<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.loginsoft.com</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/threat-research-and-intelligence/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/blogs</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/security-advisories</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/contact</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/vulnerability-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cloud-native-security/cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cloud-native-security/cloud-workload-protection-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/threat-research-and-intelligence/external-attack-surface-discovery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/software-supply-chain-security/dependency-defense</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/software-supply-chain-security/software-composition-analysis</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/software-supply-chain-security/zero-day-discovery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/security-and-threat-intelligence-integrations</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/it-solutions/software-development-and-support</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/it-solutions/staff-augmentation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/it-solutions/qa-automation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/it-solutions/data-science-engineering-services</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/research-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/github-repos</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/lovi</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cytellite</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/search</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/new-scap-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/webinars</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/connector-development</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/artificial-intelligence/ai-engineering-services</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/artificial-intelligence/ai-model-validation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/artificial-intelligence/security-data-for-ai-training</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cloud-infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cloud-native-security/hardened-container-images</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/custom-sast-rules-development</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cis-benchmark-compliance-content</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/software-supply-chain-security/extended-lifecycle-support</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/cloud-native-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/it-solutions</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/threat-research-and-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/a-new-approach-to-accelerate-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/a-new-digital-predator-vanhelsing-ransomware-steps-into-the-spotlight</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ai-in-cybersecurity-a-double-edged-sword-forging-the-future</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/akira-ransomware-the-evolution-of-a-major-threat</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/aurora-the-dark-dawn-and-its-menacing-effects</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/axios-npm-supply-chain-attack-technical-analysis-iocs-detection-mitigation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/azure-bicep-simplifying-infrastructure-as-code-for-the-cloud-deployments</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/beyond-traditional-sca-detecting-exploitable-vulnerabilities-using-codeql-reachability-analysis</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/blue-screen-mayhem-when-crowdstrikes-glitch-became-threat-actors-playground</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/build-mcp-for-ai-how-to-build-model-context-protocol</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cis-controls-v8-explained-18-controls-every-organization-needs</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cisco-umbrella-reporting-integration-with-cortex-xsoar</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/claude-opus-4-6-discovers-500-critical-vulnerabilities-in-open-source-software-what-this-means-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cloud-native-services-threat-modeling-stride-framework-controls-automation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cloud-security-posture-management-cspm-the-capabilities-your-organization-actually-needs</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2021-27853-cisco</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2021-27861-cisco</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2023-20109-cisco</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-41248-spring-security-authorization-bypass-in-method-security-annotations-on-parameterized-types</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-43807-stored-cross-site-scripting-xss-vulnerability-in-liferay-portal-explained</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-4760-authenticated-stored-xss-vulnerability-in-wso2-api-manager-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59340-sandbox-bypass-via-javatype-deserialization-in-jinjava-what-developers-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59432-timing-attack-vulnerability-in-scram-authentication</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59474-missing-permission-check-in-jenkins-allows-unauthorized-access-to-agent-names</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59475-missing-permission-check-in-jenkins-authenticated-user-profile-menu</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59476-log-message-injection-vulnerability-in-jenkins-core-explained</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-59822-http-request-smuggling-in-http4s-what-developers-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cve-2025-6544-cve-2025-6507-deserialization-vulnerabilities-and-mysql-jdbc-bypass-in-h2o-3-explained</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/cybersecurity-in-aviation-industry</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/detecting-atlassian-confluence-exploitation-cve-2022-26134</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/discock-stealer-another-polymorphic-malware-like-wasp-stealer</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/discovering-vulnerabilities-with-afl-fuzzer</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/dissecting-pypiele-another-malicious-package-hiding-in-the-pypi-space</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/dragonforce-ransomware-technical-analysis-and-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/driving-the-diligence-of-data-visualization</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/emerging-threats-and-vulnerabilities-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/empowering-ci-cd-with-rego-policies</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/enhancing-azure-front-door-with-threat-intelligence-blocking-malicious-ips-at-the-edge</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/enhancing-security-with-leading-internet-intelligence-companys-elastic-integration</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/explicating-the-concepts-of-osquery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/extending-splunk-ui-using-custom-js-and-css</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/fast-incident-response-fir-integration-with-threat-intelligence-management-platform-imp</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/fog-ransomware-the-full-breakdown</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/fortifying-cloud-security-posture-management-with-open-policy-agent-opa</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/fortifying-the-cloud-a-guide-to-securing-vulnerable-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/from-innocence-to-malice-the-onenote-malware-campaign-uncovered</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ghost-ransomware-playbook-how-it-works-what-it-uses-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/global-it-disruption-the-fallout-from-crowdstrikes-faulty-update</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/guardians-of-your-data-siem-vs-log-management-choose-your-cybersecurity-knight</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/handling-multiline-log-formats-using-regex-and-grok-parser</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/heap-overflow-vulnerabilities-and-concerned-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/how-can-you-speed-up-incident-response-on-servicenow-for-automated-enrichment-of-security-incidents-using-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/how-loginsoft-can-solve-the-nist-cve-enrichment-crisis</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/how-osquery-works-and-how-osquery-fim-benefits-security-researchers</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ibm-qradar-use-cases</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/icedid-malware-traversing-through-its-various-incarnations</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/infrastructure-intelligence-in-cybersecurity-detect-threats-before-they-launch</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/initial-access-brokers-the-hidden-architects-of-modern-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/integration-capability-with-misp-open-source-threat-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/intelowl-an-osint-tool-discovering-threat-intelligence-from-multiple-data-sources</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/introduction-to-common-gateway-interface-and-cgi-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/introduction-to-heap-internals</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/introduction-to-reverse-engineering-and-radare2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/iotzation-sharpening-the-smartness-of-digital-world</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ipfix-data-export-from-research-to-successful-log-collection</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/is-it-time-for-leading-threat-intelligence-platforms-to-support-custom-objects-such-as-wallet-ids-cryptocurrency-address-for-cryptocurrency-threat-intelligence-providers</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/is-microsoft-azure-sentinel-your-next-implementation-learn-how-loginsoft-integrated-sentinel-with-data-source</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/is-your-firmware-secured-its-time-to-shield-the-iot-cyber-surveillance-with-firmware-analysis</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/leaked-credentials-entra-id-integration-application-overview</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/loginsoft-builds-expertise-in-integrating-threat-intelligence-source-with-threatquotientaeu-tm-s-threat-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/loginsoft-builds-expertise-in-integrating-threat-intelligence-sources-into-threatconnect-soar-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/loginsoft-developed-datadog-cloud-siem-integration-for-a-leading-soar-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/mastering-the-art-of-cybersecurity-lab-environments-fostering-innovation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/maximizing-threat-detections-of-qakbot-with-osquery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/mcp-vs-api-whats-the-actual-difference-and-when-to-use-each</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/mcsb-deep-dive-securing-azure-with-microsoft-cloud-security-benchmark</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/medusa-ransomware-evolving-tactics-in-modern-cyber-extortion</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/memory-corruption-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/microsoft-defender-malware-sandbox-a-powerful-security-integration-for-automated-threat-response</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/microsoft-purview-for-data-governance-compliance-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/new-trojan-malware-exploits-users-with-rogue-chrome-and-edge-extensions</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/open-vulnerability-assessment-language-oval-in-a-nutshell</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/open-vulnerability-assessment-language-oval-in-a-nutshell-part-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/palo-alto-networks-cortex-xsoar-integration</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/privacy-on-telegram-fact-or-fiction</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/qilin-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ransomhub-revealed-threats-tools-and-tactics</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/ransomware-watch-q1-2023-highlights</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/scanned-and-scammed-the-rise-of-qr-code-phishing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/seamlessly-migrating-between-security-information-and-event-management-siem-solutions</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/secure-scalable-and-codeless-building-microsoft-sentinel-connectors-for-logs-and-threat-intelligence-with-ccf</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/secure-your-network-by-setting-up-a-honeypot</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/securing-angularjs-applications</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/securing-email-server-in-a-nutshell</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/securing-the-decentralized-enterprise-with-zero-trust-principles</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/securing-the-open-source-frontier-understanding-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/securing-the-software-supply-chain-with-open-policy-agent-policies-for-pull-requests-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/security-controls-gap-analysis-how-to-find-and-fix-your-weak-points</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/security-controls-in-cybersecurity-a-complete-guide-to-mcsb-cis-and-nist-frameworks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/security-products-challenge-accessibility-approach-to-test</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/security-teams-can-now-monitor-cve-trends-from-a-leading-vulnerability-threat-intelligence-provider-with-wiz-integration</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/semgrep-insights-on-security-risks-in-node-js-vm-module</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/shai-hulud-2-0-inside-the-most-sophisticated-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/shield-your-firewall-to-strive-against-sensitive-data-disclosure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/stack-buffer-overflow-vulnerabilities-a-serious-threat-to-the-cyber-applications</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/strengthening-attack-surface-management-asm-with-threat-intelligence-how-loginsoft-leads-the-way</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/strengthening-cyber-resilience-with-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/sync-axios-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/taming-the-storm-understanding-and-mitigating-the-consequences-of-cve-2023-27350</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-aws-outage-lesson-why-your-vulnerability-management-product-needs-a-backup-content-provider</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-blacklock-breakdown-tools-tactics-and-the-rivalry-that-brought-it-down</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-emergence-of-mallox-v1-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-hidden-tax-on-cybersecurity-integrations-why-security-product-integrations-are-harder-than-they-should-be-and-how-loginsoft-helps</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-react2shell-crisis-technical-deep-dive-into-cve-2025-55182-and-widespread-exploitation-activity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-rise-of-interlock-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/the-silent-breach-understanding-zero-day-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/threat-detection-with-sigma-rules</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/threat-intelligence-connector-for-opencti-cyber-threat-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/tls-1-3-vs-tls-1-2-understanding-key-security-and-performance-differences</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/transferring-web-and-cloud-firewall-logs-into-enterprise-siem-by-using-zscalers-nanolog-streaming-service-nss</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/understanding-end-of-life-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/unraveling-lynx-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/vmware-esxi-a-growing-target-for-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/vulnerability-management-tools-and-process-a-practitioners-guide-to-staying-ahead-of-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/what-is-model-context-protocol-mcp-and-the-security-ai-integration-for-azure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/why-healthcare-sector-remains-as-the-top-target-for-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/why-is-my-software-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/wiz-cloud-security-everything-you-need-to-know-about-the-platform-securing-the-modern-cloud</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/xcsset-reloaded-smarter-stealthier-stronger</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/zero-day-vulnerability-research-and-report</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/post/zola-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/buffer-overflow-in-vcftools-0-1-16</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/buffer-overflow-vulnerability-in-ps-options-gnuplot-5-2-5</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/csv-formula-injection-in-medplum</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-15671-stack-overflow-vulnerability-in-hdf5-1-10-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-15672-multiple-divide-by-zero-in-hdf5-1-10-2-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-16140-buffer-under-write-vulnerability-in-fig2dev-3-2-7a</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17234-memory-leak-vulnerability-in-hdf5-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17432-null-pointer-dereference-vulnerability-in-hdf5-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17435-heap-based-buffer-over-read-vulnerability-in-hdf5-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17436-invalid-write-memory-access-vulnerability-in-hdf5-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17439-stack-overflow-vulnerability-in-hdf5-1-10-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17580-heap-based-buffer-over-read-vulnerability-in-fast-edit-packet-tcpreplay-4-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17582-heap-based-buffer-over-read-vulnerability-in-get-next-packet-tcpreplay-4-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-17974-heap-based-buffer-over-read-vulnerability-in-dlt-en10mb-encode-tcpreplay-4-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-18407-heap-overflow-in-csum-replace4-tcpreplay-4-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-18408-use-after-free-in-post-args-tcpreplay-4-3-0-beta1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-18409-stack-buffer-overflow-vulnerability-in-setbit-tcpflow-1-5-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-19532-null-pointer-dereference-vulnerability-in-pdftranslator-settarget-podofo-0-9-6</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2018-20723-multiple-vulnerabilities-discovered-in-the-package-cacti</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-11023-null-pointer-dereference-in-function-agroot-graphiz-2-39-20160612-1140</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-11024-infinite-loop-in-function-load-pnm-libsixel-1-8-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-11026-stack-based-buffer-overflow-in-error-poppler-0-75-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-12901-multiple-vulnerabilities-in-pydio-cells-1-4-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-6990-multiple-vulnerabilities-identified-in-zoneminder</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-7170-multiple-vulnerabilities-discovered-in-the-package-croogo</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-7172-vulnerability-discovered-in-the-package-atutor</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8376-null-pointer-dereference-vulnerability-in-function-get-layer4-v6-tcpreplay-4-3-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8377-null-pointer-dereference-vulnerability-in-function-get-ipv6-l4proto-tcpreplay-4-3-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8378-a-heap-buffer-overflow-vulnerability-in-the-function-ap4-bitstream-readbytes-bento4-1-5-1-628</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8379-null-pointer-dereference-vulnerability-in-the-function-be-uint32-read-advancecomp</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8380-null-pointer-dereference-vulnerability-in-function-ap4-track-getsampleindexfortimestampms-bento4-1-5-1-628</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8381-invalid-memory-access-vulnerability-in-function-do-checksum-tcpreplay-4-3-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8382-null-pointer-dereference-vulnerability-in-function-ap4-list-find-bento4-1-5-1-628</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-8383-invalid-memory-access-in-adv-png-unfilter-8-advancecomp</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9143-uncontrolled-recursion-loop-in-exiv2-image-printtiffstructure-exiv2-0-27</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9144-uncontrolled-recursion-loop-in-exiv2-anonymous-namespace-bigtiffimage-printifd-exiv2-0-27</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9199-null-pointer-dereference-vulnerability-in-setsource-podofo-0-9-6-trunk-r1967</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9200-heap-based-buffer-underwrite-in-imagestream-getline-poppler-0-74-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9543-recursive-function-call-in-function-jbig2stream-readgenericbitmap-poppler-0-74-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9544-out-of-bounds-write-in-function-ap4-cttstableentry-ap4-cttstableentry-bento4-1-5-1-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9545-recursive-function-call-in-function-jbig2stream-readtextregion-poppler-0-74-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9587-stack-consumption-issue-in-function-md5round1-xpdf-4-01</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9588-invalid-memory-access-in-gatomicincrement-xpdf-4-01</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9589-null-pointer-dereference-vulnerability-in-function-psoutputdev-setupresources-xpdf-4-01</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9877-invalid-memory-access-in-textpage-findgaps-xpdf-4-01</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9878-invalid-memory-access-in-gfxindexedcolorspace-mapcolortobase-pdfalto-0-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9903-stack-based-buffer-overflows-in-dict-find-poppler-0-74-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2019-9904-stack-buffer-overflow-in-function-agclose-graphviz</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-10809-heap-overflow-in-decompress-c-hdf5-1-13-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-10810-null-pointer-dereference-in-h5ac-c-hdf5-1-13-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-10811-heap-buffer-overflow-in-h5olayout-c-hdf5-1-13-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-10812-null-pointer-dereference-in-h5fquery-c-hdf5-1-13-0</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-15873-blind-sql-injection-in-librenms</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-15892-classic-stack-based-buffer-overflow-in-d-link-firmware-dap-1520</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-15896-authentication-bypass-in-d-link-firmware-dap-1522</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2020-7246-path-traversal-in-qdpm-9-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/cve-2022-38301-path-traversal-in-onedev-v7-4-14</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/denial-of-service-in-vcftools-0-1-16</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/divide-by-zero-vulnerability-in-function-parse-len-abcm2ps-1-8-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/improper-access-control-in-d-link-firmware-dir-601</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/invalid-memory-access-in-bcftools-1-9</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/memory-corruption-in-fig2dev-3-2-7a</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-deference-in-function-annotsxrce-annotsxrce-pdfalto-0-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-in-fig2dev-3-2-7a</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-in-function-calculate-beam-abcm2ps-1-8-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-in-function-draw-bar-abcm2ps-1-8-2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-crop-page-podofo-0-9-6</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-main-giflib-5-1-4</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-d-cresc-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-d-trill-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-deco-define-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-get-user-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-init-music-line-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-ps-exec-abcm2ps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/null-pointer-dereference-vulnerability-in-the-function-show-abc2mps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/out-of-bound-read-in-fig2dev-3-2-7a</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/out-of-bounds-read-vulnerability-in-the-function-calculate-beam-abc2mps-8-14-1</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/path-traversal-in-pfsense</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/privilege-escalation-leads-to-rce-in-medplum</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/zero-day-discovery/unrestricted-resource-consumption-in-wilmidi-0-4-3</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/chief-cybersecurity-solutions-officer-ccso</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/cloud-security-architect</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/data-analytics-engineer</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/sr-devops-engineer</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/sr-network-security-architect</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/sr-python-engineer</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/careers-job-postings/sr-software-developer-cloud-azure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/annually/vulnerability-intelligence-report-2023</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/annually/vulnerability-intelligence-report-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/annually/vulnerability-intelligence-report-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-turbulent-week-of-zero-days-and-persistent-threat-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-active-exploitation-and-fake-exploits-trap</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-active-exploits-and-intensifying-threat-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-botnet-campaigns-and-exploit-spikes</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-cisa-kev-alerts-and-widespread-active-exploits</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-emerging-zero-day-vulnerabilities-and-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-malware-exploitations-and-sustained-botnet-activity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-targeted-exploitation-across-enterprise-platforms</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/a-week-of-wild-exploitations-and-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/active-exploits-across-legacy-and-modern-stacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/active-exploits-and-advanced-threat-activity-dominate-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/active-exploits-strike-core-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/active-kev-additions-and-espionage-operations-define-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/advanced-threat-activity-intensifies-on-vulnerable-systems</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/advanced-threat-campaigns-and-active-exploitation-strike-core-ecosystems</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/botnets-evolve-while-exploits-target-critical-systems</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cisa-kev-additions-and-advanced-threat-actors-disrupt-enterprise-security-posture</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cisa-kev-alerts-and-mirai-campaigns-a-week-of-widespread-active-exploits</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cisa-kev-expands-as-malware-campaigns-target-enterprise-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cisa-sounds-the-alarm-zero-day-vulnerabilities-rock-apple-vmware-and-palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-cves-cisa-kev-catalog-insights-and-malware-threats-including-androxghost-mozi-botnets</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-exploits-and-active-malware-campaigns-ramp-up-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-exploits-and-coordinated-attacks-define-this-weeks-cyber-frontline</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-surge-in-threat-activity-hits-core-and-iot-platforms</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-vulnerabilities-amidst-ransomware-and-botnet-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/critical-zero-days-and-botnet-activity-surge-as-exploitation-intensifies</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cyber-chaos-unfolds-zero-days-botnets-espionage-surge-this-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cyber-threat-highlights-from-mirai-botnet-abuse-to-kev-worthy-critical-flaws</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/cyber-threat-insights-critical-vulnerabilities-botnet-surges-and-advanced-threat-actor-activities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/december-starts-with-intensified-cyberattacks-across-mobile-and-industrial-systems</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploitation-campaigns-and-kev-additions-marked-an-intensifying-threat-landscape-this-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploitation-escalates-top-cyber-threats-this-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploitation-intensifies-following-new-kev-additions</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploitation-on-the-rise-key-cyber-threats-this-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploits-escalate-kev-inclusions-botnet-activity-and-malware-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploits-in-the-wild-a-week-of-zero-days-botnets-and-rising-threat-activities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/exploits-in-the-wild-stealthy-campaigns-target-enterprises</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/focused-but-relentless-exploitation-in-the-closing-week-of-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-active-exploitation-to-state-aligned-espionage-threat-actors-intensify-operations-against-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-botnets-to-apts-a-surge-in-exploits-and-targeted-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-botnets-to-espionage-the-persistent-threat-of-unpatched-systems</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-botnets-to-ransomware-a-week-of-high-priority-cybersecurity-alerts</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-decades-old-vulnerabilities-to-new-zero-days-this-weeks-vulnerability-trends</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-firewalls-to-frameworks-a-week-of-high-impact-exploitation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-late-march-to-early-april-2026-active-exploits-and-supply-chain-attacks-intensify-across-enterprise-platforms</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/from-zero-day-exploitation-to-plugin-takeovers-a-week-of-high-impact-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/high-severity-vulnerabilities-and-espionage-operations-drive-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/iot-attacks-surge-as-threat-actors-accelerate-critical-vulnerability-exploitation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/latest-exploited-cves-and-cisa-kev-updates</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/legacy-exploits-and-unpatched-systems-dominate-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/legacy-flaws-and-new-vulnerabilities-a-week-of-unrelenting-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/legacy-vulnerabilities-and-espionage-operations-dominate-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/malware-resurgence-espionage-campaigns-dominate-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/march-kicks-off-with-major-exploits</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/new-and-legacy-flaws-added-to-the-cisa-kev-amid-rising-threat-activity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/new-critical-vulnerabilities-surface-as-threat-actors-evolve</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/new-kev-additions-active-exploits-and-malware-campaigns-signal-a-high-stakes-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/new-year-new-challenges-critical-vulnerabilities-and-botnet-exploits-in-focus</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/september-surge-a-week-of-exploits-and-critical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/severe-cves-severe-outcomes</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/surge-in-active-exploitation-impacts-core-infrastructure-and-iot-devices</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/surge-in-cyber-threats-unc5820-and-lazarus-group-exploited-critical-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/sustained-exploitation-activity-and-kev-updates-marked-this-weeks-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/the-impact-of-cisas-latest-vulnerabilities-on-cybersecurity-practices</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-active-exploits-and-notable-threat-activity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-active-exploits-growing-botnets-and-nation-state-actors</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-cisa-kev-additions-and-intensified-threat-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-converging-threat-actors-exploiting-emerging-and-legacy-vulnerabilities-across-enterprise-and-iot-environments</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-critical-exploits-and-malware-deployments-uncovered</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-critical-exploits-expanding-botnets-and-sophisticated-threat-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-exploits-and-espionage-converge-across-global-networks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-week-in-cybersecurity-kev-additions-botnet-escalation-and-espionage-campaigns-unfold</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-weeks-cyber-threats-active-cve-exploits-and-steelfoxs-use-of-old-flaws</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/this-weeks-threat-landscape-critical-vulnerabilities-zero-days-and-botnets</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/threat-actors-ramp-up-exploitation-of-widely-deployed-enterprise-technologies</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/vulnerability-alert-kevs-botnet-activity-and-apt-campaigns</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/week-of-critical-exploits</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/week-of-exposure-high-impact-vulnerabilities-and-threat-trends-unfold</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-cyber-threat-brief-surging-exploits-and-state-backed-intrusions</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-cybersecurity-roundup-cisa-kev-additions-emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-1st-week-august-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-2nd-week-august-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-3rd-week-august-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-4th-week-july-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-july-12-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-july-19-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-july-5-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-june-07-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-june-14-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-june-21-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-june-28-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-may-17-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-may-24-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/weekly-threat-vulnerabilities-report-may-31-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/widespread-active-exploitations-put-critical-infrastructure-at-risk</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-day-abuses-to-active-malware-a-week-of-real-world-exploitation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-day-exploitation-accelerates-across-core-enterprise-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-day-exploitation-and-large-scale-campaigns-define-this-weeks-threat-outlook</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-day-exploits-and-ransomware-attacks-intensify</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-days-active-exploits-and-botnets-key-cybersecurity-risks-of-the-week</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-days-and-active-exploits-dominate-this-weeks-cyber-landscape</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-days-and-malware-campaigns-shapes-this-weeks-cyber-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/weekly/zero-days-and-virtualization-breaches-escalating-state-aligned-exploitation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-april-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-april-2026</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-august-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-december-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-december-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-february-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-february-2026</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-january-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-january-2026</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-july-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-june-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-march-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-march-2026</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-may-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-november-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-september-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-and-vulnerabilities-report-september-2025</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-august-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-july-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-june-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-may-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-november-by-loginsoft</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/reports/monthly/threat-vulnerabilities-report-october-2024</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/ai-powered-call-automation-platform-for-medical-transport-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/centralized-log-management-security-integration-development-for-capturing-indexing-and-analysis-of-unstructured-and-structured-data-from-security-endpoints</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/developing-connectors-for-threat-intelligence-sources-to-customer-a-leading-cyber-analysis-company</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/hanleywood-case-study-transitioning-print-publishing-to-digital</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/splunk-siem-implementation-for-threat-intelligence-companies-with-custom-js-and-css</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/sylvan-learning-case-study-simplifying-learning-management-for-educators-and-students</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/case-studies/zoneminder-case-study-strengthening-the-security-of-the-future</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/advanced-endpoint-protection-aep</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/advanced-persistent-threat</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/agentic-workflows</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/agentless-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ai-data-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ai-engineering</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ai-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ai-model-validation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/api-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/application-firewall</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/application-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/application-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/asset-discovery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/attack-surface-reduction</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/azure-iac</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/azure-resource-manager</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/azure-security-benchmark</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/behavioral-analytics</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/blacklist-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/blockchain-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/botnet-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/breach-and-attack-simulation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/buffer-overflow</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/business-continuity-plan-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/center-for-internet-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/certificate-authority</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/chief-information-security-officer-ciso</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cloud-access-security-broker</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cloud-native-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cloud-workload-protection</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/codeql</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/command-and-control-c2</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/common-vulnerability-scoring-system</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/common-weakness-enumeration</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/configuration-drift-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/container-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/continuous-vulnerability-monitoring</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/credential-theft-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cross-site-request-forgery</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cross-site-scripting</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cryptography-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cve-common-vulnerabilities-and-exposures-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cyber-exposure-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/cyber-threats-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-breach-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-encryption-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-exfiltration-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-governance-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-loss-prevention-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/data-security-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/deep-packet-inspection-dpi-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/denial-of-service</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/devsecops</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/digital-forensics-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/dmarc</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/domain-spoofing-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/domainkeys-identified-mail</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/dynamic-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/encryption-key-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/endpoint-detection-response</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/exception-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/exploit-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/exposure-monitoring-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/fileless-malware-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/firewall-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/fuzzing-fuzz-testing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/governance-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/grayware-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/group-policy</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/hacktivism-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/honeypot-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/human-in-the-loop</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/hypervisor-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/incident-response</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/indicators-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/input-validation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/integrated-risk-management-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/intrusion-detection-system</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/intrusion-prevention-system</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/iot-security-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/jamming-attack-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/key-logger-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/kill-chain-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/lateral-movement-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/least-privilege-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/log-correlation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/logic-bomb-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/macro-virus</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/malware-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/man-in-the-middle-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/managed-security-service-provider</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/managed-security-services</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/microsoft-purview</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/mitigation-strategy-engineering</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/mitre-att-and-ck-framework</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/mobile-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/network-firewall-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/network-security-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/network-segmentation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/next-generation-firewall</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ntp-amplification-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/oauth-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/open-source-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/open-vulnerability-and-assessment-language</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/operation-technology-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/password-policy-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/patch-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/patch-validation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/phishing-prevention-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/predictive-vulnerability-monitoring</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/privileged-access-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/privileged-identity-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/public-key-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/purple-teaming-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/quishing-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/rag-pipelines</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/red-teaming-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/remote-code-execution</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/residual-risk-calculation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/risk-assessment-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/risk-based-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/rogue-access-point-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/sandboxing-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/secure-access-service-edge-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/secure-coding-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/secure-web-gateway-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-assessment-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-automation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-information-and-event-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-monitoring-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-operations-center</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/security-orchestration-automation-and-response-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/serverless-security-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/shadow-it</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/soc-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/social-engineering-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/software-composition-analysis</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/spoofing-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/spyware-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/ssl-certificates</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/static-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/supply-chain-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/synthetic-identity-fraud-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/threat-actor</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/threat-aware-vulnerability-prioritization-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/threat-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/tokenization-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/trojan-horse-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/trusted-platform-module</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/url-filtering</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/usage-based-vulnerability-exposure</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/user-and-entity-behavior-analytics</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/virtual-private-network</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/virus-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/vulnerability-correlation-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/vulnerability-management-platform-vmp</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/vulnerability-threat-enrichment-vte-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/wannacry-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/watering-hole-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/weaponization-prediction</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/web-application-firewall-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/whaling-attacks</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-a-distributed-denial-of-service-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-a-web-proxy-server</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-ai-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-an-attack-vector</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-an-mfa-fatigue-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-attribute-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-bad-rabbit-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-catfishing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-cerber-ransomware</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-certified-in-risk-and-information-systems-control</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-clone-phishing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-cloud-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-cloud-infrastructure-entitlement-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-cyber-hygiene-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-email-security</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-enterprise-risk-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-graymail</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-identity-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-identity-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-it-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-kerberoasting-attack</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-mimikatz</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-model-context-protocol</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-nist-compliance</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-open-source-software</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-password-vaulting</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-personal-identifiable-information</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-retrieval-augmented-generation</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-telemetry-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-typosquatting</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-vishing</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/what-is-zeus-trojan-zbot</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/worm-virus-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/xccdf-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/yara-rules</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/yellow-hat-hacking</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/zero-day-exploit</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/zero-day-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/zero-trust-architecture-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/zero-trust-network-access-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/glossary/zero-trust-security-model-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/webinars/reduce-identity-risk-integrating-cognytes-leaked-credentials-threat-intel-into-microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.loginsoft.com/webinars/simplifying-security-integrations-with-microsoft-sentinel-codeless-connect-framework</loc>
    </url>
</urlset>