<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/squirrly-seo/view/assets/css/sitemap.xsl"?>
<!-- generated-on="2026-04-03T23:19:51+00:00" -->
<!-- generator="Squirrly SEO Sitemap" -->
<!-- generator-url="https://wordpress.org/plugins/squirrly-seo/" -->

<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" >
	<url>
		<loc>https://teamwin.in/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/</loc>
		<lastmod>2026-04-03T12:06:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Phorpiex-Botnet-to-Spread-Ransomware-Sextortion-and-Crypto-Clipping-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Phorpiex-Botnet-to-Spread-Ransomware-Sextortion-and-Crypto-Clipping-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-venom-stealer-to-turn-clickfix-lures-into-full-data-exfiltration-pipelines/</loc>
		<lastmod>2026-04-03T12:05:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Venom-Stealer-to-Turn-ClickFix-Lures-Into-Full-Data-Exfiltration-Pipelines-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Venom-Stealer-to-Turn-ClickFix-Lures-Into-Full-Data-Exfiltration-Pipelines-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/</loc>
		<lastmod>2026-04-03T12:04:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Malicious-Chrome-extension-ChatGPT-Ad-Blocker-steals-ChatGPT-conversations-218x150-1.webp</image:loc>
			<image:title>Malicious-Chrome-extension-ChatGPT-Ad-Blocker-steals-ChatGPT-conversations-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-forcing-upgrades-to-unmanaged-windows-11-version-24h2/</loc>
		<lastmod>2026-04-03T09:58:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Forcing-Upgrades-Windows-11-218x150-1.webp</image:loc>
			<image:title>Microsoft-Forcing-Upgrades-Windows-11-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-tp-link-vulnerabilities-let-attackers-trigger-dos-and-crash-routers/</loc>
		<lastmod>2026-04-03T09:18:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Multiple-TP-Link-Vulnerabilities-Let-Attackers-Trigger-DoS-and-Crash-Routers-218x150-1.webp</image:loc>
			<image:title>Multiple-TP-Link-Vulnerabilities-Let-Attackers-Trigger-DoS-and-Crash-Routers--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cert-eu-confirms-trivy-supply-chain-attack-led-to-european-commission-aws-breach/</loc>
		<lastmod>2026-04-03T08:27:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/European-Commission-Breach-Trivy-218x150-1.webp</image:loc>
			<image:title>European-Commission-Breach-Trivy-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-compromised-700-next-js-hosts-by-exploiting-react2shell-vulnerability/</loc>
		<lastmod>2026-04-03T08:27:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Compromised-700-Next.js-hosts-by-Exploiting-React2Shell-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Hackers-Compromised-700-Next.js-hosts-by-Exploiting-React2Shell-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korea-linked-hackers-compromise-axios-npm-package-in-major-supply-chain-attack/</loc>
		<lastmod>2026-04-03T06:54:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korea-Related-Campaign-Abuses-GitHub-as-C2-in-New-LNK-Phishing-Attacks-218x150-2.webp</image:loc>
			<image:title>North-Korea-Related-Campaign-Abuses-GitHub-as-C2-in-New-LNK-Phishing-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korea-related-campaign-abuses-github-as-c2-in-new-lnk-phishing-attacks/</loc>
		<lastmod>2026-04-03T06:53:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korea-Related-Campaign-Abuses-GitHub-as-C2-in-New-LNK-Phishing-Attacks-218x150-1.webp</image:loc>
			<image:title>North-Korea-Related-Campaign-Abuses-GitHub-as-C2-in-New-LNK-Phishing-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/20-best-application-performance-monitoring-tools-in-2026/</loc>
		<lastmod>2026-04-03T06:13:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Application-Performance-Monitoring-Tools.jpg</image:loc>
			<image:title>Application Performance Monitoring Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/best-vpn-for-linux-in-2026/</loc>
		<lastmod>2026-04-03T06:12:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Best-VPN-for-Linux.jpg</image:loc>
			<image:title>Best VPN for Linux</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit/</loc>
		<lastmod>2026-04-03T04:49:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Apple-Expands-shield-labeled-iOS-18.7.7-to-protect-users-from-DarkSword-Exploit-218x150-1.webp</image:loc>
			<image:title>Apple-Expands-shield-labeled-iOS-18.7.7-to-protect-users-from-DarkSword-Exploit-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-details-steps-to-mitigate-the-axios-npm-supply-chain-compromise/</loc>
		<lastmod>2026-04-03T04:48:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Details-Steps-to-Mitigate-the-Axios-npm-Supply-Chain-Compromise-218x150-1.webp</image:loc>
			<image:title>Microsoft-Details-Steps-to-Mitigate-the-Axios-npm-Supply-Chain-Compromise-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-chrome-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-03T04:47:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Chrome-0-Day-Vulnerability-Actively-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Chrome-0-Day-Vulnerability-Actively-Exploited-in-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/novoice-on-google-play-with-22-exploits-attacks-millions-of-android-users/</loc>
		<lastmod>2026-04-03T04:46:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/NoVoice-on-Google-Play-with-22-Exploits-Attacks-Millions-of-Android-Users-218x150-1.webp</image:loc>
			<image:title>NoVoice-on-Google-Play-with-22-Exploits-Attacks-Millions-of-Android-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/</loc>
		<lastmod>2026-04-03T04:44:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/OpenSSH-10.3-Release-218x150-1.webp</image:loc>
			<image:title>OpenSSH-10.3-Release-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-docx-rtf-js-and-python-in-stealthy-boeing-rfq-malware-campaign/</loc>
		<lastmod>2026-04-03T04:43:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-DOCX-RTF-JS-and-Python-in-Stealthy-Boeing-RFQ-Malware-Campaign-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-DOCX-RTF-JS-and-Python-in-Stealthy-Boeing-RFQ-Malware-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/</loc>
		<lastmod>2026-04-03T04:42:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Qilin-Ransomware-Kill-EDR-218x150-1.webp</image:loc>
			<image:title>Qilin-Ransomware-Kill-EDR-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/</loc>
		<lastmod>2026-04-03T04:41:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Adobe-Breach-218x150-2.webp</image:loc>
			<image:title>Adobe-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-akira-lookalike-ransomware-campaign-targeting-windows-users-in-south-america/</loc>
		<lastmod>2026-04-03T04:40:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Akira-Lookalike-Ransomware-Campaign-Targeting-Windows-Users-in-South-America-218x150-1.webp</image:loc>
			<image:title>New-Akira-Lookalike-Ransomware-Campaign-Targeting-Windows-Users-in-South-America-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/</loc>
		<lastmod>2026-04-03T04:39:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Elite-SOCs-Reduce-Escalations-With-Better-Threat-Intelligence-1.jpg</image:loc>
			<image:title>Elite SOCs Reduce Escalations With Better Threat Intelligence (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records/</loc>
		<lastmod>2026-04-03T04:37:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Adobe-Breach-218x150-1.webp</image:loc>
			<image:title>Adobe-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/current-activities-multiple-software-supply-chain-attacks-targeting-open-source-packages-and-developer-tools/</loc>
		<lastmod>2026-04-02T15:19:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0170-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-04-02T15:16:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0169-multiple-vulnerabilities-in-qnap-products/</loc>
		<lastmod>2026-04-02T15:14:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0168-multiple-vulnerabilities-in-nginx/</loc>
		<lastmod>2026-04-02T15:11:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0167-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-04-02T15:07:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0166-multiple-vulnerabilities-in-mozilla-products/</loc>
		<lastmod>2026-04-02T15:03:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0165-cisco-ikev2-denial-of-service-vulnerability/</loc>
		<lastmod>2026-04-02T14:58:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0164-cisco-ios-xe-software-dhcp-snooping-denial-of-service-vulnerability/</loc>
		<lastmod>2026-04-02T14:55:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0163-cisco-ios-and-ios-xe-software-http-server-denial-of-service-vulnerability/</loc>
		<lastmod>2026-04-02T14:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0162-cisco-ios-xe-wireless-controller-software-capwap-denial-of-service-vulnerability/</loc>
		<lastmod>2026-04-02T14:48:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0161-cisco-ios-xe-software-tls-memory-exhaustion-denial-of-service-vulnerability/</loc>
		<lastmod>2026-04-02T14:46:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0160-secure-boot-bypass-vulnerability-in-cisco/</loc>
		<lastmod>2026-04-02T14:21:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-zap-ptk-add-on-maps-browser-based-security-findings-as-native-alert-into-zap/</loc>
		<lastmod>2026-04-02T11:55:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-ZAP-PTK-Add-On-Maps-Browser-Based-Security-Findings-as-Native-Alert-Into-ZAP-218x150-1.webp</image:loc>
			<image:title>New-ZAP-PTK-Add-On-Maps-Browser-Based-Security-Findings-as-Native-Alert-Into-ZAP-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/whatsapp-warns-users-targeted-by-spyware-attack-via-weaponized-version-of-the-app/</loc>
		<lastmod>2026-04-02T11:54:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/WhatsApp-Warns-200-Users-218x150-1.webp</image:loc>
			<image:title>WhatsApp-Warns-200-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-warns-of-chinese-mobile-apps-may-expose-user-data-to-cyberattacks/</loc>
		<lastmod>2026-04-02T11:13:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/FBI-Warns-of-Chinese-Mobile-Apps-May-Expose-User-Data-to-Cyberattacks-218x150-1.webp</image:loc>
			<image:title>FBI-Warns-of-Chinese-Mobile-Apps-May-Expose-User-Data-to-Cyberattacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ta416-expands-espionage-operations-across-europe-with-web-bug-recon-and-malware-delivery/</loc>
		<lastmod>2026-04-02T11:12:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/TA416-Expands-Espionage-Operations-Across-Europe-With-Web-Bug-Recon-and-Malware-Delivery-218x150-1.webp</image:loc>
			<image:title>TA416-Expands-Espionage-Operations-Across-Europe-With-Web-Bug-Recon-and-Malware-Delivery-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-px4-autopilot-vulnerability-let-attackers-gain-control-over-the-drones/</loc>
		<lastmod>2026-04-02T11:11:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-PX4-Autopilot-Vulnerability-Let-Attackers-Gain-Drones-1-218x150-1.webp</image:loc>
			<image:title>Critical-PX4-Autopilot-Vulnerability-Let-Attackers-Gain-Drones-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/oracle-lays-off-30000-employees-to-ramp-up-investment-in-ai-technologies/</loc>
		<lastmod>2026-04-02T11:10:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Oracle-Lays-Off-30000-Employees-218x150-1.webp</image:loc>
			<image:title>Oracle-Lays-Off-30000-Employees-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-smart-software-manager-vulnerability-let-attackers-execute-arbitrary-commands/</loc>
		<lastmod>2026-04-02T11:09:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Cisco-Smart-Software-Manager-Vulnerability-Let-Attackers-Execute-Arbitrary-Commands-218x150-1.webp</image:loc>
			<image:title>Critical-Cisco-Smart-Software-Manager-Vulnerability-Let-Attackers-Execute-Arbitrary-Commands-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-whatsapp-attack-chain-uses-vbs-scripts-cloud-downloads-and-msi-backdoors/</loc>
		<lastmod>2026-04-02T08:55:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-WhatsApp-Attack-Chain-Uses-VBS-Scripts-Cloud-Downloads-and-MSI-Backdoors-218x150-1.webp</image:loc>
			<image:title>New-WhatsApp-Attack-Chain-Uses-VBS-Scripts-Cloud-Downloads-and-MSI-Backdoors-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/remcos-rat-infection-chain-hides-behind-obfuscated-scripts-and-trusted-windows-binaries/</loc>
		<lastmod>2026-04-02T08:16:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Remcos-RAT-Infection-Chain-Hides-Behind-Obfuscated-Scripts-and-Trusted-Windows-Binaries-218x150-1.webp</image:loc>
			<image:title>Remcos-RAT-Infection-Chain-Hides-Behind-Obfuscated-Scripts-and-Trusted-Windows-Binaries-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/symantec-dlp-agent-vulnerability-let-attackers-escalate-privileges/</loc>
		<lastmod>2026-04-02T08:11:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Symantec-DLP-Agent-Vulnerability-Let-Attackers-Escalate-Privileges-218x150-1.webp</image:loc>
			<image:title>Symantec-DLP-Agent-Vulnerability-Let-Attackers-Escalate-Privileges-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-cisco-imc-vulnerability-let-attackers-bypass-authentication/</loc>
		<lastmod>2026-04-02T07:58:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Cisco-Integrated-Management-Controller-Vulnerability-Let-Attackers-Bypass-Authentication-218x150-1.webp</image:loc>
			<image:title>Critical-Cisco-Integrated-Management-Controller-Vulnerability-Let-Attackers-Bypass-Authentication-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/starbucks-breach-attacks-allegedly-claim-10gb-of-stolen-source-code/</loc>
		<lastmod>2026-04-02T07:56:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/starbucks-breach-218x150-1.webp</image:loc>
			<image:title>starbucks-breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/10-best-vpn-for-privacy-in-2026/</loc>
		<lastmod>2026-04-02T06:07:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Best-VPN-For-Privacy.jpg</image:loc>
			<image:title>Best VPN For Privacy</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/top-20-best-digital-forensic-tools-in-2026/</loc>
		<lastmod>2026-04-02T05:52:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Best-Digital-Forensic-Tools.jpg</image:loc>
			<image:title>Best Digital Forensic Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/russian-hackers-using-remote-access-toolkit-ctrl-for-rdp-hijacking/</loc>
		<lastmod>2026-04-02T05:23:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Russian-Hackers-Using-remote-access-toolkit-CTRL-for-RDP-hijacking-218x150-1.webp</image:loc>
			<image:title>Russian-Hackers-Using-remote-access-toolkit-CTRL-for-RDP-hijacking--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-chrome-zero-day-vulnerability-actively-exploited-in-attacks-patch-now/</loc>
		<lastmod>2026-04-02T05:21:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Chrome-Zero-Day-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Chrome-Zero-Day-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-clouds-vertex-ai-platform-vulnerability-allow-attackers-to-access-sensitive-data/</loc>
		<lastmod>2026-04-02T05:11:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Clouds-Vertex-AI-platform-Vulnerability-Allow-Attackers-to-Access-Sensitive-Data-1-218x150-1.webp</image:loc>
			<image:title>Google-Clouds-Vertex-AI-platform-Vulnerability-Allow-Attackers-to-Access-Sensitive-Data-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/magecart-hackers-uses-100-domains-to-hijack-estores-checkouts-and-steal-card-data/</loc>
		<lastmod>2026-04-02T05:09:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Magecart-Hijacks-eStore-Checkouts-to-Steal-Card-Data-1.jpg</image:loc>
			<image:title>Magecart Hijacks eStore Checkouts to Steal Card Data (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-to-remove-exif-data-for-images-shared-on-teams/</loc>
		<lastmod>2026-04-02T05:08:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-to-remove-EXIF-data-for-images-shared-on-Teams-218x150-1.webp</image:loc>
			<image:title>Microsoft-to-remove-EXIF-data-for-images-shared-on-Teams-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/public-poc-exploit-released-for-nginx-ui-backup-restore-vulnerability/</loc>
		<lastmod>2026-04-02T05:07:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Public-PoC-Exploit-Released-for-nginx-ui-Backup-Restore-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Public-PoC-Exploit-Released-for-nginx-ui-Backup-Restore-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vim-modeline-bypass-vulnerability-let-attackers-execute-arbitrary-os-commands/</loc>
		<lastmod>2026-04-02T05:06:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Vim-Modeline-bypass-Vulnerability-Let-Attackers-Execute-arbitrary-OS-commands-218x150-1.webp</image:loc>
			<image:title>Vim-Modeline-bypass-Vulnerability-Let-Attackers-Execute-arbitrary-OS-commands-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-actively-exploiting-critical-weblogic-rce-vulnerabilities-in-attacks/</loc>
		<lastmod>2026-04-02T04:36:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Actively-Exploiting-Critical-WebLogic-RCE-Vulnerabilities-in-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Actively-Exploiting-Critical-WebLogic-RCE-Vulnerabilities-in-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hsbc-india-asks-customers-to-use-all-uppercase-passwords/</loc>
		<lastmod>2026-04-02T04:33:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/HSBC-India-Uppercase-Passwords-218x150-1.webp</image:loc>
			<image:title>HSBC-India-Uppercase-Passwords-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-etherrat-and-etherhiding-to-hide-malware-infrastructure-on-ethereum/</loc>
		<lastmod>2026-04-02T04:31:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-EtherRAT-and-EtherHiding-to-Hide-Malware-Infrastructure-on-Ethereum-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-EtherRAT-and-EtherHiding-to-Hide-Malware-Infrastructure-on-Ethereum-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-source-code-and-data-leak-allegedly-claimed-by-shinyhunters/</loc>
		<lastmod>2026-04-01T12:13:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Cisco-Source-Code-and-Data-Leak-1-218x150-1.webp</image:loc>
			<image:title>Cisco-Source-Code-and-Data-Leak-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-hijack-hotel-booking-workflows-to-scam-guests-with-fake-payment-requests/</loc>
		<lastmod>2026-04-01T12:11:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Hijack-Hotel-Booking-Workflows-to-Scam-Guests-With-Fake-Payment-Requests-218x150-1.webp</image:loc>
			<image:title>Hackers-Hijack-Hotel-Booking-Workflows-to-Scam-Guests-With-Fake-Payment-Requests-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-push-crystalx-malware-as-a-service-through-telegram-with-stealer-and-rat-features/</loc>
		<lastmod>2026-04-01T12:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Push-CrystalX-Malware-as-a-Service-Through-Telegram-With-Stealer-and-RAT-Features-218x150-1.webp</image:loc>
			<image:title>Hackers-Push-CrystalX-Malware-as-a-Service-Through-Telegram-With-Stealer-and-RAT-Features-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-11-emergency-update-to-fix-installation-loop-issues/</loc>
		<lastmod>2026-04-01T11:24:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-11-emergency-update-to-fix-installation-loop-issues-218x150-1.webp</image:loc>
			<image:title>Windows-11-emergency-update-to-fix-installation-loop-issues--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/png-vulnerabilities-allow-attackers-to-trigger-process-crashes-leak-sensitive-information/</loc>
		<lastmod>2026-04-01T10:47:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/PNG-Vulnerabilities-allow-attackers-to-trigger-process-crashes-leak-sensitive-information-218x150-1.webp</image:loc>
			<image:title>PNG-Vulnerabilities-allow-attackers-to-trigger-process-crashes-leak-sensitive-information-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-backdoor-telnyx-python-sdk-on-pypi-to-steal-credentials-across-windows-macos-and-linux/</loc>
		<lastmod>2026-04-01T10:46:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Backdoor-Telnyx-Python-SDK-on-PyPI-to-Steal-Credentials-Across-Windows-macOS-and-Linux-218x150-1.webp</image:loc>
			<image:title>Hackers-Backdoor-Telnyx-Python-SDK-on-PyPI-to-Steal-Credentials-Across-Windows-macOS-and-Linux-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-npm-supply-chain-attack-uses-undicy-http-to-deploy-screen-streaming-rat-and-browser-injector/</loc>
		<lastmod>2026-04-01T10:44:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-npm-Supply-Chain-Attack-Uses-undicy-http-to-Deploy-Screen-Streaming-RAT-and-Browser-Injector-218x150-1.webp</image:loc>
			<image:title>New-npm-Supply-Chain-Attack-Uses-undicy-http-to-Deploy-Screen-Streaming-RAT-and-Browser-Injector-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korean-hackers-compromise-widely-used-axios-package-to-infect-windows-macos-and-linux-systems/</loc>
		<lastmod>2026-04-01T10:43:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korean-Hackers-Compromise-Widely-Used-Axios-Package-to-Infect-Windows-macOS-and-Linux-Systems-218x150-1.webp</image:loc>
			<image:title>North-Korean-Hackers-Compromise-Widely-Used-Axios-Package-to-Infect-Windows-macOS-and-Linux-Systems-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/xloader-malware-upgrades-obfuscation-tactics-and-hides-c2-traffic-behind-decoy-servers/</loc>
		<lastmod>2026-04-01T07:07:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/XLoader-Malware-Upgrades-Obfuscation-Tactics-and-Hides-C2-Traffic-Behind-Decoy-Servers-218x150-1.webp</image:loc>
			<image:title>XLoader-Malware-Upgrades-Obfuscation-Tactics-and-Hides-C2-Traffic-Behind-Decoy-Servers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mercor-ai-confirms-data-breach-following-lapsus-claims-of-4tb-data-theft/</loc>
		<lastmod>2026-04-01T05:26:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Mercor-AI-Confirms-Data-Breach-Following-Lapsus-Claims-of-4TB-Data-Theft-218x150-1.webp</image:loc>
			<image:title>Mercor-AI-Confirms-Data-Breach-Following-Lapsus-Claims-of-4TB-Data-Theft-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-now-allows-you-to-change-your-gmail-com-address-in-a-few-simple-steps/</loc>
		<lastmod>2026-04-01T05:25:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Change-Gmail-Address-218x150-1.webp</image:loc>
			<image:title>Google-Change-Gmail-Address-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-weaponize-legitimate-windows-tools-to-disable-antivirus-before-ransomware-attacks/</loc>
		<lastmod>2026-04-01T04:41:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Weaponize-Legitimate-Windows-Tools-to-Disable-Antivirus-Before-Ransomware-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Weaponize-Legitimate-Windows-Tools-to-Disable-Antivirus-Before-Ransomware-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-unveils-ransomware-detection-and-file-restoration-for-google-drive/</loc>
		<lastmod>2026-04-01T04:40:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-unveils-Ransomware-Detection-and-File-Restoration-for-Google-Drive-218x150-1.webp</image:loc>
			<image:title>Google-unveils-Ransomware-Detection-and-File-Restoration-for-Google-Drive-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-deploy-telegram-based-resokerrat-with-screenshot-and-persistence-features/</loc>
		<lastmod>2026-04-01T04:39:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Deploy-Telegram-Based-ResokerRAT-With-Screenshot-and-Persistence-Features-218x150-1.webp</image:loc>
			<image:title>Hackers-Deploy-Telegram-Based-ResokerRAT-With-Screenshot-and-Persistence-Features-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/eviltokens-emerges-as-new-phishing-as-a-service-platform-for-microsoft-account-takeover/</loc>
		<lastmod>2026-03-31T12:08:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/EvilTokens-Emerges-as-New-Phishing-as-a-Service-Platform-for-Microsoft-Account-Takeover-218x150-1.webp</image:loc>
			<image:title>EvilTokens-Emerges-as-New-Phishing-as-a-Service-Platform-for-Microsoft-Account-Takeover-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropics-claude-code-source-code-reportedly-leaked-via-their-npm-registry/</loc>
		<lastmod>2026-03-31T12:01:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Claude-Code-Source-Code-Leaked-218x150-1.webp</image:loc>
			<image:title>Claude-Code-Source-Code-Leaked-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/wordpress-plugin-vulnerability-exposes-sensitive-data-from-800000-sites/</loc>
		<lastmod>2026-03-31T11:58:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/WordPress-Plugin-Vulnerability-Exposes-Sensitive-Data-from-800000-Sites-218x150-1.webp</image:loc>
			<image:title>WordPress-Plugin-Vulnerability-Exposes-Sensitive-Data-from-800000-Sites-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chatgpt-vulnerability-let-attackers-silently-exfiltrate-user-prompts-and-other-sensitive-data/</loc>
		<lastmod>2026-03-31T11:56:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ChatGPT-Vulnerability-Let-Attackers-Silently-Exfiltrate-user-Prompts-and-Other-Sensitive-Data-218x150-1.png</image:loc>
			<image:title>ChatGPT-Vulnerability-Let-Attackers-Silently-Exfiltrate-user-Prompts-and-Other-Sensitive-Data--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/carecloud-data-breach-hackers-accessed-it-infrastructure-and-stole-patient-data/</loc>
		<lastmod>2026-03-31T10:52:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CareCloud-Data-Breach-hackers-accessed-IT-infrastructure-and-stole-patient-data-218x150-1.webp</image:loc>
			<image:title>CareCloud-Data-Breach-hackers-accessed-IT-infrastructure-and-stole-patient-data-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-citrix-netscaler-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-31T10:11:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Citrix-NetScaler-vulnerability-Actively-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Citrix-NetScaler-vulnerability-Actively-Exploited-in-Attacks--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-new-macos-tahoe-feature-warns-users-on-clickfix-attacks/</loc>
		<lastmod>2026-03-31T10:10:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apple-new-macOS-Tahoe-feature-Warns-Users-on-ClickFix-attacks-218x150-1.webp</image:loc>
			<image:title>Apple-new-macOS-Tahoe-feature-Warns-Users-on-ClickFix-attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-deepload-malware-uses-clickfix-and-ai-generated-evasion-to-breach-enterprise-networks/</loc>
		<lastmod>2026-03-31T09:18:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-DeepLoad-Malware-Uses-ClickFix-and-AI-Generated-Evasion-to-Breach-Enterprise-Networks-218x150-1.webp</image:loc>
			<image:title>New-DeepLoad-Malware-Uses-ClickFix-and-AI-Generated-Evasion-to-Breach-Enterprise-Networks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybercriminals-abuse-irs-and-tax-filing-lures-to-push-malware-in-new-campaigns/</loc>
		<lastmod>2026-03-31T09:17:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cybercriminals-Abuse-IRS-and-Tax-Filing-Lures-to-Push-Malware-in-New-Campaigns-218x150-1.webp</image:loc>
			<image:title>Cybercriminals-Abuse-IRS-and-Tax-Filing-Lures-to-Push-Malware-in-New-Campaigns-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-deploy-roadk1ll-pivoting-malware-to-turn-compromised-hosts-into-network-relays/</loc>
		<lastmod>2026-03-31T08:27:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Deploy-RoadK1ll-Pivoting-Malware-to-Turn-Compromised-Hosts-Into-Network-Relays-218x150-1.webp</image:loc>
			<image:title>Hackers-Deploy-RoadK1ll-Pivoting-Malware-to-Turn-Compromised-Hosts-Into-Network-Relays-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/12-best-aws-monitoring-tools-in-2026/</loc>
		<lastmod>2026-03-31T05:36:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Best-AWS-Monitoring-Tool.jpg</image:loc>
			<image:title>Best AWS Monitoring Tool</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vim-vulnerability-let-attackers-execute-arbitrary-command-via-weaponized-files/</loc>
		<lastmod>2026-03-31T05:35:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Vim-Vulnerability-Let-Attackers-Execute-arbitrary-command-Via-Weaponized-Files-218x150-1.webp</image:loc>
			<image:title>Vim-Vulnerability-Let-Attackers-Execute-arbitrary-command-Via-Weaponized-Files-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/stored-xss-bug-in-jira-work-management-could-lead-to-full-organization-takeover/</loc>
		<lastmod>2026-03-31T05:32:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Stored-XSS-Bug-in-Jira-Work-Management-Could-Lead-to-Full-Organization-Takeover-1-218x150-1.webp</image:loc>
			<image:title>Stored-XSS-Bug-in-Jira-Work-Management-Could-Lead-to-Full-Organization-Takeover-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/canisterworm-malware-attacking-docker-k8s-redis-to-gain-access-and-steal-secrets/</loc>
		<lastmod>2026-03-31T05:31:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CanisterWorm-Malware-Attacking-Docker-K8s-Redis-to-Gain-Access-and-Steal-Secrets-218x150-1.webp</image:loc>
			<image:title>CanisterWorm-Malware-Attacking-Docker-K8s-Redis-to-Gain-Access-and-Steal-Secrets-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/blankgrabber-stealer-uses-fake-certificate-loader-to-hide-malware-delivery-chain/</loc>
		<lastmod>2026-03-31T05:30:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/BlankGrabber-Stealer-Uses-Fake-Certificate-Loader-to-Hide-Malware-Delivery-Chain-218x150-1.webp</image:loc>
			<image:title>BlankGrabber-Stealer-Uses-Fake-Certificate-Loader-to-Hide-Malware-Delivery-Chain-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/open-vsxs-new-scanner-vulnerability-allows-malicious-extension-goes-live/</loc>
		<lastmod>2026-03-31T05:29:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Open-VSXs-New-Scanner-Vulnerability-Allows-Malicious-Extension-Goes-Live-218x150-1.webp</image:loc>
			<image:title>Open-VSXs-New-Scanner-Vulnerability-Allows-Malicious-Extension-Goes-Live-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-backdoor-telnyx-python-sdk-on-pypi-to-steal-cloud-and-dev-credentials/</loc>
		<lastmod>2026-03-31T05:16:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Backdoor-Telnyx-Python-SDK-on-PyPI-to-Steal-Cloud-and-Dev-Credentials-218x150-1.webp</image:loc>
			<image:title>Hackers-Backdoor-Telnyx-Python-SDK-on-PyPI-to-Steal-Cloud-and-Dev-Credentials-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/notepad-v8-9-3-released-addressing-curl-security-vulnerability-and-crash-issues/</loc>
		<lastmod>2026-03-31T05:14:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Notepad-v8.9.3-Released-218x150-1.webp</image:loc>
			<image:title>Notepad-v8.9.3-Released-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-homoglyph-attack-techniques-help-cybercriminals-spoof-trusted-domains/</loc>
		<lastmod>2026-03-31T05:09:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Homoglyph-Attack-Techniques-Help-Cybercriminals-Spoof-Trusted-Domains-218x150-1.webp</image:loc>
			<image:title>New-Homoglyph-Attack-Techniques-Help-Cybercriminals-Spoof-Trusted-Domains-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ta446-hackers-deploying-darksword-exploit-kit-to-attack-ios-users/</loc>
		<lastmod>2026-03-31T04:42:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/TA446-Hackers-Deploying-DarkSword-Exploit-Kit-to-Attack-iOS-Users-218x150-1.webp</image:loc>
			<image:title>TA446-Hackers-Deploying-DarkSword-Exploit-Kit-to-Attack-iOS-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-clickfix-variant-uses-rundll32-and-webdav-to-evade-powershell-detection/</loc>
		<lastmod>2026-03-31T04:41:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-ClickFix-Variant-Uses-Rundll32-and-WebDAV-to-Evade-PowerShell-Detection-218x150-1.webp</image:loc>
			<image:title>New-ClickFix-Variant-Uses-Rundll32-and-WebDAV-to-Evade-PowerShell-Detection-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/crysome-rat-emerges-as-advanced-net-malware-with-av-killer-and-hvnc-capabilities/</loc>
		<lastmod>2026-03-31T04:40:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CrySome-RAT-Emerges-as-Advanced-.NET-Malware-With-AV-Killer-and-HVNC-Capabilities-218x150-1.webp</image:loc>
			<image:title>CrySome-RAT-Emerges-as-Advanced-.NET-Malware-With-AV-Killer-and-HVNC-Capabilities-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korean-it-worker-allegedly-used-stolen-identity-and-ai-resume-in-job-application-scam/</loc>
		<lastmod>2026-03-31T04:39:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/North-Korean-IT-Worker-Allegedly-Used-Stolen-Identity-and-AI-Resume-in-Job-Application-Scam-218x150-1.webp</image:loc>
			<image:title>North-Korean-IT-Worker-Allegedly-Used-Stolen-Identity-and-AI-Resume-in-Job-Application-Scam-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/exposed-server-reveals-thegentlemen-ransomware-toolkit-victim-credentials-and-ngrok-tokens/</loc>
		<lastmod>2026-03-31T04:38:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Exposed-Server-Reveals-TheGentlemen-Ransomware-Toolkit-Victim-Credentials-and-Ngrok-Tokens-218x150-1.webp</image:loc>
			<image:title>Exposed-Server-Reveals-TheGentlemen-Ransomware-Toolkit-Victim-Credentials-and-Ngrok-Tokens-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-ai-discovers-zero-day-rce-vulnerabilities-in-vim-and-emacs/</loc>
		<lastmod>2026-03-31T04:37:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Claude-AI-0-Day-RCE-Vim-218x150-1.webp</image:loc>
			<image:title>Claude-AI-0-Day-RCE-Vim-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/axios-npm-packages-compromised-to-inject-with-malicious-codes-in-active-supply-chain-attack/</loc>
		<lastmod>2026-03-31T04:36:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Axios-NPM-Packages-Compromised-218x150-1.webp</image:loc>
			<image:title>Axios-NPM-Packages-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/teampcp-supply-chain-attack-allegedly-compromised-databricks-platform/</loc>
		<lastmod>2026-03-30T13:03:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Databricks-TeamPCP-Supply-Chain-218x150-1.webp</image:loc>
			<image:title>Databricks-TeamPCP-Supply-Chain-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-grafana-vulnerabilities-let-attackers-achieve-remote-code-execution/</loc>
		<lastmod>2026-03-30T13:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Grafana-Vulnerabilities-Let-Attackers-achieve-remote-code-execution-218x150-1.webp</image:loc>
			<image:title>Critical-Grafana-Vulnerabilities-Let-Attackers-achieve-remote-code-execution-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-n8n-vulnerability-let-attackers-achieve-remote-code-execution/</loc>
		<lastmod>2026-03-30T12:21:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-n8n-Vulnerability-Let-Attackers-achieve-remote-code-execution-218x150-1.webp</image:loc>
			<image:title>Critical-n8n-Vulnerability-Let-Attackers-achieve-remote-code-execution-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-fortinet-forticlient-ems-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-30T10:53:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Forticlient-EMS-Vulnerability-Exploited-218x150-1.webp</image:loc>
			<image:title>Forticlient-EMS-Vulnerability-Exploited-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/configuring-vlans-on-cisco-switches-a-step-by-step-guide/</loc>
		<lastmod>2026-03-30T10:51:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/How-to-Configure-VLAN-on-Cisco-Switch.jpg</image:loc>
			<image:title>How-to-Configure-VLAN-on-Cisco-Switch</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-vlans-improve-network-segmentation/</loc>
		<lastmod>2026-03-30T09:42:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Network_Segmentation-600x397-1.png</image:loc>
			<image:title>Network_Segmentation-600x397</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/india-set-to-ban-sale-of-hikvision-tp-link-cctv-products-from-april/</loc>
		<lastmod>2026-03-30T08:53:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/India-Ban-CCTV-Products-218x150-1.webp</image:loc>
			<image:title>India-Ban-CCTV-Products-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-prompt-poaching-attack-steals-users-ai-conversations-via-malicious-browser-extensions/</loc>
		<lastmod>2026-03-30T08:29:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Prompt-Poaching-Attack-Steals-Users-AI-Conversations-via-Malicious-Browser-Extensions-218x150-1.webp</image:loc>
			<image:title>New-Prompt-Poaching-Attack-Steals-Users-AI-Conversations-via-Malicious-Browser-Extensions-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/voidlink-malware-framework-shows-that-ai-assisted-malware-is-not-experimental-anymore/</loc>
		<lastmod>2026-03-30T07:11:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/VoidLink-Malware-Framework-Shows-that-AI-assisted-Malware-is-Not-Experimental-Anymore-218x150-1.webp</image:loc>
			<image:title>VoidLink-Malware-Framework-Shows-that-AI-assisted-Malware-is-Not-Experimental-Anymore-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-f5-big-ip-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-03-30T07:09:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/F5-BIG-IP-Vulnerability-Actively-Exploited-218x150-1.webp</image:loc>
			<image:title>F5-BIG-IP-Vulnerability-Actively-Exploited-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybersecurity-companies-stocks-fall-as-anthropic-tests-powerful-new-model/</loc>
		<lastmod>2026-03-30T05:03:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cybersecurity-Stocks-Anthropic-218x150-1.webp</image:loc>
			<image:title>Cybersecurity-Stocks-Anthropic-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-probe-citrix-netscaler-instances-ahead-of-likely-cve-2026-3055-exploitation/</loc>
		<lastmod>2026-03-30T05:02:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Citrix-NetScaler-Instances-Exploited-1-218x150-1.webp</image:loc>
			<image:title>Citrix-NetScaler-Instances-Exploited-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-issues-critical-winre-and-setup-updates-ahead-of-2026-secure-boot-certificate-expiration/</loc>
		<lastmod>2026-03-30T05:01:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Critical-WinRE-Update-218x150-1.webp</image:loc>
			<image:title>Microsoft-Critical-WinRE-Update-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/10-best-log-monitoring-tools-in-2026/</loc>
		<lastmod>2026-03-30T05:00:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Best-Log-Monitoring-Tools.png</image:loc>
			<image:title>Best Log Monitoring Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/10-best-spam-filter-tools-2026/</loc>
		<lastmod>2026-03-30T04:58:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Best-Spam-Filter-Tools.jpg</image:loc>
			<image:title>Best Spam Filter Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/10-best-fraud-detection-tools-in-2026/</loc>
		<lastmod>2026-03-30T04:44:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/10-Best-Fraud-Detection-Tools.jpg</image:loc>
			<image:title>10 Best Fraud Detection Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/european-commission-confirms-cyberattack-following-aws-account-hack/</loc>
		<lastmod>2026-03-28T06:52:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/European-Commission-AWS-Hack-218x150-1.webp</image:loc>
			<image:title>European-Commission-AWS-Hack-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-adds-aquasecurity-trivy-scanner-vulnerability-to-kev-catalog/</loc>
		<lastmod>2026-03-28T06:29:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Adds-Aquasecurity-Trivy-Scanner-Vulnerability-to-KEV-Catalog-1-218x150-1.webp</image:loc>
			<image:title>CISA-Adds-Aquasecurity-Trivy-Scanner-Vulnerability-to-KEV-Catalog-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-11-and-server-2025-update-to-block-untrusted-cross-signed-kernel-drivers-by-default/</loc>
		<lastmod>2026-03-28T06:27:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-and-Server-2025-Update-to-Block-Untrusted-Cross-Signed-Kernel-Drivers-by-Default-1-1-218x150-1.webp</image:loc>
			<image:title>Windows-11-and-Server-2025-Update-to-Block-Untrusted-Cross-Signed-Kernel-Drivers-by-Default-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-chief-kash-patels-gmail-account-was-hacked-by-iranian-hackers/</loc>
		<lastmod>2026-03-28T06:23:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FBI-Chief-Kash-Patel-Gmail-Hacked-218x150-1.webp</image:loc>
			<image:title>FBI-Chief-Kash-Patel-Gmail-Hacked-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-silver-fox-campaign-hits-japanese-businesses-with-tax-themed-phishing-lures/</loc>
		<lastmod>2026-03-28T06:17:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Silver-Fox-Campaign-Hits-Japanese-Businesses-With-Tax-Themed-Phishing-Lures-218x150-1.webp</image:loc>
			<image:title>New-Silver-Fox-Campaign-Hits-Japanese-Businesses-With-Tax-Themed-Phishing-Lures-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-deploy-brushworm-and-brushlogger-against-south-asian-financial-firm/</loc>
		<lastmod>2026-03-28T06:15:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Deploy-BRUSHWORM-and-BRUSHLOGGER-Against-South-Asian-Financial-Firm-218x150-1.webp</image:loc>
			<image:title>Hackers-Deploy-BRUSHWORM-and-BRUSHLOGGER-Against-South-Asian-Financial-Firm-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0159-multiple-vulnerabilities-in-netscaler-adc-and-netscaler-gateway/</loc>
		<lastmod>2026-03-27T14:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0015-multiple-vulnerabilities-in-apple-products/</loc>
		<lastmod>2026-03-27T14:34:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-usb-malware-rats-and-stealers-in-espionage-attacks-on-southeast-asian-government/</loc>
		<lastmod>2026-03-27T11:59:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Use-Phishing-ZIP-Files-to-Deploy-PXA-Stealer-Against-Financial-Firms-1.jpg</image:loc>
			<image:title>Hackers Use Phishing ZIP Files to Deploy PXA Stealer Against Financial Firms (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/telnyx-pypi-package-with-742000-downloads-compromised-in-teampcp-supply-chain-attack/</loc>
		<lastmod>2026-03-27T11:09:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Telnyx-PyPI-Package-Compromised-218x150-1.webp</image:loc>
			<image:title>Telnyx-PyPI-Package-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-phishing-zip-files-to-deploy-pxa-stealer-against-financial-firms/</loc>
		<lastmod>2026-03-27T11:08:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Use-Phishing-ZIP-Files-to-Deploy-PXA-Stealer-Against-Financial-Firms.jpg</image:loc>
			<image:title>Hackers Use Phishing ZIP Files to Deploy PXA Stealer Against Financial Firms</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/red-hat-warns-of-malware-code-embedded-in-popular-linux-tool-allow-unauthorized-access-to-systems/</loc>
		<lastmod>2026-03-27T10:56:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Red-Hat-Warns-of-Malware-code-embedded-in-popular-Linux-tool-allow-unauthorized-Access-to-Systems-1-218x150-1.webp</image:loc>
			<image:title>Red-Hat-Warns-of-Malware-code-embedded-in-popular-Linux-tool-allow-unauthorized-Access-to-Systems-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/understanding-mac-address-tables-in-l2-switches/</loc>
		<lastmod>2026-03-27T10:43:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/MAC-address-tables.png</image:loc>
			<image:title>MAC address tables</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/what-is-a-layer-2-switch-and-how-does-it-work/</loc>
		<lastmod>2026-03-27T09:39:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/layer-2-switch-icon-2.webp</image:loc>
			<image:title>layer 2 switch icon</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/addd55b8ba78a5815ec83b6e7822336ef109c78f4152a24adf398c417b04f95c?ts=1773725432</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-citrix-netscaler-and-gateway-vulnerabilities-let-remote-attackers-leak-sensitive-information/</loc>
		<lastmod>2026-03-27T09:10:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Citrix-NetScaler-and-Gateway-Vulnerabilities-Let-Remote-Attackers-Leak-sensitive-information-1-218x150-1.webp</image:loc>
			<image:title>Critical-Citrix-NetScaler-and-Gateway-Vulnerabilities-Let-Remote-Attackers-Leak-sensitive-information-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-cloudflare-captcha-pages-spread-infiniti-stealer-malware-on-macos-systems/</loc>
		<lastmod>2026-03-27T09:09:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-Cloudflare-CAPTCHA-Pages-Spread-Infiniti-Stealer-Malware-on-macOS-Systems-218x150-1.webp</image:loc>
			<image:title>Fake-Cloudflare-CAPTCHA-Pages-Spread-Infiniti-Stealer-Malware-on-macOS-Systems-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/isc-warns-of-high-severity-kea-dhcp-flaw-that-can-crash-services-remotely/</loc>
		<lastmod>2026-03-27T08:41:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ISC-Warns-of-High-Severity-Kea-DHCP-Flaw-That-Can-Crash-Services-Remotely-1-218x150-1.webp</image:loc>
			<image:title>ISC-Warns-of-High-Severity-Kea-DHCP-Flaw-That-Can-Crash-Services-Remotely-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-windows-error-reporting-vulnerability-lets-attackers-escalate-to-gain-system-access/</loc>
		<lastmod>2026-03-27T08:38:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Windows-Error-Reporting-Vulnerability-Lets-Attackers-Escalate-to-Gain-SYSTEM-Access-1-1-218x150-1.webp</image:loc>
			<image:title>New-Windows-Error-Reporting-Vulnerability-Lets-Attackers-Escalate-to-Gain-SYSTEM-Access-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-torg-grabber-stealer-moves-from-telegram-exfiltration-to-encrypted-rest-api-c2/</loc>
		<lastmod>2026-03-27T05:16:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Torg-Grabber-Stealer-Moves-From-Telegram-Exfiltration-to-Encrypted-REST-API-C2-218x150-1.webp</image:loc>
			<image:title>New-Torg-Grabber-Stealer-Moves-From-Telegram-Exfiltration-to-Encrypted-REST-API-C2-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-screenshot-lures-used-to-infect-web3-support-staff-with-multi-stage-malware/</loc>
		<lastmod>2026-03-27T05:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-Screenshot-Lures-Used-to-Infect-Web3-Support-Staff-With-Multi-Stage-Malware-218x150-1.webp</image:loc>
			<image:title>Fake-Screenshot-Lures-Used-to-Infect-Web3-Support-Staff-With-Multi-Stage-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ghostclaw-ai-assisted-malware-attacking-macos-users-to-deploy-credential-stealing-payloads/</loc>
		<lastmod>2026-03-27T05:12:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/GhostClaw-AI-Assisted-Malware-Attacking-macOS-Users-to-Deploy-Credential-Stealing-Payloads-218x150-1.webp</image:loc>
			<image:title>GhostClaw-AI-Assisted-Malware-Attacking-macOS-Users-to-Deploy-Credential-Stealing-Payloads-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/leakbase-hacker-forum-admin-arrested-in-russia-by-law-enforcement-authorities/</loc>
		<lastmod>2026-03-27T05:10:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/LeakBase-Hacker-Forum-Admin-Arrested-in-Russia-by-Law-enforcement-authorities-1-218x150-1.webp</image:loc>
			<image:title>LeakBase-Hacker-Forum-Admin-Arrested-in-Russia-by-Law-enforcement-authorities-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/tax-audit-phishing-campaign-tied-to-silver-fox-shifts-from-rats-to-python-stealers/</loc>
		<lastmod>2026-03-27T05:01:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Tax-Audit-Phishing-Campaign-Tied-to-Silver-Fox-Shifts-From-RATs-to-Python-Stealers-218x150-1.webp</image:loc>
			<image:title>Tax-Audit-Phishing-Campaign-Tied-to-Silver-Fox-Shifts-From-RATs-to-Python-Stealers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-plant-stealthy-bpfdoor-backdoors-in-telecom-networks-for-long-term-access/</loc>
		<lastmod>2026-03-27T05:00:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/BPFdoor-Backdoors-Telecom-Networks-218x150-1.webp</image:loc>
			<image:title>BPFdoor-Backdoors-Telecom-Networks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-langflow-code-injection-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-27T04:57:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Langflow-Code-Injection-Vulnerability-Exploited-in-Attacks-1-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Langflow-Code-Injection-Vulnerability-Exploited-in-Attacks-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/idrive-for-windows-vulnerability-let-attackers-escalate-privileges/</loc>
		<lastmod>2026-03-27T04:56:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/IDrive-for-Windows-Vulnerability-Let-Attackers-Escalate-Privileges-1-218x150-1.webp</image:loc>
			<image:title>IDrive-for-Windows-Vulnerability-Let-Attackers-Escalate-Privileges-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/leak-bazaar-turns-stolen-corporate-data-into-a-structured-criminal-marketplace/</loc>
		<lastmod>2026-03-27T04:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Leak-Bazaar-Turns-Stolen-Corporate-Data-Into-a-Structured-Criminal-Marketplace-218x150-1.webp</image:loc>
			<image:title>Leak-Bazaar-Turns-Stolen-Corporate-Data-Into-a-Structured-Criminal-Marketplace-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropics-leaked-drafts-expose-powerful-new-ai-model-claude-mythos/</loc>
		<lastmod>2026-03-27T04:51:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Anthropic-Claude-Mythos-218x150-1.webp</image:loc>
			<image:title>Anthropic-Claude-Mythos-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-clickfix-attack-leverage-windows-run-dialog-box-and-macos-terminal-to-deploy-malware/</loc>
		<lastmod>2026-03-27T04:49:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-ClickFix-Attack-Leverage-Windows-Run-Dialog-Box-and-macOS-Terminal-to-Deploy-Malware-218x150-1.webp</image:loc>
			<image:title>New-ClickFix-Attack-Leverage-Windows-Run-Dialog-Box-and-macOS-Terminal-to-Deploy-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/voidlink-rootkit-uses-ebpf-and-kernel-modules-to-hide-deep-inside-linux-systems/</loc>
		<lastmod>2026-03-27T04:48:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/VoidLink-Rootkit-Uses-eBPF-and-Kernel-Modules-to-Hide-Deep-Inside-Linux-Systems-218x150-1.webp</image:loc>
			<image:title>VoidLink-Rootkit-Uses-eBPF-and-Kernel-Modules-to-Hide-Deep-Inside-Linux-Systems-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-nvidia-vulnerabilities-enables-rce-and-dos-attacks/</loc>
		<lastmod>2026-03-27T04:47:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-NVIDIA-Vulnerabilities-Enables-RCE-and-DoS-Attacks-1-1-218x150-1.webp</image:loc>
			<image:title>Critical-NVIDIA-Vulnerabilities-Enables-RCE-and-DoS-Attacks-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-chrome-extension-0-click-vulnerability-enables-silent-prompt-injection-attacks/</loc>
		<lastmod>2026-03-27T04:46:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Claude-Chrome-Extension-0-Click-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Claude-Chrome-Extension-0-Click-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/silver-fox-abuses-stolen-ev-certificates-in-atlascross-rat-malware-campaign/</loc>
		<lastmod>2026-03-27T04:24:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Silver-Fox-Abuses-Stolen-EV-Certificates-218x150-1.webp</image:loc>
			<image:title>Silver-Fox-Abuses-Stolen-EV-Certificates-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/synology-diskstation-manager-vulnerability-allow-remote-attackers-to-execute-arbitrary-commands/</loc>
		<lastmod>2026-03-27T04:17:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Synology-DiskStation-Manager-Vulnerability-Allow-remote-attackers-to-execute-arbitrary-commands-1-218x150-1.webp</image:loc>
			<image:title>Synology-DiskStation-Manager-Vulnerability-Allow-remote-attackers-to-execute-arbitrary-commands-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-secure-firewall-vulnerability-allows-remote-code-execution-as-root-user/</loc>
		<lastmod>2026-03-26T11:53:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-Secure-Firewall-Management-Vulnerability-Allows-remote-attacker-to-execute-arbitrary-code-as-root-1-218x150-1.webp</image:loc>
			<image:title>Cisco-Secure-Firewall-Management-Vulnerability-Allows-remote-attacker-to-execute-arbitrary-code-as-root-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-kiss-loader-malware-uses-early-bird-apc-injection-in-emerging-attack-campaign/</loc>
		<lastmod>2026-03-26T10:53:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Kiss-Loader-Malware-Uses-Early-Bird-APC-Injection-in-Emerging-Attack-Campaign-218x150-1.webp</image:loc>
			<image:title>New-Kiss-Loader-Malware-Uses-Early-Bird-APC-Injection-in-Emerging-Attack-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-launches-ai-safety-bug-bounty-to-detect-ai-specific-vulnerabilities/</loc>
		<lastmod>2026-03-26T10:52:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAI-Safety-Bug-Bounty-218x150-1.webp</image:loc>
			<image:title>OpenAI-Safety-Bug-Bounty-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-entra-id-new-feature-removes-mfa-limitations-for-users/</loc>
		<lastmod>2026-03-26T10:51:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Entra-ID-New-feature-Removes-MFA-limitations-for-Users-1-1-1-218x150-1.webp</image:loc>
			<image:title>Microsoft-Entra-ID-New-feature-Removes-MFA-limitations-for-Users-1-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-npm-install-messages-hide-rat-malware-in-new-open-source-supply-chain-campaign/</loc>
		<lastmod>2026-03-26T08:59:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-npm-Install-Messages-Hide-RAT-Malware-in-New-Open-Source-Supply-Chain-Campaign-218x150-1.webp</image:loc>
			<image:title>Fake-npm-Install-Messages-Hide-RAT-Malware-in-New-Open-Source-Supply-Chain-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-vs-code-security-alerts-on-github-used-to-push-malware-in-widespread-phishing-campaign/</loc>
		<lastmod>2026-03-26T08:55:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-VS-Code-Security-Alerts-on-GitHub-Used-to-Push-Malware-in-Widespread-Phishing-Campaign-218x150-1.webp</image:loc>
			<image:title>Fake-VS-Code-Security-Alerts-on-GitHub-Used-to-Push-Malware-in-Widespread-Phishing-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-configure-trunk-ports-on-l2-switches/</loc>
		<lastmod>2026-03-26T08:30:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/What-is-a-Trunk-Port2.jpg</image:loc>
			<image:title>What-is-a-Trunk-Port2</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/9365ca9eeac665fa89d72d4f0da4d10b901924d637c08cb55210496a037ca2f2?ts=1774267148</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vlan-hopping-attacks-and-how-to-prevent-them/</loc>
		<lastmod>2026-03-26T07:13:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/VLAN-Hopping-attack2.jpg</image:loc>
			<image:title>VLAN Hopping attack2</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ghost-spn-attack-lets-hackers-conduct-stealthy-kerberoasting-under-the-radar/</loc>
		<lastmod>2026-03-26T05:57:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ghost-SPN-Attack-218x150-1.webp</image:loc>
			<image:title>Ghost-SPN-Attack-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/2026-cybersecurity-excellence-awards-winners-announced-during-rsa-conference-as-ai-security-dominates/</loc>
		<lastmod>2026-03-26T05:53:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/2026-cybersecurity-excellence-awards.jpg</image:loc>
			<image:title>2026 cybersecurity excellence awards</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-assisted-openclaw-trap-campaign-uses-trojanized-github-repos-to-target-developers-and-gamers/</loc>
		<lastmod>2026-03-26T04:56:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/AI-Assisted-‘OpenClaw-Trap-Campaign-Uses-Trojanized-GitHub-Repos-to-Target-Developers-and-Gamers-218x150-1.webp</image:loc>
			<image:title>AI-Assisted-‘OpenClaw-Trap-Campaign-Uses-Trojanized-GitHub-Repos-to-Target-Developers-and-Gamers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/firefox-149-0-released-with-free-built-in-vpn-with-50-gb-monthly-data-limit/</loc>
		<lastmod>2026-03-26T04:55:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Firefox-149-Released-218x150-2.webp</image:loc>
			<image:title>Firefox-149-Released-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-research-maps-how-infostealer-infections-turn-into-dark-web-exposure-in-48-hours/</loc>
		<lastmod>2026-03-26T04:53:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Research-Maps-How-Infostealer-Infections-Turn-Into-Dark-Web-Exposure-in-48-Hours-218x150-1.webp</image:loc>
			<image:title>New-Research-Maps-How-Infostealer-Infections-Turn-Into-Dark-Web-Exposure-in-48-Hours-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/node-js-patches-multiple-vulnerabilities-that-enable-dos-attacks-and-process-crashes/</loc>
		<lastmod>2026-03-26T04:52:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Node.js-Patches-Multiple-Vulnerabilities-218x150-1.webp</image:loc>
			<image:title>Node.js-Patches-Multiple-Vulnerabilities-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/smartapesg-clickfix-campaign-delivers-remcos-netsupport-rat-stealc-and-sectop-rat/</loc>
		<lastmod>2026-03-26T04:51:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/SmartApeSG-ClickFix-Campaign-Delivers-Remcos-NetSupport-RAT-StealC-and-Sectop-RAT-218x150-1.webp</image:loc>
			<image:title>SmartApeSG-ClickFix-Campaign-Delivers-Remcos-NetSupport-RAT-StealC-and-Sectop-RAT-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/linux-ransomware-pay2key-attacking-organizations-ervers-virtualization-hosts-and-cloud-workloads/</loc>
		<lastmod>2026-03-26T04:50:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Linux-Ransomware-Pay2Key-Attacking-Organizations-Ervers-Virtualization-Hosts-and-Cloud-Workloads-218x150-1.webp</image:loc>
			<image:title>Linux-Ransomware-Pay2Key-Attacking-Organizations-Ervers-Virtualization-Hosts-and-Cloud-Workloads-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/macos-threats-are-the-biggest-security-gap-in-2026-how-soc-teams-close-it/</loc>
		<lastmod>2026-03-26T04:49:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/macOS-Threats-Closing-Security-Gaps-in-2026.jpg</image:loc>
			<image:title>macOS Threats Closing Security Gaps in 2026</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mirai-based-botnets-evolve-into-massive-ddos-and-proxy-abuse-threat/</loc>
		<lastmod>2026-03-26T04:43:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Mirai-Based-Botnets-Evolve-Into-Massive-DDoS-and-Proxy-Abuse-Threat-218x150-1.webp</image:loc>
			<image:title>Mirai-Based-Botnets-Evolve-Into-Massive-DDoS-and-Proxy-Abuse-Threat-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/open-directory-malware-campaign-uses-obfuscated-vbs-png-loaders-and-rat-payloads/</loc>
		<lastmod>2026-03-26T04:41:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Open-Directory-Malware-Campaign-Uses-Obfuscated-VBS-PNG-Loaders-and-RAT-Payloads-218x150-1.webp</image:loc>
			<image:title>Open-Directory-Malware-Campaign-Uses-Obfuscated-VBS-PNG-Loaders-and-RAT-Payloads-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/china-linked-hackers-breach-southeast-asian-military-systems-in-long-running-spy-campaign/</loc>
		<lastmod>2026-03-26T04:40:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/China-Linked-Hackers-Breach-Southeast-Asian-Military-Systems-in-Long-Running-Spy-Campaign-218x150-1.webp</image:loc>
			<image:title>China-Linked-Hackers-Breach-Southeast-Asian-Military-Systems-in-Long-Running-Spy-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/f5-nginx-plus-and-open-source-vulnerability-allow-attackers-to-execute-code-using-mp4-file/</loc>
		<lastmod>2026-03-26T04:35:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/F5-NGINX-Plus-and-Open-Source-Vulnerability-Allow-Attackers-to-Execute-Code-Using-MP4-file-1-218x150-1.webp</image:loc>
			<image:title>F5-NGINX-Plus-and-Open-Source-Vulnerability-Allow-Attackers-to-Execute-Code-Using-MP4-file-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/firefox-149-released-with-patch-for-37-vulnerabilities-that-enables-remote-attacks/</loc>
		<lastmod>2026-03-26T04:33:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Firefox-149-Released-218x150-1.webp</image:loc>
			<image:title>Firefox-149-Released-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-to-shut-down-sora-video-platform-pivots-to-enterprise-and-developer-tools/</loc>
		<lastmod>2026-03-26T04:25:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAI-to-Shut-Down-Sora-218x150-1.webp</image:loc>
			<image:title>OpenAI-to-Shut-Down-Sora-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0014-multiple-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2026-03-25T14:58:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0158-multiple-vulnerabilities-in-tp-link-router/</loc>
		<lastmod>2026-03-25T14:55:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0157-multiple-vulnerabilities-in-mongodb/</loc>
		<lastmod>2026-03-25T14:51:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0156-local-privilege-escalation-vulnerability-in-ubuntu/</loc>
		<lastmod>2026-03-25T14:24:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0155-remote-code-execution-vulnerability-in-oracle-identity-manager-and-oracle-web-services-manager/</loc>
		<lastmod>2026-03-25T14:21:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0154-multiple-vulnerabilities-in-n8n/</loc>
		<lastmod>2026-03-25T14:18:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0153-security-bypass-vulnerability-in-screenconnect/</loc>
		<lastmod>2026-03-25T14:15:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-exploiting-magento-to-execute-remote-code-and-gain-complete-account-access/</loc>
		<lastmod>2026-03-25T12:28:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Exploiting-Magento-to-Execute-Remote-Code-and-Gain-Complete-Account-Access-1-218x150-1.webp</image:loc>
			<image:title>Hackers-Exploiting-Magento-to-Execute-Remote-Code-and-Gain-Complete-Account-Access-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/five-malicious-npm-packages-target-crypto-developers-exfiltrate-wallet-keys-via-telegram/</loc>
		<lastmod>2026-03-25T12:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Five-Malicious-npm-Packages-Target-Crypto-Developers-Exfiltrate-Wallet-Keys-via-Telegram-218x150-1.webp</image:loc>
			<image:title>Five-Malicious-npm-Packages-Target-Crypto-Developers-Exfiltrate-Wallet-Keys-via-Telegram-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/russian-initial-access-broker-sentenced-to-prison-for-enabling-ransomware-attacks-on-u-s-firms/</loc>
		<lastmod>2026-03-25T12:23:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Russian-Initial-Access-Broker-Sentenced-to-Prison-for-Enabling-Major-Ransomware-Attacks-on-U.S.-Firms-1-218x150-1.webp</image:loc>
			<image:title>Russian-Initial-Access-Broker-Sentenced-to-Prison-for-Enabling-Major-Ransomware-Attacks-on-U.S.-Firms-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-tp-link-vulnerabilities-allow-attackers-to-execute-arbitrary-commands-on-system/</loc>
		<lastmod>2026-03-25T12:19:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Multiple-TP-Link-Vulnerabilities-Allow-Attackers-to-execute-arbitrary-commands-on-System-1-218x150-1.webp</image:loc>
			<image:title>Multiple-TP-Link-Vulnerabilities-Allow-Attackers-to-execute-arbitrary-commands-on-System-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/understanding-switch-forwarding-and-filtering/</loc>
		<lastmod>2026-03-25T11:36:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/switch.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/f8deb20525696aa54cce03b5cb0e1b58bd6cccf4c9fbd6a4e136176d65801f1f?ts=1773391338</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-authenticators-hidden-passkey-architecture-could-open-new-passwordless-attack-paths/</loc>
		<lastmod>2026-03-25T10:17:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Authenticators-Hidden-Passkey-Architecture-Could-Open-New-Passwordless-Attack-Paths-218x150-1.webp</image:loc>
			<image:title>Google-Authenticators-Hidden-Passkey-Architecture-Could-Open-New-Passwordless-Attack-Paths-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/litellm-python-package-with-95-million-downloads-compromised-by-teampcp-hackers/</loc>
		<lastmod>2026-03-25T09:02:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/LiteLLM-Package-Compromised-218x150-1.webp</image:loc>
			<image:title>LiteLLM-Package-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fcc-banned-foreign-made-consumer-routers-over-security-risks/</loc>
		<lastmod>2026-03-25T09:02:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FCC-Blocks-Consumer-Routers-218x150-1.webp</image:loc>
			<image:title>FCC-Blocks-Consumer-Routers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/layer-2-switching-in-industrial-networks/</loc>
		<lastmod>2026-03-25T07:46:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Industrial-Network-Switch.jpg</image:loc>
			<image:title>Industrial Network Switch</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/6911a80cd0ce37f6f1ebb5cd0f5d9e082bc5a2af0a06f32243b5cce95981aee9?ts=1773299225</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-monitor-traffic-on-layer-2-switches/</loc>
		<lastmod>2026-03-25T07:29:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/layer-2-switch1.jpg</image:loc>
			<image:title>layer-2 switch1</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/065dd6c723f5ca080d642645869996e81523c0f41850c7fd968c2b766e8e1075?ts=1773047900</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apt-hackers-attacking-rdp-servers-to-deploy-malicious-payloads-and-establish-persistence/</loc>
		<lastmod>2026-03-25T04:55:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/APT-Hackers-Attacking-RDP-Servers-to-Deploy-Malicious-Payloads-and-Establish-Persistence-218x150-1.webp</image:loc>
			<image:title>APT-Hackers-Attacking-RDP-Servers-to-Deploy-Malicious-Payloads-and-Establish-Persistence-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-forms-job-lures-deliver-purehvnc-in-new-multi-stage-malware-campaign/</loc>
		<lastmod>2026-03-25T04:54:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Forms-Job-Lures-Deliver-PureHVNC-in-New-Multi-Stage-Malware-Campaign-218x150-1.webp</image:loc>
			<image:title>Google-Forms-Job-Lures-Deliver-PureHVNC-in-New-Multi-Stage-Malware-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/kali-linux-2026-1-released-with-8-new-hacking-tools/</loc>
		<lastmod>2026-03-25T04:50:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/kali-login-218x150-1.webp</image:loc>
			<image:title>kali-login-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/tycoon2fa-operators-resume-cloud-account-phishing-after-infrastructure-disruption/</loc>
		<lastmod>2026-03-25T04:49:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Tycoon2FA-Operators-Resume-Cloud-Account-Phishing-After-Infrastructure-Disruption-218x150-1.webp</image:loc>
			<image:title>Tycoon2FA-Operators-Resume-Cloud-Account-Phishing-After-Infrastructure-Disruption-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/threat-actors-continuously-attacking-ms-sql-servers-to-deploy-ice-cloud-scanner/</loc>
		<lastmod>2026-03-25T04:48:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Threat-Actors-Continuously-Attacking-MS-SQL-Servers-to-Deploy-ICE-Cloud-Scanner-218x150-1.webp</image:loc>
			<image:title>Threat-Actors-Continuously-Attacking-MS-SQL-Servers-to-Deploy-ICE-Cloud-Scanner-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/canisterworm-gets-destructive-as-teampcp-deploys-iran-focused-kubernetes-wiper/</loc>
		<lastmod>2026-03-25T04:41:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CanisterWorm-Gets-Destructive-as-TeamPCP-Deploys-Iran-Focused-Kubernetes-Wiper-218x150-1.webp</image:loc>
			<image:title>CanisterWorm-Gets-Destructive-as-TeamPCP-Deploys-Iran-Focused-Kubernetes-Wiper-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackerone-data-breach-employees-data-stolen-following-navia-hack/</loc>
		<lastmod>2026-03-25T04:39:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/HackerOne-Data-Breach-218x150-1.webp</image:loc>
			<image:title>HackerOne-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/dell-wyse-management-vulnerabilities-enables-complete-system-compromise/</loc>
		<lastmod>2026-03-25T04:38:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Dell-Wyse-Management-Vulnerabilities-Enables-complete-system-compromise-2-218x150-1.webp</image:loc>
			<image:title>Dell-Wyse-Management-Vulnerabilities-Enables-complete-system-compromise-2-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/aqua-securitys-trivy-scanner-compromised-in-supply-chain-attack/</loc>
		<lastmod>2026-03-25T04:38:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Trivy-Scanner-Compromised-218x150-1.webp</image:loc>
			<image:title>Trivy-Scanner-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-details-new-security-safeguards-for-generative-ai-models-on-azure-ai-foundry/</loc>
		<lastmod>2026-03-24T12:19:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Details-New-Security-Safeguards-for-Generative-AI-Models-on-Azure-AI-Foundry-218x150-1.webp</image:loc>
			<image:title>Microsoft-Details-New-Security-Safeguards-for-Generative-AI-Models-on-Azure-AI-Foundry-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/why-your-monitoring-program-is-letting-attackers-win/</loc>
		<lastmod>2026-03-24T12:12:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Why-Your-Monitoring-Program-Is-Letting-Attackers-Win.jpg</image:loc>
			<image:title>Why Your Monitoring Program Is Letting Attackers Win</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-says-gemini-ai-agents-are-crawling-the-dark-web-posts-to-detect-threats/</loc>
		<lastmod>2026-03-24T10:57:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Gemini-AI-Dark-Web-218x150-1.webp</image:loc>
			<image:title>Google-Gemini-AI-Dark-Web-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gcore-radar-report-reveals-150-surge-in-ddos-attacks-year-on-year/</loc>
		<lastmod>2026-03-24T10:28:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Gcore-radar.jpg</image:loc>
			<image:title>Gcore radar</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-data-leak-site-uncovered-linked-to-active-initial-access-broker-on-underground-forums/</loc>
		<lastmod>2026-03-24T10:22:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Data-Leak-Site-Uncovered-Linked-to-Active-Initial-Access-Broker-on-Underground-Forums-218x150-1.webp</image:loc>
			<image:title>New-Data-Leak-Site-Uncovered-Linked-to-Active-Initial-Access-Broker-on-Underground-Forums-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybersecurity-career-paths-roles-and-skills/</loc>
		<lastmod>2026-03-24T09:59:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/cybersecurity-career-paths.jpg</image:loc>
			<image:title>cybersecurity career paths</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chrome-security-update-fixes-8-vulnerabilities-allowing-remote-code-execution/</loc>
		<lastmod>2026-03-24T09:09:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chrome-Security-Update-Fixes-8-Vulnerabilities-Allowing-Remote-Code-Execution-1-218x150-1.webp</image:loc>
			<image:title>Chrome-Security-Update-Fixes-8-Vulnerabilities-Allowing-Remote-Code-Execution-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nist-releases-quick-start-guide-on-cybersecurity-risk-and-workforce-management/</loc>
		<lastmod>2026-03-24T09:05:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/NIST-Releases-New-Quick-Start-Guide-Bridging-Cybersecurity-Enterprise-Risk-and-Workforce-Management-1-218x150-1.webp</image:loc>
			<image:title>NIST-Releases-New-Quick-Start-Guide-Bridging-Cybersecurity-Enterprise-Risk-and-Workforce-Management-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/roundcube-webmail-security-updates-patches-multiple-critical-vulnerabilities/</loc>
		<lastmod>2026-03-24T09:04:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Roundcube-Webmail-Security-Updates-Patches-Multiple-Critical-Vulnerabilities-1-218x150-1.webp</image:loc>
			<image:title>Roundcube-Webmail-Security-Updates-Patches-Multiple-Critical-Vulnerabilities-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-attacking-android-users-with-fake-chatgpt-invites-to-deploy-malware/</loc>
		<lastmod>2026-03-24T07:08:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Attacking-Android-Users-With-Fake-ChatGPT-Invites-to-Deploy-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Attacking-Android-Users-With-Fake-ChatGPT-Invites-to-Deploy-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/511000-end-of-life-microsoft-iis-instances-exposed-online-secure-now/</loc>
		<lastmod>2026-03-24T05:45:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/511000-End-of-Life-Microsoft-IIS-instances-Exposed-Online-Secure-Now-1-1-218x150-1.webp</image:loc>
			<image:title>511000-End-of-Life-Microsoft-IIS-instances-Exposed-Online-Secure-Now-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-11-emergency-update-to-fix-no-internet-sign-in-errors-for-onedrive-teams-and-more/</loc>
		<lastmod>2026-03-24T05:10:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-No-Internet-issue-218x150-1.webp</image:loc>
			<image:title>Windows-11-No-Internet-issue-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/libyan-oil-refinery-hit-in-long-running-espionage-campaign-using-asyncrat/</loc>
		<lastmod>2026-03-24T05:06:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Libyan-Oil-Refinery-Hit-in-Long-Running-Espionage-Campaign-Using-AsyncRAT-218x150-1.webp</image:loc>
			<image:title>Libyan-Oil-Refinery-Hit-in-Long-Running-Espionage-Campaign-Using-AsyncRAT-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/oblivion-rat-turns-fake-play-store-updates-into-a-full-service-android-spyware-operation/</loc>
		<lastmod>2026-03-24T05:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Oblivion-RAT-Turns-Fake-Play-Store-Updates-Into-a-Full-Service-Android-Spyware-Operation-218x150-1.webp</image:loc>
			<image:title>Oblivion-RAT-Turns-Fake-Play-Store-Updates-Into-a-Full-Service-Android-Spyware-Operation-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/macos-stealer-miolab-adds-clickfix-delivery-wallet-theft-and-team-api-tools/</loc>
		<lastmod>2026-03-24T05:04:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/MacOS-Stealer-MioLab-Adds-ClickFix-Delivery-Wallet-Theft-and-Team-API-Tools-218x150-1.webp</image:loc>
			<image:title>MacOS-Stealer-MioLab-Adds-ClickFix-Delivery-Wallet-Theft-and-Team-API-Tools-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-netscaler-adc-and-gateway-vulnerabilities-enable-remote-attacks-on-affected-systems/</loc>
		<lastmod>2026-03-24T05:03:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/NetScaler-ADC-and-Gateway-Vulnerabilities-218x150-1.webp</image:loc>
			<image:title>NetScaler-ADC-and-Gateway-Vulnerabilities-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/tax-themed-google-ads-lead-to-byovd-edr-killer-in-huntress-traced-malvertising-campaign/</loc>
		<lastmod>2026-03-24T05:02:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Tax-Themed-Google-Ads-Lead-to-BYOVD-EDR-Killer-in-Huntress-Traced-Malvertising-Campaign-218x150-1.webp</image:loc>
			<image:title>Tax-Themed-Google-Ads-Lead-to-BYOVD-EDR-Killer-in-Huntress-Traced-Malvertising-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-since-october-2025/</loc>
		<lastmod>2026-03-24T05:01:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/SEO-Poisoning-Campaign-Impersonates-25-Popular-Apps-to-Deliver-AsyncRAT-Since-October-2025-218x150-1.webp</image:loc>
			<image:title>SEO-Poisoning-Campaign-Impersonates-25-Popular-Apps-to-Deliver-AsyncRAT-Since-October-2025-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-qnap-qvr-pro-vulnerability-let-remote-attackers-gain-access-to-the-system/</loc>
		<lastmod>2026-03-24T05:00:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-QNAP-QVR-Pro-Vulnerability-Let-remote-attackers-gain-access-to-the-system-1.jpg</image:loc>
			<image:title>Critical QNAP QVR Pro Vulnerability Let remote attackers gain access to the system (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mazda-data-breach-exposing-employee-and-partner-records-via-system-vulnerability/</loc>
		<lastmod>2026-03-24T04:59:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Mazda-Data-Breach-218x150-1.avif</image:loc>
			<image:title>Mazda-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-craft-cms-code-injection-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-23T11:46:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Craft-CMS-Code-Injection-Vulnerability-Exploited-in-Attacks-1-2-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Craft-CMS-Code-Injection-Vulnerability-Exploited-in-Attacks-1-2-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/30-ip-kvm-flaws-could-give-attackers-bios-level-control-across-enterprise-networks/</loc>
		<lastmod>2026-03-23T11:28:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/30-IP-KVM-Flaws-Could-Give-Attackers-BIOS-Level-Control-Across-Enterprise-Networks-1.jpg</image:loc>
			<image:title>$30 IP-KVM Flaws Could Give Attackers BIOS-Level Control Across Enterprise Networks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-apple-vulnerabilities-linked-to-darksword-ios-exploit-chain-exploited-in-attacks/</loc>
		<lastmod>2026-03-23T11:25:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Apple-Vulnerabilities-Linked-to-DarkSword-iOS-Exploit-Chain-Exploited-in-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Apple Vulnerabilities Linked to DarkSword iOS Exploit Chain Exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-canisterworm-steals-npm-tokens-and-spreads-through-compromised-publisher-accounts/</loc>
		<lastmod>2026-03-23T11:26:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-CanisterWorm-Steals-npm-Tokens-and-Spreads-Through-Compromised-Publisher-Accounts-1.jpg</image:loc>
			<image:title>New CanisterWorm Steals npm Tokens and Spreads Through Compromised Publisher Accounts</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-secure-your-digital-identity/</loc>
		<lastmod>2026-03-23T09:35:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/digital-identity.jpg</image:loc>
			<image:title>digital identity</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/using-snmp-for-switch-management/</loc>
		<lastmod>2026-03-23T08:32:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Simple_Network_Management_Protocol__SNMP_.webp</image:loc>
			<image:title>Simple_Network_Management_Protocol__SNMP_</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/f58fb91e23b4d8b0a4f809c4a39365ae920af0d7d5690fdddfbce12f4801f476?ts=1772781128</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-emergency-out-of-band-update-for-windows-11-to-fix-microsoft-account-sign-in-failure/</loc>
		<lastmod>2026-03-23T08:21:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-Account-Sign-In-Failure-218x150-1.webp</image:loc>
			<image:title>Windows-11-Account-Sign-In-Failure-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/copyright-themed-lures-deliver-multi-stage-purelog-stealer-in-new-credential-theft-campaign/</loc>
		<lastmod>2026-03-23T08:18:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Copyright-Themed-Lures-Deliver-Multi-Stage-PureLog-Stealer-in-New-Credential-Theft-Campaign.jpg</image:loc>
			<image:title>Copyright-Themed Lures Deliver Multi-Stage PureLog Stealer in New Credential Theft Campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybersecurity-in-the-age-of-quantum-computing/</loc>
		<lastmod>2026-03-23T06:39:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Quantum_Computing_Image.png</image:loc>
			<image:title>Quantum_Computing_Image</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/astrazeneca-data-breach-lapsus-group-allegedly-claims-access-to-internal-data/</loc>
		<lastmod>2026-03-23T04:51:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/AstraZeneca-Data-Breach-218x150-1.webp</image:loc>
			<image:title>AstraZeneca-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/crunchyroll-data-breach-threat-actor-claims-exfiltration-of-100-gb-of-user-data/</loc>
		<lastmod>2026-03-23T04:49:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Crunchyroll-Data-Breach-218x150-1.webp</image:loc>
			<image:title>Crunchyroll-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-cisa-warn-russian-hackers-are-targeting-high-value-individuals-through-signal/</loc>
		<lastmod>2026-03-23T04:25:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FBI-CISA-Warn-Russian-Hackers-Are-Targeting-High-Value-Individuals-Through-Signal-1.jpg</image:loc>
			<image:title>FBI, CISA Warn Russian Hackers Are Targeting High-Value Individuals Through Signal (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/oracle-issues-urgent-security-update-for-critical-rce-flaw-in-identity-manager-and-web-services-manager/</loc>
		<lastmod>2026-03-23T04:19:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Oracle-Urgent-Security-Update-218x150-1.avif</image:loc>
			<image:title>Oracle-Urgent-Security-Update-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chrome-security-update-fixes-26-vulnerabilities-allowing-remote-code-execution/</loc>
		<lastmod>2026-03-23T04:16:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chrome-Security-Update-Patches-26-Vulnerabilities-that-Enable-Attackers-to-Execute-Malicious-Code-Remotely-1.jpg</image:loc>
			<image:title>Chrome Security Update Patches 26 Vulnerabilities that Enable Attackers to Execute Malicious Code Remotely (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0152-sql-injection-vulnerability-in-ally-wordpress-plugin/</loc>
		<lastmod>2026-03-22T05:29:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0151-remote-code-execution-vulnerability-in-telnetd/</loc>
		<lastmod>2026-03-22T05:26:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0150-multiple-vulnerabilities-in-apple-ios-and-ipados/</loc>
		<lastmod>2026-03-22T05:22:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0149-security-bypass-vulnerability-in-apple-products/</loc>
		<lastmod>2026-03-22T05:19:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0148-multiple-vulnerabilities-in-gitlab-products/</loc>
		<lastmod>2026-03-22T05:16:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0147-multiple-remote-code-execution-vulnerabilities-in-windows-routing-and-remote-access-service-rras/</loc>
		<lastmod>2026-03-22T05:12:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropic-launches-projects-feature-for-claude-cowork-desktop/</loc>
		<lastmod>2026-03-21T07:35:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Projects-Feature-Claude-Cowork-Desktop-218x150-1.webp</image:loc>
			<image:title>Projects-Feature-Claude-Cowork-Desktop-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-11-march-update-breaks-microsoft-teams-and-onedrive-sign-ins/</loc>
		<lastmod>2026-03-21T07:23:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-March-Update-Breaks-Teams.jpg</image:loc>
			<image:title>Windows 11 March Update Breaks Teams</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-compromised-7500-magento-websites-to-upload-hidden-malicious-files-and-steal-data/</loc>
		<lastmod>2026-03-21T07:20:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Compromised-7500-Magento-Websites-to-Upload-Hidden-Malicious-Files-and-Steal-Data.jpg</image:loc>
			<image:title>Hackers Compromised 7,500+ Magento Websites to Upload Hidden Malicious Files and Steal Data</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-voidstealer-variant-bypasses-chrome-abe-without-injection-or-privilege-escalation/</loc>
		<lastmod>2026-03-21T07:03:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-VoidStealer-Variant-Bypasses-Chrome-ABE-Without-Injection-or-Privilege-Escalation.jpg</image:loc>
			<image:title>New VoidStealer Variant Bypasses Chrome ABE Without Injection or Privilege Escalation</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-thai-partners-target-southeast-asia-scam-centers-behind-cyber-fraud-on-americans/</loc>
		<lastmod>2026-03-21T06:59:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FBI-Thai-Partners-Target-Southeast-Asia-Scam-Centers-Behind-Cyber-Fraud-on-Americans.jpg</image:loc>
			<image:title>FBI, Thai Partners Target Southeast Asia Scam Centers Behind Cyber Fraud on Americans</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/perseus-android-malware-steals-user-notes-and-enables-full-device-takeover/</loc>
		<lastmod>2026-03-21T06:54:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Perseus-Android-Malware-Steals-User-Notes-and-Enables-Full-Device-Takeover.jpg</image:loc>
			<image:title>Perseus Android Malware Steals User Notes and Enables Full Device Takeover</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-unveils-new-teams-optimizations-for-windows-app-on-ios-android/</loc>
		<lastmod>2026-03-21T06:46:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-unveils-new-Teams-optimizations-for-Windows-App-on-iOS-Android-1.jpg</image:loc>
			<image:title>Microsoft unveils new Teams optimizations for Windows App on iOS &#038; Android (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-cisco-secure-firewall-management-center-0-day-exploited-in-ransomware-attacks/</loc>
		<lastmod>2026-03-21T06:40:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Cisco-Secure-Firewall-Management-Center-0-Day-Exploited-in-Ransomware-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-jenkins-vulnerabilities-expose-ci-cd-servers-to-rce-attacks/</loc>
		<lastmod>2026-03-21T06:31:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Jenkins-Vulnerabilities-Expose-CICD-Servers-to-RCE-Attacks-1-1.jpg</image:loc>
			<image:title>Critical Jenkins Vulnerabilities Expose CICD Servers to RCE Attacks (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ransomware-actors-expand-edr-killer-tactics-beyond-vulnerable-drivers/</loc>
		<lastmod>2026-03-21T06:15:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ransomware-Actors-Expand-EDR-Killer-Tactics-Beyond-Vulnerable-Drivers.jpg</image:loc>
			<image:title>Ransomware Actors Expand EDR Killer Tactics Beyond Vulnerable Drivers</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-secure-switch-access-with-ssh/</loc>
		<lastmod>2026-03-20T11:57:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/what-is-sshsecure-shell.jpg</image:loc>
			<image:title>what-is-ssh(secure-shell)</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/6142cf4931715ee81317df48eada7204f348f818b9135344f8b0340a7315cd2f?ts=1771395855</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/bamboo-data-center-and-server-vulnerability-let-attackers-execute-remote-code/</loc>
		<lastmod>2026-03-20T11:41:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Bamboo-Data-Center-and-Server-Vulnerability-Let-Attackers-Execute-Remote-Code-1.jpg</image:loc>
			<image:title>Bamboo Data Center and Server Vulnerability Let Attackers Execute Remote Code (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/navia-confirms-data-breach-2-7-million-users-sensitive-data-exposed/</loc>
		<lastmod>2026-03-20T11:39:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Navia-Confirms-Data-Breach-2.7-million-Users-Sensitive-Data-Exposed-1.jpg</image:loc>
			<image:title>Navia Confirms Data Breach - 2.7 million Users Sensitive Data Exposed (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-speagle-malware-hijacks-cobra-docguard-to-steal-sensitive-data-via-compromised-servers/</loc>
		<lastmod>2026-03-20T10:34:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-‘Speagle-Malware-Hijacks-Cobra-DocGuard-to-Steal-Sensitive-Data-via-Compromised-Servers.jpg</image:loc>
			<image:title>New ‘Speagle’ Malware Hijacks Cobra DocGuard to Steal Sensitive Data via Compromised Servers</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apex-ai-powered-pentester-attacks-apps-in-black-box-mode-to-find-vulnerabilities/</loc>
		<lastmod>2026-03-20T09:30:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apex-AI-Powered-Pentester.jpg</image:loc>
			<image:title>Apex - AI-Powered Pentester</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/silentconnect-uses-vbscript-powershell-and-peb-masquerading-to-deploy-screenconnect/</loc>
		<lastmod>2026-03-20T08:31:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/SILENTCONNECT-Uses-VBScript-PowerShell-and-PEB-Masquerading-to-Deploy-ScreenConnect.jpg</image:loc>
			<image:title>SILENTCONNECT Uses VBScript, PowerShell and PEB Masquerading to Deploy ScreenConnect</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/russian-apt-exploits-zimbra-xss-to-target-ukrainian-government-in-operation-ghostmail/</loc>
		<lastmod>2026-03-20T07:42:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Russian-APT-Exploits-Zimbra-XSS-to-Target-Ukrainian-Government-in-‘Operation-GhostMail.jpg</image:loc>
			<image:title>Russian APT Exploits Zimbra XSS to Target Ukrainian Government in ‘Operation GhostMail’</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/authorities-disrupt-iot-botnet-infrastructure-behind-record-breaking-30-tbps-ddos-attacks/</loc>
		<lastmod>2026-03-20T07:40:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Authorities-Disrupts-IoT-Botnet.jpg</image:loc>
			<image:title>Authorities Disrupts IoT Botnet</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-urges-organizations-to-secure-microsoft-intune-environments-following-stryker-breach/</loc>
		<lastmod>2026-03-20T07:36:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Urges-Organizations-to-Secure-Microsoft-Intune-Environments-Following-Stryker-Breach-1.jpg</image:loc>
			<image:title>CISA Urges Organizations to Secure Microsoft Intune Environments Following Stryker Breach (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-zimbra-collaboration-suite-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-20T07:09:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Zimbra-Collaboration-Suite-vulnerability-exploited-in-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Zimbra Collaboration Suite vulnerability exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciso-whisperer-names-11-vendors-leading-the-shift-from-tools-to-outcomes-at-rsa-conference-2026/</loc>
		<lastmod>2026-03-20T07:06:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/TVC_Analyst.jpg</image:loc>
			<image:title>TVC-Analyst</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-ubiquiti-unifi-vulnerabilities-allow-attackers-to-seize-full-control-of-underlying-systems/</loc>
		<lastmod>2026-03-20T07:01:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ubiquiti-UniFi-Vulnerabilities.jpg</image:loc>
			<image:title>Ubiquiti UniFi Vulnerabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-vulnerabilities-allow-data-exfiltration-and-user-redirection-to-malicious-sites/</loc>
		<lastmod>2026-03-20T06:43:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Claude-Vulnerabilities-Let-Attackers-Exfiltrate-Sensitive-Data-and-Redirect-Users-to-Malicious-Websites-1.jpg</image:loc>
			<image:title>Claude Vulnerabilities Let Attackers Exfiltrate Sensitive Data and Redirect Users to Malicious Websites (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vibe-coded-malware-campaign-uses-fake-tools-cdns-and-file-hosts-to-infect-users/</loc>
		<lastmod>2026-03-20T06:39:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/‘Vibe-Coded-Malware-Campaign-Uses-Fake-Tools-CDNs-and-File-Hosts-to-Infect-Users.jpg</image:loc>
			<image:title>‘Vibe-Coded’ Malware Campaign Uses Fake Tools, CDNs and File Hosts to Infect Users</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-pyronut-package-backdoors-telegram-bots-with-remote-code-execution/</loc>
		<lastmod>2026-03-20T06:35:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malicious-‘Pyronut-Package-Backdoors-Telegram-Bots-With-Remote-Code-Execution.jpg</image:loc>
			<image:title>Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/horabot-banking-trojan-resurfaces-in-mexico-with-multi-stage-phishing-and-email-worm-tactics/</loc>
		<lastmod>2026-03-20T06:16:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Horabot-Banking-Trojan-Resurfaces-in-Mexico-With-Multi-Stage-Phishing-and-Email-Worm-Tactics.jpg</image:loc>
			<image:title>Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/backdoored-open-vsx-extension-used-github-downloader-to-deploy-rat-and-stealer/</loc>
		<lastmod>2026-03-20T06:09:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Backdoored-Open-VSX-Extension-Used-GitHub-Downloader-to-Deploy-RAT-and-Stealer.jpg</image:loc>
			<image:title>Backdoored Open VSX Extension Used GitHub Downloader to Deploy RAT and Stealer</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iran-linked-botnet-exposed-after-open-directory-leak-reveals-15-node-relay-network/</loc>
		<lastmod>2026-03-20T05:51:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iran-Linked-Botnet-Exposed-After-Open-Directory-Leak-Reveals-15-Node-Relay-Network.jpg</image:loc>
			<image:title>Iran-Linked Botnet Exposed After Open Directory Leak Reveals 15-Node Relay Network</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/waterplum-deploys-new-stoatwaffle-malware-in-vscode-based-supply-chain-campaign/</loc>
		<lastmod>2026-03-20T05:47:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/WaterPlum-Deploys-New-‘StoatWaffle-Malware-in-VSCode-Based-Supply-Chain-Campaign.jpg</image:loc>
			<image:title>WaterPlum Deploys New ‘StoatWaffle’ Malware in VSCode-Based Supply Chain Campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-microsoft-sharepoint-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-20T05:30:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Microsoft-SharePoint-Vulnerability-Exploited-in-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Microsoft SharePoint Vulnerability Exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-snappyclient-implant-combines-remote-access-data-theft-and-advanced-evasion/</loc>
		<lastmod>2026-03-20T05:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-SnappyClient-Implant-Combines-Remote-Access-Data-Theft-and-Advanced-Evasion.jpg</image:loc>
			<image:title>New SnappyClient Implant Combines Remote Access, Data Theft and Advanced Evasion</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/the-high-cost-of-slow-triage-how-to-make-tier-1-the-fastest-layer-in-your-soc/</loc>
		<lastmod>2026-03-20T05:13:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Turn-Tier-1-Into-Your-Fastest-SOC-Layer.jpg</image:loc>
			<image:title>Turn Tier 1 Into Your Fastest SOC Layer</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-ios-exploit-with-advanced-iphone-hacking-tools-attacking-users-to-steal-personal-data/</loc>
		<lastmod>2026-03-20T05:10:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/DarkSword-iOS-Exploit.jpg</image:loc>
			<image:title>DarkSword iOS Exploit</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-firewall-0-day-vulnerability-exploited-in-the-wild-to-deploy-interlock-ransomware/</loc>
		<lastmod>2026-03-20T04:58:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-Firewall-0-day-Ransomware.jpg</image:loc>
			<image:title>Cisco Firewall 0-day Ransomware</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-malware-campaigns-turn-network-devices-into-ddos-nodes-and-crypto-mining-bots/</loc>
		<lastmod>2026-03-20T04:55:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Malware-Campaigns-Turn-Network-Devices-Into-DDoS-Nodes-and-Crypto-Mining-Bots.jpg</image:loc>
			<image:title>New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-webkit-vulnerability-enables-malicious-web-content-bypass-on-ios-and-macos/</loc>
		<lastmod>2026-03-20T04:52:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apple-WebKit-Vulnerability-Enables-malicious-web-content-Bypass-on-on-iOS-and-macOS-1-1.jpg</image:loc>
			<image:title>Apple WebKit Vulnerability Enables malicious web content Bypass on on iOS and macOS (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-launches-gpt-5-4-mini-and-nano-to-provide-answers-2x-faster/</loc>
		<lastmod>2026-03-20T04:11:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAI-Launches-GPT-5.4-Mini-and-Nano-to-Provide-Answers-2X-Faster-1.jpg</image:loc>
			<image:title>OpenAI Launches GPT-5.4 Mini and Nano to Provide Answers 2X Faster (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/uidai-launches-bug-bounty-programme-to-strengthen-aadhaar-security/</loc>
		<lastmod>2026-03-20T04:08:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/UIDAI-Launches-Bug-Bounty-Programme-to-Strengthen-Aadhaar-Security-1-1.jpg</image:loc>
			<image:title>UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fancybear-server-exposure-reveals-stolen-credentials-2fa-secrets-and-nato-linked-targets/</loc>
		<lastmod>2026-03-20T04:05:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FancyBear-Server-Exposure-Reveals-Stolen-Credentials-2FA-Secrets-and-NATO-Linked-Targets.jpg</image:loc>
			<image:title>FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/screenconnect-vulnerability-allows-hackers-to-extract-unique-machine-keys-and-hijack-sessions/</loc>
		<lastmod>2026-03-20T04:02:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ScreenConnect-Vulnerability-1.jpg</image:loc>
			<image:title>ScreenConnect Vulnerability (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/leaknet-scales-ransomware-operations-with-clickfix-lures-and-stealthy-deno-loader/</loc>
		<lastmod>2026-03-20T04:00:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/LeakNet-Scales-Ransomware-Operations-With-ClickFix-Lures-and-Stealthy-Deno-Loader.jpg</image:loc>
			<image:title>LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/forcememo-hijacks-github-accounts-backdoors-hundreds-of-python-repos-via-force-push/</loc>
		<lastmod>2026-03-20T03:57:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ForceMemo-Hijacks-GitHub-Accounts-Backdoors-Hundreds-of-Python-Repos-via-Force-Push.jpg</image:loc>
			<image:title>ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-telnetd-vulnerability-enables-remote-attacker-to-execute-arbitrary-code-via-port-23/</loc>
		<lastmod>2026-03-20T03:55:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Telnetd-Vulnerability-Enables-Remote-Attack.jpg</image:loc>
			<image:title>Telnetd Vulnerability Enables Remote Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iran-linked-cyber-campaigns-converge-with-electronic-and-psychological-warfare-as-regional-conflict-escalates/</loc>
		<lastmod>2026-03-20T03:53:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iran-Linked-Cyber-Campaigns-Converge-With-Electronic-and-Psychological-Warfare-as-Regional-Conflict-Escalates.jpg</image:loc>
			<image:title>Iran-Linked Cyber Campaigns Converge With Electronic and Psychological Warfare as Regional Conflict Escalates</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0146-information-disclosure-vulnerability-in-m365-copilot/</loc>
		<lastmod>2026-03-18T12:37:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0145-multiple-vulnerabilities-in-veeam-backup-replication/</loc>
		<lastmod>2026-03-18T12:34:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0144-information-disclosure-vulnerability-in-wing-ftp-server/</loc>
		<lastmod>2026-03-18T12:31:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0143-multiple-vulnerabilities-in-schneider-electric-ebo-workstation-webstation/</loc>
		<lastmod>2026-03-18T12:27:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0142-radius-md5-vulnerability-in-hitachi-energy-xmc20-product/</loc>
		<lastmod>2026-03-18T12:18:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vidar-stealer-2-0-spreads-through-fake-game-cheats-promoted-on-github-and-reddit/</loc>
		<lastmod>2026-03-18T12:09:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Vidar-Stealer-2.0-Spreads-Through-Fake-Game-Cheats-Promoted-on-GitHub-and-Reddit.jpg</image:loc>
			<image:title>Vidar Stealer 2.0 Spreads Through Fake Game Cheats Promoted on GitHub and Reddit</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-telegram-download-site-pushes-multi-stage-loader-with-in-memory-execution/</loc>
		<lastmod>2026-03-18T12:07:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malicious-Telegram-Download-Site-Pushes-Multi-Stage-Loader-With-In-Memory-Execution.jpg</image:loc>
			<image:title>Malicious Telegram Download Site Pushes Multi-Stage Loader With In-Memory Execution</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/boggy-serpens-targets-diplomats-and-critical-infrastructure-in-multi-wave-espionage-campaign/</loc>
		<lastmod>2026-03-18T10:33:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Boggy-Serpens-Targets-Diplomats-and-Critical-Infrastructure-in-Multi-Wave-Espionage-Campaign.jpg</image:loc>
			<image:title>Boggy Serpens Targets Diplomats and Critical Infrastructure in Multi-Wave Espionage Campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/regpwn-windows-registry-vulnerability-enables-full-system-access-to-attackers/</loc>
		<lastmod>2026-03-18T09:32:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Researchers-Reveal-‘RegPwn-a-Windows-Registry-Vulnerability-That-Granted-SYSTEM-Privileges-1-1-1.jpg</image:loc>
			<image:title>Researchers Reveal ‘RegPwn,’ a Windows Registry Vulnerability That Granted SYSTEM Privileges (1) (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-to-stop-force-installation-of-365-copilot-app-on-windows-devices/</loc>
		<lastmod>2026-03-18T09:09:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-to-Stop-Force-Installation-of-365-Copilot-app-on-Windows-devices-1.jpg</image:loc>
			<image:title>Microsoft to Stop Force Installation of 365 Copilot app on Windows devices (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-court-documents-github-payloads-to-infect-judicial-targets-with-covert-rat/</loc>
		<lastmod>2026-03-18T09:05:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Attackers-Abuse-Court-Documents-GitHub-Payloads-to-Infect-Judicial-Targets-With-COVERT-RAT.jpg</image:loc>
			<image:title>Attackers Abuse Court Documents, GitHub Payloads to Infect Judicial Targets With COVERT RAT</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-forticlient-sql-injection-vulnerability-enables-arbitrary-database-access/</loc>
		<lastmod>2026-03-18T08:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-FortiClient-SQL-Injection-vulnerability-Enables-Arbitrary-Database-Access-1.jpg</image:loc>
			<image:title>Critical FortiClient SQL Injection vulnerability Enables Arbitrary Database Access (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/understanding-the-mitre-attck-framework/</loc>
		<lastmod>2026-03-18T08:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/MITREAttack_Framework_V2.webp</image:loc>
			<image:title>MITREAttack_Framework_V2</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/d4a73d70251a4da19600f399579a9126612f27e92c88ec2f0993e72e52db92ba?ts=1772692632</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ubuntu-desktop-systems-vulnerability-enables-attackers-to-gain-full-root-access/</loc>
		<lastmod>2026-03-18T06:57:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ubuntu-Desktop-Systems-Vulnerability.jpg</image:loc>
			<image:title>Ubuntu Desktop Systems Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gitguardian-reports-an-81-surge-of-ai-service-leaks-as-29m-secrets-hit-public-github/</loc>
		<lastmod>2026-03-18T05:55:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/gitguardian.jpg</image:loc>
			<image:title>gitguardian</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/glassworm-hits-popular-react-native-packages-with-credential-stealing-npm-malware/</loc>
		<lastmod>2026-03-18T04:48:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Glassworm-Hits-Popular-React-Native-Packages-With-Credential-Stealing-npm-Malware.jpg</image:loc>
			<image:title>Glassworm Hits Popular React Native Packages With Credential-Stealing npm Malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/6-malicious-packagist-themes-ship-trojanized-jquery-in-ophimcms-supply-chain-attack/</loc>
		<lastmod>2026-03-18T04:47:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/6-Malicious-Packagist-Themes-Ship-Trojanized-jQuery-in-OphimCMS-Supply-Chain-Attack.jpg</image:loc>
			<image:title>6 Malicious Packagist Themes Ship Trojanized jQuery in OphimCMS Supply Chain Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-wing-ftp-server-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-18T04:46:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Wing-FTP-Server-Vulnerability-Exploited-in-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Wing FTP Server Vulnerability Exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/uks-companies-house-webfiling-flaw-exposed-private-director-data-for-five-months/</loc>
		<lastmod>2026-03-18T04:45:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Companies-House-WebFiling-Flaw.jpg</image:loc>
			<image:title>Companies House WebFiling Flaw</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/angular-xss-vulnerability-exposes-thousands-of-web-applications-to-xss-attacks/</loc>
		<lastmod>2026-03-18T04:42:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Angular-XSS-Vulnerability-exposes-thousands-of-web-applications-to-XSS-Attacks-1.jpg</image:loc>
			<image:title>Angular XSS Vulnerability exposes thousands of web applications to XSS Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-windows-11-25h2-24h2-update-fixes-bluetooth-devices-visibility-issues/</loc>
		<lastmod>2026-03-18T04:41:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Windows-11-25H224H2-Update-Fixes-Bluetooth-Devices-Visibility-issues-1.jpg</image:loc>
			<image:title>New Windows 11 25H224H2 Update Fixes Bluetooth Devices Visibility issues (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/kubernetes-csi-driver-for-nfs-vulnerability-lets-attackers-delete-or-modify-nfs-server-directories/</loc>
		<lastmod>2026-03-18T04:40:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Kubernetes-CSI-Driver-NFS-Vulnerability.jpg</image:loc>
			<image:title>Kubernetes CSI Driver NFS Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-use-seo-poisoning-and-signed-trojans-to-steal-vpn-credentials/</loc>
		<lastmod>2026-03-18T04:39:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Attackers-Use-SEO-Poisoning-and-Signed-Trojans-to-Steal-VPN-Credentials.jpg</image:loc>
			<image:title>Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/to-beat-alert-overload-stop-wasting-time-on-false-positives/</loc>
		<lastmod>2026-03-18T04:38:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/To-Beat-Alert-Overload-Stop-Wasting-Time-on-False-Positives-.jpg</image:loc>
			<image:title>To Beat Alert Overload, Stop Wasting Time on False Positives </image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/simple-custom-font-rendering-can-poison-chatgpt-claude-gemini-and-other-ai-systems/</loc>
		<lastmod>2026-03-18T04:36:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Custom-Font-Poison-AI-Systems.jpg</image:loc>
			<image:title>Custom Font Poison AI Systems</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-warns-ransomware-actors-are-shifting-tactics-as-profits-fall-and-data-theft-rises/</loc>
		<lastmod>2026-03-18T04:35:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Warns-Ransomware-Actors-Are-Shifting-Tactics-as-Profits-Fall-and-Data-Theft-Rises.jpg</image:loc>
			<image:title>Google Warns Ransomware Actors Are Shifting Tactics as Profits Fall and Data Theft Rises</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iranian-cyber-ops-maintain-us-network-footholds-target-cameras-for-regional-surveillance/</loc>
		<lastmod>2026-03-18T04:34:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iranian-Cyber-Ops-Maintain-US-Network-Footholds-Target-Cameras-for-Regional-Surveillance.jpg</image:loc>
			<image:title>Iranian Cyber Ops Maintain US Network Footholds, Target Cameras for Regional Surveillance</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-support-call-leads-to-quick-assist-compromise-in-new-vishing-attack/</loc>
		<lastmod>2026-03-18T04:33:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Teams-Support-Call.jpg</image:loc>
			<image:title>Microsoft Teams Support Call</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/phishers-weaponize-safe-links-with-multi-layered-url-rewriting-to-evade-detection/</loc>
		<lastmod>2026-03-17T12:23:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Phishers-Weaponize-Safe-Links-With-Multi-Layered-URL-Rewriting-to-Evade-Detection.jpg</image:loc>
			<image:title>Phishers Weaponize Safe Links With Multi-Layered URL Rewriting to Evade Detection</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-payload-ransomware-uses-babuk-style-encryption-against-windows-and-esxi-systems/</loc>
		<lastmod>2026-03-17T10:59:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-‘Payload-Ransomware-Uses-Babuk-Style-Encryption-Against-Windows-and-ESXi-Systems.jpg</image:loc>
			<image:title>New ‘Payload’ Ransomware Uses Babuk-Style Encryption Against Windows and ESXi Systems</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-hijacking-legitimate-websites-to-attack-microsoft-teams-users/</loc>
		<lastmod>2026-03-17T10:06:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Attackers-Hijacking-Legitimate-Websites-to-Attack-Microsoft-Teams-users-1.jpg</image:loc>
			<image:title>Attackers Hijacking Legitimate Websites to Attack Microsoft Teams users (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-chrome-0-day-vulnerabilities-exploited-in-attacks/</loc>
		<lastmod>2026-03-17T10:03:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Chrome-0-Day-Vulnerabilities-Exploited-in-Attacks-1.jpg</image:loc>
			<image:title>CISA Warns of Chrome 0-Day Vulnerabilities Exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-npm-packages-deliver-pylangghost-rat-in-new-software-supply-chain-campaign/</loc>
		<lastmod>2026-03-17T08:57:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malicious-npm-Packages-Deliver-PylangGhost-RAT-in-New-Software-Supply-Chain-Campaign.jpg</image:loc>
			<image:title>Malicious npm Packages Deliver PylangGhost RAT in New Software Supply Chain Campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/phishers-abuse-livechat-support-tools-to-steal-sensitive-data-in-new-saas-based-attack-tactic/</loc>
		<lastmod>2026-03-17T08:55:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Phishers-Abuse-LiveChat-Support-Tools-to-Steal-Sensitive-Data-in-New-SaaS-Based-Attack-Tactic.jpg</image:loc>
			<image:title>Phishers Abuse LiveChat Support Tools to Steal Sensitive Data in New SaaS-Based Attack Tactic</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-condibot-variant-and-monaco-cryptominer-expand-threats-to-network-devices/</loc>
		<lastmod>2026-03-17T07:16:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-CondiBot-Variant-and-‘Monaco-Cryptominer-Expand-Threats-to-Network-Devices.jpg</image:loc>
			<image:title>New CondiBot Variant and ‘Monaco’ Cryptominer Expand Threats to Network Devices</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/researchers-discover-ways-to-decrypt-and-exploit-encrypted-palo-alto-cortex-xdr-bioc-rules/</loc>
		<lastmod>2026-03-17T07:14:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Researchers-Uncover-Methods-to-Decrypt-and-Abuse-Encrypted-Palo-Alto-Cortex-XDR-BIOC-Rules-for-Evasion-1-1-1.jpg</image:loc>
			<image:title>Researchers Uncover Methods to Decrypt and Abuse Encrypted Palo Alto Cortex XDR BIOC Rules for Evasion (1) (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/android-17-advanced-protection-mode-to-block-malicious-service-usage/</loc>
		<lastmod>2026-03-17T04:57:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Android-17-Advanced-Protection-Mode-to-Block-Malicious-Service-usage-1.jpg</image:loc>
			<image:title>Android 17 Advanced Protection Mode to Block Malicious Service usage (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/betterleaks-a-new-open-source-tool-to-scan-directories-files-and-git-repositories/</loc>
		<lastmod>2026-03-17T04:55:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Betterleaks-A-new-open-source-tool-to-scan-directories-files-and-git-repositories-1.jpg</image:loc>
			<image:title>Betterleaks - A new open-source tool to scan directories, files, and git repositories (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/konni-apt-hijacks-kakaotalk-accounts-to-spread-malware-in-multi-stage-spear-phishing-campaign/</loc>
		<lastmod>2026-03-17T04:54:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Konni-APT-Hijacks-KakaoTalk-Accounts-to-Spread-Malware-in-Multi-Stage-Spear-Phishing-Campaign.jpg</image:loc>
			<image:title>Konni APT Hijacks KakaoTalk Accounts to Spread Malware in Multi-Stage Spear-Phishing Campaign</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-exchange-online-mailbox-access-outage-affects-users-globally/</loc>
		<lastmod>2026-03-17T04:53:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Exchange-Online-Outage.jpg</image:loc>
			<image:title>Microsoft Exchange Online Outage</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-secondary-payload-delivery/</loc>
		<lastmod>2026-03-17T04:52:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-ACRStealer-Variant-Uses-Syscall-Evasion-TLS-C2-and-Secondary-Payload-Delivery.jpg</image:loc>
			<image:title>New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-filezilla-downloads-lead-to-rat-infections-through-stealthy-multi-stage-loader/</loc>
		<lastmod>2026-03-17T04:51:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-FileZilla-Downloads-Lead-to-RAT-Infections-Through-Stealthy-Multi-Stage-Loader.jpg</image:loc>
			<image:title>Fake FileZilla Downloads Lead to RAT Infections Through Stealthy Multi-Stage Loader</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/qihoo-360-leaked-its-own-wildcard-ssl-private-key-inside-public-ai-installer/</loc>
		<lastmod>2026-03-17T04:38:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Qihoo-360-Leaked-SSL-Private-Key.jpg</image:loc>
			<image:title>Qihoo 360 Leaked SSL Private Key</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ibm-uncovers-slopoly-likely-ai-generated-malware-used-in-hive0163-ransomware-attack/</loc>
		<lastmod>2026-03-17T04:37:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/IBM-Uncovers-‘Slopoly-Likely-AI-Generated-Malware-Used-in-Hive0163-Ransomware-Attack.jpg</image:loc>
			<image:title>IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-shipment-tracking-scams-surge-in-mea-stealing-banking-data-through-real-time-phishing/</loc>
		<lastmod>2026-03-17T04:36:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fake-Shipment-Tracking-Scams-Surge-in-MEA-Stealing-Banking-Data-Through-Real-Time-Phishing.jpg</image:loc>
			<image:title>Fake Shipment Tracking Scams Surge in MEA, Stealing Banking Data Through Real-Time Phishing</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/handala-hack-uses-rdp-netbird-and-parallel-wipers-in-mois-linked-destructive-intrusions/</loc>
		<lastmod>2026-03-17T04:35:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Handala-Hack-Uses-RDP-NetBird-and-Parallel-Wipers-in-MOIS-Linked-Destructive-Intrusions.jpg</image:loc>
			<image:title>Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/rondodox-botnet-expands-to-174-exploits-leveraging-residential-ip-infrastructure-at-scale/</loc>
		<lastmod>2026-03-17T04:34:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/RondoDox-Botnet-Expands-to-174-Exploits-Leveraging-Residential-IP-Infrastructure-at-Scale.jpg</image:loc>
			<image:title>RondoDox Botnet Expands to 174 Exploits, Leveraging Residential IP Infrastructure at Scale</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/camelclone-spy-campaign-abuses-public-file-sharing-sites-and-rclone-in-government-focused-attacks/</loc>
		<lastmod>2026-03-17T04:33:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CamelClone-Spy-Campaign-Abuses-Public-File-Sharing-Sites-and-Rclone-in-Government-Focused-Attacks.jpg</image:loc>
			<image:title>CamelClone Spy Campaign Abuses Public File-Sharing Sites and Rclone in Government-Focused Attacks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/stryker-confirms-destructive-wiper-attack-tens-of-thousands-of-devices-wiped/</loc>
		<lastmod>2026-03-17T04:30:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Stryker-Wiper-Attack.jpg</image:loc>
			<image:title>Stryker Wiper Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0141-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-03-16T15:03:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0140-multiple-vulnerabilities-in-drupal-plugins/</loc>
		<lastmod>2026-03-16T15:00:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0139-multiple-vulnerabilities-in-zoom-products/</loc>
		<lastmod>2026-03-16T13:53:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openclaw-ai-agents-leaking-sensitive-data-in-indirect-prompt-injection-attacks/</loc>
		<lastmod>2026-03-16T12:34:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenClaw-AI-Agents-Leaking-Sensitive-Data-in-Indirect-Prompt-Injection-Attacks-1.jpg</image:loc>
			<image:title>OpenClaw AI Agents Leaking Sensitive Data in Indirect Prompt Injection Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-microsoft-teams-and-quick-assist-to-drop-stealthy-a0backdoor/</loc>
		<lastmod>2026-03-16T12:32:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Attackers-Abuse-Microsoft-Teams-and-Quick-Assist-to-Drop-Stealthy-A0Backdoor.jpg</image:loc>
			<image:title>Attackers Abuse Microsoft Teams and Quick Assist to Drop Stealthy A0Backdoor</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-looker-studio-vulnerabilities-allow-attackers-to-exfiltrate-data-from-google-services/</loc>
		<lastmod>2026-03-16T09:52:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Looker-Studio-Vulnerabilities.jpg</image:loc>
			<image:title>Google Looker Studio Vulnerabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/glassworm-campaign-uses-72-malicious-open-vsx-extensions-to-broaden-reach/</loc>
		<lastmod>2026-03-16T05:11:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/GlassWorm-Spreads-via-72-Malicious-Open-VSX-Extensions-Hidden-in-Transitive-Dependencies-1-1-1.jpg</image:loc>
			<image:title>GlassWorm Spreads via 72 Malicious Open VSX Extensions Hidden in Transitive Dependencies (1) (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-npm-packages-posing-as-solara-executor-target-discord-browsers-and-crypto-wallets/</loc>
		<lastmod>2026-03-16T04:56:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malicious-npm-Campaign-Impersonates-Solara-Executor-to-Steal-Discord-and-Crypto-Wallet-Data-2-1.jpg</image:loc>
			<image:title>Malicious npm Campaign Impersonates Solara Executor to Steal Discord and Crypto Wallet Data (2) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fortigate-firewalls-exploited-in-wave-of-attacks-to-breach-networks-and-steal-credentials/</loc>
		<lastmod>2026-03-16T04:55:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FortiGate-Firewalls-Exploited.jpg</image:loc>
			<image:title>FortiGate Firewalls Exploited</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-releases-out-of-band-patch-to-fix-critical-rras-rce-vulnerabilities-in-windows-11/</loc>
		<lastmod>2026-03-16T04:25:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-Out-of-Band-Update.jpg</image:loc>
			<image:title>Windows 11 Out-of-Band Update</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/meta-to-permanently-remove-end-to-end-encryption-feature-in-instagram-dms/</loc>
		<lastmod>2026-03-16T04:24:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Instagram-Encryption.jpg</image:loc>
			<image:title>Instagram Encryption</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-to-block-windows-11-and-server-2025-automated-installation-after-critical-rce-vulnerability/</loc>
		<lastmod>2026-03-16T04:23:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-and-Server-2025.jpg</image:loc>
			<image:title>Windows 11 and Server 2025</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-langsmith-account-takeover-vulnerability-puts-users-at-risk/</loc>
		<lastmod>2026-03-14T07:13:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-LangSmith-Vulnerability-Enables-Complete-Account-Takeover-1-1-1.jpg</image:loc>
			<image:title>Critical LangSmith Vulnerability Enables Complete Account Takeover (1) (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/authorities-crack-down-on-45000-malicious-ips-powering-ransomware-attacks/</loc>
		<lastmod>2026-03-14T07:11:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Authorities-Crack-Down-on-45000-Malicious-IPs-Powering-Ransomware-Attacks-1.jpg</image:loc>
			<image:title>Authorities Crack Down on 45,000 Malicious IPs Powering Ransomware Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-confirms-windows-11-24h2-25h2-bug-blocks-access-to-the-system-drive-c/</loc>
		<lastmod>2026-03-14T07:08:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-11-Bug-Drive-C.jpg</image:loc>
			<image:title>Windows 11 Bug Drive C</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/loblaw-data-breach-hackers-accessed-it-network-and-customer-information/</loc>
		<lastmod>2026-03-14T07:03:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Loblaw-Data-Breach-Hackers-Accessed-IT-network-and-Customer-information-1.jpg</image:loc>
			<image:title>Loblaw Data Breach - Hackers Accessed IT network and Customer information (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/authorities-dismantle-malicious-proxy-service-used-to-deploy-malware-attacking-thousands-of-users/</loc>
		<lastmod>2026-03-14T07:00:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Authorities-Dismantle-Malicious-Proxy-Service-Used-to-Deploy-Malware-Attacking-Thousands-of-Users-1.jpg</image:loc>
			<image:title>Authorities Dismantle Malicious Proxy Service Used to Deploy Malware Attacking Thousands of Users (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-released-emergency-updates-for-ios-15-8-7-to-thwart-coruna-exploit-kit/</loc>
		<lastmod>2026-03-14T06:57:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apple-Released-Emergency-Updates-for-iOS-15.8.7-to-Thwart-‘Coruna-Exploit-Kit-1.jpg</image:loc>
			<image:title>Apple Released Emergency Updates for iOS 15.8.7 to Thwart ‘Coruna’ Exploit Kit (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0138-multiple-vulnerabilities-in-mozilla-products/</loc>
		<lastmod>2026-03-13T15:54:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0137-multiple-vulnerabilities-in-hpe-aruba-networking-aos-cx/</loc>
		<lastmod>2026-03-13T15:50:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0136-multiple-vulnerabilities-in-splunk-enterprise-products/</loc>
		<lastmod>2026-03-13T15:48:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0135-multiple-vulnerabilities-in-adobe-products/</loc>
		<lastmod>2026-03-13T15:44:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-healthtech-innovator-humata-health-partners-with-accuknox-for-zero-trust-cnapp/</loc>
		<lastmod>2026-03-13T12:27:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/AccuKnox_Humata_collab.jpg</image:loc>
			<image:title>AccuKnox Humata collab</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/starbucks-data-breach-hundreds-of-users-personal-data-exposed/</loc>
		<lastmod>2026-03-13T12:16:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Starbucks-Data-Breach.jpg</image:loc>
			<image:title>Starbucks Data Breach</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/veeam-patches-multiple-critical-rce-vulnerabilities-on-backup-server/</loc>
		<lastmod>2026-03-13T10:51:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Veeam-patches-Multiple-Critical-RCE-Vulnerabilities-on-Backup-Server-1.jpg</image:loc>
			<image:title>Veeam patches Multiple Critical RCE Vulnerabilities on Backup Server (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/metasploit-pro-5-0-0-released-with-powerful-new-modules-and-critical-enhancements/</loc>
		<lastmod>2026-03-13T10:50:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Metasploit-Pro-5.0.0-Released-With-powerful-new-modules-and-critical-enhancements-1.jpg</image:loc>
			<image:title>Metasploit Pro 5.0.0 Released With powerful new modules and critical enhancements (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chrome-zero-day-vulnerabilities-actively-exploited-in-the-wild-to-execute-malicious-code/</loc>
		<lastmod>2026-03-13T08:01:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chrome-Zero-Day-Vulnerabilities.jpg</image:loc>
			<image:title>Chrome Zero-Day Vulnerabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/salesforce-warns-of-shinyhunters-group-exploiting-experience-cloud-sites/</loc>
		<lastmod>2026-03-13T07:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Salesforce-Warns-of-ShinyHunters-Group-Exploiting-Experience-Cloud-sites-1.jpg</image:loc>
			<image:title>Salesforce Warns of ShinyHunters Group Exploiting Experience Cloud sites (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ericsson-us-discloses-data-breach-hackers-stolen-employees-and-customers-data/</loc>
		<lastmod>2026-03-13T05:19:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ericsson-US-discloses-data-breach-Hackers-Stolen-employees-and-customers-Data-1.jpg</image:loc>
			<image:title>Ericsson US discloses data breach - Hackers Stolen employees and customers Data (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/paloalto-cortex-xdr-broker-vulnerability-attackers-to-obtain-and-modify-sensitive-information/</loc>
		<lastmod>2026-03-13T05:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Paloalto-Cortex-XDR-Broker-Vulnerability-Attackers-to-obtain-and-modify-sensitive-information-1.jpg</image:loc>
			<image:title>Paloalto Cortex XDR Broker Vulnerability Attackers to obtain and modify sensitive information (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-mediatek-vulnerability-lets-attackers-steal-android-phone-pins-in-45-seconds/</loc>
		<lastmod>2026-03-13T05:17:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/MediaTek-Vulnerability-Android-Phone.jpg</image:loc>
			<image:title>MediaTek Vulnerability Android Phone</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-copilot-email-and-teams-summarization-vulnerability-enables-phishing-attacks/</loc>
		<lastmod>2026-03-13T05:16:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Copilot-Summarization-Vulnerability.jpg</image:loc>
			<image:title>Microsoft Copilot Summarization Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-hijack-microsoft-365-accounts-through-oauth-device-code-abuse-without-stealing-passwords/</loc>
		<lastmod>2026-03-13T05:15:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Exposing-OAuth-Device-Code-Phishing-in-Microsoft.jpg</image:loc>
			<image:title>Exposing OAuth Device Code Phishing in Microsoft</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/meta-launches-new-anti-scam-tools-on-whatsapp-facebook-and-messenger/</loc>
		<lastmod>2026-03-13T05:14:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Meta-Launches-New-Anti-Scam-Tools-on-WhatsApp-Facebook-and-Messenger-1.jpg</image:loc>
			<image:title>Meta Launches New Anti-Scam Tools on WhatsApp, Facebook and Messenger (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openssh-gssapi-vulnerability-allow-an-attacker-to-crash-ssh-child-processes/</loc>
		<lastmod>2026-03-13T05:13:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenSSH-GSSAPI-Vulnerability.jpg</image:loc>
			<image:title>OpenSSH GSSAPI Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0013-multiple-vulnerabilities-in-intel-products/</loc>
		<lastmod>2026-03-12T15:00:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0134-denial-of-service-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-12T14:56:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0133-denial-of-service-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-12T14:51:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0132-privilege-escalation-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-12T14:46:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0131-cross-site-scripting-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-12T14:39:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0130-multiple-vulnerabilities-in-ivanti-endpoint-manager/</loc>
		<lastmod>2026-03-12T14:33:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-ios-xr-software-vulnerability-allow-attacker-to-execute-commands-as-root/</loc>
		<lastmod>2026-03-12T11:06:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-IOS-XR-Software-Vulnerability-Allow-attacker-to-execute-commands-as-root-1.jpg</image:loc>
			<image:title>Cisco IOS XR Software Vulnerability Allow attacker to execute commands as root (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/solarwinds-web-help-desk-deserialization-vulnerability-enables-command-execution/</loc>
		<lastmod>2026-03-12T10:06:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/SolarWinds-Web-Help-Desk-Deserialization-Vulnerability-Enables-Command-Execution-1.jpg</image:loc>
			<image:title>SolarWinds Web Help Desk Deserialization Vulnerability Enables Command Execution (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/splunk-rce-vulnerability-allow-attackers-to-execute-arbitrary-shell-commands/</loc>
		<lastmod>2026-03-12T10:03:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Splunk-RCE-Vulnerability-Allow-Attackers-to-execute-arbitrary-shell-commands-1.jpg</image:loc>
			<image:title>Splunk RCE Vulnerability Allow Attackers to execute arbitrary shell commands (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-leveraging-cloudflare-anti-bot-features-to-steal-microsoft-365-credentials/</loc>
		<lastmod>2026-03-12T08:30:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cloudflare-Anti-Bot-Features-Microsoft-365.jpg</image:loc>
			<image:title>Cloudflare Anti-Bot Features Microsoft 365</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-microsoft-office-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-03-12T08:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Microsoft-Office-Vulnerability-Enables-Remote-Code-Execution-Attacks-1.jpg</image:loc>
			<image:title>Critical Microsoft Office Vulnerability Enables Remote Code Execution Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gitlab-security-update-patch-for-xss-and-api-dos-vulnerabilities/</loc>
		<lastmod>2026-03-12T08:09:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/GitLab-Security-Update-Patch-for-XSS-and-API-DoS-Vulnerabilities-1.jpg</image:loc>
			<image:title>GitLab Security Update - Patch for XSS and API DoS Vulnerabilities (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chrome-security-update-patch-for-29-vulnerabilities-that-allows-remote-code-execution/</loc>
		<lastmod>2026-03-12T05:54:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chrome-Security-Update-Patch-for-29-Vulnerabilities-that-Allows-Remote-Code-Execution-1.jpg</image:loc>
			<image:title>Chrome Security Update - Patch for 29 Vulnerabilities that Allows Remote Code Execution (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-active-directory-domain-services-vulnerability-let-attackers-escalate-privileges/</loc>
		<lastmod>2026-03-12T05:09:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Active-Directory-Domain-Services-Vulnerability-Let-Attackers-Escalate-Privileges-1.jpg</image:loc>
			<image:title>Microsoft Active Directory Domain Services Vulnerability Let Attackers Escalate Privileges (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/irans-internet-blackout-surpasses-10-days-as-traffic-flatlines-below-1-of-normal-levels/</loc>
		<lastmod>2026-03-12T04:37:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iran-Internet-Blackout.jpg</image:loc>
			<image:title>Iran Internet Blackout</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/stryker-cyber-attack-hackers-claim-system-breach-and-device-wipe/</loc>
		<lastmod>2026-03-12T04:33:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Stryker-Cyber-Attack.jpg</image:loc>
			<image:title>Stryker Cyber Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-completes-acquisition-of-wiz-in-historic-32-billion-deal/</loc>
		<lastmod>2026-03-12T04:32:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Acquires-Wiz.jpg</image:loc>
			<image:title>Google Acquires Wiz</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0011-multiple-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2026-03-11T14:24:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0129-domain-spoofing-vulnerability-in-firefox-focus-for-ios/</loc>
		<lastmod>2026-03-11T14:14:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0128-buffer-overflow-vulnerability-in-fortinet-fortimanager/</loc>
		<lastmod>2026-03-11T14:12:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0127-remote-code-execution-vulnerability-in-freescout-helpdesk-platform/</loc>
		<lastmod>2026-03-11T14:08:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0126-multiple-vulnerabilities-in-android-os/</loc>
		<lastmod>2026-03-11T14:01:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0125-multiple-vulnerabilities-in-wireshark/</loc>
		<lastmod>2026-03-11T13:58:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-releases-cumulative-updates-for-windows-11-25h2-24h2-and-23h2/</loc>
		<lastmod>2026-03-11T13:01:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Releases-cumulative-updates-for-Windows-11-25H224H2-and-23H2-1.jpg</image:loc>
			<image:title>Microsoft Releases cumulative updates for Windows 11 25H224H2 and 23H2 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-scale-early-threat-detection-in-your-soc-without-extra-staff/</loc>
		<lastmod>2026-03-11T12:59:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Scaling-Early-Threat-Detection-in-Your-SOC.jpg</image:loc>
			<image:title>Scaling Early Threat Detection in Your SOC</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/instagram-down-new-outage-causes-widespread-disruption-in-posting-and-dm-functionality/</loc>
		<lastmod>2026-03-11T10:59:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Instagram-Down-New-Outage-Causes-Widespread-Disruption-in-Posting-and-DM-Functionality-1.jpg</image:loc>
			<image:title>Instagram Down New Outage Causes Widespread Disruption in Posting and DM Functionality (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-net-0-day-vulnerability-enables-denial-of-service-attacks/</loc>
		<lastmod>2026-03-11T07:21:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-.NET-0-Day-Vulnerability-Enables-Denial-of-Service-Attacks-1.jpg</image:loc>
			<image:title>Microsoft .NET 0-Day Vulnerability Enables Denial of Service Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gogs-vulnerability-enables-attackers-to-silently-overwrite-large-file-storage-objects/</loc>
		<lastmod>2026-03-11T06:58:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Gogs-Vulnerability-Enables-Attackers-to-silently-overwrite-Large-File-Storage-objects-1.jpg</image:loc>
			<image:title>Gogs Vulnerability Enables Attackers to silently overwrite Large File Storage objects (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/leading-myanmar-fleet-management-company-yoma-fleet-selects-accuknox-siem-to-replace-legacy-tools/</loc>
		<lastmod>2026-03-11T06:01:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/yoma-fleet.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openclaw-advisory-surge-exposes-gap-between-github-and-cve-vulnerability-tracking/</loc>
		<lastmod>2026-03-11T05:00:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenClaw-Advisory-Surge-Exposes-Gap-Between-GitHub-and-CVE-Vulnerability-Tracking.jpg</image:loc>
			<image:title>OpenClaw Advisory Surge Exposes Gap Between GitHub and CVE Vulnerability Tracking</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/sap-security-update-patch-for-multiple-vulnerabilities-that-enable-remote-code-execution/</loc>
		<lastmod>2026-03-11T04:59:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/SAP-Security-Update-March-2026.jpg</image:loc>
			<image:title>SAP Security Update March 2026</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-ivanti-endpoint-manager-authentication-bypass-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-11T04:58:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-Ivanti-Endpoint-Manager-Authentication-Bypass-Vulnerability-Exploited-in-Attacks.jpg</image:loc>
			<image:title>CISA Warns of Ivanti Endpoint Manager Authentication Bypass Vulnerability Exploited in Attacks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/kali-linux-enhances-ai-driven-penetration-testing-with-local-ollama-5ire-and-mcp-kali-server/</loc>
		<lastmod>2026-03-11T04:58:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Kali-Linux-AI-driven-Penetration-Testing.jpg</image:loc>
			<image:title>Kali Linux AI-driven Penetration Testing</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-patch-tuesday-march-2026-78-vulnerabilities-fixed-including-one-0-day/</loc>
		<lastmod>2026-03-11T04:57:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Patch-Tuesday-March-2026.jpg</image:loc>
			<image:title>Microsoft Patch Tuesday March 2026</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-to-acquire-promptfoo-to-fix-vulnerabilities-in-ai-systems/</loc>
		<lastmod>2026-03-11T04:55:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAI-to-acquire-Promptfoo-to-Fix-Vulnerabilities-in-AI-systems-1.jpg</image:loc>
			<image:title>OpenAI to acquire Promptfoo to Fix Vulnerabilities in AI systems (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cloudflare-pingora-vulnerabilities-allows-request-smuggling-cache-poisoning-attacks/</loc>
		<lastmod>2026-03-11T04:44:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cloudflare-Pingora-Vulnerabilities-Allows-Request-Smuggling-Cache-poisoning-Attacks-1.jpg</image:loc>
			<image:title>Cloudflare Pingora Vulnerabilities Allows Request Smuggling &#038; Cache poisoning Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malformed-zip-files-allows-attackers-to-bypass-antivirus-and-edr-detections/</loc>
		<lastmod>2026-03-11T04:43:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malformed-ZIP-Files-Allows-Attackers-to-Bypass-Antivirus-and-EDR-Retections-1.jpg</image:loc>
			<image:title>Malformed ZIP Files Allows Attackers to Bypass Antivirus and EDR Retections (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ivanti-desktop-and-server-management-vulnerability-allows-attackers-to-escalate-privileges/</loc>
		<lastmod>2026-03-11T04:42:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Ivanti-Desktop-and-Server-Management-Vulnerability.jpg</image:loc>
			<image:title>Ivanti Desktop and Server Management Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fortinet-security-update-patch-for-multiple-vulnerabilities-that-enable-malicious-command-execution/</loc>
		<lastmod>2026-03-11T04:41:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fortinet-Security-Update.jpg</image:loc>
			<image:title>Fortinet Security Update</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/zoom-workplace-for-windows-vulnerabilities-allow-privilege-escalation/</loc>
		<lastmod>2026-03-11T04:38:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Zoom-Workplace-for-Windows-Vulnerabilities.jpg</image:loc>
			<image:title>Zoom Workplace for Windows Vulnerabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fortinet-fortimanager-fgtupdates-vulnerability-allows-attackers-to-execute-malicious-commands/</loc>
		<lastmod>2026-03-11T04:38:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Fortinet-FortiManager-fgtupdates-Vulnerability.jpg</image:loc>
			<image:title>Fortinet FortiManager fgtupdates Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-sql-server-zero-day-vulnerability-allows-attackers-to-escalate-privileges/</loc>
		<lastmod>2026-03-11T04:34:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-SQL-Server-Zero-Day-Vulnerability.jpg</image:loc>
			<image:title>Microsoft SQL Server Zero-Day Vulnerability</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0010-multiple-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2026-03-10T13:14:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0124-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-03-10T13:11:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0123-denial-of-service-vulnerabilities-in-cisco/</loc>
		<lastmod>2026-03-10T13:08:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0122-multiple-vulnerabilities-in-cisco/</loc>
		<lastmod>2026-03-10T13:04:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0121-multiple-vulnerabilities-in-cisco/</loc>
		<lastmod>2026-03-10T13:01:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0120-denial-of-service-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-10T12:58:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0119-sql-injection-vulnerability-in-cisco/</loc>
		<lastmod>2026-03-10T12:55:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0118-multiple-vulnerabilities-in-cisco/</loc>
		<lastmod>2026-03-10T12:53:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iphone-exploit-toolkit-used-by-russian-spies-likely-originated-from-u-s-contractor/</loc>
		<lastmod>2026-03-10T09:49:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/iPhone-Exploit-Toolkit-Used-by-Russian-Spies-Likely-Originated-from-U.S.-Contractor-1.jpg</image:loc>
			<image:title>iPhone Exploit Toolkit Used by Russian Spies Likely Originated from U.S. Contractor (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apache-zookeeper-vulnerability-allow-attackers-to-access-sensitive-data/</loc>
		<lastmod>2026-03-10T09:46:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apache-ZooKeeper-Vulnerability-allow-attackers-to-Access-Sensitive-Data-1.jpg</image:loc>
			<image:title>Apache ZooKeeper Vulnerability allow attackers to Access Sensitive Data (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropic-sued-the-u-s-government-for-labelling-claude-as-supply-chain-risk/</loc>
		<lastmod>2026-03-10T09:42:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Anthropic-sued-the-U.S.-government-for-Labelling-Claude-as-‘Supply-Chain-Risk-1-1.jpg</image:loc>
			<image:title>Anthropic sued the U.S. government for Labelling Claude as ‘Supply Chain Risk’ (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iran-linked-hackers-target-u-s-critical-infrastructure-amid-rising-cyber-threat-activity/</loc>
		<lastmod>2026-03-10T09:38:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iran-Linked-Hackers-Target-U.S.-Critical-Infrastructure-Amid-Rising-Cyber-Threat-Activity.jpg</image:loc>
			<image:title>Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/signal-confirms-targeted-phishing-attacks-resulting-in-account-takeovers/</loc>
		<lastmod>2026-03-10T09:28:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Signal-Confirms-Targeted-Phishing-Attacks.jpg</image:loc>
			<image:title>Signal Confirms Targeted Phishing Attacks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/maas-vip-keylogger-campaign-uses-steganography-and-in-memory-execution-to-steal-credentials-at-scale/</loc>
		<lastmod>2026-03-10T09:24:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/MaaS-VIP-Keylogger-Campaign-Uses-Steganography-and-In-Memory-Execution-to-Steal-Credentials-at-Scale.jpg</image:loc>
			<image:title>MaaS VIP Keylogger Campaign Uses Steganography and In-Memory Execution to Steal Credentials at Scale</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vietnam-based-cybercrime-network-enables-fraudulent-account-signups-at-scale/</loc>
		<lastmod>2026-03-10T09:21:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Vietnam-Based-Cybercrime-Network-Enables-Fraudulent-Account-Signups-at-Scale.jpg</image:loc>
			<image:title>Vietnam-Based Cybercrime Network Enables Fraudulent Account Signups at Scale</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-cleanmymac-site-to-deploy-shub-stealer-and-hijack-crypto-wallets/</loc>
		<lastmod>2026-03-10T08:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Use-Fake-CleanMyMac-Site-to-Deploy-SHub-Stealer-and-Hijack-Crypto-Wallets.jpg</image:loc>
			<image:title>Hackers Use Fake CleanMyMac Site to Deploy SHub Stealer and Hijack Crypto Wallets</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/boryptgrab-stealer-spreads-via-fake-github-repositories-stealing-browser-and-crypto-wallet-data/</loc>
		<lastmod>2026-03-10T08:42:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/BoryptGrab-Stealer-Spreads-via-Fake-GitHub-Repositories-Stealing-Browser-and-Crypto-Wallet-Data.jpg</image:loc>
			<image:title>BoryptGrab Stealer Spreads via Fake GitHub Repositories, Stealing Browser and Crypto Wallet Data</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-attack-employees-over-microsoft-teams-to-trick-them-into-granting-remote-access/</loc>
		<lastmod>2026-03-10T08:39:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Attack-Over-Microsoft-Teams.jpg</image:loc>
			<image:title>Hackers Attack Over Microsoft Teams</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/scamagent-ai-agent-built-by-researchers-that-run-fully-autonomous-scam-calls/</loc>
		<lastmod>2026-03-10T08:22:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ScamAgent-AI-Agent-built-by-researchers-that-run-fully-autonomous-scam-calls-1.jpg</image:loc>
			<image:title>ScamAgent- AI Agent built by researchers that run fully autonomous scam calls (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ghostclaw-mimic-as-openclaw-to-steal-everything-from-developers/</loc>
		<lastmod>2026-03-10T08:18:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/GhostClaw-Mimic-as-OpenClaw-to-Steal-Everything-from-Developers.jpg</image:loc>
			<image:title>GhostClaw Mimic as OpenClaw to Steal Everything from Developers</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chinese-apt-campaign-targets-qatar-with-plugx-lures-tied-to-middle-east-conflict/</loc>
		<lastmod>2026-03-10T08:15:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chinese-APT-Campaign-Targets-Qatar-With-PlugX-Lures-Tied-to-Middle-East-Conflict.jpg</image:loc>
			<image:title>Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/signed-malware-masquerading-as-teams-zoom-apps-drops-rmm-backdoors/</loc>
		<lastmod>2026-03-10T08:13:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Signed-Malware-Masquerading-as-Teams-Zoom-Apps-Drops-RMM-Backdoors.jpg</image:loc>
			<image:title>Signed Malware Masquerading as Teams, Zoom Apps Drops RMM Backdoors</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-exiftool-flaw-lets-malicious-images-trigger-code-execution-on-macos-2/</loc>
		<lastmod>2026-03-10T04:58:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-ExifTool-Flaw-Lets-Malicious-Images-Trigger-Code-Execution-on-macOS.jpg</image:loc>
			<image:title>Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/security-risk-advisors-releases-the-purple-perspective-2026-report/</loc>
		<lastmod>2026-03-10T04:39:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/purple_perspective.jpg</image:loc>
			<image:title>purple perspective</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/m365pwned-red-team-gui-toolkit-for-microsoft-365-exploitation-via-graph-api/</loc>
		<lastmod>2026-03-10T04:36:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/M365Pwned-Red-Team-GUI-Toolkit.jpg</image:loc>
			<image:title>M365Pwned Red Team GUI Toolkit</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-launches-copilot-cowork-a-new-ai-feature-in-microsoft-365-to-automate-tasks/</loc>
		<lastmod>2026-03-10T04:27:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Copilot-Cowork.jpg</image:loc>
			<image:title>Copilot Cowork</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/clipxdaemon-emerges-as-c2-less-linux-clipboard-hijacker-targeting-crypto-wallets-in-x11-sessions/</loc>
		<lastmod>2026-03-10T04:24:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ClipXDaemon-Emerges-as-C2-Less-Linux-Clipboard-Hijacker-Targeting-Crypto-Wallets-in-X11-Sessions.jpg</image:loc>
			<image:title>ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-nginx-ui-vulnerabilities-allow-attacker-to-download-a-full-system-backup/</loc>
		<lastmod>2026-03-09T11:59:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Nginx-UI-Vulnerabilities-Allow-attacker-to-download-a-full-system-backup-1.jpg</image:loc>
			<image:title>Critical Nginx UI Vulnerabilities Allow attacker to download a full system backup (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/transparent-tribes-vibeware-shift-signals-rise-of-ai-generated-malware-at-industrial-scale/</loc>
		<lastmod>2026-03-09T10:54:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Transparent-Tribes-‘Vibeware-Shift-Signals-Rise-of-AI-Generated-Malware-at-Industrial-Scale.jpg</image:loc>
			<image:title>Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-exiftool-flaw-lets-malicious-images-trigger-code-execution-on-macos/</loc>
		<lastmod>2026-03-09T09:50:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-ExifTool-Flaw-Lets-Malicious-Images-Trigger-Code-Execution-on-macOS-1.jpg</image:loc>
			<image:title>Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-macos-and-ios-vulnerabilities-exploited-in-attacks/</loc>
		<lastmod>2026-03-09T09:44:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-Warns-of-macOS-and-iOS-Vulnerabilities-Exploited-in-Attacks-1-1.jpg</image:loc>
			<image:title>CISA Warns of macOS and iOS Vulnerabilities Exploited in Attacks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-warns-fake-ai-browser-extensions-compromised-chat-histories-across-20000-enterprise-tenants/</loc>
		<lastmod>2026-03-09T09:43:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-Warns-Fake-AI-Browser-Extensions-Compromised-Chat-Histories-Across-20000-Enterprise-Tenants.jpg</image:loc>
			<image:title>Microsoft Warns Fake AI Browser Extensions Compromised Chat Histories Across 20,000+ Enterprise Tenants</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hikvision-multiple-products-vulnerability-allows-malicious-users-to-escalate-privileges/</loc>
		<lastmod>2026-03-09T09:31:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hikvision-Multiple-Products-Vulnerability-Allow-malicious-user-to-escalate-privileges-1.jpg</image:loc>
			<image:title>Hikvision Multiple Products Vulnerability Allow malicious user to escalate privileges (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybersecurity-for-saas-applications/</loc>
		<lastmod>2026-03-09T08:23:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/role-of-cyber-security-in-saas.webp</image:loc>
			<image:title>role-of-cyber-security-in-saas</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybersecurity-in-supply-chain-management/</loc>
		<lastmod>2026-03-09T08:04:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/supply-chain-cybersecurity.webp</image:loc>
			<image:title>supply-chain-cybersecurity</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-imtoken-chrome-extension-caught-stealing-mnemonics-and-private-keys/</loc>
		<lastmod>2026-03-09T05:07:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Malicious-Browser-Add‑on-Targets-imToken-Users-Private-Keys-2-1.jpg</image:loc>
			<image:title>Malicious Browser Add‑on Targets imToken Users’ Private Keys (2) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cognizant-trizetto-data-breach-exposes-health-information-of-3-4-million-patients/</loc>
		<lastmod>2026-03-09T05:06:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cognizant-TriZetto-Data-Breach.jpg</image:loc>
			<image:title>Cognizant TriZetto Data Breach</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-zero-click-command-injection-in-avideo-platform-allows-stream-hijacking/</loc>
		<lastmod>2026-03-09T05:05:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Critical-Zero-Click-Command-Injection-in-AVideo-Platform-Allows-Stream-Hijacking-1-1.jpg</image:loc>
			<image:title>Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-allegedly-selling-exploit-for-windows-remote-desktop-services-0-day-flaw/</loc>
		<lastmod>2026-03-09T05:03:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Windows-Remote-Desktop-Services-0-Day.jpg</image:loc>
			<image:title>Windows Remote Desktop Services 0-Day</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/wifi-signals-reveal-human-activities-through-walls-by-mapping-body-keypoints/</loc>
		<lastmod>2026-03-09T04:57:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/WiFi-Signals-Reveal-Human-Activities.jpg</image:loc>
			<image:title>WiFi Signals Reveal Human Activities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-launches-codex-security-that-discover-validate-and-patch-vulnerabilities/</loc>
		<lastmod>2026-03-09T04:42:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAI-Launches-Codex-Security.jpg</image:loc>
			<image:title>OpenAI Launches Codex Security</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-clickfix-attack-leverages-windows-terminal-for-payload-execution/</loc>
		<lastmod>2026-03-09T04:39:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-ClickFix-Attack-leverages-Windows-Terminal-for-Payload-Execution.jpg</image:loc>
			<image:title>New ClickFix Attack leverages Windows Terminal for Payload Execution</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/rmm-tools-essential-for-it-operations-but-increasingly-weaponized-by-attackers/</loc>
		<lastmod>2026-03-09T04:32:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/RMM-Tools-Essential-for-IT-Operations-but-Increasingly-Weaponized-by-Attackers.jpg</image:loc>
			<image:title>RMM Tools Essential for IT Operations but Increasingly Weaponized by Attackers</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-investigates-hack-on-its-wiretap-and-critical-surveillance-systems/</loc>
		<lastmod>2026-03-09T04:30:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FBI-Investigates-Hack.jpg</image:loc>
			<image:title>FBI Investigates Hack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/linux-rootkits-using-advanced-ebpf-and-io_uring-techniques/</loc>
		<lastmod>2026-03-09T04:27:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Linux-Rootkits-Using-Advanced-eBPF-and-io_uring-Techniques.jpg</image:loc>
			<image:title>Linux Rootkits Using Advanced eBPF and io_uring Techniques</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-ai-uncovers-22-firefox-vulnerabilities-in-two-weeks/</loc>
		<lastmod>2026-03-09T04:24:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Claude-AI-22-Firefox-Vulnerabilities.jpg</image:loc>
			<image:title>Claude AI 22 Firefox Vulnerabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-365-outage-hits-north-america-as-cdn-misconfiguration-disrupts-multiple-services/</loc>
		<lastmod>2026-03-09T04:21:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Microsoft-365-Outage-Hits-North-America.jpg</image:loc>
			<image:title>Microsoft 365 Outage Hits North America</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openant-ai-based-vulnerability-scanner-to-detect-vulnerabilities/</loc>
		<lastmod>2026-03-09T04:17:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/OpenAnt-Vulnerability-Scanner.jpg</image:loc>
			<image:title>OpenAnt Vulnerability Scanner</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/china-nexus-hackers-attacking-telecommunication-providers-with-new-malware/</loc>
		<lastmod>2026-03-07T06:33:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/China-Nexus-Hackers-Attacking-Telecommunication-Providers-With-New-Malware.jpg</image:loc>
			<image:title>China-Nexus Hackers Attacking Telecommunication Providers With New Malware</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apache-activemq-allow-attackers-to-trigger-dos-attacks-with-malformed-packets/</loc>
		<lastmod>2026-03-07T06:31:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Apache-ActiveMQ-Allow-Attackers-to-Trigger-DoS-Attacks-With-malformed-packets-1.jpg</image:loc>
			<image:title>Apache ActiveMQ Allow Attackers to Trigger DoS Attacks With malformed packets (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-android-mirax-bot-advertised-on-cybercriminal-forums-claiming-advanced-capabilities/</loc>
		<lastmod>2026-03-07T06:28:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Android-Mirax-Bot-Advertised-on-Cybercriminal-Forums-Claiming-Advanced-Capabilities.jpg</image:loc>
			<image:title>New Android Mirax Bot Advertised on Cybercriminal Forums Claiming Advanced Capabilities</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/amazon-aws-lc-vulnerabilities-allows-attackers-to-bypass-certificate-chain-verification/</loc>
		<lastmod>2026-03-07T06:26:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Amazon-AWS-LC-Vulnerabilities-Allows-Attackers-to-Bypass-Certificate-chain-verification-1.jpg</image:loc>
			<image:title>Amazon AWS-LC Vulnerabilities Allows Attackers to Bypass Certificate chain verification (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/wordpress-membership-plugin-vulnerability-let-attackers-create-admin-accounts/</loc>
		<lastmod>2026-03-07T06:24:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/WordPress-membership-plugin-Vulnerability-Let-Attackers-create-admin-accounts-1-1.jpg</image:loc>
			<image:title>WordPress membership plugin Vulnerability Let Attackers create admin accounts (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fbi-arrested-u-s-government-contractor-who-allegedly-stole-more-than-46-million/</loc>
		<lastmod>2026-03-07T06:00:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/FBI-Arrested-U.S.-government-contractor-who-allegedly-stole-more-than-46-million-1-1.jpg</image:loc>
			<image:title>FBI Arrested U.S. government contractor who allegedly stole more than $46 million (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0117-multiple-vulnerabilities-in-vmware-workstation-and-fusion/</loc>
		<lastmod>2026-03-06T14:00:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0116-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-03-06T13:57:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/phishing-emails-push-fake-chatgpt-and-gemini-ios-apps-to-steal-logins/</loc>
		<lastmod>2026-03-06T12:20:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Phishing-Emails-Push-Fake-ChatGPT-and-Gemini-iOS-Apps-To-Steal-Logins.jpg</image:loc>
			<image:title>Phishing Emails Push Fake ChatGPT and Gemini iOS Apps To Steal Logins</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-can-use-indirect-prompt-injection-allows-adversaries-to-manipulate-ai-agents-with-content/</loc>
		<lastmod>2026-03-06T10:13:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Can-Use-Indirect-Prompt-Injection-Allows-Adversaries-to-Manipulate-AI-Agents-with-Content.jpg</image:loc>
			<image:title>Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-protect-against-ddos-attacks/</loc>
		<lastmod>2026-03-06T10:10:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/DDoS-Attacks.jpg</image:loc>
			<image:title>DDoS-Attacks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-confirms-90-zero-day-vulnerabilities-actively-exploited-in-2025/</loc>
		<lastmod>2026-03-06T09:06:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Google-Confirms-90-zero-day-vulnerabilities-actively-exploited-in-2025.jpg</image:loc>
			<image:title>Google Confirms 90 zero-day vulnerabilities actively exploited in 2025</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/layer-2-switching-in-campus-networks/</loc>
		<lastmod>2026-03-06T08:59:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/layer2-switch.jpg</image:loc>
			<image:title>layer2 switch</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/fb723bb02adaf67622b9e48410260405d15425dd207df33cc2bb22b6d32cdd7b?ts=1772543500</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/what-is-bpdu-guard-and-why-use-it/</loc>
		<lastmod>2026-03-06T08:43:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/bpdu-guard-1.jpg</image:loc>
			<image:title>bpdu-guard (1)</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/7dbad80ff9125002c079711432d621eb44fa5fcd0d96cd191982893bc4662b33?ts=1772090079</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/threat-actors-intensify-targeting-of-ip-cameras-across-middle-east-amid-ongoing-conflict/</loc>
		<lastmod>2026-03-06T04:57:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Threat-Actors-Intensify-Targeting-of-IP-Cameras-Across-Middle-East-Amid-Ongoing-Conflict.jpg</image:loc>
			<image:title>Threat Actors Intensify Targeting of IP Cameras Across Middle East Amid Ongoing Conflict</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-mongodb-vulnerability-lets-hackers-crash-any-mongodb-server/</loc>
		<lastmod>2026-03-06T04:54:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-MongoDB-Vulnerability-enable-a-threat-actor-to-crash-any-MongoDB-server-1.jpg</image:loc>
			<image:title>New MongoDB Vulnerability enable a threat actor to crash any MongoDB server (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/redalert-mobile-espionage-campaign-targets-civilians-with-trojanized-rocket-alert-app-for-surveillance/</loc>
		<lastmod>2026-03-06T04:53:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/RedAlert-Mobile-Espionage-Campaign-Targets-Civilians-with-Trojanized-Rocket-Alert-App-for-Surveillance.jpg</image:loc>
			<image:title>RedAlert Mobile Espionage Campaign Targets Civilians with Trojanized Rocket Alert App for Surveillance</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/clickfix-campaign-uses-fake-vcs-on-linkedin-to-deliver-malware-to-crypto-and-web3-professionals/</loc>
		<lastmod>2026-03-06T04:52:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/ClickFix-Campaign-Uses-Fake-VCs-on-LinkedIn-to-Deliver-Malware-to-Crypto-and-Web3-Professionals.jpg</image:loc>
			<image:title>ClickFix Campaign Uses Fake VCs on LinkedIn to Deliver Malware to Crypto and Web3 Professionals</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/suspected-dprk-threat-actors-compromise-crypto-firms-steal-keys-and-cloud-assets-in-coordinated-attacks/</loc>
		<lastmod>2026-03-06T04:46:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Suspected-DPRK-Threat-Actors-Compromise-Crypto-Firms-Steal-Keys-and-Cloud-Assets-in-Coordinated-Attacks.jpg</image:loc>
			<image:title>Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/threat-actors-use-new-ringh23-arsenal-to-compromise-maccms-and-cdn-infrastructure-at-scale/</loc>
		<lastmod>2026-03-06T04:45:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Threat-Actors-Use-New-RingH23-Arsenal-to-Compromise-MacCMS-and-CDN-Infrastructure-at-Scale.jpg</image:loc>
			<image:title>Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/threat-actors-using-fake-claude-code-download-to-deploy-infostealer/</loc>
		<lastmod>2026-03-06T04:43:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Threat-Actors-Using-Fake-Claude-Code-Download-to-Deploy-Infostealer.jpg</image:loc>
			<image:title>Threat Actors Using Fake Claude Code Download to Deploy Infostealer</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/poc-exploit-released-cisco-sd-wan-0-day-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-03-06T04:35:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/PoC-Exploit-Released-Cisco-SD-WAN-0-Day-Vulnerability-Exploited-in-the-Wild-1.jpg</image:loc>
			<image:title>PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability Exploited in the Wild (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-launches-gpt-5-4-with-advanced-reasoning-coding-and-computer-use-capabilities/</loc>
		<lastmod>2026-03-06T04:34:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/GPT-5.4-Launched.jpg</image:loc>
			<image:title>GPT-5.4 Launched</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0115-multiple-vulnerabilities-in-google-chromeos-chromeos-flex/</loc>
		<lastmod>2026-03-05T15:02:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0114-remote-code-execution-vulnerability-in-juniper-junos-os-evolved/</loc>
		<lastmod>2026-03-05T14:58:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0113-multiple-vulnerabilities-in-drupal-modules/</loc>
		<lastmod>2026-03-05T14:53:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-secure-firewall-management-vulnerability-enables-remote-code-execution/</loc>
		<lastmod>2026-03-05T12:11:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-Secure-Firewall-Management-Vulnerability-Enables-Remote-Code-Execution-1.jpg</image:loc>
			<image:title>Cisco Secure Firewall Management Vulnerability Enables Remote Code Execution (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/aws-middle-east-uae-region-hit-by-drone-strikes-109-services-disrupted/</loc>
		<lastmod>2026-03-05T10:34:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/AWS-Middle-East-Services-Disrupted.jpg</image:loc>
			<image:title>AWS Middle East Services Disrupted</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-secure-firewall-management-vulnerability-allow-attackers-to-bypass-authentication/</loc>
		<lastmod>2026-03-05T10:33:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-Secure-Firewall-Management-Vulnerability-Allow-Attackers-to-bypass-authentication-1.jpg</image:loc>
			<image:title>Cisco Secure Firewall Management Vulnerability Allow Attackers to bypass authentication (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-mimic-lastpass-support-email-to-steal-vault-passwords/</loc>
		<lastmod>2026-03-05T08:55:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Hackers-Mimic-LastPass-Support-Email-to-Steal-Vault-Passwords.jpg</image:loc>
			<image:title>Hackers Mimic LastPass Support Email to Steal Vault Passwords</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</loc>
		<lastmod>2026-03-05T08:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Mail2Shell-zero-click-attack-lets-hackers-hijack-FreeScout-mail-servers-1.jpg</image:loc>
			<image:title>Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-catalyst-sd-wan-vulnerabilities-allow-attackers-to-gain-root-access/</loc>
		<lastmod>2026-03-05T08:48:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Cisco-Catalyst-SD-WAN-Vulnerabilities-Allow-Attackers-to-Gain-Root-Access-1-1.jpg</image:loc>
			<image:title>Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-releases-emergency-chrome-update-to-fix-10-security-vulnerabilities/</loc>
		<lastmod>2026-03-05T07:01:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Chrome-Emergency-Update.png</image:loc>
			<image:title>Chrome Emergency Update</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/perplexitys-comet-browser-hijacked-using-calendar-invite-to-exfiltrate-sensitive-data/</loc>
		<lastmod>2026-03-05T06:04:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Perplexitys-Comet-Browser-Hijacked-Using-calendar-invite-to-Exfiltrate-Sensitive-Data-1.jpg</image:loc>
			<image:title>Perplexity&#039;s Comet Browser Hijacked Using calendar invite to Exfiltrate Sensitive Data (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/silver-dragon-apt-group-targets-europe-asia-using-google-drive-for-covert-communication/</loc>
		<lastmod>2026-03-05T06:03:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Silver-Dragon-APT-Group-Targets-Europe-Asia-Using-Google-Drive-for-Covert-Communication.jpg</image:loc>
			<image:title>Silver Dragon APT Group Targets Europe, Asia Using Google Drive for Covert Communication</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/phishing-campaign-exploits-google-cloud-to-host-malicious-redirects-via-gcs-bucket/</loc>
		<lastmod>2026-03-05T06:02:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Phishing-Campaign-Exploits-Google-Cloud-to-Host-Malicious-Redirects-via-GCS-Bucket.jpg</image:loc>
			<image:title>Phishing Campaign Exploits Google Cloud to Host Malicious Redirects via GCS Bucket</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/thousand-of-honeywell-controllers-exposed-online-without-authentication/</loc>
		<lastmod>2026-03-05T06:00:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Thousand-of-Honeywell-Controllers-Exposed-online-without-Authentication-1-1.jpg</image:loc>
			<image:title>Thousand of Honeywell Controllers Exposed online without Authentication (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-qualcomm-chipsets-memory-corruption-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-03-05T05:38:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/CISA-warns-of-Qualcomm-Chipsets-Memory-Corruption-Vulnerability-Exploited-in-Attacks-1-1.jpg</image:loc>
			<image:title>CISA warns of Qualcomm Chipsets Memory Corruption Vulnerability Exploited in Attacks (1) (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/escalating-iranian-apt-threats-against-critical-infrastructure-amid-geopolitical-conflict/</loc>
		<lastmod>2026-03-05T05:37:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Escalating-Iranian-APT-Threats-Against-Critical-Infrastructure-Amid-Geopolitical-Conflict.jpg</image:loc>
			<image:title>Escalating Iranian APT Threats Against Critical Infrastructure Amid Geopolitical Conflict</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/stolen-gemini-api-key-turned-180-bill-to-82000-in-two-days/</loc>
		<lastmod>2026-03-05T05:16:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Stolen-Gemini-API-Key-Turned-180-Bill-to-82000-in-Two-Days-1.jpg</image:loc>
			<image:title>Stolen Gemini API Key Turned $180 Bill to $82000 in Two Days (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trusted-azure-utility-azcopy-turned-into-data-exfiltration-tool-in-active-ransomware-campaigns/</loc>
		<lastmod>2026-03-05T05:15:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Trusted-Azure-Utility-AzCopy-Turned-into-Data-Exfiltration-Tool-in-Active-Ransomware-Campaigns.jpg</image:loc>
			<image:title>Trusted Azure Utility AzCopy Turned into Data Exfiltration Tool in Active Ransomware Campaigns</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/voidlink-malware-framework-attacking-kubernetes-and-ai-workloads/</loc>
		<lastmod>2026-03-05T05:14:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/VoidLink-Malware-Framework-Attacking-Kubernetes-and-AI-Workloads.jpg</image:loc>
			<image:title>VoidLink Malware Framework Attacking Kubernetes and AI Workloads</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iran-nexus-apt-dust-specter-hits-iraqi-officials-with-ai-assisted-malware-and-novel-rats/</loc>
		<lastmod>2026-03-05T05:12:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Iran‑Nexus-APT-‘Dust-Specter-Hits-Iraqi-Officials-with-AI‑Assisted-Malware-and-Novel-RATs.jpg</image:loc>
			<image:title>Iran‑Nexus APT ‘Dust Specter’ Hits Iraqi Officials with AI‑Assisted Malware and Novel RATs</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/to-reduce-mttr-and-business-risk-start-with-better-soc-collaboration/</loc>
		<lastmod>2026-03-05T05:11:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/Enhance-SOC-Collaboration-to-Reduce-MTTR-and-Risks-1.jpg</image:loc>
			<image:title>Enhance SOC Collaboration to Reduce MTTR and Risks (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-threat-report-warns-of-ai-is-automating-high-velocity-attacker-operations/</loc>
		<lastmod>2026-03-05T05:10:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/03/New-Threat-Report-Warns-of-AI-is-Automating-High-Velocity-Attacker-Operations.jpg</image:loc>
			<image:title>New Threat Report Warns of AI is Automating High-Velocity Attacker Operations</image:title>
		</image:image>
	</url>
</urlset>
