<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.cyberdax.io/den</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-ollama-ai-infrastructure-exposure-memory-disclosure-risk-in-self-hosted-model-servers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Report Type: EXP Threat Category: AI Infrastructure Exposure / Sensitive Runtime Context Disclosure Assessment Date: May 9, 2026 Primary Impact Domain: Sensitive Data Exposure Secondary Impact Domains: Credential Exposure, Intellectual Property Exposure, Cloud and Repository Access Risk, Developer Workflow Disruption, AI Infrastructure Trust, Regulatory and Customer Assurance Risk Affected Asset Class: Self-Hosted AI Model Servers / Ollama Infrastructure Threat Objective Classification: Exposure Exploitation / Runtime Context Access / Downstream Credential Enablement</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e78ac19-f864-4e14-88d1-a6c75c0eaa3d/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b2f170c5-87da-4f83-8d1b-3f1fe7f4e53b/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9cbc87f1-0037-4633-a085-9caa1d49115b/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/58e6d93c-8bd6-41b2-b308-82d3ea38caec/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32fb25fb-9030-4e60-b650-745cc6e48cc8/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74deaf97-3b49-47d1-9be3-59c531708c29/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e7b1b6a4-f746-4976-ad73-ac492820cfd5/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Ollama+AI+Infrastructure+Exposure+Memory+Disclosure+Risk+in+Self-Hosted+Model+Servers.png</image:loc>
      <image:title>CyberDax Den - [EXP] Ollama AI Infrastructure Exposure Memory Disclosure Risk in Self-Hosted Model Servers - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-active-exploitation-of-mdm-and-enterprise-management-control-planes</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Report Type: EXP Threat Category: Active Exploitation of Enterprise Management Control-Plane Infrastructure Assessment Date: May 7, 2026 Primary Impact Domain: Enterprise Management Control-Plane Integrity Secondary Impact Domains: Administrative Access Control; Device Trust and Assurance; Policy Enforcement; Certificate, Token, and Connector Integrity; Logging and Visibility; Operational Continuity; Regulatory and Governance Exposure Affected Asset Class: MDM, EPMM, Endpoint-Management, Security-Management, and Enterprise Administration Platforms Threat Objective Classification: Unauthorized Administrative Access, Privileged Object Manipulation, Configuration or Policy Control Abuse, Visibility Reduction, Conditional Downstream Discovery, and Potential Enterprise Impact</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/71a3d86b-c790-4d14-a37b-e5bf1a092b61/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/046a760e-5ac8-44c2-a0bf-1d3fe7cbbd87/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4f4bdc5c-6545-418a-bf2d-f492873a5d4a/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3a3f3b11-f4d2-448e-9449-f4d13f95fcb5/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8b787920-913a-4ce4-ab59-4bcf769e61cb/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74af5f42-6da4-49f7-b5e6-1e9656c663ca/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/11de08a8-e613-4088-a821-563e196d21a3/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Active+Exploitation+of+MDM+and+Enterprise+Management+Control+Planes.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of MDM and Enterprise Management Control Planes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-active-exploitation-of-pan-os-user-id-authentication-portal-for-edge-firewall-compromise-cve-2026-0300</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Report Type: EXP Threat Category: Active edge-infrastructure exploitation Assessment Date: May 6, 2026 Primary Impact Domain: Firewall control-plane integrity and perimeter security-control trust Secondary Impact Domains: Segmentation enforcement, logging reliability, perimeter visibility, administrative-control integrity, configuration integrity, downstream intrusion exposure, operational continuity, customer trust, legal and regulatory risk Affected Asset Class: PAN-OS PA-Series and VM-Series firewalls with User-ID Authentication Portal or Captive Portal services enabled and reachable from untrusted networks Threat Objective Classification: Unauthorized firewall control-plane access or influence, with potential configuration manipulation, visibility reduction, firewall-originated outbound communication, and conditional downstream access enablement</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dc5d2f35-4a23-4bdf-bdc7-e130668c1321/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/31b8f644-947b-4ab7-a56a-8f06d90dfc6d/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f38a0953-0234-445a-9100-8a66f0f8dac0/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c4218e72-da4a-44c8-aff1-12f0453a4aa7/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/212ab472-f240-4b3b-ba2f-6bc3d45040bd/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5350419e-9882-438d-8330-baf0fdeb2d3b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b03c5109-05fb-4123-b29f-9d99bcdfdae2/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Active+Exploitation+of+PAN-OS+User-ID+Authentication+Portal+for+Edge+Firewall+Compromise++CVE-2026-0300.png</image:loc>
      <image:title>CyberDax Den - [EXP] Active Exploitation of PAN-OS User-ID Authentication Portal for Edge Firewall Compromise&amp;nbsp; CVE-2026-0300 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-hosting-control-plane-compromise-risk-from-cpanel-kev-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Report Type: EXP Threat Category: Hosting Control-Plane Exploitation Assessment Date: May 4, 2026 Primary Impact Domain: Hosting Control-Plane Compromise Secondary Impact Domains: Unauthorized Administrative Access; Multi-Tenant Hosting Impact; Hosted-Content Manipulation; Account and Credential Abuse; Suspicious Outbound Infrastructure Use; Customer-Facing Service Abuse Affected Asset Class: Internet-Facing cPanel, WHM, DNSOnly, WP Squared, and Related Hosting-Control Systems Threat Objective Classification: Unauthorized Control-Plane Access, Privilege Abuse, Tenant Impact Expansion, Persistence Enablement, Hosted-Content Manipulation, and Abuse Infrastructure Enablement</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bed99e0b-2fe1-43f4-a806-a0374dccff8c/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/14387ae8-3248-46c6-b080-1f2d8abf238b/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dc33e9e1-71b1-40d4-b5b2-112c7895140a/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7356bcf1-dbb5-4466-91ab-9027de977110/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32b61c5d-0c79-4046-bacb-2b3a3a71af0a/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bff9908f-0dd5-4644-bad0-47b18e6f3d0a/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/27818024-2e72-4fc5-8025-143e2d79bf84/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Hosting+Control-Plane+Compromise+Risk+from+cPanel+KEV+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Hosting Control-Plane Compromise Risk from cPanel KEV Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-from-foothold-to-root-copy-fail-and-the-linux-cloud-escalation-risk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b28f91bf-9849-4cdd-a64a-2317320580c0/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bf6953d1-87db-4aa5-965b-d3f9405544cd/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/978ec278-68c3-47b0-b2a7-2e4550308400/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5f4316e4-c80a-4912-bdf1-4ffb57233245/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3502b466-94ed-461f-92f0-949157006ee3/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/056486ff-cafb-4013-be2d-85609f6e67fa/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bcfd8556-e551-415c-8a0e-91c6277f4c1c/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+From+Foothold+to+Root+Copy+Fail+and+the+Linux+Cloud+Escalation+Risk.png</image:loc>
      <image:title>CyberDax Den - [CVE] From Foothold to Root: Copy Fail and the Linux Cloud Escalation Risk - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-vect-ransomware-wiper-operational-risk-report</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/de7ac5f5-da71-49d0-b854-0ef766c116f9/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/99baeb6e-66ba-450f-9876-941fac59694d/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0adb5f88-b2dc-4df8-8d45-c40e466cefdf/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3a92684e-ee82-417b-9763-fb9be4c4ed92/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9e29a336-ff53-42da-82b0-4c506ee344ab/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dbbd7fdd-0ca2-4126-b6ae-2d1c7d438183/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/30e1f363-47e0-4466-8ddd-2bd992fe8bc5/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+VECT+Ransomware-Wiper+Operational+Risk+Report.png</image:loc>
      <image:title>CyberDax Den - [EXP] VECT Ransomware-Wiper Operational Risk Report - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/sup-sap-npm-package-poisoning-and-shai-hulud-style-developer-credential-theft</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-05-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f3dfbe4c-8c1e-49a2-9014-f61c627d90af/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/46b6ba36-7f17-4860-b48b-509036b38120/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/deca96d2-8ea8-41bc-9103-46b88c8aa43c/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cd8ac1cb-869d-4eb1-a7c9-c20e532ecc73/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/681bf4c0-8bbb-41a2-8831-5292cf3bc509/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fe19ad72-a5b0-4c12-8dc1-5e6b62d2d7d5/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bb6a6050-3bcd-49cf-8918-899f4e05851f/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BSUP%5D+SAP+npm+Package+Poisoning+and+Shai-Hulud-Style+Developer+Credential+Theft.png</image:loc>
      <image:title>CyberDax Den - [SUP] SAP npm Package Poisoning and Shai-Hulud-Style Developer Credential Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-rmm-tool-abuse-for-initial-access-persistence-and-post-compromise-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Report Type: EXP Threat Category: Legitimate-tool abuse / trusted remote administration misuse Assessment Date: April 29, 2026 Primary Impact Domain: Remote Administration Trust Boundary and Unauthorized Access Control Secondary Impact Domains: Endpoint control and persistence Identity and privileged access exposure Service-provider and support workflow trust Cloud-native remote management control paths Backup and recovery assurance Data staging, exfiltration preparation, and ransomware preparation Governance, compliance, and third-party risk exposure Affected Asset Class: Enterprise endpoints, servers, cloud-hosted workloads, privileged access workstations, identity infrastructure, backup systems, security tooling, executive endpoints, regulated-data systems, production-critical systems, helpdesk systems, endpoint management platforms, RMM tenants, and service-provider administration paths. Threat Objective Classification: Unauthorized remote control, persistence, and post-compromise operational enablement through legitimate RMM, remote support, service-provider, endpoint management, or cloud-native remote command pathways.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/43fd014b-7127-4ae0-a4d7-e1511cb8d2e1/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/342fb4cd-ff3e-4677-9cb9-9640f1b2e719/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2fcc2712-a644-4864-a9a6-b54e7c1ebbd2/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e6bf83e4-8f44-4556-9877-3d4a89e9b322/FIGURE+4+%E2%80%94+BEHAVIOR+SIGNAL+CONFIDENCE+%26+HUNT+PRIORITIZATION+MATRIX+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/77b1ad99-7744-4b59-802b-8f35f6c32a9b/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b33d558b-3d0c-47e4-8350-4daf7fe1e969/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3bcf7541-02a7-4850-9e65-babab773bd3c/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+RMM+Tool+Abuse+for+Initial+Access%2C+Persistence%2C+and+Post-Compromise+Control.png</image:loc>
      <image:title>CyberDax Den - [EXP] RMM Tool Abuse for Initial Access, Persistence, and Post-Compromise Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-pre-authentication-injection-against-internet-exposed-ai-gateway-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Report Type: CVE-Triggered Behavior Assessment Threat Category: Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure Assessment Date: April 28, 2026 Primary Impact Domain: AI Gateway Trust Boundary and Access Control Secondary Impact Domains: Credential and Secret Exposure; Provider-Key Misuse; Backend Database Integrity; SaaS and Cloud-Connected AI Operations Affected Asset Class: AI Gateways; LLM Proxies; OpenAI-Compatible Proxy Services; API Key Verification Systems; Provider Credential Stores; Gateway Backend Databases; Cloud-Connected AI Workloads Threat Objective Classification: Unauthorized Access, Credential Exposure, Provider Abuse, and Downstream AI Infrastructure Access</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e5a17ad-ce07-4add-9f1b-d0bca0041b86/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/120cf124-b1b1-418d-ab20-191b7bbac5ed/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1308189d-3daa-4faf-bcd0-0ddd4594f56e/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7ce43b8f-9f23-44b1-a7a1-e636890d5e6f/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e98e8db6-c19c-48eb-914c-00ec6e41ccc3/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c697d06a-e0a4-41ad-8196-a92c8b3588ca/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3cddf5c2-914b-4dd3-aeb1-05d218765244/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Pre-Authentication+Injection+Against+Internet-Exposed+AI+Gateway+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - [CVE] Pre-Authentication Injection Against Internet-Exposed AI Gateway Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-endpoint-defense-subversion-and-security-control-degradation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Report Type: Exploitation Threat Assessment Threat Category: Endpoint Defense Subversion and Security-Control Degradation Assessment Date: April 27, 2026 Primary Impact Domain: Endpoint Security-Control Integrity Secondary Impact Domains: Detection and Response Reliability; Endpoint Telemetry Confidence; Credential Access Exposure; Lateral Movement Risk; Incident Containment and Recovery Affected Asset Class: Enterprise Endpoints; Endpoint Protection and EDR Platforms; Antivirus and Security Intelligence Update Services; Endpoint Telemetry Pipelines; Device-Management and Policy Enforcement Systems; Privileged and Domain-Connected Systems Threat Objective Classification: Defense Evasion, Endpoint-Control Degradation, Telemetry Impairment, Credential Access Enablement, Persistence Enablement, and Downstream Enterprise Compromise</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9fbb9b4d-b171-4fd6-aaa2-7b78030d9494/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f0b0ce46-b5b9-47a3-bc56-7dface78fc2e/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ebd12aa8-7c92-4f7f-9eb2-c5c4ce66c0a2/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/83143745-b9fc-4a70-bdd1-c543beda138c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dba68cfa-f584-4269-a0d9-eddbc6e884cb/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ad6af5f2-075d-4ca9-8648-2058ce9f8279/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/634b030b-65a1-4670-9e5e-13cde6fb2cbd/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Endpoint+Defense+Subversion+and+Security-Control+Degradation.png</image:loc>
      <image:title>CyberDax Den - [EXP] Endpoint Defense Subversion and Security-Control Degradation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-shinyhunters-european-commission-data-breach-sensitive-data-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Report Type: Exposure-Driven Data Breach Threat Assessment Threat Category: Identity and Access Abuse Leading to Sensitive Data Exposure Assessment Date: April 22, 2026 Primary Impact Domain: Data Access and Exposure Control Secondary Impact Domains: Identity and Session Integrity; Regulatory Compliance and Data Protection; SaaS Data Governance and Access Visibility Affected Asset Class: Enterprise Identity Systems; SaaS and Cloud Data Platforms; Document and Data Repositories; Access Control and Sharing Mechanisms Threat Objective Classification: Unauthorized Data Access, Exposure via Access Control Manipulation, and Data Monetization</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4c0c7b1-f470-4ed9-9aa2-371d700d1d1f/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/28dbf2da-05eb-43c3-b12b-fbc21a12822b/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/25637215-ff2a-4c3e-83ae-37e49830167a/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0e06f67c-5b33-4de7-8ddd-1cabd85955fd/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/27f83c9a-222e-4bbc-ba85-0ccadec5f259/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3c2ebcb6-28e4-4095-be09-0f0e51a68cda/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5b8fb826-9205-4160-adc9-87eefa7a8b94/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+ShinyHunters%E2%80%99+European+Commission+Data+Breach+Sensitive+Data+Exposure.png</image:loc>
      <image:title>CyberDax Den - [EXP] ShinyHunters’ European Commission Data Breach Sensitive Data Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/sup-vercel-supply-chain-breach-via-ai-tooldriven-oauth-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Report Type: Supply Chain Threat Assessment Threat Category: Identity Compromise via OAuth and SaaS Integration Abuse Assessment Date: April 20, 2026 Primary Impact Domain: Identity and Access Control Secondary Impact Domains: Cloud Infrastructure Access; Credential and Secret Exposure; SaaS Operational Integrity Affected Asset Class: Enterprise Identity Systems; SaaS Platforms and Integrations; Credential Stores and Configuration Data; Cloud-Connected Services Threat Objective Classification: Unauthorized Access, Credential Exposure, and Downstream System Access</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a54de179-41cc-4ccc-9e51-548d7cdc63f7/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/848eea02-1b97-4fe8-834c-b206a4f338a8/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2eb49c33-8b3b-4032-a64e-778d10185b4f/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a8cc5ea3-755d-464f-9030-1829b8ceaeed/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a25cf26d-c017-4364-9633-0223844b9116/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9c5f42a3-a3af-4b1f-9e16-03b6606011b3/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/64ed6a50-f613-48b2-879d-ab49d7ac65ad/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BSUP%5D+Vercel+Supply+Chain+Breach+via+AI+Tool%E2%80%93Driven+OAuth+Compromise.png</image:loc>
      <image:title>CyberDax Den - [SUP] Vercel Supply Chain Breach via AI Tool–Driven OAuth Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/mal-detection-strategy-overview-dragon-boss-signed-adware-unidentified-malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Report Type: Malware / Intrusion Activity (Behavioral Detection Report) Threat Category: Access Acquisition / Persistence Establishment Assessment Date: April 19, 2026 Primary Impact Domain: Endpoint Compromise and Persistent Unauthorized Access Secondary Impact Domains: Credential Access; Lateral Movement; Command and Control; Operational Disruption (Potential) Affected Asset Class: Enterprise Endpoints (Windows Systems) Threat Objective Classification: Initial Foothold Establishment and Access Persistence (Potential Initial Access Broker Activity)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/343fd403-08cd-4c60-9bc3-6a06e6298049/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6a85a996-2dba-4d7a-bfcd-99aec8f43b1d/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1c72ab6f-a341-42bc-aee7-d582dff29f4c/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a210c81a-253e-4e35-bb45-c6dddb6c2706/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7a5caf5f-a2d8-47e4-ade9-2ac0e214d8e0/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1d556333-9f4a-49f9-9257-3167389df72b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/77924700-6104-4489-90bf-d0d895c3ac0f/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BMAL%5D+Detection+Strategy+Overview+Dragon+Boss+Signed+Adware+%28Unidentified+Malware%29.png</image:loc>
      <image:title>CyberDax Den - [MAL] Detection Strategy Overview Dragon Boss Signed Adware (Unidentified Malware) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-detection-strategy-for-ai-accelerated-mass-exploitation-operations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Report Type: Exploitation Report (EXP) Threat Category: Mass Exploitation / Opportunistic Internet-Scale Exploitation Assessment Date: April 17, 2026 Primary Impact Domain: Data Exposure and Operational Disruption Secondary Impact Domains: Regulatory Impact; Incident Response Cost; Reputational Impact Affected Asset Class: Internet-Facing Services and Cloud-Hosted Workloads Threat Objective Classification: Initial Access; Execution; Collection; Exfiltration</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fe58706c-5395-4817-bc86-0ccc88815763/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fdc15f07-a29a-4d7c-a64d-6aa58d4cab06/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/789fcced-7d14-47ff-a4a0-6a2305b7700b/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6616fbcf-fe0f-4b8c-b1b9-fd86e436a4c0/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4c4164a-8eb1-46b8-9cc5-deb00e665a8b/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fdf7c0c8-6203-4792-a9e7-e94327355452/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/89ea7084-eb2b-4104-a403-82a33ca97943/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Detection+Strategy+for+AI-Accelerated+Mass+Exploitation+Operations.png</image:loc>
      <image:title>CyberDax Den - [EXP] Detection Strategy for AI-Accelerated Mass Exploitation Operations - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-actively-exploited-apache-activemq-rce-cve-2026-34197</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Report Type: Exploitation Report (EXP) Threat Category: Remote Code Execution (RCE) via Management Interface Abuse Assessment Date: April 16, 2026 Primary Impact Domain: System Compromise Service Disruption Secondary Impact Domains: Lateral Movement Data Exposure Operational Instability Affected Asset Class: Middleware / Messaging Infrastructure (Apache ActiveMQ Broker) Threat Objective Classification: Initial Access Execution Lateral Movement Impact</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2fcda02b-55f0-4b65-8b9f-0ff3b78a3a06/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/02b4beb7-4c64-4dcc-b5a1-0eaf89a00d2a/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bbcf38c5-35b4-4334-85ec-90298e716f1c/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f2869eb8-7fdf-4232-be9c-0245f4706e10/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/636633e1-5461-4d63-b2b2-47392cedfcdf/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bcc10e2d-c73a-4e70-ac31-1a53298cb2d0/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c473d06f-9709-4065-86dd-44a5fad97a56/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Actively+Exploited+Apache+ActiveMQ+RCE+%28CVE-2026-34197%29.png</image:loc>
      <image:title>CyberDax Den - [EXP] Actively Exploited Apache ActiveMQ RCE (CVE-2026-34197) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/why-identity-has-become-the-primary-attack-surface</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Why Identity Has Become the Primary Attack Surface - Make it stand out</image:title>
      <image:caption>Report Type Training</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-microsoft-april-2026-zero-day-exploitation-risk-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Report Type CVE Threat Category Client-Side Exploitation Assessment Date April 14, 2026 Primary Impact Domain Endpoint Compromise Secondary Impact Domains ·        Data Exposure ·        Credential Access ·        Initial Access Enablement ·        Potential Lateral Movement Affected Asset Class User Workstations (Windows and macOS endpoints running Adobe Acrobat/Reader) Threat Objective Classification Initial Access and Execution via Document-Based Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c547786b-ec35-4d34-a035-6b4dacd30999/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7cd064b9-670b-41c3-bc19-3efb6fad9a57/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0a50f76a-070b-4ef6-beb5-ff7267159ecc/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7a02492c-e6f9-486f-9753-0f5ffa6777ad/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d240c75e-2625-43ba-bd18-6a9e17782225/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4de2803-4370-4184-8e70-8eaa1517dd32/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7e5490c1-41c7-4d2c-8c3e-8b0998aa37ea/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Microsoft+April+2026+Zero-Day+Exploitation+Risk+Analysis.png</image:loc>
      <image:title>CyberDax Den - [EXP] Microsoft April 2026 Zero-Day Exploitation Risk Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-cve-2026-34621-adobe-acrobat-zero-day-remote-code-execution-actively-exploited</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Report Type CVE Threat Category Client-Side Exploitation Assessment Date April 11, 2026 Primary Impact Domain Endpoint Compromise Secondary Impact Domains Data Exposure, Credential Access, Initial Access Enablement, Potential Lateral Movement Affected Asset Class User Workstations (Windows and macOS endpoints running Adobe Acrobat/Reader) Threat Objective Classification Initial Access and Execution via Document-Based Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/373be2d8-462c-45ca-a260-b1e88515f8cc/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9e83d5bd-cfea-4adf-bbad-1a4afed74209/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820b779d-3c9d-4f9e-a428-fd802f4b2f62/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/523e022e-d7d4-4473-b406-4f7e3200e215/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4ad9370a-2730-4bec-bc68-2f19e6450bb8/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5336e991-0461-46ec-ab5f-d9f1c21f3d6a/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fd700a0a-3f32-4762-95b1-f74305880ea8/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-34621+Adobe+Acrobat+Zero-Day+Remote+Code+Execution+Actively+Exploited.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-34621 Adobe Acrobat Zero-Day Remote Code Execution Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/ran-ransomware-ecosystem-expansion-and-affiliate-cartelization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Report Type RAN – Ransomware Campaign Threat Category Ransomware Ecosystem Expansion and Affiliate Cartelization Assessment Date April 09, 2026 Primary Impact Domain Enterprise Operations Disruption Secondary Impact Domains Data Confidentiality Loss Financial Extortion Exposure Regulatory and Compliance Risk Reputational Damage Affected Asset Class Enterprise Endpoints Internal Network Infrastructure Identity and Access Systems Cloud Control Plane and Backup Systems Threat Objective Classification Data Encryption for Impact Data Exfiltration for Extortion Defense Evasion and Control Impairment Recovery Inhibition and Backup Destruction Lateral Movement and Environment-Wide Propagation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/69f95e1d-c583-4c2a-8e3c-d1e17bea68ae/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/897494c8-a686-4b48-a822-979d8a45e145/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3f03c924-bf76-48ed-a1e0-dc537c327690/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/684e4629-0b54-419f-a96c-b171564ce957/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f6f32ffd-18cd-47e1-b9e9-a57c57773fcd/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/020f4409-c460-4a88-b170-fb1677c33f31/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/24059a71-0ce4-49a4-9f39-cb0e5e354200/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BRAN%5D+Ransomware+Ecosystem+Expansion+and+Affiliate+Cartelization.png</image:loc>
      <image:title>CyberDax Den - [RAN] Ransomware Ecosystem Expansion and Affiliate Cartelization - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cyberdax-detection-companion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CyberDax Detection Companion - Make it stand out</image:title>
      <image:caption>Report Type Training</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cyberdax-heuristic-threat-hunting-foundations</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CyberDax Heuristic Threat Hunting Foundations - Make it stand out</image:title>
      <image:caption>Report Type Training</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/sup-trueconf-trusted-update-channel-compromise-cve-2026-3502</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Report Type SUP Threat Category Supply Chain Compromise via Trusted Update Mechanism Assessment Date April 08, 2026 Primary Impact Domain Enterprise Endpoint Compromise Secondary Impact Domains Software Supply Chain Integrity Internal Network Trust Boundaries Update Distribution Infrastructure Affected Asset Class Enterprise Endpoints (Windows Systems) Software Update Mechanisms Internal Update Distribution Systems Threat Objective Classification Initial Access Enablement Persistence Enablement (Conditional Post-Exploitation) Lateral Propagation via Trusted Distribution Potential Espionage or Access Brokerage (Dependent on Attacker Objectives)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/59080fbb-e0b4-4127-bcba-3dd4f33eae25/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/58a0146b-0ae1-42ea-a581-95f0b470c37a/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c6803586-7e23-4f30-a3b7-4a2f4d770a12/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ca30270c-792e-404b-b06f-f46462374c7b/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/00cdc7c6-cc83-4847-b437-f0f82bf67ad6/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a404c298-0948-49ed-9b41-4e77b4b7366d/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/31c2f05c-e134-4f05-9ecd-1235d0a184a5/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BSUP%5D+TrueConf+Trusted+Update+Channel+Compromise+%28CVE-2026-3502%29.png</image:loc>
      <image:title>CyberDax Den - [SUP] TrueConf Trusted Update Channel Compromise (CVE-2026-3502) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-fortinet-forticlient-ems-unauthenticated-remote-code-execution-under-active-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Report Type CVE Threat Category Unauthenticated Remote Code Execution (Improper Access Control) Assessment Date April 07, 2026 Primary Impact Domain Centralized Endpoint Management Infrastructure Secondary Impact Domains ·        Enterprise Endpoint Security Posture ·        Identity and Access Control Validation ·        Network Security Monitoring and Visibility ·        Incident Response and Containment Operations Affected Asset Class ·        Centralized Management Infrastructure (FortiClient EMS) ·        Managed Enterprise Endpoints Threat Objective Classification ·        Initial Access Establishment ·        Remote Command Execution ·        Lateral Expansion via Management Infrastructure ·        Potential Ransomware Enablement (Conditional Post-Exploitation)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f0d94c7a-358c-4087-88ae-f616017e7e97/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/40fa51a1-a582-426e-9d9d-f16fcfb399ee/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/178aff92-8c57-467e-ab0b-197f0580dd6b/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/20944d0b-9ba6-46a7-90b3-8ab28fd1903a/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/56403d58-4dbd-4a80-96d6-168180682223/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5986960e-1b9b-4b03-8540-b079a3831e62/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ba8bc3c5-e24b-43fb-aec6-f4729dd70d2f/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Fortinet+FortiClient+EMS+Unauthenticated+Remote+Code+Execution+Under+Active+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] Fortinet FortiClient EMS Unauthenticated Remote Code Execution Under Active Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/apt-iranian-state-aligned-identity-intrusion-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Report Type APT Threat Intelligence Report Threat Category Iranian State-Aligned Identity Intrusion and Disruption Assessment Date April 06, 2026 Primary Impact Domain Enterprise Identity Security and Internet-Facing Service Resilience</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/16ffcdfc-32e9-418b-afc2-9a89c15ffac5/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cc34658a-1de2-496e-8d27-e4c09f9a826f/Figure+2+%E2%80%94+Campaign+Flow+Chart++%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/86a0d243-af10-4e24-b015-b27958bf874a/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6fd8bdb3-874d-4942-acc1-ddacf707c541/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/afdd96f9-9480-4893-a4cb-2e140895730a/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5a3c6bc6-b97c-4237-bebc-0cb2c4f736b9/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6f4a3a2a-a857-4338-a395-debd6f2f1af3/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BAPT%5D+Iranian+State-Aligned+Identity+Intrusion+Campaign.png</image:loc>
      <image:title>CyberDax Den - [APT] Iranian State-Aligned Identity Intrusion Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-multi-stage-intrusion-chain-edge-exploit-to-identity-and-cloud-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Report Type CVE Vulnerability Intelligence Report Threat Category Active Exploitation Vulnerability (EXP) Assessment Date April 03, 2026 Primary Impact Domain Identity and Cloud Control Plane Compromise</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b6ff2cb4-77b9-403b-b311-a0d808bddb34/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/99dcf4b0-d9f5-476d-ae94-3f7d9c587025/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/11e214e5-6f2b-4134-9114-904f3b009579/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/facd520e-ce41-4458-ae45-1c7477ba4998/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/afb3ee3f-6685-488d-863f-ad85f91ed4a1/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7818997f-5912-4e4e-86b9-5738f11525d4/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32d183d0-a233-4f35-a157-5324ae7bda6a/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+Multi-Stage+Intrusion+Chain+Edge+Exploit+to+Identity+and+Cloud+Compromise.png</image:loc>
      <image:title>CyberDax Den - [EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-5281-pre-authentication-rce-enabling-unauthenticated-initial-access-via-network-input-handling-flaw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Report Type CVE Vulnerability Intelligence Report Threat Category Client-Side Remote Code Execution (Pre-Authentication) Assessment Date April 02, 2026 Primary Impact Domain Endpoint Compromise and User Session Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/14f37b9b-577b-4f9a-bea3-9c1220907e72/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1301d134-29f2-4c17-8728-475bf4ffc1a5/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d5ac8431-774c-4584-ac83-7eb3480febd0/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/382632ff-d74a-46ea-8d7e-b3277c8ca768/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5371c4b4-1f92-4228-80f9-f7c6baed356c/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9da3bdab-266d-441f-9a0a-1122069c541e/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b859e395-9478-4941-8a04-1d1127d7d01c/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-oracle-fusion-middleware-unauthenticated-remote-code-execution-cve-2026-21992</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Report Type CVE Vulnerability Assessment Threat Category Unauthenticated Remote Code Execution (RCE) Assessment Date March 30, 2026 Primary Impact Domain Identity and Middleware Control Systems (Enterprise Identity, Authentication, and Service Integration Layers)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8debab6b-243d-4d88-a674-4fdae34e95c0/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/06cbcc19-8c9a-4a08-910d-a78f6713f7d2/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/40cb873a-9acc-4d9e-b1af-fa374e4b9fcc/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9930ba8c-65e6-476c-b676-f8825f990761/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e03518ff-36fe-4b76-a4de-bb1b9cb0f54e/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/607a16ae-c3f9-4487-ada9-5915b2aa735b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3325ea42-ea3e-408d-b472-51d765e44409/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-vmware-spring-ai-remote-code-execution-via-prompt-injection-cve-2026-22738</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Application-Layer Remote Code Execution via AI Prompt Injection Assessment Date March 28, 2026 Primary Impact Domain Enterprise Application Security, Identity and Credential Exposure, Sensitive Data Protection, and AI-Driven Service Integrity</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e0262da9-97bb-4ad4-978d-66b8410d9e74/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7c371c17-8c5b-4bc2-9f67-71456c46df84/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d11d0c52-6f1c-4dae-b1c8-b08bdc1ce8e8/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6c0ed38a-2f2b-4bbe-b546-e6770fdadacb/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ec5283c0-59c5-4dbf-b758-d0ebcb91fc1f/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/55115ee5-cdc4-4a60-a5ac-609af776c972/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0a5b1e59-ce21-4d9c-9a63-36dce277ea80/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/sup-trivy-supply-chain-attack-credential-compromise-and-release-channel-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Supply Chain Compromise CI/CD Pipeline Compromise Credential Theft and Identity Abuse Assessment Date March 26, 2020 Primary Impact Domain Software Supply Chain Integrity (CI/CD Ecosystems) Identity and Access Management (Service Accounts, Tokens, Secrets) Cloud and Build Infrastructure Security (AWS, Azure, GCP)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ebe4604f-8188-4400-bf6f-5bef58118e13/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c3376dc3-5d19-442d-a393-f9d2abaa6656/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a6978a7a-2d3d-4575-b15e-f6007f034640/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cd5731b0-c1f0-4fd4-a62b-6f970debe7c7/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/96a57524-ef56-418e-932e-3082d8ef978c/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/54e6f984-986f-4a5d-b574-4835f0d67b0e/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/72693588-f59c-49cf-8e08-a4d5ae491c30/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-cve-2026-3055-citrix-netscaler-adc-memory-disclosure-unauthenticated-edge-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 26, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e50de025-aa9b-471b-9da4-956a46e83399/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b7cd5671-e62d-426e-a52a-b0eabdc57cb7/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/07a74543-9dae-48a9-bfe2-25e5aed00723/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/39fadfb2-feaf-41ea-82b6-513d13f13607/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6a98397a-df1c-43bf-a1fd-a6cc95169b10/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a9172ea7-63d2-4323-8c5d-a48e7be5f913/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/be4d5a11-d35e-40e6-b56d-1567961e5586/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/rules-from-exp-darksword-exploit-framework-multi-stage-exploitation-and-malware-delivery-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 24, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ff2a6bd0-2b2b-441b-9f02-16fe8181849c/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-darksword-exploit-framework-multi-stage-exploitation-and-malware-delivery-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 24, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ff2a6bd0-2b2b-441b-9f02-16fe8181849c/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/31869979-9ae9-4462-a7a8-bd4d722f54f2/Figure+2+%E2%80%94+Campaign+Flow+Chart+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6e752b74-99da-48be-890c-03bc580c9590/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0bce65cc-4971-4d98-8fa0-cc7b749eb9d4/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b3e53a0b-07ef-4039-970f-6fba17b5c68d/Figure+5+%E2%80%94+Detection+Coverage+Matrix+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/015d72fe-7bf1-4e2d-adc7-55908a2bbd04/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f875302-5f75-42dd-81ce-ee21e020510a/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-authenticated-command-injection-in-comfast-cf-ac100-management-interface-allowing-device-command-execution-cve-2026-4468</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Network Device Exploitation Authenticated Command Injection Management Interface Abuse Assessment Date March 23, 2026 Primary Impact Domain Network Infrastructure Security Management Plane Exposure Device-Level Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c7df1d46-6d9e-44f2-8bbb-8420be5707e5/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution+.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/574d5fe7-bfb6-452d-a756-3e0e145682c1/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution+.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2a40d1af-b336-422a-b7a7-c59f1cb93eb6/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/14b3051b-5b94-438f-adca-dba1cba6a77c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a6bc7fa7-562b-441f-973c-efd58f071823/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b620eafa-0ccc-4574-86ae-dbea0bb0e1ef/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/545ef24d-de73-47c3-8d62-39d78a32bebc/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-cisco-fmc-cve-2026-20131-and-cve-2026-20130-actively-exploited-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign Social Engineering Initial Access Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1940694d-f67f-42ad-8bd8-6f0558614469/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f123451d-4f04-421a-bd4a-b8987ea31548/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6d4aff64-4f7f-4a49-ae6d-2893231861d0/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fd5c6303-3237-4a38-943b-2e180297749b/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/90b2fab5-6cf6-4611-9d69-2ff03655e027/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d53eedf1-04cd-40f0-9429-435e419ca5ab/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c1785fb3-79fb-42c1-a7e8-7882e762f09f/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-the-shift-to-behavioral-and-identity-driven-attacks-and-why-siem-detection-fails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign Social Engineering Initial Access Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f808973-6f0d-4a0f-831d-bcfb6aa9400a/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/332cb447-8d2f-45ee-9984-dba9ee621278/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7341e4c4-25c0-43fd-a4e3-511703e2af6e/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/480dd550-ac00-4937-8cb0-89cae434396c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b7fabab9-9e98-44a8-b6ad-431d9321e8e2/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9b6df24-eec3-41fa-bffe-e4b405213c67/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4ff07215-a7fa-4f04-b2b5-2a019bf0ede5/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-the-shift-from-malware-delivery-to-identity-intrusion-in-modern-enterprise-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign / Social Engineering Initial Access / Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security and Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74a84c69-7af4-450a-85bd-d927c5b21257/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4ab29a4a-f15a-478b-9e42-700d49e771e8/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/673efa6c-8802-4c1f-8640-31fc9c010da9/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bb02c9e3-1e10-4042-842e-44b54529bb5c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3c272179-bbed-4616-a871-f45af471791a/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c61b5690-93c2-433a-845a-e0ab8ace9864/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dd086b90-ac07-475e-a7a7-2c29d752acae/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/idn-storm-1811-identity-intrusion-campaign-abusing-microsoft-teams-social-engineering-and-quick-assist-remote-access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign / Social Engineering Initial Access / Legitimate Remote Assistance Tool Abuse Assessment Date March 16, 2026 Primary Impact Domain Enterprise Identity Security and Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/09d63aaf-d8df-4889-9515-693f39b5c8a9/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9f54756c-a0c5-4d64-a8fc-c707b2e56ec1/Figure+2+%E2%80%94+Campaign+Flow+Chart+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/37c1be95-0a1d-4b48-bd9c-612d4408697f/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3de71bc6-9237-4c06-b471-c6123a54d835/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9ae86b60-c5d8-4a9e-b7b8-2d7a48b2b561/Figure+5+%E2%80%94+Detection+Coverage+Matrix+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9ef614db-1f19-45cb-b2fc-4196d7197298/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f4b973a9-8b28-4396-9f0d-385ed3301459/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/microsoft-windows-routing-and-remote-access-service-remote-code-execution-vulnerabilities-kb508497</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Report Type Vulnerability Intelligence Assessment Threat Category Remote Code Execution / Remote Access Infrastructure Exploitation Assessment Date March 15, 2026 Primary Impact Domain Enterprise Remote Access Infrastructure and Network Perimeter Security</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6e96476c-c1a3-43d9-9fcb-7ac6393a6c65/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/45624270-da6d-48fe-8562-db6caf1fc130/Figure+2+%E2%80%94+Campaign+Flow+Chart+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/00b13295-bc36-44b7-af5f-cce6e2d939ac/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2ae4d28a-a5df-4524-adba-5b280d1a05fd/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/57ed36e8-58b6-4319-bb52-daa8cca4a168/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4e1e532-3eca-4d87-a307-feddb51da1d1/Figure+5+%E2%80%94+Detection+Coverage+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bee726c8-ea94-4c62-97f9-6ae046cf178b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/29912849-8adb-4a76-a523-5926e6b19b26/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/chrome-zero-day-pair-cve-2026-3909-cve-2026-3910-enables-remote-browser-exploitation-via-skia-memory-corruption-and-v8-engine-flaws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ab99bf5-e900-4f84-943b-8ba6c1bb51f4/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaw.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/654262c2-465a-465d-a6a2-4bbbed34ac6a/Figure+2+%E2%80%93+Campaign+Flow+Chart+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws+.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b767b9c7-4c09-4100-8a9f-6d96e80200bb/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bb435ff5-1bfe-4246-bec8-5616ed9a8868/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2b4575a3-3f94-4ddd-b1d6-854ae6ce1068/Figure+5+%E2%80%94+Detection+Coverage+Matrix+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4bc9d8d-aad2-4e5d-a5c6-7602aa553ac6/Figure+6+%E2%80%94+Detection+Engineering+Matrix+%28Strategic+Layer%29+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b353d667-178b-40da-ae2f-aa14b8365160/Figure+7+%E2%80%94+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws+.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d81cdf60-de5b-417b-917c-cc05685b5f6b/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/07924285-d54a-4cf3-830c-04ee76376884/Figure+9+-+Post-incident+insights+and+recommendations+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fbe0e885-9bb5-4699-b939-e2c34a2f774b/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/credential-theft-campaign-assessment-blacksanta-intrusion-activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/65a26e30-1368-4d7c-9736-c50b5549acac/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4d62c267-751f-46ae-b3c9-5273eaffc65f/Figure+2+%E2%80%93+Campaign+Flow+Chart+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cf40d633-9e62-4153-b9ad-60954b1543d7/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/91424a77-f52f-486d-8964-83cb5f014f09/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/62086d05-823a-4bfa-bad3-b808e89fbbe7/Figure+5+%E2%80%94+Detection+Coverage+Matrix+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/59ef3d82-c4ee-430f-8a75-0714d086a931/Figure+6+%E2%80%94+Detection+Engineering+Matrix+%28Strategic+Layer%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eeea447c-0361-4c30-b382-4d3254a4ac7c/Figure+7+%E2%80%94+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/af2dda2b-0166-4408-8b8a-97b116777c21/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ce8e0f9b-da63-46e3-9801-d9535932d259/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4df62716-a905-4dab-8424-bbf0febcd9ae/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cb000519-593f-4fea-b1e1-2f66fd62162f/Figure+9+-+Post-incident+insights+and+recommendations+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4f6f8338-5074-4aec-ab9d-1ca2ced9eb80/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/handala-wiper-attack-disrupts-stryker-global-medical-technology-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6d0e3378-6159-44e1-a8b8-20e75623e30f/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Handala+Wiper+Attack+Disrupts+Stryker+Global+Medical+Technology+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cec47cf2-5ba8-412f-87e5-fb049f419edb/Figure+2+%E2%80%93+Campaign+Flow+Chart+Handala+Wiper+Attack+Disrupts+Stryker+Global+Medical+Technology+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21514-and-cve-2026-21513-microsoft-office-mshtml-trust-boundary-bypass-enables-phishing-based-initial-access-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ee880fc-8305-43f9-bd73-702bb477c405/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/85922cf3-badb-45d9-a73b-c9d7e3c511d1/Figure+2+%E2%80%93+Campaign+Flow+Chart+Chart+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2357d503-6f21-45a5-905e-2da5b21071dc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/70e82741-75eb-4cdc-ad12-569cea9760dc/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ea423aa5-ba2b-4034-9e95-54636fd3f8f3/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/554c72b3-053e-4949-9076-fd6c41d06437/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3cf17bc2-9efd-4f14-81b1-30f296851875/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/16301fda-6dac-4310-95f9-e949352efa28/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e61d86cb-eecc-46e0-915f-0839deec2e10/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1e2f4fc5-5560-4568-b84c-1f6b4ed6c087/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-1603-administrative-credential-exposure-risk-in-enterprise-management-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/38cfb345-e8ed-4cb7-833c-09573bfd3254/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8fc6d379-962c-4ae3-aa72-2e38d779c42d/Figure+2+%E2%80%93+Campaign+Flow+Chart+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7d2b4ce0-6dd7-4964-8df4-8c4650d48c9b/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cc43502b-2d9b-4cc2-899a-e02437b14638/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e677522-6d9e-4c99-acc0-1c0620b36599/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a480547e-606a-47e2-b456-46bbb263b53e/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/00a9e1c4-7abc-403b-923a-6398ea7098bd/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ed8e2571-1442-41cd-a840-ccd9ae43f0ac/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/73fd1f5d-0007-484a-94b2-9304e0d3c233/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/beab1b80-eff5-4d87-85d1-d208ac6ec8a2/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20079-and-cve-2026-20131-cisco-secure-firewall-management-center-authentication-bypass-and-remote-code-execution-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6fadba0c-2864-4e48-b8e6-b624ca9da44c/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bcdaa11a-9dc9-42eb-8201-50fb5f11d9e9/Figure+2+%E2%80%93+Campaign+Flow+Chart+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/42552462-984f-41df-9d18-c06fbb240ffa/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fa244d89-60a8-4cf9-a621-4476a3d15915/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/92b0a33d-ce91-40fb-b084-fde3970e69be/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9180f889-5de1-455b-be94-b971dac54985/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/314ab4cd-8a62-4636-ba60-403b5b6cf483/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a7f9441b-ebde-421a-9351-7b7f944820ae/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cf4d9ec7-b921-4d4e-84d1-d0c85f7f3941/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/141277b9-15b1-4390-8a34-dc7e7dced372/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/angle-integer-overflow-in-google-chrome-enables-potential-browser-memory-corruption-through-malicious-web-content-cve-2026-3536</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/158ea209-7ee8-4c17-a00e-989de6bf1a4c/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8de5821f-74a0-4bb7-a9fb-b7bc529bc0ff/Figure+1+%E2%80%93+CVE-2026-3536+Campaign+Flow+Chart+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e50b2649-b002-46b4-b33f-6103878816ed/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c45fc9ea-1e20-4923-be63-c362488c745b/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/67dd9055-493f-4665-af4b-b800b3f5ec45/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3329a247-02cd-4677-aed2-ae901be0a9b6/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d054b4d0-7b87-45e0-91a2-621024ead020/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8d3a2af4-3c6f-444c-ad04-d3b7b4faf7f1/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a15e96bf-fc93-4d38-baf6-24aa67b3a6d6/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/afc6e333-182d-43ce-be11-519777fe7313/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-2256-ms-agent-prompt-injection-command-execution-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a838f0b9-87fa-4783-a436-329e1c39cf96/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/69e1e9d2-b821-441d-8397-1fca0d57809b/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c14ae76e-d653-4766-b2c6-8a5fde2b8adc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e2828ca3-bcdd-42e5-a45e-39a33cd4a419/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0dc7b2cf-3482-4941-85a1-609eabfc3c5d/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0985e98b-9869-43a3-b1a4-b23c85a4da09/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c87d7269-7582-4cf4-b8c2-3eea30f71507/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/071f6382-2a90-4900-998a-94c6a69e1ed9/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ea6b83c8-209d-457b-8f20-e127a1de7d46/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21385-qualcomm-display-driver-memory-corruption-zero-day-in-active-targeted-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/28a163d2-c79f-453a-a010-6d8366d0b104/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/23c48018-1165-4ac0-a453-961e362b38c2/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f939351-b817-414b-b40a-4d0f2f645aea/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ae17a85d-dcf5-4355-83bb-f55627ff651a/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/26df5fbd-c013-4e22-a9a1-5b69a6b48737/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4f05aecc-edce-4497-a11e-d897449a23fc/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5022a5eb-4922-4290-b1fd-dc3f286501ee/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/05fde115-1ad3-4d02-b48d-7ce0fdd84e79/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a5d01aae-257b-436d-81e5-f5174d488899/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/grid-tide-gridtide-global-espionage-campaign-leveraging-google-sheets-api-for-command-and-control-unc2814</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0f197b8e-008a-47e7-8954-9d7f60903d7c/Figure+1+%E2%80%93+Campaign+Flow+Chart+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c4f300c5-04f5-4c59-9efc-702950d4f9b8/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/78984893-bf89-45c5-83e9-1354366b8fcc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f5065f1-5e94-459a-8a96-266bc4cf29d4/Figure+4+%E2%80%93+Detection+Engineering+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/12335c18-5a38-47a9-bf72-d530581d8515/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/49eecfec-b78d-4ce5-b9f2-5821571494a3/Figure+6+%E2%80%93+Detection+Coverage+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7bb5f767-21e2-497e-9a12-843324499821/Figure+7+%E2%80%93+Detection+Engineering+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e6fe6bf4-01b2-4978-9a2d-abe79f308a7c/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7ab72314-eae8-47cd-b4c8-27f590013c91/Figure+9+-+Post-incident+insights+and+recommendations+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20127-cisco-catalyst-sd-wan-manager-and-controller-authentication-bypass-vulnerability-actively-exploited-in-the-wild</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b5c5c03b-9c81-4d7a-bd55-005cdb7cd88e/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/70f2e2b9-7fa6-4868-815c-115818967c56/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2e65fcf1-d975-4bd2-9ff7-e2e0cd253354/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c8dddf1d-de3e-499c-b5b7-bf90d2886d68/Figure+4+%E2%80%93+Detection+Engineering+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/259a4c6a-8aab-450d-a0b8-9dc4c096cb81/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a62b093b-6a8e-4f7c-9260-1f040727df8c/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f9c5c128-2486-4817-934e-fbfb091d584a/Figure+7+%E2%80%93+Detection+Engineering+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b88db9f8-4efc-491c-8c81-64967cec4f91/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0ec8b012-c7b3-4ebd-8ac4-9d6a6d957f03/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/uat-10027-dohdoor-backdoor-cloudflare-dns-over-https-command-and-control-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0fe61f2f-bc22-4017-8f5e-13ff74eb67c2/Figure+1+Cyber+attack+campaign+flow+chart+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5878b3b7-9c17-4a52-9fd1-55c9c1d29b1c/Figure+2+Cybersecurity+risk+and+financial+impact+dashboard+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e05c59e-2577-4f6a-be53-ae25af87cf9d/Figure+3+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6cbc99d7-2f0d-47fa-950a-789a71e07330/Figure+4+Detection+engineering+matrix+overview+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb345be5-a08a-48d6-9e58-36ff686f3733/Figure+5+IOC+Confidence+and+Hunt+Prioritization+Matrix+overview+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/618ab218-6bbc-485a-9e94-055e8ee49c32/Figure+6+Detection+Coverage+Matrix+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8e0e4416-6447-443c-9a78-5a41cf8fe1d9/Figure+7+Detection+Engineering+Matrix+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f555a633-5dfa-43c8-bd0a-d4bda5c9caa9/Figure+8+Defensive+Control+and+Hardening+Architecture+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/43f3d11a-9d88-4a20-a669-3131c9f1fa95/Figure+9+Post-incident+insights+and+recommendations+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21852-claude-code-pre-trust-configuration-injection-enabling-api-credential-exfiltration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/62f500f5-38f9-429f-87d3-b95f77b4a003/Figure+1+CVE-2026-21852+Cybersecurity+flow+chart+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/de9b4bd9-a86b-4969-a2a8-41b624fa47f5/FIgure+2+CVE-2026-21852+Cybersecurity+risk+impact+dashboard+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b07ddbe4-6162-4ee3-bc54-131ba6bd5e61/Figure+3+CVE-2026-21852+Cybersecurity+attack+flow.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/183fb40e-395b-423c-83a4-79e4ad0779f0/Figure+4+Cybersecurity+detection+engineering+matrix+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/58e29437-d368-4c2c-a3af-724bcd9375fc/Figure+5+CVE-2026-21852+IOC+prioritization+matrix.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/da584c44-183a-4e1e-be53-fbf67843b8b5/Figure+6+Detection+coverage+matrix+analysis+for+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/300b94bc-e673-49fe-8075-4047bd12e859/Figure+7+Detection+engineering+matrix+for+cyber+threat+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/51cacbc7-6e25-4637-a4e7-1562893f9913/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/mercenary-akula-uac-0050-judicial-themed-spearphishing-deploying-rms-against-a-european-financial-institution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/053254fe-9acc-46a6-9e59-2bcb85535970/Figure+2+Cybersecurity+risk+and+impact+overview+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a74bb350-afe1-4096-9a19-c75b0c838a89/Figure+3+MITRE+ATT%26CK+flow+chart+diagram+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0fde0078-5820-4306-8bb4-59959c3137d7/Figure+4+%E2%80%93+Detection+matrix+overview+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1edf22c9-6800-418a-9e9d-414e37ce75bf/Figure+5+Cybersecurity+threat+matrix+and+prioritization+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4f76063-5b9d-4ef9-8cef-0bf8728aac47/Figure+6+Detection+coverage+matrix+for+cyber+threats+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0944449a-10cd-4a63-bcd7-53e322047852/Figure+7+Cybersecurity+detection+engineering+matrix+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/84f34753-feac-4b01-bdf0-3d41b11dbd80/Figure+8+Cybersecurity+defense+framework+infographic+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20045-cisco-unified-communications-unauthenticated-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74f9f15e-0bbc-4f2a-8cc1-13f0f4161052/Figure+1+CVE-2026-20045+campaign+flow+chart.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/60ada5f5-5a91-4968-938d-bd54c9fec7fe/Figure+2+CVE-2026-20045+Cybersecurity+risk+and+mitigation+dashboard.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d5a5f07a-cf73-495e-854b-930bf378b045/Figure+3+CVE-2026-20045+cyber+attack+flow+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eef298c8-d7c2-4284-aa93-d5364ac0f275/Figure+4+CVE-2026-20245+Cybersecurity+detection+engineering+matrix+infographic.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/34238655-77d8-402e-bc23-29a9093d15ed/Figure+5+CVE-2026-20045+Cybersecurity+prioritization+matrix+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7eea220b-8b7c-4f4b-bbc5-0ba472ebb864/Figure+6+CVE-2026-20045+Detection+coverage+matrix+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/059d4754-c689-4817-b862-d01a1d438bb1/Figure+7+CVE-2026-20045+Cybersecurity+detection+engineering+matrix+infographic.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d8261e38-cadb-48de-ab4b-00fd4025a74c/Figure+8+CVE-2026-20045+Cybersecurity+defensive+architecture+diagram.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/keenadu-android-backdoor-mobile-credential-theft-and-persistent-device-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/08561af2-553e-45b6-8dd8-55602a76d025/Figure+1+Keenadu+Android+campaign+flow+chart.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/04fcfe6b-0464-42c7-9f69-91e83e2e43ce/Figure+2+Keenadu+Android+campaign+risk+dashboard.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cbf03f5f-c7bc-45f6-b39a-3ea9c67515a3/Figure+3+Keenadu+Android+malware+attack+flow.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cc8b2e07-d336-4e8f-8a88-97bdb831744b/Figure+4+Keenadu+Android+campaign+detection+matrix.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/72be6ca2-471a-4545-b073-877c082e08c0/Figure+6+Cyber+threat+detection+coverage+matrix+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32edac1e-2b34-4d3a-8d8a-3733c3418498/Figure+6+Cyber+threat+detection+coverage+matrix+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fec52899-0d12-4236-a1a7-af0cd34172f6/Figure+7+Cybersecurity+detection+matrix+for+Keenadu+campaign+.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ca5a4a27-8580-4398-90d6-be08e75ad16c/Figure+8+Cybersecurity+defense+strategies+infographic+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-26119-improper-authentication-privilege-escalation-in-microsoft-windows-admin-center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ecd56d8-f0fa-4240-89f0-35017c6cf485/Figure+1+Campaign+Flow+Chart+CVE-2026-26119.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d45bd0b9-da86-461d-80cd-180f16a577a9/Figure+2+CVE-2026-26119+executive+risk+dashboard.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ac7c7043-da7b-4526-a9a4-2af6ae9002a4/Figure+3+CVE-2026-26119+attack+flow+analysis.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/418cf8e3-8dcd-4691-bdbc-25325d3c7493/Figure+4+Cybersecurity+matrix+for+detection+engineering+CVE-2026-26119+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/406690b0-f045-4855-bb7a-6d0c11d83031/Figure+8+Cybersecurity+hunt+priority+matrix+visualization.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/09730ccf-3ec0-4e41-bb6f-71dbd72afd22/Figure+5+DETECTION+COVERAGE+MATRIX+CVE-2026-26119+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3cf58044-bfb3-48c8-b3a2-e313a5450390/Figure+7+defensive+control+strategy+diagram.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/active-exploitation-of-dell-recoverpoint-for-virtual-machines-hardcoded-credential-vulnerability-cve-2026-22769</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9db6f63-6e17-4021-bd5a-a4c795b486fb/Figure+1+Campaign+Flow+Chart+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/03ea6f40-17a1-4a9b-bb1a-b4e2464cd3e4/Figure+2+Cybersecurity+risk+dashboard+analysis+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c780ce31-6f80-4369-b841-a76e3456c2c5/Figure+3+IOC+Confidence+Matrix+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0dc3599d-994a-4091-9631-7a780e50d577/Figure+4+Cyber+attack+flowchart+MITRE+ATT%26CK+analysis+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7258c60d-e72f-4ece-9d5c-8b254f118386/Figure+5+Detection+Coverage+Matrix+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/graphalgo-fake-recruiter-dev-tasks-seeding-malicious-npm-and-pypi-dependencies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0eccb0e7-d0cb-4d7c-a0c9-ea47efdf4539/Figure+1+Cyber+campaign+flow+chart+infographic+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f809d88-acbe-4fad-9c3f-03a38e01d5fa/Figure+2+Executive+Risk+and+Business+Impact+Dashboard.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/221e3e39-24ad-4015-bd44-f5af25163f9b/Figure+1+Cyber+campaign+flow+chart+infographic+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/15bc2bc7-abee-42f2-b7c1-6db749958a82/Figure+2+MITRE+ATT%26CK+Chain+cyber+attack+stages+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/63b91c35-b48d-42de-80d0-48f08ae8c947/FIgure+3+MITRE+ATT%26CK+chain+cyber+attack+stages+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f8d7d9f-dde4-4640-8de2-e11aae0bc458/Figure+4+Detection+coverage+matrix+overview+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-2441-chrome-use-after-free-zero-day-actively-exploited</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4e4b7e7-218b-44cb-a2e4-343be58055c0/Figure+1+campaign+flow+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 1 Campaign Flow Chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/84c601be-3e54-45cc-ac49-236408a054f1/Figure+2+MITRE+ATT%26CK+%E2%80%9Cattack+chain%E2%80%9D+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE ATT&amp;CK “attack chain” chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0cf0e080-e348-49f8-afdf-c73cdac887c0/Figure+3+TTP+MITRE+ATT%26CK+Chain+flow+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 3 TTP MITRE ATT&amp;CK Chain flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/26b85c69-18a2-4102-85e2-5803c7a52588/Figure+4+Detection+Coverage+Matrix+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20841-windows-notepad-app-remote-code-execution-via-markdown-link-handling-cbbtb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c34343cb-7b84-4442-8fba-36a9529f86c4/Figure+1+Cybersecurity+attack+flow+chart+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 1 Cybersecurity attack flow chart CVE-2026-20700</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/935991b3-e8a6-4077-8604-a0d138be4d8a/Figure+2+MITRE+ATT%26CK+Chain+Mapping+Apple+Game+Center+Logging+Redaction+Vulnerability+%28Sensitive+Information+Disclosure%29++CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE ATT&amp;CK attack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9b56025b-f189-437c-8497-0dd75ba774cf/Figure+3+Figure+3+MITRE+ATT%26CK+attack+chain+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 3 Figure 3 MITRE ATT&amp;CK attack chain CVE-2026-20700</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ac14ecb9-64bc-4955-bac4-3b85dcf9d310/Figure+4+Detection+Coverage+Matrix+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix CVE-2026-20700</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20841-windows-notepad-app-remote-code-execution-via-markdown-link-handling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5ecbc199-6545-44fe-abb4-9e2767996ae6/FIgure+1+Visual+Flow+chart+for+Campaign+flow+chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling++.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 1 campaign flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9d8a1a2e-b44f-4569-b858-705f36a1468c/Figure+2+MITRE+attack+chain+chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3f7b4bac-72a5-4dd3-8d74-98ee64f178f2/FIgure+3+MITRE+Att%26ck+Chain+Chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 3 MITRE ATT&amp;CK Chain</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d2783f03-83dc-4078-8029-677509a5f1ee/Figure+4+Table+Detection+Coverage+Matrix.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 4 Table Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/hackers-actively-scanning-for-beyondtrust-rce-exploit-cve-2026-1731-wejj5</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9fcbce3-e833-40fd-bdb0-960cfda18bb0/Figure+1+visual+flow+chart+for+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eff27a06-58d1-43e9-b114-61ab7f9b3419/Figure+MITRE+attack+chain+chart+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b5e8b042-6640-47dd-a1ea-158e0f04b5c8/Figure+3+TTP+MITRE+Att%26ck+Chain+flow+chart+.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 3 TTP MITRE Att&amp;ck Chain flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32da0d45-8304-4412-858d-791caf7a5a0f/Figure+4+Detection+Coverage+Matrix+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/hackers-actively-scanning-for-beyondtrust-rce-exploit-cve-2026-1731</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6dbd8116-2539-494a-b3c6-4af4c837f5b0/Figure+4++Campaign+flow+chart+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cb1bdb30-1b6c-4a15-88be-98eab8df452a/Figure+1+MITRE+Attack+Chain+Chart+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5d2b90ab-339d-4080-9d39-076588d3b824/Figure+4+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731+Flow+chart.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4aa67013-6f90-4bb8-b5fd-362280b13ae2/Detection+Coverage+Matrix+%28high-level%29+Microsoft+Feb+2026+%E2%80%9C+Six+Actively+Exploited+Zero-Days%E2%80%9D.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/phorpiex-your-document-lnk-phishing-leads-to-global-group-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/730f9fb9-ae9b-4457-8555-1abf217d41a9/Figure+1+MITRE+attack+chain+chart+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 1 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74710028-502a-4ed7-ae94-2201ba434da4/Figure+2+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware++Detection+Coverage+Matrix.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 2 TTP Flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2312cd3d-0b66-4e58-8ac6-bea991d5c076/Figure+2+MITRE+Att%26ck+chain+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 3 MITRE Att&amp;ck chain</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/89b39472-e948-4d0b-b3c3-b5abba24fc41/Figure+4+Detection+Coverage+Matrix+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/microsoft-feb-2026-six-actively-exploited-zero-days-windows/office</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eb1820ea-75b5-4405-845a-d13e3d972750/Figure+1+MITRE+ATT%26CK+attack-chain+chart+Microsoft+Feb+2026+Six+Actively+Exploited+Zero-Days.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e3b7ebc7-a716-4211-9ad7-b6b663de7bd9/MITRE+Attack+chain+Microsoft+Feb+2026+6+Actively+Exploited+Zero-Days.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1f130d90-d35d-4690-a652-3324f97ed6bf/Detection+Coverage+Matrix+%28high-level%29+Microsoft+Feb+2026+%E2%80%9C+Six+Actively+Exploited+Zero-Days%E2%80%9D.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/tlpclear-defense-industrial-base-supply-chain-targeting-via-hiring-contractor-onboarding-and-direct-to-individual-tradecraft-feb-10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d754fe4a-62f5-47d2-86b8-f792bb31db5c/Figure+1+MITRE+ATT%26CK+attack+chain+chart.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 1 MITRE ATT&amp;CK attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4d42fda6-7940-4e24-a625-2b3249d6502f/Supply+Chain+visual++TLP+WHITE+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 2  Supply chain life cycle</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/970d5fff-2b7d-46d6-9eec-d4ede0a39af8/TTP+Flow+chart+TLP+WHITE+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 3 TTP attack cycle</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8e855da6-a65a-42b3-9e2f-b666952177a6/Figure+4+Detection+Coverage+Matrix++TLP+Clear+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/tlpclear-notepad-update-infrastructure-hijack-delivering-chrysalis-lotus-blossom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Infrastructure Hijack delivering Chrysalis (Lotus Blossom) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4a8ae68-15ed-4487-b0a3-8d102715f17c/Notepad%2B%2B+update.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Infrastructure Hijack delivering Chrysalis (Lotus Blossom) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/conduent-data-breach-ransomware-incident-safepay</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Conduent Data Breach - Ransomware Incident (safepay) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-8088-winrar-startup-traversal-exploitation-for-espionage-and-backdoor-deployment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-8088 WinRAR Startup Traversal Exploitation for Espionage and Backdoor Deployment - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/bod-26-02-mitigating-risk-from-end-of-support-edge-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - BOD 26-02 Mitigating Risk From End-of-Support Edge Devices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/interlock-ransomware-hotta-killer-byovd-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Interlock Ransomware "Hotta Killer" BYOVD Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-25140-chainguard-apko-supply-chain-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-25140 Chainguard apko Supply Chain Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-40551-solarwinds-web-help-desk-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-40551 SolarWinds Web Help Desk Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-25253-openclaw-/-moltbot-1-click-rce-via-token-exfil-cswsh</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-25253 OpenClaw / Moltbot “1-Click RCE” via token exfil + CSWSH - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/ai-led-reconnaissance-ransomware-generic-auto-sector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - AI-Led Reconnaissance &amp;amp; Ransomware (Generic Auto Sector) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/notepad-update-hijack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Hijack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/ghidra-themed-macos-crimeware-campaign-amos-lineage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Ghidra-themed macOS Crimeware Campaign (AMOS-lineage) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-15467-openssl-cms-authenvelopeddata-aead-iv-stack-overflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-15467 OpenSSL CMS AuthEnvelopedData AEAD IV stack overflow - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-1281-ivanti-endpoint-manager-mobile-code-injection-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1281 Ivanti Endpoint Manager Mobile Code Injection Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-escan-antivirus-update-infrastructure-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - eScan Antivirus Update Infrastructure Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-mustang-panda-coolclient-espionage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Mustang Panda (COOLCLIENT) Espionage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-24858-improper-access-control-in-fortinet-fortianalyzer-forticloud-sso-authentication-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-24858 Improper access control in Fortinet FortiAnalyzer FortiCloud SSO authentication bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-69263-pnpm-lockfile-integrity-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-69263 PNPM Lockfile Integrity Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multi-stage-amnesia-malware-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multi-Stage Amnesia malware Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-packagegate-javascript-ecosystem-supply-chain-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PackageGate (JavaScript Ecosystem Supply Chain Attacks) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-23760-smartertools-smartermail-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-23760 SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-sandworms-dynowiper-attack-on-polands-power-grid</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Sandworm's DynoWiper Attack on Poland's Power Grid - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-21509-microsoft-office-security-feature-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21509 Microsoft Office Security Feature Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-lazarus-group-fake-font-contagious-interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Lazarus Group "Fake Font" (Contagious Interview) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-emeditor-watering-hole-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - EmEditor Watering Hole Attack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-24061-gnu-inetutils-telnetd-legacy-protocol-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-24061 GNU InetUtils Telnetd Legacy Protocol Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-konni-developer-phishing-ai-enhanced-backdoor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - KONNI Developer Phishing (AI-Enhanced Backdoor) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-osiris-ransomware-new-strain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Osiris Ransomware New Strain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-20045-cisco-unified-communications-products-code-injection-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-lastpass-impersonation-phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - LastPass Impersonation Phishing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-60021-critical-remote-command-injection-vulnerability-in-apache-brpc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-60021 critical remote command injection vulnerability in Apache bRPC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-24085-apple-webkit/safari-active-zero-day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-24085 Apple WebKit/Safari Active Zero Day - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-pdfsider-malware-dll-sideloading-supply-chain-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PDFSider Malware - DLL Sideloading Supply Chain Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-ingram-micro-ransomware-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Ingram Micro Ransomware Breach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-evelyn-stealer-targeting-software-developers-via-vs-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - “Evelyn Stealer “ Targeting Software Developers via VS Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-crashfix-malicious-chrome-extension-targeting-corporate-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CrashFix - Malicious Chrome Extension targeting Corporate Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-boto-cor-de-rosa-whatsapp-web-banking-trojan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Boto Cor-de-Rosa (WhatsApp Web Banking Trojan) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-64155-critical-os-command-injection-vulnerability-in-fortinet-fortsiem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-64155 Critical OS command injection vulnerability in Fortinet FortSIEM - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-0227-critical-dos-vulnerability-palo-alto-networks-pan-os</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-0227 Critical DOS Vulnerability Palo Alto Networks PAN-OS - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-databycloud-campaign-malware-extensions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - DataByCloud Campaign (malware extensions) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-gootloader-evasion-via-massive-zip-concatenation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - GootLoader Evasion via Massive ZIP Concatenation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-23550-modular-ds-wordpress-plugin-authentication-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-23550 Modular DS WordPress Plugin Authentication Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-china-linked-apt-uat-8837-targets-critical-infrastructure-via-sitecore-zero-day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - China-linked APT UAT-8837 Targets Critical Infrastructure via Sitecore Zero-Day - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-karma-medusalocker-encryptionless-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Karma (MedusaLocker) Encryptionless Extortion - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-pluggyape-malware-targeting-ukrainian-defense-forces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PluggyApe Malware Targeting Ukrainian Defense Forces - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-microsoft-cve-2026-20805-and-chained-cve-2026-20871-reportedly-exploited-in-the-wild</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft CVE-2026-20805 and chained CVE-2026-20871 reportedly exploited in the wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-silver-fox-apt-microsoft-teams-lures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Silver Fox APT (Microsoft Teams Lures) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-voidlink-linux-malware-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - VoidLink Linux Malware Framework - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multi-stage-remcos-rat-delivery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multi-Stage Remcos RAT Delivery - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multiple-trend-micro-apex-central-vulnerabilities-released</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multiple Trend Micro Apex Central Vulnerabilities released - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-kimsuky-apt-quishing-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Kimsuky APT Quishing Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-midnight-blizzard-microsoft-email-compromise-follow-on-activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Midnight Blizzard (Microsoft Email Compromise Follow-on Activity) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-21858-and-cve-2026-21877-ni8mare-flaw-in-n8n-automation-tool-disclosure-and-alert</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21858 and CVE-2026-21877 Ni8mare Flaw in n8n Automation Tool (Disclosure and Alert) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-37164-hpe-oneview-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-37164 HPE OneView Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-0625-d-link-discontinued-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-0625 D-Link Discontinued Devices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-sedgwick-government-solutions-ransomware-incident-linked-to-tridentlocker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Sedgwick Government Solutions Ransomware Incident (linked to TridentLocker) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-68668-exploitation-of-n8n-python-code-node-flaw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-68668 exploitation of n8n Python Code Node Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-romanian-water-energy-authorities-ransomware-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Romanian Water &amp;amp; Energy Authorities Ransomware Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-emeditor-software-supply-chain-attack-recap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - EmEditor Software Supply Chain Attack Recap - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-phaltblyx-campaign-targeting-hospitality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PHALT#BLYX Campaign Targeting Hospitality - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-36918-windows-mshtml-platform-rce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-36918 Windows MSHTML Platform RCE - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-xspeeder-sxzos-firmware-rce-cve-2025-54322</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - XSpeeder SXZOS Firmware RCE CVE-2025-54322 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-darkspectre-browser-extension-campaigns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - DarkSpectre Browser Extension Campaigns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-iranian-apt-prince-of-persia-deploying-new-malware-strains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Iranian APT 'Prince of Persia' Deploying New Malware Strains - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-probe-portal-browser-hijacker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Probe Portal browser Hijacker - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2025-52691-smartermail-critical-rce-vulnerability-alert</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-52691 SmarterMail Critical RCE Vulnerability Alert - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-shai-hulud-30-npm-variant-supply-chain-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Shai-Hulud 3.0 NPM Variant Supply Chain Attack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-evasive-panda-apt-activity-mgbot-backdoor-via-dns-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Evasive Panda APT Activity (MgBot Backdoor via DNS Poisoning) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-mongodb-mongobleed-exploitation-cve-2025-14847</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - MongoDB MongoBleed Exploitation CVE-2025-14847 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-langchain-core-vulnerability-exploitation-cve-2025-68664</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - LangChain Core Vulnerability Exploitation CVE-2025-68664 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-webrat-malware-distribution-via-fake-github-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - WebRAT Malware Distribution via Fake GitHub Exploits - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-new-wave-of-shai-hulud-malware-campaign-npm-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a2d36cbe-58b8-4b6d-864b-9a566f684549/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - New Wave of Shai-Hulud Malware Campaign (NPM supply chain) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-macsync-stealer-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - MacSync Stealer Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2023-52163-exploitation-added-to-kev-list-december-22-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-watchguard-firebox-firewall-rce-cve-2025-14733</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-critical-rce-in-react-native-community-cli-cve-2025-11953</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-sonicwall-sma-1000-authorization-bypass-cve-2025-40602</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-active-exploitation-of-cisco-asyncos-zero-day-cve-2025-20393</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-webkit/angle-memory-corruption-cve-2025-14174</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cellik-android-rat-oct-dec-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-russian-gru-campaign-targeting-western-critical-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-zero-day-campaigns-targeting-fortinet-cves-cve-2025-59718-and-cve-2025-59719</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-gentlemen-ransomware-double-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-elf-campaign-targeting-npm-supply-chain-packages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-apples-webkit-cve-2025-43529-actively-exploited-in-targeted-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-phantom-stealer-operation-moneymount-iso</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-chrome-angle-graphics-zero-day-cve-2025-6558</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-wirte-apt-ashen-lepus-espionage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-geoserver-xxe-vulnerability-cve-2025-58360</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-chrome-zero-day-campaign-internal-id-466192044</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-nanoremote-malware-using-google-drive-api-for-c2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-pystorerat-supply-chain-malware-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-marquis-software-ransomware-incident</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-gogs-zero-day-exploitation-cve-2025-8110</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-microsoft-windows-cloud-files-mini-filter-driver-eop-cve-2025-62221</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-storm-0900-xworm-phishing-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-winrar-path-traversal-cve-2025-6218</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-d-link-router-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-array-networks-arrayos-ag-exploitation-cve-2025-66644</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-north-korean-social-engineering-targeting-macos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-rapid-shadowpad-deployment-via-wsus-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2024-3721-tbk-dvr-command-injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-react2shell-/-rsc-deserialization-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-windows-lnk-flaw-campaign-cve-2025-9491</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-openplc-scadabr-cross-site-scripting-vulnerabilityupdate-on-active-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-iran-linked-hackers-deploy-new-muddyviper-backdoor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-android-framework-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-salesforce-gainsight-data-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-valleyrat-job-seeker-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-notepad-malicious-autoupdate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-04-24</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/about-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/about-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
    </image:image>
  </url>
</urlset>

