<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">

    <url>
      <loc>https://www.satyamrastogi.com/blog/drift-285-million-north-korean-admin-key-compromise-vault-attack/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-03T15:34:14.238Z</news:publication_date>
        <news:title>Drift $285M Heist: North Korean Admin Key Compromise &amp; Vault Drainage</news:title>
        <news:keywords>north korea, defi, cryptocurrency, admin key compromise, multi-signature bypass, vault extraction, credential management, apt, financial crime, blockchain security</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/drift-285-million-north-korean-admin-key-compromise-vault-attack-iC9A1H1Ogl9sI7yBWEsWO8UI7YcJBs.png</image:loc>
        <image:title>Drift $285M Heist: North Korean Admin Key Compromise &amp; Vault Drainage</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/multi-extortion-ransomware-data-exfiltration-attack-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-03T15:32:49.851Z</news:publication_date>
        <news:title>Multi-Extortion Ransomware: Data Exfiltration as Leverage</news:title>
        <news:keywords>ransomware, multi-extortion, data-exfiltration, threat-actors, incident-response, detection-evasion, ttp-analysis, endpoint-security, network-defense, cyber-insurance</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-extortion-ransomware-data-exfiltration-attack-ttps-R1PsV8yppeiuC5psvKo0uuzmrQx2KE.png</image:loc>
        <image:title>Multi-Extortion Ransomware: Data Exfiltration as Leverage</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/teampcp-european-commission-breach-30-eu-entities-cloud-attack/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-03T09:42:20.564Z</news:publication_date>
        <news:title>TeamPCP European Commission Breach: 30 EU Entities Compromised</news:title>
        <news:keywords>cloud-security, advanced-persistent-threat, breach-analysis, european-union, lateral-movement, federation-abuse, credential-compromise, supply-chain-attack, incident-response, zero-trust</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/teampcp-european-commission-breach-30-eu-entities-cloud-attack-KKSkzGQq53ULRUG2r8l5QrDScbBP8X.png</image:loc>
        <image:title>TeamPCP European Commission Breach: 30 EU Entities Compromised</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/black-hat-usa-2026-advanced-exploitation-techniques-zero-day-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-03T05:12:41.169Z</news:publication_date>
        <news:title>Black Hat USA 2026: Advanced Exploitation Techniques &amp; Zero-Day TTPs</news:title>
        <news:keywords>black-hat-usa-2026, zero-day-exploitation, supply-chain-compromise, ics-security, build-pipeline-security, privilege-escalation, exploitation-automation, red-team-ttps</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/black-hat-usa-2026-advanced-exploitation-techniques-zero-day-ttps-WmefADDp9WkbdkfCbfKatk9dNGjHSw.png</image:loc>
        <image:title>Black Hat USA 2026: Advanced Exploitation Techniques &amp; Zero-Day TTPs</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/black-hat-usa-2026-offensive-security-tactics-exploitation-trends/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T21:43:03.795Z</news:publication_date>
        <news:title>Black Hat USA 2026: Offensive Security Tactics &amp; Exploitation Trends</news:title>
        <news:keywords>black hat usa, ai-powered attacks, supply chain exploitation, ot security, behavioral evasion, threat actor ttps, firmware compromise, industrial control systems, authentication bypass, apt capabilities</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/black-hat-usa-2026-offensive-security-tactics-exploitation-trends-KdeXKHqKQ20fwQGH59TOf6wZOmKkws.png</image:loc>
        <image:title>Black Hat USA 2026: Offensive Security Tactics &amp; Exploitation Trends</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/hasbro-breach-supply-chain-ot-attack-surface-analysis/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T21:29:56.477Z</news:publication_date>
        <news:title>Hasbro Breach: Supply Chain &amp; OT Attack Surface Analysis</news:title>
        <news:keywords>supply-chain-attack, manufacturing-security, ot-network-compromise, business-continuity, lateral-movement, incident-response, fortune-500-breach, erp-security, backup-infrastructure, it-ot-segmentation</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/hasbro-breach-supply-chain-ot-attack-surface-analysis-4YXAHRyDS2TF5PQo7ENe8OAn9w2Uli.png</image:loc>
        <image:title>Hasbro Breach: Supply Chain &amp; OT Attack Surface Analysis</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/claude-code-leaked-source-github-exposure-opsec-failure-analysis/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T20:45:55.165Z</news:publication_date>
        <news:title>Claude Code Leaked Source: GitHub Exposure &amp; OPSEC Failure Analysis</news:title>
        <news:keywords>source code exposure, github security, api security, cloud ai risks, opsec failure, incident response, credential compromise, supply chain attack, threat intelligence</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/claude-code-leaked-source-github-exposure-opsec-WlwAjVr5UrtfNfFSQot8chYKwq1TYe.png</image:loc>
        <image:title>Claude Code Leaked Source: GitHub Exposure &amp; OPSEC Failure Analysis</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/whatsapp-lockdown-pdf-scam-attack-chain-apk-malware-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T20:09:07.484Z</news:publication_date>
        <news:title>WhatsApp Lockdown PDF Scam: Attack Chain Analysis &amp; APK Malware TTPs</news:title>
        <news:keywords>whatsapp scam, apk malware, phishing, mobile security, india cyber threat, social engineering, android malware</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/whatsapp-lockdown-pdf-scam-attack-chain-apk-malware-ttps-P0Ne11bnXJiOfEVpLF92x3I2iGUKvk.png</image:loc>
        <image:title>WhatsApp Lockdown PDF Scam: Attack Chain Analysis &amp; APK Malware TTPs</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/f5-big-ip-apm-rce-14k-exposed-instances-active-exploitation/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T20:07:51.254Z</news:publication_date>
        <news:title>F5 BIG-IP APM RCE: 14K+ Exposed Instances Under Active Exploitation</news:title>
        <news:keywords>f5 big-ip apm, rce, pre-authentication, exploitation, apm infrastructure, vpn security, supply chain attack, mass exploitation, network access, vulnerability management</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/f5-big-ip-apm-rce-14k-exposed-instances-active-exploitation-YnMsS5x3k6QGd8KoRFWvgcbdMjZ0Ia.png</image:loc>
        <image:title>F5 BIG-IP APM RCE: 14K+ Exposed Instances Under Active Exploitation</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/axios-npm-supply-chain-attack-sapphire-sleet-rat-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T19:25:31.846Z</news:publication_date>
        <news:title>Axios npm Supply Chain Attack: Sapphire Sleet RAT Deployment TTP Analysis</news:title>
        <news:keywords>npm, supply chain, dprk, sapphire sleet, malware, rat, maintainer compromise, postinstall hooks, package poisoning, edr detection</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/axios-npm-supply-chain-attack-sapphire-sleet-rat-ttps-6TkOdfxHGBwIufUDPQhhpEN1TIOrkP.png</image:loc>
        <image:title>Axios npm Supply Chain Attack: Sapphire Sleet RAT Deployment TTP Analysis</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/progress-sharefile-pre-auth-rce-vulnerability-chain-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T19:11:54.789Z</news:publication_date>
        <news:title>Progress ShareFile Pre-Auth RCE: Vulnerability Chain Attack TTPs</news:title>
        <news:keywords>progress-sharefile, pre-auth-rce, vulnerability-chain, cve-2026, enterprise-security, file-transfer-security, attack-ttps, red-team, exploit-development</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/progress-sharefile-pre-auth-rce-vulnerability-chain-ttps-JED4MJ5GQCbnl9adJh60yCFdcj7WnH.png</image:loc>
        <image:title>Progress ShareFile Pre-Auth RCE: Vulnerability Chain Attack TTPs</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/residential-proxies-ip-reputation-evasion-attack-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T19:09:47.955Z</news:publication_date>
        <news:title>Residential Proxies: IP Reputation Evasion at 78% Success Rate</news:title>
        <news:keywords>residential proxies, ip evasion, credential stuffing, authentication bypass, threat intelligence, account takeover, detection evasion, attack infrastructure</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/residential-proxies-ip-reputation-evasion-attack-ttps-mqXibmWXlmfo9b8vbAfxBYFgdhmOTW.png</image:loc>
        <image:title>Residential Proxies: IP Reputation Evasion at 78% Success Rate</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/rsac-2026-ai-geopolitical-threat-convergence-attack-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T19:01:01.693Z</news:publication_date>
        <news:title>RSAC 2026 AI-Geopolitical Threat Convergence: Attack TTPs Revealed</news:title>
        <news:keywords>ai security, geopolitical threats, nation-state actors, rsac, advanced persistent threats, supply chain security, critical infrastructure</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/rsac-2026-ai-geopolitical-threat-convergence-attack-ttps-8x3cAUT2KTjT0loYWntlmdi9Kd3Tfb.png</image:loc>
        <image:title>RSAC 2026 AI-Geopolitical Threat Convergence: Attack TTPs Revealed</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/rsac-2026-threat-analysis-ai-powered-geopolitical-cyber-ttps/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T19:00:42.933Z</news:publication_date>
        <news:title>RSAC 2026 Threat Analysis: AI-Powered Geopolitical Cyber TTPs</news:title>
        <news:keywords>ai, threat intelligence, nation state, rsac, geopolitical, machine learning, advanced persistent threat</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/rsac-2026-threat-analysis-ai-powered-geopolitical-cyber-ttps-ED4EJdhKeC1APBl2kVUHF4CkzdAmqm.png</image:loc>
        <image:title>RSAC 2026 Threat Analysis: AI-Powered Geopolitical Cyber TTPs</image:title>
      </image:image>
    </url>
    <url>
      <loc>https://www.satyamrastogi.com/blog/yokogawa-centum-vp-industrial-control-system-authentication-bypass/</loc>
      <news:news>
        <news:publication>
          <news:name>Satyam Rastogi Cybersecurity</news:name>
          <news:language>en</news:language>
        </news:publication>
        <news:publication_date>2026-04-02T18:49:12.091Z</news:publication_date>
        <news:title>Yokogawa CENTUM VP: Industrial Control System Authentication Bypass</news:title>
        <news:keywords>ics security, scada, industrial control systems, yokogawa, authentication bypass, ot security, critical infrastructure, cisa alert</news:keywords>
      </news:news>
      <image:image>
        <image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/yokogawa-centum-vp-industrial-control-system-authentication-bypass-4U8Y1nlEYdiFiBgFLd4rbhV403PbnN.png</image:loc>
        <image:title>Yokogawa CENTUM VP: Industrial Control System Authentication Bypass</image:title>
      </image:image>
    </url>
</urlset>