<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//sorintsec.ai/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://sorintsec.ai/labs/</loc>
		<lastmod>2026-04-15T08:56:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/bluehammer-windows-zero-day</loc>
		<lastmod>2026-04-15T08:56:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/bluehammer-windows-zero-day</loc>
		<lastmod>2026-04-15T08:56:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/bluehammer-windows-zero-day</loc>
		<lastmod>2026-04-15T08:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/weaponizing-windows-toast-notifications-abuse-of-toastnotify-exe-for-phishing-and-credential-coercion</loc>
		<lastmod>2026-04-02T07:50:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/weaponizing-windows-toast-notifications-abuse-of-toastnotify-exe-for-phishing-and-credential-coercion</loc>
		<lastmod>2026-04-02T07:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/weaponizing-windows-toast-notifications-abuse-of-toastnotify-exe-for-phishing-and-credential-coercion</loc>
		<lastmod>2026-04-02T07:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/splitdrop-inside-the-iran-linked-apt-group-dust-specter-campaign</loc>
		<lastmod>2026-03-18T11:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/splitdrop-inside-the-iran-linked-apt-group-dust-specter-campaign</loc>
		<lastmod>2026-03-18T11:52:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/splitdrop-inside-the-iran-linked-apt-group-dust-specter-campaign</loc>
		<lastmod>2026-03-18T11:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/ntds-dit-dumping-via-print-spooler-abuse</loc>
		<lastmod>2026-03-04T14:14:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/ntds-dit-dumping-via-print-spooler-abuse</loc>
		<lastmod>2026-03-04T14:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/ntds-dit-dumping-via-print-spooler-abuse</loc>
		<lastmod>2026-03-04T14:12:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/telnet-cve-2026-24061</loc>
		<lastmod>2026-02-26T11:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/rhysidas-oysterloader-multi-stage-fake-installer-campaign</loc>
		<lastmod>2026-02-26T11:34:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/rhysidas-oysterloader-multi-stage-fake-installer-campaign</loc>
		<lastmod>2026-02-26T11:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/rhysidas-oysterloader-multi-stage-fake-installer-campaign</loc>
		<lastmod>2026-02-18T15:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/telnet-cve-2026-24061</loc>
		<lastmod>2026-02-04T14:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/telnet-cve-2026-24061</loc>
		<lastmod>2026-02-04T14:55:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/purelog-stealer-distributed-via-trojanized-taskscheduler-targets-italy</loc>
		<lastmod>2026-01-21T10:31:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/purelog-stealer-distributed-via-trojanized-taskscheduler-targets-italy</loc>
		<lastmod>2026-01-21T10:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/purelog-stealer-distributed-via-trojanized-taskscheduler-targets-italy</loc>
		<lastmod>2026-01-21T10:31:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/fancy-bears-notdoor-hijacking-outlook-for-nato-espionage-via-onedrive-side-loading</loc>
		<lastmod>2026-01-07T14:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/fancy-bears-notdoor-hijacking-outlook-for-nato-espionage-via-onedrive-side-loading</loc>
		<lastmod>2026-01-07T14:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/fancy-bears-notdoor-hijacking-outlook-for-nato-espionage-via-onedrive-side-loading</loc>
		<lastmod>2026-01-07T14:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/matanbuchus-3-0-advanced-c-loader-evolving-maas</loc>
		<lastmod>2026-01-07T14:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/matanbuchus-3-0-advanced-c-loader-evolving-maas</loc>
		<lastmod>2026-01-07T14:20:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/matanbuchus-3-0-advanced-c-loader-evolving-maas</loc>
		<lastmod>2026-01-07T14:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/silver-foxs-icmluautil-uac-bypass-abusing-auto-elevated-com-for-stealthy-privilege-escalation</loc>
		<lastmod>2025-12-23T13:25:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/silver-foxs-icmluautil-uac-bypass-abusing-auto-elevated-com-for-stealthy-privilege-escalation</loc>
		<lastmod>2025-12-23T13:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/silver-foxs-icmluautil-uac-bypass-abusing-auto-elevated-com-for-stealthy-privilege-escalation</loc>
		<lastmod>2025-12-23T13:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/latrodectus-unmasked-the-art-of-persistent-execution-via-trusted-binaries</loc>
		<lastmod>2025-12-23T13:13:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/latrodectus-unmasked-the-art-of-persistent-execution-via-trusted-binaries</loc>
		<lastmod>2025-12-23T13:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/latrodectus-unmasked-the-art-of-persistent-execution-via-trusted-binaries</loc>
		<lastmod>2025-12-23T13:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/patch-management-under-fire-navigating-the-vulnerabilities-of-wsus-in-enterprise-cybersecurity</loc>
		<lastmod>2025-12-22T16:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/patch-management-under-fire-navigating-the-vulnerabilities-of-wsus-in-enterprise-cybersecurity</loc>
		<lastmod>2025-12-22T16:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/patch-management-under-fire-navigating-the-vulnerabilities-of-wsus-in-enterprise-cybersecurity</loc>
		<lastmod>2025-12-22T16:48:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/when-defense-tools-turn-adversarial-detecting-the-misuse-of-velociraptor-in-modern-attack-chains</loc>
		<lastmod>2025-12-22T16:30:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/when-defense-tools-turn-adversarial-detecting-the-misuse-of-velociraptor-in-modern-attack-chains</loc>
		<lastmod>2025-12-22T16:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/when-defense-tools-turn-adversarial-detecting-the-misuse-of-velociraptor-in-modern-attack-chains</loc>
		<lastmod>2025-12-22T16:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/inside-remcoms-latest-evolution-weaponizing-winrar-vulnerability-cve-2025-8088-in-2025-attacks</loc>
		<lastmod>2025-12-22T11:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/inside-remcoms-latest-evolution-weaponizing-winrar-vulnerability-cve-2025-8088-in-2025-attacks</loc>
		<lastmod>2025-12-22T11:45:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/es/labs/inside-remcoms-latest-evolution-weaponizing-winrar-vulnerability-cve-2025-8088-in-2025-attacks</loc>
		<lastmod>2025-12-22T11:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/how-edr-freeze-turns-windows-debugging-into-a-weapon-against-antivirus-and-edr</loc>
		<lastmod>2025-10-14T10:15:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/how-edr-freeze-turns-windows-debugging-into-a-weapon-against-antivirus-and-edr</loc>
		<lastmod>2025-10-14T10:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/beyond-the-takedown-how-lumma-stealer-maintains-persistent-campaigns-worldwide</loc>
		<lastmod>2025-10-10T14:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/beyond-the-takedown-how-lumma-stealer-maintains-persistent-campaigns-worldwide</loc>
		<lastmod>2025-10-10T14:50:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/chepalus-apt-sophisticated-ransomware-operations-leveraging-dll-side-loading</loc>
		<lastmod>2025-10-10T14:49:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/chepalus-apt-sophisticated-ransomware-operations-leveraging-dll-side-loading</loc>
		<lastmod>2025-10-10T14:49:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/wbadmin-weaponized-the-silent-credential-dumping-behind-bumblebee-enterprise-attacks</loc>
		<lastmod>2025-10-10T14:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/wbadmin-weaponized-the-silent-credential-dumping-behind-bumblebee-enterprise-attacks</loc>
		<lastmod>2025-10-10T14:48:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/remcos-rat-campaigns-escalate-advanced-evasion-and-infection-techniques-uncovered</loc>
		<lastmod>2025-10-10T14:47:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/remcos-rat-campaigns-escalate-advanced-evasion-and-infection-techniques-uncovered</loc>
		<lastmod>2025-10-10T14:46:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/concealing-execution-flows-device-credential-deployment-and-the-art-of-persistent-intrusion</loc>
		<lastmod>2025-10-10T14:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/concealing-execution-flows-device-credential-deployment-and-the-art-of-persistent-intrusion</loc>
		<lastmod>2025-10-10T14:44:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/when-malicious-traffic-blends-in-trojan-proxies-leveraging-dns-over-https-for-stealth</loc>
		<lastmod>2025-10-10T14:43:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/when-malicious-traffic-blends-in-trojan-proxies-leveraging-dns-over-https-for-stealth</loc>
		<lastmod>2025-10-10T14:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/how-stealth-falcon-abused-webdav-zero-day-cve-2025-33053-before-microsoft-patch</loc>
		<lastmod>2025-10-10T14:42:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/how-stealth-falcon-abused-webdav-zero-day-cve-2025-33053-before-microsoft-patch</loc>
		<lastmod>2025-10-10T14:42:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/the-italian-rat-campaign-when-malicious-jars-wear-the-mask-of-innocent-png-images</loc>
		<lastmod>2025-10-10T14:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/the-italian-rat-campaign-when-malicious-jars-wear-the-mask-of-innocent-png-images</loc>
		<lastmod>2025-10-10T14:41:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/inside-ghosting-amsi-a-novel-patchless-method-to-bypass-windows-anti-malware-defenses</loc>
		<lastmod>2025-10-10T14:41:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/inside-ghosting-amsi-a-novel-patchless-method-to-bypass-windows-anti-malware-defenses</loc>
		<lastmod>2025-10-10T14:41:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/unveiling-earth-alux-vargeit-backdoor-leveraging-legitimate-debuggers-for-cyber-espionage</loc>
		<lastmod>2025-10-10T14:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/unveiling-earth-alux-vargeit-backdoor-leveraging-legitimate-debuggers-for-cyber-espionage</loc>
		<lastmod>2025-10-10T14:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/massive-reach-agile-tactics-inside-luminousmoth-southeast-asia-cyber-spree</loc>
		<lastmod>2025-10-10T14:39:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/massive-reach-agile-tactics-inside-luminousmoth-southeast-asia-cyber-spree</loc>
		<lastmod>2025-10-10T14:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/the-dark-side-of-windows-sandbox-a-new-frontier-for-stealthy-threats</loc>
		<lastmod>2025-10-10T14:36:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/the-dark-side-of-windows-sandbox-a-new-frontier-for-stealthy-threats</loc>
		<lastmod>2025-10-10T14:36:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/stately-taurus-abuses-keyscramble-to-stealthily-exfiltrate-data-from-asian-governments</loc>
		<lastmod>2025-10-10T14:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/stately-taurus-abuses-keyscramble-to-stealthily-exfiltrate-data-from-asian-governments</loc>
		<lastmod>2025-10-10T14:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/tracking-darkpinks-rapid-ttp-changes-staying-ahead-in-the-intelligence-driven-defense</loc>
		<lastmod>2025-10-10T14:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/tracking-darkpinks-rapid-ttp-changes-staying-ahead-in-the-intelligence-driven-defense</loc>
		<lastmod>2025-10-10T14:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/cve-2024-12084-critical-rsync-heap-buffer-overflow-opens-door-to-remote-code-execution</loc>
		<lastmod>2025-10-10T14:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/cve-2024-12084-critical-rsync-heap-buffer-overflow-opens-door-to-remote-code-execution</loc>
		<lastmod>2025-10-10T14:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/mustang-panda-espionage-campaign-reveals-rare-hex-staging-technique-to-evade-detection</loc>
		<lastmod>2025-10-10T14:33:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/mustang-panda-espionage-campaign-reveals-rare-hex-staging-technique-to-evade-detection</loc>
		<lastmod>2025-10-10T14:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/inside-the-latest-italian-xworm-campaign-enhanced-persistence-to-confuse-dfir-investigations</loc>
		<lastmod>2025-10-10T14:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/inside-the-latest-italian-xworm-campaign-enhanced-persistence-to-confuse-dfir-investigations</loc>
		<lastmod>2025-10-10T14:31:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/active-directory-enumeration-evolved-exploring-soaphound-s-exploitation-of-adws</loc>
		<lastmod>2025-10-10T14:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/active-directory-enumeration-evolved-exploring-soaphound-s-exploitation-of-adws</loc>
		<lastmod>2025-10-10T14:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/en/labs/breaking-conditional-access-new-black-hat-eu-research-on-token-manipulation-threats</loc>
		<lastmod>2025-10-10T14:28:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://sorintsec.ai/labs/breaking-conditional-access-new-black-hat-eu-research-on-token-manipulation-threats</loc>
		<lastmod>2025-10-10T14:27:46+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->