<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.isecurify.co/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/remote-staffing/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/unified-siem-and-xdr/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/vciso/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/security-testing-service/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/security-awareness/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/managed-threat-detection-and-response/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/pci-dss-certification/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/iso27001-certification/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/soc-2-certification/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hipaa-assessment/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gdpr-assessment/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/why-isecurify/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/blogs/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/case-studies/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/faqs/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/partner-with-us/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/contact-us/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/schedule-a-call/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/compliance/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/test/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/vivamus-quis-sem-suscipit/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/how-a-vciso-can-help-achieve-compliance-with-regulatory-requirements/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/pricing-and-plan/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/role-of-float-pools-in-healthcare-staffing/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/tackling-staff-shortages-with-on-demand-healthcare-staffing/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/top-5-tips-for-telecommunication-staffing/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/how-unified-siem-and-xdr-enhance-threat-detection-and-response/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/the-role-of-unified-siem-and-xdr-in-compliance-and-risk-management/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/understanding-unified-siem-and-xdr-the-future-of-cybersecurity/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/how-vcisos-are-transforming-cybersecurity-for-remote-and-hybrid-work-environments/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/real-life-cyber-attacks-prevented-by-vapt-success-stories-from-the-field/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/the-importance-of-vapt-in-cybersecurity-protecting-your-digital-assets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/vapt-for-small-and-medium-enterprises-smes-why-it-matters-and-how-to-get-started/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/top-challenges-faced-by-vcisos-and-how-to-overcome-them/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/building-a-robust-managed-threat-detection-and-response-strategy/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/the-benefits-of-managed-threat-detection-and-response/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/an-introduction-to-managed-threat-detection-and-response/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/pci-dss-compliance-for-the-retail-industry-staying-ahead-in-the-era-of-digital-transactions/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/understanding-pci-dss-compliance-essential-for-protecting-payment-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/praesent-erat-ex/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/iso-27001-compliance-in-the-finance-industry-safeguarding-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/soc-2-compliance-in-the-technology-industry-ensuring-trust-and-security/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hipaa-compliance-in-the-healthcare-industry-ensuring-patient-privacy-in-a-digital-world/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hipaa-compliance-protecting-health-information/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gdpr-compliance-in-the-e-commerce-industry-protecting-customer-data-in-the-digital-age/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gdpr-compliance-protecting-personal-data-in-the-eu/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-releases-windows-10-kb5078885-extended-security-update/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-to-enable-windows-hotpatch-security-updates-by-default/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-releases-new-defender-update-for-windows-11-10-server-iso-installations/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/paint-maker-giant-akzonobel-confirms-cyberattack-on-u-s-site/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemini-panel/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ransomware-payment-rate-drops-to-record-low-as-attacks-surge/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-warns-developers-of-fake-next-js-job-repos-delivering-in-memory-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-cisco-sd-wan-0-day-vulnerability-exploited-since-2023-to-gain-root-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hacker-jailbreaks-claude-ai-to-write-exploit-code-and-steal-government-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-leverage-deepseek-and-claude-to-attack-fortigate-devices-worldwide/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/65-of-financial-organizations-targeted-by-ransomware-as-cybercriminals-escalate-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-allegedly-selling-whatsapp-crash-exploit-on-hacking-forums/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-mfa-down-504-gateway-timeout-errors-disrupting-mfa-access-for-u-s-users/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/splunk-enterprise-for-windows-vulnerability-let-attackers-hijack-dlls-and-gain-system-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-released-for-windows-notepad-vulnerability-that-enables-malicious-command-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/google-issues-emergency-chrome-security-update-to-address-high-severity-pdfium-and-v8-flaws/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fake-captcha-clickfix-attack-chain-leads-to-enterprise%e2%80%91wide-malware-infection-in-organisations/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-0-day-vulnerability-actively-exploited-by-attackers-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-flags-critical-microsoft-sccm-flaw-as-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-notepad-code-execution-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apple-0-day-vulnerability-actively-exploited-in-sophisticated-attack-to-target-individuals/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-shell-security-feature-0-day-vulnerability-let-attackers-bypass-authentication/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-access-connection-manager-0-day-vulnerability-let-attackers-trigger-dos-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-desktop-services-0-day-vulnerability-exploited-in-the-wild-to-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-office-word-0-day-vulnerability-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-teams-new-option-enables-users-to-flag-malicious-messages/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fancy-bear-hackers-exploiting-microsoft-zero-day-vulnerability-to-deploy-backdoors-and-email-stealers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-patch-tuesday-february-2026-54-vulnerabilities-fixed-including-6-zero-days/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-weekly-newsletter-notepad-hack-office-0-day-esxi-0-day-ransomware-attacks-and-more/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-critical-smartermail-rce-flaw-actively-exploited-in-ransomware-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/f5-patches-critical-vulnerabilities-in-big-ip-nginx-and-related-products/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/betterment-data-breach-exposes-1-4-million-customers-personal-details/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-sonicwall-sslvpn-credentials-to-deploy-edr-killer-and-bypass-security/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-compromise-nginx-servers-to-redirect-user-traffic/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploiting-microsoft-office-0-day-vulnerability-to-deploy-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-stealthy-fileless-linux-malware-shadowhs-emphasizes-automated-propagation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/dynowiper-data-wiping-malware-attacking-energy-companies-to-destroy-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/31-4-tbps-ddos-attack-via-aisuru-botnet-breaks-internet-with-new-world-record/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/beware-of-weaponized-vs-code-extension-named-clawdbot-agent-that-deploys-screenconnect-rat/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-security-update-patches-background-fetch-api-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gemini-mcp-tool-0-day-vulnerability-allows-remote-attackers-to-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-vulnerability-in-vm2-sandbox-library-for-node-js-let-attackers-run-untrusted-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/honeymyte-hacker-group-updates-coolclient-malware-to-deploy-browser-login-data-stealer/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-openssl-vulnerabilities-allow-remote-attackers-to-execute-malicious-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/attackers-exploiting-react2shell-vulnerability-to-attack-it-sectors/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/medusa-security-testing-tool-with-74-scanners-and-180-ai-agent-security-rules/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-teams-functionality-to-steal-credentials-mimicking-microsoft-services/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/konni-hackers-target-blockchain-engineers-with-ai-built-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/smartermail-auth-bypass-flaw-now-exploited-to-hijack-admin-accounts/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-use-rn-typo-trick-to-impersonate-microsoft-and-marriott-in-new-phishing-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-use-genai-to-change-loaded-clean-page-into-malicious-within-seconds/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-unified-communications-0-day-rce-vulnerability-exploited-in-the-wild-to-gain-root-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-multi-stage-windows-malware-disables-microsoft-defender-before-dropping-malicious-payloads/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/tp-link-vulnerability-allows-authentication-bypass-via-password-recovery-feature/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/tesla-hacked-37-zero-days-demoed-at-pwn2own-automotive-2026/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/wordpress-plugin-vulnerability-exposes-100000-sites-to-privilege-escalation-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/voidlink-linux-malware-framework-built-with-ai-assistance-reaches-88000-lines-of-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gitlab-warns-of-high-severity-2fa-bypass-denial-of-service-flaws/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/attackers-abuse-discord-to-deliver-clipboard-hijacker-that-steals-wallet-addresses-on-paste/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apache-brpc-vulnerability-enables-remote-command-injection/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/free-converter-apps-that-convert-your-clean-system-to-infected-in-seconds/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cloudflare-zero-day-vulnerability-enables-any-host-access-bypassing-protections/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-aws-console-supply-chain-attack-allows-hijack-of-aws-github-repositories/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-0-day-rce-secure-email-gateway-vulnerability-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/promptware-kill-chain-five-step-kill-chain-model-for-analyzing-cyberthreats/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/go-1-25-6-and-1-24-12-patch-critical-vulnerabilities-lead-to-dos-and-memory-exhaustion-risks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-sql-server-vulnerability-allows-attackers-to-elevate-privileges-over-a-network/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/palo-alto-networks-firewall-vulnerability-allows-attacker-to-trigger-dos-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-assistance-vulnerability-allow-attacker-to-bypass-security-features/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-desktop-window-manager-0-day-vulnerability-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-node-js-vulnerability-can-cause-server-crashes-via-async_hooks-stack-overflow/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-144-released-with-fix-for-10-vulnerabilities-in-v8-javascript-engine/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/exploit-code-public-for-critical-fortisiem-command-injection-flaw/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-fortisiem-vulnerability-enables-arbitrary-commands-execution-via-crafted-tcp-packets-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-fortisiem-vulnerability-enables-arbitrary-commands-execution-via-crafted-tcp-packets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortisandbox-ssrf-vulnerability-allow-attacker-to-proxy-internal-traffic-via-crafted-http-requests/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/node-js-security-release-patches-7-vulnerabilities-across-all-release-lines/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-patch-tuesday-january-2026-114-vulnerabilities-fixed-including-3-zero-days/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/multiple-hikvision-vulnerabilities-let-attackers-cause-device-malfunction-using-crafted-packets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortios-and-fortiswitchmanager-vulnerability-let-remote-attackers-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/china-linked-hackers-exploit-vmware-esxi-zero-days-to-escape-virtual-machines/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-talos-traces-uat-7290s-linux-malware-campaign-against-telecom-providers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/trend-micro-warns-of-critical-apex-central-rce-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-actively-exploiting-ai-deployments-91000-attack-sessions-observed/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-malware-automatically-send-to-contacts-via-whatsapp-web-attacks-windows-systems/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-retires-10-emergency-cyber-orders-in-rare-bulk-closure/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fake-fortinet-sites-steal-vpn-credentials-in-sophisticated-phishing-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-oauth-based-attack-let-hackers-bypass-microsoft-entra-authentication-flows-to-steal-keys/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/three-malicious-npm-packages-attacking-developers-to-steal-login-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/forcepoint-dlp-vulnerability-enables-memory-manipulation-and-arbitrary-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chinese-hackers-use-nfc-enabled-android-malware-to-steal-payment-information/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/toddycat-malware-compromises-microsoft-exchange-servers-using-proxylogon-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/veeam-patches-critical-rce-vulnerability-with-cvss-9-0-in-backup-replication/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/black-cat-hacker-group-with-fake-notepad-sites-to-install-malware-and-steal-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/n8n-warns-of-cvss-10-0-rce-vulnerability-affecting-self-hosted-and-cloud-versions/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-dolby-codec-vulnerability-exposes-android-devices-to-code-execution-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/two-chrome-extensions-caught-stealing-chatgpt-and-deepseek-chats-from-900000-users/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-n8n-vulnerability-9-9-cvss-lets-authenticated-users-execute-system-commands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-gnu-wget2-vulnerability-let-remote-attackers-to-overwrite-sensitive-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/rondodox-botnet-weaponizing-a-critical-react2shell-vulnerability-to-deploy-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actor-exploited-multiple-fortiweb-appliances-to-deploy-sliver-c2-for-persistent-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gravityrat-steals-whatsapp-backups-and-uses-cpu-temperature-to-detect-sandboxes/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/scattered-lapsus-hunters-resurface-with-new-raas-platform-shinysp1d3r-and-aggressive-insider-recruitment/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-hacked-global-companies-via-leaked-cloud-credentials-from-infostealer-infections/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/stealthy-tuoni-c2-malware-targets-major-u-s-real-estate-firm-with-ai-enhanced-tactics/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/multiple-vulnerabilities-in-qnap-tools-let-attackers-obtain-secret-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-trapped-in-resecuritys-honeypot-during-targeted-attack-on-employee-network/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/infostealers-enable-attackers-to-hijack-legitimate-business-infrastructure-for-malware-hosting/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-abusing-google-tasks-notification-for-sophisticated-phishing-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/neurosploitv2-ai-powered-pentesting-tool-with-claude-gpt-and-gemini-models-to-detect-vulnerabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-spear-phishing-attack-targeting-security-individuals-in-israel-region/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/rondodox-botnet-exploits-react2shell-flaw-to-breach-next-js-servers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/silver-fox-hackers-attacking-indian-entities-with-income-tax-phishing-lures/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-copilot-studios-new-connected-agents-feature-to-gain-backdoor-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-0-day-rce-vulnerability-in-networking-devices-exposes-70000-hosts/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-event-logs-reveal-the-messy-reality-behind-sophisticated-cyberattacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-vulnerabilities-via-kernel-drivers-and-named-pipes-allows-privilege-escalation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mongobleed-detector-tool-released-to-detect-mongodb-vulnerabilitycve-2025-14847/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hacker-threw-macbook-in-river-to-erase-evidence-in-coupang-data-breach/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hacker-claims-to-leak-wired-database-with-2-3-million-records/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/exploited-mongobleed-flaw-leaks-mongodb-secrets-87k-servers-exposed/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/87000-mongodb-instances-vulnerable-to-mongobleed-flaw-exposed-online-poc-exploit-released/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-mongodb-flaw-lets-unauthenticated-attackers-read-uninitialized-memory/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/teamviewer-dex-vulnerabilities-let-attackers-trigger-dos-attack-and-expose-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mongobleed-poc-exploit-tool-released-for-mongodb-flaw-that-exposes-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/china-linked-evasive-panda-poisoned-dns-to-hack-users-in-india-turkiye-and-china/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploiting-three-year-old-fortigate-vulnerability-to-bypass-2fa-on-firewalls/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-advertised-ntkiller-malware-on-dark-web-claiming-terminate-antivirus-and-edr-bypass/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/net-snmp-vulnerability-enables-buffer-overflow-and-the-daemon-to-crash/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/100-cybersecurity-predictions-2026-for-industry-experts-as-the-ai-adapted-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/google-now-allows-users-to-change-their-gmail-com-email-address/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/operation-pcpcat-hacked-59000-next-js-react-servers-within-48-hours/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-hpe-oneview-vulnerability-that-enables-remote-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-use-after-free-vulnerability-in-linux-kernels-posix-cpu-timers-implementation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/romanian-water-authority-hit-by-ransomware-attack-over-weekend/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-brokering-file-system-vulnerability-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-adds-asus-embedded-malicious-code-vulnerability-to-kev-list-following-active-exploitation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-udados-botnet-launches-massive-http-flood-ddos-attacks-targeting-tech-sector/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-apache-commons-text-vulnerability-enables-remote-code-execution-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/watchguard-0-day-vulnerability-exploited-in-the-wild-to-hijack-firewalls/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-vulnerability-in-popular-node-js-library-exposes-windows-systems-to-rce-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-confirms-recent-windows-11-24h2-25h2-and-server-2025-update-breaks-remoteapp-connections/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/bugtrace-ai-based-penetration-testing-tool-to-detect-potential-vulnerabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-adds-fortinet-vulnerability-to-kev-catalog-after-active-exploitation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chinese-hackers-using-custom-shadowpad-iis-listener-module-to-turn-compromised-servers-into-active-nodes/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-security-update-patch-for-critical-vulnerabilities-that-enables-remote-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-ghostpairing-attack-let-attackers-gain-full-access-in-whatsapp-with-phone-number/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/the-hidden-risk-in-virtualization-why-hypervisors-are-a-ransomware-magnet/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/sonicwall-warns-of-new-sma1000-zero-day-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/llms-are-accelerating-the-ransomware-operations-with-functional-tools-and-raas/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-access-connection-manager-vulnerability-enables-arbitrary-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-fortigate-devices-sso-vulnerabilities-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-pgadmin-vulnerability-let-attackers-execute-shell-commands-on-the-host/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-admin-center-vulnerability-cve-2025-64669-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apple-0-day-vulnerabilities-exploited-in-sophisticated-attacks-targeting-iphone-users/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-jsceal-infostealer-malware-attacking-windows-systems-to-steal-login-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/multiple-threat-actors-exploit-react2shell-cve-2025-55182/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mitre-shares-2025s-top-25-most-dangerous-software-weaknesses/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-defender-firewall-service-vulnerability-let-attackers-disclose-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/notepad-vulnerability-let-attackers-hijack-network-traffic-to-install-malware-via-updates/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-infiltrate-vs-code-marketplace-with-19-malicious-extensions-posing-as-png-file/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/adobe-acrobat-reader-vulnerabilities-let-attackers-execute-arbitrary-code-and-bypass-security/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortisandbox-os-command-injection-vulnerability-let-attackers-execute-malicious-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gemini-zero-click-vulnerability-let-attackers-access-gmail-calendar-and-docs/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-powershell-0-day-vulnerability-let-attackers-execute-malicious-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-outlook-vulnerability-let-attackers-execute-malicious-code-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortios-fortiweb-and-fortiproxy-vulnerability-lets-attackers-bypass-forticloud-sso-authentication/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ransomware-targeting-hyper-v-and-vmware-esxi-surges-as-akira-group-exploits-system-vulnerabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-december-2025-patch-tuesday-56-vulnerabilities-fixed-including-3-zero-days/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/burp-suites-scanning-arsenal-powered-with-detection-for-critical-react2shell-vulnerabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-leverage-delivery-receipts-on-whatsapp-and-signal-to-extract-user-private-information/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/next-js-released-a-scanner-to-detect-and-update-apps-impacted-by-react2shell-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/netreaper-offensive-security-toolkit-that-wraps-70-penetration-testing-tools/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/researchers-uncovered-aws-iam-eventual-consistency-to-establish-persistence/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/portugal-updates-cybercrime-law-to-exempt-security-researchers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/avast-antivirus-sandbox-vulnerabilities-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-news-weekly-newsletter-29-7-tbps-ddos-attack-chrome-143-react2shell-vulnerabilities-and-cloudflare-outage/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/kimjongrat-attacking-windows-users-via-weaponized-hta-files-to-steal-logins/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/china-nexus-hackers-actively-exploiting-react2shell-vulnerability-cve-2025-55182-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-scanner-tool-for-detecting-exposed-reactjs-and-next-js-rsc-endpoints-cve-2025-55182/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/lazarus-groups-it-workers-scheme-hacker-group-caught-live-on-camera/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-weaponize-claude-skills-to-execute-medusalocker-ransomware-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-143-released-with-fix-for-13-vulnerabilities-that-enable-arbitrary-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/aisuru-botnet-behind-new-record-breaking-29-7-tbps-ddos-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-android-0-day-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/multiple-django-vulnerabilities-enables-sql-injection-and-denial-of-service-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/charging-cable-that-hacks-your-device-to-record-keystrokes-and-control-wi-fi/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/dead-mans-switch-widespread-npm-supply-chain-attack-driving-malware-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-apache-brpc-framework-vulnerability-let-attackers-crash-the-server/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-allegedly-claim-breach-of-mercedes-benz-usa-legal-and-customer-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/4-3-million-chrome-and-edge-users-hacked-in-7-year-shadypanda-malware-campaign/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-albiriox-malware-attacking-android-users-to-take-complete-control-of-their-device/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/asus-myasus-flaw-lets-hackers-escalate-to-system-level-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/shai-hulud-2-0-compromises-1200-organizations-exposing-critical-runtime-secrets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-ntlm-authentication-flaws-to-target-windows-systems/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hashjack-new-attack-technique-tricks-ai-browsers-using-a-simple/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-etherhiding-attack-uses-web-based-attacks-to-deliver-malware-and-rotate-payloads/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-news-weekly-newsletter-fortinet-chrome-0-day-flaws-cloudflare-outage-and-salesforce-gainsight-breach/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/water-gamayun-hackers-exploit-windows-msc-eviltwin-0-day-to-inject-stealthy-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-unauthenticated-dos-vulnerability-crashes-next-js-servers-with-a-single-request/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/openai-discloses-api-customer-data-breach-via-mixpanel-vendor-hack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-teams-guest-chat-vulnerability-exposes-users-to-malware-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hashicorp-vault-vulnerability-allow-attackers-to-authenticate-to-vault-without-valid-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/canon-allegedly-breached-by-clop-ransomware-via-oracle-e-business-suite-0-day-hack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/kawaiigpt-new-black-hat-ai-tool-used-by-hackers-to-launch-cyberattacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsofts-update-health-tools-configuration-vulnerability-let-attackers-execute-arbitrary-code-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-released-for-w3-total-cache-vulnerability-that-exposes-1-million-websites-to-rce-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apt35-hacker-groups-internal-documents-leak-exposes-their-targets-and-attack-methods/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-replace-m-with-rn-in-microsoft-com-to-steal-users-login-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/wireshark-vulnerabilities-let-attackers-crash-by-injecting-a-malformed-packet/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-oracles-identity-manager-rce-vulnerability-actively-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cl0p-ransomware-strikes-globally-cox-enterprises-hit-9479-users-data-exposed-via-oracle-ebs-zero-day/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-7-zip-vulnerability-with-public-exploit-requires-manual-update/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-confirms-windows-11-24h2-update-broken-multiple-core-features/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-vulnerability-in-azure-bastion-let-attackers-bypass-authentication-and-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/grafana-warns-of-max-severity-admin-spoofing-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-exploit-default-servicenow-ai-assistants-configurations-to-launch-prompt-injection-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/broadcom-allegedly-breached-by-clop-ransomware-via-oracle-e-business-suite-0-day-hack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/sonicos-sslvpn-vulnerability-let-attackers-crash-the-firewall-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/oracle-allegedly-breached-by-clop-ransomware-via-e-business-suite-0-day-hack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-allegedly-selling-microsoft-office-0-day-rce-vulnerability-on-hacking-forums/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-windows-graphics-vulnerability-lets-hackers-seize-control-with-a-single-image/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/unc1549-hackers-with-custom-tools-attacking-aerospace-and-defense-systems-to-steal-logins/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-actively-exploiting-7-zip-rce-vulnerability-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-azure-hit-by-15-tbps-ddos-attack-using-500000-ip-addresses/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/w3-total-cache-command-injection-vulnerability-exposes-1-million-wordpress-sites-to-rce-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ibm-aix-vulnerabilities-let-remote-attacker-execute-arbitrary-commands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-type-confusion-zero-day-vulnerability-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/researchers-detailed-techniques-to-detect-outlook-notdoor-backdoor-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-rce-vulnerabilities-in-ai-inference-engines-exposes-meta-nvidia-and-microsoft-frameworks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-fortinet-fortiweb-waf-vulnerability-exploited-in-the-wild-to-gain-admin-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/taskhound-tool-detects-windows-scheduled-tasks-running-with-elevated-privileges-and-stored-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-catalyst-center-vulnerability-let-attackers-escalate-priveleges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-tool-released-for-fortiweb-waf-vulnerability-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-weaponizing-calendar-files-as-new-attack-vector-bypassing-traditional-email-defenses/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chatgpt-hacked-using-custom-gpts-exploiting-ssrf-vulnerability-to-expose-secrets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-desktop-services-vulnerability-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ivanti-endpoint-manager-vulnerabilities-let-attackers-write-arbitrary-files-to-disk/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-kernel-0%e2%80%91day-vulnerability-actively-exploited-in-the-wild-to-escalate-privilege/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-samsung-mobile-devices-0-day-rce-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-attacking-outlook-and-google-bypassing-traditional-email-defenses/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mad-cat-meow-attack-tool-to-simulate-real-world-data-corruption-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-vulnerability-in-popular-npm-library-exposes-ai-and-nlp-apps-to-remote-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/elastic-defend-for-windows-vulnerability-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackgpt-ai-powered-penetration-testing-platform-includes-gpt-4-and-other-ai-engines/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-news-weekly-newsletter-android-and-cisco-0-day-teams-flaws-hackedgpt-and-whisper-leak/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-attack-active-directory-sites-to-escalate-privileges-and-domain-compromise/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-entra-credentials-in-the-authenticator-app-on-jail-broken-devices-to-be-wiped-out/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-teams-new-chat-with-anyone-feature-exposes-users-to-phishing-and-malware-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-deliver-ssh-tor-backdoor-via-weaponized-military-documents-in-zip-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hydrapwk-penetration-testing-os-with-necessary-hacking-tools-and-simplified-interface/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/list-of-ai-tools-promoted-by-threat-actors-in-underground-forums-and-their-capabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-emergency-update-to-patch-multiple-vulnerabilities-that-enable-remote-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-warns-of-hackers-actively-exploiting-asa-and-ftd-0-day-rce-vulnerability-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-cloud-files-mini-filter-driver-vulnerability-exploited-to-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/clop-ransomware-actors-exploiting-the-latest-0-day-exploits-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/attack-techniques-of-tycoon-2fa-phishing-kit-targeting-microsoft-365-and-gmail-accounts-detailed/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-warns-windows-systems-may-enter-bitlocker-recovery-after-october-2025-updates-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-onedrive-exe-through-dll-sideloading-to-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-warns-windows-systems-may-enter-bitlocker-recovery-after-october-2025-updates/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/weaponized-putty-and-teams-ads-deliver-malware-allowing-hackers-to-access-network/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-rce-vulnerability-in-popular-react-native-npm-package-exposes-developers-to-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-actively-scanning-for-tcp-port-8530-8531-linked-to-wsus-vulnerability-cve-2025-59287/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-android-0-click-vulnerability-in-system-component-allows-remote-code-execution-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-exploit-microsoft-teams-vulnerabilities-to-manipulate-messages-and-alter-notifications/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-patch-for-wsus-vulnerability-has-broken-hotpatching-on-windows-server-2025/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-manipulate-claude-ai-apis-with-indirect-prompts-to-steal-user-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-graphics-vulnerabilities-allow-remote-attackers-to-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-news-weekly-newsletter-ey-data-leak-bind-9-chrome-vulnerability-and-aardvar-chatgpt-agent/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-edr-redir-v2-blinds-windows-defender-on-windows-11-with-fake-program-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-linux-kernel-use-after-free-vulnerability-exploited-in-attacks-to-deploy-ransomware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-high-severity-linux-flaw-now-exploited-by-ransomware-gangs/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-phishing-attack-using-invisible-characters-hidden-in-subject-line-using-mime-encoding/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ubuntus-kernel-vulnerability-let-attackers-escalate-privileges-and-gain-root-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cybersecurity-newsletter-weekly-aws-outage-wsus-exploitation-chrome-flaws-and-rdp-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-edr-redir-tool-breaks-edr-exploiting-bind-filter-and-cloud-filter-driver/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apache-tomcat-security-vulnerabilities-expose-servers-to-remote-code-execution-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-0-day-vulnerability-actively-exploited-in-attacks-by-notorious-hacker-group/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-dell-storage-manager-vulnerabilities-let-attackers-compromise-system/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/infamous-cybercriminal-forum-breachforums-is-back-again-with-a-new-clear-net-domain/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploiting-microsoft-wsus-vulnerability-in-the-wild-2800-instances-exposed-online/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/131-malicious-extensions-targeting-whatsapp-used-found-in-chrome-web-store/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-pdf-tool-to-detect-malicious-pdf-using-pdf-object-hashing-technique/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-abuse-microsoft-365-exchange-direct-send-to-bypass-content-filters-and-harvest-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-hackers-actively-exploiting-windows-server-update-services-rce-vulnerability-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-abuse-asp-net-machine-keys-to-compromise-iis-servers-and-deploy-malicious-modules/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-releases-emergency-patch-for-windows-server-update-service-rce-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-access-microsoft-teams-chat-and-emails-by-retrieving-access-tokens/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/salt-typhoon-using-zero-day-exploits-and-dll-sideloading-techniques-to-attack-organizations/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-weaponizing-oauth-applications-for-persistent-cloud-access-even-after-password-reset/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/multiple-bind-9-dns-vulnerabilities-enable-cache-poisoning-and-denial-of-service-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/azure-apps-vulnerability-lets-hackers-create-malicious-apps-mimicking-microsoft-teams/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-asp-net-vulnerability-allows-attacker-to-bypass-security-feature-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-v8-javascript-engine-vulnerability-let-attackers-execute-remote-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-365-copilot-prompt-injection-vulnerability-allows-attackers-to-exfiltrate-sensitive-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-attacking-remote-desktop-protocol-services-with-30000-new-ip-addresses-daily/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-windows-smb-vulnerability-actively-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-high-severity-windows-smb-flaw-now-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-defenderwrite-tool-let-attackers-inject-malicious-dlls-into-av-executable-folders/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-windows-server-update-services-remote-code-execution-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-linux-pam-vulnerability-allowing-root-privilege-escalation/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-for-7-zip-vulnerabilities-that-allows-remote-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/senate-investigates-cisco-over-zero-day-firewall-vulnerabilities/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-veeam-backup-rce-vulnerabilities-let-attackers-execute-malicious-code-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-ios-and-ios-xe-software-vulnerabilities-let-attackers-execute-remote-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-use-after-free-vulnerability-let-attackers-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-snmp-0-day-vulnerability-actively-exploited-to-deploy-linux-rootkits/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-desktop-client-vulnerability-let-attackers-execute-remote-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-remote-access-connection-manager-0-day-vulnerability-actively-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-october-2025-patch-tuesday-4-zero-days-and-172-vulnerabilities-patched/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-bypass-openai-guardrails-using-a-simple-prompt-injection-technique/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortios-cli-command-bypass-vulnerability-let-attacker-execute-system-commands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-actively-compromising-databases-using-legitimate-commands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-defender-vulnerabilities-allow-attackers-to-bypass-authentication-and-upload-malicious-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apt-hackers-exploit-chatgpt-to-create-sophisticated-malware-and-phishing-emails/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-windows-privilege-escalation-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/openssh-vulnerability-exploited-via-proxycommand-to-execute-remote-code-poc-released/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-security-update-patches-21-vulnerabilities-that-allow-attackers-to-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/google-chrome-rce-vulnerability-details-released-along-with-exploit-code-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/google-chrome-rce-vulnerability-details-released-along-with-exploit-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-trick-users-into-download-weaponized-microsoft-teams-to-gain-remote-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-amcache-evilhunter-tool-for-detecting-malicious-activities-in-windows-systems/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-actively-scanning-to-exploit-palo-alto-networks-pan-os-global-protect-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/lesson-from-cisco-asa-0-day-rce-vulnerability-that-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-linux-sudo-vulnerability-actively-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/openssl-vulnerabilities-let-attackers-execute-malicious-code-and-recover-private-key-remotely/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/notepad-dll-hijacking-vulnerability-let-attackers-execute-malicious-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-use-weaponized-microsoft-teams-installer-to-compromise-systems-with-oyster-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-cisco-firewall-0-day-vulnerabilities-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploiting-wordpress-websites-with-silent-malware-to-gain-admin-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-asa-0-day-rce-vulnerability-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploiting-hikvision-camera-vulnerability-to-access-sensitive-information/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-exploit-werfaultsecure-exe-tool-to-steal-cached-passwords-from-lsass-on-windows-11-24h2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/automaker-giant-stellantis-confirms-data-breach-after-salesforce-hack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-google-chrome-0-day-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/beware-of-fake-online-speedtest-application-with-obfuscated-js-codes/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisco-ios-0-day-rce-vulnerability-actively-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-high-severity-vulnerabilities-let-attackers-access-sensitive-data-and-crash-system/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-leverage-oracle-database-scheduler-to-gain-access-to-corporate-environments/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-11-24h2-update-kb5064081-breaks-video-content-playback/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-type-confusion-0-day-vulnerability-code-analysis-released/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/apple-backports-fix-for-cve-2025-43300-exploited-in-sophisticated-spyware-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/how-a-plaintext-file-on-users-desktops-exposed-secrets-leads-to-akira-ransomware-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/google-patches-chrome-zero-day-cve-2025-10585-as-active-v8-exploit-threatens-millions/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-using-generative-ai-chatgpt-to-evade-anti-virus-defenses/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ibm-qradar-siem-vulnerability-let-attackers-perform-unauthorized-actions/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/bitlockmove-tool-enables-lateral-movement-via-bitlocker-dcom-com-hijacking/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/linux-cups-vulnerability-let-attackers-remote-dos-and-bypass-authentication/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/evilai-as-ai-enhanced-tools-to-exfiltrate-sensitive-browser-data-and-evade-detections/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/lazarus-apt-hackers-using-clickfix-technique-to-steal-sensitive-intelligence-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/samsung-zero-day-vulnerability-actively-exploited-to-execute-remote-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-defender-firewall-vulnerabilities-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-teams-introduces-automatic-alerts-for-malicious-links-from-attackers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/elastic-security-incident-hackers-accessed-email-account-contains-valid-credentials/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackerone-confirms-data-breach-hackers-gained-unauthorized-access-to-salesforce-instance/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/pgadmin-vulnerability-lets-attackers-gain-unauthorised-account-access/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-warns-of-active-directory-domain-services-vulnerability-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/ghostredirector-hackers-compromise-windows-servers-with-malicious-iis-module-to-manipulate-search-results/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/spamgpt-ai-powered-attack-tool-used-by-hackers-for-massive-phishing-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/fortiddos-os-command-injection-vulnerability-let-attackers-execute-unauthorized-commands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-bitlocker-vulnerability-let-attackers-elevate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-security-update-patches-critical-remote-code-execution-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-defender-vulnerability-allows-service-hijacking-and-disablement-via-symbolic-link-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-hijacked-18-very-popular-npm-packages-with-2-billion-weekly-downloads/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/how-prompt-injection-attacks-bypassing-ai-agents-with-users-input/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-confirms-recent-windows-11-24h2-security-update-not-causing-ssd-hdd-failures/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-clickfix-attack-mimic-as-anydesk-leverages-windows-search-to-drop-metastealer-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-clickfix-attack-mimic-as-anydesk-leverages-windows-search-to-drop-metastealer/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-notdoor-malware-attacks-outlook-users-to-exfiltrate-data-and-compromise-computers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/attackers-are-abusing-malicious-pdfs-heres-how-to-spot-them-early/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/django-critical-vulnerability-let-attackers-execute-malicious-sql-code-on-web-servers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mobsf-security-testing-tool-vulnerability-let-attackers-upload-malicious-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-sap-s-4hana-vulnerability-actively-exploited-to-fully-compromise-your-sap-system/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-0-click-vulnerability-enables-attackers-to-takeover-email-access-using-punycode/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-android-0-day-use-after-free-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-dire-wolf-ransomware-attack-windows-systems-deletes-event-logs-and-backup-related-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chinese-apt-hackers-exploit-router-vulnerabilities-to-infiltrate-enterprise-environments/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-iis-webdeploy-remote-code-execution-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/weaponized-putty-via-bing-ads-exploit-kerberos-and-attack-active-directory-services-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/android-security-update-patch-for-0-day-vulnerabilities-actively-exploited-in-attack/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-security-update-patch-for-vulnerabilities-that-enable-rce-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-chrome-0-day-vulnerability-exploited-in-the-wild-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-next-js-framework-vulnerability-let-attackers-bypass-authorization/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/azure-active-directory-vulnerability-exposes-credentials-and-enables-attackers-to-deploy-malicious-apps/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-vulnerability-analysis-released-for-apple-0-day-rce-vulnerability-2/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/linux-udisks-daemon-vulnerability-allows-attackers-access-to-privileged-user-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-citrix-0-day-vulnerability-exploited-since-may-leaving-global-entities-exposed/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-sindoor-dropper-malware-targets-linux-systems-with-weaponized-desktop-files/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-abuse-microsoft-teams-to-gain-remote-access-on-windows-with-powershell-based-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/winrar-0-day-vulnerabilities-exploited-in-wild-by-hackers-detailed-case-study/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/0-day-clickjacking-vulnerabilities-found-in-major-password-managers-like-1password-lastpass-and-others/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-crushftp-0-day-vulnerability-cve-2025-54309/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/weaponized-putty-via-bing-ads-exploit-kerberos-and-attack-active-directory-services/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-released-for-chrome-0-day-vulnerability-exploited-in-the-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-apple-ios-ipados-and-macos-0-day-vulnerability-exploited-in-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-apple-0-day-vulnerability-actively-exploited-in-the-wild-update-now/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/poc-exploit-vulnerability-analysis-released-for-apple-0-day-rce-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-confirms-august-2025-update-causes-severe-lag-in-windows-11-24h2-and-windows-10/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-weaponize-active-directory-federation-services-and-office-com-to-steal-microsoft-365-logins/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/azures-default-api-connection-vulnerability-enables-full-cross-tenant-compromise/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chatgpt-5-downgrade-attack-let-hackers-bypass-ai-security-with-just-a-few-words/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/copilot-vulnerability-breaks-audit-logs-and-access-files-secretly-for-hackers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-high-severity-vulnerability-let-attackers-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cve-2025-8088-winrar-0-day-path-traversal-vulnerability-exploited-to-execute-malware/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-exploit-for-sap-0-day-vulnerability-allegedly-released-in-the-wild-by-shinyhunters-hackers/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/windows-11-24h2-security-update-causes-ssd-hdd-failures-and-potential-data-corruption/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/linux-kernel-netfilter-vulnerability-let-attackers-escalate-privileges/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-postgresql-vulnerabilities-allow-arbitrary-code-injection-during-restoration/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/north-korean-hackers-stealthy-linux-malware-leaked-online/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-elastic-edr-0-day-vulnerability-allows-attackers-to-bypass-detection-execute-malware-and-cause-bsod/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/weekly-cybersecurity-news-recap-microsoft-cisco-fortinet-security-updates-and-cyber-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/gpt-5-jailbroken-with-echo-chamber-and-storytelling-attacks/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-win-dos-zero-click-vulnerabilities-turns-windows-server-endpoint-domain-controllers-into-ddos-botnet/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/flipper-zero-darkweb-firmware-bypasses-rolling-code-security-on-major-vehicle-brands/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-active-directory-lateral-movement-techniques-that-bypasses-authentication-and-exfiltrate-data/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/http-1-1-fatal-vulnerability-exposes-millions-of-websites-to-hostile-takeover/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/mustang-panda-attacking-windows-users-with-toneshell-malware-mimic-as-google-chrome/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-can-steal-iis-machine-keys-by-exploiting-sharepoint-deserialization-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/raspberry-robin-malware-attacking-windows-systems-with-new-exploit-for-clfs-driver-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/critical-android-system-component-vulnerability-allows-remote-code-execution-without-user-interaction/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/wafs-protection-bypassed-to-execute-xss-payloads-using-js-injection-with-parameter-pollution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/1000000-for-whatsapp-0-click-rce-exploit-at-pwn2own-ireland-2025/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/hackers-attacking-iis-servers-with-new-web-shell-script-to-gain-complete-remote-control/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chinese-hackers-weaponizes-software-vulnerabilities-to-compromise-their-targets/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/oyster-malware-as-putty-keypass-attacking-it-admins-by-poisoning-seo-results/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-copilot-rooted-to-gain-unauthorized-root-access-to-its-backend-system/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/first-known-llm-powered-malware-from-apt28-hackers-integrates-ai-capabilities-into-attack-methodology/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/threat-actors-attacking-linux-ssh-servers-to-deploy-svf-botnet/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/cisa-warns-of-microsoft-sharepoint-server-0-day-rce-vulnerability-exploited-in-wild/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/chrome-high-severity-vulnerabilities-allow-attackers-to-execute-arbitrary-code/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-7-zip-vulnerability-enables-weaponized-rar5-file-to-crash-your-system/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/weak-password-let-ransomware-gang-destroy-158-year-old-company/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/laravel-security-notice-livewire-v3-remote-code-execution-vulnerability/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/new-waffled-attack-exploits-aws-azure-cloud-armor-cloudflare-and-modsecurity-wafs/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/sophos-intercept-x-for-windows-vulnerabilities-enable-arbitrary-code-execution/</loc>
</url>
<url>
  <loc>https://www.isecurify.co/microsoft-entra-id-vulnerability-let-attackers-escalate-privileges-to-global-admin-role/</loc>
</url>


</urlset>