checkmarx]]></video:title>
			<video:publication_date>2026-01-06T05:00:00+00:00</video:publication_date>
			<video:description><![CDATA[This document copyright Checkmarx, all rights reserved. Recently, our team conducted an in-depth analysis of supply chain security with a focus on the AI ecosystem. During this investigation, we uncovered a new supply-chain attack vector that can compromise code that insecurely loads local models. T]]></video:description>
			<video:content_loc>/wp-content/uploads/2026/01/ai-model_confusion_mini_demo-redacted.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/ai-model_confusion-feature.webp</video:thumbnail_loc>
			<video:tag><![CDATA[model confusion]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/ori-ron/'>Ori Ron</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/exploiting-markdown-injection-in-ai-agents-microsoft-copilot-chat-and-google-gemini/</loc>
		<video:video>
			<video:title><![CDATA[Exploiting Markdown Injection in AI agents: Microsoft Copilot Chat and Google Gemini - Checkmarx]]></video:title>
			<video:publication_date>2025-12-04T16:30:00+00:00</video:publication_date>
			<video:description><![CDATA[This document copyright Checkmarx, all rights reserved. Checkmarx Zero has been exploring AI and agent security, with an increased emphasis on this topic following our discovery of the novel Lies-in-the-Loop attack (LITL) which bypasses “Human-in-the-Loop” (HITL) controls mean to prevent AI agents f]]></video:description>
			<video:content_loc>/wp-content/uploads/2025/12/cxzero-ms-copilot-md-inject-full.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature_copilot-gemini-markdown-injection-in-ai-agents.webp</video:thumbnail_loc>
			<video:tag><![CDATA[markdown injection in ai agents]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/ori-ron/'>Ori Ron</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/npm-malware-alert-lanyer640-mcp-runcommand-server-with-reverse-shell/</loc>
		<video:video>
			<video:title><![CDATA[NPM Malware Alert: `@lanyer640/mcp-runcommand-server` with Reverse Shell - Checkmarx]]></video:title>
			<video:publication_date>2025-10-02T20:32:00+00:00</video:publication_date>
			<video:description><![CDATA[Malicious NPM package pretending to be a useful AI tool (an MCP server). Here's what to watch for, how to mitigate the risk, and how to find out if you're impacted.]]></video:description>
			<video:content_loc>/wp-content/uploads/2025/10/cxzero_mcp-runcommand-server_poc.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/czzero-feature_lanyer640-npm-malware.webp</video:thumbnail_loc>
			<video:tag><![CDATA[malicious npm package]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/darren-meyer/'>Darren Meyer</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/bypassing-ai-agent-defenses-with-lies-in-the-loop/</loc>
		<video:video>
			<video:title><![CDATA[Bypassing AI Agent Defenses With Lies-In-The-Loop - Checkmarx]]></video:title>
			<video:publication_date>2025-09-15T14:00:48+00:00</video:publication_date>
			<video:description><![CDATA[This document copyright Checkmarx, all rights reserved. Checkmarx Zero has identified a new type of attack against AI agents that use a “human-in-the-loop” safety net to try to avoid high-risk behaviors: we’re calling it “lies-in-the-loop” (LITL). It lets us fairly easily trick users into giving per]]></video:description>
			<video:content_loc>/wp-content/uploads/2025/09/CC_Clip.mp4</video:content_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/cxzero-feature-litl_.webp</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/ori-ron/'>Ori Ron</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/bringing-ide-native-appsec-to-kiro-with-checkmarx-one-assist/</loc>
		<video:video>
			<video:title><![CDATA[Bringing IDE-Native AppSec to Kiro with Checkmarx Developer Assist]]></video:title>
			<video:publication_date>2025-12-23T10:14:24+00:00</video:publication_date>
			<video:description><![CDATA[As Kiro accelerates development, IDE-native security becomes critical. See how Checkmarx Developer Assist brings AppSec directly into Kiro.]]></video:description>
			<video:player_loc>https://player.vimeo.com/video/1150397529</video:player_loc>
			<video:duration>468</video:duration>
			<video:width>426</video:width>
			<video:height>240</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/One-Assist.webp</video:thumbnail_loc>
			<video:tag><![CDATA[AWS]]></video:tag>
			<video:tag><![CDATA[Checkmarx Developer Assist]]></video:tag>
			<video:tag><![CDATA[developer assist]]></video:tag>
			<video:tag><![CDATA[developer experience]]></video:tag>
			<video:tag><![CDATA[IDE Scanning]]></video:tag>
			<video:tag><![CDATA[Kiro]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/steveboone/'>Steve Boone</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/bypassing-claude-code-how-easy-is-it-to-trick-an-ai-security-reviewer/</loc>
		<video:video>
			<video:title><![CDATA[Bypassing Claude Code: How Easy Is It to Trick an AI Security Reviewer? - Checkmarx]]></video:title>
			<video:publication_date>2025-09-04T19:56:00+00:00</video:publication_date>
			<video:description><![CDATA[AI Security Reviewer can easily be tricked into ignoring real vulnerabilities or malicious code. Use case Claude Code]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/NO-CLAUDE-NO-STAHP.mp4</video:content_loc>
			<video:duration>23</video:duration>
			<video:width>1794</video:width>
			<video:height>958</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/feature_evaluating_claude_code.webp</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/darren-meyer/'>Darren Meyer</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/checkmarx-application-security-guide-to-claude-mythos/</loc>
		<video:video>
			<video:title><![CDATA[Checkmarx Application Security Guide to Claude Mythos]]></video:title>
			<video:publication_date>2026-04-13T20:52:30+00:00</video:publication_date>
			<video:description><![CDATA[Claude Mythos highlights a new era of dynamic, AI-driven applications, and the growing security blind spots they create.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/B9AJK5LbEds</video:player_loc>
			<video:thumbnail_loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/b9ajk5lbeds.jpg</video:thumbnail_loc>
			<video:duration>860</video:duration>
			<video:view_count>2186</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Agentic AI]]></video:tag>
			<video:tag><![CDATA[Claude Mythos]]></video:tag>
			<video:tag><![CDATA[security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/jonathan-rende/'>Jonathan Rende</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/</loc>
		<video:video>
			<video:title><![CDATA[Unified Agentic AppSec Testing, Monitoring &amp; Remediation Platform | Checkmarx]]></video:title>
			<video:publication_date>2025-09-12T14:19:31+00:00</video:publication_date>
			<video:description><![CDATA[Agentic AppSec platform for code to cloud application security testing - SAST, SCA, ASPM. See Checkmarx One; get a demo.]]></video:description>
			<video:content_loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/Deep-Blue-Sky-Clouds-Timelapse-Free-Footage-Ful.mp4</video:content_loc>
			<video:duration>32</video:duration>
			<video:width>1280</video:width>
			<video:height>720</video:height>
			<video:thumbnail_loc>https://staging.checkmarx.com</video:thumbnail_loc>
			<video:tag><![CDATA[Enterprise Application security testing platform]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://staging.checkmarx.com/author/edward_tiutiunnyk/'>Edward Tiutiunnyk</video:uploader>
		</video:video>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->