<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.cyberdax.io/den</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-5281-pre-authentication-rce-enabling-unauthenticated-initial-access-via-network-input-handling-flaw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-04-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Report Type CVE Vulnerability Intelligence Report Threat Category Client-Side Remote Code Execution (Pre-Authentication) Assessment Date April 02, 2026 Primary Impact Domain Endpoint Compromise and User Session Exploitation</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/14f37b9b-577b-4f9a-bea3-9c1220907e72/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1301d134-29f2-4c17-8728-475bf4ffc1a5/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d5ac8431-774c-4584-ac83-7eb3480febd0/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/382632ff-d74a-46ea-8d7e-b3277c8ca768/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5371c4b4-1f92-4228-80f9-f7c6baed356c/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9da3bdab-266d-441f-9a0a-1122069c541e/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b859e395-9478-4941-8a04-1d1127d7d01c/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-5281+Pre-Authentication+RCE+Enabling+Unauthenticated+Initial+Access+via+Network+Input+Handling+Flaw.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-oracle-fusion-middleware-unauthenticated-remote-code-execution-cve-2026-21992</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Report Type CVE Vulnerability Assessment Threat Category Unauthenticated Remote Code Execution (RCE) Assessment Date March 30, 2026 Primary Impact Domain Identity and Middleware Control Systems (Enterprise Identity, Authentication, and Service Integration Layers)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8debab6b-243d-4d88-a674-4fdae34e95c0/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/06cbcc19-8c9a-4a08-910d-a78f6713f7d2/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/40cb873a-9acc-4d9e-b1af-fa374e4b9fcc/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9930ba8c-65e6-476c-b676-f8825f990761/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e03518ff-36fe-4b76-a4de-bb1b9cb0f54e/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/607a16ae-c3f9-4487-ada9-5915b2aa735b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3325ea42-ea3e-408d-b472-51d765e44409/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Oracle+Fusion+Middleware+Unauthenticated+Remote+Code+Execution+CVE-2026-21992.png</image:loc>
      <image:title>CyberDax Den - [CVE] Oracle Fusion Middleware Unauthenticated Remote Code Execution CVE-2026-21992 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-vmware-spring-ai-remote-code-execution-via-prompt-injection-cve-2026-22738</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Application-Layer Remote Code Execution via AI Prompt Injection Assessment Date March 28, 2026 Primary Impact Domain Enterprise Application Security, Identity and Credential Exposure, Sensitive Data Protection, and AI-Driven Service Integrity</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e0262da9-97bb-4ad4-978d-66b8410d9e74/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7c371c17-8c5b-4bc2-9f67-71456c46df84/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d11d0c52-6f1c-4dae-b1c8-b08bdc1ce8e8/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6c0ed38a-2f2b-4bbe-b546-e6770fdadacb/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ec5283c0-59c5-4dbf-b758-d0ebcb91fc1f/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/55115ee5-cdc4-4a60-a5ac-609af776c972/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0a5b1e59-ce21-4d9c-9a63-36dce277ea80/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+VMware+Spring+AI+Remote+Code+Execution+via+Prompt+Injection+%28CVE-2026-22738%29.png</image:loc>
      <image:title>CyberDax Den - [CVE] VMware Spring AI Remote Code Execution via Prompt Injection (CVE-2026-22738) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/sup-trivy-supply-chain-attack-credential-compromise-and-release-channel-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Supply Chain Compromise CI/CD Pipeline Compromise Credential Theft and Identity Abuse Assessment Date March 26, 2020 Primary Impact Domain Software Supply Chain Integrity (CI/CD Ecosystems) Identity and Access Management (Service Accounts, Tokens, Secrets) Cloud and Build Infrastructure Security (AWS, Azure, GCP)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ebe4604f-8188-4400-bf6f-5bef58118e13/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c3376dc3-5d19-442d-a393-f9d2abaa6656/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a6978a7a-2d3d-4575-b15e-f6007f034640/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cd5731b0-c1f0-4fd4-a62b-6f970debe7c7/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/96a57524-ef56-418e-932e-3082d8ef978c/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/54e6f984-986f-4a5d-b574-4835f0d67b0e/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/72693588-f59c-49cf-8e08-a4d5ae491c30/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BSUP%5D+Trivy+Supply+Chain+Attack+Credential+Compromise+and+Release+Channel+Poisoning.png</image:loc>
      <image:title>CyberDax Den - [SUP] Trivy Supply Chain Attack Credential Compromise and Release Channel Poisoning - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-cve-2026-3055-citrix-netscaler-adc-memory-disclosure-unauthenticated-edge-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 26, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e50de025-aa9b-471b-9da4-956a46e83399/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b7cd5671-e62d-426e-a52a-b0eabdc57cb7/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/07a74543-9dae-48a9-bfe2-25e5aed00723/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/39fadfb2-feaf-41ea-82b6-513d13f13607/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6a98397a-df1c-43bf-a1fd-a6cc95169b10/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a9172ea7-63d2-4323-8c5d-a48e7be5f913/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/be4d5a11-d35e-40e6-b56d-1567961e5586/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-3055+Citrix+NetScaler+ADC+Memory+Disclosure+Unauthenticated+Edge+Exploitation.png</image:loc>
      <image:title>CyberDax Den - [CVE] CVE-2026-3055 Citrix NetScaler ADC Memory Disclosure Unauthenticated Edge Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/rules-from-exp-darksword-exploit-framework-multi-stage-exploitation-and-malware-delivery-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 24, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ff2a6bd0-2b2b-441b-9f02-16fe8181849c/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - Rules from EXP DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-darksword-exploit-framework-multi-stage-exploitation-and-malware-delivery-platform</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Exploit Framework Activity Multi-Stage Exploitation Chain Client-Side Exploitation and Malware Delivery Assessment Date March 24, 2026 Primary Impact Domain Endpoint Security (iOS / Mobile Platform) Exploit Chain Execution and Detection Evasion Device-Level Trust Boundaries and Telemetry Visibility</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ff2a6bd0-2b2b-441b-9f02-16fe8181849c/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/31869979-9ae9-4462-a7a8-bd4d722f54f2/Figure+2+%E2%80%94+Campaign+Flow+Chart+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6e752b74-99da-48be-890c-03bc580c9590/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0bce65cc-4971-4d98-8fa0-cc7b749eb9d4/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b3e53a0b-07ef-4039-970f-6fba17b5c68d/Figure+5+%E2%80%94+Detection+Coverage+Matrix+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/015d72fe-7bf1-4e2d-adc7-55908a2bbd04/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f875302-5f75-42dd-81ce-ee21e020510a/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+EXP+DarkSword+Exploit+Framework+Multi-Stage+Exploitation+and+Malware+Delivery+Platform.png</image:loc>
      <image:title>CyberDax Den - [EXP] DarkSword Exploit Framework Multi-Stage Exploitation and Malware Delivery Platform - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-authenticated-command-injection-in-comfast-cf-ac100-management-interface-allowing-device-command-execution-cve-2026-4468</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Network Device Exploitation Authenticated Command Injection Management Interface Abuse Assessment Date March 23, 2026 Primary Impact Domain Network Infrastructure Security Management Plane Exposure Device-Level Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c7df1d46-6d9e-44f2-8bbb-8420be5707e5/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution+.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/574d5fe7-bfb6-452d-a756-3e0e145682c1/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution+.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2a40d1af-b336-422a-b7a7-c59f1cb93eb6/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/14b3051b-5b94-438f-adca-dba1cba6a77c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a6bc7fa7-562b-441f-973c-efd58f071823/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b620eafa-0ccc-4574-86ae-dbea0bb0e1ef/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/545ef24d-de73-47c3-8d62-39d78a32bebc/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+CVE-2026-4468+Authenticated+Command+Injection+in+Comfast+CF-AC100+Management+Interface+Allowing+Device+Command+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Authenticated Command Injection in Comfast CF-AC100 Management Interface Allowing Device Command Execution (CVE-2026-4468) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-cisco-fmc-cve-2026-20131-and-cve-2026-20130-actively-exploited-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign Social Engineering Initial Access Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1940694d-f67f-42ad-8bd8-6f0558614469/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f123451d-4f04-421a-bd4a-b8987ea31548/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6d4aff64-4f7f-4a49-ae6d-2893231861d0/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fd5c6303-3237-4a38-943b-2e180297749b/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/90b2fab5-6cf6-4611-9d69-2ff03655e027/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d53eedf1-04cd-40f0-9429-435e419ca5ab/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c1785fb3-79fb-42c1-a7e8-7882e762f09f/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BCVE%5D+Cisco+FMC+CVE-2026-20131+and+CVE-2026-20130+Actively+Exploited+Remote+Code+Execution.png</image:loc>
      <image:title>CyberDax Den - [CVE] Cisco FMC CVE-2026-20131 and CVE-2026-20130 Actively Exploited Remote Code Execution update from March 6, 2026 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-the-shift-to-behavioral-and-identity-driven-attacks-and-why-siem-detection-fails</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign Social Engineering Initial Access Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f808973-6f0d-4a0f-831d-bcfb6aa9400a/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/332cb447-8d2f-45ee-9984-dba9ee621278/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7341e4c4-25c0-43fd-a4e3-511703e2af6e/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/480dd550-ac00-4937-8cb0-89cae434396c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b7fabab9-9e98-44a8-b6ad-431d9321e8e2/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9b6df24-eec3-41fa-bffe-e4b405213c67/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4ff07215-a7fa-4f04-b2b5-2a019bf0ede5/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+The+Shift+to+Behavioral+and+Identity-Driven+Attacks+and+Why+SIEM+Detection+Fails.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift to Behavioral and Identity-Driven Attacks and Why SIEM Detection Fails - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/exp-the-shift-from-malware-delivery-to-identity-intrusion-in-modern-enterprise-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign / Social Engineering Initial Access / Remote Assistance Tool Abuse Assessment Date March 17, 2026 Primary Impact Domain Enterprise Identity Security and Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74a84c69-7af4-450a-85bd-d927c5b21257/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4ab29a4a-f15a-478b-9e42-700d49e771e8/Figure+2+%E2%80%94+Campaign+Flow+Chart+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/673efa6c-8802-4c1f-8640-31fc9c010da9/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bb02c9e3-1e10-4042-842e-44b54529bb5c/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3c272179-bbed-4616-a871-f45af471791a/Figure+5+%E2%80%94+Detection+Coverage+Matrix+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c61b5690-93c2-433a-845a-e0ab8ace9864/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/dd086b90-ac07-475e-a7a7-2c29d752acae/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+%5BEXP%5D+The+Shift+from+Malware+Delivery+to+Identity+Intrusion+in+Modern+Enterprise+Attacks.png</image:loc>
      <image:title>CyberDax Den - [EXP] The Shift from Malware Delivery to Identity Intrusion in Modern Enterprise Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/idn-storm-1811-identity-intrusion-campaign-abusing-microsoft-teams-social-engineering-and-quick-assist-remote-access</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Report Type Threat Intelligence Assessment Threat Category Identity Intrusion Campaign / Social Engineering Initial Access / Legitimate Remote Assistance Tool Abuse Assessment Date March 16, 2026 Primary Impact Domain Enterprise Identity Security and Endpoint Remote Access Trust Boundaries</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/09d63aaf-d8df-4889-9515-693f39b5c8a9/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9f54756c-a0c5-4d64-a8fc-c707b2e56ec1/Figure+2+%E2%80%94+Campaign+Flow+Chart+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/37c1be95-0a1d-4b48-bd9c-612d4408697f/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3de71bc6-9237-4c06-b471-c6123a54d835/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9ae86b60-c5d8-4a9e-b7b8-2d7a48b2b561/Figure+5+%E2%80%94+Detection+Coverage+Matrix+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9ef614db-1f19-45cb-b2fc-4196d7197298/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access+.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f4b973a9-8b28-4396-9f0d-385ed3301459/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+IDN+Storm-1811+Identity+Intrusion+Campaign+Abusing+Microsoft+Teams+Social+Engineering+and+Quick+Assist+Remote+Access.png</image:loc>
      <image:title>CyberDax Den - IDN Storm-1811 Identity Intrusion Campaign Abusing Microsoft Teams Social Engineering and Quick Assist Remote Access - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/microsoft-windows-routing-and-remote-access-service-remote-code-execution-vulnerabilities-kb508497</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Report Type Vulnerability Intelligence Assessment Threat Category Remote Code Execution / Remote Access Infrastructure Exploitation Assessment Date March 15, 2026 Primary Impact Domain Enterprise Remote Access Infrastructure and Network Perimeter Security</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6e96476c-c1a3-43d9-9fcb-7ac6393a6c65/Figure+1+%E2%80%94+Executive+Risk+%26+Business+Impact+Dashboard+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/45624270-da6d-48fe-8562-db6caf1fc130/Figure+2+%E2%80%94+Campaign+Flow+Chart+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/00b13295-bc36-44b7-af5f-cce6e2d939ac/Figure+3+%E2%80%94+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2ae4d28a-a5df-4524-adba-5b280d1a05fd/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/57ed36e8-58b6-4319-bb52-daa8cca4a168/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4e1e532-3eca-4d87-a307-feddb51da1d1/Figure+5+%E2%80%94+Detection+Coverage+Matrix+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bee726c8-ea94-4c62-97f9-6ae046cf178b/Figure+6+%E2%80%94+Defensive+Control+%26+Hardening+Architecture+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/29912849-8adb-4a76-a523-5926e6b19b26/Figure+7+%E2%80%94+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-25172%2C+CVE-2026-25173%2C+and+CVE-2026-2611+Microsoft+Windows+Routing+and+Remote+Access+Service+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - Microsoft Windows Routing and Remote Access Service Remote Code Execution Vulnerabilities (KB508497) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/chrome-zero-day-pair-cve-2026-3909-cve-2026-3910-enables-remote-browser-exploitation-via-skia-memory-corruption-and-v8-engine-flaws</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ab99bf5-e900-4f84-943b-8ba6c1bb51f4/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaw.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/654262c2-465a-465d-a6a2-4bbbed34ac6a/Figure+2+%E2%80%93+Campaign+Flow+Chart+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws+.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b767b9c7-4c09-4100-8a9f-6d96e80200bb/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bb435ff5-1bfe-4246-bec8-5616ed9a8868/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2b4575a3-3f94-4ddd-b1d6-854ae6ce1068/Figure+5+%E2%80%94+Detection+Coverage+Matrix+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e4bc9d8d-aad2-4e5d-a5c6-7602aa553ac6/Figure+6+%E2%80%94+Detection+Engineering+Matrix+%28Strategic+Layer%29+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b353d667-178b-40da-ae2f-aa14b8365160/Figure+7+%E2%80%94+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws+.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d81cdf60-de5b-417b-917c-cc05685b5f6b/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/07924285-d54a-4cf3-830c-04ee76376884/Figure+9+-+Post-incident+insights+and+recommendations+Chrome+Zero-Day+Pair+%28CVE-2026-3909%2C+CVE-2026-3910%29+Enables+Remote+Browser+Exploitation+via+Skia+Memory+Corruption+and+V8+Engine+Flaws.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fbe0e885-9bb5-4699-b939-e2c34a2f774b/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Chrome Zero-Day Pair (CVE-2026-3909, CVE-2026-3910) Enables Remote Browser Exploitation via Skia Memory Corruption and V8 Engine Flaws - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/credential-theft-campaign-assessment-blacksanta-intrusion-activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/65a26e30-1368-4d7c-9736-c50b5549acac/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4d62c267-751f-46ae-b3c9-5273eaffc65f/Figure+2+%E2%80%93+Campaign+Flow+Chart+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cf40d633-9e62-4153-b9ad-60954b1543d7/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/91424a77-f52f-486d-8964-83cb5f014f09/Figure+4+%E2%80%94+IOC+Confidence+%26+Hunt+Prioritization+Matrix+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/62086d05-823a-4bfa-bad3-b808e89fbbe7/Figure+5+%E2%80%94+Detection+Coverage+Matrix+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/59ef3d82-c4ee-430f-8a75-0714d086a931/Figure+6+%E2%80%94+Detection+Engineering+Matrix+%28Strategic+Layer%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eeea447c-0361-4c30-b382-4d3254a4ac7c/Figure+7+%E2%80%94+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/af2dda2b-0166-4408-8b8a-97b116777c21/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ce8e0f9b-da63-46e3-9801-d9535932d259/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4df62716-a905-4dab-8424-bbf0febcd9ae/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cb000519-593f-4fea-b1e1-2f66fd62162f/Figure+9+-+Post-incident+insights+and+recommendations+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4f6f8338-5074-4aec-ab9d-1ca2ced9eb80/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+Credential+Theft+Campaign+Assessment+BlackSanta+Intrusion+Activity.png</image:loc>
      <image:title>CyberDax Den - Credential Theft Campaign Assessment BlackSanta Intrusion Activity - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/handala-wiper-attack-disrupts-stryker-global-medical-technology-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6d0e3378-6159-44e1-a8b8-20e75623e30f/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Handala+Wiper+Attack+Disrupts+Stryker+Global+Medical+Technology+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cec47cf2-5ba8-412f-87e5-fb049f419edb/Figure+2+%E2%80%93+Campaign+Flow+Chart+Handala+Wiper+Attack+Disrupts+Stryker+Global+Medical+Technology+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - Handala Wiper Attack Disrupts Stryker Global Medical Technology Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21514-and-cve-2026-21513-microsoft-office-mshtml-trust-boundary-bypass-enables-phishing-based-initial-access-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ee880fc-8305-43f9-bd73-702bb477c405/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/85922cf3-badb-45d9-a73b-c9d7e3c511d1/Figure+2+%E2%80%93+Campaign+Flow+Chart+Chart+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2357d503-6f21-45a5-905e-2da5b21071dc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/70e82741-75eb-4cdc-ad12-569cea9760dc/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ea423aa5-ba2b-4034-9e95-54636fd3f8f3/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/554c72b3-053e-4949-9076-fd6c41d06437/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3cf17bc2-9efd-4f14-81b1-30f296851875/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/16301fda-6dac-4310-95f9-e949352efa28/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e61d86cb-eecc-46e0-915f-0839deec2e10/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1e2f4fc5-5560-4568-b84c-1f6b4ed6c087/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-21514+and+CVE-2026-21513+Microsoft+Office+MSHTML+Trust+Boundary+Bypass+Enables+Phishing-Based+Initial+Access+Chain+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21514 and CVE-2026-21513 Microsoft Office MSHTML Trust Boundary Bypass Enables Phishing-Based Initial Access Chain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-1603-administrative-credential-exposure-risk-in-enterprise-management-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/38cfb345-e8ed-4cb7-833c-09573bfd3254/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8fc6d379-962c-4ae3-aa72-2e38d779c42d/Figure+2+%E2%80%93+Campaign+Flow+Chart+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7d2b4ce0-6dd7-4964-8df4-8c4650d48c9b/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cc43502b-2d9b-4cc2-899a-e02437b14638/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e677522-6d9e-4c99-acc0-1c0620b36599/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a480547e-606a-47e2-b456-46bbb263b53e/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/00a9e1c4-7abc-403b-923a-6398ea7098bd/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ed8e2571-1442-41cd-a840-ccd9ae43f0ac/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/73fd1f5d-0007-484a-94b2-9304e0d3c233/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/beab1b80-eff5-4d87-85d1-d208ac6ec8a2/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-1603+Administrative+Credential+Exposure+Risk+in+Enterprise+Management+Infrastructure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1603 Administrative Credential Exposure Risk in Enterprise Management Infrastructure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20079-and-cve-2026-20131-cisco-secure-firewall-management-center-authentication-bypass-and-remote-code-execution-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6fadba0c-2864-4e48-b8e6-b624ca9da44c/Figure+1+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/bcdaa11a-9dc9-42eb-8201-50fb5f11d9e9/Figure+2+%E2%80%93+Campaign+Flow+Chart+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/42552462-984f-41df-9d18-c06fbb240ffa/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fa244d89-60a8-4cf9-a621-4476a3d15915/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/92b0a33d-ce91-40fb-b084-fde3970e69be/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9180f889-5de1-455b-be94-b971dac54985/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/314ab4cd-8a62-4636-ba60-403b5b6cf483/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a7f9441b-ebde-421a-9351-7b7f944820ae/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cf4d9ec7-b921-4d4e-84d1-d0c85f7f3941/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/141277b9-15b1-4390-8a34-dc7e7dced372/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-20079+and+CVE-2026-20131+Cisco+Secure+Firewall+Management+Center+Authentication+Bypass+and+Remote+Code+Execution+Vulnerabilities.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20079 and CVE-2026-20131 Cisco Secure Firewall Management Center Authentication Bypass and Remote Code Execution Vulnerabilities - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/angle-integer-overflow-in-google-chrome-enables-potential-browser-memory-corruption-through-malicious-web-content-cve-2026-3536</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/158ea209-7ee8-4c17-a00e-989de6bf1a4c/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8de5821f-74a0-4bb7-a9fb-b7bc529bc0ff/Figure+1+%E2%80%93+CVE-2026-3536+Campaign+Flow+Chart+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e50b2649-b002-46b4-b33f-6103878816ed/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c45fc9ea-1e20-4923-be63-c362488c745b/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/67dd9055-493f-4665-af4b-b800b3f5ec45/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3329a247-02cd-4677-aed2-ae901be0a9b6/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d054b4d0-7b87-45e0-91a2-621024ead020/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8d3a2af4-3c6f-444c-ad04-d3b7b4faf7f1/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a15e96bf-fc93-4d38-baf6-24aa67b3a6d6/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content+.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/afc6e333-182d-43ce-be11-519777fe7313/Figure+10+%E2%80%93+Attack+Economics+%26+Organizational+Impact+Model+CVE-2026-3536+ANGLE+Integer+Overflow+in+Google+Chrome+Enables+Potential+Browser+Memory+Corruption+Through+Malicious+Web+Content.png</image:loc>
      <image:title>CyberDax Den - ANGLE Integer Overflow in Google Chrome Enables Potential Browser Memory Corruption Through Malicious Web Content (CVE-2026-3536) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-2256-ms-agent-prompt-injection-command-execution-exposure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a838f0b9-87fa-4783-a436-329e1c39cf96/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/69e1e9d2-b821-441d-8397-1fca0d57809b/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c14ae76e-d653-4766-b2c6-8a5fde2b8adc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e2828ca3-bcdd-42e5-a45e-39a33cd4a419/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0dc7b2cf-3482-4941-85a1-609eabfc3c5d/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0985e98b-9869-43a3-b1a4-b23c85a4da09/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c87d7269-7582-4cf4-b8c2-3eea30f71507/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/071f6382-2a90-4900-998a-94c6a69e1ed9/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ea6b83c8-209d-457b-8f20-e127a1de7d46/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-2256+MS-Agent+Prompt+Injection+Command+Execution+Exposure.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2256 MS-Agent Prompt Injection Command Execution Exposure - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21385-qualcomm-display-driver-memory-corruption-zero-day-in-active-targeted-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-03-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/28a163d2-c79f-453a-a010-6d8366d0b104/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/23c48018-1165-4ac0-a453-961e362b38c2/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f939351-b817-414b-b40a-4d0f2f645aea/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ae17a85d-dcf5-4355-83bb-f55627ff651a/Figure+4+%E2%80%93+Detection+Engineering+Matrix+%28Strategic+Layer%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/26df5fbd-c013-4e22-a9a1-5b69a6b48737/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4f05aecc-edce-4497-a11e-d897449a23fc/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5022a5eb-4922-4290-b1fd-dc3f286501ee/Figure+7+%E2%80%93+Detection+Engineering+Matrix+%28Operational+Rule+Layer%29+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/05fde115-1ad3-4d02-b48d-7ce0fdd84e79/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a5d01aae-257b-436d-81e5-f5174d488899/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-21385+Qualcomm+Display+Driver+Memory+Corruption+Zero-Day+in+Active+Targeted+Exploitation.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21385 Qualcomm Display Driver Memory Corruption Zero-Day in Active Targeted Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/grid-tide-gridtide-global-espionage-campaign-leveraging-google-sheets-api-for-command-and-control-unc2814</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0f197b8e-008a-47e7-8954-9d7f60903d7c/Figure+1+%E2%80%93+Campaign+Flow+Chart+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c4f300c5-04f5-4c59-9efc-702950d4f9b8/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/78984893-bf89-45c5-83e9-1354366b8fcc/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f5065f1-5e94-459a-8a96-266bc4cf29d4/Figure+4+%E2%80%93+Detection+Engineering+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/12335c18-5a38-47a9-bf72-d530581d8515/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/49eecfec-b78d-4ce5-b9f2-5821571494a3/Figure+6+%E2%80%93+Detection+Coverage+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7bb5f767-21e2-497e-9a12-843324499821/Figure+7+%E2%80%93+Detection+Engineering+Matrix+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e6fe6bf4-01b2-4978-9a2d-abe79f308a7c/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7ab72314-eae8-47cd-b4c8-27f590013c91/Figure+9+-+Post-incident+insights+and+recommendations+Grid+Tide+%28GRIDTIDE%29+Global+Espionage+Campaign+Leveraging+Google+Sheets+API+for+Command+and+Control+%28UNC2814%29.png</image:loc>
      <image:title>CyberDax Den - Grid Tide (GRIDTIDE) Global Espionage Campaign Leveraging Google Sheets API for Command and Control (UNC2814) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20127-cisco-catalyst-sd-wan-manager-and-controller-authentication-bypass-vulnerability-actively-exploited-in-the-wild</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b5c5c03b-9c81-4d7a-bd55-005cdb7cd88e/Figure+1+%E2%80%93+Campaign+Flow+Chart+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/70f2e2b9-7fa6-4868-815c-115818967c56/Figure+2+%E2%80%93+Executive+Risk+and+Business+Impact+Dashboard+%28includes+Risk+Heat+Map%29+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2e65fcf1-d975-4bd2-9ff7-e2e0cd253354/Figure+3+%E2%80%93+MITRE+ATT%26CK+Chain+Flow+Chart+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c8dddf1d-de3e-499c-b5b7-bf90d2886d68/Figure+4+%E2%80%93+Detection+Engineering+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/259a4c6a-8aab-450d-a0b8-9dc4c096cb81/Figure+5+%E2%80%93+IOC+Confidence+and+Hunt+Prioritization+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a62b093b-6a8e-4f7c-9260-1f040727df8c/Figure+6+%E2%80%93+Detection+Coverage+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f9c5c128-2486-4817-934e-fbfb091d584a/Figure+7+%E2%80%93+Detection+Engineering+Matrix+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b88db9f8-4efc-491c-8c81-64967cec4f91/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0ec8b012-c7b3-4ebd-8ac4-9d6a6d957f03/Figure+9+-+Post-incident+insights+and+recommendations+CVE-2026-20127+Cisco+Catalyst+SD-WAN+Manager+and+Controller+Authentication+Bypass+Vulnerability+Actively+Exploited+in+the+Wild.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20127 Cisco Catalyst SD-WAN Manager and Controller Authentication Bypass Vulnerability Actively Exploited in the Wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/uat-10027-dohdoor-backdoor-cloudflare-dns-over-https-command-and-control-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0fe61f2f-bc22-4017-8f5e-13ff74eb67c2/Figure+1+Cyber+attack+campaign+flow+chart+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5878b3b7-9c17-4a52-9fd1-55c9c1d29b1c/Figure+2+Cybersecurity+risk+and+financial+impact+dashboard+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4e05c59e-2577-4f6a-be53-ae25af87cf9d/Figure+3+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6cbc99d7-2f0d-47fa-950a-789a71e07330/Figure+4+Detection+engineering+matrix+overview+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb345be5-a08a-48d6-9e58-36ff686f3733/Figure+5+IOC+Confidence+and+Hunt+Prioritization+Matrix+overview+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/618ab218-6bbc-485a-9e94-055e8ee49c32/Figure+6+Detection+Coverage+Matrix+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8e0e4416-6447-443c-9a78-5a41cf8fe1d9/Figure+7+Detection+Engineering+Matrix+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/f555a633-5dfa-43c8-bd0a-d4bda5c9caa9/Figure+8+Defensive+Control+and+Hardening+Architecture+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/43f3d11a-9d88-4a20-a669-3131c9f1fa95/Figure+9+Post-incident+insights+and+recommendations+UAT-10027+Dohdoor+Backdoor+%E2%80%93+Cloudflare+DNS+over+HTTPS+Command+and+Control+Campaign+.png</image:loc>
      <image:title>CyberDax Den - UAT-10027 Dohdoor Backdoor – Cloudflare DNS over HTTPS Command and Control Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-21852-claude-code-pre-trust-configuration-injection-enabling-api-credential-exfiltration</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/62f500f5-38f9-429f-87d3-b95f77b4a003/Figure+1+CVE-2026-21852+Cybersecurity+flow+chart+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/de9b4bd9-a86b-4969-a2a8-41b624fa47f5/FIgure+2+CVE-2026-21852+Cybersecurity+risk+impact+dashboard+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b07ddbe4-6162-4ee3-bc54-131ba6bd5e61/Figure+3+CVE-2026-21852+Cybersecurity+attack+flow.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/183fb40e-395b-423c-83a4-79e4ad0779f0/Figure+4+Cybersecurity+detection+engineering+matrix+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/58e29437-d368-4c2c-a3af-724bcd9375fc/Figure+5+CVE-2026-21852+IOC+prioritization+matrix.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/da584c44-183a-4e1e-be53-fbf67843b8b5/Figure+6+Detection+coverage+matrix+analysis+for+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/300b94bc-e673-49fe-8075-4047bd12e859/Figure+7+Detection+engineering+matrix+for+cyber+threat+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/51cacbc7-6e25-4637-a4e7-1562893f9913/Figure+8+%E2%80%93+Defensive+Control+and+Hardening+Architecture+CVE-2026-21852.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21852 Claude Code Pre-Trust Configuration Injection Enabling API Credential Exfiltration - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/mercenary-akula-uac-0050-judicial-themed-spearphishing-deploying-rms-against-a-european-financial-institution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/053254fe-9acc-46a6-9e59-2bcb85535970/Figure+2+Cybersecurity+risk+and+impact+overview+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a74bb350-afe1-4096-9a19-c75b0c838a89/Figure+3+MITRE+ATT%26CK+flow+chart+diagram+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0fde0078-5820-4306-8bb4-59959c3137d7/Figure+4+%E2%80%93+Detection+matrix+overview+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1edf22c9-6800-418a-9e9d-414e37ce75bf/Figure+5+Cybersecurity+threat+matrix+and+prioritization+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4f76063-5b9d-4ef9-8cef-0bf8728aac47/Figure+6+Detection+coverage+matrix+for+cyber+threats+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0944449a-10cd-4a63-bcd7-53e322047852/Figure+7+Cybersecurity+detection+engineering+matrix+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/84f34753-feac-4b01-bdf0-3d41b11dbd80/Figure+8+Cybersecurity+defense+framework+infographic+Mercenary+Akula+%28UAC-0050%29+Judicial-Themed+Spearphishing+Deploying+RMS+Against+a+European+Financial+Institution.png</image:loc>
      <image:title>CyberDax Den - Mercenary Akula (UAC-0050) Judicial-Themed Spearphishing Deploying RMS Against a European Financial Institution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20045-cisco-unified-communications-unauthenticated-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74f9f15e-0bbc-4f2a-8cc1-13f0f4161052/Figure+1+CVE-2026-20045+campaign+flow+chart.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/60ada5f5-5a91-4968-938d-bd54c9fec7fe/Figure+2+CVE-2026-20045+Cybersecurity+risk+and+mitigation+dashboard.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d5a5f07a-cf73-495e-854b-930bf378b045/Figure+3+CVE-2026-20045+cyber+attack+flow+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eef298c8-d7c2-4284-aa93-d5364ac0f275/Figure+4+CVE-2026-20245+Cybersecurity+detection+engineering+matrix+infographic.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/34238655-77d8-402e-bc23-29a9093d15ed/Figure+5+CVE-2026-20045+Cybersecurity+prioritization+matrix+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7eea220b-8b7c-4f4b-bbc5-0ba472ebb864/Figure+6+CVE-2026-20045+Detection+coverage+matrix+overview.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/059d4754-c689-4817-b862-d01a1d438bb1/Figure+7+CVE-2026-20045+Cybersecurity+detection+engineering+matrix+infographic.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d8261e38-cadb-48de-ab4b-00fd4025a74c/Figure+8+CVE-2026-20045+Cybersecurity+defensive+architecture+diagram.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Unauthenticated Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/keenadu-android-backdoor-mobile-credential-theft-and-persistent-device-control</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/08561af2-553e-45b6-8dd8-55602a76d025/Figure+1+Keenadu+Android+campaign+flow+chart.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/04fcfe6b-0464-42c7-9f69-91e83e2e43ce/Figure+2+Keenadu+Android+campaign+risk+dashboard.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cbf03f5f-c7bc-45f6-b39a-3ea9c67515a3/Figure+3+Keenadu+Android+malware+attack+flow.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cc8b2e07-d336-4e8f-8a88-97bdb831744b/Figure+4+Keenadu+Android+campaign+detection+matrix.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/72be6ca2-471a-4545-b073-877c082e08c0/Figure+6+Cyber+threat+detection+coverage+matrix+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32edac1e-2b34-4d3a-8d8a-3733c3418498/Figure+6+Cyber+threat+detection+coverage+matrix+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fec52899-0d12-4236-a1a7-af0cd34172f6/Figure+7+Cybersecurity+detection+matrix+for+Keenadu+campaign+.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ca5a4a27-8580-4398-90d6-be08e75ad16c/Figure+8+Cybersecurity+defense+strategies+infographic+Keenadu+Android+Backdoor+%E2%80%93+Mobile+Credential+Theft+and+Persistent+Device+Control.png</image:loc>
      <image:title>CyberDax Den - Keenadu Android Backdoor – Mobile Credential Theft and Persistent Device Control - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-26119-improper-authentication-privilege-escalation-in-microsoft-windows-admin-center</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6ecd56d8-f0fa-4240-89f0-35017c6cf485/Figure+1+Campaign+Flow+Chart+CVE-2026-26119.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d45bd0b9-da86-461d-80cd-180f16a577a9/Figure+2+CVE-2026-26119+executive+risk+dashboard.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ac7c7043-da7b-4526-a9a4-2af6ae9002a4/Figure+3+CVE-2026-26119+attack+flow+analysis.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/418cf8e3-8dcd-4691-bdbc-25325d3c7493/Figure+4+Cybersecurity+matrix+for+detection+engineering+CVE-2026-26119+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/406690b0-f045-4855-bb7a-6d0c11d83031/Figure+8+Cybersecurity+hunt+priority+matrix+visualization.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/09730ccf-3ec0-4e41-bb6f-71dbd72afd22/Figure+5+DETECTION+COVERAGE+MATRIX+CVE-2026-26119+.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3cf58044-bfb3-48c8-b3a2-e313a5450390/Figure+7+defensive+control+strategy+diagram.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-26119 Improper Authentication Privilege Escalation in Microsoft Windows Admin Center - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/active-exploitation-of-dell-recoverpoint-for-virtual-machines-hardcoded-credential-vulnerability-cve-2026-22769</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9db6f63-6e17-4021-bd5a-a4c795b486fb/Figure+1+Campaign+Flow+Chart+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/03ea6f40-17a1-4a9b-bb1a-b4e2464cd3e4/Figure+2+Cybersecurity+risk+dashboard+analysis+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c780ce31-6f80-4369-b841-a76e3456c2c5/Figure+3+IOC+Confidence+Matrix+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0dc3599d-994a-4091-9631-7a780e50d577/Figure+4+Cyber+attack+flowchart+MITRE+ATT%26CK+analysis+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/7258c60d-e72f-4ece-9d5c-8b254f118386/Figure+5+Detection+Coverage+Matrix+Active+Exploitation+of+Dell+RecoverPoint+for+Virtual+Machines+Hardcoded+Credential+Vulnerability+CVE-2026-22769.png</image:loc>
      <image:title>CyberDax Den - Active Exploitation of Dell RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability CVE-2026-22769 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/graphalgo-fake-recruiter-dev-tasks-seeding-malicious-npm-and-pypi-dependencies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-18</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0eccb0e7-d0cb-4d7c-a0c9-ea47efdf4539/Figure+1+Cyber+campaign+flow+chart+infographic+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8f809d88-acbe-4fad-9c3f-03a38e01d5fa/Figure+2+Executive+Risk+and+Business+Impact+Dashboard.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/221e3e39-24ad-4015-bd44-f5af25163f9b/Figure+1+Cyber+campaign+flow+chart+infographic+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/15bc2bc7-abee-42f2-b7c1-6db749958a82/Figure+2+MITRE+ATT%26CK+Chain+cyber+attack+stages+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/63b91c35-b48d-42de-80d0-48f08ae8c947/FIgure+3+MITRE+ATT%26CK+chain+cyber+attack+stages+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2f8d7d9f-dde4-4640-8de2-e11aae0bc458/Figure+4+Detection+coverage+matrix+overview+Graphalgo+Fake+Recruiter+Dev+Tasks+Seeding+Malicious+npm+and+PyPI+Dependencies.png</image:loc>
      <image:title>CyberDax Den - Graphalgo Fake Recruiter Dev Tasks Seeding Malicious npm and PyPI Dependencies - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-2441-chrome-use-after-free-zero-day-actively-exploited</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4e4b7e7-218b-44cb-a2e4-343be58055c0/Figure+1+campaign+flow+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 1 Campaign Flow Chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/84c601be-3e54-45cc-ac49-236408a054f1/Figure+2+MITRE+ATT%26CK+%E2%80%9Cattack+chain%E2%80%9D+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE ATT&amp;CK “attack chain” chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/0cf0e080-e348-49f8-afdf-c73cdac887c0/Figure+3+TTP+MITRE+ATT%26CK+Chain+flow+chart+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 3 TTP MITRE ATT&amp;CK Chain flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/26b85c69-18a2-4102-85e2-5803c7a52588/Figure+4+Detection+Coverage+Matrix+CVE-2026-2441.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-2441 Chrome Use-After-Free Zero-Day Actively Exploited - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20841-windows-notepad-app-remote-code-execution-via-markdown-link-handling-cbbtb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c34343cb-7b84-4442-8fba-36a9529f86c4/Figure+1+Cybersecurity+attack+flow+chart+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 1 Cybersecurity attack flow chart CVE-2026-20700</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/935991b3-e8a6-4077-8604-a0d138be4d8a/Figure+2+MITRE+ATT%26CK+Chain+Mapping+Apple+Game+Center+Logging+Redaction+Vulnerability+%28Sensitive+Information+Disclosure%29++CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE ATT&amp;CK attack</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9b56025b-f189-437c-8497-0dd75ba774cf/Figure+3+Figure+3+MITRE+ATT%26CK+attack+chain+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 3 Figure 3 MITRE ATT&amp;CK attack chain CVE-2026-20700</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/ac14ecb9-64bc-4955-bac4-3b85dcf9d310/Figure+4+Detection+Coverage+Matrix+CVE-2026-20700.png</image:loc>
      <image:title>CyberDax Den - Apple dyld Memory Corruption Leading to Arbitrary Code Execution (Exploited in the Wild) CVE-2026-20700 - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix CVE-2026-20700</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-20841-windows-notepad-app-remote-code-execution-via-markdown-link-handling</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5ecbc199-6545-44fe-abb4-9e2767996ae6/FIgure+1+Visual+Flow+chart+for+Campaign+flow+chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling++.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 1 campaign flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/9d8a1a2e-b44f-4569-b858-705f36a1468c/Figure+2+MITRE+attack+chain+chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/3f7b4bac-72a5-4dd3-8d74-98ee64f178f2/FIgure+3+MITRE+Att%26ck+Chain+Chart+CVE-2026-20841+Windows+Notepad+App+Remote+Code+Execution+via+Markdown+Link+Handling.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 3 MITRE ATT&amp;CK Chain</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d2783f03-83dc-4078-8029-677509a5f1ee/Figure+4+Table+Detection+Coverage+Matrix.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20841 Windows Notepad App Remote Code Execution via Markdown Link Handling - Make it stand out</image:title>
      <image:caption>Figure 4 Table Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/hackers-actively-scanning-for-beyondtrust-rce-exploit-cve-2026-1731-wejj5</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/c9fcbce3-e833-40fd-bdb0-960cfda18bb0/Figure+1+visual+flow+chart+for+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eff27a06-58d1-43e9-b114-61ab7f9b3419/Figure+MITRE+attack+chain+chart+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 2 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/b5e8b042-6640-47dd-a1ea-158e0f04b5c8/Figure+3+TTP+MITRE+Att%26ck+Chain+flow+chart+.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 3 TTP MITRE Att&amp;ck Chain flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/32da0d45-8304-4412-858d-791caf7a5a0f/Figure+4+Detection+Coverage+Matrix+Deepfake+Zoom+ClickFix+UNC1069+macOS+Crypto+Credential+and+Session+Theft.png</image:loc>
      <image:title>CyberDax Den - Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/hackers-actively-scanning-for-beyondtrust-rce-exploit-cve-2026-1731</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/6dbd8116-2539-494a-b3c6-4af4c837f5b0/Figure+4++Campaign+flow+chart+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/cb1bdb30-1b6c-4a15-88be-98eab8df452a/Figure+1+MITRE+Attack+Chain+Chart+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/5d2b90ab-339d-4080-9d39-076588d3b824/Figure+4+Hackers+Actively+Scanning+for+BeyondTrust+RCE+Exploit+CVE-2026-1731+Flow+chart.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4aa67013-6f90-4bb8-b5fd-362280b13ae2/Detection+Coverage+Matrix+%28high-level%29+Microsoft+Feb+2026+%E2%80%9C+Six+Actively+Exploited+Zero-Days%E2%80%9D.png</image:loc>
      <image:title>CyberDax Den - Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/phorpiex-your-document-lnk-phishing-leads-to-global-group-ransomware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/730f9fb9-ae9b-4457-8555-1abf217d41a9/Figure+1+MITRE+attack+chain+chart+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 1 MITRE attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/74710028-502a-4ed7-ae94-2201ba434da4/Figure+2+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware++Detection+Coverage+Matrix.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 2 TTP Flow chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/2312cd3d-0b66-4e58-8ac6-bea991d5c076/Figure+2+MITRE+Att%26ck+chain+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 3 MITRE Att&amp;ck chain</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/89b39472-e948-4d0b-b3c3-b5abba24fc41/Figure+4+Detection+Coverage+Matrix+Phorpiex+%E2%80%9CYour+Document%E2%80%9D+LNK+Phishing+leads+to+GLOBAL+GROUP+Ransomware+.png</image:loc>
      <image:title>CyberDax Den - Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/microsoft-feb-2026-six-actively-exploited-zero-days-windows/office</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/eb1820ea-75b5-4405-845a-d13e3d972750/Figure+1+MITRE+ATT%26CK+attack-chain+chart+Microsoft+Feb+2026+Six+Actively+Exploited+Zero-Days.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/e3b7ebc7-a716-4211-9ad7-b6b663de7bd9/MITRE+Attack+chain+Microsoft+Feb+2026+6+Actively+Exploited+Zero-Days.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/1f130d90-d35d-4690-a652-3324f97ed6bf/Detection+Coverage+Matrix+%28high-level%29+Microsoft+Feb+2026+%E2%80%9C+Six+Actively+Exploited+Zero-Days%E2%80%9D.png</image:loc>
      <image:title>CyberDax Den - Microsoft Feb 2026 “ Six Actively Exploited Zero-Days” (Windows/Office) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/tlpclear-defense-industrial-base-supply-chain-targeting-via-hiring-contractor-onboarding-and-direct-to-individual-tradecraft-feb-10</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d754fe4a-62f5-47d2-86b8-f792bb31db5c/Figure+1+MITRE+ATT%26CK+attack+chain+chart.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 1 MITRE ATT&amp;CK attack chain chart</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/4d42fda6-7940-4e24-a625-2b3249d6502f/Supply+Chain+visual++TLP+WHITE+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 2  Supply chain life cycle</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/970d5fff-2b7d-46d6-9eec-d4ede0a39af8/TTP+Flow+chart+TLP+WHITE+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 3 TTP attack cycle</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/8e855da6-a65a-42b3-9e2f-b666952177a6/Figure+4+Detection+Coverage+Matrix++TLP+Clear+Defense+Industrial+Base+Supply-Chain+Targeting+via+Hiring%2C+Contractor+Onboarding%2C+and+Direct-to-Individual+Tradecraft.png</image:loc>
      <image:title>CyberDax Den - Defense Industrial Base Supply-Chain Targeting via Hiring, Contractor Onboarding, and Direct-to-Individual Tradecraft - Make it stand out</image:title>
      <image:caption>Figure 4 Detection Coverage Matrix</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/tlpclear-notepad-update-infrastructure-hijack-delivering-chrysalis-lotus-blossom</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Infrastructure Hijack delivering Chrysalis (Lotus Blossom) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/d4a8ae68-15ed-4487-b0a3-8d102715f17c/Notepad%2B%2B+update.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Infrastructure Hijack delivering Chrysalis (Lotus Blossom) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/conduent-data-breach-ransomware-incident-safepay</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Conduent Data Breach - Ransomware Incident (safepay) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-8088-winrar-startup-traversal-exploitation-for-espionage-and-backdoor-deployment</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-8088 WinRAR Startup Traversal Exploitation for Espionage and Backdoor Deployment - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/bod-26-02-mitigating-risk-from-end-of-support-edge-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - BOD 26-02 Mitigating Risk From End-of-Support Edge Devices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/interlock-ransomware-hotta-killer-byovd-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Interlock Ransomware "Hotta Killer" BYOVD Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-25140-chainguard-apko-supply-chain-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-25140 Chainguard apko Supply Chain Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-40551-solarwinds-web-help-desk-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-40551 SolarWinds Web Help Desk Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2026-25253-openclaw-/-moltbot-1-click-rce-via-token-exfil-cswsh</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-25253 OpenClaw / Moltbot “1-Click RCE” via token exfil + CSWSH - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/ai-led-reconnaissance-ransomware-generic-auto-sector</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - AI-Led Reconnaissance &amp;amp; Ransomware (Generic Auto Sector) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/notepad-update-hijack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Notepad++ Update Hijack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/ghidra-themed-macos-crimeware-campaign-amos-lineage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Ghidra-themed macOS Crimeware Campaign (AMOS-lineage) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/cve-2025-15467-openssl-cms-authenvelopeddata-aead-iv-stack-overflow</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-15467 OpenSSL CMS AuthEnvelopedData AEAD IV stack overflow - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-1281-ivanti-endpoint-manager-mobile-code-injection-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-1281 Ivanti Endpoint Manager Mobile Code Injection Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-escan-antivirus-update-infrastructure-compromise</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - eScan Antivirus Update Infrastructure Compromise - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-mustang-panda-coolclient-espionage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Mustang Panda (COOLCLIENT) Espionage - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-24858-improper-access-control-in-fortinet-fortianalyzer-forticloud-sso-authentication-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-24858 Improper access control in Fortinet FortiAnalyzer FortiCloud SSO authentication bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-69263-pnpm-lockfile-integrity-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-69263 PNPM Lockfile Integrity Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multi-stage-amnesia-malware-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multi-Stage Amnesia malware Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-packagegate-javascript-ecosystem-supply-chain-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PackageGate (JavaScript Ecosystem Supply Chain Attacks) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-23760-smartertools-smartermail-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-23760 SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-sandworms-dynowiper-attack-on-polands-power-grid</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Sandworm's DynoWiper Attack on Poland's Power Grid - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-21509-microsoft-office-security-feature-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-02-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21509 Microsoft Office Security Feature Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-lazarus-group-fake-font-contagious-interview</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Lazarus Group "Fake Font" (Contagious Interview) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-emeditor-watering-hole-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - EmEditor Watering Hole Attack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-24061-gnu-inetutils-telnetd-legacy-protocol-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-24061 GNU InetUtils Telnetd Legacy Protocol Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-konni-developer-phishing-ai-enhanced-backdoor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - KONNI Developer Phishing (AI-Enhanced Backdoor) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-osiris-ransomware-new-strain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Osiris Ransomware New Strain - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-20045-cisco-unified-communications-products-code-injection-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-lastpass-impersonation-phishing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - LastPass Impersonation Phishing - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-60021-critical-remote-command-injection-vulnerability-in-apache-brpc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-60021 critical remote command injection vulnerability in Apache bRPC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-24085-apple-webkit/safari-active-zero-day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-24085 Apple WebKit/Safari Active Zero Day - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-pdfsider-malware-dll-sideloading-supply-chain-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PDFSider Malware - DLL Sideloading Supply Chain Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-ingram-micro-ransomware-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Ingram Micro Ransomware Breach - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-evelyn-stealer-targeting-software-developers-via-vs-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - “Evelyn Stealer “ Targeting Software Developers via VS Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-crashfix-malicious-chrome-extension-targeting-corporate-environments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CrashFix - Malicious Chrome Extension targeting Corporate Environments - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-boto-cor-de-rosa-whatsapp-web-banking-trojan</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Boto Cor-de-Rosa (WhatsApp Web Banking Trojan) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-64155-critical-os-command-injection-vulnerability-in-fortinet-fortsiem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-64155 Critical OS command injection vulnerability in Fortinet FortSIEM - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-0227-critical-dos-vulnerability-palo-alto-networks-pan-os</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-0227 Critical DOS Vulnerability Palo Alto Networks PAN-OS - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-databycloud-campaign-malware-extensions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - DataByCloud Campaign (malware extensions) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-gootloader-evasion-via-massive-zip-concatenation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - GootLoader Evasion via Massive ZIP Concatenation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-23550-modular-ds-wordpress-plugin-authentication-bypass</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-23550 Modular DS WordPress Plugin Authentication Bypass - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-china-linked-apt-uat-8837-targets-critical-infrastructure-via-sitecore-zero-day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - China-linked APT UAT-8837 Targets Critical Infrastructure via Sitecore Zero-Day - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-karma-medusalocker-encryptionless-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Karma (MedusaLocker) Encryptionless Extortion - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-pluggyape-malware-targeting-ukrainian-defense-forces</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PluggyApe Malware Targeting Ukrainian Defense Forces - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-microsoft-cve-2026-20805-and-chained-cve-2026-20871-reportedly-exploited-in-the-wild</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Microsoft CVE-2026-20805 and chained CVE-2026-20871 reportedly exploited in the wild - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-silver-fox-apt-microsoft-teams-lures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Silver Fox APT (Microsoft Teams Lures) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-voidlink-linux-malware-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - VoidLink Linux Malware Framework - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multi-stage-remcos-rat-delivery</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multi-Stage Remcos RAT Delivery - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-multiple-trend-micro-apex-central-vulnerabilities-released</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Multiple Trend Micro Apex Central Vulnerabilities released - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-kimsuky-apt-quishing-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Kimsuky APT Quishing Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-midnight-blizzard-microsoft-email-compromise-follow-on-activity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Midnight Blizzard (Microsoft Email Compromise Follow-on Activity) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-21858-and-cve-2026-21877-ni8mare-flaw-in-n8n-automation-tool-disclosure-and-alert</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-21858 and CVE-2026-21877 Ni8mare Flaw in n8n Automation Tool (Disclosure and Alert) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-37164-hpe-oneview-remote-code-execution</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-37164 HPE OneView Remote Code Execution - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2026-0625-d-link-discontinued-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2026-0625 D-Link Discontinued Devices - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-sedgwick-government-solutions-ransomware-incident-linked-to-tridentlocker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Sedgwick Government Solutions Ransomware Incident (linked to TridentLocker) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-68668-exploitation-of-n8n-python-code-node-flaw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-68668 exploitation of n8n Python Code Node Flaw - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-romanian-water-energy-authorities-ransomware-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Romanian Water &amp;amp; Energy Authorities Ransomware Attacks - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-emeditor-software-supply-chain-attack-recap</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - EmEditor Software Supply Chain Attack Recap - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-phaltblyx-campaign-targeting-hospitality</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - PHALT#BLYX Campaign Targeting Hospitality - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-cve-2025-36918-windows-mshtml-platform-rce</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-36918 Windows MSHTML Platform RCE - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-xspeeder-sxzos-firmware-rce-cve-2025-54322</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - XSpeeder SXZOS Firmware RCE CVE-2025-54322 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2026-01-darkspectre-browser-extension-campaigns</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - DarkSpectre Browser Extension Campaigns - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-iranian-apt-prince-of-persia-deploying-new-malware-strains</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Iranian APT 'Prince of Persia' Deploying New Malware Strains - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-probe-portal-browser-hijacker</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Probe Portal browser Hijacker - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2025-52691-smartermail-critical-rce-vulnerability-alert</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - CVE-2025-52691 SmarterMail Critical RCE Vulnerability Alert - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-shai-hulud-30-npm-variant-supply-chain-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Shai-Hulud 3.0 NPM Variant Supply Chain Attack - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-evasive-panda-apt-activity-mgbot-backdoor-via-dns-poisoning</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - Evasive Panda APT Activity (MgBot Backdoor via DNS Poisoning) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-mongodb-mongobleed-exploitation-cve-2025-14847</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - MongoDB MongoBleed Exploitation CVE-2025-14847 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-langchain-core-vulnerability-exploitation-cve-2025-68664</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - LangChain Core Vulnerability Exploitation CVE-2025-68664 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-webrat-malware-distribution-via-fake-github-exploits</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/820ad56a-8780-4488-b534-45205874b9f1/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - WebRAT Malware Distribution via Fake GitHub Exploits - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-new-wave-of-shai-hulud-malware-campaign-npm-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/a2d36cbe-58b8-4b6d-864b-9a566f684549/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - New Wave of Shai-Hulud Malware Campaign (NPM supply chain) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-macsync-stealer-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
      <image:title>CyberDax Den - MacSync Stealer Campaign - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2023-52163-exploitation-added-to-kev-list-december-22-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-watchguard-firebox-firewall-rce-cve-2025-14733</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-critical-rce-in-react-native-community-cli-cve-2025-11953</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-sonicwall-sma-1000-authorization-bypass-cve-2025-40602</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-active-exploitation-of-cisco-asyncos-zero-day-cve-2025-20393</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-webkit/angle-memory-corruption-cve-2025-14174</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cellik-android-rat-oct-dec-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-russian-gru-campaign-targeting-western-critical-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-zero-day-campaigns-targeting-fortinet-cves-cve-2025-59718-and-cve-2025-59719</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-gentlemen-ransomware-double-extortion</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-elf-campaign-targeting-npm-supply-chain-packages</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-apples-webkit-cve-2025-43529-actively-exploited-in-targeted-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-phantom-stealer-operation-moneymount-iso</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-chrome-angle-graphics-zero-day-cve-2025-6558</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-wirte-apt-ashen-lepus-espionage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-geoserver-xxe-vulnerability-cve-2025-58360</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-chrome-zero-day-campaign-internal-id-466192044</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-nanoremote-malware-using-google-drive-api-for-c2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-pystorerat-supply-chain-malware-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-marquis-software-ransomware-incident</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-gogs-zero-day-exploitation-cve-2025-8110</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-microsoft-windows-cloud-files-mini-filter-driver-eop-cve-2025-62221</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-storm-0900-xworm-phishing-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-winrar-path-traversal-cve-2025-6218</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-d-link-router-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-array-networks-arrayos-ag-exploitation-cve-2025-66644</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-north-korean-social-engineering-targeting-macos</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-rapid-shadowpad-deployment-via-wsus-vulnerability</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-cve-2024-3721-tbk-dvr-command-injection</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-react2shell-/-rsc-deserialization-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-windows-lnk-flaw-campaign-cve-2025-9491</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-openplc-scadabr-cross-site-scripting-vulnerabilityupdate-on-active-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-iran-linked-hackers-deploy-new-muddyviper-backdoor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-google-android-framework-vulnerabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-salesforce-gainsight-data-breach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-valleyrat-job-seeker-campaign</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/den/2025-12-notepad-malicious-autoupdate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.cyberdax.io/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/6931bf6078632b5f5704b884/fb93f05b-589e-4b82-97fa-5dbacfe89234/Logo+T10.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.cyberdax.io/about-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-16</lastmod>
  </url>
</urlset>

