<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
  <loc>https://www.hackerstorm.com/</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/about-us</loc>
  <lastmod>2026-02-04T10:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/contact</loc>
  <lastmod>2026-02-04T10:00:00+00:00</lastmod>
  <priority>0.5</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/search-cves-nvd</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.95</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/cisa-kev-cve-data</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.95</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/search-vulnerabilites-in-media</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.95</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/latest-news</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>1.0</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/faq-1</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.85</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/terms-privacy-policy</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.40</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/latest-nvd-entries-7-days</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.50</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/latest-nvd-entries-30-days</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.50</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/search-insights/latest-nvd-entries-90-days</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.50</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/cisa-ed-22-03-mitigate-vmware-vulnerabilities</loc>
  <lastmod>2024-03-04T17:12:54+00:00</lastmod>
  <priority>0.70</priority>
</url>

<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/patient-zero-the-2019-german-ceo-voice-clone-that-triggered-a-40-billion-fraud-wave</loc>
  <lastmod>2026-02-04T21:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>


<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities</loc>
  <lastmod>2024-03-02T18:01:37+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ncsc-exploitation-of-vulnerabilities-affecting-ivanti-connect-secure-and-ivanti-policy-secure</loc>
  <lastmod>2024-03-02T18:02:05+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/cert-eu-security-advisory-2024-016-high-vulnerability-in-the-runc-package</loc>
  <lastmod>2024-03-02T18:00:53+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/active-exploitation-of-vulnerability-affecting-oracle-e-business-suite</loc>
  <lastmod>2025-12-04T10:16:49+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/vulnerability-affecting-next-js-web-development-framework</loc>
  <lastmod>2025-12-03T16:46:38+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ed-24-02-mitigating-the-significant-risk-from-nation-state-compromise-of-microsoft-corporate-email-system</loc>
  <lastmod>2025-12-03T15:29:13+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/active-exploitation-of-vulnerability-affecting-microsoft-office-sharepoint-server-products-in-the-uk</loc>
  <lastmod>2025-12-03T16:21:53+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ed-25-02-mitigate-microsoft-exchange-vulnerability</loc>
  <lastmod>2025-12-03T13:29:04+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ed-25-03-identify-and-mitigate-potential-compromise-of-cisco-devices</loc>
  <lastmod>2025-12-03T13:31:55+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/ed-26-01-mitigate-vulnerabilities-in-f5-devices</loc>
  <lastmod>2025-12-03T13:30:31+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/government/2025-cwe-top-25-most-dangerous-software-weaknesses</loc>
  <lastmod>2026-01-22T16:52:23+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/urgent-critical-security-flaw-in-jenkins-exposing-1000s-being-exploited</loc>
  <lastmod>2024-02-07T16:00:39+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-february-2024</loc>
  <lastmod>2024-03-04T11:18:23+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-september-2025</loc>
  <lastmod>2025-12-04T11:17:38+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-october-2025</loc>
  <lastmod>2025-12-04T11:03:06+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-november-2025</loc>
  <lastmod>2025-12-04T10:47:37+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-december-2025</loc>
  <lastmod>2026-01-31T12:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/the-invisible-inventory-why-ai-security-starts-where-most-organizations-havent-even-looked</loc>
  <lastmod>2026-01-22T17:37:42+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/the-ai-security-blind-spot-thats-already-costing-you-data</loc>
  <lastmod>2026-01-22T17:37:31+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/the-breach-nobody-saw-coming-when-ai-becomes-the-attack-vector</loc>
  <lastmod>2026-01-25T14:35:56+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/beyond-shadow-ai-securing-the-agentic-workflows-your-security-team-cant-see</loc>
  <lastmod>2026-01-23T10:27:55+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/25-million-lost-to-a-deepfake-scam-and-why-your-security-protocols-wont-stop-the-next-one</loc>
  <lastmod>2026-01-31T23:57:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/employees-are-executing-the-hacks-that-weaponizes-trust</loc>
  <lastmod>2026-02-02T09:50:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/the-35-million-voice-clone-how-ai-voice-fraud-is-breaking-bank-security</loc>
  <lastmod>2026-02-02T14:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/monthly-vulnerability-roundup-january-2026</loc>
  <lastmod>2026-02-02T14:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/25-million-deepfake-heist-why-perfect-compliance-is-failing-enterprises-in-2026</loc>
  <lastmod>2026-02-07T15:40:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/one-in-four-job-applicants-could-be-fake-by-2028-experts-warn</loc>
  <lastmod>2026-02-08T17:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/50k-cves-2026-vulnerability-management-strategy</loc>
  <lastmod>2026-02-14T21:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/microsoft-zero-days-cisa-active-exploitation</loc>
  <lastmod>2026-02-15T22:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/ai-deepfake-hiring-fraud-north-korean-it-workers</loc>
  <lastmod>2026-02-20T16:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/ai-impersonation-synthetic-identity-threats-enterprise-detection-risk-guide-2026</loc>
  <lastmod>2026-02-21T22:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/operational-threat-intelligence-security-operations</loc>
  <lastmod>2026-02-27T15:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/hackerstorm/ofa-001-jlr-sept-2025-breach-analysis-third-party-identity-exposure-and-kev-prioritization-gaps</loc>
  <lastmod>2026-03-06T10:00:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/vulnerabililty-intelligence/vulnerability-management-operational-risk-exposure-prioritization</loc>
  <lastmod>2026-03-17T10:26:00+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/ai-threats-fraud-intelligence/mckinsey-ai-chatbot-breach-analysis-shadow-ai-identity-governance</loc>
  <lastmod>2026-03-19T10:26:11+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/vulnerabililty-intelligence/why-most-patch-programs-fail</loc>
  <lastmod>2026-03-20T11:00:11+00:00</lastmod>
  <priority>0.70</priority>
</url>
<url>
  <loc>https://www.hackerstorm.com/index.php/articles/our-blog/vulnerabililty-intelligence/moveit-mass-exploitation-ofa-kev-prioritization-asset-visibility-failure</loc>
  <lastmod>2026-03-30T10:00:11+00:00</lastmod>
  <priority>0.70</priority>
</url>
</urlset>