<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://www.satyamrastogi.com/</loc>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-cybersecurity-expert.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-vciso-consultant.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyamrastogi.png</image:loc>
</image:image>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/about/</loc>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-cybersecurity-expert.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-vciso-consultant.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyamrastogi.png</image:loc>
</image:image>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/profile/</loc>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-cybersecurity-expert.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyam-rastogi-vciso-consultant.png</image:loc>
</image:image>
<image:image>
<image:loc>https://www.satyamrastogi.com/satyamrastogi.png</image:loc>
</image:image>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/contact/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/</loc>
<lastmod>2026-04-03T15:34:14.238Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/</loc>
<lastmod>2026-04-03T08:52:43.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/faq/</loc>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/security-insights/</loc>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/vciso/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/penetration-testing/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/red-team/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/compliance/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/cloud-security/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/services/ai-security/</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/methodology/</loc>
<lastmod>2026-01-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/llm-redteam/</loc>
<lastmod>2026-02-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/what-is-hacking/</loc>
<lastmod>2026-01-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/darkweb-search/</loc>
<lastmod>2026-02-03T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/cve-database/</loc>
<lastmod>2026-02-01T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/resources/cors-poc-generator/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/resources/clickjacking/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/resources/red-team-cheatsheet/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/resources/hall-of-fame/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/http-request/</loc>
<lastmod>2026-01-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/privacy-policy/</loc>
<lastmod>2026-01-01T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/terms-of-service/</loc>
<lastmod>2026-02-05T00:00:00.000Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/feed.xml</loc>
<lastmod>2026-04-03T15:34:14.238Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/atom.xml</loc>
<lastmod>2026-04-03T15:34:14.238Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/red-team%7Cthreat-intelligence/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/red-team/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/threat-intelligence/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/red-team%7Cthreat-intelligence%7Cvulnerability-management/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/vulnerability-management/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/cloud-security/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/cybersecurity-%26-red-teaming/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/zero-trust-%26-cloudflare-security/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/category/ai-driven-red-teaming-%26-agentic-ai-security/</loc>
<lastmod>2026-04-03T21:01:43.537Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/drift-285-million-north-korean-admin-key-compromise-vault-attack/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/drift-285-million-north-korean-admin-key-compromise-vault-attack-iC9A1H1Ogl9sI7yBWEsWO8UI7YcJBs.png</image:loc>
</image:image>
<lastmod>2026-04-03T15:34:14.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-extortion-ransomware-data-exfiltration-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-extortion-ransomware-data-exfiltration-attack-ttps-R1PsV8yppeiuC5psvKo0uuzmrQx2KE.png</image:loc>
</image:image>
<lastmod>2026-04-03T15:32:49.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/teampcp-european-commission-breach-30-eu-entities-cloud-attack/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/teampcp-european-commission-breach-30-eu-entities-cloud-attack-KKSkzGQq53ULRUG2r8l5QrDScbBP8X.png</image:loc>
</image:image>
<lastmod>2026-04-03T13:59:55.037Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/black-hat-usa-2026-advanced-exploitation-techniques-zero-day-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/black-hat-usa-2026-advanced-exploitation-techniques-zero-day-ttps-WmefADDp9WkbdkfCbfKatk9dNGjHSw.png</image:loc>
</image:image>
<lastmod>2026-04-03T05:12:41.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/black-hat-usa-2026-offensive-security-tactics-exploitation-trends/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/black-hat-usa-2026-offensive-security-tactics-exploitation-trends-KdeXKHqKQ20fwQGH59TOf6wZOmKkws.png</image:loc>
</image:image>
<lastmod>2026-04-02T21:43:03.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/hasbro-breach-supply-chain-ot-attack-surface-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/hasbro-breach-supply-chain-ot-attack-surface-analysis-4YXAHRyDS2TF5PQo7ENe8OAn9w2Uli.png</image:loc>
</image:image>
<lastmod>2026-04-02T21:29:56.479Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/claude-code-leaked-source-github-exposure-opsec-failure-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/claude-code-leaked-source-github-exposure-opsec-WlwAjVr5UrtfNfFSQot8chYKwq1TYe.png</image:loc>
</image:image>
<lastmod>2026-04-02T20:45:58.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/whatsapp-lockdown-pdf-scam-attack-chain-apk-malware-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/whatsapp-lockdown-pdf-scam-attack-chain-apk-malware-ttps-P0Ne11bnXJiOfEVpLF92x3I2iGUKvk.png</image:loc>
</image:image>
<lastmod>2026-04-02T20:09:07.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/f5-big-ip-apm-rce-14k-exposed-instances-active-exploitation/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/f5-big-ip-apm-rce-14k-exposed-instances-active-exploitation-YnMsS5x3k6QGd8KoRFWvgcbdMjZ0Ia.png</image:loc>
</image:image>
<lastmod>2026-04-02T20:07:51.255Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/axios-npm-supply-chain-attack-sapphire-sleet-rat-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/axios-npm-supply-chain-attack-sapphire-sleet-rat-ttps-6TkOdfxHGBwIufUDPQhhpEN1TIOrkP.png</image:loc>
</image:image>
<lastmod>2026-04-02T19:25:31.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/progress-sharefile-pre-auth-rce-vulnerability-chain-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/progress-sharefile-pre-auth-rce-vulnerability-chain-ttps-JED4MJ5GQCbnl9adJh60yCFdcj7WnH.png</image:loc>
</image:image>
<lastmod>2026-04-02T19:11:54.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/residential-proxies-ip-reputation-evasion-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/residential-proxies-ip-reputation-evasion-attack-ttps-mqXibmWXlmfo9b8vbAfxBYFgdhmOTW.png</image:loc>
</image:image>
<lastmod>2026-04-02T19:09:47.957Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/rsac-2026-ai-geopolitical-threat-convergence-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/rsac-2026-ai-geopolitical-threat-convergence-attack-ttps-8x3cAUT2KTjT0loYWntlmdi9Kd3Tfb.png</image:loc>
</image:image>
<lastmod>2026-04-02T19:01:01.694Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/rsac-2026-threat-analysis-ai-powered-geopolitical-cyber-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/rsac-2026-threat-analysis-ai-powered-geopolitical-cyber-ttps-ED4EJdhKeC1APBl2kVUHF4CkzdAmqm.png</image:loc>
</image:image>
<lastmod>2026-04-02T19:00:42.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/yokogawa-centum-vp-industrial-control-system-authentication-bypass/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/yokogawa-centum-vp-industrial-control-system-authentication-bypass-4U8Y1nlEYdiFiBgFLd4rbhV403PbnN.png</image:loc>
</image:image>
<lastmod>2026-04-02T18:49:12.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/municipal-officials-phishing-government-authority-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/municipal-officials-phishing-government-authority-ttps-KuqfbOuYlVEz4jwfNTQsxsml7SZrTM.png</image:loc>
</image:image>
<lastmod>2026-03-09T21:25:44.621Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/municipal-permit-phishing-government-impersonation-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/municipal-permit-phishing-government-impersonation-attack-ttps-WrbqpoZVIiuoI4QuvKlD7uVVPpP1o3.png</image:loc>
</image:image>
<lastmod>2026-03-09T15:51:05.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/eu-bank-refund-policy-phishing-attack-ttps-financial-impact/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/eu-bank-refund-policy-phishing-attack-ttps-financial-impact-l7HXfnMf9vYsUAyACa8ShsBOuAfAIg.png</image:loc>
</image:image>
<lastmod>2026-03-08T21:30:28.835Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisco-sd-wan-cve-2024-20127-mass-exploitation-attack-chain-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisco-sd-wan-cve-2024-20127-mass-exploitation-attack-chain-ttps-PxFYiSTJ9xvufOLUrYgCuqKhewYtOG.png</image:loc>
</image:image>
<lastmod>2026-03-08T21:16:41.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/pentagon-ai-autonomy-weaponized-ml-infrastructure-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/pentagon-ai-autonomy-weaponized-ml-infrastructure-attack-ttps-ykaAbuQcJVe6UsKDgJqYq3AjLIdofF.png</image:loc>
</image:image>
<lastmod>2026-03-08T15:16:46.727Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/armorcode-funding-exposure-management-platform-attack-vectors/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/armorcode-funding-exposure-management-platform-attack-vectors-Renvc3vm3cZ6YRYEr8nOEwq0FX1mXW.png</image:loc>
</image:image>
<lastmod>2026-03-08T15:14:28.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dprk-ai-enhanced-it-worker-infiltration-social-engineering-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dprk-ai-enhanced-it-worker-infiltration-social-engineering-ttps-NAZL5amebz7D3xVUvuJQLupNf9oOub.png</image:loc>
</image:image>
<lastmod>2026-03-08T09:25:19.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/trizetto-healthcare-breach-patient-data-exposure-attack-chain-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/trizetto-healthcare-breach-patient-data-exposure-attack-chain-ttps-tUnm0Yyhm1qeg9g5TS27W7l8a7Z0sR.png</image:loc>
</image:image>
<lastmod>2026-03-08T13:36:44.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-powered-cyber-attacks-complete-ttps-across-kill-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-powered-cyber-attacks-complete-ttps-across-kill-chain-B6BqEkZ963MTFPt9CYq55ZxSvrNp9i.png</image:loc>
</image:image>
<lastmod>2026-03-08T04:50:28.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-enhanced-cyber-attacks-threat-actor-automation-ttps-revealed/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-enhanced-cyber-attacks-threat-actor-automation-ttps-revealed-rYQKcjYopFRqt9BRTSkbCaV8w0HQEI.png</image:loc>
</image:image>
<lastmod>2026-03-08T04:50:23.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/velvet-tempest-clickfix-termite-ransomware-castlerat-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/velvet-tempest-clickfix-termite-ransomware-castlerat-ttps-4Gjpqc3xaXXqWYS0nWAMjqX2ENrlbb.png</image:loc>
</image:image>
<lastmod>2026-03-07T21:27:34.138Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/boryptgrab-github-distribution-supply-chain-attack-ttps-exposed/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/boryptgrab-github-distribution-supply-chain-attack-ttps-exposed-PRfYC3epskP4u14W3JRexRyQPjpQKi.png</image:loc>
</image:image>
<lastmod>2026-03-07T21:14:51.692Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/tycoon-2fa-phaas-takedown-advanced-mfa-bypass-ttps-exposed/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/tycoon-2fa-phaas-takedown-advanced-mfa-bypass-ttps-exposed-qNTp8kPXp4GMLKjXUCx4AczSWekNXB.png</image:loc>
</image:image>
<lastmod>2026-03-07T15:13:33.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/mexico-ai-assisted-government-breach-chatgpt-claude-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/mexico-ai-assisted-government-breach-chatgpt-claude-attack-ttps-B9JBtyYYf0YCior34bzBjwsRSyL7dc.png</image:loc>
</image:image>
<lastmod>2026-03-07T13:35:40.670Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/rockwell-ics-rce-legacy-vulnerability-active-exploitation-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/rockwell-ics-rce-legacy-vulnerability-active-exploitation-ttps-nuf06h4aPJ1sGSHJaNtoCmAzWcGp8i.png</image:loc>
</image:image>
<lastmod>2026-03-07T09:18:17.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/iran-cyber-kinetic-warfare-ip-camera-intelligence-collection-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/iran-cyber-kinetic-warfare-ip-camera-intelligence-collection-ttps-L9deVTEwyf5iRGAqX6AmeewmDN9lzQ.png</image:loc>
</image:image>
<lastmod>2026-03-07T04:28:07.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/iran-cyber-kinetic-ttps-ip-camera-recon-physical-strikes/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/iran-cyber-kinetic-ttps-ip-camera-recon-physical-strikes-95sA9kg2lPH0Sluh5fBaAWNpUpmMun.png</image:loc>
</image:image>
<lastmod>2026-03-07T04:27:35.187Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisa-ios-cve-alert-coruna-kit-crypto-theft-attack-chain-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisa-ios-cve-alert-coruna-kit-crypto-theft-attack-chain-ttps-wYnMlrUSl2hasfeGsI7DjhyC1YJJDf.png</image:loc>
</image:image>
<lastmod>2026-03-06T21:35:44.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/installfix-social-engineering-cli-tool-impersonation-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/installfix-social-engineering-cli-tool-impersonation-attack-ttps-DbRaZXXNJ8eQ63rw5XXpkP4lhR2RNE.png</image:loc>
</image:image>
<lastmod>2026-03-06T21:23:26.247Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/transparent-tribe-ai-mass-malware-multi-language-implant-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/transparent-tribe-ai-mass-malware-multi-language-implant-ttps-8VPEavVpXZMgwIYm3cXAUEAkC6Slwz.png</image:loc>
</image:image>
<lastmod>2026-03-06T15:29:48.683Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/latam-cyber-attack-surface-2x-attack-rate-exploitation-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/latam-cyber-attack-surface-2x-attack-rate-exploitation-ttps-mS0LxUXsOwFJhfzrNA1BOAPxUn0EVW.png</image:loc>
</image:image>
<lastmod>2026-03-06T15:27:12.093Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/fbi-surveillance-system-breach-law-enforcement-infrastructure-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/fbi-surveillance-system-breach-law-enforcement-infrastructure-ttps-hg96StzxlW2mJxUUwNvbZJS309EXrL.png</image:loc>
</image:image>
<lastmod>2026-03-06T13:51:46.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/delta-cncsoft-g2-rce-industrial-system-takeover-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/delta-cncsoft-g2-rce-industrial-system-takeover-ttps-t3xDULWYDEEhVL9QeSqWlAiFqywxwU.png</image:loc>
</image:image>
<lastmod>2026-03-06T09:27:40.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dust-specter-ttps-splitdrop-ghostform-malware-campaign-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dust-specter-ttps-splitdrop-ghostform-malware-campaign-analysis-Vs3O7zOIXSOvaQYmFeAeUhzVAO8J6f.png</image:loc>
</image:image>
<lastmod>2026-03-06T04:49:37.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dust-specter-splitdrop-ghostform-iraq-government-impersonation-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dust-specter-splitdrop-ghostform-iraq-government-impersonation-ttps-j8Pagwruc2HdC0r0e8AwKuO2g9NRxz.png</image:loc>
</image:image>
<lastmod>2026-03-06T04:49:15.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/90-zero-day-exploits-2025-enterprise-attack-surface-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/90-zero-day-exploits-2025-enterprise-attack-surface-ttps-bX4ls3IQABwJohKhl681QOLQoiX0iE.png</image:loc>
</image:image>
<lastmod>2026-03-05T21:41:26.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/wordpress-user-registration-plugin-admin-account-creation-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/wordpress-user-registration-plugin-admin-account-creation-ttps-R8UcrdNadw107Q2oo6wgwq042C0eqt.png</image:loc>
</image:image>
<lastmod>2026-03-05T21:27:18.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/apt28-badpaw-meowmeow-ukrainian-critical-infrastructure-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/apt28-badpaw-meowmeow-ukrainian-critical-infrastructure-ttps-kEEiDZvLRPCKnXF9ddzLRpvxAGu9oH.png</image:loc>
</image:image>
<lastmod>2026-03-05T15:43:04.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisco-enterprise-network-48-cve-mass-exploitation-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisco-enterprise-network-48-cve-mass-exploitation-attack-ttps-hdQiGzStKXEdakQczfophf6w5TbPC3.png</image:loc>
</image:image>
<lastmod>2026-03-05T15:40:24.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/phobos-ransomware-ttps-wire-fraud-conspiracy-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/phobos-ransomware-ttps-wire-fraud-conspiracy-attack-analysis-8vUf5yCUWq5WntH4QnCmDasHGHEDW5.png</image:loc>
</image:image>
<lastmod>2026-03-05T13:59:03.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/vmware-aria-operations-command-injection-cloud-environment-takeover-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/vmware-aria-operations-command-injection-cloud-environment-takeover-ttps-rlN8HB6vuGn0korWaKS2fyRbpqcfRz.png</image:loc>
</image:image>
<lastmod>2026-03-05T09:31:59.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/freescout-mail2shell-zero-click-rce-critical-helpdesk-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/freescout-mail2shell-zero-click-rce-critical-helpdesk-attack-ttps-JHDfFxANzt1k8J9ebQ9fPcR7PgODxI.png</image:loc>
</image:image>
<lastmod>2026-03-05T04:51:59.428Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/hungerrush-pos-extortion-customer-data-weaponization-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/hungerrush-pos-extortion-customer-data-weaponization-ttps-J0BIexDz0h3CoDM10zjEBL1pD5Omge.png</image:loc>
</image:image>
<lastmod>2026-03-04T21:39:45.442Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cve-2026-21385-qualcomm-zero-day-android-exploitation-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cve-2026-21385-qualcomm-zero-day-android-exploitation-ttps-T0jTqv88FwvDgPWb5v3WxViB3WKMvh.png</image:loc>
</image:image>
<lastmod>2026-03-04T21:27:53.940Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/lastpass-phishing-ttps-password-manager-trust-exploitation/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/lastpass-phishing-ttps-password-manager-trust-exploitation-PMduwyRDURsOIS62VNWSZd7ywPFhHq.png</image:loc>
</image:image>
<lastmod>2026-03-04T15:37:03.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/lexisnexis-data-breach-legal-database-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/lexisnexis-data-breach-legal-database-attack-chain-analysis-83jch8MKLayV3VEdwqmHleT7QbEbBm.png</image:loc>
</image:image>
<lastmod>2026-03-04T15:29:43.372Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/silver-dragon-apt-google-drive-c2-cobalt-strike-government-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/silver-dragon-apt-google-drive-c2-cobalt-strike-government-ttps-xAphANXvSZSnziDnCudTR7FNdowSEF.png</image:loc>
</image:image>
<lastmod>2026-03-04T13:54:55.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/akzonobel-manufacturing-breach-industrial-network-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/akzonobel-manufacturing-breach-industrial-network-attack-ttps-L7EwGz5stA0Q7rExH3mawCs08umYZW.png</image:loc>
</image:image>
<lastmod>2026-03-04T09:28:56.549Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/labkotec-lid-3300ip-critical-vulnerability-ot-system-hijack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/labkotec-lid-3300ip-critical-vulnerability-ot-system-hijack-ttps-gssWpOwXzXKqx6eclPc6ygQkGZqLrc.png</image:loc>
</image:image>
<lastmod>2026-03-04T04:49:50.607Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/labkotec-lid-3300ip-system-control-takeover-critical-ics-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/labkotec-lid-3300ip-system-control-takeover-critical-ics-attack-ttps-zILs8qn4Qrcdwd7YTuagFmVNpGebPu.png</image:loc>
</image:image>
<lastmod>2026-03-04T04:47:53.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/oauth-error-flow-abuse-phishing-protection-bypass-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/oauth-error-flow-abuse-phishing-protection-bypass-attack-ttps-ey64d7bDW0q63o8wNZrhz8rgIvgf8F.png</image:loc>
</image:image>
<lastmod>2026-03-03T21:39:15.362Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/honeywell-iq4-controllers-critical-building-management-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/honeywell-iq4-controllers-critical-building-management-attack-ttps-4AMaTI3lUhxPNsEU9OloUfwAqBUsBw.png</image:loc>
</image:image>
<lastmod>2026-03-03T21:27:25.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cpanel-credential-markets-site-management-panel-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cpanel-credential-markets-site-management-panel-attack-ttps-6X8wNkCduRy25wdweNz3j66nA3PZeX.png</image:loc>
</image:image>
<lastmod>2026-03-03T15:40:56.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/iranian-apt-escalation-geopolitical-cyber-war-attack-chains/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/iranian-apt-escalation-geopolitical-cyber-war-attack-chains-uYczUNi409m0PhamMQ0XeXOJEJNtq7.png</image:loc>
</image:image>
<lastmod>2026-03-03T15:38:17.557Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-convergence-weekly-threat-actor-ttps-march-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-convergence-weekly-threat-actor-ttps-march-2026-iKy7me8jJHAg9VZvPh4xLYgq6Q3v08.png</image:loc>
</image:image>
<lastmod>2026-03-03T09:37:15.075Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/openclaw-ai-agent-attack-critical-rce-vulnerability-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/openclaw-ai-agent-attack-critical-rce-vulnerability-ttps-analysis-zyQiKuSonPEDUJ8qFVr7iKkHwlzWPx.png</image:loc>
</image:image>
<lastmod>2026-03-03T09:31:13.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-convergence-sd-wan-cve-ai-attack-ttps-march-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-convergence-sd-wan-cve-ai-attack-ttps-march-2026-deePSlt9vSGAMsnjigIYZuaXSjczv7.png</image:loc>
</image:image>
<lastmod>2026-03-03T13:56:48.475Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/social-media-account-hijacking-sextortion-attack-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/social-media-account-hijacking-sextortion-attack-ttps-analysis-NXluV7QNFvYJS1i7idY9iZrBoXSerY.png</image:loc>
</image:image>
<lastmod>2026-03-02T21:39:59.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-sd-wan-zero-days-cloud-drift-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-sd-wan-zero-days-cloud-drift-ttps-D6Pu8U4a9leRiVhAID5rSUwXwnUj2T.png</image:loc>
</image:image>
<lastmod>2026-03-02T21:26:51.179Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/google-gemini-ai-panel-hijack-browser-extension-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/google-gemini-ai-panel-hijack-browser-extension-attack-ttps-kcVhi07lMFYfCMRjGAee0VKohtlfrA.png</image:loc>
</image:image>
<lastmod>2026-03-02T15:35:00.077Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/north-korean-npm-package-attack-pastebin-c2-rat-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/north-korean-npm-package-attack-pastebin-c2-rat-ttps-analysis-TDs3EfM67ZT3BXdrsHzg4J1HSx48ED.png</image:loc>
</image:image>
<lastmod>2026-03-02T13:57:23.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/samsung-smart-tv-data-collection-iot-surveillance-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/samsung-smart-tv-data-collection-iot-surveillance-attack-ttps-32er1e96v2d7gerEfQRzzig7KFy0OX.png</image:loc>
</image:image>
<lastmod>2026-03-02T04:55:38.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/samsung-tv-data-harvesting-smart-tv-attack-vector-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/samsung-tv-data-harvesting-smart-tv-attack-vector-analysis-HsKvodtv9SM2hcwhDJuz6zCTbPH848.png</image:loc>
</image:image>
<lastmod>2026-03-02T04:55:37.536Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/smart-tv-data-harvesting-iot-surveillance-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/smart-tv-data-harvesting-iot-surveillance-attack-chain-analysis-CEiW9IgZLDDNpnqyLwQyqnePWb2F1S.png</image:loc>
</image:image>
<lastmod>2026-03-01T21:29:15.599Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/claude-ai-weaponized-mexican-government-breach-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/claude-ai-weaponized-mexican-government-breach-ttps-analysis-DcdX6lJoZQbDLfbpUowEFPTYiR4RJs.png</image:loc>
</image:image>
<lastmod>2026-03-01T15:17:17.211Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/resurge-malware-dormancy-ivanti-zero-day-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/resurge-malware-dormancy-ivanti-zero-day-attack-chain-analysis-cKcahxzmT6v9FReeYfLp7obeiOxC2I.png</image:loc>
</image:image>
<lastmod>2026-03-01T15:13:40.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/russian-cyber-kinetic-warfare-predator-ios-bypass-2026-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/russian-cyber-kinetic-warfare-predator-ios-bypass-2026-ttps-OgqBx0jh7wy8tYq3Wrf9AxSNJUjUWL.png</image:loc>
</image:image>
<lastmod>2026-03-01T09:25:12.258Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clawjacked-websocket-hijack-ai-agent-command-injection-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clawjacked-websocket-hijack-ai-agent-command-injection-ttps-P3zLjQD0fxVhrTh8VimAjmfT5tJgoL.png</image:loc>
</image:image>
<lastmod>2026-03-01T13:36:08.013Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clawjacked-websocket-ai-agent-hijacking-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clawjacked-websocket-ai-agent-hijacking-attack-chain-EyKyvvV2vRRspV0x3uVHKuzIGbQ7px.png</image:loc>
</image:image>
<lastmod>2026-03-01T05:01:34.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/quicklens-chrome-extension-attack-clickfix-crypto-theft-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/quicklens-chrome-extension-attack-clickfix-crypto-theft-ttps-3z7NdO3zFpDyfuvlx9RkIssQyZNQxI.png</image:loc>
</image:image>
<lastmod>2026-02-28T21:27:09.375Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/the-com-cybercrime-collective-youth-targeted-attack-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/the-com-cybercrime-collective-youth-targeted-attack-ttps-analysis-V7kkr5LW0U4t4f0hjoFawATkESEbZB.png</image:loc>
</image:image>
<lastmod>2026-02-28T21:14:44.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/google-cloud-api-key-exposure-gemini-access-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/google-cloud-api-key-exposure-gemini-access-attack-chain-eleJ7NrtcszuNMkAWE0FqeMPHuRcoJ.png</image:loc>
</image:image>
<lastmod>2026-02-28T15:14:46.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/pentagon-ai-supply-chain-attack-anthropic-designation-risk-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/pentagon-ai-supply-chain-attack-anthropic-designation-risk-analysis-8mShIeYX8n5ZFZbDJvraeI4D5rmgeB.png</image:loc>
</image:image>
<lastmod>2026-02-28T09:21:23.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/third-party-software-drift-red-team-exploitation-playbook/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/third-party-software-drift-red-team-exploitation-playbook-3HWAMcOTIEhNgkWdxNcYOyoaMAajPT.png</image:loc>
</image:image>
<lastmod>2026-02-28T09:15:43.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/hospital-ransomware-healthcare-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/hospital-ransomware-healthcare-attack-chain-analysis-c518sDHl8ixtWVePVMmBAgLZuuvvss.png</image:loc>
</image:image>
<lastmod>2026-02-28T13:33:39.947Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/healthcare-ransomware-ttps-hospital-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/healthcare-ransomware-ttps-hospital-attack-chain-analysis-uRsWpiL59B6z22PAbUlOkcpa38B9UT.png</image:loc>
</image:image>
<lastmod>2026-02-28T04:21:10.577Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/apt37-air-gapped-network-breach-usb-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/apt37-air-gapped-network-breach-usb-attack-chain-analysis-DuNn3iLJmsLdJEUDKOnVYBiqqWT3CE.png</image:loc>
</image:image>
<lastmod>2026-02-27T21:33:59.977Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/predator-ios-bypass-russian-cyber-kinetic-warfare-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/predator-ios-bypass-russian-cyber-kinetic-warfare-analysis-EoamSp522HYjPa97R2qF8kN9CayrMT.png</image:loc>
</image:image>
<lastmod>2026-02-27T21:22:48.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/freepbx-web-shell-attack-900-systems-compromised-command-injection/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/freepbx-web-shell-attack-900-systems-compromised-command-injection-G8t1UQ8qvjGACsOfBkjYjzgagVsjMD.png</image:loc>
</image:image>
<lastmod>2026-02-27T15:32:21.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/chargemap-ev-station-rce-critical-infrastructure-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/chargemap-ev-station-rce-critical-infrastructure-attack-ttps-0MODFGuL4VPuUhdBgPWYZfc7PiKUSE.png</image:loc>
</image:image>
<lastmod>2026-02-27T15:30:29.951Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/gardyn-smart-garden-rce-iot-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/gardyn-smart-garden-rce-iot-attack-chain-analysis-iGEHVMBYzV9TnKhH4Avr3cQsYEUdz6.png</image:loc>
</image:image>
<lastmod>2026-02-27T09:36:28.492Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/trend-micro-apex-one-rce-critical-edr-bypass-attack-vectors/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/trend-micro-apex-one-rce-critical-edr-bypass-attack-vectors-iqjle1fcsYbCe4BtZeMbSzqKPlPVFs.png</image:loc>
</image:image>
<lastmod>2026-02-27T09:30:14.406Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisco-sd-wan-zero-day-apt-campaign-analysis-cve-2026-20127/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisco-sd-wan-zero-day-apt-campaign-analysis-cve-2026-20127-16gWkMzttmPkc1GUAVOWxTIb8pT08F.png</image:loc>
</image:image>
<lastmod>2026-02-27T13:57:07.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisco-sd-wan-cve-2026-20127-zero-day-exploitation-ttps-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisco-sd-wan-cve-2026-20127-zero-day-exploitation-ttps-analysis-PfXkDnJPBoc6qcOv4ia5Y8abYETWaT.png</image:loc>
</image:image>
<lastmod>2026-02-27T04:52:51.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/board-level-attack-vectors-high-impact-ttps-organizations-ignore/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/board-level-attack-vectors-high-impact-ttps-organizations-ignore-YTArp0GBocawbkrpDfTxIsOTI4FxRu.png</image:loc>
</image:image>
<lastmod>2026-02-26T21:37:44.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/payment-system-attack-acceleration-2026-threat-landscape-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/payment-system-attack-acceleration-2026-threat-landscape-analysis-ZipdwjQAEcWejZqFEtNjGCJoa4dnvY.png</image:loc>
</image:image>
<lastmod>2026-02-26T21:26:34.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/pci-payment-system-attack-vectors-red-team-ttps-defense-gaps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/pci-payment-system-attack-vectors-red-team-ttps-defense-gaps-a9Aswt2ufS1Bcdkmra8bdl8F5ZEeok.png</image:loc>
</image:image>
<lastmod>2026-02-26T15:45:54.192Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ramp-forum-takedown-ransomware-ecosystem-fragmentation-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ramp-forum-takedown-ransomware-ecosystem-fragmentation-analysis-1Ce4xWq3hWDUHmB47tyCpfi04n1oMy.png</image:loc>
</image:image>
<lastmod>2026-02-26T15:43:28.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisco-sd-wan-zero-day-authentication-bypass-apt-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisco-sd-wan-zero-day-authentication-bypass-apt-analysis-8udVYvnyVkStx7IDfmeliDdZoBGTwV.png</image:loc>
</image:image>
<lastmod>2026-02-26T09:43:52.602Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ufp-technologies-medical-device-cyberattack-healthcare-supply-chain-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ufp-technologies-medical-device-cyberattack-healthcare-supply-chain-ttps-ASZL2fWDCh5xoU94HHPFUCmp6NzPkD.png</image:loc>
</image:image>
<lastmod>2026-02-26T14:07:56.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/north-korean-fake-job-recruitment-nextjs-repository-poisoning-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/north-korean-fake-job-recruitment-nextjs-repository-poisoning-ttps-GpYNjgVQFzN1oMT7ssVdCDwKpg2wqV.png</image:loc>
</image:image>
<lastmod>2026-02-26T04:58:05.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/north-korean-nextjs-supply-chain-attack-developer-recruitment-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/north-korean-nextjs-supply-chain-attack-developer-recruitment-ttps-OiNVXl3c4jrBOvMcs1gvNI6aawSqFM.png</image:loc>
</image:image>
<lastmod>2026-02-26T04:58:05.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/unc2814-chinese-apt-telecom-government-attack-campaign/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/unc2814-chinese-apt-telecom-government-attack-campaign-yiIRSQ3gTZd9AakXtW5wFseQDTlcgh.png</image:loc>
</image:image>
<lastmod>2026-02-25T21:39:37.498Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/solarwinds-serv-u-critical-rce-cve-exploitation-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/solarwinds-serv-u-critical-rce-cve-exploitation-chain-analysis-HrvjC4r63M3TI00ejeVlMMf3rvLpi1.png</image:loc>
</image:image>
<lastmod>2026-02-25T21:29:28.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/slh-vishing-campaign-social-engineering-recruitment-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/slh-vishing-campaign-social-engineering-recruitment-analysis-QfTGDrmH9nuY7OXDb4GWvPBgYPoTof.png</image:loc>
</image:image>
<lastmod>2026-02-25T15:54:55.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/zero-day-broker-networks-l3harris-executive-insider-threat-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/zero-day-broker-networks-l3harris-executive-insider-threat-analysis-AsPKsmFSKBdeLZj084tzVwfjX4zTyK.png</image:loc>
</image:image>
<lastmod>2026-02-25T15:49:48.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/lazarus-group-medusa-ransomware-apt38-multi-stage-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/lazarus-group-medusa-ransomware-apt38-multi-stage-attack-chain-1TTmQL4SSElfqYoyD0r5YnEpJKm6ZS.png</image:loc>
</image:image>
<lastmod>2026-02-25T14:07:56.071Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/diesel-vortex-multi-domain-phishing-campaign-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/diesel-vortex-multi-domain-phishing-campaign-attack-analysis-n5y8ZIAdUggpFSgvuohq5uiF62r8yU.png</image:loc>
</image:image>
<lastmod>2026-02-25T09:41:27.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/anonymous-fenix-ddos-campaign-government-infrastructure-attack-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/anonymous-fenix-ddos-campaign-government-infrastructure-attack-ttps-buulZpu43yH5kf1MULykHqt9ql079g.png</image:loc>
</image:image>
<lastmod>2026-02-25T05:00:41.272Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/spanish-hacktivist-ddos-operations-ttps-government-attack-vectors/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/spanish-hacktivist-ddos-operations-ttps-government-attack-vectors-UyCnSCz5JQaPBEflvReWS2HZ3smgAI.png</image:loc>
</image:image>
<lastmod>2026-02-25T05:00:31.361Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-model-theft-anthropic-claude-distillation-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-model-theft-anthropic-claude-distillation-attack-analysis-CGc3EGqILmHscpBNpfTWTcaqqY9yBd.png</image:loc>
</image:image>
<lastmod>2026-02-24T21:40:56.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/unsolicitedbooker-lucidoor-marssnake-central-asian-telecom-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/unsolicitedbooker-lucidoor-marssnake-central-asian-telecom-attack-chain-Mv9BQr9SFzY4HAj2THgXiOoyP0XdhS.png</image:loc>
</image:image>
<lastmod>2026-02-24T15:48:58.898Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/wormable-xmrig-campaign-byovd-exploit-logic-bomb-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/wormable-xmrig-campaign-byovd-exploit-logic-bomb-attack-chain-iZKQ7e7dgXlcxMDz0OfuW0QkOqYHra.png</image:loc>
</image:image>
<lastmod>2026-02-23T21:52:30.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/everest-ransomware-healthcare-attack-140k-records-breached-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/everest-ransomware-healthcare-attack-140k-records-breached-analysis-R2ujcnLU1FwoIHO2PkspJSAu2vHML7.png</image:loc>
</image:image>
<lastmod>2026-02-23T15:40:12.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/muddywater-operation-olalampo-mena-malware-arsenal-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/muddywater-operation-olalampo-mena-malware-arsenal-ttps-B5GyG02VEYxWKOhpbukKXecKiwKbkI.png</image:loc>
</image:image>
<lastmod>2026-02-23T09:49:41.276Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cve-2026-2329-grandstream-phone-rce-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cve-2026-2329-grandstream-phone-rce-attack-chain-analysis-ZlZ6bHwIlz0GwR7UK3HWRcxYIhho5G.png</image:loc>
</image:image>
<lastmod>2026-02-23T05:06:14.589Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cve-2026-2329-grandstream-voip-rce-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cve-2026-2329-grandstream-voip-rce-attack-chain-analysis-V51U2z2e0LytlDxTQS4fE53LP645zB.png</image:loc>
</image:image>
<lastmod>2026-02-23T14:06:10.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/arkanix-stealer-ai-generated-infostealer-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/arkanix-stealer-ai-generated-infostealer-attack-chain-analysis-PwpmGrz6SKrtcXTrOMoD7mBAZg0ZFv.png</image:loc>
</image:image>
<lastmod>2026-02-22T21:30:03.532Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/defense-tech-reshaping-attack-vectors-2026-threat-landscape/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/defense-tech-reshaping-attack-vectors-2026-threat-landscape-rPb593Aj1kZdFxQepGkfZvIkQK1BRs.png</image:loc>
</image:image>
<lastmod>2026-02-22T21:17:24.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/shields-up-defense-tech-red-team-attack-surface-expansion-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/shields-up-defense-tech-red-team-attack-surface-expansion-2026-F39gWIiOqdEV1uy8jlF3o7JcsVb8HE.png</image:loc>
</image:image>
<lastmod>2026-02-22T15:17:48.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/shields-up-defense-tech-attacker-adaptation-strategies-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/shields-up-defense-tech-attacker-adaptation-strategies-2026-hUXlf6pxbRL6n5fcO4OablkKNesnY7.png</image:loc>
</image:image>
<lastmod>2026-02-22T15:15:22.893Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/shields-up-defense-tech-red-team-attack-surface-expansion-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/shields-up-defense-tech-red-team-attack-surface-expansion-analysis-JnGqf8sJR2v3fI6fdGNomyZmzdnKVX.png</image:loc>
</image:image>
<lastmod>2026-02-22T13:40:08.234Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/shields-up-defense-tech-red-team-attack-surface-expansion/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/shields-up-defense-tech-red-team-attack-surface-expansion-8p57b9pU29zAwbFTA3X6duoR7MOnaW.png</image:loc>
</image:image>
<lastmod>2026-02-21T21:29:42.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/emerging-defense-tech-red-team-attack-surface-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/emerging-defense-tech-red-team-attack-surface-analysis-exDriomtHokDGzgYGYuR0rRM6Jav4V.png</image:loc>
</image:image>
<lastmod>2026-02-21T21:16:15.627Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-powered-fortigate-breach-600-firewalls-compromised-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-powered-fortigate-breach-600-firewalls-compromised-analysis-bMN065icG27ezGKyvWD6m7v5kAv919.png</image:loc>
</image:image>
<lastmod>2026-02-21T15:17:23.690Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/emerging-cybersecurity-technologies-red-team-attack-surface-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/emerging-cybersecurity-technologies-red-team-attack-surface-analysis-wo4LR9GdCy5tH8aD9YNbe2f70BUsrs.png</image:loc>
</image:image>
<lastmod>2026-02-21T15:15:19.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clickfix-mimicrat-campaign-compromised-site-infrastructure-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clickfix-mimicrat-campaign-compromised-site-infrastructure-analysis-K8260nVoBvUQfsLgCos0d8md2LW7x7.png</image:loc>
</image:image>
<lastmod>2026-02-21T09:26:01.428Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/react2shell-scanner-advanced-reconnaissance-web-app-rce-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/react2shell-scanner-advanced-reconnaissance-web-app-rce-attack-chain-Ipu5Dvbhf6g0fiebnoFLdxPZk5ABwA.png</image:loc>
</image:image>
<lastmod>2026-02-21T09:19:21.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-healthcare-ransomware-ics-surge-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-healthcare-ransomware-ics-surge-2026-CpLRrQqS0nq392NTZQnuvZXpBPP96P.png</image:loc>
</image:image>
<lastmod>2026-02-21T13:38:37.846Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-healthcare-ransomware-ics-surge-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-healthcare-ransomware-ics-surge-analysis-RsmmnKrgpqWmj2ZV6RhJfSI3tp9gv3.png</image:loc>
</image:image>
<lastmod>2026-02-21T04:43:33.196Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-healthcare-ransomware-ics-vulnerabilities/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-healthcare-ransomware-ics-vulnerabilities-SBcE1tkuGPXpCb0IONm09uKSI9U12u.png</image:loc>
</image:image>
<lastmod>2026-02-20T21:30:47.665Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/healthcare-ransomware-ttps-ummc-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/healthcare-ransomware-ttps-ummc-attack-chain-analysis-9jpIdGv9qzNtfYIsKRSztWfNnTrjF3.png</image:loc>
</image:image>
<lastmod>2026-02-20T21:17:48.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/latin-america-cyber-gap-initial-access-broker-paradise-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/latin-america-cyber-gap-initial-access-broker-paradise-analysis-xUPos6G75HC4MKOQFn4Qvjh9hie6lK.png</image:loc>
</image:image>
<lastmod>2026-02-20T15:31:55.971Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/valmet-dna-lfi-ot-web-service-path-traversal-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/valmet-dna-lfi-ot-web-service-path-traversal-attack-chain-qCfwRNREAWEuQBGI3RrJtMmq4nl01f.png</image:loc>
</image:image>
<lastmod>2026-02-20T15:29:53.972Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/openclaw-supply-chain-attack-npm-package-poisoning-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/openclaw-supply-chain-attack-npm-package-poisoning-ttps-unyDdUmV10nkrTV41HlSWjrU6bzJbk.png</image:loc>
</image:image>
<lastmod>2026-02-20T13:58:03.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/massiv-android-malware-iptv-app-device-takeover-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/massiv-android-malware-iptv-app-device-takeover-attack-chain-5veEeSLiN56hXXaCLl0dbGBYsyEx8K.png</image:loc>
</image:image>
<lastmod>2026-02-20T09:30:53.711Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-threat-convergence-openssl-rce-foxit-zero-days-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-threat-convergence-openssl-rce-foxit-zero-days-attack-analysis-tquM8qU1nZCz0soZ9VCVhBCb0bneEg.png</image:loc>
</image:image>
<lastmod>2026-02-20T04:54:02.991Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-threat-convergence-openssl-rce-ai-flaws-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-threat-convergence-openssl-rce-ai-flaws-analysis-k0X61QvWaharK5yecKOvTUwpJFO3lg.png</image:loc>
</image:image>
<lastmod>2026-02-20T04:53:59.757Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/iot-device-exploitation-attack-surface-analysis-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/iot-device-exploitation-attack-surface-analysis-ttps-KIky6xB0uue2B9Oz4Xz29Hx1i34nNe.png</image:loc>
</image:image>
<lastmod>2026-02-19T21:38:13.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/oauth-device-code-vishing-microsoft-entra-account-takeover-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/oauth-device-code-vishing-microsoft-entra-account-takeover-ttps-Ln058GzzNM3TWp6A3JrcHmnWX495mb.png</image:loc>
</image:image>
<lastmod>2026-02-19T15:40:44.064Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/crescentharvest-rat-campaign-iran-protest-surveillance-ttps/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/crescentharvest-rat-campaign-iran-protest-surveillance-ttps-xFqUaKjaXoko4ka2jEL1T0LdXElvZp.png</image:loc>
</image:image>
<lastmod>2026-02-19T09:40:18.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dell-recoverpoint-cve-2026-22769-unc6201-zero-day-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dell-recoverpoint-cve-2026-22769-unc6201-zero-day-attack-chain-YwApJgHYukAfZazCLceOTFNZGoPh2H.png</image:loc>
</image:image>
<lastmod>2026-02-19T05:00:24.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cve-2026-2329-grandstream-voip-buffer-overflow-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cve-2026-2329-grandstream-voip-buffer-overflow-attack-chain-mPgnQujAHlq942MKEO80dFXzuZb6L2.png</image:loc>
</image:image>
<lastmod>2026-02-18T21:40:28.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dell-recoverpoint-zero-day-cve-2026-22769-hardcoded-credential-exploitation/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dell-recoverpoint-zero-day-cve-2026-22769-hardcoded-credential-exploitation-XYITyEJjkvVkrkiVPRrLR4E7UQJ3qA.png</image:loc>
</image:image>
<lastmod>2026-02-18T15:43:36.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/cisa-kev-four-critical-vulnerabilities-active-exploitation-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/cisa-kev-four-critical-vulnerabilities-active-exploitation-analysis-EZmJKw4GEjXUh1ps5uHPIQSYz8A2mH.png</image:loc>
</image:image>
<lastmod>2026-02-18T09:42:04.468Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/dell-zero-day-exploitation-chinese-apt-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/dell-zero-day-exploitation-chinese-apt-attack-chain-analysis-JldsnMGuyHovjKVbp0kqrrNzi4ZMXI.png</image:loc>
</image:image>
<lastmod>2026-02-18T06:43:05.774Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/smartloader-ai-mcp-server-trojan-stealc-infostealer-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/smartloader-ai-mcp-server-trojan-stealc-infostealer-attack-analysis-SwS15l3CSZT61CavqSwx5ITDoUHVpc.png</image:loc>
</image:image>
<lastmod>2026-02-17T21:28:39.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-legacy-botnets-ai-cloud-abuse-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-legacy-botnets-ai-cloud-abuse-2026-CNGMqSjTF9DY5tuQbsG9cUCdQw3h86.png</image:loc>
</image:image>
<lastmod>2026-02-17T10:35:15.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-convergence-outlook-zero-days-ai-malware-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-convergence-outlook-zero-days-ai-malware-attack-analysis-UH8qGh7xGcHQQ67Xz0bOQSVrwKF7Lt.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:51.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/multi-vector-attack-convergence-outlook-zero-days-ai-malware/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/multi-vector-attack-convergence-outlook-zero-days-ai-malware-39yV49BuCw6DAn5ExKNLXLUmt2Yj0n.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:51.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/chrome-zero-day-cve-2026-2441-use-after-free-exploitation-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/chrome-zero-day-cve-2026-2441-use-after-free-exploitation-attack-chain-Z0Q9324SZVqLgNqDFkhSYXFYVWssdW.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:50.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clickfix-dns-abuse-powershell-payload-nslookup-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clickfix-dns-abuse-powershell-payload-nslookup-attack-chain-zb0p6kOaXDn0KmOgch88GLtwRdOGhY.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:50.468Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/beyondtrust-cve-2026-1731-exploitation-24-hour-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/beyondtrust-cve-2026-1731-exploitation-24-hour-attack-analysis-g6UmBF7oZgSybI32B1OYaLW6dWl2xM.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:50.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/beyondtrust-rce-vulnerability-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/beyondtrust-rce-vulnerability-attack-chain-analysis-M2KxqamY4LUJC8i03sAQilEoERVgH8.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:49.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/apple-zero-day-exploitation-targeted-attack-chain-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/apple-zero-day-exploitation-targeted-attack-chain-analysis-VkwmKE23qBvyBiBF3o6D5XjCijJ04K.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:48.998Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/north-korean-macos-malware-clickfix-ai-crypto-attacks/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/north-korean-macos-malware-clickfix-ai-crypto-attacks-pF1S7NQrHWPsKpMma7YgHIfGsOOoJB.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:48.657Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/solarwinds-whd-exploitation-velociraptor-dfir-tool-weaponized/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/solarwinds-whd-exploitation-velociraptor-dfir-tool-weaponized-YkHMd4fCqRBKwqQSulsybr4mO4n8oj.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:48.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/signal-phishing-state-sponsored-mobile-attack-chains/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/signal-phishing-state-sponsored-mobile-attack-chains-4cKeRrEp1H2klXJstawhdCrKoHQIqK.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:47.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/german-signal-phishing-state-sponsored-target-acquisition-campaign/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/german-signal-phishing-state-sponsored-target-acquisition-campaign-t9GO0UqHf57fHQI5EO7rc48yPQ2VfS.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:47.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/signal-account-hijacking-state-sponsored-phishing-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/signal-account-hijacking-state-sponsored-phishing-attack-chain-gHXkKo5fpXRyG5J4bIoUD1CFA0bD4h.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:46.617Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/mitsubishi-melsec-iq-r-plc-vulnerability-attack-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/mitsubishi-melsec-iq-r-plc-vulnerability-attack-analysis-ishhiaShH0aj0ApDSrle0wDv0QDvxi.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:46.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/infostealer-malware-tactics-credential-harvesting-attack-chain/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/infostealer-malware-tactics-credential-harvesting-attack-chain-MFmiWwynutX7ZAm0ZX8lkymaQQ8IIH.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:45.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/csa-xcon-2026-conference-intelligence-red-team-operations/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/csa-xcon-2026-conference-intelligence-red-team-operations-d6mP6MhoSPebcpBIxrQ9qRFoYwggDh.png</image:loc>
</image:image>
<lastmod>2026-02-03T11:15:47.408Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/react2shell-scanner-cve-2025-55182-next-js-vulnerability/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/react2shell-scanner-cve-2025-55182-next-js-vulnerability-PDo3QbIcV6W2n1BHy6xJqc1DPJqVU8.png</image:loc>
</image:image>
<lastmod>2026-02-03T07:04:54.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/russian-apt-exploits-office-vulnerability-cve-2024-21509/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/russian-apt-exploits-office-vulnerability-cve-2024-21509-iNElsbAsLoxoTTtKQAS1RJkmnG18WK.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:45.616Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/russian-hackers-cve-2026-21509-office-vulnerability/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/russian-hackers-cve-2026-21509-office-vulnerability-BuC3lFJZO9UzZVJLWsxBknJIOCl5BH.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:45.278Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/building-an-ai-security-assessment-framework-for-enterprise/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/building-an-ai-security-assessment-framework-for-enterprise-0gc6rNJqYLu7rXZLkcccrcLi8u3k98.png</image:loc>
</image:image>
<lastmod>2026-02-03T07:10:42.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-llm-security-assessment-guide-for-red-teams/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-llm-security-assessment-guide-for-red-teams-IJ2e763d7FfleZth9O6JKlFGfQIH0p.png</image:loc>
</image:image>
<lastmod>2026-02-03T07:09:41.461Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/llm-attack-techniques-prompt-injection-jailbreaking-and-exploitation/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/llm-attack-techniques-prompt-injection-jailbreaking-and-exploitation-zxVKBKbI5MTRDRvZybmYmXlEZSBqtv.png</image:loc>
</image:image>
<lastmod>2026-02-03T07:08:22.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/aiptx-ai-powered-penetration-testing-platform-deep-dive/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/aiptx-ai-powered-penetration-testing-platform-deep-dive-dNYtrFcNvvpyWjimW4YoFvepNI5Ops.png</image:loc>
</image:image>
<lastmod>2026-02-03T07:07:36.843Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/notepad-supply-chain-attack-lotus-blossom-apt/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/notepad-supply-chain-attack-lotus-blossom-apt-uGRzStX6d3vYiMMoeKFTt2kmkFNj8b.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:42.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cybersecurity-threats-botnets-zero-days-ai-risks-february-2026/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cybersecurity-threats-botnets-zero-days-ai-risks-february-2026-0YOjs1f6mJA4DQcX2HelZPt6aBiSP2.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:40.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/russian-hackers-exploit-cve-2026-21509-microsoft-office-vulnerability/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/russian-hackers-exploit-cve-2026-21509-microsoft-office-vulnerability-Y9Sc9Jn1bueO1pLESCtfQsOh5CGUNM.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:42.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clawhub-malicious-skills-ai-supply-chain-attack/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clawhub-malicious-skills-ai-supply-chain-attack-h2gwZ6nvnUIex5M6ReeYEKMFlnSn6G.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:39.155Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cyber-threats-proxy-botnets-ai-hijacks-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cyber-threats-proxy-botnets-ai-hijacks-analysis-q19WR6izsq2pS8JB6qORusDxfbKqCy.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:39.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/openclaw-rce-vulnerability-one-click-remote-code-execution/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/openclaw-rce-vulnerability-one-click-remote-code-execution-95dFZ3QSAyHfxinAF3u0tNf094ycZH.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:38.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/notepad-plus-plus-supply-chain-attack-chinese-state-hackers/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/notepad-plus-plus-supply-chain-attack-chinese-state-hackers-odssjB2KPR74oMy51Uthn4rlrJjhrW.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:44.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/glassworm-open-vsx-publisher-account-hijacked-attack/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/glassworm-open-vsx-publisher-account-hijacked-attack-SZ5cReUSQ41rteaVZKuVT82EN4Ws4S.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:38.155Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-threat-roundup-zero-days-botnets-ai-hijacks/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-threat-roundup-zero-days-botnets-ai-hijacks-6AEOTDTEMJbz0oNBp6y0KmclglooaV.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:44.270Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cyber-threats-proxy-botnet-office-zero-day-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cyber-threats-proxy-botnet-office-zero-day-analysis-QvFHz3xDRp48KuUQ3HTRN0u3rxl1da.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:41.308Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cybersecurity-threats-security-teams-must-know/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cybersecurity-threats-security-teams-must-know-mfPYHYyiDOLHLE1jLgFAhMVBjKDIfm.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:43.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cybersecurity-threats-proxy-botnets-office-zero-day-ai-hijacks/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cybersecurity-threats-proxy-botnets-office-zero-day-ai-hijacks-AKmvgvR3LNlHXeipJVd9BFJAoNKYyd.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:40.973Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/clawhub-malicious-skills-supply-chain-attack/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/clawhub-malicious-skills-supply-chain-attack-Fd9pzpHlgl19US8qjj1AfEHkQXM36L.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:40.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/openclaw-rce-vulnerability-cve-2026-25253-security-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/openclaw-rce-vulnerability-cve-2026-25253-security-analysis-5Vm0sHagRqsZPIxo0ZbQqxZGqYcAor.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:41.980Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/february-2026-cybersecurity-threats-recap/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/february-2026-cybersecurity-threats-recap-hANHURkNy23xb55x7yPUFmZsLlLfYf.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:44.604Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/russian-apt-office-cve-2026-21509-exploitation-analysis/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/russian-apt-office-cve-2026-21509-exploitation-analysis-G5P5fu66ikwb5rxqgLAkH3YzPCXANz.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:41.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/weekly-cyber-threats-proxy-botnets-ai-security-risks/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/weekly-cyber-threats-proxy-botnets-ai-security-risks-Sh312gGKF0WAl2q1X2uX5l4OdrO2q1.png</image:loc>
</image:image>
<lastmod>2026-02-17T08:35:42.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/how-to-use-cloudflare-zero-trust-to-replace-vpns-securely/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/how-to-use-cloudflare-zero-trust-to-replace-vpns-securely-aSTxFoqoh7lzz3vTHmQq6bTZukPkeX.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:50:21.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/inside-agentic-ai-how-autonomous-security-nodes-think-act/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/inside-agentic-ai-how-autonomous-security-nodes-think-act-S0nelisPkf73Oo0k4yfRQR88hZkkJG.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:51:48.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/top-20-red-team-tactics-mapped-to-mitre-att-ck-2026-edition/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/top-20-red-team-tactics-mapped-to-mitre-att-ck-2026-edition-BnEzWsA3Eie0UhP5MkR4xBo8nCHOD0.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:52:51.642Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/continuous-red-teaming-vs-traditional-pentesting-what-cisos-must-know/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/continuous-red-teaming-vs-traditional-pentesting-what-cisos-must-know-K6fLRlkITWt69SPLBDgrLfGkbKJqeS.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:53:41.128Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/ai-in-offensive-security-benefits-risks-real-world-applications/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/ai-in-offensive-security-benefits-risks-real-world-applications-O15WxSpK7sxPlksM4sQwlPCzJ04tWN.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:54:21.368Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/blog/building-a-modern-red-team-lab-tools-infrastructure-automation/</loc>
<image:image>
<image:loc>https://ehyaozvbkumzk8ia.public.blob.vercel-storage.com/clawbot/building-a-modern-red-team-lab-tools-infrastructure-automation-PbBcM7hcSUEhZffeoQPwKgYayMJiOV.png</image:loc>
</image:image>
<lastmod>2026-02-03T05:55:02.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/oscp-certification-2024/</loc>
<image:image>
<image:loc>/images/gallery/oscp-certification.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:43.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/teiss-london-2025/</loc>
<image:image>
<image:loc>/images/gallery/teiss-london-2025.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:44.706Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/bamko-security-team-2025/</loc>
<image:image>
<image:loc>/images/gallery/bamko-team-2025.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:45.079Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/aws-security-specialty-2024/</loc>
<image:image>
<image:loc>/images/gallery/aws-security-cert.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:45.489Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/bsides-mumbai-2025/</loc>
<image:image>
<image:loc>/images/gallery/bsides-mumbai-2025.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:45.899Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.satyamrastogi.com/gallery/soc2-audit-completion-2026/</loc>
<image:image>
<image:loc>/images/gallery/soc2-audit-2026.jpg</image:loc>
</image:image>
<lastmod>2026-04-03T08:52:46.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
</urlset>
