<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//staging.checkmarx.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://staging.checkmarx.com/blog/malicious-npm-package-exploits-react-native-documentation-example/</loc>
		<lastmod>2025-01-03T08:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/thumbnail-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/react-github-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Group-11525932.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Group-3061.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Group-11525879.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/most-striking-events-of-november-2024-in-supply-chain-security/</loc>
		<lastmod>2025-01-03T08:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/Frame-11527658.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/XML-RPC-Attack-Flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/react-native-documentation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/malicious-npm-package-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/12/Pypi-verified-details.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/this-new-supply-chain-attack-technique-can-trojanize-all-your-cli-commands/</loc>
		<lastmod>2025-01-03T08:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-Feature-Photo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/ComandJacking-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/october-2024-in-software-supply-chain-security/</loc>
		<lastmod>2025-01-03T08:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Medium-Thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Crypto-Stealing-Code-Lurking-in-Python-Package-Dependencies-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Cryptocurrency-Enthusiasts-Targeted-in-Multi-Vector-Supply-Chain-Attack-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Ethereum-Smart-Contracts-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/alert-cdn-service-polyfill-io-used-by-100k-websites-provided-malicious-code-in-responses/</loc>
		<lastmod>2025-01-03T08:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/06/PolyFill.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/malicious-python-packages-reveal-extensive-cybercriminal-operation-based-in-iraq/</loc>
		<lastmod>2025-01-03T08:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/PythonPackageIraq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/malicious-python-package-targets-macos-developers-to-access-their-gcp-accounts/</loc>
		<lastmod>2025-01-03T08:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/BLOGIMAGEMACOSpng.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/1_AttackFlow_GoogleCredentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/2_code_GoogleCredentials.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/3_CEO_GoogleCredentials.png.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/4_Perplexity_GoogleCredentials.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/crypto-stealing-code-lurking-in-python-package-dependencies/</loc>
		<lastmod>2025-01-03T08:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Thumbnail-Option-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Crypto-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Crypto-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Crypto-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Crypto-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure/</loc>
		<lastmod>2025-01-03T08:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/Python-Blog-Image-1024x576-1-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/9a6ad728-10c1-432a-b578-11e04e6ac273-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/good-domain-vs-bad-domain-V2-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/7955c6dc-9bed-473b-b7a8-9013162c604f-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/Discord-channel-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/bro-what-2-scaled-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/complainig-that-malware-is-down-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/attack-flow-of-malicious-package-scaled-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/1_-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/3-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/4-1-1-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/backdoor-discovered-in-xz-the-most-advanced-supply-chain-attack-known-to-date/</loc>
		<lastmod>2025-01-03T08:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/04/xz-picture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/github-repos-used-for-distributing-malware/</loc>
		<lastmod>2025-01-03T08:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/GitHub3424.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/</loc>
		<lastmod>2025-01-03T08:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/04/OSS-SSC-blog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/llama-drama-critical-vulnerability-cve-2024-34359-threatening-your-software-supply-chain/</loc>
		<lastmod>2025-01-03T08:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/05/llamadrama.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/when-everything-goes-wrong-npm-dependency-hell-campaign-2024-edition/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/MicrosoftTeams-image-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/npm-account-takeover-results-in-crypto-supply-chain-attack/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/MicrosoftTeams-image-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/when-the-hunter-becomes-the-hunted/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/01/SAST-and-Dast_Blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/navigating-the-rising-tide-of-ci-cd-vulnerabilities-the-jenkins-and-teamcity-case-studies/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/CI_CD_blog1-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/python-packages-leverage-github-to-deploy-fileless-malware/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/SCS_vision_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-hidden-dangers-of-abandoned-digital-assets-in-open-source-ecosystems/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/TheHiddenDangersofAbandonedAssetsinOpenSource.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/tornado-cash-theft-uncovered-malicious-code-drains-funds-for-months/</loc>
		<lastmod>2025-01-03T08:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/Tornado-Cash-Theft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-hidden-supply-chain-risks-in-open-source-ai-models/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/AI_vision_blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/malicious-ai-sample-code-GitHub.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-evolutionary-tale-of-a-persistent-python-threat/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/Version_2.0_blog_banner2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/users-of-telegram-aws-and-alibaba-cloud-targeted-in-latest-supply-chain-attack/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/the-mosaic-of-2023s-software-supply-chain-threats/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/Version_2.0_blog_banner2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/python-obfuscation-traps/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/ASPM_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacker-hidden-in-plain-sight-for-nearly-six-months-targeting-python-developers/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/10/SCS_vision_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/surprise-when-dependabot-contributes-malicious-code/</loc>
		<lastmod>2025-01-03T08:36:13+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Case_study.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/an-ongoing-open-source-attack-reveals-roots-dating-back-to-2021/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Case_study.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/threat-actor-continues-to-plague-the-open-source-ecosystem-with-sophisticated-info-stealing-malware/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/APMA-Blog-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-deep-dive-into-70-layers-of-obfuscated-info-stealer-malware/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Case_study.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attacker-unleashes-stealthy-crypto-mining-via-malicious-python-package/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/06/AWS-S3-Bucket-Security-Research-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/hijacking-s3-buckets-new-attack-technique-exploited-in-the-wild-by-supply-chain-attackers/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/06/AWS-S3-Bucket-Security-Research-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/</loc>
		<lastmod>2025-01-03T08:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/MicrosoftTeams-image-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/amazon-confirmed-and-fixed-a-high-severity-vulnerability-of-broken-authentication-in-amazon-photos-android-app/</loc>
		<lastmod>2025-01-03T08:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/06/Shutterstock_1702888909.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/amazon-quickly-fixed-a-vulnerability-in-ring-android-app-that-could-expose-users-camera-recordings/</loc>
		<lastmod>2025-01-03T08:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Blog_Amazon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Picture1-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Picture2-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/08/Picture3-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/springshell-remote-code-execution-via-spring-web/</loc>
		<lastmod>2025-01-03T08:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/MicrosoftTeams-image-14-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/new-protestware-found-lurking-in-highly-popular-npm-package/</loc>
		<lastmod>2025-01-03T08:36:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/thumbnail-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/zenly-fixes-user-data-exposure-and-account-takeover-risks/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/02/Twitter-%E2%80%93-1024x512-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cve-2021-44832-apache-log4j-2-17-0-arbitrary-code-execution-via-jdbcappender-datasource-element/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/Blog-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/apache-log4j-remote-code-execution-cve-2021-44228/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/shutterstock_1645398727.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/apache-log4j-rce-variants-and-updates/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/log4j-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/recently-discovered-supply-chain-worm/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/12/supply-chain-worm-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/webhook-party-malicious-packages-caught-exfiltrating-data-via-legit-webhook-services/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/blog-npm-packages-depconf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/protestware-politics-and-open-source-software/</loc>
		<lastmod>2025-01-03T08:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/thumbnail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/Group-8-1-1024x748-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/protestware-1024x386-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/Group-7-941x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/chainalert-1024x576-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cve-2021-37794-xss-to-one-click-rce-in-filebrowser/</loc>
		<lastmod>2025-01-03T08:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/09/shutterstock_2019534269.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/uaparser-js-attack-preparations/</loc>
		<lastmod>2025-01-03T08:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/10/shutterstock_1937084650-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/attackers-write-bugs-as-well/</loc>
		<lastmod>2025-01-03T08:36:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_2025558809.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/</loc>
		<lastmod>2025-01-03T08:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2020/11/Website-Unomi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2020/11/Unomi-1.1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2020/11/Unomi-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/npm-command-confusion/</loc>
		<lastmod>2025-01-23T09:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/Frame-11527659.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/he-infinite-loop-in-java-collections/</loc>
		<lastmod>2025-01-23T13:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/Blog_skibidijava.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/01/image-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/falling-stars/</loc>
		<lastmod>2025-01-27T08:49:46+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/falling_stars_blog_3x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/GO-package-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/packigist-package-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/swift-package-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/npm-package-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/meta-cpan-package-repo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Pypi-verified-details.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/critical-xss-vulnerabilities-identified-on-gallup-com/</loc>
		<lastmod>2025-01-27T08:51:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/GullUp_Blog-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/Screenshot-2024-09-09-at-12.49.47%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/Screenshot-2024-09-09-at-12.52.54%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/09/Seal_of_approval_logo-02.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/with-2fa-enabled-npm-package-lottie-player-taken-over-by-attackers/</loc>
		<lastmod>2025-01-27T08:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/thumbnail-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/cryptocurrency-enthusiasts-targeted-in-multi-vector-supply-chain-attack/</loc>
		<lastmod>2025-01-27T08:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/scs_cryptocurrency_enthusiasts_targeted_in_multi_vector_supply_chain_attack-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/init.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/checking-os.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/fake-site.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/second-stage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Gui.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Slide-16_9-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/telegram-attacker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/stackexchange-abused-to-spread-malicious-python-package-that-drains-victims-crypto-wallets/</loc>
		<lastmod>2025-01-27T09:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/FeaturePhotoBlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo1_BlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo2_BlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo3_BlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo4_BlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo5_BlogSPL.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo6_BlogSPL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/Photo7_BlogSPL.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/understanding-vulnerability-hunting-and-its-challenges/</loc>
		<lastmod>2025-02-04T14:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/02/Blog-Image-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/compromised-github-actions-leading-to-credential-leaks/</loc>
		<lastmod>2025-04-15T13:41:29+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/GitHub-Vuln1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/free-hugs-what-to-be-wary-of-in-hugging-face-part-2/</loc>
		<lastmod>2025-05-12T20:56:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Huggin-Face-02-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Pickle.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/codesnippet1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/url-pic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/codesnippet2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/textsnippet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/codesnippet3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/codesnippet4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/code5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/free-hugs-what-to-be-wary-of-in-hugging-face-part-3/</loc>
		<lastmod>2025-05-12T20:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Huggin-Face-03-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/free-hugs-what-to-be-wary-of-in-hugging-face-part-4/</loc>
		<lastmod>2025-05-12T20:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Huggin-Face-04-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/pep770-sboms-in-python-reality-but-not-risk-free/</loc>
		<lastmod>2025-05-26T09:39:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/feature-python_pep770.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/pep_process_flow_PEP1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/bentoml-rce-fewer-affected-versions-cve-2025-27520/</loc>
		<lastmod>2025-05-26T09:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/04/Critical-RCE-in-BentoML-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/critical-cve-2025-29927-research-nextjs-middleware-authorization-bypass/</loc>
		<lastmod>2025-05-27T09:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/Next.sj_-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/</loc>
		<lastmod>2025-05-28T14:50:19+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/python-supply-chain-fuzz.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/f1-env_var_access.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/f2-task_scheduler.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/f3-process_detection.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/05/threat_intel_output.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-07-08/</loc>
		<lastmod>2025-07-08T06:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/vscode-fake-pub-validator.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-07-15/</loc>
		<lastmod>2025-07-15T06:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/echoleak-cve-2025-32711-show-us-that-ai-security-is-challenging/</loc>
		<lastmod>2025-08-27T22:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/Echoleak-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/06/Echoleak-attack-flow-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/pypi-is-under-attack-project-creation-and-user-registration-suspended/</loc>
		<lastmod>2025-11-10T10:29:54+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/03/DALL%C2%B7E-2024-03-28-13.10.24-An-artistic-representation-of-the-PyPI-ecosystem-exploding-designed-as-a-thumbnail-with-a-19_9-aspect-ratio-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/dozens-of-machines-infected-year-long-npm-supply-chain-attack-combines-crypto-mining-and-data-theft/</loc>
		<lastmod>2025-11-13T13:52:53+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/npm-package.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/obfuscated-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Attack-Flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/system-gather.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/downloading-crypto-minor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/wallet-data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Miners.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/checking-for-monitoring-processes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/checking-for-inactivity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Persistence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/daily-task.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/data-Collection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/dropbox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/file-io.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-new-type-of-supply-chain-attack-could-put-popular-admin-tools-at-risk/</loc>
		<lastmod>2025-11-13T18:21:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2021/11/shutterstock_417465832.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/free-hugs-what-to-be-wary-of-in-hugging-face-part-1/</loc>
		<lastmod>2026-01-05T17:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Huggin-Face-01-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/first-known-targeted-oss-supply-chain-attacks-against-the-banking-sector/</loc>
		<lastmod>2026-01-26T14:36:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/07/MicrosoftTeams-image-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/pwn3d-abusing-3d-models-for-code-execution/</loc>
		<lastmod>2026-02-02T07:26:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/code_injection_vulnerability_cx_zero_2x-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/2_code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/3_code.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/4_code.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/5_code.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/6_cura_calc.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/7_commit.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/10/Seal_of_approval_logo-002.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/solidity-devs-targeted-again-malicious-vs-code-extension-drops-screenconnect-based-remote-access-trojan-rat/</loc>
		<lastmod>2026-02-02T09:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/2026-01_cxzero_feature_-_solidity_devs_targeted_vscode_screenconnect_rat_-_silva_miranda.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/2026-01_cxzero_-_solidity_devs_targeted_vscode_screenconnect_rat_-_silva_miranda_image1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/2026-01_cxzero_-_solidity_devs_targeted_vscode_screenconnect_rat_-_silva_miranda_image2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-11-feb-2026/</loc>
		<lastmod>2026-02-17T17:06:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-feature_2026-02-11_last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-26-february-2026/</loc>
		<lastmod>2026-02-27T18:37:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-feature_2026-02-26_last-week-in-appsec.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/tryai-claude-code-trust-dialog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/protecting-yourself-against-malicious-open-source-packages/</loc>
		<lastmod>2026-02-27T18:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-feature_protect-malicious-packages.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/proxy-before-after.drawio.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/proxy-policy-block.drawio.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-29-january-2026/</loc>
		<lastmod>2026-02-27T18:37:51+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/cxzero-feature_lwias-2026-01-29.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-15-january-2026/</loc>
		<lastmod>2026-02-27T18:38:02+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/cxzero-feature_2026-01-15_last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-08-january-2026/</loc>
		<lastmod>2026-02-27T18:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/cxzero-2026-01-08_last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/hugs-from-strangers-ai-model-confusion-supply-chain-attack/</loc>
		<lastmod>2026-02-27T18:38:23+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/ai-model_confusion-feature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/01/ai-model_confusion-figure1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/2025-was-quietly-good-for-application-security/</loc>
		<lastmod>2026-02-27T18:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature_2025-quietly-good-unicorn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/turning-ai-safeguards-into-weapons-with-hitl-dialog-forging/</loc>
		<lastmod>2026-02-27T18:38:44+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_feature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image2_anim.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image6_anim.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image7_anim.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image8.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image9.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_hitl-dialog-forging_image10.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/cybersecurity-ai-agent-is-vulnerable-to-command-injection-cve-2025-67511/</loc>
		<lastmod>2026-02-27T18:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature_cyberseurity-ai-command-injection.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/inside-shai-huluds-maw-how-the-npm-worm-exploits-and-propagates/</loc>
		<lastmod>2026-02-27T18:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_feature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image6.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image7.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image8.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image9.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image10.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image11.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image12.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image13.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image14.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image15.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-blog_shaihulud-technical-review_image16.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/taking-down-more-malicious-vscode-extensions-in-the-prettier-campaign/</loc>
		<lastmod>2026-02-27T18:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature_new-malicious-vscode-extensions-2025-12-05.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/react2shell-cve-2025-55182-deserialization-to-remote-code-execution-in-react-and-next-js/</loc>
		<lastmod>2026-02-27T18:39:26+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature-react2shell.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/exploiting-markdown-injection-in-ai-agents-microsoft-copilot-chat-and-google-gemini/</loc>
		<lastmod>2026-02-27T18:39:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-feature_copilot-gemini-markdown-injection-in-ai-agents.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-for-02-december-2025/</loc>
		<lastmod>2026-02-27T18:39:45+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/12/cxzero-lwais_2025-12-02-feature-last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/11-emerging-ai-security-risks-with-mcp-model-context-protocol/</loc>
		<lastmod>2026-02-27T18:39:55+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-feature_mcp-11-top-risks-ai-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/mcp-diagram-1.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/mcp-diagram-2.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/shai-huluds-second-coming-npm-malware-attack-evolved/</loc>
		<lastmod>2026-02-27T18:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-blog-feature_shai-hulud-second-coming-npm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/checkmarx-zero-takes-down-malicious-prettier-alternative-found-in-vscode-marketplace/</loc>
		<lastmod>2026-02-27T18:40:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-feature_malicious-vscode-extension_prettier-plus.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/haproxy-mjson-supply-chain-dos-vuln/</loc>
		<lastmod>2026-02-27T18:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-feature_haproxy-mjson-json-dos-vuln.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-11-18/</loc>
		<lastmod>2026-02-27T18:40:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-feature_last-week-in-appsec_2025-11-18.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-11-11/</loc>
		<lastmod>2026-02-27T18:40:56+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero-feature-lwias_2025-11-11.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-11-04/</loc>
		<lastmod>2026-02-27T18:41:06+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzero_lwias-2025-11-04.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-10-28/</loc>
		<lastmod>2026-02-27T18:41:16+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/cxzero-feature_last-week-in-appsec_2025-10-28.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-10-21/</loc>
		<lastmod>2026-02-27T18:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/cxzero-feature_2025-10-21_last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-10-14/</loc>
		<lastmod>2026-02-27T18:41:37+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/cxzero-feature_lwias-2025-10-14.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-10-07/</loc>
		<lastmod>2026-02-27T18:41:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/cxzero-feature_lwias-2025-10-07.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/npm-malware-alert-lanyer640-mcp-runcommand-server-with-reverse-shell/</loc>
		<lastmod>2026-02-27T18:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/10/czzero-feature_lanyer640-npm-malware.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-09-30/</loc>
		<lastmod>2026-02-27T18:42:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/zero-feature_lwias_gomail-and-rancher.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/preparing-for-the-post-quantum-cryptograhy-era/</loc>
		<lastmod>2026-02-27T18:42:18+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/blog-pqc-feeature-image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-09-23/</loc>
		<lastmod>2026-02-27T18:42:27+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/feature_lwias_2025-09-23.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/npm-hit-by-shai-hulud-the-self-replicating-supply-chain-attack/</loc>
		<lastmod>2026-02-27T18:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/zero-shai-hulud.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-09-09/</loc>
		<lastmod>2026-02-27T18:42:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/chalk-and-17-other-npm-packages-compromised-in-supply-chain-attack/</loc>
		<lastmod>2026-02-27T18:43:07+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/zero-feature_npm-chalk-feature.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-09-02/</loc>
		<lastmod>2026-02-27T18:43:27+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-08-26/</loc>
		<lastmod>2026-02-27T18:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/cipher-base_illustration-hat.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-08-19/</loc>
		<lastmod>2026-02-27T18:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-08-12/</loc>
		<lastmod>2026-02-27T18:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/chatgpt5-system-prompt-leak-e1761482812289.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/cisa_pledge_cve_support.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/npm-stylus-outage-review-2025-07/</loc>
		<lastmod>2026-02-27T18:44:17+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/npm-stylus-fence.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-2025-07-29/</loc>
		<lastmod>2026-02-27T18:44:28+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/last-week-in-appsec-22-july-2025/</loc>
		<lastmod>2026-02-27T18:44:38+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/security_news-cx_green-2005-06.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/supply-chain-phishing-campaign-drops-more-malware-into-npm-got-fetch-5-1/</loc>
		<lastmod>2026-02-27T18:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/Supply-Chain-Phishing-Campaign-Drops-More-Malware-Into-NPM_-got_fetch-5.1-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/fig1_got-fetch_npm_page.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/fig2_got-fetch_npnjs-com_domain_history.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/07/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/glass-sandbox-complexity-of-python-sandboxing/</loc>
		<lastmod>2026-02-27T18:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/03/sandbox-scaled.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/unearned-confidence-ai-security-reviewers-dont-really-get-it/</loc>
		<lastmod>2026-03-05T14:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/cxzero-feature_unearned-confidence-ai-security-reviewers.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-105835.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-110139.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-110314.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-110408.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-110438.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-111140.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-111338.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260224-111435.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/ai-fights-and-more-attacks-on-dev-infrastructure-last-week-in-appsec-for-4-march-2026/</loc>
		<lastmod>2026-03-06T08:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/cxzero-feature_2026-03-05_last-week-in-appsec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/json-web-tokens-security/</loc>
		<lastmod>2026-03-17T16:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/JWT_blog-banner-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/07/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-we-were-able-to-infiltrate-attacker-telegram-bots/</loc>
		<lastmod>2026-03-24T16:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/SAST-and-Dast_Blog.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/02/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/glassworm-targets-developer-ides-again-hiding-staged-malware-behind-runtime-rebuilt-loaders/</loc>
		<lastmod>2026-04-01T14:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/cxzero-feature_glassworm-solana-dynamic-ide-malware-malicious.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/same-origin-same-tricks-bypassing-n8ns-csp-sandbox-cve-2026-27578/</loc>
		<lastmod>2026-04-06T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/cxzero-feature_n8n-csp-bypass-stored-xss_CVE-2026-27578.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260222-151427.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260222-151449.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260303-105512.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260309-105503.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260309-105241.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/03/image-20260309-105959.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/rapid-exploitation-and-clever-malware-in-the-supply-chain-last-week-in-appsec-2026-04-02/</loc>
		<lastmod>2026-04-02T07:17:00+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/04/lwias-feature_2026-04-02.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/how-we-take-down-malicious-visual-studio-code-extensions/</loc>
		<lastmod>2026-04-09T21:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/11/cxzeo-feature_how-we-take-down-vscode-ext_2025-11.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/a-beautiful-factory-for-malicious-packages/</loc>
		<lastmod>2026-04-10T16:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2022/03/thumbnail-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/bypassing-claude-code-how-easy-is-it-to-trick-an-ai-security-reviewer/</loc>
		<lastmod>2026-04-15T20:41:10+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/feature_evaluating_claude_code.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig1-claude_warning.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/claude_code-samle_pandas_rce-false_positive_finding.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/claude_code-correct_alarm-on-file-include.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/claude_code-file_alarm_bypass_code.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/claude_code-database-test-run.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/how-one-country-is-impacting-supply-chains/</loc>
		<lastmod>2026-04-15T20:49:21+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/11/Dark_side_of_AI_webinar_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/uncategorized/supply-chain-attack-using-ethereum-smart-contracts-to-distribute-multi-platform-malware/</loc>
		<lastmod>2026-04-15T20:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Supply-Chain-Attack-Using-Ethereum-Smart-Contracts-to-Distribute-Multi-Platform-Malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/jest-fet-mock-npm-packages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/jest-fet-mock-attack-flow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/Ethernet-smar-contract-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/11/jest-fet-mock-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/what-you-should-know-http-2-continuation-flood-vulnerability/</loc>
		<lastmod>2026-04-15T20:59:50+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/04/HTTP2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/popular-nuget-package-moq-silently-exfiltrates-user-data-to-cloud-service/</loc>
		<lastmod>2026-04-21T15:51:38+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2023/05/Case_study.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/bypassing-ai-agent-defenses-with-lies-in-the-loop/</loc>
		<lastmod>2026-04-21T15:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/cxzero-feature-litl_.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig1-diagram_of_flow-logomarked.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig2-vscode_static_view.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig3-anthropic_h1_bot_denial1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig4-section_of_gh-issue_prompt.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig5-injection_vscode_in_progress.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig6-user_prompt_with_small_highlight.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig7-user_prompt_big_window_highlight.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig8-anthropic_h1_human_response_highlight.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/fig9-completed_deception.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/09/figA-pwc_chart_snip.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/how-to-fight-the-ongoing-battle-between-ai-and-captcha/</loc>
		<lastmod>2026-04-21T15:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/zero-combat_captcha_ai.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/figure1-ai.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2025/08/figure2-ai.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/zero-post/learning-about-llm-based-zero-day-hunting-with-claude-codes-opus-4-6/</loc>
		<lastmod>2026-04-21T15:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-feature_claude_code_opus_46_zero_day.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-opus46-ori-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2026/02/cxzero-sdl2-deprecation-freerdp.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://staging.checkmarx.com/blog/year-long-campaign-of-malicious-npm-packages-targeting-roblox-users/</loc>
		<lastmod>2026-04-21T16:01:30+00:00</lastmod>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/Roblox-Header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/RB7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://staging.checkmarx.com/wp-content/uploads/2024/08/Rb8.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->