<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Main Pages -->
  <url><loc>https://www.hackerstorm.com/</loc><priority>1.0</priority></url>
  <url><loc>https://www.hackerstorm.com/about-us</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/contact</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/faq-1</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/terms-privacy-policy</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/our-service</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/search-page</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/tags-page</loc><priority>0.5</priority></url>

  <!-- Search Insights Hub -->
  <url><loc>https://www.hackerstorm.com/search-insights/search-cves-nvd</loc><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/search-insights/cisa-kev-cve-data</loc><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/search-insights/search-vulnerabilites-in-media</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/search-insights/latest-nvd-entries-7-days</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/search-insights/latest-nvd-entries-30-days</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/search-insights/latest-nvd-entries-90-days</loc><priority>0.5</priority></url>

  <!-- Blog Categories -->
  <url><loc>https://www.hackerstorm.com/articles/latest-news</loc><priority>0.5</priority></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog</loc><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts</loc><lastmod>2026-03-10T13:07:17+00:00</lastmod><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned</loc><lastmod>2026-03-10T13:02:29+00:00</lastmod><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence</loc><lastmod>2026-03-10T13:06:42+00:00</lastmod><priority>0.7</priority></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis</loc><lastmod>2026-03-10T13:04:22+00:00</lastmod><priority>0.7</priority></url>

  <!-- Government Category Articles -->
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/cisa-ed-22-03-mitigate-vmware-vulnerabilities</loc><lastmod>2024-03-04</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities</loc><lastmod>2024-03-02</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ncsc-exploitation-of-vulnerabilities-affecting-ivanti-connect-secure-and-ivanti-policy-secure</loc><lastmod>2024-03-02</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/cert-eu-security-advisory-2024-016-high-vulnerability-in-the-runc-package</loc><lastmod>2024-03-02</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/active-exploitation-of-vulnerability-affecting-oracle-e-business-suite</loc><lastmod>2025-12-04</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/vulnerability-affecting-next-js-web-development-framework</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ed-24-02-mitigating-the-significant-risk-from-nation-state-compromise-of-microsoft-corporate-email-system</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/active-exploitation-of-vulnerability-affecting-microsoft-office-sharepoint-server-products-in-the-uk</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ed-25-02-mitigate-microsoft-exchange-vulnerability</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ed-25-03-identify-and-mitigate-potential-compromise-of-cisco-devices</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/ed-26-01-mitigate-vulnerabilities-in-f5-devices</loc><lastmod>2025-12-03</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/government-regulatory-cyber-alerts/2025-cwe-top-25-most-dangerous-software-weaknesses</loc><lastmod>2026-01-22</lastmod></url>

  <!-- Operational Intelligence Category -->
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/a-look-back-at-finlands-vastaamo-and-the-decades-old-security-vulnerability</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/the-breach-nobody-saw-coming-when-ai-becomes-the-attack-vector</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/25-million-deepfake-heist-why-perfect-compliance-is-failing-enterprises-in-2026</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/operational-threat-intelligence-security-operations</loc><lastmod>2026-04-21</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/ofa-001-jlr-sept-2025-breach-analysis-third-party-identity-exposure-and-kev-prioritization-gaps</loc><lastmod>2026-03-30</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/operational-threat-intelligence-lessons-learned/operational-failure-analysis-citrixbleed-bluehammer-identity-governance-failure</loc><lastmod>2026-04-21</lastmod></url>

  <!-- AI Threats Category -->
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/the-invisible-inventory-why-ai-security-starts-where-most-organizations-havent-even-looked</loc><lastmod>2026-04-18</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/the-ai-security-blind-spot-thats-already-costing-you-data</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/beyond-shadow-ai-securing-the-agentic-workflows-your-security-team-cant-see</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/25-million-lost-to-a-deepfake-scam-and-why-your-security-protocols-wont-stop-the-next-one</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/employees-are-executing-the-hacks-that-weaponizes-trust</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/the-35-million-voice-clone-how-ai-voice-fraud-is-breaking-bank-security</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/patient-zero-the-2019-german-ceo-voice-clone-that-triggered-a-40-billion-fraud-wave</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/one-in-four-job-applicants-could-be-fake-by-2028-experts-warn</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/ai-deepfake-hiring-fraud-north-korean-it-workers</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/ai-impersonation-synthetic-identity-threats-enterprise-detection-risk-guide-2026</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/ai-threats-fraud-intelligence/mckinsey-ai-chatbot-breach-analysis-shadow-ai-identity-governance</loc><lastmod>2026-03-25</lastmod></url>

  <!-- Vulnerability Analysis Category -->
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/urgent-critical-security-flaw-in-jenkins-exposing-1000s-being-exploited</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-february-2024</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-september-2025</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-october-2025</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-november-2025</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-december-2025</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/monthly-vulnerability-roundup-january-2026</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/50k-cves-2026-vulnerability-management-strategy</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/microsoft-zero-days-cisa-active-exploitation</loc><lastmod>2026-03-10</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/vulnerability-management-operational-risk-exposure-prioritization</loc><lastmod>2026-04-13</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/why-most-patch-programs-fail</loc><lastmod>2026-04-21</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/moveit-mass-exploitation-ofa-kev-prioritization-asset-visibility-failure</loc><lastmod>2026-04-21</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/cvss-vs-epss-vulnerability-prioritisation-exploitation-risk</loc><lastmod>2026-04-13</lastmod></url>
  <url><loc>https://www.hackerstorm.com/articles/our-blog/vulnerability-intelligence-analysis/ai-code-security-production-gap</loc><lastmod>2026-04-19</lastmod></url>

</urlset>