<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://www.decryptiondigest.com</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/sponsor</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/about</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/media-kit</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.65</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/newsletter</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/author/eric-bang</loc>
<lastmod>2026-04-17T16:19:32.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/booking-com-storm-1865-clickfix-reservation-breach</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Dark web marketplace for stolen data.png</image:loc>
</image:image>
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/forticlient-ems-cve-2026-35616-weekly-roundup</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Unauthorized access and escalating risks.png</image:loc>
</image:image>
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/nginx-ui-cve-2026-33032-mcpwn-authentication-bypass</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/malicious-chrome-extensions-oauth2-token-theft</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Dark web marketplace for stolen data.png</image:loc>
</image:image>
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/patch-tuesday-april-2026</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware threat intelligence report snapshot.png</image:loc>
</image:image>
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/north-korea-supply-chain-1700-packages</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker infront of computer.png</image:loc>
</image:image>
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/chrome-zero-day-cve-2026-5281</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker infront of computer.png</image:loc>
</image:image>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/qilin-byovd-edr-silencing</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cyber threat dashboard_ Lockbit intrusion.png</image:loc>
</image:image>
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-44228-log4shell-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity malware activity dashboard.png</image:loc>
</image:image>
<lastmod>2021-12-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2017-0144-eternalblue-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware threat intelligence report snapshot.png</image:loc>
</image:image>
<lastmod>2017-05-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-26855-proxylogon-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Data breach and exposed information.png</image:loc>
</image:image>
<lastmod>2021-03-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2020-1472-zerologon-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2020-09-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2014-0160-heartbleed-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Encrypted threat in the dark.png</image:loc>
</image:image>
<lastmod>2014-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-34527-printnightmare-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware activity tracking dashboard.png</image:loc>
</image:image>
<lastmod>2021-07-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-30190-follina-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2022-06-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2019-0708-bluekeep-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Unauthorized access and escalating risks.png</image:loc>
</image:image>
<lastmod>2019-05-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2017-5638-apache-struts-equifax-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Out-of-date Apache HTTP Server alert.png</image:loc>
</image:image>
<lastmod>2017-03-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2020-0796-smbghost-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity threat overview and targets.png</image:loc>
</image:image>
<lastmod>2020-03-12T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-26084-confluence-ognl-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker in a cybercrime investigation.png</image:loc>
</image:image>
<lastmod>2021-08-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-22965-spring4shell-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Leaked data in a digital world.png</image:loc>
</image:image>
<lastmod>2022-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-41040-proxynotshell-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cyber threat dashboard_ Lockbit intrusion.png</image:loc>
</image:image>
<lastmod>2022-09-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-23397-outlook-ntlm-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Dark web marketplace for stolen data.png</image:loc>
</image:image>
<lastmod>2023-03-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-20198-cisco-ios-xe-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Brute force attack in progress.png</image:loc>
</image:image>
<lastmod>2023-10-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-40444-mshtml-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker infront of computer.png</image:loc>
</image:image>
<lastmod>2021-09-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2019-11510-pulse-secure-vpn-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2019-08-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-21985-vmware-vcenter-rce-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity malware activity dashboard.png</image:loc>
</image:image>
<lastmod>2021-05-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2018-13379-fortinet-fortigate-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Unauthorized access and escalating risks.png</image:loc>
</image:image>
<lastmod>2019-05-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-34473-proxyshell-exchange-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware threat intelligence report snapshot.png</image:loc>
</image:image>
<lastmod>2021-07-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-26134-confluence-ognl-2-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2022-06-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-27101-accellion-fta-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Data breach and exposed information.png</image:loc>
</image:image>
<lastmod>2021-01-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2020-5902-f5-big-ip-explained</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Encrypted threat in the dark.png</image:loc>
</image:image>
<lastmod>2020-07-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2019-19781-citrix-adc-gateway-path-traversal</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2019-12-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2014-6271-shellshock-bash-vulnerability</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker in a cybercrime investigation.png</image:loc>
</image:image>
<lastmod>2014-09-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-3156-baron-samedit-sudo-heap-overflow</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Unauthorized access and escalating risks.png</image:loc>
</image:image>
<lastmod>2021-01-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-34362-moveit-transfer-sql-injection</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Leaked data in a digital world.png</image:loc>
</image:image>
<lastmod>2023-06-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-0847-dirty-pipe-linux-kernel</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Encrypted threat in the dark.png</image:loc>
</image:image>
<lastmod>2022-03-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-4034-pwnkit-polkit-pkexec</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Brute force attack in progress.png</image:loc>
</image:image>
<lastmod>2022-01-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-4966-citrix-bleed-netscaler-session-hijacking</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity threat overview and targets.png</image:loc>
</image:image>
<lastmod>2023-10-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-1388-f5-big-ip-icontrol-rest-auth-bypass</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Dark web marketplace for stolen data.png</image:loc>
</image:image>
<lastmod>2022-05-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2020-14882-oracle-weblogic-console-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware activity tracking dashboard.png</image:loc>
</image:image>
<lastmod>2020-10-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-27997-fortinet-fortios-ssl-vpn-heap-overflow</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cyber threat dashboard_ Lockbit intrusion.png</image:loc>
</image:image>
<lastmod>2023-06-12T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-22515-confluence-broken-access-control</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2023-10-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-3400-palo-alto-pan-os-globalprotect-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-04-12T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-6387-regresshion-openssh-race-condition-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Brute force attack in progress.png</image:loc>
</image:image>
<lastmod>2024-07-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-42793-jetbrains-teamcity-auth-bypass</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2023-09-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-46604-apache-activemq-rce-openwire</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Out-of-date Apache HTTP Server alert.png</image:loc>
</image:image>
<lastmod>2023-10-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-1709-connectwise-screenconnect-auth-bypass</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Unauthorized access and escalating risks.png</image:loc>
</image:image>
<lastmod>2024-02-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-38831-winrar-rce-crafted-archive</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity malware activity dashboard.png</image:loc>
</image:image>
<lastmod>2023-08-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-0669-goanywhere-mft-rce-clop-ransomware</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cyber threat dashboard_ Lockbit intrusion.png</image:loc>
</image:image>
<lastmod>2023-02-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-46805-cve-2024-21887-ivanti-connect-secure-zero-day</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-01-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-21762-fortinet-fortios-ssl-vpn-out-of-bounds-write</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity threat overview and targets.png</image:loc>
</image:image>
<lastmod>2024-02-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-3519-citrix-netscaler-adc-gateway-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity exploit path diagram.png</image:loc>
</image:image>
<lastmod>2023-07-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-47966-manageengine-zoho-rce-saml</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Malware activity tracking dashboard.png</image:loc>
</image:image>
<lastmod>2023-01-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-44487-http2-rapid-reset-ddos</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cybersecurity malware activity dashboard.png</image:loc>
</image:image>
<lastmod>2023-10-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-28252-windows-clfs-privilege-escalation-nokoyawa</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Encrypted threat in the dark.png</image:loc>
</image:image>
<lastmod>2023-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-47575-fortinet-fortimanager-missing-auth-fortijump</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Hacker in a cybercrime investigation.png</image:loc>
</image:image>
<lastmod>2024-10-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-37085-vmware-esxi-active-directory-auth-bypass</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Cyber threat dashboard_ Lockbit intrusion.png</image:loc>
</image:image>
<lastmod>2024-06-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-4577-php-cgi-argument-injection-windows</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-06-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2023-36884-windows-search-rce-storm-0978</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2023-07-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-23897-jenkins-cli-arbitrary-file-read</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-01-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2021-22005-vmware-vcenter-analytics-file-upload-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2021-09-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-38094-sharepoint-rce-deserialization</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-07-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-30078-windows-wifi-driver-rce</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-06-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2022-3236-sophos-firewall-code-injection</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2022-09-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.decryptiondigest.com/blog/cve-2024-21413-microsoft-outlook-moniker-link-ntlm-leak</loc>
<image:image>
<image:loc>https://www.decryptiondigest.com/images/Attack surface map in cyberpunk style.png</image:loc>
</image:image>
<lastmod>2024-02-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
</urlset>
