<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ictsec.pl/posts/AppsFlyer_Web_SDK_Hijacked_to_Spread_CryptoStealing_JavaScript_Code/</loc>
<lastmod>2023-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CrackArmor-Critical-AppArmor-Flaws-Enable-Local-Privilege-Escalation-to-Root/</loc>
<lastmod>2023-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/payload-ransomware-claims-hack-of-royal-bahrain-hospital/</loc>
<lastmod>2023-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Twenty-Years-of-Cloud-Security-Research/</loc>
<lastmod>2023-10-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/betterleaks-a-new-open-source-secrets-scanner/</loc>
<lastmod>2023-10-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/credential-stealing-crew-spoofs-vpn-clients-from-cisco-fortinet-and-others/</loc>
<lastmod>2023-10-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Bypassing-MTE-with-CVE-2025-0072/</loc>
<lastmod>2025-06-03T21:39:48+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-Sindoor-E2-80-93-Anatomy-of-a-Digital-Siege/</loc>
<lastmod>2025-05-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Eye-of-the-Storm-Dissecting-the-Playbook-of-Cyber-Toufan/</loc>
<lastmod>2025-06-03T21:40:10+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Reborn-in-Rust-AsyncRAT/</loc>
<lastmod>2025-06-03T21:39:46+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SilverRAT-Source-Code-Leaked-Online-Heres-What-You-Need-to-Know/</loc>
<lastmod>2025-06-03T21:40:09+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AIVD-and-MIVD-identify-new-Russian-cyber-threat-actor/</loc>
<lastmod>2025-05-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Coordinated-Cloud-Based-Scanning-Operation-Targets-75-Known-Exposure-Points-in-One-Day/</loc>
<lastmod>2025-05-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crypto-&amp;-Investment-scams-exploiting-the-Tesla-brand/</loc>
<lastmod>2025-05-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DragonForce-actors-target-SimpleHelp-vulnerabilities-to-attack-MSP,-customers/</loc>
<lastmod>2025-06-03T21:39:46+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Earth-Lamia-Develops-Custom-Arsenal-to-Target-Multiple-Industries/</loc>
<lastmod>2025-05-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Employees-Searching-Payroll-Portals-on-Google-Tricked-Into-Sending-Paychecks-to-Hackers/</loc>
<lastmod>2025-06-03T21:39:47+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/MATLAB-dev-confirms-ransomware-attack-behind-service-outage/</loc>
<lastmod>2025-06-03T21:40:09+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malware-or-LLM-Silent-Werewolf-employs-new-loaders-to-attack-Russian-and-Moldovan-organizations/</loc>
<lastmod>2025-06-03T21:40:10+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Russia-affiliated-actor-Void-Blizzard-targets-critical-sectors-for-espionage/</loc>
<lastmod>2025-05-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Text-to-Malware-How-Cybercriminals-Weaponize-Fake-AI-Themed-Websites/</loc>
<lastmod>2025-06-03T21:40:11+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Sharp-Taste-of-Mimolette-Analyzing-Mimos-Latest-Campaign-targeting-Craft-CMS/</loc>
<lastmod>2025-06-03T21:58:38+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mark-Your-Calendar-APT41-Innovative-Tactics/</loc>
<lastmod>2025-06-03T21:39:48+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NHS-trusts-data-stolen-in-cyberattack/</loc>
<lastmod>2025-06-03T21:39:49+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pakistan-Telecommunication-Company-(PTCL)-Targeted-by-Bitter-APT-During-Heightened-Regional-Conflict/</loc>
<lastmod>2025-06-03T21:38:21+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Restless-Guests-The-True-Entra-B2B-Guest-Threat-Model/</loc>
<lastmod>2025-05-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zanubis-in-motion-Tracing-the-active-evolution-of-the-Android-banking-malware/</loc>
<lastmod>2025-05-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercriminals-camouflaging-threats-as-AI-tool-installers/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Deep-Dive-into-a-Dumped-Malware-without-a-PE-Header/</loc>
<lastmod>2025-06-03T21:38:23+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Emulating-the-Unyielding-Scattered-Spider/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Haozis-Plug-and-Play-Phishing-as-a-Service-Has-Facilitated-280,000-of-Criminal-Transactions-Over-Past-Five-Months/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Monkey-Patched-PyPI-Packages-Use-Transitive-Dependencies-to-Steal-Solana-Private-Keys/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Possible-ransomware-attack-disrupts-Maine-and-New-Hampshire-Covenant-Health-locations/</loc>
<lastmod>2025-06-03T21:38:22+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-linked-hackers-target-UK-Defense-Ministry-while-posing-as-journalists/</loc>
<lastmod>2025-06-03T21:38:21+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Surveillance-Via-Smart-Toothbrush/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Hunting-C2-over-HTTPS-Connections-Using-the-TLS-Certificate/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tracking-LummaC2-Infrastructure-with-Cats/</loc>
<lastmod>2025-06-03T21:38:23+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/When-Samsungs-Magic-Turns-Tragic-A-Tale-of-Unauthorized-Mining/</loc>
<lastmod>2025-05-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exploits-and-vulnerabilities-in-Q1-2025/</loc>
<lastmod>2025-05-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Interlock-ransomware-what-you-need-to-know/</loc>
<lastmod>2025-05-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/XSSing-TypeErrors-in-Safari/</loc>
<lastmod>2025-05-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/mommy-Access-Broker/</loc>
<lastmod>2025-06-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Acreed-Emerges-as-Dominant-Infostealer-Threat-Following-Lumma-Takedown/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Alleged-Conti,-TrickBot-Gang-Leader-Unmasked/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Backdoors-in-Python-and-NPM-Packages-Target-Windows-and-Linux/</loc>
<lastmod>2025-06-03T21:39:18+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Weaponize-Free-SSH-Client-PuTTY-to-Deliver-Malware-on-Windows/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Incorrect-permission-assignment-on-Universal-Forwarder-for-Windows-during-new-installation-or-upgrade/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malicious-Ruby-Gems-Exfiltrate-Telegram-Tokens-and-Messages-Following-Vietnam-Ban/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Linux-Vulnerabilities-Expose-Password-Hashes-via-Core-Dumps/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Qualcomm-fixes-three-Adreno-GPU-zero-days-exploited-in-attacks/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-community-bank-says-thieves-drained-customer-data-through-third-party-hole/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Versa-Concerto-Understanding-and-Mitigating-CVE-2025-34027/</loc>
<lastmod>2025-06-03T21:39:20+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Victims-risk-AsyncRAT-infection-after-being-redirected-to-fake-Booking.com-sites/</loc>
<lastmod>2025-06-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crocodilus-Mobile-Malware-Evolving-Fast,-Going-Global/</loc>
<lastmod>2025-06-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-Threat-Actors-Exploit-Human-Trust-A-Breakdown-of-the-Prove-You-Are-Human-Malware-Scheme/</loc>
<lastmod>2025-06-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Illicit-crypto-miners-pouncing-on-lazy-DevOps-configs-that-leave-clouds-vulnerable/</loc>
<lastmod>2025-06-04T18:55:24+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Hidden-Cost-of-Trust-New-Data-Reveals-Alarming-Employee-Engagement-with-Vendor-Email-Compromise/</loc>
<lastmod>2025-06-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Rising-Tide-Understanding-the-Surge-in-Cyber-Attacks-in-India/</loc>
<lastmod>2025-06-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-malware-trends-Stealthier,-easier-to-use/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Criminals-Bribed-Outsourced-Contractors-to-Steal-Coinbase-User-Data/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-WordPress-Caching-Plugin-Used-to-Steal-Admin-Credentials/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-open-source-to-open-threat-Tracking-Chaos-RATs-evolution/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Global-Conflicts-in-the-Digital-Age-E2-80-93-How-Geopolitics-Influence-Cyber-Operations/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Multiple-CVEs-in-Infoblox-NetMRI-RCE,-Auth-Bypass,-SQLi,-and-File-Read-Vulnerabilities/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Roundcube-Webmail-under-fire-critical-exploit-found-after-a-decade/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Same-Automated-Impersonation-for-All/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/StormWall-Reveals-India,-China-and-US-Faced-Most-DDoS-Attacks-in-Q1-2025/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Bitter-End-Unraveling-Eight-Years-of-Espionage-Antics-E2-80-94Part-One/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Cost-of-a-Call-From-Voice-Phishing-to-Data-Extortion/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-strange-tale-of-ischhfd83-When-cybercriminals-eat-their-own/</loc>
<lastmod>2025-06-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-05-Daily-Vulns/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Abusing-Paste.ee-to-Deploy-XWorm-and-AsyncRAT-Across-Global-C2-Infrastructure/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-Spyware-Alert!-Fake-government-app-targeting-Android-users-in-India!/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BladedFeline-Whispering-in-the-dark/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-Hackers-Infiltrated-U.S.-Telecom-Networks-a-Year-Earlier-Than-Previously-Known/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ClickFix-Attack-Exploits-Fake-Cloudflare-Turnstile-to-Deliver-Malware/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Newly-identified-wiper-malware-E2-80-9CPathWiper-E2-80-9D-targets-critical-infrastructure-in-Ukraine/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-Endgame-Disrupts-AvCheck,-Forces-Threat-Actors-to-Seek-Alternatives/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Proxy-Services-Feast-on-Ukraines-IP-Address-Exodus/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-Insecure-HTTP-Data-Leaks-in-Popular-Chrome-Extensions/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/What-Really-Happened-in-the-Aftermath-of-the-Lizard-Squad-Hacks/</loc>
<lastmod>2025-06-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-06-Daily-Vulns/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Analysis-of-the-latest-Mirai-wave-exploiting-TBK-DVR-devices-with-CVE-2024-3721/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Blitz-Malware-A-Tale-of-Game-Cheats-and-Code-Repositories/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mapping-Hidden-Alliances-in-Russian-Affiliated-Ransomware/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-DRAGONCLONE-Chinese-Telecommunication-industry-targeted-via-VELETRIX-&amp;-VShell-malware/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-FBI-Issued-a-Warning-About-This-Malware-Thats-Infecting-Millions-of-Devices/</loc>
<lastmod>2025-06-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-07-Daily-Vulns/</loc>
<lastmod>2025-06-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT-41-Threat-Intelligence-Report-and-Malware-Analysis/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Analysis-of-the-Triple-Combo-Threat-of-the-Kimsuky-Group/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DanaBleed-DanaBot-C2-Server-Memory-Leak-Bug/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Eggs-in-a-Cloudy-Basket-Skeleton-Spiders-Trusted-Cloud-Malware-Delivery/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Follow-the-Smoke-7C-China-nexus-Threat-Actors-Hammer-At-the-Doors-of-Top-Tier-Targets/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GhostVendors-Exposed-Silent-Push-Uncovers-Massive-Network-of-4000+-Fraudulent-Domains-Masquerading-as-Major-Brands/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Grocery-wholesale-giant-United-Natural-Foods-hit-by-cyberattack/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PayU-Plugin-Flaw-Allows-Account-Takeover-on-5000-WordPress-Sites/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sleep-with-one-eye-open-how-Librarian-Ghouls-steal-data-by-night/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Two-Botnets,-One-Flaw-Mirai-Spreads-Through-Wazuh-Vulnerability/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/iMessage-Zero-Click-Attacks-Suspected-in-Targeting-of-High-Value-Individuals/</loc>
<lastmod>2025-06-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/A-vulnerability-in-Insyde-H2O-UEFI-application-allows-for-digital-certificate-injection-via-NVRAM-variable/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2025-33053,-Stealth-Falcon-and-Horus-A-Saga-of-Middle-Eastern-Cyber-Espionage/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Coordinated-Brute-Force-Activity-Targeting-Apache-Tomcat-Manager-Indicates-Possible-Upcoming-Threats/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-Patched-in-SAP-NetWeaver/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Flask-Phishing-Kit-Targeted-Credential-Theft-Using-Open-Source-Technology/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Peep-show-40K-IoT-cameras-worldwide-stream-secrets-to-anyone-with-a-browser/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researcher-Found-Flaw-to-Discover-Phone-Numbers-Linked-to-Any-Google-Account/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Security-Flaws-in-eMagicOne-Store-Manager-for-WooCommerce-in-WordPress-(CVE-2025-5058-and-CVE-2025-4603)/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Telegram-Messengers-Ties-to-Russias-FSB-Revealed-in-New-Report/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Evolution-of-Linux-Binaries-in-Targeted-Cloud-Operations/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-the-Infrastructure-of-a-Spearphishing-Campaign/</loc>
<lastmod>2025-06-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-11-Daily-Vulns/</loc>
<lastmod>2025-06-11T19:24:37+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT-PROFILE-E2-80-93-MISSION2025/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-Unleash-TeamFiltration-Account-Takeover-Campaign-(UNK_SneakyStrike)-Leverages-Popular-Pentesting-Tool/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Global-analysis-of-Adversary-in-the-Middle-phishing-threats/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NTLM-reflection-is-dead,-long-live-NTLM-reflection!-E2-80-93-An-in-depth-analysis-of-CVE-2025-33073/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Over-80,000-servers-hit-as-Roundcube-RCE-bug-gets-rapidly-exploited/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researcher-Finds-Five-Zero-Days-and-20+-Misconfigurations-in-Salesforce-Cloud/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Toxic-trend-Another-malware-threat-targets-DeepSeek/</loc>
<lastmod>2025-06-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-12-Daily-Vulns/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dont-Get-Caught-in-the-Headlights-DeerStealer-Analysis/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/EchoLeak-Zero-Click-AI-Attack-in-Microsoft-Copilot-Exposes-Company-Data/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fog-Ransomware-Unusual-Toolset-Used-in-Recent-Attack/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Trust-to-Threat-Hijacked-Discord-Invites-Used-for-Multi-Stage-Malware-Delivery/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GitHub-Device-Code-Phishing/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Graphite-Caught,-First-Forensic-Confirmation-of-Paragons-iOS-Mercenary-Spyware-Finds-Journalists-Targeted/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-FluxPanel-How-Phishing-Enables-Real-Time-Ecommerce-Checkout-Hijacks/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-a-Dark-Adtech-Empire-Fed-by-Fake-CAPTCHAs/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/JSFireTruck-Exploring-Malicious-JavaScript-Using-JSF-ck-as-an-Obfuscation-Technique/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NAT-and-Packet-Capture/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-E2-80-98SmartAttack-Steals-Air-Gapped-Data-Using-Smartwatches/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Scum-Disrupted-Utility-Services-with-SimpleHelp-Attacks/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-scum-disrupted-utility-services-with-SimpleHelp-attacks/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sweden-says-it-is-under-cyber-attack/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-TokenBreak-Attack/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zero-Click-AI-Vulnerability-Exposes-Microsoft-365-Copilot-Data-Without-User-Interaction/</loc>
<lastmod>2025-06-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-13-Daily-Vulns/</loc>
<lastmod>2025-06-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Acer-Control-Center-Flaw-Lets-Attackers-Run-Malicious-Code-as-Elevated-User/</loc>
<lastmod>2025-06-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anubis-A-Closer-Look-at-an-Emerging-Ransomware-with-Built-in-Wiper/</loc>
<lastmod>2025-06-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Paraguay-is-Being-Targeted-by-Cybercriminals-7.4-Million-Citizen-Records-for-Sale/</loc>
<lastmod>2025-06-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-14-Daily-Vulns/</loc>
<lastmod>2025-06-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-16-Daily-Vulns/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CYFIRMA-INDUSTRY-REPORT-E2-80-93-HEALTHCARE/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Clone,-Compile,-Compromise-Water-Curses-Open-Source-Malware-Trap-on-GitHub/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fileless-AsyncRAT-Distributed-Via-Clickfix-Technique-Targeting-German-Speaking-Users/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Is-your-AI-safe-Threat-analysis-of-MCP-(Model-Context-Protocol)/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kali-Linux-2025.2-released-with-13-new-tools,-car-hacking-updates/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PyPI,-npm,-and-AI-Tools-Exploited-in-Malware-Surge-Targeting-DevOps-and-Cloud-Environments/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Report-Links-Los-Pollos-and-RichAds-to-Malware-Traffic-Operations/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scattered-Spider-has-moved-from-retail-to-insurance/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tenable-Fixes-Three-High-Severity-Flaws-in-Vulnerability-Scanner-Nessus/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/VMOSX-Data-Leak-Info-of-Thousands-of-Mac-Cloud-Users-Potentially-Exposed-Online/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Washington-Posts-email-system-hacked,-journalists-accounts-compromised/</loc>
<lastmod>2025-06-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-17-Daily-Vulns/</loc>
<lastmod>2025-06-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Langflow-Vulnerability-(CVE-2025-3248)-Actively-Exploited-to-Deliver-Flodrix-Botnet/</loc>
<lastmod>2025-06-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-Fraudsters-Are-Poisoning-Search-Results-to-Promote-Phishing-Sites/</loc>
<lastmod>2025-06-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Is-b-For-Backdoor-Pre-Auth-RCE-Chain-In-Sitecore-Experience-Platform/</loc>
<lastmod>2025-06-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Smart-air-fryers-ordered-to-stop-invading-our-digital-privacy/</loc>
<lastmod>2025-06-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-Minecraft-mods-distributed-by-the-Stargazers-Ghost-Network-to-steal-gamers-data/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Famous-Chollima-deploying-Python-version-of-GolangGhost-RAT/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fault-Injection-E2-80-93-Follow-the-White-Rabbit/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Gangs-Collapse-as-Qilin-Seizes-Control/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Same-Sea,-New-Phish,-Russian-Government-Linked-Social-Engineering-Targets-App-Specific-Passwords/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-actor-Banana-Squad-exploits-GitHub-repos-in-new-campaign/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Whats-Inside-the-Massive-Chinese-Data-Leak/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Whats-in-an-ASP-Creative-Phishing-Attack-on-Prominent-Academics-and-Critics-of-Russia/</loc>
<lastmod>2025-06-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-19-Daily-Vulns/</loc>
<lastmod>2025-06-21T00:27:09+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cobalt-Strike-Operators-Leverage-PowerShell-Loaders-Across-Chinese,-Russian,-and-Global-Infrastructure/</loc>
<lastmod>2025-06-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Part-2-Tracking-LummaC2-Infrastructure/</loc>
<lastmod>2025-06-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Aflac-notifies-SEC-of-breach-suspected-to-be-work-of-Scattered-Spider/</loc>
<lastmod>2025-06-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Resurgence-of-the-Prometei-Botnet/</loc>
<lastmod>2025-06-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zoom-&amp;-doom-BlueNoroff-call-opens-the-door/</loc>
<lastmod>2025-06-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-21-Daily-Vulns/</loc>
<lastmod>2025-06-21T07:53:13+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT36-Phishing-Campaign-Targets-Indian-Defense-Using-Credential-Stealing-Malware/</loc>
<lastmod>2025-06-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Androxgh0st-Continues-Exploitation-Operators-Compromise-a-US-University-For-Hosting-C2-Logger/</loc>
<lastmod>2025-06-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iran-Linked-Threat-Actors-Leak-Visitors-and-Athletes-Data-from-Saudi-Games/</loc>
<lastmod>2025-06-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-E2-80-9CLapDogs-E2-80-9D-ORB-Network-Targets-US-and-Asia/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ConnectUnwise-Threat-actors-abuse-ConnectWise-as-builder-for-signed-malware/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Meshtastic-Flaw-Allows-Attackers-to-Decrypt-Private-Messages/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hive0154-aka-Mustang-Panda-shifts-focus-on-Tibetan-community-to-deploy-Pubload-backdoor/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SparkKitty,-SparkCats-little-brother-A-new-Trojan-spy-found-in-the-App-Store-and-Google-Play/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Trix-Shots-Remote-Code-Execution-on-Aviatrix-Controller/</loc>
<lastmod>2025-06-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-24-Daily-Vulns/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Another-Wave-North-Korean-Contagious-Interview-Campaign-Drops-35-New-Malicious-npm-Packages/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-linked-Salt-Typhoon-Exploits-Critical-Cisco-Vulnerability-to-Target-Canadian-Telecom/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cryptominers-Anatomy-Shutting-Down-Mining-Botnets/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercriminals-Abuse-Open-Source-Tools-To-Target-Africas-Financial-Sector/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dont-panic,-but-its-only-a-matter-of-time-before-critical-CitrixBleed-2-is-under-attack/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OneClik-A-ClickOnce-Based-APT-Campaign-Targeting-Energy,-Oil-and-Gas-Infrastructure/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russia-linked-APT28-use-Signal-chats-to-target-Ukraine-official-with-malware/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Why-a-Classic-MCP-Server-Vulnerability-Can-Undermine-Your-Entire-AI-Agent/</loc>
<lastmod>2025-06-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-06-25-Daily-Vulns/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crash-(exploit)-and-burn-Securing-the-offensive-cyber-supply-chain-to-counter-China-in-cyberspace/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercrime-is-surging-across-Africa/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercriminal-abuse-of-large-language-models/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/In-the-Wild-Malware-Prototype-with-Embedded-Prompt-Injection/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iranian-Educated-Manticore-Targets-Leading-Tech-Academics/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Patch-and-Persist-Darktraces-Detection-of-Blind-Eagle-(APT-C-36)/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Realtek-Bluetooth-Flaw-Allows-Attackers-to-Launch-DoS-Attacks-During-Pairing/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Surge-in-MOVEit-Transfer-Scanning-Could-Signal-Emerging-Threat-Activity/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Case-of-Hidden-Spam-Pages/</loc>
<lastmod>2025-06-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cisco-ISE-Vulnerability-Allows-Remote-Attackers-to-Execute-Malicious-Commands/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Decrement-by-one-to-rule-them-all-AsIO3.sys-driver-exploitation/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DeepSeek-Deception-Sainbox-RAT-&amp;-Hidden-Rootkit-Delivery/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Extracting-Lines-of-Interest-From-Zeek-Logs/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GIFTEDCROOKs-Strategic-Pivot-From-Browser-Stealer-to-Data-Exfiltration-Platform-During-Critical-Ukraine-Negotiations/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gogs-Remote-Command-Execution-Vulnerability-(CVE-2024-56731)/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Odyssey-Stealer-The-Rebrand-of-Poseidon-Stealer/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Supply-Chain-Incident-Imperils-Glasgow-Council-Services-and-Data/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Taking-the-shine-off-BreachForums/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zero-day-Bluetooth-gap-turns-millions-of-headphones-into-listening-stations/</loc>
<lastmod>2025-06-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-ICS-vulnerabilities-threaten-Mitsubishi-Electric-and-TrendMakers-hardware-across-commercial-facilities/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hawaiian-Airlines-Hit-by-Cybersecurity-Incident/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NSFOCUS-APT-Monthly-Briefing-E2-80-93-May-2025/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Stealthy-WordPress-Malware-Drops-Windows-Trojan-via-PHP-Backdoor/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Peoples-Liberation-Army-Cyberspace-Force/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tracing-Blind-Eagle-to-Proton66/</loc>
<lastmod>2025-06-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/10-Things-I-Hate-About-Attribution-RomCom-vs.-TransferLoader/</loc>
<lastmod>2025-06-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Jasper-Sleet-North-Korean-remote-IT-workers-evolving-tactics-to-infiltrate-organizations/</loc>
<lastmod>2025-06-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sinaloa-drug-cartel-hired-a-cybersnoop-to-identify-and-kill-FBI-informants/</loc>
<lastmod>2025-06-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Using-AI-to-identify-cybercrime-masterminds/</loc>
<lastmod>2025-06-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Can-You-Trust-that-Verified-Symbol-Exploiting-IDE-Extensions-is-Easier-Than-it-Should-Be/</loc>
<lastmod>2025-07-18T18:52:25+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-in-Microsens-Devices-Exposes-Systems-to-Hackers/</loc>
<lastmod>2025-07-18T18:52:26+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crypto-Operation-Using-Fake-Investment-Platforms-Dismantled-in-Spain/</loc>
<lastmod>2025-07-18T18:52:23+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Houken-seeking-a-path-by-living-on-the-edge-with-zero-days/</loc>
<lastmod>2025-07-18T18:52:25+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/International-Criminal-Court-hit-with-cyber-attack-during-NATO-summit/</loc>
<lastmod>2025-07-18T18:52:24+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iran/</loc>
<lastmod>2025-07-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Large-Language-Models-(LLMs)-Are-Falling-for-Phishing-Scams-What-Happens-When-AI-Gives-You-the-Wrong-URL/</loc>
<lastmod>2025-07-18T18:52:24+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Okta-observes-v0-AI-tool-used-to-build-phishing-sites/</loc>
<lastmod>2025-07-18T18:53:14+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Uncovering-DPRK-Remote-Workers-Detecting-Hidden-Threats-Through-Internet-Telemetry/</loc>
<lastmod>2025-07-18T18:53:12+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cl0p-cybercrime-gangs-data-exfiltration-tool-found-vulnerable-to-RCE-attacks/</loc>
<lastmod>2025-07-18T18:53:14+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Data-breach-reveals-Catwatchful-E2-80-98stalkerware-is-spying-on-thousands-of-phones/</loc>
<lastmod>2025-07-18T18:53:16+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exposed-JDWP-Exploited-in-the-Wild-What-Happens-When-Debug-Ports-Are-Left-Open/</loc>
<lastmod>2025-07-18T18:53:16+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gamaredon-in-2024-Cranking-out-spearphishing-campaigns-against-Ukraine-with-an-evolved-toolset/</loc>
<lastmod>2025-07-18T18:52:27+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Junes-Dark-Gift-The-Rise-of-Qwizzserial/</loc>
<lastmod>2025-07-18T18:52:28+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Qantas-confirms-customer-data-breach-amid-Scattered-Spider-attacks/</loc>
<lastmod>2025-07-18T18:52:28+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Silent-Push-Uncovers-Chinese-Fake-Marketplace-e-Commerce-Phishing-Campaign/</loc>
<lastmod>2025-07-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/macOS-NimDoor-7C-DPRK-Threat-Actors-Target-Web3-and-Crypto-Platforms-with-Nim-Based-Malware/</loc>
<lastmod>2025-07-18T18:52:26+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-03-Daily-Vulns/</loc>
<lastmod>2025-07-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/When-Installers-Turn-Evil-The-Pascal-Script-Behind-Inno-Setup-Malware-Campaign/</loc>
<lastmod>2025-07-18T18:53:22+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-04-Daily-Vulns/</loc>
<lastmod>2025-07-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Sudo-bugs-expose-major-Linux-distros-to-local-Root-exploits/</loc>
<lastmod>2025-07-18T18:53:18+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-Much-More-Must-We-Bleed-Citrix-NetScaler-Memory-Disclosure-(CitrixBleed-2-CVE-2025-5777)/</loc>
<lastmod>2025-07-18T18:53:22+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NightEagle-APT-Exploits-Microsoft-Exchange-Flaw-to-Target-Chinas-Military-and-Tech-Sectors/</loc>
<lastmod>2025-07-18T18:53:15+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishing-Attack-Deploying-Malware-on-Indian-Defense-BOSS-Linux/</loc>
<lastmod>2025-07-18T18:53:18+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ingram-Micro-outage-caused-by-SafePay-ransomware-attack/</loc>
<lastmod>2025-07-18T18:53:15+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-Insecure-HTTP-Data-Leaks-in-Popular-Chrome-Extensions/</loc>
<lastmod>2025-07-18T18:53:17+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-vulnerabilities-in-NetScaler-ADC-exploited-in-the-wild-everything-you-need-to-know/</loc>
<lastmod>2025-07-18T18:53:23+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BERT-Ransomware-Group-Targets-Asia-and-Europe-on-Multiple-Platforms/</loc>
<lastmod>2025-07-18T18:53:21+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Batavia-spyware-steals-data-from-Russian-organizations/</loc>
<lastmod>2025-07-18T18:53:19+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2025-5777-CitrixBleed-2-Write-Up-E2-80-A6-Maybe/</loc>
<lastmod>2025-07-18T18:53:27+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Deploying-NetSupport-RAT-via-WordPress-&amp;-ClickFix/</loc>
<lastmod>2025-07-18T18:53:21+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Digging-Gold-with-a-Spoon-E2-80-93-Resurgence-of-Monero-mining-Malware/</loc>
<lastmod>2025-07-18T18:53:20+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-abuse-leaked-Shellter-red-team-tool-to-deploy-infostealers/</loc>
<lastmod>2025-07-18T18:53:19+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NordDragonScan-Quiet-Data-Harvester-on-Windows/</loc>
<lastmod>2025-07-18T18:53:25+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-08-Daily-Vulns/</loc>
<lastmod>2025-07-10T12:22:16+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anatsa-Targets-North-America;-Uses-Proven-Mobile-Campaign-Process/</loc>
<lastmod>2025-07-18T18:53:25+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Animation-Driven-Tapjacking-on-Android/</loc>
<lastmod>2025-07-18T18:53:30+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Combolists-and-ULP-Files-on-the-Dark-Web-A-Secondary-and-Unreliable-Source-of-Information-about-Compromises/</loc>
<lastmod>2025-07-18T18:53:27+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Click-to-Compromise-Unveiling-the-Sophisticated-Attack-of-DoNot-APT-Group-on-Southern-European-Government-Entities/</loc>
<lastmod>2025-07-18T18:53:28+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GoldMelodys-Hidden-Chords-Initial-Access-Broker-In-Memory-IIS-Modules-Revealed/</loc>
<lastmod>2025-07-18T18:53:23+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malicious-pull-request-infects-VS-Code-extension/</loc>
<lastmod>2025-07-18T18:53:24+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pay2Keys-Resurgence-Iranian-Cyber-Warfare-Targets-the-West/</loc>
<lastmod>2025-07-18T18:53:28+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RDAP-and-BGP-in-Investigative-Journalism/</loc>
<lastmod>2025-07-18T18:53:26+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Reveal-18-Malicious-Chrome-and-Edge-Extensions-Disguised-as-Everyday-Tools/</loc>
<lastmod>2025-07-18T18:53:26+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-Inject-Code-into-WordPress-Theme-to-Redirect-Visitors/</loc>
<lastmod>2025-07-18T18:53:33+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Count(er)-Strike-E2-80-93-Data-Inference-Vulnerability-in-ServiceNow/</loc>
<lastmod>2025-07-18T18:53:31+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-RCE-Vulnerability-in-mcp-remote-CVE-2025-6514-Threatens-LLM-Clients/</loc>
<lastmod>2025-07-18T18:53:32+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GitHub-Abused-to-Spread-Malware-Disguised-as-Free-VPN/</loc>
<lastmod>2025-07-18T18:53:30+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GreyNoise-Identifies-New-Scraper-Botnet-Concentrated-in-Taiwan/</loc>
<lastmod>2025-07-18T18:53:35+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PerfektBlue-1-click-RCE-attack/</loc>
<lastmod>2025-07-18T18:53:32+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Risky-Bulletin-Browser-extensions-hijacked-for-web-scraping-botnet/</loc>
<lastmod>2025-07-18T18:53:31+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Server-with-Rockerbox-Tax-Firm-Data-Exposed-286GB-of-Records/</loc>
<lastmod>2025-07-18T18:53:29+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-10-Daily-Vulns/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AMD-Warns-of-New-Transient-Scheduler-Attacks-Impacting-a-Wide-Range-of-CPUs/</loc>
<lastmod>2025-07-18T18:53:33+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Asus-and-Adobe-vulnerabilities/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/At-last,-a-use-case-for-AI-agents-with-sky-high-ROI-Stealing-crypto/</loc>
<lastmod>2025-07-18T18:53:35+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Code-highlighting-with-Cursor-AI-for-500,000/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dark-Web-Profile-Arkana-Ransomware/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fix-the-Click-Preventing-the-ClickFix-Attack-Vector/</loc>
<lastmod>2025-07-18T18:53:37+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/July-Patch-Tuesday-offers-127-fixes/</loc>
<lastmod>2025-07-18T18:53:37+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malware-of-the-Day-E2-80-93-Multi-Modal-C2-Communication-E2-80-93-Numinon-C2/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Delivered-Through-GitHub-A-PowerShell-Powered-Attack/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Rendershock-Weaponizing-Trust-in-File-Rendering-Pipelines/</loc>
<lastmod>2025-07-18T18:53:36+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Where-Everybody-Knows-Your-Name-Observing-Malice-Complicit-Nameservers/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Wing-FTP-Server-Remote-Code-Execution-(CVE-2025-47812)-Exploited-in-the-Wild/</loc>
<lastmod>2025-07-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/macOS.ZuRu-Resurfaces-7C-Modified-Khepri-C2-Hides-Inside-Doctored-Termius-App/</loc>
<lastmod>2025-07-18T18:53:34+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-11-Daily-Vulns/</loc>
<lastmod>2025-07-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GAO-finds-progress-in-cyber-information-sharing,-warns-of-rising-attacks-on-critical-infrastructure/</loc>
<lastmod>2025-07-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pre-Auth-SQL-Injection-to-RCE-Fortinet-FortiWeb-Fabric-Connector-(CVE-2025-25257)/</loc>
<lastmod>2025-07-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-12-Daily-Vulns/</loc>
<lastmod>2025-07-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OCTALYN-STEALER-UNMASKED/</loc>
<lastmod>2025-07-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chasing-Ghosts-Over-RDP-Lateral-Movement-in-Tiny-Bitmaps/</loc>
<lastmod>2025-07-18T18:53:46+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Nvidia-warns-its-GPUs-E2-80-93-even-Blackwells-E2-80-93-need-protection-against-Rowhammer-attacks/</loc>
<lastmod>2025-07-18T18:53:43+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Behind-the-Clouds-Attackers-Targeting-Governments-in-Southeast-Asia-Implement-Novel-Covert-C2-Communication/</loc>
<lastmod>2025-07-18T18:53:51+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Contagious-Interview-Campaign-Escalates-With-67-Malicious-npm-Packages-and-New-Malware-Loader/</loc>
<lastmod>2025-07-18T18:53:48+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DOGE-Denizen-Marko-Elez-Leaked-API-Key-for-xAI/</loc>
<lastmod>2025-07-18T18:53:51+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Forensic-journey-Breaking-down-the-UserAssist-artifact-structure/</loc>
<lastmod>2025-07-18T18:53:46+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GLOBAL-GROUP-Emerging-Ransomware-as-a-Service,-Supporting-AI-Driven-Negotiation-and-Mobile-Control-Panel-for-Their-Affiliates/</loc>
<lastmod>2025-07-18T18:53:45+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Global-Louis-Vuitton-data-breach-impacts-UK,-South-Korea,-and-Turkey/</loc>
<lastmod>2025-07-18T18:53:44+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-Gemini-Tricked-Into-Showing-Phishing-Message-Hidden-in-Email/</loc>
<lastmod>2025-07-18T18:53:47+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/KongTuke-FileFix-Leads-to-New-Interlock-RAT-Variant/</loc>
<lastmod>2025-07-18T18:53:49+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Good,-the-Bad,-and-the-Encoding-An-SS7-Bypass-Attack/</loc>
<lastmod>2025-07-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/eSIM-Vulnerability-in-Kigens-eUICC-Cards-Exposes-Billions-of-IoT-Devices-to-Malicious-Attacks/</loc>
<lastmod>2025-07-18T18:53:47+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-15-Daily-Vulns/</loc>
<lastmod>2025-07-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hyper-volumetric-DDoS-attacks-skyrocket-Cloudflares-2025-Q2-DDoS-threat-report/</loc>
<lastmod>2025-07-18T18:53:49+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Konfety-Returns-Classic-Mobile-Threat-with-New-Evasion-Techniques/</loc>
<lastmod>2025-07-18T18:53:50+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/On-the-Move-Fast-Flux-in-the-Modern-Threat-Landscape/</loc>
<lastmod>2025-07-18T18:53:57+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Exploit-SVG-Files-in-Stealthy-JavaScript-Redirects/</loc>
<lastmod>2025-07-18T18:53:48+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tracking-Protestware-Spread-28-npm-Packages-Affected-by-Payload-Targeting-Russian-Language-Users/</loc>
<lastmod>2025-07-18T18:53:57+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ukrainian-Hackers-Wipe-47TB-of-Data-from-Top-Russian-Military-Drone-Supplier/</loc>
<lastmod>2025-07-18T18:53:52+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zyxel-security-advisory-for-path-traversal-vulnerability-in-APs/</loc>
<lastmod>2025-07-18T18:53:52+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-16-Daily-Vulns/</loc>
<lastmod>2025-07-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-a-Teams-Call-to-a-Ransomware-Threat-Matanbuchus-3.0-MaaS-Levels-Up/</loc>
<lastmod>2025-07-18T18:53:56+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Global-operation-targets-NoName057(16)-pro-Russian-cybercrime-network/</loc>
<lastmod>2025-07-18T18:53:55+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Old-Miner,-New-Tricks-H2miner-Resurfaces-with-Lcrypt0rx-Ransomware/</loc>
<lastmod>2025-07-18T18:53:59+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ongoing-SonicWall-Secure-Mobile-Access-(SMA)-Exploitation-Campaign-using-the-OVERSTEP-Backdoor/</loc>
<lastmod>2025-07-18T18:53:54+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phish-and-Chips-China-Aligned-Espionage-Actors-Ramp-Up-Taiwan-Semiconductor-Industry-Targeting/</loc>
<lastmod>2025-07-18T18:53:58+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Salt-Typhoon-breach-Chinese-APT-compromises-U.S.-Army-National-Guard-network/</loc>
<lastmod>2025-07-18T18:53:54+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Turbulence-at-Air-Serbia,-the-latest-airline-under-cyber-siege/</loc>
<lastmod>2025-07-18T18:53:55+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UNG0002,-Regional-Threat-Operations-Tracked-Across-Multiple-Asian-Jurisdictions/</loc>
<lastmod>2025-07-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-17-Daily-Vulns/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/British-spies-and-SAS-named-in-Afghan-data-breach/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CryptoJacking-is-dead,-long-live-CryptoJacking/</loc>
<lastmod>2025-07-18T18:54:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-Receipts-Generators-the-rising-threat-to-major-retail-brands/</loc>
<lastmod>2025-07-18T18:54:01+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Flaw-in-Signal-App-Clone-Could-Leak-Passwords-E2-80-94-GreyNoise-Identifies-Active-Reconnaissance-and-Exploit-Attempts/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GhostContainer-backdoor-malware-compromising-Exchange-servers-of-high-value-organizations-in-Asia/</loc>
<lastmod>2025-07-18T18:53:59+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/MaaS-operation-using-Emmenhtal-and-Amadey-linked-to-threats-against-Ukrainian-entities/</loc>
<lastmod>2025-07-18T18:54:01+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mobile-Forensics-Tool-Used-by-Chinese-Law-Enforcement-Dissected/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NVIDIAScape-Critical-NVIDIA-AI-Vulnerability-A-Three-Line-Container-Escape-in-NVIDIA-Container-Toolkit-(CVE-2025-23266)/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Linuxsys-Cryptominer/</loc>
<lastmod>2025-07-18T18:53:58+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-hunting-case-study-Lumma-infostealer/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WordPress-Redirect-Malware-Hidden-in-Google-Tag-Manager-Code/</loc>
<lastmod>2025-07-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-18-Daily-Vulns/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CERT-UA-Discovers-LAMEHUG-Malware-Linked-to-APT28,-Using-LLM-for-Phishing-Campaign/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Follow-Up-Cisco-Updates-Advisory-with-Additional-Maximum-Severity-Unauthenticated-RCE-in-ISE-and-ISE-PIC-(CVE-2025-20337)/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Getting-to-the-Crux-(Ransomware)-of-the-Matter/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Greedy-Sponge-Targets-Mexico-with-AllaKore-RAT-and-SystemBC/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-Chinas-Patriotic-E2-80-98Honkers-Became-the-Nations-Elite-Cyberspies/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malware-Identified-in-Attacks-Exploiting-Ivanti-Connect-Secure-Vulnerabilities/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-calls-out-Russian-military-intelligence-for-use-of-espionage-tool/</loc>
<lastmod>2025-07-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-19-Daily-Vulns/</loc>
<lastmod>2025-07-20T18:43:10+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-20-Daily-Vulns/</loc>
<lastmod>2025-07-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dell-confirms-breach-of-test-lab-platform-by-World-Leaks-extortion-group/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Four-new-Android-spyware-samples-linked-to-Irans-intel-agency/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Livewire-Flaw-Puts-Millions-of-Laravel-Apps-at-Risk-of-RCE-Attacks/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Lookout-Discovers-Iranian-APT-MuddyWater-Leveraging-DCHSpy-During-Israel-Iran-Conflict/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Fix-Targets-Attacks-on-SharePoint-Zero-Day/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NET-RFQ-Request-for-Quote-Scammers-Casting-Wide-Net-to-Steal-Real-Goods/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Internet-Red-Button-a-2016-Bug-Still-Lets-Anyone-Kill-Solar-Farms-in-3-Clicks/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-SOC-files-Rumble-in-the-jungle-or-APT41s-new-target-in-Africa/</loc>
<lastmod>2025-07-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-22-Daily-Vulns/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BIDI-Swap-Unmasking-the-Art-of-URL-Misleading-with-Bidirectional-Text-Tricks/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Back-to-Business-Lumma-Stealer-Returns-with-Stealthier-Methods/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Clickfix-on-macOS-AppleScript-Malware-Campaign-Uses-Terminal-Prompts-to-Steal-Data/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Coyote-in-the-Wild-First-Ever-Malware-That-Abuses-UI-Automation/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-DEF-CON-hacking-villages-help-to-save-the-planet/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-We-Accidentally-Discovered-a-Remote-Code-Execution-Vulnerability-in-ETQ-Reliance/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Group-Uses-AI-Chatbot-to-Intensify-Pressure-on-Victims/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Rise-of-Acreed-Infostealer-in-the-Post-LummaC2-Threat-Landscape/</loc>
<lastmod>2025-07-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-23-Daily-Vulns/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/A-Special-Mission-to-Nowhere,-Exploiting-the-Middle-East-crisis-with-a-charter-jet-scam/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Account-Takeover-Vulnerability-Affecting-Over-400K-Installations-Patched-in-Post-SMTP-Plugin/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerabilities-Found-in-Tridium-Niagara-Framework/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dropping-Elephant-APT-Group-Targets-Turkish-Defense-Industry-With-New-Campaign-and-Capabilities-LOLBAS,-VLC-Player,-and-Encrypted-Shellcode/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gunra-Ransomware-Emerges-with-New-DLS/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/HAFNIUM-Linked-Hacker-Xu-Zewei-Riding-the-Tides-of-Chinas-Cyber-Ecosystem/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Illusory-Wishes-China-nexus-APT-Targets-the-Tibetan-Community/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Key-figure-behind-major-Russian-speaking-cybercrime-forum-targeted-in-Ukraine/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-CargoTalon-UNG0901-Targets-Russian-Aerospace-&amp;-Defense-Sector-using-EAGLET-implant/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ports-are-getting-smarter-and-more-hackable/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Signed,-Sealed,-Altered-Deepdive-into-PDF-Tempering/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Surveillance-Malware-Hidden-in-npm-and-PyPI-Packages-Targets-Developers-with-Keyloggers,-Webcam-Capture,-and-Credential-Theft/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-nuclear-weapons-agency-hacked-in-Microsoft-SharePoint-attacks/</loc>
<lastmod>2025-07-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-24-Daily-Vulns/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/A-Spike-in-the-Desert-How-GreyNoise-Uncovered-a-Global-Pattern-of-VOIP-Based-Telnet-Attacks/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cyber-Stealer-Analysis-When-Your-Malware-Developer-Has-FOMO-About-Features/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DNS-Packet-Inspection-for-Network-Threat-Hunters/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ToolShell-An-all-you-can-eat-buffet-for-threat-actors/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-the-new-Chaos-RaaS-group-attacks/</loc>
<lastmod>2025-07-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-25-Daily-Vulns/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Arizona-Woman-Sentenced-to-8-Years-for-Orchestrating-17-million-North-Korean-Remote-Work-Scam/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Citrix-NetScaler-Devices-Memory-Leak-CVE-2025-5777/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hunting-Laundry-Bear-Infrastructure-Analysis-Guide-and-Findings/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Methods-to-Bypass-OTP-in-Mobile-Apps-Successful-VAPT-Scenarios/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ToolShell,-SharePoint,-and-the-Death-of-the-Patch-Window/</loc>
<lastmod>2025-07-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-26-Daily-Vulns/</loc>
<lastmod>2025-07-29T21:20:01+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Florida-Student-Research-Deploys-AI-to-Spot-Stealthy-Android-Malware/</loc>
<lastmod>2025-07-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Exploit-Official-Gaming-Mouse-Software-to-Spread-Windows-based-Xred-Malware/</loc>
<lastmod>2025-07-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RAVEN-STEALER-UNMASKED-Telegram-Based-Data-Exfiltration/</loc>
<lastmod>2025-07-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Expose-Massive-Online-Fake-Currency-Operation-in-India/</loc>
<lastmod>2025-07-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scattered-Spider-is-running-a-VMware-ESXi-hacking-spree/</loc>
<lastmod>2025-07-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-linked-group-Fire-Ant-exploits-VMware-and-F5-flaws-since-early-2025/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybersecurity-Scams-Targeting-Fans-and-Teams-at-the-2025-Belgian-Grand-Prix/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RedHook-A-New-Android-Banking-Trojan-Targeting-Users-in-Vietnam/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Revisiting-UNC3886-Tactics-to-Defend-Against-Present-Risk/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russias-Aeroflot-cancels-flights-after-pro-Ukrainian-hackers-claim-massive-cyberattack/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Stack-Overflows,-Heap-Overflows,-and-Existential-Dread-(SonicWall-SMA100-CVE-2025-40596,-CVE-2025-40597-and-CVE-2025-40598)/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ToxicPanda-The-Android-Banking-Trojan-Targeting-Europe/</loc>
<lastmod>2025-07-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-29-Daily-Vulns/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-Actively-Exploiting-Critical-Vulnerability-in-Alone-Theme/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attacking-GenAI-applications-and-LLMs-E2-80-93-Sometimes-all-it-takes-is-to-ask-nicely!/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Auto-Color-Backdoor-How-Darktrace-Thwarted-a-Stealthy-Linux-Intrusion/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercriminals-Attack-Seychelles-E2-80-93-Offshore-Banking-as-a-Target/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Deepfakes-and-Unkept-Promises-lead-to-Financial-Fraud-on-Social-Media,-targeting-the-General-Public/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GOLD-BLADE-remote-DLL-sideloading-attack-deploys-RedLoader/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/JSCEAL-Targets-Crypto-App-Users-E2-80-93-A-New-Threat-in-the-Cyber-Security-Landscape/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Organizations-Warned-of-Exploited-PaperCut-Flaw/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Struts-Devmode-in-2025-Critical-Pre-Auth-Vulnerabilities-in-Adobe-Experience-Manager-Forms/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UNC3886-Actors-Know-for-Exploiting-0-Days-Attacking-Singapores-Critical-Infrastructure/</loc>
<lastmod>2025-07-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-30-Daily-Vulns/</loc>
<lastmod>2025-07-30T18:01:10+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anubis-and-the-Death-of-Data-A-New-Era-of-Ransomware-Operations/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Behind-Random-Words-DoubleTrouble-Mobile-Banking-Trojan-Revealed/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinas-Covert-Capabilities-7C-Silk-Spun-From-Hafnium/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cobalt-Strike-Beacon-delivered-via-GitHub-and-social-media/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exploiting-Direct-Send-Attackers-Abuse-Microsoft-365-to-Deliver-Internal-Phishing-Attacks/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Qwins-Ltd-Bulletproof-Hosting-Provider-Powering-Global-Malware-Campaigns/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scammers-Unleash-Flood-of-Slick-Online-Gaming-Sites/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShinyHunters-behind-Salesforce-data-theft-attacks-at-Qantas,-Allianz-Life,-and-LVMH/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UNC2891-Bank-Heist-Physical-ATM-Backdoor-&amp;-Linux-Forensic-Evasion-Evasion/</loc>
<lastmod>2025-07-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-07-31-Daily-Vulns/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT36-Expands-Beyond-Military-New-Attacks-Hit-Indian-Railways,-Oil-&amp;-Government-Systems/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Before-ToolShell-Exploring-Storm-2603s-Previous-Ransomware-Operations/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dahua-Camera-flaws-allow-remote-hacking.-Update-firmware-now/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Laptops-to-Laundromats-How-DPRK-IT-Workers-Infiltrated-the-Global-Remote-Economy/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Frozen-in-transit-Secret-Blizzards-AiTM-campaign-against-diplomats/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-OAuth-App-Impersonation-Campaign-Leads-to-MFA-Phishing/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-in-Q2-2025-AI-Joins-the-Crew,-Cartels-Rise,-and-Payment-Rates-Collapse/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Commented-Kill-Chain-Why-Old-Ransomware-Playbooks-Never-Die/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-Interlock-Groups-Evolving-Malware-Arsenal/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Using-LLMs-as-a-reverse-engineering-sidekick/</loc>
<lastmod>2025-07-31T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-01-Daily-Vulns/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-Generated-Malicious-npm-Package-Drains-Solana-Funds-from-1,500+-Before-Takedown/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-powered-Cursor-IDE-vulnerable-to-prompt-injection-attacks/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Arctic-Wolf-Observes-July-2025-Uptick-in-Akira-Ransomware-Activity-Targeting-SonicWall-SSL-VPN/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-in-NestJS-Devtools-Localhost-RCE-via-Sandbox-Escape/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Regularly-Exploit-Vulnerabilities-Before-Public-Disclosure,-Study-Finds/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Search-Engines-are-Indexing-ChatGPT-Conversations!-E2-80-93-Here-is-our-OSINT-Research/</loc>
<lastmod>2025-08-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-02-Daily-Vulns/</loc>
<lastmod>2025-08-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-Telegram-Premium-Site-Distributes-New-Lumma-Stealer-Variant/</loc>
<lastmod>2025-08-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fingerprinting-Malware-C2s-with-Tags/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ghost-in-the-Zip-7C-New-PXA-Stealer-and-Its-Telegram-Powered-Ecosystem/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LegalPwn-Attack-Tricks-GenAI-Tools-Into-Misclassifying-Malware-as-Safe-Code/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mozilla-flags-phishing-wave-aimed-at-hijacking-trusted-Firefox-add-ons/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Plague-Linux-malware-stealthily-maintains-SSH-access/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Perplexity-is-using-stealth,-undeclared-crawlers-to-evade-website-no-crawl-directives/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShadowSyndicate-Infrastructure-Used-by-Multiple-Ransomware-Groups-Including-Cl0p,-LockBit-and-RansomHub/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tracking-Updates-to-Raspberry-Robin/</loc>
<lastmod>2025-08-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cisco-Says-User-Data-Stolen-in-CRM-Hack/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cursor-IDE-Persistent-Code-Execution-via-MCP-Trust-Bypass/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Bing-Search-to-Ransomware-Bumblebee-and-AdaptixC2-Deliver-Akira/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-the-Depths-of-the-Shadows-IRGC-and-Hacker-Collectives-Of-The-12-Day-War/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GenAI-Used-For-Phishing-Websites-Impersonating-Brazils-Government/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Makop-Ransomware-Identified-in-Attacks-in-South-Korea/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Rapid-Breach-Social-Engineering-to-Remote-Access-in-300-Seconds/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ReVault!-When-your-SoC-turns-against-you-E2-80-A6/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Smart-Contract-Scams-7C-Ethereum-Drainers-Pose-as-Trading-Bots-to-Steal-Crypto/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SonicWall-investigates-possible-zero-day-amid-Akira-ransomware-surge/</loc>
<lastmod>2025-08-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-Impacting-Over-100K-Sites-Patched-in-Everest-Forms-Plugin/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-suffers-data-breach-in-ongoing-Salesforce-data-theft-attacks/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/KLM-Confirms-Customer-Data-Breach-Linked-to-Third-Party-System/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OWASP-AIVSS-targets-agentic-AI-risk/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Shared-secret-EDR-killer-in-the-kill-chain/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Growing-Threat-of-Mobile-Infostealers/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ukraine-claims-to-have-hacked-secrets-from-Russias-newest-nuclear-submarine/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-SocGholish-Silent-Push-Untangles-the-Malware-Web-Behind-the-E2-80-9CPioneer-of-Fake-Updates-E2-80-9D-and-Its-Operator,-TA569/</loc>
<lastmod>2025-08-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/U.S.-Judiciary-confirms-breach-of-court-electronic-records-service/</loc>
<lastmod>2025-08-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-secretly-allows-facial-recognition-scans-of-passport,-immigration-databases/</loc>
<lastmod>2025-08-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-10-Daily-Vulns/</loc>
<lastmod>2025-08-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Googles-August-Patch-Fixes-Two-Qualcomm-Vulnerabilities-Exploited-in-the-Wild/</loc>
<lastmod>2025-08-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Win-DDoS-Flaws-Let-Attackers-Turn-Public-Domain-Controllers-into-DDoS-Botnet-via-RPC,-LDAP/</loc>
<lastmod>2025-08-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-11-Daily-Vulns/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chairmen-of-100-million-scam-operation-extradited-to-US/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybersecurity-Firm-Profero-Cracks-DarkBit-Ransomware-Encryption/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Netherlands-Citrix-NetScaler-Flaw-CVE-2025-6543-Exploited-to-Breach-Critical-Organizations/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korean-Kimsuky-hackers-exposed-in-alleged-data-breach/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Update-WinRAR-tools-now-RomCom-and-others-exploiting-zero-day-vulnerability/</loc>
<lastmod>2025-08-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malvertising-campaign-leads-to-PS1Bot,-a-multi-stage-malware-framework/</loc>
<lastmod>2025-08-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-August-2025-Patch-Tuesday-fixes-one-zero-day,-107-flaws/</loc>
<lastmod>2025-08-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Curly-COMrades-APT-Using-NGEN-COM-Hijacking-in-Georgia,-Moldova-Attacks/</loc>
<lastmod>2025-08-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Ransomware-Charon-Uses-Earth-Baxia-APT-Techniques-to-Target-Enterprises/</loc>
<lastmod>2025-08-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Charon-Ransomware-Hits-Middle-East-Sectors-Using-APT-Level-Evasion-Tactics/</loc>
<lastmod>2025-08-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-14-Daily-Vulns/</loc>
<lastmod>2025-08-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Blue-Locker-Analysis-Ransomware-Targeting-Oil-&amp;-Gas-Sector-In-Pakistan/</loc>
<lastmod>2025-08-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybersecurity-in-Focus-Recent-Threats-Targeting-India-Amid-Independence-Day-Celebrations/</loc>
<lastmod>2025-08-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PhantomCard-New-NFC-driven-Android-malware-emerging-in-Brazil/</loc>
<lastmod>2025-08-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-RCE-Vulnerability-in-Cisco-Firewall-Management-Software-Under-Active-Exploitation/</loc>
<lastmod>2025-08-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cyberattack-on-Dutch-prosecution-service-is-keeping-speed-cameras-offline/</loc>
<lastmod>2025-08-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-based-Telecommunications-Company-Colt-Technology-Services-Hit-by-Major-Cyberattack/</loc>
<lastmod>2025-08-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-16-Daily-Vulns/</loc>
<lastmod>2025-08-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT-Group-UAT-7237-Targets-Taiwans-Web-Infrastructure-with-Custom-Tools/</loc>
<lastmod>2025-08-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/EncryptHub-Abuses-Brave-Support-in-new-Campaign-Exploiting-MSC-Eviltwin-Flaw/</loc>
<lastmod>2025-08-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researcher-to-release-exploit-for-full-auth-bypass-on-FortiWeb/</loc>
<lastmod>2025-08-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Man-Jailed-for-20-Months-After-Compromising-Millions-of-Accounts/</loc>
<lastmod>2025-08-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Windows-Vulnerability-Exploited-to-Deploy-PipeMagic-RansomExx-Malware/</loc>
<lastmod>2025-08-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Ghost-tapping-Attacks-Steal-Customers-Cards-Linked-to-Services-Like-Apple-Pay-and-Google-Pay/</loc>
<lastmod>2025-08-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Someones-poking-the-bear-with-infostealers-targeting-Russian-crypto-developers/</loc>
<lastmod>2025-08-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Web-Hosting-Firms-in-Taiwan-Attacked-by-Chinese-APT-for-Access-to-High-Value-Targets/</loc>
<lastmod>2025-08-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Campus-to-C2-Tracking-a-Persistent-Chinese-Operation-Against-Vietnamese-Universities/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Legitimate-Chrome-VPN-Extension-Turns-to-Browser-Spyware/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Like-burglars-closing-a-door,-Apache-ActiveMQ-attackers-patch-critical-vuln-after-breaking-in/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Research-Links-VPN-Apps,-Highlights-Security-Deficiencies/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Oregon-man-charged-with-administering-E2-80-9CRapper-Bot-E2-80-9D-DDoS-for-hire-Botnet/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Attacking-Organizations-Key-Employees-With-Weaponized-Copyright-Documents-to-Deliver-Noodlophile-Stealer/</loc>
<lastmod>2025-08-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-20-Daily-Vulns/</loc>
<lastmod>2025-08-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FBI-Warns-FSB-Linked-Hackers-Exploiting-Unpatched-Cisco-Devices-for-Cyber-Espionage/</loc>
<lastmod>2025-08-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Flaws-in-Software-Used-by-Hundreds-of-Cities-and-Towns-Exposed-Sensitive-Data/</loc>
<lastmod>2025-08-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Major-password-managers-can-leak-logins-in-clickjacking-attacks/</loc>
<lastmod>2025-08-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-21-Daily-Vulns/</loc>
<lastmod>2025-08-23T18:49:21+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Apple-rushes-out-fix-for-active-zero-day-in-iOS-and-macOS/</loc>
<lastmod>2025-08-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Using-New-QuirkyLoader-Malware-to-Spread-Agent-Tesla,-AsyncRAT-and-Snake-Keylogger/</loc>
<lastmod>2025-08-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Weaponize-QR-Codes-Embedded-with-Malicious-Links-to-Steal-Sensitive-Information/</loc>
<lastmod>2025-08-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Orange-Data-Breach-Raises-SIM-Swapping-Attack-Fears/</loc>
<lastmod>2025-08-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scattered-Spider-hacker-gets-sentenced-to-10-years-in-prison/</loc>
<lastmod>2025-08-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT36-hackers-abuse-Linux-.desktop-files-to-install-malware-in-new-attacks/</loc>
<lastmod>2025-08-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-Abuse-Virtual-Private-Servers-to-Compromise-SaaS-Accounts/</loc>
<lastmod>2025-08-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Criminal-background-checker-APCS-faces-data-breach/</loc>
<lastmod>2025-08-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Large-Interpol-Cybercrime-Crackdown-in-Africa-Leads-to-the-Arrest-of-Over-1,200-Suspects/</loc>
<lastmod>2025-08-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malicious-Go-Module-Poses-as-SSH-Brute-Force-Tool,-Steals-Credentials-via-Telegram-Bot/</loc>
<lastmod>2025-08-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Gmail-Phishing-Attack-Uses-AI-Prompt-Injection-to-Evade-Detection/</loc>
<lastmod>2025-08-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anatsa-Android-Banking-Trojan-Now-Targeting-830-Financial-Apps/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Australian-university-used-Wi-Fi-location-data-to-identify-student-protestors/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ClickFix-Attack-Tricks-AI-Summaries-Into-Pushing-Malware/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Credential-harvesting-campaign-targets-ScreenConnect-cloud-administrators/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Docker-Desktop-flaw-lets-attackers-hijack-Windows-hosts/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-macOS-Help-Sites-Seek-to-Spread-Infostealer-in-Targeted-Campaign/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hook-Version-3-The-Banking-Trojan-with-The-Most-Advanced-Capabilities/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kimsuky-APT-Data-Leak-E2-80-93-GPKI-Certificates,-Rootkits-and-Cobalt-Strike-Personal-Uncovered/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Nissan-confirms-design-studio-data-breach-claimed-by-Qilin-ransomware/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Transparent-Tribe-Targets-Indian-Govt-With-Weaponized-Desktop-Shortcuts-via-Phishing/</loc>
<lastmod>2025-08-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crypto-thief-earns-additional-prison-time-for-assaulting-witness/</loc>
<lastmod>2025-08-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-steal-data-from-Salesforce-instances-in-widespread-campaign/</loc>
<lastmod>2025-08-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/MixShell-Malware-Delivered-via-Contact-Forms-Targets-U.S.-Supply-Chain-Manufacturers/</loc>
<lastmod>2025-08-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-27-Daily-Vulns/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-Powered-Ransomware-Has-Arrived-With-PromptLock/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anthropic-Disrupts-AI-Powered-Cyberattacks-Automating-Theft-and-Extortion-Across-Critical-Sectors/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-BruteForceAI-Tool-Automatically-Detects-Login-Pages-and-Executes-Smart-Brute-Force-Attacks/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Phishing-Campaign-Abuses-ConnectWise-ScreenConnect-to-Take-Over-Devices/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Personal-details-of-Church-of-England-abuse-victims-leaked,-say-survivors/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Velociraptor-incident-response-tool-abused-for-remote-access/</loc>
<lastmod>2025-08-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-28-Daily-Vulns/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-Publish-Hunting-and-Mitigation-Guide-to-Defend-Networks-from-Chinese-State-Sponsored-Actors/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/International-coalition-calls-out-three-Chinese-companies-over-hacking-campaign/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kea-DHCP-Server-Vulnerability-Let-Remote-Attacker-Crash-With-a-Single-Crafted-Packet/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Unveils-Storm-0501s-Advanced-Cloud-Ransomware-Attack-Tactics/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Police-seize-VerifTools-fake-ID-marketplace-servers,-domains/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pondering-my-ORB-A-look-at-PolarEdge-Adjacent-Infrastructure/</loc>
<lastmod>2025-08-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-29-Daily-Vulns/</loc>
<lastmod>2025-08-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/TransUnion-Data-Breach-Impacts-4.5-Million-US-Customers/</loc>
<lastmod>2025-08-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WhatsApp-patches-vulnerability-exploited-in-zero-day-attacks/</loc>
<lastmod>2025-08-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-08-30-Daily-Vulns/</loc>
<lastmod>2025-09-01T22:45:57+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-Droppers-Now-Deliver-SMS-Stealers-and-Spyware,-Not-Just-Banking-Trojans/</loc>
<lastmod>2025-09-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Next.js-Framework-Vulnerability-Let-Attackers-Bypass-Authorization/</loc>
<lastmod>2025-09-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hidden-Commands-in-Images-Exploit-AI-Chatbots-and-Steal-Data/</loc>
<lastmod>2025-09-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Silver-Fox-Exploits-Signed-Drivers-to-Deploy-ValleyRAT-Backdoor/</loc>
<lastmod>2025-09-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Supply-chain-attack-hits-Zscaler-via-Salesloft-Drift,-leaking-customer-info/</loc>
<lastmod>2025-09-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-02-Daily-Vulns/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Azure-AD-Credentials-Exposed-in-Public-App-Settings-File/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iran-Nexus-Hackers-Abuses-Omani-Mailbox-to-Target-Global-Governments/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Phishing-Attack-Via-OneDrive-Attacking-C-level-Employees-for-Corporate-Credentials/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Report-on-Commercial-Spyware-Vendors-Detailing-Their-Targets-and-Infection-Chains/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ukrainian-Network-FDN3-Launches-Massive-Brute-Force-Attacks-on-SSL-VPN-and-RDP-Devices/</loc>
<lastmod>2025-09-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-fixes-actively-exploited-Android-flaws-in-September-update/</loc>
<lastmod>2025-09-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iranian-Hackers-Exploit-100+-Embassy-Email-Accounts-in-Global-Phishing-Targeting-Diplomats/</loc>
<lastmod>2025-09-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RapperBot-Hijacking-Devices-to-Launch-DDoS-Attack-In-a-Split-Second/</loc>
<lastmod>2025-09-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-APT28-Expands-Arsenal-with-NotDoor-Outlook-Backdoor/</loc>
<lastmod>2025-09-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-offers-10-million-bounty-for-info-on-Russian-FSB-hackers/</loc>
<lastmod>2025-09-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CMS-Provider-Sitecore-Patches-Exploited-Critical-Zero-Day/</loc>
<lastmod>2025-09-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GhostRedirector-Hacks-65-Windows-Servers-Using-Rungan-Backdoor-and-Gamshen-IIS-Module/</loc>
<lastmod>2025-09-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NoisyBear-Weaponizing-ZIP-Files-to-PowerShell-Loaders-and-Exfiltrate-Sensitive-Data/</loc>
<lastmod>2025-09-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scattered-Lapsus-Hunters-Demand-Google-Fire-Security-Experts-or-Face-Data-Leak/</loc>
<lastmod>2025-09-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Severe-Hikvision-HikCentral-Product-Flaws-What-You-Need-to-Know/</loc>
<lastmod>2025-09-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-05-Daily-Vulns/</loc>
<lastmod>2025-09-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Salesloft-Drift-Breach-Traced-to-GitHub-Compromise-and-Stolen-OAuth-Tokens/</loc>
<lastmod>2025-09-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/iCloud-Calendar-abused-to-send-phishing-emails-from-Apples-servers/</loc>
<lastmod>2025-09-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/18-Popular-Code-Packages-Hacked,-Rigged-to-Steal-Crypto/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT37-Targets-Windows-with-Rust-Backdoor-and-Python-Loader/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Czech-cyber-agency-NUKIB-flags-Chinese-espionage-risks-to-critical-infrastructure/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GhostAction-Supply-Chain-Attack-Compromises-3000+-Secrets/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Lazarus-Group-Deploys-Malware-With-ClickFix-Scam-in-Fake-Job-Interviews/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Salt-Typhoon-and-UNC4841-Silent-Push-Discovers-New-Domains;-Urges-Defenders-to-Check-Telemetry-and-Log-Data/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Seqrite-Labs-details-Noisy-Bear-APT-group-using-malicious-campaign-against-Kazakhstan-energy-sector/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Windows-Defender-Vulnerability-Allows-Service-Hijacking-and-Disablement-via-Symbolic-Link-Attack/</loc>
<lastmod>2025-09-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/45-Previously-Unreported-Domains-Expose-Longstanding-Salt-Typhoon-Cyber-Espionage/</loc>
<lastmod>2025-09-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Axios-Abuse-and-Salty-2FA-Kits-Fuel-Advanced-Microsoft-365-Phishing-Attacks/</loc>
<lastmod>2025-09-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Patch-Tuesday,-September-2025-Edition/</loc>
<lastmod>2025-09-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-charges-admin-of-LockerGoga,-MegaCortex,-Nefilim-ransomware/</loc>
<lastmod>2025-09-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-The-Gentlemen-Ransomware-Tactics,-Techniques,-and-Procedures-Revealed/</loc>
<lastmod>2025-09-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-10-Daily-Vulns/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-Linked-APT41-Hackers-Target-U.S.-Trade-Officials-Amid-2025-Negotiations/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FANCY-BEAR-GONEPOSTAL-E2-80-93-Espionage-Tool-Provides-Backdoor-Access-to-Microsoft-Outlook/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ICS-Patch-Tuesday-Rockwell-Automation-Leads-With-8-Security-Advisories/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/KillSec-Ransomware-is-Attacking-Healthcare-Institutions-in-Brazil/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malicious-npm-Code-Reached-10-25-of-Cloud-Environments/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Buterat-Backdoor-Malware-Found-in-Enterprise-and-Government-Networks/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Popular-AI-chatbots-leaking-data-millions-of-users-could-be-affected/</loc>
<lastmod>2025-09-10T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Vietnam-investigates-cyberattack-on-creditors-data/</loc>
<lastmod>2025-09-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-12-Daily-Vulns/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DELMIA-Factory-Software-Vulnerability-Exploited-in-Attacks/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/France-Warns-Apple-Users-of-New-Spyware-Campaign/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Huntresss-hilarious-attacker-surveillance-splits-infosec-community/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-HybridPetya-Weaponizing-UEFI-Vulnerability-to-Bypass-Secure-Boot-on-Outdated-Systems/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Samsung-patches-actively-exploited-zero-day-reported-by-WhatsApp/</loc>
<lastmod>2025-09-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FBI-warns-of-UNC6040,-UNC6395-hackers-stealing-Salesforce-data/</loc>
<lastmod>2025-09-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-Forged-Military-IDs-Used-in-North-Korean-Phishing-Attack/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Actors-Behind-AppSuite-PDF-and-PDF-Editor-Used-26-Code-Signing-Certificates-to-Make-Software-Appear-Legitimate/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DNV-details-E2-80-98SteganoAmor-malware-campaign-used-against-Iranian-oil-and-gas-traders,-extends-to-maritime-operators/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-steal-millions-of-Gucci,-Balenciaga,-and-Alexander-McQueen-customer-records/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/IBM-QRadar-SIEM-Vulnerability-Let-Attackers-Perform-Unauthorized-Actions/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-VPN.SN-The-Bulletproof-Service-Powering-Russian-Ransomware-Gangs/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Yurei-Ransomware-With-PowerShell-Commands-Encrypts-Files-With-ChaCha20-Algorithm/</loc>
<lastmod>2025-09-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-16-Daily-Vulns/</loc>
<lastmod>2025-09-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/40-npm-Packages-Compromised-in-Supply-Chain-Attack-Using-bundle.js-to-Steal-Credentials/</loc>
<lastmod>2025-09-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/EvilAI-malware-campaign-exploits-AI-generated-code-to-breach-global-critical-sectors/</loc>
<lastmod>2025-09-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Going-Underground-China-aligned-TA415-Conducts-U.S.-China-Economic-Relations-Targeting-Using-VS-Code-Remote-Tunnels/</loc>
<lastmod>2025-09-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-17-Daily-Vulns/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Apple-backports-fix-for-actively-exploited-CVE-2025-43300/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BreachForums-Owner-Sent-to-Prison-in-Resentencing/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-linked-APT41-targets-government,-think-tanks,-and-academics-tied-to-US-China-trade-and-policy/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FinWise-Insider-Breach-Exposes-700K-Customer-Records-to-Former-Employee/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-a-Plaintext-File-On-Users-Desktops-Exposed-Secrets-Leads-to-Akira-Ransomware-Attacks/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RaccoonO365-Phishing-Network-Dismantled-as-Microsoft,-Cloudflare-Take-Down-338-Domains/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShinyHunters-claims-1.5-billion-Salesforce-records-stolen-in-Drift-hacks/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tech-Note-BeaverTail-variant-distributed-via-malicious-repositories-and-ClickFix-lure/</loc>
<lastmod>2025-09-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-18-Daily-Vulns/</loc>
<lastmod>2025-09-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-Chrome-0-Day-Vulnerability-Actively-Exploited-in-the-Wild-E2-80-93-Patch-Now/</loc>
<lastmod>2025-09-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Large-Scale-Attack-Targeting-Macs-via-GitHub-Pages-Impersonating-Companies-to-Attempt-to-Deliver-Stealer-Malware/</loc>
<lastmod>2025-09-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShadowLeak-Radware-Uncovers-Zero-Click-Attack-on-ChatGPT/</loc>
<lastmod>2025-09-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-19-Daily-Vulns/</loc>
<lastmod>2025-09-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gamaredon-X-Turla-collab/</loc>
<lastmod>2025-09-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unmasking-Akira-The-ransomware-tactics-you-cant-afford-to-ignore/</loc>
<lastmod>2025-09-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Canada-Police-Dismantles-TradeOgre-Platform-That-Stolen-56-Million-Dollars-in-Cryptocurrency/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Car-giant-Stellantis-says-customer-data-nicked-after-partner-vendor-pwned/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Heathrow-Airport-Cyberattack-What-Happened,-Whos-Affected,-and-What-CISOs-Should-Know/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Entra-ID-flaw-allowed-hijacking-any-companys-tenant/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-EDR-Freeze-tool-uses-Windows-WER-to-suspend-security-software/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Nimbus-Manticore-Deploys-New-Malware-Targeting-Europe/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Earn-150,000-for-L1TF-Exploit-Leaking-Data-From-Public-Cloud/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-expose-MalTerminal,-an-LLM-enabled-malware-pioneer/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShadowLeak-Exploit-Exposed-Gmail-Data-Through-ChatGPT-Agent/</loc>
<lastmod>2025-09-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/22.2-Tbps-DDoS-Attack-Breaks-Internet-With-New-World-Record/</loc>
<lastmod>2025-09-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Fixed-Entra-ID-Vulnerability-Allowing-Global-Admin-Impersonation/</loc>
<lastmod>2025-09-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PyPI-urges-users-to-reset-credentials-after-new-phishing-attacks/</loc>
<lastmod>2025-09-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SolarWinds-Releases-Hotfix-for-Critical-CVE-2025-26399-Remote-Code-Execution-Flaw/</loc>
<lastmod>2025-09-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-Secret-Service-dismantled-covert-communications-network-near-the-U.N.-in-New-York/</loc>
<lastmod>2025-09-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Akvorado-release-2.0/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-Details-That-Hackers-Gained-Access-to-a-U.S.-Federal-Agency-Network-Via-GeoServer-RCE-Vulnerability/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/COLDRIVER-Updates-Arsenal-with-BAITSWITCH-and-SIMPLEFIX/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cisco-warns-of-IOS-zero-day-vulnerability-exploited-in-attacks/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Feds-Tie-E2-80-98Scattered-Spider-Duo-to-115M-in-Ransoms/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Exploit-Pandoc-CVE-2025-51591-to-Target-AWS-IMDS-and-Steal-EC2-IAM-Credentials/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NCSC-warns-of-persistent-malware-campaign-5BRayInitiator-and-LINE-VIPER-5D-targeting-Cisco-devices/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Breaking-to-Enterprise-Infrastructure-Within-18-Minutes-From-Initial-Access/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-agency-makes-arrest-in-airport-cyberattack-investigation/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Who-is-Salt-Typhoon-Really-Unraveling-the-Attribution-Challenge/</loc>
<lastmod>2025-09-24T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-25-Daily-Vulns/</loc>
<lastmod>2025-09-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-Cyberspies-Hacked-US-Defense-Contractors/</loc>
<lastmod>2025-09-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-CVSS-10-Flaw-in-GoAnywhere-File-Transfer-Threatens-20,000-Systems/</loc>
<lastmod>2025-09-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Leverage-AI-Generated-Code-to-Obfuscate-Its-Payload-and-Evade-Traditional-Defenses/</loc>
<lastmod>2025-09-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dutch-teens-arrested-for-trying-to-spy-on-Europol-for-Russia/</loc>
<lastmod>2025-09-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Malware-Operators-Collaborate-With-Covert-North-Korean-IT-Workers-to-Attack-Corporate-Organizations/</loc>
<lastmod>2025-09-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomwares-favorite-target-in-2025-and-what-you-can-do-about-it/</loc>
<lastmod>2025-09-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Exploiting-SonicWall-Firewalls-to-Deploy-Akira-Ransomware-Using-Malicious-Logins/</loc>
<lastmod>2025-09-27T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-Project-Zero-Details-ASLR-Bypass-on-Apple-Devices-Using-NSDictionary-Serialization/</loc>
<lastmod>2025-09-28T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-issues-Emergency-Directive-requiring-federal-agencies-to-mitigate-critical-Cisco-ASA-zero-day-vulnerabilities/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cisco-Talos-attributes-Asian-telecom-and-manufacturing-attacks-to-Naikon-PlugX-campaign/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/EvilAI-Malware-Masquerades-as-AI-Tools-to-Infiltrate-Global-Organizations/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Interpol-operation-disrupts-romance-scam-and-sextortion-networks-in-Africa/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Medusa-Ransomware-Claims-Comcast-Data-Breach,-Demands-.2M/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Flags-AI-Driven-Phishing-LLM-Crafted-SVG-Files-Outsmart-Email-Security/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Malware-as-a-Service-Olymp-Loader-Promises-Defender-Bypass-With-Automatic-Certificate-Signing/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SVG-Security-Analysis-Toolkit-to-Detect-Malicious-Scripts-Hidden-in-SVG-Files/</loc>
<lastmod>2025-09-29T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-09-30-Daily-Vulns/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/50-Battering-RAM-Attack-Breaks-Intel-and-AMD-Cloud-Security-Protections/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gemini-Trifecta-Highlights-Dangers-of-Indirect-Prompt-Injection/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-MatrixPDF-toolkit-turns-PDFs-into-phishing-and-malware-lures/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phantom-Taurus-A-New-Chinese-Nexus-APT-and-the-Discovery-of-the-NET-STAR-Malware-Suite/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/VMware-virtual-machines-under-attack-hackers-may-have-exploited-zero-day-for-months/</loc>
<lastmod>2025-09-30T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-01-Daily-Vulns/</loc>
<lastmod>2025-10-12T18:20:25+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Broadcom-Fails-to-Disclose-Zero-Day-Exploitation-of-VMware-Vulnerability/</loc>
<lastmod>2025-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DPRK-IT-Workers-Inside-North-Koreas-Crypto-Laundering-Network/</loc>
<lastmod>2025-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Massive-network-of-30,000-websites-filters-victims-before-delivering-scams-or-malware/</loc>
<lastmod>2025-10-01T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exposing-CharmingKittens-malicious-activity-for-IRGC-IO-division-Counterintelligence-division/</loc>
<lastmod>2025-10-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishing-Dominates-EU-Wide-Intrusions,-says-ENISA/</loc>
<lastmod>2025-10-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Red-Hat-confirms-security-incident-after-hackers-claim-GitHub-breach/</loc>
<lastmod>2025-10-02T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Oracle-says-hackers-are-trying-to-extort-its-customers/</loc>
<lastmod>2025-10-03T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-04-Daily-Vulns/</loc>
<lastmod>2025-10-12T18:20:56+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CometJacking-One-Click-Can-Turn-Perplexitys-Comet-AI-Browser-Into-a-Data-Thief/</loc>
<lastmod>2025-10-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Discord-Data-Breach-Hackers-Access-IDs,-Billing-Details-and-Support-Chats/</loc>
<lastmod>2025-10-04T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ghost-in-the-Cloud-Weaponizing-AWS-X-Ray-for-Command-&amp;-Control/</loc>
<lastmod>2025-10-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-exploited-Zimbra-flaw-as-zero-day-using-iCalendar-files/</loc>
<lastmod>2025-10-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-WireTap-Attack-Breaks-Server-SGX-to-Exfiltrate-Sensitive-Data/</loc>
<lastmod>2025-10-05T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Booz-Allen-warns-Chinas-AI-driven,-supply-chain-cyber-strategy-fuels-PRC-dominance/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Critical-GoAnywhere-bug-exploited-in-ransomware-attacks/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Report-Links-Research-Firms-BIETA-and-CIII-to-Chinas-MSS-Cyber-Operations/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Patch-Now-Dell-UnityVSA-Flaw-Allows-Command-Execution-Without-Login/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Group-E2-80-9CTrinity-of-Chaos-E2-80-9D-Launches-Data-Leak-Site/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Reading-the-ENISA-Threat-Landscape-2025-report/</loc>
<lastmod>2025-10-06T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/13-year-old-Critical-Redis-RCE-Vulnerability-Let-Attackers-Gain-Full-Access-to-Host-System/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-Puts-60,000-Redis-Servers-at-Risk-of-Exploitation/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Mic-E-Mouse-Attack-Shows-Computer-Mice-Can-Capture-Conversations/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Research-AI-Is-Already-the-1-Data-Exfiltration-Channel-in-the-Enterprise/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OpenAI-bans-suspected-Chinese-accounts-using-ChatGPT-to-plan-surveillance/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShinyHunters-Wage-Broad-Corporate-Extortion-Spree/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Y2K38-Bug-Is-a-Vulnerability,-Not-Just-a-Date-Problem,-Researchers-Warn/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-police-arrest-two-over-London-ransomware-of-childrens-data/</loc>
<lastmod>2025-10-07T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-08-Daily-Vulns/</loc>
<lastmod>2025-10-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Foreign-threat-actors-adopting-ChatGPT,-AI-to-bolster-old-playbook-of-attacks,-OpenAI-finds/</loc>
<lastmod>2025-10-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Actively-Compromising-Databases-Using-Legitimate-Commands/</loc>
<lastmod>2025-10-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-leveraging-Teams-to-drop-malware,-steal-data,-Microsoft-warns/</loc>
<lastmod>2025-10-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korean-Hackers-Have-Stolen-2-Billion-in-Cryptocurrency-in-2025/</loc>
<lastmod>2025-10-08T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-09-Daily-Vulns/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Data-Leak-Sites-Hit-an-All-Time-High-With-New-Scattered-Spider-RaaS-and-LockBit-5.0/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Phishing-to-Malware-AI-Becomes-Russias-New-Cyber-Weapon-in-War-on-Ukraine/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-now-use-Velociraptor-DFIR-tool-in-ransomware-attacks/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SaaS-Breaches-Start-with-Tokens-What-Security-Teams-Must-Watch/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SquareX-Shows-AI-Browsers-Fall-Prey-to-OAuth-Attacks,-Malware-Downloads-and-Malicious-Link-Distribution/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-actors-steal-firewall-configs,-impacting-all-SonicWall-Cloud-Backup-users/</loc>
<lastmod>2025-10-09T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-exploit-valid-logins-in-SonicWall-SSL-VPN-compromise/</loc>
<lastmod>2025-10-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybercrime-ring-GXC-Team-dismantled-in-Spain,-25-year-old-leader-detained/</loc>
<lastmod>2025-10-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Can-Inject-Malicious-Code-into-Antivirus-Processes-to-Create-a-Backdoor/</loc>
<lastmod>2025-10-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-to-tell-if-your-mobile-number-has-been-hacked-and-what-to-do-next/</loc>
<lastmod>2025-10-11T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Oracle-E-Business-Suite-Bug-Could-Let-Hackers-Access-Data-Without-Login/</loc>
<lastmod>2025-10-12T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FBI-and-French-Police-Shutter-BreachForums-Domain-Again/</loc>
<lastmod>2025-10-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Warn-RondoDox-Botnet-is-Weaponizing-Over-50-Flaws-Across-30+-Vendors/</loc>
<lastmod>2025-10-13T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-14-Daily-Vulns/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dragos-sounds-alarm-over-cyberattacks-targeting-distributed-energy-and-industrial-microgrids/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Global-cyber-attacks-decline,-but-ransomware-jumps-46-25-as-GenAI-threats-hit-education,-telecom,-government/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hacker-Group-TA585-Emerges-With-Advanced-Attack-Infrastructure/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Android-Pixnapping-attack-steals-MFA-codes-pixel-by-pixel/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RMPocalypse-Single-8-Byte-Write-Shatters-AMDs-SEV-SNP-Confidential-Computing/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russia-linked-hackers-attack-Texas-electric-cooperatives/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-NCSC-Reports-130-25-Spike-in-Nationally-Significant-Cyber-Incidents/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unverified-COTS-hardware-enables-persistent-attacks-in-small-satellites-via-SpyChain/</loc>
<lastmod>2025-10-14T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-Threat-Group-Jewelbug-Quietly-Infiltrated-Russian-IT-Network-for-Months/</loc>
<lastmod>2025-10-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Elasticsearch-Leak-Exposes-6-Billion-Records-from-Scraping,-Old-and-New-Breaches/</loc>
<lastmod>2025-10-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/F5-releases-BIG-IP-patches-for-stolen-security-vulnerabilities/</loc>
<lastmod>2025-10-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Two-New-Windows-Zero-Days-Exploited-in-the-Wild-E2-80-94-One-Affects-Every-Version-Ever-Shipped/</loc>
<lastmod>2025-10-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Whisper-2FA-Behind-One-Million-Phishing-Attempts-Since-July/</loc>
<lastmod>2025-10-15T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-16-Daily-Vulns/</loc>
<lastmod>2025-10-24T14:17:06+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Misconfigured-NetcoreCloud-Server-Exposed-40B-Records-in-13.4TB-of-Data/</loc>
<lastmod>2025-10-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korean-Hackers-Use-EtherHiding-to-Hide-Malware-Inside-Blockchain-Smart-Contracts/</loc>
<lastmod>2025-10-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Senate-Investigates-Cisco-Over-Zero-Day-Firewall-Vulnerabilities/</loc>
<lastmod>2025-10-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-Charges-Cambodian-Executive-in-Massive-Crypto-Scam-and-Seizes-More-Than-4-Billion-in-Bitcoin/</loc>
<lastmod>2025-10-16T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-17-Daily-Vulns/</loc>
<lastmod>2025-10-17T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Collins-Aerospace-attack-claimed-by-Everest,-linking-ransomware-group-to-last-months-European-airport-chaos/</loc>
<lastmod>2025-10-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-.NET-CAPI-Backdoor-Targets-Russian-Auto-and-E-Commerce-Firms-via-Phishing-ZIPs/</loc>
<lastmod>2025-10-18T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-Accuses-US-of-Cyberattack-on-National-Time-Center/</loc>
<lastmod>2025-10-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Data-brokers-are-constantly-doxing-us,-and-we-cant-do-anything-about-it/</loc>
<lastmod>2025-10-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Europol-Dismantles-SIM-Farm-Network-Powering-49-Million-Fake-Accounts-Worldwide/</loc>
<lastmod>2025-10-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PoC-Exploit-Released-for-Linux-PAM-Vulnerability-Allowing-Root-Privilege-Escalation/</loc>
<lastmod>2025-10-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WatchGuard-VPN-Vulnerability-Let-Remote-Attacker-Execute-Arbitrary-Code/</loc>
<lastmod>2025-10-19T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-Driven-Social-Engineering-Top-Cyber-Threat-for-2026,-ISACA-Survey-Reveals/</loc>
<lastmod>2025-10-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cyber-defenders-sound-the-alarm-as-F5-hack-exposes-broad-risks/</loc>
<lastmod>2025-10-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PoC-Exploit-Released-for-Windows-Server-Update-Services-Remote-Code-Execution-Vulnerability/</loc>
<lastmod>2025-10-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-Lynk-group-leaks-sensitive-UK-MoD-files,-including-info-on-eight-military-bases/</loc>
<lastmod>2025-10-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Self-spreading-GlassWorm-malware-hits-OpenVSX,-VS-Code-registries/</loc>
<lastmod>2025-10-20T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-confirms-hackers-exploited-Oracle-E-Business-Suite-SSRF-flaw/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISAs-International,-Industry-and-Academic-Partnerships-Slashed/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-Linked-Salt-Typhoon-breaches-European-Telecom-via-Citrix-exploit/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-exploit-34-zero-days-on-first-day-of-Pwn2Own-Ireland/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-Payouts-Surge-to-3.6m-Amid-Evolving-Tactics/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-Coldriver-Hackers-Deploy-New-NoRobot-Malware/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/TP-Link-warns-of-critical-command-injection-flaw-in-Omada-gateways/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Leverage-npm-Ecosystem-to-Deliver-AdaptixC2-Post-Exploitation-Framework/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Vidar-Stealer-2.0-adds-multi-threaded-data-theft,-better-evasion/</loc>
<lastmod>2025-10-21T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-22-Daily-Vulns/</loc>
<lastmod>2025-10-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-Threat-Actors-Exploit-ToolShell-SharePoint-Flaw-Weeks-After-Microsofts-July-Patch/</loc>
<lastmod>2025-10-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Jaguar-Land-Rover-hack-cost-UK-economy-an-estimated-2.5-billion,-report-says/</loc>
<lastmod>2025-10-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SocGholish-Malware-Using-Compromised-Sites-to-Deliver-Ransomware/</loc>
<lastmod>2025-10-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/TARmageddon-Flaw-in-Popular-Rust-Library-Leads-to-RCE/</loc>
<lastmod>2025-10-22T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Agenda-Ransomware-Deploys-Linux-Variant-on-Windows-Systems-Through-Remote-Management-Tools-and-BYOVD-Techniques/</loc>
<lastmod>2025-10-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Anomali-Cyber-Watch-Nimbus-Manticore,-Spoofed-IC3-Portals,-a-Record-Breaking-DDoS-Attack,-and-More/</loc>
<lastmod>2025-10-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Buying-Spying-How-the-commercial-surveillance-industry-works-and-what-can-be-done-about-it/</loc>
<lastmod>2025-10-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/IR-Trends-Q3-2025-ToolShell-attacks-dominate,-highlighting-criticality-of-segmentation-and-rapid-response/</loc>
<lastmod>2025-10-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Timestomping-a-PE-compile-timestamp-adversary-tradecraft-and-detection/</loc>
<lastmod>2025-10-23T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-exploiting-critical-vulnerability-in-Windows-Server-Update-Service/</loc>
<lastmod>2025-10-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LockBit-5.0-Actively-Attacking-Windows,-Linux,-and-ESXi-Environments/</loc>
<lastmod>2025-10-25T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/706,000+-BIND-9-Resolver-Instances-Vulnerable-to-Cache-Poisoning-Exposed-Online-E2-80-93-PoC-Released/</loc>
<lastmod>2025-10-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Everest-Ransomware-Says-It-Stole-1.5M-Dublin-Airport-Passenger-Records/</loc>
<lastmod>2025-10-26T00:00:00+02:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chrome-Zero-Day-Exploitation-Linked-to-Hacking-Team-Spyware/</loc>
<lastmod>2025-10-31T11:53:56+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Europol-Warns-of-Rising-Threat-From-Caller-ID-Spoofing-Attacks/</loc>
<lastmod>2025-10-31T11:54:15+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-exploiting-Windows-updates-Microsoft-urges-users-to-patch/</loc>
<lastmod>2025-10-31T11:54:29+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Irans-school-for-cyberspies-couldve-used-a-few-more-lessons-in-preventing-breaches/</loc>
<lastmod>2025-10-31T11:54:38+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OpenAI-Atlas-Browser-Vulnerability-Allows-Malicious-Code-Injection-into-ChatGPT/</loc>
<lastmod>2025-10-31T11:54:51+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Qilin-ransomware-escalates-rapidly-in-2025,-targeting-critical-sectors-with-700-attacks-amid-RansomHub-shutdown/</loc>
<lastmod>2025-10-31T11:55:04+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Aisuru-Botnet-Shifts-from-DDoS-to-Residential-Proxies/</loc>
<lastmod>2025-10-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BiDi-Swap-The-bidirectional-text-trick-that-makes-fake-URLs-look-real/</loc>
<lastmod>2025-10-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Clearview-AI-faces-criminal-heat-for-ignoring-EU-data-fines/</loc>
<lastmod>2025-10-31T11:55:33+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Everest-Leaks-AT&amp;T-Records,-Demands-M-for-Dublin-Airport-Passenger-Data/</loc>
<lastmod>2025-10-31T11:55:43+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Massive-risk-92-25-of-Exchange-servers-in-Germany-unprotected-after-Microsoft-support-ends/</loc>
<lastmod>2025-10-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Expose-GhostCall-and-GhostHire-BlueNoroffs-New-Malware-Chains/</loc>
<lastmod>2025-10-31T11:56:03+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/TEE.Fail-attack-breaks-confidential-computing-on-Intel,-AMD,-NVIDIA-CPUs/</loc>
<lastmod>2025-10-31T11:56:15+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-29-Daily-Vulns/</loc>
<lastmod>2025-10-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-issues-ICS-advisories-on-Schneider-Electric,-Vertikal-Systems-vulnerabilities;-adds-DELMIA-Apriso-flaws-to-KEV-Catalog/</loc>
<lastmod>2025-10-31T11:58:19+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hacktivists-breach-Canadas-critical-infrastructure,-cyber-Agency-warns/</loc>
<lastmod>2025-10-31T11:57:57+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Logins.zip-Leverages-Chromium-Zero-Day-Stealthy-Infostealer-Builder-Promises-99-25-Credential-Theft-in-Under-12-Seconds/</loc>
<lastmod>2025-10-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-AI-Targeted-Cloaking-Attack-Tricks-AI-Crawlers-Into-Citing-Fake-Info-as-Verified-Facts/</loc>
<lastmod>2025-10-31T11:57:36+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-hackers,-likely-linked-to-Sandworm,-exploit-legitimate-tools-against-Ukrainian-targets/</loc>
<lastmod>2025-10-31T11:57:19+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Australian-Police-Use-Crypto-Safe-Cracker-to-Access-6M-Stash/</loc>
<lastmod>2025-10-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Brash-Exploit-Crashes-Chromium-Browsers-Instantly-with-a-Single-Malicious-URL/</loc>
<lastmod>2025-10-31T11:57:10+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Proton-Uncovers-Hidden-Data-Leaks-From-the-Dark-Web/</loc>
<lastmod>2025-10-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actors-Utilize-AdaptixC2-for-Malicious-Payload-Delivery/</loc>
<lastmod>2025-10-31T11:56:58+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UNC6384-Weaponizes-ZDI-CAN-25373-Vulnerability-to-Deploy-PlugX-Against-Hungarian-and-Belgian-Diplomatic-Entities/</loc>
<lastmod>2025-10-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-10-31-Daily-Vulns/</loc>
<lastmod>2025-10-31T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Brash-Exploit-Crashes-Chromium-Browsers-Instantly-with-a-Single-Malicious-URL/</loc>
<lastmod>2025-11-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Alleged-Jabber-Zeus-Coder-E2-80-98MrICQ-in-U.S.-Custody/</loc>
<lastmod>2025-11-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-targeting-unpatched-Cisco-kit-notice-malware-implant-removal,-install-it-again/</loc>
<lastmod>2025-11-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Drawn-to-Danger-Windows-Graphics-Vulnerabilities-Lead-to-Remote-Code-Execution-and-Memory-Exposure/</loc>
<lastmod>2025-11-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OpenAIs-New-Aardvark-GPT-5-Agent-that-Detects-and-Fixes-Vulnerabilities-Automatically/</loc>
<lastmod>2025-11-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Penn-hacker-claims-to-have-stolen-1.2-million-donor-records-in-data-breach/</loc>
<lastmod>2025-11-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-sentences-infamous-Myanmar-scam-mafia-members-to-death/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Claude-AI-APIs-Can-Be-Abused-for-Data-Exfiltration/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Deliver-SSH-Tor-Backdoor-Via-Weaponized-Military-Documents-in-ZIP-Files/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-use-RMM-tools-to-breach-freighters-and-steal-cargo-shipments/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Dante-Spyware-Linked-to-Rebranded-Hacking-Team,-Now-Memento-Labs/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-Peek-a-Baku-Silent-Lynx-APT-makes-sluggish-shift-to-Dushanbe/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ransomware-negotiator,-pay-thyself!/</loc>
<lastmod>2025-11-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/11-ways-to-delete-or-hide-yourself-from-the-internet-and-protect-your-privacy/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chrome-can-now-store-your-drivers-license-and-passport,-but-is-that-safe/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Europol-and-Eurojust-Dismantle-E2-82-AC600-Million-Crypto-Fraud-Network-in-Global-Sweep/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exploiting-Microsoft-Teams-Impersonation-and-Spoofing-Vulnerabilities-Exposed/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-spies-pack-custom-malware-into-hidden-VMs-on-Windows-machines/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scattered-Spider,-ShinyHunters-and-LAPSUSS-Form-Unified-Collective/</loc>
<lastmod>2025-11-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-flaws-in-Fuji-Electric,-Delta-Electronics,-Survision,-Radiometrics,-IDIS-systems-raise-security-concerns-for-industrial-sector/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Curly-COMrades-Hacker-Group-Using-New-Tools-to-Create-Hidden-Remote-Access-on-Compromised-Windows-10/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exploited-E2-80-98Post-SMTP-Plugin-Flaw-Exposes-WordPress-Sites-to-Takeover/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-warns-of-new-AI-powered-malware-families-deployed-in-the-wild/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/HackedGPT-E2-80-93-7-New-Vulnerabilities-in-GPT-4o-and-GPT-5-Enables-0-Click-Attacks/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-an-Attacker-Drained-28M-from-Balancer-Through-Rounding-Error-Exploitation/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-hackers-sneak-a-full-Linux-virtual-machine-inside-Windows-to-run-undetected/</loc>
<lastmod>2025-11-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-06-Daily-Vulns/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Comparitech-reports-ransomware-surges-25-25-in-October,-hitting-manufacturers,-healthcare,-transportation/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GlassWorm-Returns-New-Wave-Strikes-as-We-Expose-Attacker-Infrastructure/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-sounds-alarm-on-self-modifying-AI-malware/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gootloader-malware-back-for-the-attack,-serves-up-ransomware/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Large-Scale-ClickFix-Phishing-Attacks-Target-Hotel-Systems-with-PureRAT-Malware/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/List-of-AI-Tools-Promoted-by-Threat-Actors-in-Underground-Forums-and-Their-Capabilities/</loc>
<lastmod>2025-11-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LANDFALL-New-Commercial-Grade-Android-Spyware-in-Exploit-Chain-Targeting-Samsung-Devices/</loc>
<lastmod>2025-11-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-08-Daily-Vulns/</loc>
<lastmod>2025-11-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Uncovers-Whisper-Leak-Attack-That-Identifies-AI-Chat-Topics-in-Encrypted-Traffic/</loc>
<lastmod>2025-11-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dangerous-runC-flaws-could-allow-hackers-to-escape-Docker-containers/</loc>
<lastmod>2025-11-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Data-breach-at-Chinese-infosec-firm-reveals-cyber-weapons-and-target-list/</loc>
<lastmod>2025-11-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Italian-Adviser-Becomes-Latest-Target-in-Expanding-Paragon-Graphite-Spyware-Surveillance-Case/</loc>
<lastmod>2025-11-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Nine-NuGet-packages-disrupt-DBs-and-industrial-systems-with-time-delayed-payloads/</loc>
<lastmod>2025-11-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/No-Place-Like-Localhost-Unauthenticated-Remote-Access-via-Triofox-Vulnerability-CVE-2025-12480/</loc>
<lastmod>2025-11-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishers-try-to-lure-5K-Facebook-advertisers-with-fake-business-pages/</loc>
<lastmod>2025-11-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-11-Daily-Vulns/</loc>
<lastmod>2025-11-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Patch-Tuesday-for-November-2025-E2-80-94-Snort-rules-and-prominent-vulnerabilities/</loc>
<lastmod>2025-11-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korean-hackers-exploit-Googles-safety-tools-for-remote-wipe/</loc>
<lastmod>2025-11-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Patch-now-Samsung-zero-day-lets-attackers-take-over-your-phone/</loc>
<lastmod>2025-11-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zscaler-warns-industrial-operations-face-mounting-risk-as-IoT,-OT-attacks-surge-across-energy,-manufacturing-sectors/</loc>
<lastmod>2025-11-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-12-Daily-Vulns/</loc>
<lastmod>2025-11-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-Sues-China-Based-Hackers-Behind-1-Billion-Lighthouse-Phishing-Platform/</loc>
<lastmod>2025-11-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Actively-Exploiting-Cisco-and-Citrix-0-Days-in-the-Wild-to-Deploy-Webshell/</loc>
<lastmod>2025-11-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SIEM-Modernization-and-Optimization-Step-2-Define-Your-Goals/</loc>
<lastmod>2025-11-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Extra,-extra,-read-all-about-it-Washington-Post-clobbered-in-Clop-caper/</loc>
<lastmod>2025-11-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-the-Great-Firewall-Part-3-Geopolitical-and-Societal-Ramifications/</loc>
<lastmod>2025-11-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-Hackers-Create-4,300-Fake-Travel-Sites-to-Steal-Hotel-Guests-Payment-Data/</loc>
<lastmod>2025-11-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Siemens-COMOS/</loc>
<lastmod>2025-11-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-State-of-Ransomware-E2-80-93-Q3-2025/</loc>
<lastmod>2025-11-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Decades-old-E2-80-98Finger-protocol-abused-in-ClickFix-malware-attacks/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Five-Plead-Guilty-in-U.S.-for-Helping-North-Korean-IT-Workers-Infiltrate-136-Companies/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-are-Weaponizing-Invoices-to-Deliver-XWorm-That-Steals-Login-Credentials/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RONINGLOADER-Weaponizes-Signed-Drivers-to-Disable-Defender-and-Evade-EDR-Tools/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RondoDox-Exploits-Unpatched-XWiki-Servers-to-Pull-More-Devices-Into-Its-Botnet/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/U.S.-CISA-adds-Fortinet-FortiWeb-flaw-to-its-Known-Exploited-Vulnerabilities-catalog/</loc>
<lastmod>2025-11-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AIs-scary-new-trick-Conducting-cyberattacks-instead-of-just-helping-out/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dragon-Breath-Uses-RONINGLOADER-to-Disable-Security-Tools-and-Deploy-Gh0st-RAT/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fortinets-delayed-alert-on-actively-exploited-defect-put-defenders-at-a-disadvantage/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Frontline-Intelligence-Analysis-of-UNC1549-TTPs,-Custom-Tools,-and-Malware-Targeting-the-Aerospace-and-Defense-Ecosystem/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/One-World,-Many-Threats-How-Regional-Realities-Shape-Global-Cyber-Defense/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SpearSpecter-Unmasking-Irans-IRGC-Cyber-Operations-Targeting-High-Profile-Individuals/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/What-Should-A-Modern-Cybersecurity-Stack-Look-Like/</loc>
<lastmod>2025-11-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-18-Daily-Vulns/</loc>
<lastmod>2025-11-21T17:51:13+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Agents-built-into-your-workflow-Get-Security-Copilot-with-Microsoft-365-E5/</loc>
<lastmod>2025-11-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Bonkers-Bitcoin-heist-5-star-hotels,-cash-filled-envelopes,-vanishing-funds/</loc>
<lastmod>2025-11-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Meta-Expands-WhatsApp-Security-Research-with-New-Proxy-Tool-and-4M-in-Bounties-This-Year/</loc>
<lastmod>2025-11-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Detail-Tuoni-C2s-Role-in-an-Attempted-2025-Real-Estate-Cyber-Intrusion/</loc>
<lastmod>2025-11-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Self-replicating-botnet-attacks-Ray-clusters/</loc>
<lastmod>2025-11-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Active-Directory-Trust-Misclassification-Why-Old-Trusts-Look-Like-Insecure-External-Trusts/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-are-using-E2-80-9CSneaky-2FA-E2-80-9D-to-create-fake-sign-in-windows-that-look-real/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critics-scoff-after-Microsoft-warns-AI-feature-can-infect-machines-and-pilfer-data/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Actively-Exploiting-7-Zip-Symbolic-Link-E2-80-93Based-RCE-Vulnerability-(CVE-2025-11001)/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mac-users-warned-about-new-DigitStealer-information-stealer/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WrtHug-Exploits-Six-ASUS-WRT-Flaws-to-Hijack-Tens-of-Thousands-of-EoL-Routers-Worldwide/</loc>
<lastmod>2025-11-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-exposes-BadAudio-malware-used-in-APT24-espionage-campaigns/</loc>
<lastmod>2025-11-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Ransomware-Variants-Targeting-Amazon-S3-Services-Leveraging-Misconfigurations-and-Access-Controls/</loc>
<lastmod>2025-11-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sturnus-New-Android-banking-trojan-targets-WhatsApp,-Telegram,-and-Signal/</loc>
<lastmod>2025-11-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-21-Daily-Vulns/</loc>
<lastmod>2025-11-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShinyHunters-does-not-like-Salesforce-at-all,-claims-the-crew-accessed-Gainsight-3-months-ago/</loc>
<lastmod>2025-11-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-citizens,-Chinese-nationals-busted-exporting-cutting-edge-Nvidia-AI-chips-to-China/</loc>
<lastmod>2025-11-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-22-Daily-Vulns/</loc>
<lastmod>2025-11-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CrowdStrike-Fires-Worker-Over-Insider-Leak-to-Scattered-Lapsus-Hunters/</loc>
<lastmod>2025-11-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WhatsApp-API-flaw-let-researchers-scrape-3.5-billion-accounts/</loc>
<lastmod>2025-11-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-7-Zip-Vulnerability-With-Public-Exploit-Requires-Manual-Update/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-in-Azure-Bastion-Let-Attackers-Bypass-Authentication-and-Escalate-privileges/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Department-40-Exposed-Inside-the-IRGC-Unit-Connecting-Cyber-Ops-to-Assassinations/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Iberia-discloses-security-incident-tied-to-supplier-breach/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Security-Affairs-newsletter-Round-551-by-Pierluigi-Paganini-E2-80-93-INTERNATIONAL-EDITION/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Weaponized-file-name-flaw-makes-updating-glob-an-urgent-job/</loc>
<lastmod>2025-11-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-24-Daily-Vulns/</loc>
<lastmod>2025-11-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cox-Confirms-Oracle-EBS-Hack-as-Cybercriminals-Name-100-Alleged-Victims/</loc>
<lastmod>2025-11-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FAQ-About-Sha1-Hulud-2.0-The-Second-Coming-of-the-npm-Supply-Chain-Campaign/</loc>
<lastmod>2025-11-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Is-Your-Android-TV-Streaming-Box-Part-of-a-Botnet/</loc>
<lastmod>2025-11-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FBI-Cybercriminals-stole-262M-by-impersonating-bank-support-teams/</loc>
<lastmod>2025-11-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/KawaiiGPT-E2-80-93-New-Black-Hat-AI-Tool-Used-by-Hackers-to-Launch-Cyberattacks/</loc>
<lastmod>2025-11-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-RomCom-Utilizing-SocGholish-to-Deliver-Mythic-Agent-to-U.S.-Companies-Supporting-Ukraine/</loc>
<lastmod>2025-11-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Years-of-JSONFormatter-and-CodeBeautify-Leaks-Expose-Thousands-of-Passwords-and-API-Keys/</loc>
<lastmod>2025-11-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-26-Daily-Vulns/</loc>
<lastmod>2025-11-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cyber-Attack-Disrupts-OnSolve-CodeRED-Emergency-Notification-System/</loc>
<lastmod>2025-11-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Old-tech,-new-vulnerabilities-NTLM-abuse,-ongoing-exploitation-in-2025/</loc>
<lastmod>2025-11-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Bloody-Wolf-Expands-Java-based-NetSupport-RAT-Attacks-in-Kyrgyzstan-and-Uzbekistan/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dead-Mans-Switch-E2-80-93-Widespread-npm-Supply-Chain-Attack-Driving-Malware-Attacks/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/House-panels-seek-testimony-from-Anthropic,-Google,-Quantum-Xchange-after-report-on-PRC-linked-AI-attack/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Over-390-Abandoned-iCalendar-Sync-Domains-Could-Expose-~4-Million-Devices-to-Security-Risks/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Security-researchers-caution-app-developers-about-risks-in-using-Google-Antigravity/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Shai-hulud-2.0-Campaign-Targets-Cloud-and-Developer-Ecosystems/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ThreatsDay-Bulletin-AI-Malware,-Voice-Bot-Flaws,-Crypto-Laundering,-IoT-Attacks-E2-80-94-and-20-More-Stories/</loc>
<lastmod>2025-11-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-11-29-Daily-Vulns/</loc>
<lastmod>2025-12-08T21:01:47+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-Adds-Actively-Exploited-XSS-Bug-CVE-2021-26829-in-OpenPLC-ScadaBR-to-KEV/</loc>
<lastmod>2025-11-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korea-linked-actors-behind-Contagious-Interview-uploaded-197-new-malicious-npm-packages-to-distribute-a-new-OtterCookie-malware-version/</loc>
<lastmod>2025-11-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Over-2,000-Fake-Shopping-Sites-Spotted-Before-Cyber-Monday/</loc>
<lastmod>2025-11-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2025-61260-E2-80-94-OpenAI-Codex-CLI-Command-Injection-via-Project-Local-Configuration/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-Front-Companies-Providing-Advanced-Steganography-Solutions-for-APT-Operations/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Glassworm-malware-returns-in-third-wave-of-malicious-VS-Code-packages/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-a-Russian-Threat-Actor-Uses-a-Recent-WinRAR-Vulnerability-in-Their-Ukraine-Operations/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Police-takes-down-Cryptomixer-cryptocurrency-mixing-service/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/South-Korean-police-probe-massive-data-leak-at-Coupang/</loc>
<lastmod>2025-12-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Everest-Ransomware-Claims-ASUS-Breach-and-1TB-Data-Theft/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-fixes-two-Android-zero-days-exploited-in-attacks,-107-flaws/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/IPCola-A-Tangled-Mess/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/MuddyWater-Snakes-by-the-riverbank/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Not-Location,-Not-Tunnel,-but-a-Secret-Third-Thing-Datacenter-Infrastructure-&amp;-Identity-Attacks/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Capture-Lazarus-APTs-Remote-Worker-Scheme-Live-on-Camera/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-M-yETH-Exploit-How-16-Wei-Became-Infinite-Tokens/</loc>
<lastmod>2025-12-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/29.7-Tbps-DDoS-Attack-Via-Aisuru-Botnet-Breaks-Internet-With-New-World-Record/</loc>
<lastmod>2025-12-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/King-Addons-flaw-lets-anyone-become-WordPress-admin/</loc>
<lastmod>2025-12-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Penn-and-Phoenix-Universities-Disclose-Data-Breach-After-Oracle-Hack/</loc>
<lastmod>2025-12-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Despite-Microsofts-secret-patch,-LNK-loophole-remains-viable-for-hackers-to-deliver-malware/</loc>
<lastmod>2025-12-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LummaC2-Infects-North-Korean-Hacker-Device-Linked-to-Bybit-Heist/</loc>
<lastmod>2025-12-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Smile,-Youre-on-Camera-A-Live-Stream-from-Inside-Lazarus-Groups-IT-Workers-Scheme/</loc>
<lastmod>2025-12-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/To-Catch-a-Predator-Leak-exposes-the-internal-operations-of-Intellexas-mercenary-spyware/</loc>
<lastmod>2025-12-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unveiling-WARP-PANDA-A-New-Sophisticated-China-Nexus-Adversary/</loc>
<lastmod>2025-12-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-launch-dual-campaign-on-GlobalProtect-portals-and-SonicWall-APIs/</loc>
<lastmod>2025-12-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Barts-Health-NHS-Confirms-Cl0p-Ransomware-Behind-Data-Breach/</loc>
<lastmod>2025-12-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LockBit-5.0-Infrastructure-Exposed-in-New-Server,-IP,-and-Domain-Leak/</loc>
<lastmod>2025-12-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Portugal-updates-cybercrime-law-to-exempt-security-researchers/</loc>
<lastmod>2025-12-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-military-contractor-breach-expose-employee-data/</loc>
<lastmod>2025-12-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-Malware-FvncBot,-SeedSnatcher,-and-ClayRat-Gain-Stronger-Data-Theft-Features/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ChrimeraWire-Trojan-Fakes-Chrome-Activity-to-Manipulate-Search-Rankings/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exploitation-of-React2Shell-Surges/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-JS-SMUGGLER-Campaign-Drops-NetSupport-RAT-Through-Infected-Sites/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Poland-arrests-Ukrainians-utilizing-advanced-hacking-equipment/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Scammers-harvesting-Facebook-photos-to-stage-fake-kidnappings,-warns-FBI/</loc>
<lastmod>2025-12-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-say-Volkswagen-dealerships-client-list-is-now-for-sale/</loc>
<lastmod>2025-12-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Multiple-India-based-CCTV-Cameras/</loc>
<lastmod>2025-12-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cracking-ValleyRAT-From-Builder-Secrets-to-Kernel-Rootkits/</loc>
<lastmod>2025-12-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chrome-Targeted-by-Active-In-the-Wild-Exploit-Tied-to-Undisclosed-High-Severity-Flaw/</loc>
<lastmod>2025-12-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hamas-Affiliated-Ashen-Lepus-Targets-Middle-Eastern-Diplomatic-Entities-With-New-AshTag-Malware-Suite/</loc>
<lastmod>2025-12-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Stanford-University-pits-cybersecurity-researchers-versus-AI-should-humans-worry/</loc>
<lastmod>2025-12-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-14-Daily-Vulns/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/7-Best-Security-Awareness-Training-Platforms-For-MSPs-in-2026/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-Warns-of-Windows-Cloud-Files-Mini-Filter-0-Day-Vulnerability-Exploited-in-Attacks/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NANOREMOTE,-cousin-of-FINALDRAFT/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-React-Rsc-Vulnerabilities-Enable.Html/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Your-questions,-answered-by-Cybernews-Can-your-vape-be-hacked/</loc>
<lastmod>2025-12-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-15-Daily-Vulns/</loc>
<lastmod>2025-12-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Atlassian-Patches-Critical-Apache-Tika-Flaw/</loc>
<lastmod>2025-12-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-SantaStealer-malware-steals-data-from-browsers,-crypto-wallets/</loc>
<lastmod>2025-12-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Think-Like-an-Attacker-Cybersecurity-Tips-From-Cato-Networks-CISO/</loc>
<lastmod>2025-12-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/xHunt-APT-Hackers-Attacking-Microsoft-Exchange-and-IIS-Web-Servers-to-Deploy-Custom-Backdoors/</loc>
<lastmod>2025-12-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/700,000-Records-Compromised-in-Askul-Ransomware-Attack/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinas-Ink-Dragon-Hides-Out-in-European-Government-Networks/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Google-is-discontinuing-its-dark-web-report-why-it-matters/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pornhub-targeted-in-extortion-attempt-following-Mixpanel-breach-exposing-user-activity/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russia-Hits-Critical-Orgs-Via-Misconfigured-Edge-Devices/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-APT-actor-phishes-the-Baltics-and-the-Balkans/</loc>
<lastmod>2025-12-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-17-Daily-Vulns/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/8M-VPN-users-just-got-their-AI-chats-wiped-and-sold/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BlueDeltas-Persistent-Campaign-Against-UKR.NET/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShadyPanda-The-Silent-Browser-Takeover-Threat-and-How-Qualys-TruRisk-Eliminate-Helps-You-Stop-It/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UAT-9686-actively-targets-Cisco-Secure-Email-Gateway-and-Secure-Email-and-Web-Manager/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WhatsApp-device-linking-abused-in-account-hijacking-attacks/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Zeroday-Cloud-hacking-event-awards-320,0000-for-11-zero-days/</loc>
<lastmod>2025-12-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-18-Daily-Vulns/</loc>
<lastmod>2025-12-18T20:23:20+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kims-crypto-thieving-reached-a-record-2B-in-2025/</loc>
<lastmod>2025-12-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-BeaverTail-Malware-Variant-Linked-to-Lazarus-Group/</loc>
<lastmod>2025-12-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/OAuth-Device-Code-Phishing-Campaigns-Surge-Targets-Microsoft-365/</loc>
<lastmod>2025-12-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Rudepanda-Owns-Iis-Servers-Like-2003/</loc>
<lastmod>2025-12-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CISA-Releases-New-Indicators-of-Compromise-Tied-to-BRICKSTORM-Malware/</loc>
<lastmod>2025-12-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cybersecurity-Professionals-Plead-Guilty-to-Launching-Ransomware-Attacks/</loc>
<lastmod>2025-12-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RansomHouse-upgrades-encryption-with-multi-layered-data-processing/</loc>
<lastmod>2025-12-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russia-was-behind-a-destructive-cyber-attack-on-a-water-utility-in-2024,-Denmark-says/</loc>
<lastmod>2025-12-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cloud-Atlas-activity-in-the-first-half-of-2025-what-changed/</loc>
<lastmod>2025-12-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Massive-Android-botnet-Kimwolf-infects-millions,-strikes-with-DDoS/</loc>
<lastmod>2025-12-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-22-Daily-Vulns/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-Malware-Operations-Merge-Droppers,-SMS-Theft,-and-RAT-Capabilities-at-Scale/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BlindEagle-Hackers-Attacking-Government-Agencies-with-Powershell-Scripts/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Abuse-Popular-Monitoring-Tool-Nezha-as-a-Stealth-Trojan/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-attack-WatchGuard-Firebox-firewalls-120K-IPs-exposed-and-vulnerable/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Prince-of-Persia-ran-a-covert-Iranian-spy-campaign-for-over-a-decade/</loc>
<lastmod>2025-12-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-24-Daily-Vulns/</loc>
<lastmod>2025-12-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-12-26-Daily-Vulns/</loc>
<lastmod>2025-12-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-01-02-Daily-Vulns/</loc>
<lastmod>2026-01-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-claim-to-hack-Resecurity,-firm-says-it-was-a-honeypot/</loc>
<lastmod>2026-01-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Infostealers-Enable-Attackers-to-Hijack-Legitimate-Business-Infrastructure-for-Malware-Hosting/</loc>
<lastmod>2026-01-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinas-guardian-of-secrets-E4-BF-9D-E5-AF-86-E7-AE-A1-E7-90-86-E7-B3-BB-E7-BB-9F/</loc>
<lastmod>2026-01-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Knownsec-leak-unmasks-secret-cyberweapons-and-role-in-Chinas-state-linked-spying/</loc>
<lastmod>2026-01-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Zealand-orders-review-into-ManageMyHealth-cyberattack/</loc>
<lastmod>2026-01-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/NordVPN-Denies-Breach-After-Hacker-Claims-Access-to-Salesforce-Dev-Data/</loc>
<lastmod>2026-01-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Risks-of-OOB-Access-via-IP-KVM-Devices/</loc>
<lastmod>2026-01-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/There-Were-BGP-Anomalies-During-The-Venezuela-Blackout/</loc>
<lastmod>2026-01-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WhatsApp-Vulnerabilities-Leaks-Users-Metadata-Including-Devices-Operating-System/</loc>
<lastmod>2026-01-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Coinbase-insider-who-sold-customer-data-to-criminals-arrested-in-India/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Columbia-Weather-Systems-MicroServer/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-change-prevention-to-continuous-improvement-Automating-patch-cycles-with-guardrails,-rings,-and-proof/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/High-Severity-Flaw-in-Open-WebUI-Affects-AI-Connections/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hospitality-Sector-Hit-By-PHALT-BLYX-ClickFix-Malware-Campaign/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ledger-Confirms-Global-e-Breach,-Warns-Users-of-Phishing-Attempts/</loc>
<lastmod>2026-01-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Black-Cat-Behind-SEO-Poisoning-Malware-Campaign-Targeting-Popular-Software-Searches/</loc>
<lastmod>2026-01-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Breaking-Down-the-Attack-Surface-of-the-Kenwood-DNR1007XR-E2-80-93-Part-One/</loc>
<lastmod>2026-01-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-actively-exploit-critical-RCE-flaw-in-legacy-D-Link-DSL-routers/</loc>
<lastmod>2026-01-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-GoBruteforcer-AI-Generated-Server-Defaults,-Weak-Passwords,-and-Crypto-Focused-Campaigns/</loc>
<lastmod>2026-01-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-Linked-UAT-7290-Targets-Telecoms-with-Linux-Malware-and-ORB-Nodes/</loc>
<lastmod>2026-01-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-WinRAR-downloads-hide-malware-behind-a-real-installer/</loc>
<lastmod>2026-01-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hitachi-Energy-Asset-Suite/</loc>
<lastmod>2026-01-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Public-PoC-prompts-Cisco-patch-for-ISE,-ISE-PIC-vulnerability/</loc>
<lastmod>2026-01-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-State-of-Trusted-Open-Source/</loc>
<lastmod>2026-01-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-MacSync-Stealer-Uses-Signed-macOS-App-to-Evade-Gatekeeper-and-Steal-Data/</loc>
<lastmod>2026-01-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishing-Campaign-Uses-Maduro-Arrest-Story-to-Deliver-Backdoor-Malware/</loc>
<lastmod>2026-01-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Europol-Raids-Disrupt-Black-Axe-Cybercrime-Ring-in-Spain/</loc>
<lastmod>2026-01-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Instagram-denies-breach-amid-claims-of-17-million-account-data-leak/</loc>
<lastmod>2026-01-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Instagrams-17-Million-User-Data-Leak-Was-Just-Scraped-Records-from-2022/</loc>
<lastmod>2026-01-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2026-22200/</loc>
<lastmod>2026-01-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CrazyHunter-ransomware-escalates-with-advanced-intrusion-tactics,-six-Taiwan-healthcare-victims-confirmed/</loc>
<lastmod>2026-01-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hacker-gets-seven-years-for-breaching-Rotterdam-and-Antwerp-ports/</loc>
<lastmod>2026-01-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Alpitronic-HYC50-Hardware-Teardown-for-Pwn2Own-Automotive-2026/</loc>
<lastmod>2026-01-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Violence-as-a-service-suspect-arrested-in-Iraq,-extradition-underway/</loc>
<lastmod>2026-01-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-01-13-Daily-Vulns/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2025-64155-7C-Fortinet-FortiSIEM/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CastleLoader-Analysis-A-Deep-Dive-into-Stealthy-Loader-Targeting-Government-Sector/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Electrum-Kamacite-Ten-Years-Adversary-Tradecraft-Intel-Report-01-26/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hunting-Lazarus-Inside-the-Contagious-Interview-C2-Infrastructure/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Unveiling-VoidLink-E2-80-93-A-Stealthy,-Cloud-Native-Linux-Malware-Framework/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Why-iPhone-users-should-update-and-restart-their-devices-now/</loc>
<lastmod>2026-01-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/A-single-click-mounted-a-covert,-multistage-attack-against-Copilot/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CERT-UA-reports-PLUGGYAPE-cyberattacks-on-defense-forces/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/German-Manufacturing-Under-Phishing-Attacks-Tracking-a-Stealthy-AsyncRAT-Campaign/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Inside-RedVDS-How-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Leveraging-Landlock-telemetry-for-Linux-detection-engineering/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/North-Korean-Hackers-use-Code-Abuse-Tactics-for-E2-80-98Contagious-Interview-Campaign/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sweden-detains-ex-military-IT-consultant-suspected-of-spying-for-Russia/</loc>
<lastmod>2026-01-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AVEVA-Process-Optimization/</loc>
<lastmod>2026-01-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CodeBuild-Flaw-Put-AWS-Console-Supply-Chain-At-Risk/</loc>
<lastmod>2026-01-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Gootloader-now-uses-1,000-part-ZIP-archives-for-stealthy-delivery/</loc>
<lastmod>2026-01-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-PayPal-Scam-Sends-Verified-Invoices-With-Fake-Support-Numbers/</loc>
<lastmod>2026-01-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LOTUSLITE-Targeted-espionage-leveraging-geopolitical-themes/</loc>
<lastmod>2026-01-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fast-Pair,-loose-security-Bluetooth-accessories-open-to-silent-hijack/</loc>
<lastmod>2026-01-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RPi-Jukebox-RFID-2.8.0-Remote-Command-Execution/</loc>
<lastmod>2026-01-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Tennessee-Man-Pleads-Guilty-to-Repeatedly-Hacking-Supreme-Courts-Filing-System/</loc>
<lastmod>2026-01-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hacktivists-hijacked-Irans-state-TV-to-air-anti-regime-messages-and-an-appeal-to-protest-from-Reza-Pahlavi/</loc>
<lastmod>2026-01-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mandiant-releases-quick-credential-cracker,-to-hasten-the-death-of-a-bad-protocol/</loc>
<lastmod>2026-01-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Attackers-Redirected-Employee-Paychecks-Without-Breaching-a-Single-System/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Extension-to-Infection-An-In-Depth-Analysis-of-the-Evelyn-Stealer-Campaign-Targeting-Software-Developers/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ingram-Micro-admits-summer-ransomware-raid-exposed-thousands-of-staff-records/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-PDFSider-Windows-malware-deployed-on-Fortune-100-firms-network/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-StackWarp-Hardware-Flaw-Breaks-AMD-SEV-SNP-Protections-on-Zen-1-E2-80-935-CPUs/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Suspects-Linked-to-Black-Basta-Ransomware-Group-Raided-in-Ukraine/</loc>
<lastmod>2026-01-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-TP-Link-VIGI-camera-flaw-allowed-remote-takeover-of-surveillance-systems/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Use-LinkedIn-Messages-to-Spread-RAT-Malware-Through-DLL-Sideloading/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kimwolf-Botnet-Lurking-in-Corporate,-Govt.-Networks/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pwn2Own-Automotive-2026-The-Full-Schedule/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Schneider-Electric-devices-using-CODESYS-Runtime/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/VoidLink-Evidence-That-the-Era-of-Advanced-AI-Generated-Malware-Has-Begun/</loc>
<lastmod>2026-01-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Can-you-use-too-many-LOLBins-to-drop-some-RATs/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Damn-Vulnerable-Training-Apps-Leave-Vendors-Clouds-Exposed/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Dont-click-on-the-LastPass-create-backup-link-its-a-scam/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Weaponized-2,500+-Security-Tools-to-Terminate-Endpoint-Protection-Before-Deploying-Ransomware/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Online-retailer-PcComponentes-says-data-breach-claims-are-fake/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Peruvian-Loan-Scam-Harvests-Cards-and-PINs-via-Fake-Applications/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishing-and-Spoofed-Sites-Remain-Primary-Entry-Points-For-Olympics/</loc>
<lastmod>2026-01-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-01-22-Daily-Vulns/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Delta-Electronics-DIAView-Vulnerability-Advisory/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Foxit,-Epic-Games-Store,-MedDreams-vulnerabilities/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/KONNI-Adopts-AI-to-Generate-PowerShell-Backdoors/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Osiris-New-Ransomware,-Experienced-Attackers/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ticket-to-Shell-Exploiting-PHP-Filters-and-CNEXT-in-osTicket-(CVE-2026-22200)/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Vulnerabilities-in-EVMAPA/</loc>
<lastmod>2026-01-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fortinet-warns-of-active-FortiCloud-SSO-bypass-affecting-updated-devices/</loc>
<lastmod>2026-01-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Investigation-underway-after-72M-Under-Armour-records-surface-online/</loc>
<lastmod>2026-01-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Was-Nike-hacked-Attackers-threaten-to-leak-apparel-giants-data/</loc>
<lastmod>2026-01-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-01-24-Daily-Vulns/</loc>
<lastmod>2026-01-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ESET-Research-Sandworm-behind-cyberattack-on-Polands-power-grid-in-late-2025/</loc>
<lastmod>2026-01-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/FBI-Accessed-Windows-Laptops-After-Microsoft-Shared-BitLocker-Recovery-Keys/</loc>
<lastmod>2026-01-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/1Password-Adds-Pop-Up-Warnings-for-Suspected-Phishing-Sites/</loc>
<lastmod>2026-01-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chrome-Extensions-Are-you-getting-more-than-you-bargained-for/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Defending-with-AD-Tripwires-GOAD-Walkthrough/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/From-Protest-to-Peril-Cellebrite-Used-Against-Jordanian-Civil-Society/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GOGITTER,-GITSHELLPAD,-and-GOSHELL-Analysis/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Get-paid-to-scroll-TikTok-The-data-trade-behind-Freecash-ads/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PeckBirdy-A-Versatile-Script-Framework-for-LOLBins-Exploitation-Used-by-China-aligned-Threat-Groups/</loc>
<lastmod>2026-01-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/14M-Panera-Bread-customer-records-leaked-What-do-we-know-so-far/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-sandbox-escape-flaw-found-in-popular-vm2-NodeJS-library/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Initial-Stages-of-Romance-Scams-5BGuest-Diary-5D/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pyodide-Sandbox-Escape-Enables-Remote-Code-Execution-in-Grist-Core/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/WhatsApp-Rolls-Out-Lockdown-Style-Security-Mode-to-Protect-Targeted-Users-From-Spyware/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Why-has-Microsoft-been-routing-example.com-traffic-to-a-company-in-Japan/</loc>
<lastmod>2026-01-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CVE-2025-40551-Another-Solarwinds-Web-Help-Desk-Deserialization-Issue/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cant-Stop-Wont-Stop-Ta584-Innovates-Initial-Access/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cyber-Security-Report-2026/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GoTo-Resolve-Tools-Background-Activities-Compared-to-Ransomware-Tactics/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Odd-WebLogic-Request.-Possible-CVE-2026-21962-Exploit-Attempt-or-AI-Slop/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Old-Windows-quirks-help-punch-through-new-admin-defenses/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian-Cybercrime-Platform-RAMP-Forum-Seized-by-FBI/</loc>
<lastmod>2026-01-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Clawdbots-rename-to-Moltbot-sparks-impersonation-campaign/</loc>
<lastmod>2026-01-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Disrupting-Largest-Residential-Proxy-Network/</loc>
<lastmod>2026-01-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/France-Fines-National-Employment-Agency-E2-82-AC5m-Over-2024-Data-Breach/</loc>
<lastmod>2026-01-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Im-locked-in!/</loc>
<lastmod>2026-01-29T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Empire-Market-co-founder-faces-10-years-to-life-after-guilty-plea/</loc>
<lastmod>2026-01-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Ex-Google-Engineer-Convicted-for-Stealing-2,000-AI-Trade-Secrets-for-China-Startup/</loc>
<lastmod>2026-01-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Phishing-kits-adapt-to-the-script-of-callers/</loc>
<lastmod>2026-01-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ShadowHS-A-Fileless-Linux-Post-E2-80-91Exploitation-Framework-Built-on-a-Weaponized-hackshell/</loc>
<lastmod>2026-01-30T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Moltbook-AI-Vulnerability-Exposes-Email-Addresses,-Login-Tokens,-and-API-Keys/</loc>
<lastmod>2026-02-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Apple-Privacy-Feature-Limits-Location-Tracking-on-iPhones,-iPads/</loc>
<lastmod>2026-02-01T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/341-Malicious-ClawHub-Skills-Discovered-Stealing-User-Data/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-RAT-Uses-Hugging-Face-to-Host-Malware/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/D-Link-DIR-825-Rev.B-2.10-Stack-Buffer-Overflow-(DoS)/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Multiple-Vulnerabilities-Found-in-Cybozu-Garoon/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Multiple-vulnerabilities-in-Cybozu-Garoon/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mutagen-Astronomy-From-Discovery-to-CISA-Recognition-E2-80-94A-Seven-Year-Journey/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Mutagen-Astronomy-From-Discovery-to-CISA-Recognition-E2-80-94A-Seven-Year-Journey/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Notepad++-Hijacked-by-State-Sponsored-Hackers/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Find-341-Malicious-ClawHub-Skills-Stealing-Data-from-OpenClaw-Users/</loc>
<lastmod>2026-02-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AT&amp;T-Breach-Data-Resurfaces-with-New-Risks-for-Customers/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-in-Synectix-LAN-232-TRIO-Exposed/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Multiple-Vulnerabilities-Found-in-ELECOM-Wireless-LAN-Products/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Step-Finance-Reports-40M-Crypto-Theft-Due-to-Compromised-Devices/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Vulnerability-Alert-Mitsubishi-Electric-FREQSHIP-mini-for-Windows/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Wave-of-Citrix-NetScaler-Scans-Utilize-Thousands-of-Residential-Proxies/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/When-Hacktivists-Target-Water-Utilities-Inside-a-Russian-Aligned-OT-Attack/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/docker_dash_exposes_ai_supply_chain_weakness_in_dockers_ask_gordon/</loc>
<lastmod>2026-02-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-04-Daily-Vulns/</loc>
<lastmod>2026-02-17T20:11:04+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT28-Geofencing-as-a-Targeting-Signal-(CVE-2026-21509-Campaign)/</loc>
<lastmod>2026-02-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hiding-in-Plain-Sight-Tracking-Bulletproof-Hosting-and-Abused-RDP-Infrastructure/</loc>
<lastmod>2026-02-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Paris-Raid-Targets-Child-Abuse-Material-Allegations/</loc>
<lastmod>2026-02-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Double-Edged-Sword-of-Non-Human-Identities/</loc>
<lastmod>2026-02-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Deadvax-Threat-Research-Security-Advisory/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Italy-Blames-Russia-Linked-Hackers-for-Cyberattacks-Ahead-of-Winter-Olympics/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Knife-Cutting-The-Edge-Unveiling-the-DKnife-Framework/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Spains-Ministry-of-Science-Shuts-Down-Systems-After-Breach-Claims/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Shadow-Campaigns-Uncovering-Global-Espionage/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Web-Traffic-Hijacking-Malicious-Nginx-Configurations-Uncovered/</loc>
<lastmod>2026-02-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Eradicating-Trivial-Vulnerabilities-at-Scale/</loc>
<lastmod>2026-02-25T20:29:53+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Eradicating_Trivial_Vulnerabilities_at_Scale/</loc>
<lastmod>2026-02-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Nearly-5-Million-Web-Servers-Found-Exposing-Git-Metadata-Study-Reveals-Widespread-Risk-of-Code-and-Credential-Leaks/</loc>
<lastmod>2026-02-06T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BridgePay-Confirms-Ransomware-Attack-Behind-Outage/</loc>
<lastmod>2026-02-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DOGE-May-Have-Misused-Social-Security-Data,-DOJ-Admits/</loc>
<lastmod>2026-02-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Italian-University-La-Sapienza-Offline-After-Cyber-Attack/</loc>
<lastmod>2026-02-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LocalGPT_A_Secure_Local_Device_Focused_AI_Assistant_Built_in_Rust/</loc>
<lastmod>2026-02-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-Construction-Firm-Targeted-by-Prometei-Botnet-in-Windows-Server/</loc>
<lastmod>2026-02-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Beware-of-Fake-7-Zip-Downloads-Turning-PCs-into-Proxy-Nodes!/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BeyondTrust-Fixes-Critical-Pre-Auth-Bug-Allowing-Remote-Code-Execution/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/European-Commission-Investigates-Cyberattack-on-Mobile-Device-Management-System/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-the-GNU-C-Compiler-Became-the-Clippy-of-Cryptography/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Password-Guessing-Without-AI-How-Attackers-Build-Targeted-Wordlists/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Quick-Howto-Extract-URLs-from-RTF-Files/</loc>
<lastmod>2026-02-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-10-Daily-Vulns/</loc>
<lastmod>2026-02-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Largest-Multi-Agency-Cyber-Operation-Launched-Against-APT-Threats/</loc>
<lastmod>2026-02-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Man-Tricked-Hundreds-of-Women-into-Handing-Over-Snapchat-Security-Codes/</loc>
<lastmod>2026-02-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Linux-Botnet-SSHStalker-Uses-Old-School-IRC-for-C2-Comms/</loc>
<lastmod>2026-02-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pride-Month-Phishing-Targets-Employees-via-Trusted-Email-Services/</loc>
<lastmod>2026-02-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Conduent-Case-Unveiled-Volvo-Reports-Third-Party-Compromise/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crazy-Ransomware-Gang-Abuses-Employee-Monitoring-Tool-in-Attacks/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-Recruiter-Campaign-Targets-Crypto-Developers/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Microsoft-Store-Outlook-Add-in-Hijacked-to-Steal-4,000-Accounts/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pulling-Back-the-Curtain-on-Warlocks-Next-Act/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/US-Court-Sentences-Crypto-Scammer-to-20-Years-for-73-Million-Fraud/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Were-Telcos-Warned-About-the-Ancient-Telnet-Bug/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/When-Paychecks-Become-the-Prize-A-Deeper-Look-at-the-Rise-of-Direct-Deposit-Attacks/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/kimwolf-botnet-disrupts-i2p-network/</loc>
<lastmod>2026-02-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerability-in-Airleader-Master-Exposed/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LummaStealer-Activity-Surges-After-Law-Enforcement-Disruption/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Odido-Confirms-Massive-Data-Breach-Affecting-6.2-Million-Customers/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Security-Experts-Warn-Discord-Age-Checks-Create-Identity-Honey-Pot/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Siemens-Siveillance-Video-Management-Servers-Vulnerability-Advisory/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/hand-over-the-keys-for-shannons-shenanigans/</loc>
<lastmod>2026-02-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Icedid-Malware-Developer-Fakes-His-Own-Death-To-Escape-The-FBI/</loc>
<lastmod>2026-02-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fintech-Firm-Figure-Discloses-Data-Breach-Following-Phishing-Attack/</loc>
<lastmod>2026-02-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-Macromaze-APT28s-New-Campaign-Unveiled/</loc>
<lastmod>2026-02-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Snail-Mail-Phishing-Targets-Trezor-and-Ledger-Users/</loc>
<lastmod>2026-02-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Suspected-Russian-Hackers-Deploy-CANFAIL-Malware-Against-Ukraine/</loc>
<lastmod>2026-02-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Threat-Actor-Selling-OpenSea-0-Day-Exploit-for-100,000/</loc>
<lastmod>2026-02-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Eurail-Confirms-Stolen-Traveler-Data-for-Sale-on-Dark-Web/</loc>
<lastmod>2026-02-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Full-Disclosure-Authenticated-RCE-Vulnerabilities-in-Netgate-pfSense/</loc>
<lastmod>2026-02-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RoguePilot_-_Exploiting_GitHub_Copilot_for_a_Repository_Takeover/</loc>
<lastmod>2026-02-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Security-Flaw-at-DavaIndia-Pharmacy-Exposes-Customer-Data/</loc>
<lastmod>2026-02-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Washington-Hotel-in-Japan-Discloses-Ransomware-Infection-Incident/</loc>
<lastmod>2026-02-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Android-17-Beta-Introduces-Secure-By-Default-Architecture/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerabilities-in-GE-Vernova-Enervista-UR-Setup/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Delta-Electronics-ASDA-Soft-Vulnerability-Advisory/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fake-Incident-Report-Used-in-Phishing-Campaign/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Keenadu-The-Tablet-Conqueror-and-Major-Android-Botnets/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SmartLoader-Hackers-Clone-Oura-MCP-Project-to-Spread-StealC-Malware/</loc>
<lastmod>2026-02-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Aussie-Fintech-Platform-Youx-Confirms-Data-Breach-As-Hacker-Shares-Massive-Dataset-Online/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Chinese-APT-Group-Exploits-Dell-Zero-Day-for-Two-Years/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Grandstream-VoIP-Bug-Highlights-SMB-Security-Blind-Spot/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cryptocurrency-Scams-Target-Asia-Combining-Malvertising-and-Pig-Butchering/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Job-Scam-Alert-Fake-Google-Forms-Site-Harvesting-Logins/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Telegram-Channels-Expose-Rapid-Weaponization-of-SmarterMail-Flaws/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Uncovering-Vulnerabilities-with-Good-Enough-Emulation/</loc>
<lastmod>2026-02-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Made-Death-Threats-Against-Security-Researcher-A-Big-Mistake/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Indias_AI_Revolution_Why_This_Is_Indias_Most_Significant_Moment/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Industrial-Scale-Fake-Coretax-Apps-Drive-2m-Fraud-in-Indonesia/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Texas-Sues-TP-Link-Over-Alleged-Chinese-Government-Access/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Welker-OdorEyes-EcoSystem-Pulse-Bypass-System-Vulnerability-Alert/</loc>
<lastmod>2026-02-27T09:28:11+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/meta_patents_ai_that_could_keep_you_posting_from_beyond_the_grave/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/trump-administrations-ai-cybersecurity-strategy-unveiled/</loc>
<lastmod>2026-02-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-20-Daily-Vulns/</loc>
<lastmod>2026-02-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Digital-Skimmer-Hits-Global-Supermarket-Chain/</loc>
<lastmod>2026-02-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/PayPal-App-Code-Error-Exposes-Personal-Information/</loc>
<lastmod>2026-02-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/LLMs_in_the_Kill_Chain_Inside_a_Custom_MCP_Targeting_FortiGate_Devices_Across_Continents/</loc>
<lastmod>2026-02-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Predator-Spyware-Hides-iOS-Recording-Indicators/</loc>
<lastmod>2026-02-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-22-Daily-Vulns/</loc>
<lastmod>2026-02-25T20:28:27+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Vulnerabilities-Found-in-NesterSoft-WorkTime/</loc>
<lastmod>2026-02-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Hackers-Hide-Pulsar-RAT-Inside-PNG-Images-in-New-NPM-Supply-Chain-Attack/</loc>
<lastmod>2026-02-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Spanish-Police-Arrest-Hacker-for-E2-82-AC0.01-Luxury-Hotel-Stays/</loc>
<lastmod>2026-02-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/UK-Council-Faces-Data-Breach-Claim-Over-Trans-Complaints/</loc>
<lastmod>2026-02-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2025-The-Untold-Stories-of-Check-Point-Research/</loc>
<lastmod>2026-02-26T23:57:47+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Another-Day,-Another-Malicious-JPEG/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Data-Breaches-in-2026-Whats-Old,-Whats-New/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-to-Set-Up-Private-DNS-Mode-on-Your-iPhone-Why-You-Should-Do-It-ASAP/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New-Phishing-Framework-Starkiller-Proxies-Real-Login-Pages-to-Bypass-MFA/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Wormable-XMRig-Campaign-Uses-BYOVD-Exploit-and-Time-Based-Logic-Bomb/</loc>
<lastmod>2026-02-23T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-24-Daily-Vulns/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Crypto-Funded-Human-Trafficking-Is-Exploding/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Go-Library-Maintainer-Critiques-GitHubs-Dependabot-as-a-Noise-Machine/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Massiv-The-New-Threat-to-Your-Mobile-Banking-Security/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/RoguePilot_Flaw_in_GitHub_Codespaces_Enabled_Copilot_to_Leak_GITHUB_TOKEN/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Understanding-the-Behavioral-Science-Behind-Online-Harassment/</loc>
<lastmod>2026-02-27T09:27:26+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/anthropic-claims-chinese-ai-firms-distilled-claude-to-train-their-models/</loc>
<lastmod>2026-02-24T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-25-Daily-Vulns/</loc>
<lastmod>2026-02-25T20:29:23+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical-Cisco-SD-WAN-Bug-Exploited-in-Zero-Day-Attacks-F0-9F-9A-A8/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DNB_Podcast_The_Long_Game_and_the_Laptop_Farm/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Defense-Contractor-Employee-Jailed-for-Selling-8-Zero-Days-to-Russian-Broker/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Kali-&amp;-LLM-Enhancing-macOS-with-Claude-Desktop-GUI-F0-9F-9A-80/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Man-Accidentally-Gains-Control-of-7,000-Robot-Vacuums/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/One-click-Disaster-Microsofts-Entra-Tokens-at-Risk/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/SLH-Offers-Per-Call-to-Recruit-Women-for-IT-Help-Desk-Vishing-Attacks/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Treasury-Sanctions-Exploit-Broker-Network-for-Cyber-Tools-Theft/</loc>
<lastmod>2026-02-25T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-26-Daily-Vulns/</loc>
<lastmod>2026-02-27T09:26:12+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Post-Exploitation-at-Scale-The-Rise-of-AILM/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Investigative-Gap-Why-Forensic-Context-is-the-SOCs-Greatest-Bottleneck/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Vshell-A-ChineseLanguage-Alternative-to-Cobalt-Strike/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/five-eyes-urgent-warning-patch-your-cisco-sd-wan-to-prevent-root-takeover/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ufp-technologies-discloses-data-breach-after-cybersecurity-incident/</loc>
<lastmod>2026-02-26T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-27-Daily-Vulns/</loc>
<lastmod>2026-02-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Apt37_Adds_New_Capabilities_for_Air_Gapped_Networks/</loc>
<lastmod>2026-02-27T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/JPCERT_CC_JSAC2026_Day_2_Highlights/</loc>
<lastmod>2026-03-04T12:29:51+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-02-28-Daily-Vulns/</loc>
<lastmod>2026-02-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/QuickLens_Chrome_Extension_Steals_Crypto_and_Shows_ClickFix_Attack/</loc>
<lastmod>2026-02-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/google-quantum-proofs-https-by-squeezing-15kb-of-data-into-700-byte-space/</loc>
<lastmod>2026-02-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/pentagon-designates-anthropic-supply-chain-risk-over-ai-military-dispute/</loc>
<lastmod>2026-02-28T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Exorcising_Demons_Fake_Tech_Support_Delivers_Havoc_Command_Control/</loc>
<lastmod>2026-03-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Pakistans_Top_News_Channels_Hacked_and_Hijacked_With_Anti_Military_Messages/</loc>
<lastmod>2026-03-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/dust-specter-apt-targets-government-officials-in-iraq/</loc>
<lastmod>2026-03-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/escalation-in-the-middle-east-tracking-operation-epic-fury/</loc>
<lastmod>2026-03-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/</loc>
<lastmod>2026-03-02T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Coruna_-_Inside_the_Nation-State/</loc>
<lastmod>2026-03-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/What-is-ISO-IEC-42001/</loc>
<lastmod>2026-03-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/malvertising-threat-actor-d-shortiez-abuses-webkit-back-button-hijack/</loc>
<lastmod>2026-03-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/most-cybercriminals-are-middle-aged-new-data-reveals/</loc>
<lastmod>2026-03-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ransomware-attack-exposes-1-2-million-university-of-hawaii-cancer-center-records/</loc>
<lastmod>2026-03-03T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-04-Daily-Vulns/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Cisco_Fixes_MaximumSeverity_Secure_FMC_Bugs_Threatening_Firewall_Security/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/High-severity-Qualcomm-Bug-Hits-Android-Devices-in-Targeted-Attacks/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/europol-microsoft-trendai-and-collaborators-halt-tycoon-2fa-operations/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/lexisnexis_confirms_data_breach_affecting_customer_records/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/telegram-increasingly-used-to-sell-access-malware-and-stolen-logs/</loc>
<lastmod>2026-03-04T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Delta_Electronics_CNCSoft_G2_Vulnerability_Advisory/</loc>
<lastmod>2026-03-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Manufacturing_Supply_Chains_Face_Cascading_Cyber_Risk_as_Third_Party_Breaches_Hit_Record_Levels/</loc>
<lastmod>2026-03-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Operation-Leak-FBI-and-Europol-Dismantle-LeakBase-Cybercrime-Forum/</loc>
<lastmod>2026-03-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Russian_APT_Targets_Ukraine_with_BadPaw_and_MeowMeow_Malware/</loc>
<lastmod>2026-03-05T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/An_AI_Broke_Out_of_Its_System_to_Mine_Crypto/</loc>
<lastmod>2026-03-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New_Social_Security_Scam_Emails_Use_Fake_Tax_Documents_to_Hijack_PCs/</loc>
<lastmod>2026-03-07T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Critical_Zero_Click_Command_Injection_in_AVideo_Platform_Allows_Stream_Hijacking/</loc>
<lastmod>2026-03-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How_AI_Assistants_are_Moving_the_Security_Goalposts/</loc>
<lastmod>2026-03-08T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Fixing-Request-Smuggling-Vulnerabilities-in-Pingora-OSS-Deployments/</loc>
<lastmod>2026-03-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Improper-File-Access-Permission-Settings-in-Digital-Arts-Products/</loc>
<lastmod>2026-03-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ericsson-us-discloses-data-breach-after-service-provider-hack/</loc>
<lastmod>2026-03-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/ev-charger-company-elecq-hit-by-ransomware-attack-customer-data-compromised/</loc>
<lastmod>2026-03-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/quiz-sites-trick-users-into-enabling-unwanted-browser-notifications/</loc>
<lastmod>2026-03-09T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/APT28_Conducts_Long_Term_Espionage_on_Ukrainian_Forces_Using_Custom_Malware/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/DNB_Podcast_JWT_Cracks_South_American_Telecom_Breaches_and_the_Kinetic_Cyber_Nexus_in_Iran/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How_We_Hacked_McKinseys_AI_Platform/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Sednit_reloaded_Back_in_the_trenches/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/honeywell-iq4x-bms-controller-vulnerability-advisory/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/vulnerabilities-in-lantronix-eds3000ps-and-eds5000/</loc>
<lastmod>2026-03-10T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-11-Daily-Vulns/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/A_Foreign_Hacker_Accessed_FBI_Files_on_Epstein_Back_in_2023_Report/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Alert_Regarding_Vulnerabilities_in_Adobe_Acrobat_and_Reader/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/BeatBanker_Malware_Targets_Android_Users_with_Banking_Trojan_and_Crypto_Miner/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/INC_Ransomware_Group_Holds_Healthcare_Hostage_in_Oceania/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Meta_Disables_150K_Accounts_Linked_to_Southeast_Asia_Scam_Centers_in_Global_Crackdown/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/hewlett-packard-enterprise-fixes-critical-authentication-bypass-in-aruba-aos-cx/</loc>
<lastmod>2026-03-11T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/AI-Generated_Slopoly_Malware_Used_in_Interlock_Ransomware_Attack/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Announcing_Pwn2Own_Berlin_for_2026/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Escorted_Out_Major_Cybersecurity_Takedown/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/The-Market-for-Spyware-is-Growing-Its-Used-Differently-Against-Women/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/This-Android-Vulnerability-Can-Break-Your-Lock-Screen-in-Under-60-Seconds/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/</loc>
<lastmod>2026-03-12T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CrackArmor-Critical-AppArmor-Flaws-Enable-Local-Privilege-Escalation-to-Root/</loc>
<lastmod>2026-03-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Twenty-Years-of-Cloud-Security-Research/</loc>
<lastmod>2026-03-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/credentialstealing-crew-spoofs-vpn-clients-from-cisco-fortinet-and-others/</loc>
<lastmod>2026-03-13T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Appsflyer_Web_SDK_Hijacked_to_Spread_CryptoStealing_JavaScript_Code/</loc>
<lastmod>2026-03-14T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-15-Daily-Vulns/</loc>
<lastmod>2026-03-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks/</loc>
<lastmod>2026-03-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital/</loc>
<lastmod>2026-03-15T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/China-Linked-Hackers-Target-Asian-Militaries-in-Espionage-Operation/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Flaw-in-UKs-Corporate-Registry-Exposes-Directors-Data/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GlassWorm_Attack_Uses_Stolen_GitHub_Tokens_to_Force_Push_Malware_Into_Python_Repos/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers-Warn-of-Global-Surge-in-Fake-Shipment-Tracking-Scams/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers_Find_Data_Leak_Risk_in_AWS_Bedrock_AI_Code_Interpreter/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/qihoo-360-leaked-its-own-wildcard-ssl-private-key-inside-public-ai-installer/</loc>
<lastmod>2026-03-16T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/90_of_people_dont_trust_ai_with_their_data/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/CODESYS-Vulnerabilities-in-Festo-Automation-Suite/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/GitHub-Katana-A-Next-Generation-Crawling-and-Spidering-Framework/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/How-to-Examine-Polyglot-Files-with-Spectra-Analyze/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/katana-a-mirai-variant-targeting-android-tv-set-top-boxes/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/schneider-electric-scadapack-and-remoteconnect-vulnerability-advisory/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/warlock-ransomware-group-enhances-post-exploitation-techniques/</loc>
<lastmod>2026-03-17T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Interlock-Ransomware-Exploits-Cisco-FMC-Zero-Day-CVE-2026-20131-for-Root-Access/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/New_Ubuntu_Flaw_Enables_Local_Attackers_to_Gain_Root_Access/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Researchers_Found_Font_Rendering_Trick_to_Hide_Malicious_Commands/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/Transparent_COM_Instrumentation_for_Malware_Analysis/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/crypto-scam-shieldguard-dismantled-after-malware-discovery/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/scans-for-adminer-understanding-the-threat/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/the-beast-returns-analysis-of-a-beast-ransomware-server/</loc>
<lastmod>2026-03-18T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-19-Daily-Vulns/</loc>
<lastmod>2026-03-19T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-20-Daily-Vulns/</loc>
<lastmod>2026-03-20T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-21-Daily-Vulns/</loc>
<lastmod>2026-03-21T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/posts/2026-03-22-Daily-Vulns/</loc>
<lastmod>2026-03-22T00:00:00+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/categories/</loc>
<lastmod>2026-03-22T05:15:52+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/tags/</loc>
<lastmod>2026-03-22T05:15:52+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/archives/</loc>
<lastmod>2026-03-22T05:15:52+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/about/</loc>
<lastmod>2026-03-22T05:15:52+01:00</lastmod>
</url>
<url>
<loc>https://ictsec.pl/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/appsflyer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cryptostealing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/javascript/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apparmor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vulnerabilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/privilege-escalation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberattack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bahrain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hospital/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/research/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/open-source/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/secrets/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scanner/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gitleaks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vpn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybersecurity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cisco/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortinet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-0072/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/memory-tagging-extension/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/arm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vulnerability/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operation-sindoor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacktivism/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-warfare/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/israel-gaza-conflict/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/asyncrat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rust/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/silverrat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/source-code/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/leaked/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-access-trojan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-threat-actor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aivd/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mivd/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vulns/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dnb/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dragonforce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/earth-lamia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-actor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/payroll-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seo-poisoning/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hackers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/service-outage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mathworks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/silent-werewolf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-organizations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/moldovan-organizations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-intelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/espionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nato/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukraine/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/craft-cms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-32432/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt41/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-threat-intelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nhs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pakistan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ptcl/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bitter-apt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/entra/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/b2b/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/guest-threat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsoft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/access-control/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/android/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/banking-trojan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zanubis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybercrime/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/social-engineering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/phishing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/criminal-transactions/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/solana/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pypi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-incident/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/healthcare/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lummac2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/domain-seizure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/doj/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fbi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cisa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infostealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/interlock/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xss/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/typeerror/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/safari/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-research/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-threat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/access-broker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/credential-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trickbot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/python/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/npm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/linux/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/putty/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ssh/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-20298/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/svd-2025-0602/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/high/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/splunk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rubygems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/telegram/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/core-dumps/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qualcomm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adreno-gpu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-patches/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-34027/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/versa-concerto/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sd-wan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sase/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/online-scams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crocodilus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/human-trust/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto-mining/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/devops/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jinx-0132/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vendor-email-compromise/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/employee-engagement/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trust/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/india/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-breaches/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intel-471/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/coinbase/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wordpress/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chaos-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-analysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/geopolitics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-operations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/disinformation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infoblox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netmri/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/roundcube/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/webmail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-49113/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ddos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/stormwall/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/attack-statistics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ta397/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/voice-phishing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-extortion/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sakura-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sophos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xworm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spyware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-alert/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/eset/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bladedfeline/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt-group/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/telecom/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/u-s/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloudflare/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pathwiper/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wiper-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/critical-infrastructure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cisco-talos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-actors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ip-addresses/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proxy-services/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chrome/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-leak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-vulnerability/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lizard-squad/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gaming/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/playstation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mirai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2024-3721/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dvr/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/botnet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blitz/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/game-cheats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hugging-face/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cryptocurrency/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-affiliated/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/veletrix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vshell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/china/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/badbox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iot-devices/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malware-analysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/resecurity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kimsuky/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/danabot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/memory-leak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zscaler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fin6/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/china-nexus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberespionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghostvendors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fraudulent-domains/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/advertising-scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/united-natural-foods/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wholesale-distributor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/api-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/imessage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zero-click/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apple/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/insyde/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uefi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nvram/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-certificate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-espionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/stealth-falcon/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-33053/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/check-point-research/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apache/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tomcat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/brute-force/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-42989/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sap-netweaver/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cameras/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/flaw/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-5058/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-4603/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/emagicone/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/woocommerce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fsb/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/news/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-operations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spearphishing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/financial-gain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/strategic-disruption/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/account-takeover/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pentesting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/teamfiltration/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aitm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsoft-365/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-accounts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-33073/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ntlm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/salesforce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zero-day/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/appomni/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/deepseek/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/deerstealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/copilot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fog-ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pentesting-tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/discord/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/github/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/praetorian/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ios/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/journalism/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citizen-lab/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ecommerce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-threats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adtech/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-javascript/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jsfiretruck/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/obfuscation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/packet-capture/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ipv4/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ipv6/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/network-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smartattack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smartwatches/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-week/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/utility-services/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/simplehelp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sweden/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tokenbreak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/text-classification/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hidden-layer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/acer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-5491/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-code/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/anubis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/paraguay/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyfirma/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/industry-report/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/water-curse/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trend-micro/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clickfix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/german-speaking-users/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mcp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kali-linux/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ethical-hacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/car-hacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ai-tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scattered-spider/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/insurance/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-crime/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tenable/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nessus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vulnerability-scanner/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-flaw/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mac-cloud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/user-info/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/washington-post/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/email-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-3248/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/langflow/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/flodrix-botnet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-privacy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smart-home/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/minecraft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/golangghost/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chollima/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fault-injection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qilin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/app-specific-passwords/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/banana-squad/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/open-source/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-users/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/privacy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/academics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cobalt-strike/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/powershell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exploitation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aflac/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/prometei/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unit-42/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bluenoroff/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt36/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/indian-defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/androxgh0st/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/c2-logger/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iran/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-threats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/network/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/technology/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/connectwise/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/meshtastic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-52464/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cryptography/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hive0154/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mustang-panda/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tibetan-community/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pubload/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trojan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/app-store/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-play/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aviatrix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-mandiant/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/north-korea/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-packages/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/telecommunications/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mining/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/financial-sector/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/africa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citrix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt28/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/signal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mcp-server/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sql-injection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/offensive-cyber/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blind-eagle/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt-c-36/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/darktrace/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/realtek/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bluetooth/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/moveit-transfer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scanning/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-activity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ise/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-1533/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-3464/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/driver-exploitation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netskope/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sainbox-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hidden-rootkit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zeek/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/logs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dns/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/giftedcrook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-exfiltration/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gogs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2024-56731/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/odyssey-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/poseidon-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/glasgow/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/incident/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/breachforums/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/arrests/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shinyhunters/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mitsubishi-electric/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trendmakers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hawaiian-airlines/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pla/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberspace/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trustwave/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spiderlabs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proton66/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybercriminal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/romcom/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/transferloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/it-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sinaloa-drug-cartel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybersnoop/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fbi-informants/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dark-web/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ide/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ox-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsens/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/investment-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ivanti-cloud-service-appliance/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zero-days/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/anssi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nato-summit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/international-criminal-court/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/internet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/okta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dprk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-workers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/catwatchful/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jdwp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gamaredon/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qwizzserial/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sms-stealers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/android-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qantas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/marketplace-scams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nimdoor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web3/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/inno-setup/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/information-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sudo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-5777/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citrixnetscaler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/memorydisclosure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsoft-exchange/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/military/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tech-sectors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-espionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/boss-linux/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ingram-micro/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/safepay/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chrome-extensions/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/http-data-leaks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-5349/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-6543/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bert/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/securelist/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citrixbleed/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netscaler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/monero/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xmrig/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cryptojacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infostealers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shellter/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-harvester/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/norddragonscan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/anatsa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-fabric/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tapjacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/donot-apt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gold-melody/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tgr-cri-0045/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-software/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vc-code/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iranian-cyber-warfare/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pay2key/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/edge/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/extensions/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/servicenow/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-inference/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/varonis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/llm-clients/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-6514/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/greynoise/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scraper-botnet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/taiwan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/perfektblue/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-scraping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/browser-extensions/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rockerbox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tax-firm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-exposure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/amd/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cpu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/asus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adobe/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smart-contracts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/patch/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/c2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rendershock/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zero-click-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/file-rendering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/enterprise-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/domaintools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-47812/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wing-ftp-server/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-code-execution/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/macos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zuru/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/khepri/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/termius/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gao/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infrastructure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/information-sharing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortiweb/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/octalyn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/forensic-tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rdp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/forensics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nvidia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rowhammer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-advisory/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/government/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/southeast-asia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-services/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hexeval/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xorindex/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/api/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/louis-vuitton/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/south-korea/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/turkey/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-gemini/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/interlock-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/attack-campaign/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ss7/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bypass/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/esim/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-report/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mobile/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/evasion-techniques/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fast-flux/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/svg/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/protestware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-language/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukrainian-hackers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-military/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zyxel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/matanbuchus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsoft-teams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/morphisec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pro-russian/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/noname057-16/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/europol/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/international-operation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/h2miner/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lcrypt0rx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sonicwall/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/overstep/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/semiconductor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-hacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/air-serbia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aviation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/afghanistan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mi6/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/retail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/counterfeit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-48927/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exchange-servers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt-campaign/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/maas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/emmenhtal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/amadey/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukrainian-threats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mobile-forensics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-law-enforcement/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nvidiascape/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-23266/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/container-toolkit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cryptominer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/linuxsys/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-hunting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-tag-manager/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lamehug/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cert-ua/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-20337/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crux/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/allakore-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/systembc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberspies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ivanti/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ncsc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/extortion/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mois/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dchspy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-54068/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/laravel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/livewire/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/muddywater/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sharepoint/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scammers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/solar-farms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/url-spoofing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lumma-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/applescript/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/akamai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/coyote/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ui-automation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/def-con/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/etq-reliance/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/acreed/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/middle-east/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/post-smtp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-24000/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tridium/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/niagara-framework/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dropping-elephant/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/turkish-defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gunra/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dls/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/asec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/conti/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hafnium/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xu-zewei/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/arrest/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aerospace/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ports/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/maritime-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pdf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/surveillance-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/keyloggers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/telnet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chaos-raas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/talos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vapt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mobile-apps/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mfa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fintech/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/toolshell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/raven-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fake-currency/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vmware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/esxi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/f5/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fire-ant/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vcenter/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/formula-1/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/grand-prix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vietnam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unc3886/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aeroflot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-40596/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-40597/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-40598/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/europe/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/generative-ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/llms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-31324/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/offshore-banking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seychelles/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/financial-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/deepfakes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/social-media/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/finfluencer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gold-blade/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/redloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto-apps/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2023-2533/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/papercut/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aem-forms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/struts2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/0-days/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/banking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hosting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qwins-ltd/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/online-gaming/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/atm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/indian-railways/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/storm-2603/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/check-point/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dahua/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/camera/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/it-workers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/global-economy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/diplomats/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/secret-blizzard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oauth/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/huntress/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/reverse-engineering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-package/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cursor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nestjs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sandbox-escape/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chatgpt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/search-engines/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/osint/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/network-traffic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pxa-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/legalpwn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/genai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mozilla/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/firefox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/addons/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-crawling/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/group-ib/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crm-hack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cursor-ide/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bumblebee/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/akira/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/irgc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/israel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/brazil/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/makop/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/incident-response/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/everest-forms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/klm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customer-data/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/owasp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/edr/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nuclear-submarine/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ta569/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/socgholish/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/court-system/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/facial-recognition/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/big-brother-watch/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/extradition/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/profero/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citrix-netscaler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/winrar/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ps1bot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malvertising/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/patch-tuesday/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-updates/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/georgia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/moldova/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/earth-baxia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oil-gas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nfc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/speed-cameras/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netherlands/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/colt-technology-services/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/warlock-ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-infrastructure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/encrypthub/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/brave/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-crime/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-26633/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-52970/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/identity-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ransomexx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghost-tapping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-hosting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-threat-actor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vietnam-universities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chrome-extension/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apache-activemq/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/legal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/noodlophile-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/workhorse-software/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/password-managers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clickjacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/quirkyloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qr-codes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/orange/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sim-swapping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sentencing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/saas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vps/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apcs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/criminal-background-checks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/interpol/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/telegram-bot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/australia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/university-of-melbourne/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wi-fi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cctv/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/student-protests/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/credential-harvesting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/screenconnect/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/docker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zimperium/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nissan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/assault/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/prison/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/witness/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberattacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/critical-sectors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bruteforceai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/penetration-testing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/church-of-england/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/abuse-victims/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/compensation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/espn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mitigation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/international-coalition/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-40779/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kea-dhcp-server/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dutch-police/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/veriftools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/censys/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/transunion/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-customers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/whatsapp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/next-js/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/authorization/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/valleyrat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-drivers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/salesloft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/azure-ad/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/credentials/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/application-configuration/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/c-level/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/onedrive/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-detection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukrainian-network/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fdn3/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/brute-force-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ssl-vpn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rdp-devices/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iranian-hackers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/embassy-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rapperbot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/notdoor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/outlook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-rewards/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zero-day/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sitecore/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-servers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/noisybear/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zip-files/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lapsus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hikvision/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hikcentral/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/drift/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/icloud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/backdoor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt37/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/czech-republic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghostaction/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lazarus-group/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/job-interviews/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/salt-typhoon/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unc4841/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kazakhstan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/energy-sector/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/noisy-bear/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seqrite-labs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-defender/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-54918/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lockergoga/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/megacortex/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nefilim/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trendmicro/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trade-talks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fancy-bear/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gonepostal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microsoft-outlook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-advisories/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rockwell-automation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-environments/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/enterprise/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/creditors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacker-group/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shiny-hunters/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/delmia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infosec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hybridpetya/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/secure-boot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybersecurity-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/samsung/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/military-ids/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/code-signing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/appsuite-pdf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pdf-editor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/baoloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dnv/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/steganoamor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gucci/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/balenciaga/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/alexander-mcqueen/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ibm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qradar/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/yurei/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/u-s-china-relations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ta415/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-43300/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-update/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-china-relations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customer-records/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/raccoono365/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/north-korean/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/beavertail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/invisibleferret/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-chrome/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-10585/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mac/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/github-pages/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/radware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/turla/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/law-enforcement/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/stellantis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jaguar-land-rover/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/heathrow-airport/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cisos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/third-party-vulnerabilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/entra-id/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hijacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/edr-freeze/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-wer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-software/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/antivirus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nimbus-manticore/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/l1tf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exploit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cpu-vulnerabilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/llm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/email/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gmail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/internet-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-26399/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/solarwinds/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hotfix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/u-s-secret-service/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/communications/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/new-york/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/covert-operations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/akvorado/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/network-flows/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ipfix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sflow/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kafka/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/geoserver/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/coldriver/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-20352/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/transport-for-london/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-51591/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aws/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iam-credentials/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rayinitiator/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/line-viper/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oyster-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/airport/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nca/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-attribution/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-cyberspies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rednovember/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cvss/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/goanywhere/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortra/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/deceptivedevelopment/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/manufacturing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/akira-ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2024-40766/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aslr-bypass/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cisco-asa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/naikon/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/plugx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/romance-scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sextortion/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/comcast/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-security-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/analysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/toolkit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gemini/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/prompt-injection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/net-star/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/phantom-taurus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/broadcom/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-41244/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/laundering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/charming-kitten/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/irgc-io/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/counterintelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/eu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/enisa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/red-hat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-incident/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crimson-collective/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oracle/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cometjacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/perplexity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-27915/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zimbra/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wiretap-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sgx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/booz-allen-hamilton/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/prc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-strategy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unityvsa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-36604/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trinity-of-chaos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-landscape/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/redis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-49844/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/computer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/openai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/surveillance/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/corporate-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/y2k38/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/london/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/children-s-data/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/metropolitan-police/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/database-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/teams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-leak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dfir/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/velociraptor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lockbit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/babuk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/browsers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-backup/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gxc-team/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sim-swap-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fraud-prevention/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/e-business-suite/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-61884/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/french-police/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rondodox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/energy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/microgrids/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/education/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ta585/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pixnapping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/confidential-computing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/texas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/electric-cooperatives/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/incidents/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cots/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/satellites/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spychain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-threat-group/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jewelbug/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/elasticsearch/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/big-ip/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/patches/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-24990/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-59230/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-47827/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/2fa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/whisper/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netcorecloud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blockchain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/etherhiding/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/senate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cambodian-executive/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto-scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bitcoin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/collins-aerospace/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/everest-ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/airport-chaos/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/e-commerce/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nsa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/national-time-center/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-brokers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/doxing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sim-farm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fake-accounts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/linux-pam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-8941/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/privilege-escalation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/watchguard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/isaca/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/survey/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-spies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortune-500/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-server/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uk-mod/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lynx-group/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/military-bases/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oracle-e-business-suite/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ssrf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/partnerships/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/citrix-exploit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/european-telecom/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pwn2own/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/infosecurity-magazine/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tp-link/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/omada/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-threat-actors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-53770/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uk-economy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-62518/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rust-library/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-access/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/segmentation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rapid-response/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adversary-tradecraft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/detection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/timestomping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bind-9/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cache-poisoning/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-40778/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dublin-airport/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hacking-team/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/caller-id-spoofing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ransomhub/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proxies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bidi-swap/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clearview-ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/eu-data-fines/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gdpr/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/noyb/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/at-t/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/germany/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghostcall/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghosthire/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/schneider-electric/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vertikal-systems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/delmia-apriso/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloaking-attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/russian-cyber-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sandworm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukrainian-targets/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chromium/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/browser-crash/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adaptixc2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/zdi-can-25373/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/diplomatic-entities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jabber-zeus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mricq/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/u-s-custody/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2023-20198/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/graphics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/myanmar/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mafia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crime/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/claude-ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exfiltration/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/indirect-prompt-injection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ssh-tor-backdoor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/defense-sector/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rmm-tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cargo-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/memento-labs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/silent-lynx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/alphv/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blackcat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/autofill/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/eurojust/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/impersonation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spoofing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hyper-v/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-flaws/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/industrial-systems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/curly-comrades/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-10/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/plugin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/securityweek/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gpt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/0-click-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/comparitech/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/manufacturers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/transportation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/glassworm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gootloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hotel-systems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/whisper-leak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/knownsec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/paragon-graphite/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nuget/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/databases/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-12480/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/triofox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unauthenticated-access/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/facebook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-21042/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lighthouse/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/0-day/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/webshell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/siem/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-operations-center/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clop-ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/identity-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/siemens/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/finger-protocol/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clickfix-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/windows-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/it-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/legal-proceedings/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/roningloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/signed-drivers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/xwiki/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dragon-breath/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gh0st-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt-q-27/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unc1549/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/global-cyber-defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-transformation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt42/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/heist/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sazmining/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/meta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bug-bounty/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proxy-tool/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tuoni-c2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/real-estate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ray-clusters/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/active-directory/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trusts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/authentication/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-11001/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/7-zip/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digitstealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/information-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/routers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt24/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/amazon-s3/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gainsight/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crowdstrike/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/insider-threat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/azure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt35/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iberia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customer-data-exposure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-64756/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/glob/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cox-enterprises/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oracle-ebs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cl0p/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fin11/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sha1-hulud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/android-tv/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/krebs-on-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kawaiigpt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/black-hat-ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/passwords/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/api-keys/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/emergency-notification/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kyrgyzstan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uzbekistan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netsupport-rat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bloody-wolf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/icalendar/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/domains/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/antigravity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/app-development/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto-laundering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2021-26829/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/openplc-scadabr/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/npm-packages/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fake-shopping-sites/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-monday/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/online-safety/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-61260/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/codex/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/command-injection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese-technology/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/steganography/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apt-operations/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vs-code/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/developer-tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/police/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/coupang/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proxy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ipcola/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyrpto/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blackhatworld/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/datacenter/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/identity-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lazarus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-work/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/defi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ethereum/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aisuru-botnet/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-8489/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/king-addons/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/administrative-privilege/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lnk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bybit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hackread/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/corporate-espionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/it-workers-scheme/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intellexa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/predator/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/warp-panda/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/globalprotect/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/barts-health-nhs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-researchers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/portugal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-military/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seo-manipulation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/search-rankings/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/react2shell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-55182/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/js-smuggler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/poland/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukrainians/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/national-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/volkswagen/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/himachal-pradesh/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rootkits/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hamas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ashen-lepus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ashtag/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/stanford-university/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/msps/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/training/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nanoremote/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/finaldraft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/react/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vaping/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybernews/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/atlassian/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/apache-tika/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-66516/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cato-networks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/attacker-mindset/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/etay-mayor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/askul/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dark-web-report/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pornhub/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mixpanel/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bluedelta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ukr-net/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shadypanda/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/browser-takeover/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qualys-trurisk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uat-9686/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/account-hijacking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ghostpairing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/competition/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chainalysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crypto-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/asp-net/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/brickstorm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/encryption/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/denmark/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-atlas/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kaspersky/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kimwolf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/blindeagle/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/government-agencies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/powershell-scripts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/firebox/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyberweapons/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/state-linked-spying/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/leak/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/new-zealand/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nordvpn/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ip-kvm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-vulnerabilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/firmware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/consumer-devices/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/metadata/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customer-service/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-61939/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-64305/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-66620/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/information-technology/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/patch-management/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/automation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/continuous-improvement/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-64496/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/open-webui/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ai-connections/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hospitality/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ledger/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/global-e/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/black-cat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kenwood/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dnr1007xr/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/automotive/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vulnerability-research/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/d-link/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gobruteforcer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/uat-7290/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/linux-malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-10492/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-20029/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/software/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/macsync/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/black-axe/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/instagram/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/osticket/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/alpitronic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hyc50/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hardware-teardown/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/violence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iraq/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/criminal-network/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortisiem/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/castleloader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/electrum/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kamacite/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/industrial-control-systems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cloud-native/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/update/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pluggyape/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/void-blizzard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/redvds/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/landlock/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/detection-engineering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aveva/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/process-optimization/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ics-cert/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/codebuild/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/paypal/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/invoice-fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/geopolitical/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/us-government/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fast-pair/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-10327/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rpi-jukebox-rfid/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remote-command-execution/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supreme-court/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/protests/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/media/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/credential-cracker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mandiant/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/net-ntlmv1/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/employee-paychecks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/evelyn-stealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/visual-studio-code/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pdfsider/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sev-snp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hardware-flaw/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/black-basta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vigi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2023-48861/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dll-sideloading/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/codesys/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ai-generated/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lolbins/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malwarebytes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/training-applications/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lastpass/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/endpoint-protection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adlice-software/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pccomponentes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/olympics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-0975/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/delta-electronics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/diaview/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/foxit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/epic-games-store/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/meddreams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/konni/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-22200/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/php-filters/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/evmapa/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ics-cert-advisories/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sso/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-affairs/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/under-armour/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nike/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/power-grid/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bitlocker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/1password/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/phishing-protection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/user-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/internet-safety/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cellebrite/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jordan/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/civil-society/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/human-rights/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gogitter/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gitshellpad/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/goshell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threatlabz/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tiktok/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/freecash/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-trade/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/china-aligned-threat-groups/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/panera-bread/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-22709/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vm2/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/node-js/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/romance-scams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/grist-core/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pyodide/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/anomaly/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/example-com/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-help-desk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ta584/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proofpoint/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intrusion-detection/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/goto-resolve/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-21962/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/weblogic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exploit-attempt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/admin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ramp/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/seizure/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/moltbot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clawdbot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/proxy-network/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ipidea/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/france/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/national-employment-agency/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cnil/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/empire-market/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/guilty-plea/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/criminal-charges/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trade-secrets/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/economic-espionage/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/vishing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/post-exploitation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/framework/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/moltbook/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/location-tracking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/clawhub/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/router/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/buffer-overflow/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-10666/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cybozu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mutagen/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/notepad/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/openclaw/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/att/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customers/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/synectix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/elecom/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/wireless/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/decentralized-finance/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mitsubishi/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/freqship-mini/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2025-10314/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/water-utilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ot-attacks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/supply-chain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/geofencing/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-21509/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bulletproof-hosting/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious-activity/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/paris/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/child-abuse/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/investigation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/x/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/non-human-identities/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/software-development/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-research/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/italy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/winter-olympics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dknife/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-actors/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ministry-of-science/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/global/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/unit42/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tgr-sta-1030/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nginx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web-traffic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/web/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/git/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/bridgepay/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/payment-systems/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/doge/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/social-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/university/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/la-sapienza/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/localgpt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/construction/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/beyondtrust/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/european-commission/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mobile-device-management/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/security-breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gnu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/c-compiler/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fosdem/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rtf/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/urls/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/singapore/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operation-cyber-guardian/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/snapchat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/irc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pride-month/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/conduent/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/volvo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/third-party/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/employee-monitoring/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/recruitment/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/warlock/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/court/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/threat-intelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/direct-deposit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/i2p/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/airleader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cve-2026-1358/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lummastealer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/socialengineering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/odido/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/customer-safety/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/age-verification/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/icedid/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operationmacromaze/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trezor/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/opensea/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/eurail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/netgate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pfsense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/davaindia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pharmacy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/beta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ge/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/enervista/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/metamask/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/keenadu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/botnets/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/stealc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oura/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/youx/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/chinese/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/voip/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smb/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/asia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pig-butchering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/job-scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/google-forms/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/smartermail/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/emulation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/modbus/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iiot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/researcher/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/innovation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/indonesia/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cortex/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lawsuit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/welker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/patent/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trump-administration/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/national-strategy/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-skimmer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/personal-information/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kill-chain/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fortigate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/intrusion/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/nestersoft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/luxury-hotels/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trans-rights/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cornwall/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jpeg/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iphone/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/byovd/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/human-trafficking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/dependabot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/go/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/programming/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iptv/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mobile-banking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/online-harassment/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/behavioral-science/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-investigation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/anthropic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/claude/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/model-distillation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/podcast/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operation-red-card/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/kali/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/gui/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/robotics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/it-help-desk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sanctions/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/exploit-broker/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/u-s-government/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ailm/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/forensic/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/soc/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cyber-defense/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/juniper/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/five-eyes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ufp-technologies/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/air-gapped/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jpcert/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jsac2026/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/quantum/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/https/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pentagon/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/tech-support/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/operation-epic-fury/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/military-strikes/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/malicious/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/redalert/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/rocket/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/alerts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/user/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/information/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/coruna/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iso/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/iec/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/management/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/standard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-analysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/data-breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/firewall/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/trendai/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lexisnexis/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/delta/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/electronics/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/advisory/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/cncsoft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/breaches/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/risk/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/leakbase/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/social-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/avideo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/streaming/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/pingora/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-arts/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ericsson/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/identity-theft/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/elecq/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/quiz/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/notifications/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/browser/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/jwt/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/mckinsey/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/sednit/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/honeywell/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/lantronix/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/epstein/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/acrobat/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/reader/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/oceania/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/hewlett-packard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/aruba/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/berlin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/women/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/digital-repression/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/loblaw/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/canada/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/betterleaks/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/opensource/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/secretscanner/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/corporate/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/fake-scams/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shipment-tracking/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/qihoo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ssl/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/private-key/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/festo/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/katana/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/crawling/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/spidering/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/polyglot/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/files/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/scadapack/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/remoteconnect/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/ubuntu/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/root-access/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/commands/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/com/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/instrumentation/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/shieldguard/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/adminer/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/phpmyadmin/</loc>
</url>
<url>
<loc>https://ictsec.pl/tags/beast/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cybersecurity/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/security/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/research/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/tools/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/apt/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/malware/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/news/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/health/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/privacy/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/vulns/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/arrest/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/vulnerability/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/vulnerabilities/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/mobile-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/mobile/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/ddos/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/threat-research/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cyber-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/mobile-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/attack/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/network/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/data-breach/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/data-breaches/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/policy/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/tips/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/vulnerability-advisory/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cybercrime/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/malware-analysis/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/crime/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/hacktivism/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/mobile-banking/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/infrastructure/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/information-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/technology/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/phishing/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cyber-crime/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/threat-intelligence/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cyber-security-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/ransomware/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/breachforums/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/crypto-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/legal/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/ai/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/security-news/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cyberattack/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/automotive/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/scam-alerts/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/scam/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/ics-cert-advisories/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/breaches/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/justice/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/vulnerability-report/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/cryptocurrency/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/fraud/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/podcast/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/forensics/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/military/</loc>
</url>
<url>
<loc>https://ictsec.pl/categories/data-security/</loc>
</url>
<url>
<loc>https://ictsec.pl/page2/</loc>
</url>
<url>
<loc>https://ictsec.pl/page3/</loc>
</url>
<url>
<loc>https://ictsec.pl/page4/</loc>
</url>
<url>
<loc>https://ictsec.pl/page5/</loc>
</url>
<url>
<loc>https://ictsec.pl/page6/</loc>
</url>
<url>
<loc>https://ictsec.pl/page7/</loc>
</url>
<url>
<loc>https://ictsec.pl/page8/</loc>
</url>
<url>
<loc>https://ictsec.pl/page9/</loc>
</url>
<url>
<loc>https://ictsec.pl/page10/</loc>
</url>
<url>
<loc>https://ictsec.pl/page11/</loc>
</url>
<url>
<loc>https://ictsec.pl/page12/</loc>
</url>
<url>
<loc>https://ictsec.pl/page13/</loc>
</url>
<url>
<loc>https://ictsec.pl/page14/</loc>
</url>
<url>
<loc>https://ictsec.pl/page15/</loc>
</url>
<url>
<loc>https://ictsec.pl/page16/</loc>
</url>
<url>
<loc>https://ictsec.pl/page17/</loc>
</url>
<url>
<loc>https://ictsec.pl/page18/</loc>
</url>
<url>
<loc>https://ictsec.pl/page19/</loc>
</url>
<url>
<loc>https://ictsec.pl/page20/</loc>
</url>
<url>
<loc>https://ictsec.pl/page21/</loc>
</url>
<url>
<loc>https://ictsec.pl/page22/</loc>
</url>
<url>
<loc>https://ictsec.pl/page23/</loc>
</url>
<url>
<loc>https://ictsec.pl/page24/</loc>
</url>
<url>
<loc>https://ictsec.pl/page25/</loc>
</url>
<url>
<loc>https://ictsec.pl/page26/</loc>
</url>
<url>
<loc>https://ictsec.pl/page27/</loc>
</url>
<url>
<loc>https://ictsec.pl/page28/</loc>
</url>
<url>
<loc>https://ictsec.pl/page29/</loc>
</url>
<url>
<loc>https://ictsec.pl/page30/</loc>
</url>
<url>
<loc>https://ictsec.pl/page31/</loc>
</url>
<url>
<loc>https://ictsec.pl/page32/</loc>
</url>
<url>
<loc>https://ictsec.pl/page33/</loc>
</url>
<url>
<loc>https://ictsec.pl/page34/</loc>
</url>
<url>
<loc>https://ictsec.pl/page35/</loc>
</url>
<url>
<loc>https://ictsec.pl/page36/</loc>
</url>
<url>
<loc>https://ictsec.pl/page37/</loc>
</url>
<url>
<loc>https://ictsec.pl/page38/</loc>
</url>
<url>
<loc>https://ictsec.pl/page39/</loc>
</url>
<url>
<loc>https://ictsec.pl/page40/</loc>
</url>
<url>
<loc>https://ictsec.pl/page41/</loc>
</url>
<url>
<loc>https://ictsec.pl/page42/</loc>
</url>
<url>
<loc>https://ictsec.pl/page43/</loc>
</url>
<url>
<loc>https://ictsec.pl/page44/</loc>
</url>
<url>
<loc>https://ictsec.pl/page45/</loc>
</url>
<url>
<loc>https://ictsec.pl/page46/</loc>
</url>
<url>
<loc>https://ictsec.pl/page47/</loc>
</url>
<url>
<loc>https://ictsec.pl/page48/</loc>
</url>
<url>
<loc>https://ictsec.pl/page49/</loc>
</url>
<url>
<loc>https://ictsec.pl/page50/</loc>
</url>
<url>
<loc>https://ictsec.pl/page51/</loc>
</url>
<url>
<loc>https://ictsec.pl/page52/</loc>
</url>
<url>
<loc>https://ictsec.pl/page53/</loc>
</url>
<url>
<loc>https://ictsec.pl/page54/</loc>
</url>
<url>
<loc>https://ictsec.pl/page55/</loc>
</url>
<url>
<loc>https://ictsec.pl/page56/</loc>
</url>
<url>
<loc>https://ictsec.pl/page57/</loc>
</url>
<url>
<loc>https://ictsec.pl/page58/</loc>
</url>
<url>
<loc>https://ictsec.pl/page59/</loc>
</url>
<url>
<loc>https://ictsec.pl/page60/</loc>
</url>
<url>
<loc>https://ictsec.pl/page61/</loc>
</url>
<url>
<loc>https://ictsec.pl/page62/</loc>
</url>
<url>
<loc>https://ictsec.pl/page63/</loc>
</url>
<url>
<loc>https://ictsec.pl/page64/</loc>
</url>
<url>
<loc>https://ictsec.pl/page65/</loc>
</url>
<url>
<loc>https://ictsec.pl/page66/</loc>
</url>
<url>
<loc>https://ictsec.pl/page67/</loc>
</url>
<url>
<loc>https://ictsec.pl/page68/</loc>
</url>
</urlset>
