<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/squirrly-seo/view/assets/css/sitemap.xsl"?>
<!-- generated-on="2026-05-12T19:22:04+00:00" -->
<!-- generator="Squirrly SEO Sitemap" -->
<!-- generator-url="https://wordpress.org/plugins/squirrly-seo/" -->

<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" >
	<url>
		<loc>https://teamwin.in/claudes-chrome-extension-vulnerability-allows-malicious-extensions-to-steal-gmail-and-drive-data/</loc>
		<lastmod>2026-05-12T12:43:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Claudes-Chrome-Extension-Vulnerability-Allows-Malicious-Extensions-to-Steal-Gmail-and-Drive-Data-1024x576-1.webp</image:loc>
			<image:title>Claudes-Chrome-Extension-Vulnerability-Allows-Malicious-Extensions-to-Steal-Gmail-and-Drive-Data-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/</loc>
		<lastmod>2026-05-12T12:42:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Malicious-Chrome-MV3-Extension-Impersonates-TronLink-to-Steal-Crypto-Wallet-Credentials-1024x576-1.webp</image:loc>
			<image:title>Malicious-Chrome-MV3-Extension-Impersonates-TronLink-to-Steal-Crypto-Wallet-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mistralai-pypi-package-compromised-to-inject-malicious-code-microsoft-warns/</loc>
		<lastmod>2026-05-12T12:40:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/MistralAI-PyPI-Package-Compromised-to-Inject-Malicious-Code-Microsoft-Warns-1024x576-1.webp</image:loc>
			<image:title>MistralAI-PyPI-Package-Compromised-to-Inject-Malicious-Code-Microsoft-Warns-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/role-explosion-in-saas-how-pam-helps-control-admin-sprawl/</loc>
		<lastmod>2026-05-12T10:19:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/role-explosion-in-saas.jpg</image:loc>
			<image:title>role explosion in saas</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/2ecd2bdb97748aa98ef5efb99bcd672c2c5df30fc87e8a1bd51c0d3a873bf6e1?ts=1777436767</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-daybreak-automates-detects-and-fix-vulnerabilities-automatically/</loc>
		<lastmod>2026-05-12T09:36:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/OpenAI-Daybreak-Automates-Detects-and-Fix-Vulnerabilities-Automatically-1-1024x576-1.webp</image:loc>
			<image:title>OpenAI-Daybreak-Automates-Detects-and-Fix-Vulnerabilities-Automatically-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/poc-exploit-released-for-android-zero-click-vulnerability-that-enables-remote-shell-access/</loc>
		<lastmod>2026-05-12T09:35:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/PoC-Exploit-Released-for-Android-Zero-Click-Vulnerability-that-Enables-Remote-Shell-Access-1024x576-1.webp</image:loc>
			<image:title>PoC-Exploit-Released-for-Android-Zero-Click-Vulnerability-that-Enables-Remote-Shell-Access-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trickmo-android-banking-malware-targets-banking-wallet-and-authenticator-apps/</loc>
		<lastmod>2026-05-12T09:33:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/TrickMo-Android-Banking-Malware-Targets-Banking-Wallet-and-Authenticator-Apps-1024x576-1.webp</image:loc>
			<image:title>TrickMo-Android-Banking-Malware-Targets-Banking-Wallet-and-Authenticator-Apps-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-php-soap-extension-vulnerabilities-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-12T09:31:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-PHP-SOAP-Extension-Vulnerability-Enables-Remote-Code-Execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-PHP-SOAP-Extension-Vulnerability-Enables-Remote-Code-Execution-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/magecart-hackers-abuse-google-tag-manager-to-inject-credit-card-skimmers/</loc>
		<lastmod>2026-05-12T09:30:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Magecart-Hackers-Abuse-Google-Tag-Manager-to-Inject-Credit-Card-Skimmers-1024x576-1.webp</image:loc>
			<image:title>Magecart-Hackers-Abuse-Google-Tag-Manager-to-Inject-Credit-Card-Skimmers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/teampcp-compromised-checkmarx-jenkins-ast-plugin-following-kics-supply-chain-attack/</loc>
		<lastmod>2026-05-12T09:28:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/TeamPCP-Compromised-Checkmarx-Jenkins-AST-Plugin-Following-KICS-Supply-Chain-Attack-1024x576-1.webp</image:loc>
			<image:title>TeamPCP-Compromised-Checkmarx-Jenkins-AST-Plugin-Following-KICS-Supply-Chain-Attack-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/uat-8302-uses-custom-malware-and-open-source-tools-to-steal-data-from-government-agencies/</loc>
		<lastmod>2026-05-12T06:44:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/UAT-8302-Uses-Custom-Malware-and-Open-Source-Tools-to-Steal-Data-From-Government-Agencies-1024x576-1.webp</image:loc>
			<image:title>UAT-8302-Uses-Custom-Malware-and-Open-Source-Tools-to-Steal-Data-From-Government-Agencies-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/</loc>
		<lastmod>2026-05-12T06:41:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/AI-Zero-Day-Exploit-1024x576-1.webp</image:loc>
			<image:title>AI-Zero-Day-Exploit-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/</loc>
		<lastmod>2026-05-12T06:36:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Use-PlugX-Like-DLL-Sideloading-Chain-in-Fake-Claude-Malware-Campaign-1024x576-1.webp</image:loc>
			<image:title>Hackers-Use-PlugX-Like-DLL-Sideloading-Chain-in-Fake-Claude-Malware-Campaign-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/</loc>
		<lastmod>2026-05-12T06:31:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Use-Fake-DeepSeek-TUI-GitHub-Repositories-to-Deliver-Malware-1024x576-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-DeepSeek-TUI-GitHub-Repositories-to-Deliver-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/</loc>
		<lastmod>2026-05-12T06:22:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program-1024x576-1.webp</image:loc>
			<image:title>ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/crimenetwork-takedown-exposes-22000-users-and-over-100-illegal-sellers/</loc>
		<lastmod>2026-05-12T06:19:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Crimenetwork-Takedown-Exposes-22000-Users-and-Over-100-Illegal-Sellers-1024x576-1.webp</image:loc>
			<image:title>Crimenetwork-Takedown-Exposes-22000-Users-and-Over-100-Illegal-Sellers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/</loc>
		<lastmod>2026-05-12T06:10:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Popular-Go-Library-fsnotify-Raises-Supply-Chain-Alarms-After-Maintainer-Access-Changes-1024x576-1.webp</image:loc>
			<image:title>Popular-Go-Library-fsnotify-Raises-Supply-Chain-Alarms-After-Maintainer-Access-Changes-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/</loc>
		<lastmod>2026-05-12T06:00:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/TanStack-npm-Packages-Hacked-1024x576-1.webp</image:loc>
			<image:title>TanStack-npm-Packages-Hacked-1024x576 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-within-5-minutes/</loc>
		<lastmod>2026-05-12T05:23:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/BitUnlocker-Downgrade-Attack-on-Windows-11-1024x576-1.webp</image:loc>
			<image:title>BitUnlocker-Downgrade-Attack-on-Windows-11-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers/</loc>
		<lastmod>2026-05-12T05:18:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Abuse-CVE-2026-41940-to-Take-Over-cPanel-and-WHM-Servers-1024x576-1.webp</image:loc>
			<image:title>Hackers-Abuse-CVE-2026-41940-to-Take-Over-cPanel-and-WHM-Servers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trending-hugging-face-repository-with-200k-downloads-executes-malware-on-windows-machines/</loc>
		<lastmod>2026-05-12T04:36:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines-1024x576-1.webp</image:loc>
			<image:title>Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ghostlock-attack-leverages-windows-file-sharing-to-lock-files-access-like-ransomware/</loc>
		<lastmod>2026-05-12T04:31:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/GhostLock-Attack-1-1024x576-1.webp</image:loc>
			<image:title>GhostLock-Attack-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-weaponized-jpeg-file-to-deploy-trojanized-screenconnect-malware/</loc>
		<lastmod>2026-05-12T04:29:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware-1024x576-1.webp</image:loc>
			<image:title>Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0228-multiple-vulnerabilities-in-vm2-node-js-library/</loc>
		<lastmod>2026-05-11T15:26:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vidar-malware-targets-browser-credentials-cookies-crypto-wallets-and-system-data/</loc>
		<lastmod>2026-05-11T10:06:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Vidar-Malware-Hides-Second-Stage-Payloads-in-JPEG-and-TXT-Files-to-Evade-Detection-1024x576-1.webp</image:loc>
			<image:title>Vidar-Malware-Hides-Second-Stage-Payloads-in-JPEG-and-TXT-Files-to-Evade-Detection-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/macos-malware-leverages-google-ads-and-legitimate-claude-ai-shared-chats-to-deliver-malware/</loc>
		<lastmod>2026-05-11T09:56:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/macOS-malware-Leverages-Google-Ads-and-legitimate-claude.ai-shared-chats-to-Deliver-Malware-1024x576-1.webp</image:loc>
			<image:title>macOS-malware-Leverages-Google-Ads-and-legitimate-claude.ai-shared-chats-to-Deliver-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-recaptcha-update-blocks-privacy-focused-android-users-from-sites/</loc>
		<lastmod>2026-05-11T09:33:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Google-reCAPTCHA-Update-1024x576-1.webp</image:loc>
			<image:title>Google-reCAPTCHA-Update-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/jdownloader-downloader-hacked-to-infect-users-with-new-python-rat/</loc>
		<lastmod>2026-05-11T06:50:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT-1024x576-1.webp</image:loc>
			<image:title>JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mozilla-patches-423-firefox-0-day-vulnerabilities-with-claude-mythos-and-other-ai-models/</loc>
		<lastmod>2026-05-11T05:06:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Firefox-Vulnerabilities-Patched-1024x576-1.webp</image:loc>
			<image:title>Firefox-Vulnerabilities-Patched-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-nwhstealer-delivery-chain-uses-bun-loader-anti-vm-checks-and-encrypted-c2/</loc>
		<lastmod>2026-05-11T05:05:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-NWHStealer-Delivery-Chain-Uses-Bun-Loader-Anti-VM-Checks-and-Encrypted-C2-1024x576-1.webp</image:loc>
			<image:title>New-NWHStealer-Delivery-Chain-Uses-Bun-Loader-Anti-VM-Checks-and-Encrypted-C2-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-pcpjack-worm-targets-docker-kubernetes-redis-and-mongodb-for-credential-theft/</loc>
		<lastmod>2026-05-11T05:04:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-PCPJack-Worm-Targets-Docker-Kubernetes-Redis-and-MongoDB-for-Credential-Theft-1024x576-1.webp</image:loc>
			<image:title>New-PCPJack-Worm-Targets-Docker-Kubernetes-Redis-and-MongoDB-for-Credential-Theft-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trellix-breach-ransomhouse-claims-access-to-parts-of-source-code/</loc>
		<lastmod>2026-05-11T05:00:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Trellix-Breach-1024x576-1.webp</image:loc>
			<image:title>Trellix-Breach-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/top-10-best-interactive-malware-analysis-tools-in-2026/</loc>
		<lastmod>2026-05-11T04:56:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Best-Incident-Management-Tools.jpg</image:loc>
			<image:title>Best Incident Management Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/odini-malware-exploits-cpu-magnetic-emissions-to-breach-faraday-shielded-air-gapped-computers/</loc>
		<lastmod>2026-05-11T04:55:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/ODINI-Malware-Air-Gapped-Computers-1024x576-1.webp</image:loc>
			<image:title>ODINI-Malware-Air-Gapped-Computers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/10-best-full-disk-encryption-tools-in-2026/</loc>
		<lastmod>2026-05-11T04:49:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Best-Full-Disk-Encryption-Tools.jpg</image:loc>
			<image:title>Best Full Disk Encryption Tools</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/darkmoon-ai-powered-autonomous-penetration-testing-platform-with-50-tools/</loc>
		<lastmod>2026-05-11T04:48:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/DarkMoon-Penetration-Testing-Platform-1024x576-1.webp</image:loc>
			<image:title>DarkMoon-Penetration-Testing-Platform-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-signed-logitech-installer-to-deploy-tclbanker-banking-trojan/</loc>
		<lastmod>2026-05-11T04:47:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Abuse-Signed-Logitech-Installer-to-Deploy-TCLBANKER-Banking-Trojan-1024x576-1.webp</image:loc>
			<image:title>Hackers-Abuse-Signed-Logitech-Installer-to-Deploy-TCLBANKER-Banking-Trojan-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-infostealer-campaign-uses-github-releases-for-payload-hosting-and-evasion/</loc>
		<lastmod>2026-05-11T04:46:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Infostealer-Campaign-Uses-GitHub-Releases-for-Payload-Hosting-and-Evasion-1024x576-1.webp</image:loc>
			<image:title>New-Infostealer-Campaign-Uses-GitHub-Releases-for-Payload-Hosting-and-Evasion-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-moustache-bypasses-age-verification-system-raising-online-safety-act-concerns/</loc>
		<lastmod>2026-05-11T04:42:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Fake-Moustache-Bypasses-Age-Verification-System-Raising-Online-Safety-Act-Concerns-1024x576-1.webp</image:loc>
			<image:title>Fake-Moustache-Bypasses-Age-Verification-System-Raising-Online-Safety-Act-Concerns-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/</loc>
		<lastmod>2026-05-11T04:41:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-ZiChatBot-Malware-Uses-Zulip-REST-APIs-as-Command-and-Control-Server-1024x576-1.webp</image:loc>
			<image:title>New-ZiChatBot-Malware-Uses-Zulip-REST-APIs-as-Command-and-Control-Server-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-cpanel-and-whm-flaws-enable-code-execution-dos-attacks/</loc>
		<lastmod>2026-05-11T04:39:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/cPanel-and-WHM-Flaws.webp</image:loc>
			<image:title>cPanel-and-WHM-Flaws</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0227-snmp-denial-of-service-vulnerability-in-cisco/</loc>
		<lastmod>2026-05-09T13:08:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0226-remote-code-execution-vulnerability-in-palo-alto-networks-pan-os/</loc>
		<lastmod>2026-05-09T13:05:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0225-multiple-vulnerabilities-in-mozilla-firefox-and-firefox-esr/</loc>
		<lastmod>2026-05-09T13:02:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0224-multiple-vulnerabilities-in-ivanti-endpoint-manager-mobile-epmm/</loc>
		<lastmod>2026-05-09T12:59:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0223-multiple-vulnerabilities-in-qualcomm-products/</loc>
		<lastmod>2026-05-09T12:56:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-leveraged-hugging-face-and-clawhub-with-575-malicious-skills-to-deploy-malware/</loc>
		<lastmod>2026-05-09T08:11:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Leverage-Hugging-Face-and-ClawHubs-1024x576-1.webp</image:loc>
			<image:title>Hackers-Leverage-Hugging-Face-and-ClawHubs-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/</loc>
		<lastmod>2026-05-09T08:05:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Use-Fake-OpenClaw-Installer-to-Steal-Crypto-Wallet-and-Password-Manager-Credentials-1-1024x576-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-OpenClaw-Installer-to-Steal-Crypto-Wallet-and-Password-Manager-Credentials-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/skoda-security-incident-exposes-customers-data-from-online-shop/</loc>
		<lastmod>2026-05-09T07:59:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Skoda-Security-Incident-1024x576-1.webp</image:loc>
			<image:title>Skoda-Security-Incident-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/</loc>
		<lastmod>2026-05-09T07:53:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-PamDOORa-Backdoor-Attacking-Linux-Systems-to-Steal-SSH-Credentials-1024x576-1.webp</image:loc>
			<image:title>New-PamDOORa-Backdoor-Attacking-Linux-Systems-to-Steal-SSH-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/</loc>
		<lastmod>2026-05-09T07:45:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Deploy-Modular-RAT-With-Credential-Theft-and-Screenshot-Capture-Capabilities-1024x576-1.webp</image:loc>
			<image:title>Hackers-Deploy-Modular-RAT-With-Credential-Theft-and-Screenshot-Capture-Capabilities-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/</loc>
		<lastmod>2026-05-09T07:30:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Microsoft-365-Copilot-Vulnerabilities-Data-1024x576-1.webp</image:loc>
			<image:title>Microsoft-365-Copilot-Vulnerabilities-Data-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/</loc>
		<lastmod>2026-05-09T07:24:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/NVIDIA-Confirms-GeForce-Data-Breach-Exposed-Users-Personal-Data-1-1-1-1024x576-1.webp</image:loc>
			<image:title>NVIDIA-Confirms-GeForce-Data-Breach-Exposed-Users-Personal-Data-1-1-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/</loc>
		<lastmod>2026-05-09T07:19:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Lets-Encrypt-Halts-Certificate-Issuance-1024x576-1.webp</image:loc>
			<image:title>Lets-Encrypt-Halts-Certificate-Issuance-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/</loc>
		<lastmod>2026-05-09T07:16:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/TCLBANKER-Malware-Targets-Users-Through-Self-Propagating-WhatsApp-and-Outlook-Worm-Modules-1-1024x576-1.webp</image:loc>
			<image:title>TCLBANKER-Malware-Targets-Users-Through-Self-Propagating-WhatsApp-and-Outlook-Worm-Modules-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-spring-vulnerabilities-expose-arbitrary-files-and-gcp-secrets/</loc>
		<lastmod>2026-05-08T09:08:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Spring-Vulnerabilities-Expose-Arbitrary-Files-and-GCP-Secrets-1024x576-1.webp</image:loc>
			<image:title>Critical-Spring-Vulnerabilities-Expose-Arbitrary-Files-and-GCP-Secrets-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-critical-vulnerabilities-patched-in-next-js-and-react-server-components/</loc>
		<lastmod>2026-05-08T09:01:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Next.js-React-Server-Vulnerabilities-1024x576-1.webp</image:loc>
			<image:title>Next.js-React-Server-Vulnerabilities-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/</loc>
		<lastmod>2026-05-08T08:57:07+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/CISA-Warns-of-Palo-Alto-PAN-OS-Vulnerability-Exploited-to-Gain-Root-Access-1024x576-1.webp</image:loc>
			<image:title>CISA-Warns-of-Palo-Alto-PAN-OS-Vulnerability-Exploited-to-Gain-Root-Access--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-05-08T08:52:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Ivanti-EPMM-0-Day-Vulnerability-Exploited-1-1024x576-1.webp</image:loc>
			<image:title>Ivanti-EPMM-0-Day-Vulnerability-Exploited-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/</loc>
		<lastmod>2026-05-08T08:47:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Cisco-Network-Vulnerability-Let-remote-attacker-cause-DoS-Attack-1024x576-1.webp</image:loc>
			<image:title>New-Cisco-Network-Vulnerability-Let-remote-attacker-cause-DoS-Attack-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/</loc>
		<lastmod>2026-05-08T08:42:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Using-Fake-Claude-AI-Installer-Pages-to-Trick-Users-Into-Running-Malware-on-Their-Systems-1024x576-1.webp</image:loc>
			<image:title>Hackers-Using-Fake-Claude-AI-Installer-Pages-to-Trick-Users-Into-Running-Malware-on-Their-Systems-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/</loc>
		<lastmod>2026-05-08T07:35:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Scammers-Use-Short-Lived-VoIP-Numbers-and-Reuse-Windows-to-Defeat-Reputation-Based-Blocking-1024x576-1.webp</image:loc>
			<image:title>Scammers-Use-Short-Lived-VoIP-Numbers-and-Reuse-Windows-to-Defeat-Reputation-Based-Blocking-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/watchguard-agent-vulnerabilities-let-attackers-grant-full-system-privileges-on-windows/</loc>
		<lastmod>2026-05-08T07:29:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/WatchGuard-Agent-Vulnerabilities-Let-Attackers-Grant-Full-SYSTEM-Privileges-on-Windows-1024x576-1.webp</image:loc>
			<image:title>WatchGuard-Agent-Vulnerabilities-Let-Attackers-Grant-Full-SYSTEM-Privileges-on-Windows-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-redis-vulnerabilities-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-08T07:17:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Redis-Vulnerabilities-Enables-Remote-Code-Execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-Redis-Vulnerabilities-Enables-Remote-Code-Execution-Attacks--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/palo-alto-networks-firewall-zero-day-rce-vulnerability-exploited-in-the-wild-since-april/</loc>
		<lastmod>2026-05-08T07:12:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Palo-Alto-Firewall-0-day-Exploited-1024x576-1.webp</image:loc>
			<image:title>Palo-Alto-Firewall-0-day-Exploited-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-google-ads-to-steal-users-godaddy-managewp-login-credentials/</loc>
		<lastmod>2026-05-08T07:07:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Abuse-Google-Ads-to-Steal-Users-GoDaddy-ManageWP-login-Credentials-1024x576-1.webp</image:loc>
			<image:title>Hackers-Abuse-Google-Ads-to-Steal-Users-GoDaddy-ManageWP-login-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/28-fake-call-history-apps-on-google-play-with-7-3m-downloads-trick-users-to-steal-payments/</loc>
		<lastmod>2026-05-08T06:52:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/28-Fake-Call-History-Apps-on-Google-Play-with-7.3M-Downloads-Trick-Users-to-Steal-Payments-1024x576-1.webp</image:loc>
			<image:title>28-Fake-Call-History-Apps-on-Google-Play-with-7.3M-Downloads-Trick-Users-to-Steal-Payments-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-nuget-packages-target-browser-credentials-ssh-keys-and-crypto-wallets/</loc>
		<lastmod>2026-05-08T05:36:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Malicious-NuGet-Packages-Target-Browser-Credentials-SSH-Keys-and-Crypto-Wallets-1024x576-1.webp</image:loc>
			<image:title>Malicious-NuGet-Packages-Target-Browser-Credentials-SSH-Keys-and-Crypto-Wallets-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-used-claude-ai-to-attack-on-water-and-drainage-utility-systems/</loc>
		<lastmod>2026-05-08T05:13:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Used-Claude-AI-to-Attack-on-Water-and-Drainage-Utility-Systems-1024x576-1.webp</image:loc>
			<image:title>Hackers-Used-Claude-AI-to-Attack-on-Water-and-Drainage-Utility-Systems-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-vm2-node-js-library-vulnerabilities-enables-arbitrary-code-execution-attacks/</loc>
		<lastmod>2026-05-08T05:07:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-vm2-Node.js-Library-Vulnerabilities-Enables-Arbitrary-Code-Execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-vm2-Node.js-Library-Vulnerabilities-Enables-Arbitrary-Code-Execution-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-for-android-allow-users-to-join-third-party-meetings-via-sip/</loc>
		<lastmod>2026-05-08T04:34:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Microsoft-Teams-Android-SIP-1024x576-1.webp</image:loc>
			<image:title>Microsoft-Teams-Android-SIP-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-clickfix-attack-targets-macos-users-with-fake-disk-cleanup-and-utility-lures/</loc>
		<lastmod>2026-05-08T04:30:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-ClickFix-Attack-Targets-macOS-Users-With-Fake-Disk-Cleanup-and-Utility-Lures-1024x576-1.webp</image:loc>
			<image:title>New-ClickFix-Attack-Targets-macOS-Users-With-Fake-Disk-Cleanup-and-Utility-Lures-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-ollama-memory-leak-vulnerability-exposes-300000-servers-globally/</loc>
		<lastmod>2026-05-08T04:26:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Ollama-Memory-Leak-Vulnerability-Exposes-300000-servers-globally-1-1-1-1024x576-1.webp</image:loc>
			<image:title>Critical-Ollama-Memory-Leak-Vulnerability-Exposes-300000-servers-globally-1-1-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0222-multiple-vulnerabilities-in-notepad/</loc>
		<lastmod>2026-05-07T14:47:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0221-multiple-vulnerabilities-in-apache-http-server/</loc>
		<lastmod>2026-05-07T14:44:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0220-multiple-vulnerabilities-in-cisco-iot-field-network-director/</loc>
		<lastmod>2026-05-07T14:40:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/massive-2-45b-request-ddos-attack-used-1-2-million-ips-to-evade-rate-limits/</loc>
		<lastmod>2026-05-07T09:38:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Massive-2.45B-Request-DDoS-Attack-Used-1.2-Million-IPs-to-Evade-Rate-Limits-1024x576-1.webp</image:loc>
			<image:title>Massive-2.45B-Request-DDoS-Attack-Used-1.2-Million-IPs-to-Evade-Rate-Limits-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-chrome-148-released-with-fix-for-127-security-vulnerabilities-update-now/</loc>
		<lastmod>2026-05-07T09:36:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Google-Chrome-148-Released-1024x576-1.webp</image:loc>
			<image:title>Google-Chrome-148-Released-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-phishing-attack-weaponizing-event-invitations-to-steal-login-credentials/</loc>
		<lastmod>2026-05-07T09:34:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Phishing-Attack-Weaponizing-Event-Invitations-to-Steal-Login-Credentials-1024x576-1.webp</image:loc>
			<image:title>New-Phishing-Attack-Weaponizing-Event-Invitations-to-Steal-Login-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-salat-malware-uses-quic-and-websocket-channels-for-stealthy-remote-control/</loc>
		<lastmod>2026-05-07T09:31:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Salat-Malware-Uses-QUIC-and-WebSocket-Channels-for-Stealthy-Remote-Control-1024x576-1.webp</image:loc>
			<image:title>New-Salat-Malware-Uses-QUIC-and-WebSocket-Channels-for-Stealthy-Remote-Control-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/darkhub-hacking-for-hire-portal-advertises-crypto-fraud-message-interception-and-monitoring/</loc>
		<lastmod>2026-05-07T08:49:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Darkhub-Hacking-for-Hire-Portal-Advertises-Crypto-Fraud-Message-Interception-and-Monitoring-1024x576-1.webp</image:loc>
			<image:title>Darkhub-Hacking-for-Hire-Portal-Advertises-Crypto-Fraud-Message-Interception-and-Monitoring-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-femitbot-network-uses-telegram-mini-apps-to-push-crypto-fraud-and-android-malware/</loc>
		<lastmod>2026-05-07T08:19:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-FEMITBOT-Network-Uses-Telegram-Mini-Apps-to-Push-Crypto-Fraud-and-Android-Malware-1024x576-1.webp</image:loc>
			<image:title>New-FEMITBOT-Network-Uses-Telegram-Mini-Apps-to-Push-Crypto-Fraud-and-Android-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/</loc>
		<lastmod>2026-05-07T07:51:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/QLNX-Targets-Developers-With-Credential-Theft-Designed-for-Supply-Chain-Compromise-1024x576-1.webp</image:loc>
			<image:title>QLNX-Targets-Developers-With-Credential-Theft-Designed-for-Supply-Chain-Compromise-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/</loc>
		<lastmod>2026-05-07T07:23:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/CloudZ-RAT-Abuses-Microsoft-Phone-Link-to-Steal-SMS-OTPs-and-Mobile-Notifications-1024x576-1.webp</image:loc>
			<image:title>CloudZ-RAT-Abuses-Microsoft-Phone-Link-to-Steal-SMS-OTPs-and-Mobile-Notifications-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/taiwan-high-speed-rail-hacked-using-radio-signal-spoofing-attack-that-halted-three-trains/</loc>
		<lastmod>2026-05-07T07:20:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Taiwan-High-Speed-Rail-Hacked-Using-Radio-Signal-Spoofing-Attack-That-Halted-Three-Trains-1024x576-1.webp</image:loc>
			<image:title>Taiwan-High-Speed-Rail-Hacked-Using-Radio-Signal-Spoofing-Attack-That-Halted-Three-Trains-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-majordomo-rce-vulnerability-exposes-servers-to-code-execution-attacks/</loc>
		<lastmod>2026-05-07T07:18:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-CVE-2026-27174-Bug-Lets-Attackers-Execute-Code-on-Exposed-MajorDoMo-Servers-1024x576-1.webp</image:loc>
			<image:title>New-CVE-2026-27174-Bug-Lets-Attackers-Execute-Code-on-Exposed-MajorDoMo-Servers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-phishing-to-rmm-attacks-how-analysts-can-detect-trusted-tool-abuse-early/</loc>
		<lastmod>2026-05-07T07:13:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Detect-Phishing-to-RMM-Trusted-Tool-Abuse.jpg</image:loc>
			<image:title>Detect Phishing-to-RMM Trusted Tool Abuse</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/</loc>
		<lastmod>2026-05-07T07:05:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Argo-CDs-ServerSideDiff-Vulnerability-Enables-Kubernetes-Secret-Extraction-1024x576-1.webp</image:loc>
			<image:title>Argo-CDs-ServerSideDiff-Vulnerability-Enables-Kubernetes-Secret-Extraction-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/</loc>
		<lastmod>2026-05-07T06:49:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Member-of-Prolific-Russian-Ransomware-Group-Sentenced-to-102-Months-in-Prison-1024x576-1.webp</image:loc>
			<image:title>Member-of-Prolific-Russian-Ransomware-Group-Sentenced-to-102-Months-in-Prison-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-fanwei-e-cology10-server-vulnerability-could-let-attackers-hijack-sessions-and-steal-credentials/</loc>
		<lastmod>2026-05-07T06:47:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Fanwei-E-cology10-Server-Vulnerability-Could-Let-Attackers-Hijack-Sessions-and-Steal-Credentials-1024x576-1.webp</image:loc>
			<image:title>New-Fanwei-E-cology10-Server-Vulnerability-Could-Let-Attackers-Hijack-Sessions-and-Steal-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-microsoft-teams-to-steal-credentials-and-manipulate-mfa/</loc>
		<lastmod>2026-05-07T06:13:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Hackers-Use-Teams-Steal-Credentials-1024x576-1.webp</image:loc>
			<image:title>Hackers-Use-Teams-Steal-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/salesforce-marketing-cloud-vulnerability-opened-door-to-email-data-exposure/</loc>
		<lastmod>2026-05-07T06:05:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Salesforce-Marketing-Cloud-Vulnerability-Opened-Door-to-Email-Data-Exposure-1024x576-1.webp</image:loc>
			<image:title>Salesforce-Marketing-Cloud-Vulnerability-Opened-Door-to-Email-Data-Exposure-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-openclaw-deepseek-skill-exploits-agentic-ai-workflows-to-deliver-rat-and-stealer/</loc>
		<lastmod>2026-05-07T06:02:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Malicious-OpenClaw-DeepSeek-Skill-Exploits-Agentic-AI-Workflows-to-Deliver-RAT-and-Stealer-1024x576-1.webp</image:loc>
			<image:title>Malicious-OpenClaw-DeepSeek-Skill-Exploits-Agentic-AI-Workflows-to-Deliver-RAT-and-Stealer-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iranian-nexus-operation-targets-oman-ministries-with-webshells-sql-escalation-and-data-theft/</loc>
		<lastmod>2026-05-07T05:28:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Iranian-Nexus-Operation-Targets-Oman-Ministries-With-Webshells-SQL-Escalation-and-Data-Theft-1024x576-1.webp</image:loc>
			<image:title>Iranian-Nexus-Operation-Targets-Oman-Ministries-With-Webshells-SQL-Escalation-and-Data-Theft-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/remus-infostealer-uses-lumma-style-browser-key-theft-and-application-bound-encryption-bypass/</loc>
		<lastmod>2026-05-07T05:26:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Remus-Infostealer-Uses-Lumma-Style-Browser-Key-Theft-and-Application-Bound-Encryption-Bypass-1024x576-1.webp</image:loc>
			<image:title>Remus-Infostealer-Uses-Lumma-Style-Browser-Key-Theft-and-Application-Bound-Encryption-Bypass-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/zero-auth-flaw-exposes-dod-contractor-to-cross-tenant-data-access/</loc>
		<lastmod>2026-05-07T05:21:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Zero-Auth-Flaw-Exposes-DoD-Contractor-to-Cross-Tenant-Data-Access-1024x576-1.webp</image:loc>
			<image:title>Zero-Auth-Flaw-Exposes-DoD-Contractor-to-Cross-Tenant-Data-Access-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0219-remote-code-execution-vulnerability-in-android-os/</loc>
		<lastmod>2026-05-06T14:43:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0218-spoofing-vulnerability-in-windows-shell/</loc>
		<lastmod>2026-05-06T14:39:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0217-privilege-escalation-vulnerability-in-microsoft-asp-net-core/</loc>
		<lastmod>2026-05-06T14:36:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0216-multiple-vulnerabilities-in-whatsapp/</loc>
		<lastmod>2026-05-06T14:33:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vimeo-data-breach-exposes-119000-users-unique-email-addresses/</loc>
		<lastmod>2026-05-06T10:51:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Vimeo-data-breach-exposes-119000-Users-unique-email-addresses-1024x576-1.webp</image:loc>
			<image:title>Vimeo-data-breach-exposes-119000-Users-unique-email-addresses-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/azure-ad-conditional-access-bypassed-through-phantom-device-registration-and-prt-abuse/</loc>
		<lastmod>2026-05-06T09:38:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Azure-AD-Conditional-Access-Bypassed-Through-Phantom-Device-Registration-and-PRT-Abuse-1024x576-1.webp</image:loc>
			<image:title>Azure-AD-Conditional-Access-Bypassed-Through-Phantom-Device-Registration-and-PRT-Abuse-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ransomware-and-data-extortion-groups-intensify-targeting-of-aviation-and-aerospace-sector/</loc>
		<lastmod>2026-05-06T08:19:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Ransomware-and-Data-Extortion-Groups-Intensify-Targeting-of-Aviation-and-Aerospace-Sector-1024x576-1.webp</image:loc>
			<image:title>Ransomware-and-Data-Extortion-Groups-Intensify-Targeting-of-Aviation-and-Aerospace-Sector-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/</loc>
		<lastmod>2026-05-06T05:35:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/luxsci-secure-email-mid-sized-pr-1777922928hsmmep3uoy.jpg</image:loc>
			<image:title>luxsci-secure-email-mid-sized-pr-1777922928hsmmep3uoy</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/code-of-conduct-phishing-emails-target-35000-users-in-multi-stage-aitm-attack/</loc>
		<lastmod>2026-05-06T05:05:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Code-of-Conduct-Phishing-Emails-Target-35000-Users-in-Multi-Stage-AiTM-Attack-1024x576-1.webp</image:loc>
			<image:title>Code-of-Conduct-Phishing-Emails-Target-35000-Users-in-Multi-Stage-AiTM-Attack-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/daemon-tools-software-hacked-to-deliver-malware-in-a-supply-chain-attack/</loc>
		<lastmod>2026-05-06T05:04:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/DAEMON-Tools-Software-Hacked-1-1024x576-1.webp</image:loc>
			<image:title>DAEMON-Tools-Software-Hacked-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/education-sector-under-attack-from-state-espionage-spear-phishing-and-supply-chain-attacks/</loc>
		<lastmod>2026-05-06T05:03:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Education-Sector-Under-Attack-From-State-Espionage-Spear-Phishing-and-Supply-Chain-Attacks-1024x576-1.webp</image:loc>
			<image:title>Education-Sector-Under-Attack-From-State-Espionage-Spear-Phishing-and-Supply-Chain-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/</loc>
		<lastmod>2026-05-06T05:02:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Cerberus-Stalkerware-on-Google-Play-Leverages-Accessibility-Abuse-and-Firebase-for-Remote-Control-1024x576-1.webp</image:loc>
			<image:title>Cerberus-Stalkerware-on-Google-Play-Leverages-Accessibility-Abuse-and-Firebase-for-Remote-Control-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/china-aligned-shadow-earth-053-exploits-exchange-servers-to-deploy-shadowpad-malware/</loc>
		<lastmod>2026-05-06T05:01:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/China-Aligned-SHADOW-EARTH-053-Exploits-Exchange-Servers-to-Deploy-ShadowPad-Malware-1024x576-1.webp</image:loc>
			<image:title>China-Aligned-SHADOW-EARTH-053-Exploits-Exchange-Servers-to-Deploy-ShadowPad-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/silver-fox-uses-fake-tax-notices-to-deploy-valleyrat-and-new-abcdoor-backdoor/</loc>
		<lastmod>2026-05-06T05:00:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Silver-Fox-Uses-Fake-Tax-Notices-to-Deploy-ValleyRAT-and-New-ABCDoor-Backdoor-1024x576-1.webp</image:loc>
			<image:title>Silver-Fox-Uses-Fake-Tax-Notices-to-Deploy-ValleyRAT-and-New-ABCDoor-Backdoor-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-scarcruft-supply-chain-attack-hits-gaming-platform-with-windows-and-android-backdoors/</loc>
		<lastmod>2026-05-06T04:58:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-ScarCruft-Supply-Chain-Attack-Hits-Gaming-Platform-With-Windows-and-Android-Backdoors-1024x576-1.webp</image:loc>
			<image:title>New-ScarCruft-Supply-Chain-Attack-Hits-Gaming-Platform-With-Windows-and-Android-Backdoors-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/</loc>
		<lastmod>2026-05-06T04:56:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/GnuTLS-3.8.13-Released-with-Fix-for-12-Vulnerabilities-1024x576-1.webp</image:loc>
			<image:title>GnuTLS-3.8.13-Released-with-Fix-for-12-Vulnerabilities-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-weaver-e-cology-rce-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-05-06T04:50:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Weaver-E-cology-RCE-Vulnerability-Actively-Exploited-in-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-Weaver-E-cology-RCE-Vulnerability-Actively-Exploited-in-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/</loc>
		<lastmod>2026-05-06T04:49:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Cisco-to-Acquire-Astrix-Security-to-Strengthen-AI-Agent-and-Non-Human-Identity-Security-1024x576-1.webp</image:loc>
			<image:title>Cisco-to-Acquire-Astrix-Security-to-Strengthen-AI-Agent-and-Non-Human-Identity-Security--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-qualcomm-chipset-vulnerabilities-enables-remote-code-execution/</loc>
		<lastmod>2026-05-06T04:48:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Qualcomm-Chipset-Vulnerabilities-Enables-Remote-Code-Execution-1024x576-1.webp</image:loc>
			<image:title>Critical-Qualcomm-Chipset-Vulnerabilities-Enables-Remote-Code-Execution--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/</loc>
		<lastmod>2026-05-06T04:47:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Reduce-SOC-Costs-with-Actionable-Threat-Intelligence.jpg</image:loc>
			<image:title>Reduce SOC Costs with Actionable Threat Intelligence</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-palo-alto-firewalls-vulnerability-exploited-in-the-wild-to-gain-root-access/</loc>
		<lastmod>2026-05-06T04:46:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Palo-Alto-Firewalls-Vulnerability-Exploited-1024x576-1.webp</image:loc>
			<image:title>Palo-Alto-Firewalls-Vulnerability-Exploited-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/</loc>
		<lastmod>2026-05-06T04:33:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Attackers-Abuse-Amazon-SES-to-Send-Authenticated-Phishing-Emails-That-Bypass-Security-1024x576-1.webp</image:loc>
			<image:title>Attackers-Abuse-Amazon-SES-to-Send-Authenticated-Phishing-Emails-That-Bypass-Security-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apache-http-server-exposes-millions-of-servers-to-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-06T04:31:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Apache-HTTP-Server-RCE-1024x576-1.webp</image:loc>
			<image:title>Apache-HTTP-Server-RCE-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0215-multiple-vulnerabilities-in-wireshark/</loc>
		<lastmod>2026-05-05T14:11:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/</loc>
		<lastmod>2026-05-05T11:17:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Attribution-Framework-Connects-APT-Campaigns-Through-Strategic-Operational-and-Technical-Layers.webp</image:loc>
			<image:title>New-Attribution-Framework-Connects-APT-Campaigns-Through-Strategic-Operational-and-Technical-Layers</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/instagrams-to-end-encrypted-chats-for-direct-messages/</loc>
		<lastmod>2026-05-05T10:29:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Instagrams-to-End-Encrypted-Chats-for-Direct-Messages-1024x576-1.webp</image:loc>
			<image:title>Instagrams-to-End-Encrypted-Chats-for-Direct-Messages-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/whatsapp-vulnerability-lets-attackers-leverage-instagram-reels-to-execute-malicious-urls/</loc>
		<lastmod>2026-05-05T10:26:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/WhatsApp-Vulnerability-Leverage-Instagram-Reels-1024x576-1.webp</image:loc>
			<image:title>WhatsApp-Vulnerability-Leverage-Instagram-Reels-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-android-zero-click-vulnerability-grants-remote-shell-access/</loc>
		<lastmod>2026-05-05T09:12:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-Android-Zero-Click-Vulnerability-Grants-Remote-Shell-Access-1024x576-1.webp</image:loc>
			<image:title>Critical-Android-Zero-Click-Vulnerability-Grants-Remote-Shell-Access-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/beware-of-fake-notepad-for-mac-website-possibly-could-harm-your-machine/</loc>
		<lastmod>2026-05-05T09:08:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Beware-of-Fake-Notepad-for-Mac-Website-Possibly-Could-Harm-your-Machine-1024x576-1.webp</image:loc>
			<image:title>Beware-of-Fake-Notepad-for-Mac-Website-Possibly-Could-Harm-your-Machine-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/</loc>
		<lastmod>2026-05-05T06:58:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/pnpm-11-Turns-On-Minimum-Release-Age-by-Default-to-Reduce-npm-Supply-Chain-Risk-1024x576-1.webp</image:loc>
			<image:title>pnpm-11-Turns-On-Minimum-Release-Age-by-Default-to-Reduce-npm-Supply-Chain-Risk-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/</loc>
		<lastmod>2026-05-05T05:17:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-xlabs_v1-Botnet-Targets-Minecraft-Servers-Through-ADB-Exposed-Android-Devices-1024x576-1.webp</image:loc>
			<image:title>New-xlabs_v1-Botnet-Targets-Minecraft-Servers-Through-ADB-Exposed-Android-Devices-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-tanstack-package-uses-postinstall-script-to-steal-developer-environment-files/</loc>
		<lastmod>2026-05-05T05:16:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Malicious-Tanstack-Package-Uses-Postinstall-Script-to-Steal-Developer-Environment-Files-1024x576-1.webp</image:loc>
			<image:title>Malicious-Tanstack-Package-Uses-Postinstall-Script-to-Steal-Developer-Environment-Files-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-microstealer-malware-actively-attacking-telecom-education-sectors/</loc>
		<lastmod>2026-05-05T05:15:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-MicroStealer-Malware-Actively-Attacking-Telecom-Education-Sectors-1024x576-1.webp</image:loc>
			<image:title>New-MicroStealer-Malware-Actively-Attacking-Telecom-Education-Sectors-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/bluekit-phishing-kit-automates-domains-2fa-lures-and-session-hijacking-in-one-panel/</loc>
		<lastmod>2026-05-05T05:14:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Bluekit-Phishing-Kit-Automates-Domains-2FA-Lures-and-Session-Hijacking-in-One-Panel-1024x576-1.webp</image:loc>
			<image:title>Bluekit-Phishing-Kit-Automates-Domains-2FA-Lures-and-Session-Hijacking-in-One-Panel-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/digicert-hacked-via-weaponized-screensaver-file-to-obtain-ev-code-signing-certificates/</loc>
		<lastmod>2026-05-05T05:13:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/DigiCert-Hacked-Screensaver-1024x576-1.webp</image:loc>
			<image:title>DigiCert-Hacked-Screensaver-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-edge-stores-all-saved-passwords-in-cleartext-process-memory-at-launch/</loc>
		<lastmod>2026-05-05T05:12:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Microsoft-Edge-Passwords-Cleartext-1024x576-1.webp</image:loc>
			<image:title>Microsoft-Edge-Passwords-Cleartext-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/doj-sentences-two-americans-to-prison-for-alphv-blackcat-attacks-on-u-s-victims/</loc>
		<lastmod>2026-05-05T04:29:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/DOJ-Sentences-Two-Americans-to-Prison-for-ALPHV-BlackCat-Attacks-on-U.S.-Victims-1024x576-1.webp</image:loc>
			<image:title>DOJ-Sentences-Two-Americans-to-Prison-for-ALPHV-BlackCat-Attacks-on-U.S.-Victims-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-linux-kernel-0-day-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-05-05T04:27:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/CISA-Warns-of-Linux-Kernel-0-Day-Vulnerability-Exploited-in-Attacks-1024x576-1.webp</image:loc>
			<image:title>CISA-Warns-of-Linux-Kernel-0-Day-Vulnerability-Exploited-in-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-weaponize-sap-npm-packages-to-steal-github-cloud-and-ai-coding-tool-secrets/</loc>
		<lastmod>2026-05-05T04:21:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Attackers-Weaponize-SAP-npm-Packages-to-Steal-GitHub-Cloud-and-AI-Coding-Tool-Secrets-1024x576-1.webp</image:loc>
			<image:title>Attackers-Weaponize-SAP-npm-Packages-to-Steal-GitHub-Cloud-and-AI-Coding-Tool-Secrets-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0214-remote-code-execution-vulnerability-in-github-enterprise-server/</loc>
		<lastmod>2026-05-04T14:17:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0213-local-privilege-escalation-vulnerability-in-linux-kernel/</loc>
		<lastmod>2026-05-04T14:12:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0212-multiple-vulnerabilities-in-mozilla-firefox-and-firefox-esr/</loc>
		<lastmod>2026-05-04T14:10:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apache-mina-vulnerabilities-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-04T12:08:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Apache-MINA-Vulnerabilities-Enables-Remote-Code-Execution-Attacks-.webp</image:loc>
			<image:title>Apache-MINA-Vulnerabilities-Enables-Remote-Code-Execution-Attacks-</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-moveit-vulnerabilities-enables-authentication-bypass/</loc>
		<lastmod>2026-05-04T10:36:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Critical-MOVEit-Vulnerability-Enables-Authentication-Bypass-1024x576-1.webp</image:loc>
			<image:title>Critical-MOVEit-Vulnerability-Enables-Authentication-Bypass-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-cpanel-whm-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-05-04T10:35:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/CISA-Warns-of-cPanel-WHM-Vulnerability-Exploited-in-Attacks-1024x576-1.webp</image:loc>
			<image:title>CISA-Warns-of-cPanel-WHM-Vulnerability-Exploited-in-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/threat-actors-use-ai-to-automate-0-day-discovery-and-exploitation-at-machine-speed/</loc>
		<lastmod>2026-05-04T08:04:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Threat-Actors-Use-AI-to-Automate-0-Day-Discovery-and-Exploitation-at-Machine-Speed-1024x576-1.webp</image:loc>
			<image:title>Threat-Actors-Use-AI-to-Automate-0-Day-Discovery-and-Exploitation-at-Machine-Speed-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/email-bombing-and-fake-it-support-calls-fuel-new-microsoft-teams-phishing-attacks/</loc>
		<lastmod>2026-05-04T07:12:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Email-Bombing-and-Fake-IT-Support-Calls-Fuel-New-Microsoft-Teams-Phishing-Attacks-1024x576-1.webp</image:loc>
			<image:title>Email-Bombing-and-Fake-IT-Support-Calls-Fuel-New-Microsoft-Teams-Phishing-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/freebsd-dhcp-client-vulnerability-enables-remote-code-execution-as-root/</loc>
		<lastmod>2026-05-04T07:09:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/FreeBSD-DHCP-Client-Vulnerability-Enables-Remote-Code-Execution-as-Root-1024x576-1.webp</image:loc>
			<image:title>FreeBSD-DHCP-Client-Vulnerability-Enables-Remote-Code-Execution-as-Root-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/</loc>
		<lastmod>2026-05-04T05:21:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/criminal-IP-ThreatQ.jpeg</image:loc>
			<image:title>criminal IP ThreatQ</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/china-aligned-attackers-use-shadowpad-iox-proxy-and-wmic-in-multi-stage-espionage-campaign/</loc>
		<lastmod>2026-05-04T05:01:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/China-Aligned-Attackers-Use-ShadowPad-IOX-Proxy-and-WMIC-in-Multi-Stage-Espionage-Campaign-1024x576-1.webp</image:loc>
			<image:title>China-Aligned-Attackers-Use-ShadowPad-IOX-Proxy-and-WMIC-in-Multi-Stage-Espionage-Campaign-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/deepdoor-stealer-harvests-browser-passwords-cloud-tokens-ssh-keys-and-wi-fi-credentials/</loc>
		<lastmod>2026-05-04T05:00:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Deep-Door-Stealer-Harvests-Browser-Passwords-Cloud-Tokens-SSH-Keys-and-Wi-Fi-Credentials-1024x576-1.webp</image:loc>
			<image:title>Deep-Door-Stealer-Harvests-Browser-Passwords-Cloud-Tokens-SSH-Keys-and-Wi-Fi-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ransomware-victims-jump-to-7831-as-ai-crime-tools-scale-global-attacks/</loc>
		<lastmod>2026-05-04T04:59:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Ransomware-Victims-Jump-to-7831-as-AI-Crime-Tools-Scale-Global-Attacks-1024x576-1.webp</image:loc>
			<image:title>Ransomware-Victims-Jump-to-7831-as-AI-Crime-Tools-Scale-Global-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ubuntu-website-and-canonical-web-services-hit-by-ddos-attack/</loc>
		<lastmod>2026-05-04T04:58:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Ubuntu-Website-DDoS-Attack-1024x576-1.webp</image:loc>
			<image:title>Ubuntu-Website-DDoS-Attack-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-ddos-malware-exploits-jenkins-to-attack-valve-source-engine-game-servers/</loc>
		<lastmod>2026-05-04T04:57:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-DDoS-Malware-Exploits-Jenkins-to-Attack-Valve-Source-Engine-Game-Servers-1024x576-1.webp</image:loc>
			<image:title>New-DDoS-Malware-Exploits-Jenkins-to-Attack-Valve-Source-Engine-Game-Servers-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/</loc>
		<lastmod>2026-05-04T04:56:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Attackers-Abuse-CAPTCHA-and-ClickFix-Tactics-to-Boost-Credential-Theft-Campaigns.webp</image:loc>
			<image:title>Attackers-Abuse-CAPTCHA-and-ClickFix-Tactics-to-Boost-Credential-Theft-Campaigns</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/</loc>
		<lastmod>2026-05-04T04:55:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Spyware-Platform-Lets-Buyers-Rebrand-and-Resell-Android-Surveillance-Malware-1024x576-1.webp</image:loc>
			<image:title>New-Spyware-Platform-Lets-Buyers-Rebrand-and-Resell-Android-Surveillance-Malware-1024x576 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/</loc>
		<lastmod>2026-05-04T04:54:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/EtherRAT-Campaign-Uses-SEO-Poisoning-and-GitHub-Facades-to-Target-Enterprise-Admins-1024x576-1.webp</image:loc>
			<image:title>EtherRAT-Campaign-Uses-SEO-Poisoning-and-GitHub-Facades-to-Target-Enterprise-Admins-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cpanelsniper-poc-exploit-disclosed-for-cpanel-vulnerability-44000-servers-compromised/</loc>
		<lastmod>2026-05-04T04:53:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/cPanelSniper-PoC-Exploit-1024x576-1.webp</image:loc>
			<image:title>cPanelSniper-PoC-Exploit-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/</loc>
		<lastmod>2026-05-04T04:50:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Attackers-Abuse-Google-AppSheet-Netlify-and-Telegram-in-Facebook-Phishing-Campaign-1-1.webp</image:loc>
			<image:title>Attackers-Abuse-Google-AppSheet-Netlify-and-Telegram-in-Facebook-Phishing-Campaign-1-1</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/</loc>
		<lastmod>2026-05-04T04:48:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Attackers-Deploy-AiTM-Phishing-Pages-to-Access-SharePoint-HubSpot-and-Google-Workspace-1-1024x576-1.webp</image:loc>
			<image:title>Attackers-Deploy-AiTM-Phishing-Pages-to-Access-SharePoint-HubSpot-and-Google-Workspace-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/</loc>
		<lastmod>2026-05-04T04:47:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Multiple-Exim-Mail-Server-Vulnerabilities-Leads-to-Crash-with-malicious-DNS-data-1024x576-1.webp</image:loc>
			<image:title>Multiple-Exim-Mail-Server-Vulnerabilities-Leads-to-Crash-with-malicious-DNS-data--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/</loc>
		<lastmod>2026-05-04T04:45:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Trellix-Source-Code-Breach-1024x576-1.webp</image:loc>
			<image:title>Trellix-Source-Code-Breach-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-breach-government-and-military-servers-by-exploiting-cpanel-vulnerability/</loc>
		<lastmod>2026-05-04T04:44:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/cPanel-Vulnerability-Exploited-1024x576-1.webp</image:loc>
			<image:title>cPanel-Vulnerability-Exploited-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/</loc>
		<lastmod>2026-05-04T04:43:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Defender-Flags-DigiCert-Root-Certificates-1024x576-1.webp</image:loc>
			<image:title>Defender-Flags-DigiCert-Root-Certificates-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-fake-captcha-campaign-uses-sms-pumping-fraud-to-run-up-victims-phone-bills/</loc>
		<lastmod>2026-05-04T04:24:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/New-Fake-CAPTCHA-Campaign-Uses-SMS-Pumping-Fraud-to-Run-Up-Victims-Phone-Bills-1024x576-1.webp</image:loc>
			<image:title>New-Fake-CAPTCHA-Campaign-Uses-SMS-Pumping-Fraud-to-Run-Up-Victims-Phone-Bills-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-wireshark-vulnerabilities-let-attackers-execute-arbitrary-code-via-malformed-packets/</loc>
		<lastmod>2026-05-04T04:22:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Wireshark-Vulnerabilities-Code-Execution-1024x576-1.webp</image:loc>
			<image:title>Wireshark-Vulnerabilities-Code-Execution-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropic-launches-claude-security-in-public-beta-for-enterprise-customers/</loc>
		<lastmod>2026-05-04T04:19:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/05/Claude-Security-Public-Beta-1024x576-1.webp</image:loc>
			<image:title>Claude-Security-Public-Beta-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/brinker-introduces-a-novel-approach-to-deepfake-detection/</loc>
		<lastmod>2026-04-30T09:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/brinker.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/novel-karstorat-rat-enables-webcam-monitoring-audio-recording-and-remote-payload-execution/</loc>
		<lastmod>2026-04-30T09:19:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Novel-KarstoRAT-RAT-Enables-Webcam-Monitoring-Audio-Recording-and-Remote-Payload-Execution-1024x576-1.webp</image:loc>
			<image:title>Novel-KarstoRAT-RAT-Enables-Webcam-Monitoring-Audio-Recording-and-Remote-Payload-Execution-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/proftpds-sql-injection-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-30T09:05:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/ProFTPDs-SQL-injection-Vulnerability-Enables-remote-code-execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>ProFTPDs-SQL-injection-Vulnerability-Enables-remote-code-execution-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cve-mcp-server-turns-claude-into-a-full-spectrum-security-analyst-with-27-tools-across-21-apis/</loc>
		<lastmod>2026-04-30T09:03:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-powered-security-intelligence-at-your-fingertips-—-27-tools-21-data-sources-one-protocol-1024x576-1.webp</image:loc>
			<image:title>AI-powered-security-intelligence-at-your-fingertips-—-27-tools-21-data-sources-one-protocol-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/qinglong-task-scheduler-rce-vulnerabilities-exploited-in-the-wild/</loc>
		<lastmod>2026-04-30T09:03:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Qinglong-task-scheduler-RCE-vulnerabilities-Exploited-in-the-Wild-1024x576-1.webp</image:loc>
			<image:title>Qinglong-task-scheduler-RCE-vulnerabilities-Exploited-in-the-Wild-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/shadow-ai-risks-of-unauthorized-ai-tool-usage/</loc>
		<lastmod>2026-04-30T09:00:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/shadow-AI-Risks.webp</image:loc>
			<image:title>shadow AI Risks</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/privileged-access-governance-for-saas-vendors-and-msps/</loc>
		<lastmod>2026-04-30T08:47:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/pam-acronym-privileged-access-management.webp</image:loc>
			<image:title>pam-acronym-privileged-access-management</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/51a15738e3a93c4a11ea4150406ca503e1a4ae19e68d2407a4af17e872443f46?ts=1776773057</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-etherrat-variant-uses-trojanized-tftpd64-installer-to-bridge-web2-malware-and-web3-theft/</loc>
		<lastmod>2026-04-30T08:04:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-EtherRAT-Variant-Uses-Trojanized-Tftpd64-Installer-to-Bridge-Web2-Malware-and-Web3-Theft-1024x576-1.webp</image:loc>
			<image:title>New-EtherRAT-Variant-Uses-Trojanized-Tftpd64-Installer-to-Bridge-Web2-Malware-and-Web3-Theft-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/sonicwall-sonicos-vulnerabilities-allow-attackers-to-bypass-access-controls-and-crash-firewall/</loc>
		<lastmod>2026-04-30T08:00:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SonicWall-SonicOS-Vulnerability-allow-attackers-to-bypass-access-controls-and-Crash-Firewall-1024x576-1.webp</image:loc>
			<image:title>SonicWall-SonicOS-Vulnerability-allow-attackers-to-bypass-access-controls-and-Crash-Firewall-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cpanel-0-day-authentication-bypass-vulnerability-actively-exploited-in-the-wild-poc-released/</loc>
		<lastmod>2026-04-30T07:28:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/cPanel-0-Day-Authentication-Bypass-Vulnerability-1024x576-1.webp</image:loc>
			<image:title>cPanel-0-Day-Authentication-Bypass-Vulnerability-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/europol-busts-e50-million-online-fraud-network-running-corporate-style-scam-call-centres/</loc>
		<lastmod>2026-04-30T07:27:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Europol-Busts-E50-Million-Online-Fraud-Network-Running-Corporate-Style-Scam-Call-Centres-1024x576-1.webp</image:loc>
			<image:title>Europol-Busts-E50-Million-Online-Fraud-Network-Running-Corporate-Style-Scam-Call-Centres-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cursor-ai-coding-agent-vulnerability-allow-attackers-to-execute-code-on-developers-machine/</loc>
		<lastmod>2026-04-30T04:39:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Cursor-AI-Coding-Agent-Vulnerability-Allow-Attackers-to-Execute-Code-on-Developers-Machine-1024x576-1.webp</image:loc>
			<image:title>Cursor-AI-Coding-Agent-Vulnerability-Allow-Attackers-to-Execute-Code-on-Developers-Machine-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vimeo-confirms-data-breach-hackers-accessed-users-database/</loc>
		<lastmod>2026-04-30T04:38:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Vimeo-Confirms-Data-Breach-Hackers-Accessed-Users-Database-1024x576-1.webp</image:loc>
			<image:title>Vimeo-Confirms-Data-Breach-Hackers-Accessed-Users-Database-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/minecraft-players-targeted-by-lofystealer-using-node-js-loader-and-in-memory-browser-injection/</loc>
		<lastmod>2026-04-30T04:37:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Minecraft-Players-Targeted-by-LofyStealer-Using-Node.js-Loader-and-In-Memory-Browser-Injection-1024x576-1.webp</image:loc>
			<image:title>Minecraft-Players-Targeted-by-LofyStealer-Using-Node.js-Loader-and-In-Memory-Browser-Injection-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/slotagent-malware-uses-api-hashing-and-encrypted-strings-to-hinder-reverse-engineering/</loc>
		<lastmod>2026-04-30T04:37:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SLOTAGENT-Malware-Uses-API-Hashing-and-Encrypted-Strings-to-Hinder-Reverse-Engineering-1024x576-1.webp</image:loc>
			<image:title>SLOTAGENT-Malware-Uses-API-Hashing-and-Encrypted-Strings-to-Hinder-Reverse-Engineering-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/lazarus-hackers-attacking-macos-users-with-mach-o-man-malware-kit/</loc>
		<lastmod>2026-04-30T04:35:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Mach-O-Man-Malware-Targets-macOS-Crypto-Executives-1.jpg</image:loc>
			<image:title>Mach-O Man Malware Targets macOS Crypto Executives (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/sap-npm-packages-compromised-to-harvest-developer-and-ci-cd-secrets/</loc>
		<lastmod>2026-04-30T04:34:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SAP-npm-Packages-Compromised-1024x576-1.webp</image:loc>
			<image:title>SAP-npm-Packages-Compromised-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/linux-kernel-0-day-copy-fail-roots-every-major-distribution-since-2017/</loc>
		<lastmod>2026-04-30T04:33:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Linux-Kernel-0-Day-Copy-Fail-1024x576-1.webp</image:loc>
			<image:title>Linux-Kernel-0-Day-Copy-Fail-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0208-identity-spoofing-vulnerability-in-ibm-websphere-application-server-liberty/</loc>
		<lastmod>2026-04-29T14:55:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0207-multiple-vulnerabilities-in-c-dac-e-sushrut-solution/</loc>
		<lastmod>2026-04-29T14:52:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0206-arbitrary-file-upload-vulnerability-in-breeze-cache-plugin-for-wordpress/</loc>
		<lastmod>2026-04-29T14:49:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-microsoft-windows-shell-0-click-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-04-29T11:57:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-Microsoft-Windows-Shell-0-day-Vulnerability-Exploited-in-Attacks-1024x576-1.webp</image:loc>
			<image:title>CISA-Warns-Microsoft-Windows-Shell-0-day-Vulnerability-Exploited-in-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-chrome-vulnerabilities-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-29T11:56:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Chrome-Vulnerabilities-Enables-Remote-Code-Execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-Chrome-Vulnerabilities-Enables-Remote-Code-Execution-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hugging-face-lerobot-vulnerability-enables-unauthenticated-rce-attacks/</loc>
		<lastmod>2026-04-29T11:55:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hugging-Face-LeRobot-Vulnerability-Enables-Unauthenticated-RCE-Attacks-1024x576-1.webp</image:loc>
			<image:title>Hugging-Face-LeRobot-Vulnerability-Enables-Unauthenticated-RCE-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-vect-2-0-raas-operation-targets-windows-linux-and-esxi-systems/</loc>
		<lastmod>2026-04-29T10:01:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Vect-2.0-RaaS-Operation-Targets-Windows-Linux-and-ESXi-Systems-1024x576-1.webp</image:loc>
			<image:title>New-Vect-2.0-RaaS-Operation-Targets-Windows-Linux-and-ESXi-Systems-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-vect-2-0-ransomware-destroys-files-over-128-kb-across-windows-linux-and-esxi/</loc>
		<lastmod>2026-04-29T09:11:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-VECT-2.0-Ransomware-Destroys-Files-Over-128-KB-Across-Windows-Linux-and-ESXi-1024x576-1.webp</image:loc>
			<image:title>New-VECT-2.0-Ransomware-Destroys-Files-Over-128-KB-Across-Windows-Linux-and-ESXi-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-bluenoroff-campaign-uses-fileless-powershell-and-ai-generated-zoom-lures/</loc>
		<lastmod>2026-04-29T08:39:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-BlueNoroff-Campaign-Uses-Fileless-PowerShell-and-AI-Generated-Zoom-Lures-1024x576-1.webp</image:loc>
			<image:title>New-BlueNoroff-Campaign-Uses-Fileless-PowerShell-and-AI-Generated-Zoom-Lures-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-outlook-com-issue-blocks-users-from-accessing-emails/</loc>
		<lastmod>2026-04-29T07:04:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Outlook.com-Issue-Blocks-Users.webp</image:loc>
			<image:title>Microsoft-Outlook.com-Issue-Blocks-Users</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cpanel-warns-of-critical-authentication-flaw-emergency-patch-released/</loc>
		<lastmod>2026-04-29T06:59:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/cPanel-Warns-of-Critical-Authentication-Issue-Emergency-Patch-Released-1024x576-1.webp</image:loc>
			<image:title>cPanel-Warns-of-Critical-Authentication-Issue-Emergency-Patch-Released-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-officially-shares-group-policy-to-remove-windows-11-copilot-from-enterprise-devices/</loc>
		<lastmod>2026-04-29T06:10:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-11-Copilot-Remove-1024x576-1.webp</image:loc>
			<image:title>Windows-11-Copilot-Remove-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-silver-fox-campaign-uses-fake-tax-audit-alerts-and-software-updates-to-deliver-malware/</loc>
		<lastmod>2026-04-29T05:12:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Silver-Fox-Campaign-Uses-Fake-Tax-Audit-Alerts-and-Software-Updates-to-Deliver-Malware-1024x576-1.webp</image:loc>
			<image:title>New-Silver-Fox-Campaign-Uses-Fake-Tax-Audit-Alerts-and-Software-Updates-to-Deliver-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-windows-0-click-vulnerability-exploited-to-bypass-defender-smartscreen/</loc>
		<lastmod>2026-04-29T05:11:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Shell-Security-0-Click-Vulnerability-1024x576-1.webp</image:loc>
			<image:title>Windows-Shell-Security-0-Click-Vulnerability-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/whatsapp-testing-own-cloud-backup-provider-for-default-end-to-end-encryption/</loc>
		<lastmod>2026-04-29T05:10:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/WhatsApp-Testing-Own-Cloud-Backup-Provider-for-default-end-to-end-encryption-1024x576-1.webp</image:loc>
			<image:title>WhatsApp-Testing-Own-Cloud-Backup-Provider-for-default-end-to-end-encryption-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chinese-silk-typhoon-hacker-extradited-to-the-u-s-from-italy/</loc>
		<lastmod>2026-04-29T05:08:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Chinese-Silk-Typhoon-Hacker-Extradited-to-the-U.S.-from-Italy-1024x576-1.webp</image:loc>
			<image:title>Chinese-Silk-Typhoon-Hacker-Extradited-to-the-U.S.-from-Italy-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-litellm-sql-injection-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-04-29T04:55:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-LiteLLM-SQL-Injection-Vulnerability-Exploited-in-the-Wild-1-1024x576-1.webp</image:loc>
			<image:title>Critical-LiteLLM-SQL-Injection-Vulnerability-Exploited-in-the-Wild-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-confirms-remote-desktop-warnings-may-display-incorrectly-after-april-2026-security-update/</loc>
		<lastmod>2026-04-29T04:53:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Remote-Desktop-Warnings-Display-Incorrectly-1024x576-1.webp</image:loc>
			<image:title>Remote-Desktop-Warnings-Display-Incorrectly-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/checkmarx-confirms-github-repository-data-published-on-dark-web/</loc>
		<lastmod>2026-04-29T04:51:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Checkmarx-Confirms-GitHub-Repository-Data-Published-on-Dark-Web-1024x576-1.webp</image:loc>
			<image:title>Checkmarx-Confirms-GitHub-Repository-Data-Published-on-Dark-Web--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-blobphish-attack-leverages-browser-blob-objects-to-steal-users-login-credentials/</loc>
		<lastmod>2026-04-29T04:49:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/BlobPhish-Browser-Based-Phishing-Attack.jpg</image:loc>
			<image:title>BlobPhish Browser-Based Phishing Attack</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-github-com-and-enterprise-server-rce-vulnerability-enables-full-server-compromise/</loc>
		<lastmod>2026-04-29T04:47:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/GitHub.com-and-Enterprise-Server-RCE-1024x576-1.webp</image:loc>
			<image:title>GitHub.com-and-Enterprise-Server-RCE-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-sandworm-tradecraft-uses-ssh-over-tor-tunnel-for-long-term-hidden-persistence/</loc>
		<lastmod>2026-04-28T12:01:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Sandworm-Tradecraft-Uses-SSH-over-Tor-Tunnel-for-Long-Term-Hidden-Persistence-1024x576-1.webp</image:loc>
			<image:title>New-Sandworm-Tradecraft-Uses-SSH-over-Tor-Tunnel-for-Long-Term-Hidden-Persistence-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-launches-copilot-agent-mode-for-outlook-inbox-and-calendar-functions/</loc>
		<lastmod>2026-04-28T12:00:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Launches-Copilot-Agent-Mode-for-Outlook-Inbox-and-Calendar-Functions-1024x576-1.webp</image:loc>
			<image:title>Microsoft-Launches-Copilot-Agent-Mode-for-Outlook-Inbox-and-Calendar-Functions--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/chinese-backed-smishing-services-use-ott-messaging-and-sms-to-scale-credential-theft/</loc>
		<lastmod>2026-04-28T11:57:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Chinese-Backed-Smishing-Services-Use-OTT-Messaging-and-SMS-to-Scale-Credential-Theft-1024x576-1.webp</image:loc>
			<image:title>Chinese-Backed-Smishing-Services-Use-OTT-Messaging-and-SMS-to-Scale-Credential-Theft-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/zero-standing-privileges-for-saas-is-it-possible/</loc>
		<lastmod>2026-04-28T11:54:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/wat-is-zero-standing-privileges.webp</image:loc>
			<image:title>wat is zero standing privileges</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/f2c4f0b8328725a41302a7486a38e5950e95b12a424a22e4b4e70647249700ca?ts=1776686430</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-saas-pam-supports-compliance-audits-iso-soc-2-gdpr/</loc>
		<lastmod>2026-04-28T11:31:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/PAM-SAAS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/536b96d11ba9fcd3e1a35ce2afa99f23ebcea9a63944f196476ded36733866ff?ts=1776258269</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/linux-elf-malware-generator-evades-ml-detection-with-semantic-preserving-changes/</loc>
		<lastmod>2026-04-28T09:55:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Linux-ELF-Malware-Generator-Evades-ML-Detection-With-Semantic-Preserving-Changes-1024x576-1.webp</image:loc>
			<image:title>Linux-ELF-Malware-Generator-Evades-ML-Detection-With-Semantic-Preserving-Changes-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-openclaw-vulnerabilities-enables-policy-bypass-and-host-override/</loc>
		<lastmod>2026-04-28T09:54:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Multiple-OpenClaw-Vulnerabilities-Enables-Policy-Bypass-and-host-override-1024x576-1.webp</image:loc>
			<image:title>Multiple-OpenClaw-Vulnerabilities-Enables-Policy-Bypass-and-host-override--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-remote-desktop-leaves-behind-image-fragments-attackers-can-stitch-into-screenshots/</loc>
		<lastmod>2026-04-28T09:42:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Remote-Desktop-Image-Fragments-1024x576-1.webp</image:loc>
			<image:title>Windows-Remote-Desktop-Image-Fragments-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/popular-pypi-package-with-1-million-monthly-downloads-hacked-to-inject-malicious-scripts/</loc>
		<lastmod>2026-04-28T09:38:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Popular-PyPI-Package-With-1-Million-Monthly-Downloads-Hacked-to-Inject-Malicious-Scripts-1-1-1024x576-1.webp</image:loc>
			<image:title>Popular-PyPI-Package-With-1-Million-Monthly-Downloads-Hacked-to-Inject-Malicious-Scripts-1-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/oilrig-hides-c2-configuration-in-google-drive-image-using-lsb-steganography/</loc>
		<lastmod>2026-04-28T08:47:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/OilRig-Hides-C2-Configuration-in-Google-Drive-Image-Using-LSB-Steganography.webp</image:loc>
			<image:title>OilRig-Hides-C2-Configuration-in-Google-Drive-Image-Using-LSB-Steganography</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-document-reader-on-google-play-with-10k-downloads-installing-anatsa-malware/</loc>
		<lastmod>2026-04-28T07:08:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-Document-Reader-On-Google-Play-With-10K-Downloads-Installing-Anatsa-Malware-1024x576-1.webp</image:loc>
			<image:title>Fake-Document-Reader-On-Google-Play-With-10K-Downloads-Installing-Anatsa-Malware-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-android-banking-malware-abuses-fake-kyc-workflow-and-whatsapp-delivery-to-hijack-accounts/</loc>
		<lastmod>2026-04-28T07:06:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Android-Banking-Malware-Abuses-Fake-KYC-Workflow-and-WhatsApp-Delivery-to-Hijack-Accounts-1024x576-1.webp</image:loc>
			<image:title>New-Android-Banking-Malware-Abuses-Fake-KYC-Workflow-and-WhatsApp-Delivery-to-Hijack-Accounts-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/eu-proposes-requiring-google-to-share-user-search-data-with-rival-search-engines/</loc>
		<lastmod>2026-04-28T04:44:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/EU-Proposes-Google-Search-Data-1024x576-1.webp</image:loc>
			<image:title>EU-Proposes-Google-Search-Data-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korean-hackers-attacking-drug-companies-to-deploy-malware-via-weaponized-excel-files/</loc>
		<lastmod>2026-04-28T04:42:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korean-Hackers-Attacking-Drug-Companies-to-Deploy-Malware-Via-Weaponized-Excel-Files-1024x576-1.webp</image:loc>
			<image:title>North-Korean-Hackers-Attacking-Drug-Companies-to-Deploy-Malware-Via-Weaponized-Excel-Files-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/clickfix-attack-replaces-powershell-with-cmdkey-and-remote-regsvr32-payload-delivery/</loc>
		<lastmod>2026-04-28T04:42:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/ClickFix-Attack-Replaces-PowerShell-With-Cmdkey-and-Remote-Regsvr32-Payload-Delivery-1024x576-1.webp</image:loc>
			<image:title>ClickFix-Attack-Replaces-PowerShell-With-Cmdkey-and-Remote-Regsvr32-Payload-Delivery-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/researchers-warn-macos-textutil-and-keepassxc-can-become-attack-primitives-in-automation/</loc>
		<lastmod>2026-04-28T04:40:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Researchers-Warn-macOS-textutil-and-KeePassXC-Can-Become-Attack-Primitives-in-Automation-1024x576-1.webp</image:loc>
			<image:title>Researchers-Warn-macOS-textutil-and-KeePassXC-Can-Become-Attack-Primitives-in-Automation-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-vidar-malware-campaign-uses-fake-youtube-software-downloads-to-steal-corporate-credentials/</loc>
		<lastmod>2026-04-28T04:39:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Vidar-Malware-Campaign-Uses-Fake-YouTube-Software-Downloads-to-Steal-Corporate-Credentials-1024x576-1.webp</image:loc>
			<image:title>New-Vidar-Malware-Campaign-Uses-Fake-YouTube-Software-Downloads-to-Steal-Corporate-Credentials-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-gemini-cli-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-28T04:37:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Gemini-CLI-Vulnerability-Enables-Remote-Code-Execution-Attacks-1024x576-1.webp</image:loc>
			<image:title>Critical-Gemini-CLI-Vulnerability-Enables-Remote-Code-Execution-Attacks-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/clickups-hardcoded-api-key-exposes-959-emails-from-fortune-500-giants/</loc>
		<lastmod>2026-04-28T04:35:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/ClickUp-Hardcoded-API-Key-Expose-1024x576-1.webp</image:loc>
			<image:title>ClickUp-Hardcoded-API-Key-Expose-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/notepad-vulnerability-allows-attackers-to-crash-application-leak-memory-data/</loc>
		<lastmod>2026-04-28T04:34:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Notepad-Vulnerability-Crash-1024x576-1.webp</image:loc>
			<image:title>Notepad-Vulnerability-Crash-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-coding-agent-powered-by-claude-opus-4-6-deletes-production-database-in-9-seconds/</loc>
		<lastmod>2026-04-28T04:32:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-Coding-Agent-Deletes-Data-1024x576-1.webp</image:loc>
			<image:title>AI-Coding-Agent-Deletes-Data-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0205-multiple-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2026-04-27T13:36:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0204-multiple-vulnerabilities-in-gitlab/</loc>
		<lastmod>2026-04-27T13:33:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0203-multiple-vulnerabilities-in-mozilla-products/</loc>
		<lastmod>2026-04-27T13:25:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-can-backdoor-codesys-applications-by-chaining-vulnerabilities/</loc>
		<lastmod>2026-04-27T10:41:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Attackers-Can-Backdoor-CODESYS-Applications-by-Chaining-Vulnerabilities-1024x576-1.webp</image:loc>
			<image:title>Attackers-Can-Backdoor-CODESYS-Applications-by-Chaining-Vulnerabilities-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/top-10-best-ndr-network-detection-and-response-solutions-in-2026/</loc>
		<lastmod>2026-04-27T10:33:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Best-NDR-Solutions.jpg</image:loc>
			<image:title>Best NDR Solutions</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-store-app-vibing-exe-allegedly-harvested-screens-audio-and-clipboard-content/</loc>
		<lastmod>2026-04-27T10:26:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Store-App-Vibing.exe-Allegedly-Harvested-Screens-Audio-and-Clipboard-Content-1024x576-1.webp</image:loc>
			<image:title>Microsoft-Store-App-Vibing.exe-Allegedly-Harvested-Screens-Audio-and-Clipboard-Content-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fast16-malware-with-sabotage-capabilities-attacking-ultra-expensive-targets/</loc>
		<lastmod>2026-04-27T10:21:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/fast16-Malware-with-Sabotage-Capabilities-Attacking-Ultra-expensive-Targets-1024x576-1.webp</image:loc>
			<image:title>fast16-Malware-with-Sabotage-Capabilities-Attacking-Ultra-expensive-Targets-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vidar-malware-hides-second-stage-payloads-in-jpeg-and-txt-files-to-evade-detection/</loc>
		<lastmod>2026-04-27T10:19:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Vidar-Malware-Hides-Second-Stage-Payloads-in-JPEG-and-TXT-Files-to-Evade-Detection-1024x576-1.webp</image:loc>
			<image:title>Vidar-Malware-Hides-Second-Stage-Payloads-in-JPEG-and-TXT-Files-to-Evade-Detection-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gpt-5-5-bio-bug-bounty-to-strengthen-advanced-ai-capabilities/</loc>
		<lastmod>2026-04-27T08:39:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/GPT‑5.5-Bio-Bug-Bounty-to-Strengthen-advanced-AI-capabilities-2-1024x576-1.webp</image:loc>
			<image:title>GPT‑5.5-Bio-Bug-Bounty-to-Strengthen-advanced-AI-capabilities-2-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-ai-agents-close-186-deals-in-anthropics-marketplace-experiment/</loc>
		<lastmod>2026-04-27T08:36:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Claude-AI-Agents-Close-Deals-1024x576-1.webp</image:loc>
			<image:title>Claude-AI-Agents-Close-Deals-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attack/</loc>
		<lastmod>2026-04-27T08:33:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Multiple-SimpleHelp-Vulnerabilities-Exploited-in-Attack-1024x576-1.webp</image:loc>
			<image:title>CISA-Warns-of-Multiple-SimpleHelp-Vulnerabilities-Exploited-in-Attack-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-windows-rpc-vulnerability-lets-attackers-escalate-privileges-across-all-windows-versions/</loc>
		<lastmod>2026-04-27T08:19:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Windows-RPC-Vulnerability-1024x576-1.webp</image:loc>
			<image:title>New-Windows-RPC-Vulnerability-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/litecoin-zero-day-vulnerability-exploited-in-dos-attack-disrupts-major-mining-pools/</loc>
		<lastmod>2026-04-27T08:16:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Litecoin-Zero-Day-Vulnerability-Exploited-1024x576-1.webp</image:loc>
			<image:title>Litecoin-Zero-Day-Vulnerability-Exploited--1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/73-open-vsx-sleeper-extensions-linked-to-glassworm-activate-new-malware-campaign/</loc>
		<lastmod>2026-04-27T08:13:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/73-Open-VSX-Sleeper-Extensions-Linked-to-GlassWorm-Activate-New-Malware-Campaign-1-1024x576-1.webp</image:loc>
			<image:title>73-Open-VSX-Sleeper-Extensions-Linked-to-GlassWorm-Activate-New-Malware-Campaign-1-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0020-defending-against-frontier-ai-driven-cyber-risks/</loc>
		<lastmod>2026-04-27T06:46:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nessus-agent-vulnerability-on-windows-enables-arbitrary-code-execution-with-system-privileges/</loc>
		<lastmod>2026-04-27T06:19:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nessus-Agent-Vulnerability-on-Windows-1024x576-1.webp</image:loc>
			<image:title>Nessus-Agent-Vulnerability-on-Windows-1024x576</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation/</loc>
		<lastmod>2026-04-25T07:50:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/breachlock-named-representative-vendor-in-2026-gar-177672161.jpg</image:loc>
			<image:title>breachlock-named-representative-vendor-in-2026-gar-177672161</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/</loc>
		<lastmod>2026-04-25T07:48:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/cybersecurity-insiders-cover-image.jpg</image:loc>
			<image:title>cybersecurity-insiders-cover-image</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/void-dokkaebi-hackers-use-fake-job-interviews-to-spread-malware-via-code-repositories/</loc>
		<lastmod>2026-04-25T07:44:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Void-Dokkaebi-Hackers-Use-Fake-Job-Interviews-to-Spread-Malware-via-Code-Repositories-218x150-1.webp</image:loc>
			<image:title>Void-Dokkaebi-Hackers-Use-Fake-Job-Interviews-to-Spread-Malware-via-Code-Repositories-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/</loc>
		<lastmod>2026-04-25T07:40:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Fake-CAPTCHA-Pages-to-Trigger-Costly-International-SMS-Fraud-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-CAPTCHA-Pages-to-Trigger-Costly-International-SMS-Fraud-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-pastebin-hosted-powershell-script-to-steal-telegram-sessions/</loc>
		<lastmod>2026-04-25T07:38:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Pastebin-Hosted-PowerShell-Script-to-Steal-Telegram-Sessions-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Pastebin-Hosted-PowerShell-Script-to-Steal-Telegram-Sessions-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/</loc>
		<lastmod>2026-04-25T07:27:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Claude-Desktop-Reportedly-Adds-Browser-Access-Bridge-to-Multiple-Chromium-Based-Browsers-218x150-1.webp</image:loc>
			<image:title>Claude-Desktop-Reportedly-Adds-Browser-Access-Bridge-to-Multiple-Chromium-Based-Browsers--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-exploiting-cisco-firepower-devices-using-n-day-vulnerabilities-to-gain-unauthorized-access/</loc>
		<lastmod>2026-04-25T07:25:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Exploiting-Cisco-Firepower-devices-Using-n-day-vulnerabilities-to-gain-unauthorized-access-218x150-1.webp</image:loc>
			<image:title>Hackers-Exploiting-Cisco-Firepower-devices-Using-n-day-vulnerabilities-to-gain-unauthorized-access--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/adt-confirms-data-breach-following-shinyhunters-data-leak-claim/</loc>
		<lastmod>2026-04-25T07:21:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/ADT-Confirms-Data-Breach-1-218x150-1.webp</image:loc>
			<image:title>ADT-Confirms-Data-Breach-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-can-abuse-entra-agent-id-administrator-role-to-hijack-service-principals/</loc>
		<lastmod>2026-04-25T07:18:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Entra-Agent-ID-Administrator-Abused-218x150-1.webp</image:loc>
			<image:title>Entra-Agent-ID-Administrator-Abused-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/udemy-data-breach-shinyhunters-allegedly-claims-compromise-of-1-4m-user-records/</loc>
		<lastmod>2026-04-24T11:56:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Udemy-Data-Breach-1-218x150-1.webp</image:loc>
			<image:title>Udemy-Data-Breach-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/python-vulnerability-allows-out-of-bounds-write-on-windows-systems/</loc>
		<lastmod>2026-04-24T11:55:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Python-Vulnerability-Allows-Out-of-Bounds-Write-on-Windows-Systems-218x150-1.webp</image:loc>
			<image:title>Python-Vulnerability-Allows-Out-of-Bounds-Write-on-Windows-Systems-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-can-exploit-ollama-model-uploads-to-leak-sensitive-server-data/</loc>
		<lastmod>2026-04-24T11:54:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Can-Exploit-Ollama-Model-Uploads-to-Leak-Sensitive-Server-Data-1-218x150-1.webp</image:loc>
			<image:title>Hackers-Can-Exploit-Ollama-Model-Uploads-to-Leak-Sensitive-Server-Data-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-compromised-routers-to-hide-china-linked-cyber-operations/</loc>
		<lastmod>2026-04-24T11:53:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-Compromised-Routers-to-Hide-China-Linked-Cyber-Operations-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-Compromised-Routers-to-Hide-China-Linked-Cyber-Operations-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/xiongmai-ip-camera-vulnerability-let-attackers-bypass-authentication-and-have-remote-access/</loc>
		<lastmod>2026-04-24T11:52:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Xiongmai-IP-Camera-Vulnerability-Let-Attackers-Bypass-Authentication-and-have-Remote-Access-218x150-1.webp</image:loc>
			<image:title>Xiongmai-IP-Camera-Vulnerability-Let-Attackers-Bypass-Authentication-and-have-Remote-Access--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-telegram-bots-to-track-900-successful-react2shell-exploits/</loc>
		<lastmod>2026-04-24T08:53:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Telegram-Bots-to-Track-900-Successful-React2Shell-Exploits-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Telegram-Bots-to-Track-900-Successful-React2Shell-Exploits-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ransomware-hackers-develop-custom-exfiltration-tool-to-steal-sensitive-data/</loc>
		<lastmod>2026-04-24T08:40:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Ransomware-Hackers-Develop-Custom-Exfiltration-Tool-to-Steal-Sensitive-Data-218x150-1.webp</image:loc>
			<image:title>Ransomware-Hackers-Develop-Custom-Exfiltration-Tool-to-Steal-Sensitive-Data-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-ss7-and-diameter-protocols-to-track-mobile-users-worldwide/</loc>
		<lastmod>2026-04-24T07:06:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-SS7-and-Diameter-Protocols-to-Track-Mobile-Users-Worldwide-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-SS7-and-Diameter-Protocols-to-Track-Mobile-Users-Worldwide--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-issue-blocking-users-from-joining-meetings-following-edge-browser-update/</loc>
		<lastmod>2026-04-24T06:32:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Teams-Issue-Blocking-Users-218x150-1.webp</image:loc>
			<image:title>Microsoft-Teams-Issue-Blocking-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-outlook-mailboxes-to-hide-linux-gogra-backdoor-communications/</loc>
		<lastmod>2026-04-24T05:06:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Outlook-Mailboxes-to-Hide-Linux-GoGra-Backdoor-Communications-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Outlook-Mailboxes-to-Hide-Linux-GoGra-Backdoor-Communications-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-fake-wallpaper-app-and-youtube-channel-to-spread-notnullosx-malware/</loc>
		<lastmod>2026-04-24T05:05:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-Fake-Wallpaper-App-and-YouTube-Channel-to-Spread-notnullOSX-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-Fake-Wallpaper-App-and-YouTube-Channel-to-Spread-notnullOSX-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-tradingview-ai-agent-site-is-delivering-needle-stealer-malware-via-fake-tradingclaw/</loc>
		<lastmod>2026-04-24T04:53:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-TradingView-AI-Agent-Site-is-Delivering-Needle-Stealer-Malware-via-Fake-TradingClaw-218x150-1.webp</image:loc>
			<image:title>Fake-TradingView-AI-Agent-Site-is-Delivering-Needle-Stealer-Malware-via-Fake-TradingClaw-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/bitwarden-cli-compromised-in-supply-chain-attack-via-github-actions/</loc>
		<lastmod>2026-04-24T04:42:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Bitwarden-CLI-Compromised-218x150-1.webp</image:loc>
			<image:title>Bitwarden-CLI-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-assisted-lazarus-campaign-targets-developers-with-backdoored-coding-challenges/</loc>
		<lastmod>2026-04-24T04:41:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-Assisted-Lazarus-Campaign-Targets-Developers-With-Backdoored-Coding-Challenges-218x150-1.webp</image:loc>
			<image:title>AI-Assisted-Lazarus-Campaign-Targets-Developers-With-Backdoored-Coding-Challenges-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korean-hackers-use-fake-it-worker-scheme-to-infiltrate-companies-and-evade-sanctions/</loc>
		<lastmod>2026-04-24T04:40:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korean-Hackers-Use-Fake-IT-Worker-Scheme-to-Infiltrate-Companies-and-Evade-Sanctions-218x150-1.webp</image:loc>
			<image:title>North-Korean-Hackers-Use-Fake-IT-Worker-Scheme-to-Infiltrate-Companies-and-Evade-Sanctions-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-npm-package-turns-hugging-face-into-malware-cdn-and-exfiltration-backend/</loc>
		<lastmod>2026-04-24T04:38:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Malicious-npm-Package-Turns-Hugging-Face-Into-Malware-CDN-and-Exfiltration-Backend-218x150-1.webp</image:loc>
			<image:title>Malicious-npm-Package-Turns-Hugging-Face-Into-Malware-CDN-and-Exfiltration-Backend-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-leverage-microsoft-teams-to-breach-organizations-posing-as-it-helpdesk-staff/</loc>
		<lastmod>2026-04-24T04:35:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Teams-Breach-Organizations-218x150-1.webp</image:loc>
			<image:title>Microsoft-Teams-Breach-Organizations-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0019-multiple-vulnerabilities-in-oracle-products/</loc>
		<lastmod>2026-04-23T14:10:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0202-multiple-vulnerabilities-in-splunk-enterprise-products/</loc>
		<lastmod>2026-04-23T14:07:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0201-multiple-vulnerabilities-in-drupal/</loc>
		<lastmod>2026-04-23T13:54:17+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-rolls-out-efficiency-mode-to-optimize-performance-on-low-end-devices/</loc>
		<lastmod>2026-04-23T11:07:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Teams-Efficiency-Mode-218x150-1.webp</image:loc>
			<image:title>Microsoft-Teams-Efficiency-Mode-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vercel-confirms-security-breach-set-of-customer-account-compromised/</loc>
		<lastmod>2026-04-23T11:06:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Vercel-Confirms-Security-Breach-218x150-1.webp</image:loc>
			<image:title>Vercel-Confirms-Security-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-tropic-trooper-attack-uses-custom-beacon-listener-and-vs-code-tunnels-for-remote-access/</loc>
		<lastmod>2026-04-23T11:05:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Tropic-Trooper-Attack-Uses-Custom-Beacon-Listener-and-VS-Code-Tunnels-for-Remote-Access-218x150-1.webp</image:loc>
			<image:title>New-Tropic-Trooper-Attack-Uses-Custom-Beacon-Listener-and-VS-Code-Tunnels-for-Remote-Access-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/understanding-broadcast-domains-and-collision-domains-in-layer-2-networks/</loc>
		<lastmod>2026-04-23T09:51:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/brdcst-domains.jpg</image:loc>
			<image:title>brdcst domains</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/7c8cf6b02d46ab2bb15b1655d4b265d2d63eb0b772d6a20500ba60ba02dc6362?ts=1775533615</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-pack2theroot-vulnerability-let-attackers-gain-root-access-or-compromise-the-system/</loc>
		<lastmod>2026-04-23T08:47:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Pack2TheRoot-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Pack2TheRoot-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/securing-enterprise-ai-models-llm-pipelines/</loc>
		<lastmod>2026-04-23T07:45:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/LLM-Security.webp</image:loc>
			<image:title>LLM-Security</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/21e7c3e037c6b7693708ff9fc38534194ccda44837f10cd77d4378fda26686c3?ts=1776749469</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-fixes-notification-privacy-flaw-that-allowed-fbi-to-access-deleted-signal-messages/</loc>
		<lastmod>2026-04-23T06:55:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Apple-Fixes-Notification-Privacy-Flaw-218x150-1.webp</image:loc>
			<image:title>Apple-Fixes-Notification-Privacy-Flaw-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-hallucination-risks-in-security-operations/</loc>
		<lastmod>2026-04-23T06:51:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-Hallucination.webp</image:loc>
			<image:title>AI Hallucination</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-auraboros-rat-exposes-live-audio-streaming-keylogging-and-cookie-hijacking-in-open-c2-panel/</loc>
		<lastmod>2026-04-23T04:51:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Auraboros-RAT-Exposes-Live-Audio-Streaming-Keylogging-and-Cookie-Hijacking-in-Open-C2-Panel-218x150-1.webp</image:loc>
			<image:title>New-Auraboros-RAT-Exposes-Live-Audio-Streaming-Keylogging-and-Cookie-Hijacking-in-Open-C2-Panel-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-dindoor-backdoor-abuses-deno-runtime-and-msi-installers-to-evade-detection/</loc>
		<lastmod>2026-04-23T04:50:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-DinDoor-Backdoor-Abuses-Deno-Runtime-and-MSI-Installers-to-Evade-Detection-218x150-1.webp</image:loc>
			<image:title>New-DinDoor-Backdoor-Abuses-Deno-Runtime-and-MSI-Installers-to-Evade-Detection-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/the-phishing-defense-layer-top-cisos-never-miss/</loc>
		<lastmod>2026-04-23T04:49:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/The-Phishing-Defense-Layer-Top-CISOs-Never-Miss-.jpg</image:loc>
			<image:title>The Phishing Defense Layer Top CISOs Never Miss </image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-mythos-ai-model-uncovers-271-zero-day-vulnerabilities-in-firefox/</loc>
		<lastmod>2026-04-23T04:48:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Claude-Mythos-271-Zero-Days-218x150-1.webp</image:loc>
			<image:title>Claude-Mythos-271-Zero-Days-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-warns-jasper-sleet-uses-fake-it-worker-identities-to-infiltrate-cloud-environments/</loc>
		<lastmod>2026-04-23T04:47:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Warns-Jasper-Sleet-Uses-Fake-IT-Worker-Identities-to-Infiltrate-Cloud-Environments-218x150-1.webp</image:loc>
			<image:title>Microsoft-Warns-Jasper-Sleet-Uses-Fake-IT-Worker-Identities-to-Infiltrate-Cloud-Environments-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-lotus-wiper-to-destroy-drives-and-delete-files-in-energy-sector-attack/</loc>
		<lastmod>2026-04-23T04:46:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Lotus-Wiper-to-Destroy-Drives-and-Delete-Files-in-Energy-Sector-Attack-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Lotus-Wiper-to-Destroy-Drives-and-Delete-Files-in-Energy-Sector-Attack-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cybercriminals-exploit-french-fintech-accounts-to-move-stolen-money-before-detection/</loc>
		<lastmod>2026-04-23T04:44:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Cybercriminals-Exploit-French-Fintech-Accounts-to-Move-Stolen-Money-Before-Detection-218x150-1.webp</image:loc>
			<image:title>Cybercriminals-Exploit-French-Fintech-Accounts-to-Move-Stolen-Money-Before-Detection-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/malicious-google-ads-target-crypto-users-with-wallet-drainers-and-seed-phrase-theft/</loc>
		<lastmod>2026-04-23T04:43:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Malicious-Google-Ads-Target-Crypto-Users-With-Wallet-Drainers-and-Seed-Phrase-Theft-218x150-1.webp</image:loc>
			<image:title>Malicious-Google-Ads-Target-Crypto-Users-With-Wallet-Drainers-and-Seed-Phrase-Theft-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware/</loc>
		<lastmod>2026-04-23T04:43:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/109-Fake-GitHub-Repositories-Used-to-Deliver-SmartLoader-and-StealC-Malware-218x150-1.webp</image:loc>
			<image:title>109-Fake-GitHub-Repositories-Used-to-Deliver-SmartLoader-and-StealC-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/checkmarx-kics-official-docker-repo-compromised-to-inject-malicious-code/</loc>
		<lastmod>2026-04-23T04:42:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Checkmarx-KICS-Compromised-218x150-1.webp</image:loc>
			<image:title>Checkmarx-KICS-Compromised-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/massive-sim-farm-as-a-service-network-exposes-87-control-panels-across-17-countries/</loc>
		<lastmod>2026-04-22T12:06:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SIM-Farm-as-a-Service-Network-218x150-1.webp</image:loc>
			<image:title>SIM-Farm-as-a-Service-Network-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/compromised-namastex-npm-packages-deliver-teampcp-style-canisterworm-malware/</loc>
		<lastmod>2026-04-22T12:05:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Compromised-Namastex-npm-Packages-Deliver-TeamPCP-Style-CanisterWorm-Malware-218x150-1.webp</image:loc>
			<image:title>Compromised-Namastex-npm-Packages-Deliver-TeamPCP-Style-CanisterWorm-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/1370-microsoft-sharepoint-servers-vulnerable-to-spoofing-attacks-exposed-online/</loc>
		<lastmod>2026-04-22T10:42:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/1370-SharePoint-Servers-Vulnerable-218x150-1.webp</image:loc>
			<image:title>1370-SharePoint-Servers-Vulnerable-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-atlassian-bamboo-data-center-and-server-flaw-enables-command-injection-attacks/</loc>
		<lastmod>2026-04-22T10:37:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Bamboo-Data-Center-and-Server-Vulnerability-218x150-1.webp</image:loc>
			<image:title>Bamboo-Data-Center-and-Server-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-signed-binary-used-to-sneak-lotuslite-into-india-focused-espionage-campaign/</loc>
		<lastmod>2026-04-22T08:16:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Signed-Binary-Used-to-Sneak-LOTUSLITE-Into-India-Focused-Espionage-Campaign-218x150-1.webp</image:loc>
			<image:title>Microsoft-Signed-Binary-Used-to-Sneak-LOTUSLITE-Into-India-Focused-Espionage-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/crowdstrike-logscale-vulnerability-allows-remote-attackers-to-read-arbitrary-files-from-server/</loc>
		<lastmod>2026-04-22T08:12:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CrowdStrike-LogScale-Vulnerability-218x150-1.webp</image:loc>
			<image:title>CrowdStrike-LogScale-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-emergency-net-10-0-7-update-to-patch-elevation-of-privilege-vulnerability/</loc>
		<lastmod>2026-04-22T04:51:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Emergency-.NET-10.0.7-Update-Patch-218x150-1.webp</image:loc>
			<image:title>Emergency-.NET-10.0.7-Update-Patch-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gentlemen-raas-attacking-windows-linux-with-additional-locker-written-in-c-for-esxi/</loc>
		<lastmod>2026-04-22T04:50:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Gentlemen-RaaS-Attacking-Windows-Linux-With-additional-locker-written-in-C-for-ESXi-218x150-1.webp</image:loc>
			<image:title>Gentlemen-RaaS-Attacking-Windows-Linux-With-additional-locker-written-in-C-for-ESXi-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-nightmare-eclipse-tools-after-compromising-fortigate-ssl-vpn-access/</loc>
		<lastmod>2026-04-22T04:49:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nightmare-Eclipse-Tools-FortiGate-SSL-VPN-218x150-1.webp</image:loc>
			<image:title>Nightmare-Eclipse-Tools-FortiGate-SSL-VPN-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/6000-apache-activemq-instances-vulnerable-to-cve-2026-34197-exposed-online/</loc>
		<lastmod>2026-04-22T04:48:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/6000-Apache-ActiveMQ-Instances-Vulnerable-to-CVE-2026-34197-Exposed-Online-1-218x150-1.webp</image:loc>
			<image:title>6000-Apache-ActiveMQ-Instances-Vulnerable-to-CVE-2026-34197-Exposed-Online-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-cisco-catalyst-sd-wan-manager-vulnerabilities-exploited-in-attacks/</loc>
		<lastmod>2026-04-22T04:47:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Cisco-Catalyst-SD-WAN-Manager-Vulnerabilities-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Cisco-Catalyst-SD-WAN-Manager-Vulnerabilities-Exploited-in-Attacks--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-github-issue-notifications-to-phish-developers-through-malicious-oauth-apps/</loc>
		<lastmod>2026-04-22T04:46:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-GitHub-Issue-Notifications-to-Phish-Developers-Through-Malicious-OAuth-Apps-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-GitHub-Issue-Notifications-to-Phish-Developers-Through-Malicious-OAuth-Apps-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-purerat-campaign-hides-pe-payloads-in-png-files-and-executes-them-filelessly/</loc>
		<lastmod>2026-04-22T04:45:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-PureRAT-Campaign-Hides-PE-Payloads-in-PNG-Files-and-Executes-Them-Filelessly-218x150-1.webp</image:loc>
			<image:title>New-PureRAT-Campaign-Hides-PE-Payloads-in-PNG-Files-and-Executes-Them-Filelessly-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-ngate-malware-developed-using-ai-hides-in-nfc-payment-apps/</loc>
		<lastmod>2026-04-22T04:43:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-NGate-Malware-Developed-Using-AI-Hides-in-NFC-Payment-Apps-218x150-1.webp</image:loc>
			<image:title>New-NGate-Malware-Developed-Using-AI-Hides-in-NFC-Payment-Apps-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/where-most-socs-stall-building-soc-maturity-with-threat-intelligence-feeds/</loc>
		<lastmod>2026-04-22T04:42:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SOC-Maturity-with-Threat-Intelligence-Feeds.jpg</image:loc>
			<image:title>SOC Maturity with Threat Intelligence Feeds</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/unauthorized-group-gains-access-to-anthropics-exclusive-cyber-tool-mythos/</loc>
		<lastmod>2026-04-22T04:40:45+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Anthropic-Cyber-Tool-Mythos-218x150-1.webp</image:loc>
			<image:title>Anthropic-Cyber-Tool-Mythos-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0200-multiple-vulnerabilities-in-quantum-networks-router/</loc>
		<lastmod>2026-04-21T15:16:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0199-certificate-validation-vulnerability-in-cisco-webex-services/</loc>
		<lastmod>2026-04-21T15:12:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0198-multiple-vulnerabilities-in-cisco-identity-services-engine/</loc>
		<lastmod>2026-04-21T15:08:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0197-multiple-vulnerabilities-in-fortinet-fortisandbox/</loc>
		<lastmod>2026-04-21T15:05:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-powered-exploitation-may-collapse-the-patch-window-for-defenders/</loc>
		<lastmod>2026-04-21T11:57:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-Powered-Exploitation-May-Collapse-the-Patch-Window-for-Defenders-218x150-1.webp</image:loc>
			<image:title>AI-Powered-Exploitation-May-Collapse-the-Patch-Window-for-Defenders-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-axios-npm-package-was-compromised-in-major-supply-chain-attack/</loc>
		<lastmod>2026-04-21T11:09:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-Axios-npm-Package-Was-Compromised-in-Major-Supply-Chain-Attack-1-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-Axios-npm-Package-Was-Compromised-in-Major-Supply-Chain-Attack-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-could-weaponize-gguf-models-to-achieve-rce-on-sglang-inference-servers/</loc>
		<lastmod>2026-04-21T11:03:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Could-Weaponize-GGUF-Models-to-Achieve-RCE-on-SGLang-Inference-Servers-1-218x150-1.webp</image:loc>
			<image:title>Hackers-Could-Weaponize-GGUF-Models-to-Achieve-RCE-on-SGLang-Inference-Servers-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/12-browser-extensions-mimic-as-tiktok-video-downloaders-compromised-130k-users/</loc>
		<lastmod>2026-04-21T11:02:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/12-Browser-Extensions-Mimic-as-TikTok-video-downloaders-Compromised-130k-Users-218x150-1.webp</image:loc>
			<image:title>12-Browser-Extensions-Mimic-as-TikTok-video-downloaders-Compromised-130k-Users--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-code-gemini-cli-and-github-copilot-vulnerable-to-prompt-injection-via-github-comments/</loc>
		<lastmod>2026-04-21T08:56:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Prompt-Injection-to-Credential-Theft-218x150-1.webp</image:loc>
			<image:title>Prompt-Injection-to-Credential-Theft-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone-to-steal-government-webmail-credentials/</loc>
		<lastmod>2026-04-21T08:55:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials-218x150-1.webp</image:loc>
			<image:title>SideWinder-Uses-Fake-Chrome-PDF-Viewer-and-Zimbra-Clone-to-Steal-Government-Webmail-Credentials-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/prompt-injection-attacks-on-ai-systems/</loc>
		<lastmod>2026-04-21T08:52:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/prompt-injection-attacks-on-AI-systems.jpg</image:loc>
			<image:title>prompt injection attacks on AI systems</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/detecting-saas-privilege-abuse-with-session-monitoring/</loc>
		<lastmod>2026-04-21T08:43:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/detecting-SaaS-privilege.jpg</image:loc>
			<image:title>detecting SaaS privilege</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/152cade7029efe17bf0de3a6997dad859b4be97d0c1717fda864e430e7eda987?ts=1776158945</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/poc-exploit-released-for-windows-snipping-tool-ntlm-hash-leak-vulnerability/</loc>
		<lastmod>2026-04-21T05:04:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Snipping-Tool-PoC-218x150-1.webp</image:loc>
			<image:title>Windows-Snipping-Tool-PoC-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/lovable-ai-app-builder-reportedly-exposes-thousands-of-projects-data-via-api-flaw/</loc>
		<lastmod>2026-04-21T05:01:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Lovable-AI-App-Builder-Customer-Data-218x150-1.webp</image:loc>
			<image:title>Lovable-AI-App-Builder-Customer-Data-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings-to-hack-crypto-professionals/</loc>
		<lastmod>2026-04-21T05:01:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals-218x150-1.webp</image:loc>
			<image:title>North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/gh0st-rat-and-cloverplus-adware-delivered-together-in-new-dual-payload-malware-campaign/</loc>
		<lastmod>2026-04-21T05:00:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign-218x150-1.webp</image:loc>
			<image:title>Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/researchers-say-iranian-mois-uses-multiple-hacker-personas-for-one-coordinated-cyber-campaign/</loc>
		<lastmod>2026-04-21T04:57:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Researchers-Say-Iranian-MOIS-Uses-Multiple-Hacker-Personas-for-One-Coordinated-Cyber-Campaign-218x150-1.webp</image:loc>
			<image:title>Researchers-Say-Iranian-MOIS-Uses-Multiple-Hacker-Personas-for-One-Coordinated-Cyber-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-appdomain-hijacking-to-turn-trusted-intel-utility-into-malware-launcher/</loc>
		<lastmod>2026-04-21T04:57:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-anthropics-mcp-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-21T04:54:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Anthropics-MCP-Vulnerability-Enables-Remote-Code-Execution-Attacks-218x150-1.webp</image:loc>
			<image:title>Critical-Anthropics-MCP-Vulnerability-Enables-Remote-Code-Execution-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/british-national-admits-hacking-companies-and-stealing-millions-in-virtual-currency/</loc>
		<lastmod>2026-04-21T04:52:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/British-National-Admits-Hacking-Companies-and-Stealing-Millions-in-Virtual-Currency-218x150-1.webp</image:loc>
			<image:title>British-National-Admits-Hacking-Companies-and-Stealing-Millions-in-Virtual-Currency-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-abuse-microsoft-teams-and-quick-assist-in-new-helpdesk-impersonation-attack-chain/</loc>
		<lastmod>2026-04-21T04:47:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Attackers-Abuse-Microsoft-Teams-and-Quick-Assist-in-New-Helpdesk-Impersonation-Attack-Chain-218x150-1.webp</image:loc>
			<image:title>Attackers-Abuse-Microsoft-Teams-and-Quick-Assist-in-New-Helpdesk-Impersonation-Attack-Chain-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat-2/</loc>
		<lastmod>2026-04-21T04:44:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-JanaWare-Ransomware-Targets-Turkish-Users-Through-Customized-Adwind-RAT-1-218x150-1.webp</image:loc>
			<image:title>New-JanaWare-Ransomware-Targets-Turkish-Users-Through-Customized-Adwind-RAT-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-turn-qemu-into-a-stealth-backdoor-for-credential-theft-and-ransomware/</loc>
		<lastmod>2026-04-21T04:42:03+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Attackers-Turn-QEMU-Into-a-Stealth-Backdoor-for-Credential-Theft-and-Ransomware-218x150-1.webp</image:loc>
			<image:title>Attackers-Turn-QEMU-Into-a-Stealth-Backdoor-for-Credential-Theft-and-Ransomware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-desktop-client-faces-launch-failures-after-update-triggers-caching-regression/</loc>
		<lastmod>2026-04-21T04:33:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Teams-Desktop-Client-218x150-1.webp</image:loc>
			<image:title>Microsoft-Teams-Desktop-Client-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-gardyn-smart-gardens-vulnerabilities-let-attackers-control-devices-remotely/</loc>
		<lastmod>2026-04-21T04:30:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Gardyn-Smart-Gardens-vulnerabilities-Let-Attackers-Control-Devices-Remotely-218x150-1.webp</image:loc>
			<image:title>Critical-Gardyn-Smart-Gardens-vulnerabilities-Let-Attackers-Control-Devices-Remotely-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-windows-11-dev-build-improves-secure-boot-monitoring-and-storage-controls/</loc>
		<lastmod>2026-04-21T04:30:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Windows-11-Dev-Build-Improves-Secure-Boot-Monitoring-and-Storage-Controls-1-218x150-1.webp</image:loc>
			<image:title>New-Windows-11-Dev-Build-Improves-Secure-Boot-Monitoring-and-Storage-Controls-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iterm2-flaw-abuses-ssh-integration-escape-sequences-to-turn-text-into-code-execution/</loc>
		<lastmod>2026-04-21T04:28:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/iTerm2-Flaw-Abuses-SSH-Integration-Escape-Sequences-to-Turn-Text-Into-Code-Execution-218x150-1.webp</image:loc>
			<image:title>iTerm2-Flaw-Abuses-SSH-Integration-Escape-Sequences-to-Turn-Text-Into-Code-Execution-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nsa-confirms-use-of-anthropics-mythos-despite-pentagon-blacklist/</loc>
		<lastmod>2026-04-21T04:26:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/NSA-Confirms-use-of-Anthropics-Mythos-Despite-Pentagon-Blacklist-218x150-1.webp</image:loc>
			<image:title>NSA-Confirms-use-of-Anthropics-Mythos-Despite-Pentagon-Blacklist-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-miningdropper-to-deliver-infostealers-rats-and-banking-malware-on-android/</loc>
		<lastmod>2026-04-20T11:59:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-MiningDropper-to-Deliver-Infostealers-RATs-and-Banking-Malware-on-Android-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-MiningDropper-to-Deliver-Infostealers-RATs-and-Banking-Malware-on-Android-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-rdp-alert-after-april-2026-security-update-warns-of-unknown-connections/</loc>
		<lastmod>2026-04-20T11:05:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/RDP-Alert-218x150-1.webp</image:loc>
			<image:title>RDP-Alert-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fud-crypt-to-generate-microsoft-signed-malware-with-built-in-persistence-and-c2/</loc>
		<lastmod>2026-04-20T11:02:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-FUD-Crypt-to-Generate-Microsoft-Signed-Malware-With-Built-In-Persistence-and-C2-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-FUD-Crypt-to-Generate-Microsoft-Signed-Malware-With-Built-In-Persistence-and-C2-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/public-notion-pages-leaks-profile-photos-and-email-address-of-editors/</loc>
		<lastmod>2026-04-20T10:02:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Public-Notion-Pages-Exposes-Leaks-Profile-Photos-and-Email-address-of-Editors-218x150-1.webp</image:loc>
			<image:title>Public-Notion-Pages-Exposes-Leaks-Profile-Photos-and-Email-address-of-Editors-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-cve-2024-3721-to-infect-tbk-dvrs-with-nexcorium-ddos-malware/</loc>
		<lastmod>2026-04-20T08:56:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-CVE-2024-3721-to-Infect-TBK-DVRs-With-Nexcorium-DDoS-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-CVE-2024-3721-to-Infect-TBK-DVRs-With-Nexcorium-DDoS-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-uses-gemini-ai-to-stop-malicious-ads-from-threat-actors-8-3-billion-ads-blocked/</loc>
		<lastmod>2026-04-20T08:55:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Uses-Gemini-AI-to-Stop-Malicious-Ads-From-Threat-Actors-8.3-billion-ads-Blocked-218x150-1.webp</image:loc>
			<image:title>Google-Uses-Gemini-AI-to-Stop-Malicious-Ads-From-Threat-Actors-8.3-billion-ads-Blocked-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nist-shifts-to-risk-based-nvd-model-as-cve-submissions-surge-263-since-2020/</loc>
		<lastmod>2026-04-20T08:54:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/NIST-Shifts-to-Risk-Based-NVD-Model-as-CVE-Submissions-Surge-263-Since-2020-218x150-1.webp</image:loc>
			<image:title>NIST-Shifts-to-Risk-Based-NVD-Model-as-CVE-Submissions-Surge-263-Since-2020--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit-to-scale-botnet-operations/</loc>
		<lastmod>2026-04-20T05:07:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1-218x150-1.webp</image:loc>
			<image:title>Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fiverr-allegedly-leaks-user-information-to-google-indexing-researchers-say/</loc>
		<lastmod>2026-04-20T05:05:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1-218x150-1.webp</image:loc>
			<image:title>Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/researcher-uses-claude-opus-to-build-a-working-chrome-exploit-chain/</loc>
		<lastmod>2026-04-20T04:59:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Researcher-Uses-Claude-Opus-to-Build-a-Working-Chrome-Exploit-Chain-1-218x150-1.webp</image:loc>
			<image:title>Researcher-Uses-Claude-Opus-to-Build-a-Working-Chrome-Exploit-Chain-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apple-works-on-fix-for-iphone-passcode-bug-linked-to-missing-czech-keyboard-character/</loc>
		<lastmod>2026-04-20T04:58:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Apple-Works-on-Fix-for-iPhone-Passcode-Bug-Linked-to-Missing-Czech-Keyboard-Character-1-1-218x150-1.webp</image:loc>
			<image:title>Apple-Works-on-Fix-for-iPhone-Passcode-Bug-Linked-to-Missing-Czech-Keyboard-Character-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-expands-cyber-defense-program-with-gpt-5-4-cyber-access-for-trusted-organizations/</loc>
		<lastmod>2026-04-20T04:57:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/OpenAI-Expands-Cyber-Defense-Program-With-GPT-5.4-Cyber-Access-for-Trusted-Organizations-218x150-1.webp</image:loc>
			<image:title>OpenAI-Expands-Cyber-Defense-Program-With-GPT-5.4-Cyber-Access-for-Trusted-Organizations-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-teams-right-click-paste-broken-following-edge-browser-update/</loc>
		<lastmod>2026-04-20T04:56:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Teams-Right-Click-Paste-Broken-218x150-1.webp</image:loc>
			<image:title>Teams-Right-Click-Paste-Broken-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/vercel-confirms-data-breach-hackers-claim-access-to-internal-systems/</loc>
		<lastmod>2026-04-20T04:54:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Vercel-Data-Breach-218x150-1.webp</image:loc>
			<image:title>Vercel-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-vulnerability-in-flowise-allows-remote-command-execution-via-mcp-adapters/</loc>
		<lastmod>2026-04-20T04:53:20+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Vulnerability-In-Flowise-Allows-Remote-Command-Execution-Via-MCP-Adapters-218x150-1.webp</image:loc>
			<image:title>Critical-Vulnerability-In-Flowise-Allows-Remote-Command-Execution-Via-MCP-Adapters-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0196-privilege-escalation-vulnerability-in-microsoft-defender/</loc>
		<lastmod>2026-04-18T11:25:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0195-remote-code-execution-vulnerability-in-showdoc/</loc>
		<lastmod>2026-04-18T11:20:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0194-multiple-vulnerabilities-in-mozilla-products/</loc>
		<lastmod>2026-04-18T11:16:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0193-arbitrary-code-injection-vulnerability-in-apache-activemq-classic/</loc>
		<lastmod>2026-04-18T11:09:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0192-arbitrary-code-execution-vulnerability-in-adobe-acrobat-reader/</loc>
		<lastmod>2026-04-18T11:05:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0191-authentication-bypass-vulnerability-in-nginx-ui/</loc>
		<lastmod>2026-04-18T11:02:15+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-athr-to-run-ai-powered-vishing-credential-theft-and-phone-based-phishing-at-scale/</loc>
		<lastmod>2026-04-18T07:24:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-ATHR-to-Run-AI-Powered-Vishing-Credential-Theft-and-Phone-Based-Phishing-at-Scale-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-ATHR-to-Run-AI-Powered-Vishing-Credential-Theft-and-Phone-Based-Phishing-at-Scale-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropic-releases-claude-opus-4-7-with-automated-real-time-cybersecurity-safeguards/</loc>
		<lastmod>2026-04-18T07:20:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Anthropic-releases-Claude-Opus-4.7-with-automated-Real-time-cybersecurity-safeguards-1-218x150-1.webp</image:loc>
			<image:title>Anthropic-releases-Claude-Opus-4.7-with-automated-Real-time-cybersecurity-safeguards-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/</loc>
		<lastmod>2026-04-18T06:50:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face-218x150-1.webp</image:loc>
			<image:title>Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/</loc>
		<lastmod>2026-04-18T06:47:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-Ledger-Hardware-Wallets-1-218x150-1.webp</image:loc>
			<image:title>Fake-Ledger-Hardware-Wallets-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/</loc>
		<lastmod>2026-04-18T06:44:55+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain-218x150-1.webp</image:loc>
			<image:title>Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/</loc>
		<lastmod>2026-04-18T06:40:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems-218x150-1.webp</image:loc>
			<image:title>Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/</loc>
		<lastmod>2026-04-18T06:34:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts-218x150-1.webp</image:loc>
			<image:title>Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/poc-exploit-released-for-fortisandbox-vulnerability-that-allows-attacker-to-execute-commands/</loc>
		<lastmod>2026-04-18T06:30:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/PoC-Exploit-Released-for-FortiSandbox-Vulnerability-that-Allows-attacker-to-execute-commands-218x150-1.webp</image:loc>
			<image:title>PoC-Exploit-Released-for-FortiSandbox-Vulnerability-that-Allows-attacker-to-execute-commands-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nearly-6-million-internet-facing-ftp-servers-still-exposed-in-2026-censys-warns/</loc>
		<lastmod>2026-04-18T06:24:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns-218x150-1.webp</image:loc>
			<image:title>Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/future-of-pam-in-saas-only-enterprises/</loc>
		<lastmod>2026-04-17T11:08:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/PAM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/0b7d988eb81a56ddfde55cedd52ecdce12ef434499ebdb97ea78826c16848a32?ts=1775737037</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates/</loc>
		<lastmod>2026-04-17T10:55:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Payouts-King-Rises-as-New-Ransomware-Threat-Linked-to-Former-BlackBasta-Affiliates-218x150-1.webp</image:loc>
			<image:title>Payouts-King-Rises-as-New-Ransomware-Threat-Linked-to-Former-BlackBasta-Affiliates-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-apache-activemq-input-validation-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-04-17T10:52:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Apache-ActiveMQ-input-validation-Vulnerability-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Apache-ActiveMQ-input-validation-Vulnerability-Exploited-in-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/leaked-windows-defender-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-17T10:51:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Defender-0-Day-Vulnerability-Exploited-218x150-1.webp</image:loc>
			<image:title>Windows-Defender-0-Day-Vulnerability-Exploited-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-confirms-windows-servers-enter-reboot-loops-following-april-patches/</loc>
		<lastmod>2026-04-17T09:54:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Servers-Enter-Reboot-Loops-218x150-1.webp</image:loc>
			<image:title>Windows-Servers-Enter-Reboot-Loops-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/one-click-rce-in-azure-windows-admin-center-allow-attacker-to-execute-arbitrary-commands/</loc>
		<lastmod>2026-04-17T08:53:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/One-Click-RCE-in-Azure-Windows-Admin-Center-Allow-Attacker-to-execute-arbitrary-commands-1-1-218x150-1.webp</image:loc>
			<image:title>One-Click-RCE-in-Azure-Windows-Admin-Center-Allow-Attacker-to-execute-arbitrary-commands-1-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-snipping-tool-vulnerability-allows-attacker-to-perform-spoofing-over-a-network/</loc>
		<lastmod>2026-04-17T08:51:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Snipping-Tool-Allows-attacker-to-perform-spoofing-over-a-network-1-218x150-1.webp</image:loc>
			<image:title>Windows-Snipping-Tool-Allows-attacker-to-perform-spoofing-over-a-network-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-target-israeli-desalination-plants-with-zionsiphon-sabotage-malware/</loc>
		<lastmod>2026-04-17T08:04:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Target-Israeli-Desalination-Plants-With-ZionSiphon-Sabotage-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Target-Israeli-Desalination-Plants-With-ZionSiphon-Sabotage-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/machine-identity-security-managing-non-human-identities/</loc>
		<lastmod>2026-04-17T06:54:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/machine-identities.webp</image:loc>
			<image:title>machine identities</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/6835da5ccf38540935c3c9c1/68b84b1a80c4d0df299686c2_nhi+blog-image+(2).jpg</image:loc>
			<image:title>Introducing the New Beyond Identity: Dare to Do Identity Differently</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-defender-0-day-vulnerability-redsun-enables-full-system-access/</loc>
		<lastmod>2026-04-17T06:48:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Defender-0-Day-RedSun-Exploit-218x150-1.webp</image:loc>
			<image:title>Defender-0-Day-RedSun-Exploit-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-confirms-windows-11-updates-may-force-users-to-enter-bitlocker-recovery-key/</loc>
		<lastmod>2026-04-17T06:47:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-11-Updates-Force-BitLocker-Recovery-Key-218x150-1.webp</image:loc>
			<image:title>Windows-11-Updates-Force-BitLocker-Recovery-Key-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-target-trucking-and-freight-firms-to-steal-real-world-cargo-shipments/</loc>
		<lastmod>2026-04-17T06:08:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Target-Trucking-and-Freight-Firms-to-Steal-Real-World-Cargo-Shipments-218x150-1.webp</image:loc>
			<image:title>Hackers-Target-Trucking-and-Freight-Firms-to-Steal-Real-World-Cargo-Shipments-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/</loc>
		<lastmod>2026-04-17T04:54:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Two-U.S.-Nationals-Sentenced-for-Running-Laptop-Farms-in-5-Million-DPRK-Remote-Worker-Scheme-218x150-1.webp</image:loc>
			<image:title>Two-U.S.-Nationals-Sentenced-for-Running-Laptop-Farms-in-5-Million-DPRK-Remote-Worker-Scheme-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/</loc>
		<lastmod>2026-04-17T04:53:50+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-365-Chrome-147-Issue-218x150-1.webp</image:loc>
			<image:title>Microsoft-365-Chrome-147-Issue-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/</loc>
		<lastmod>2026-04-17T04:52:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SpankRAT-Exploits-Windows-Process-218x150-1.webp</image:loc>
			<image:title>SpankRAT-Exploits-Windows-Process-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/eus-new-age-verification-app-can-be-hacked-within-2-minutes-researchers-claim/</loc>
		<lastmod>2026-04-17T04:51:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/EUs-Age-Verification-App-218x150-1.webp</image:loc>
			<image:title>EUs-Age-Verification-App-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0018-multiple-vulnerabilities-in-adobe-products/</loc>
		<lastmod>2026-04-16T15:26:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0190-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-04-16T15:22:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0189-multiple-vulnerabilities-in-php-composer/</loc>
		<lastmod>2026-04-16T15:19:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0188-multiple-vulnerabilities-in-apache-tomcat/</loc>
		<lastmod>2026-04-16T14:53:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0187-multiple-vulnerabilities-in-juniper-junos-os/</loc>
		<lastmod>2026-04-16T14:50:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/what-is-arp-and-how-does-it-work-in-l2-switching/</loc>
		<lastmod>2026-04-16T12:45:01+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/address-resolution-protocol_1.jpg</image:loc>
			<image:title>address-resolution-protocol_(1)</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/463b1644c8ce79f8f577441bb60cda169319ea389586cd0af3a21860c9da3cf8?ts=1775284833</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/</loc>
		<lastmod>2026-04-16T12:08:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-UAC-0247-Campaign-Steals-Browser-and-WhatsApp-Data-From-Hospitals-and-Governments-218x150-1.webp</image:loc>
			<image:title>New-UAC-0247-Campaign-Steals-Browser-and-WhatsApp-Data-From-Hospitals-and-Governments-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mcgraw-hill-confirms-data-breach-exposing-13-5-million-users-personal-data/</loc>
		<lastmod>2026-04-16T12:04:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/McGraw-Hill-Confirms-Data-Breach-218x150-1.webp</image:loc>
			<image:title>McGraw-Hill-Confirms-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/</loc>
		<lastmod>2026-04-16T12:00:56+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Cisco-ISE-Vulnerabilities-Let-Remote-Attackers-Execute-Malicious-Code-218x150-1.webp</image:loc>
			<image:title>Critical-Cisco-ISE-Vulnerabilities-Let-Remote-Attackers-Execute-Malicious-Code-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-proton-vpn-sites-and-gaming-mods-spread-nwhstealer-in-new-windows-malware-campaign/</loc>
		<lastmod>2026-04-16T11:55:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-Proton-VPN-Sites-and-Gaming-Mods-Spread-NWHStealer-in-New-Windows-Malware-Campaign-218x150-1.webp</image:loc>
			<image:title>Fake-Proton-VPN-Sites-and-Gaming-Mods-Spread-NWHStealer-in-New-Windows-Malware-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-n8n-ai-workflow-automation-to-deliver-malware-through-trusted-webhooks/</loc>
		<lastmod>2026-04-16T11:29:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-n8n-AI-Workflow-Automation-to-Deliver-Malware-Through-Trusted-Webhooks-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-n8n-AI-Workflow-Automation-to-Deliver-Malware-Through-Trusted-Webhooks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/</loc>
		<lastmod>2026-04-16T10:21:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/31-High-Impact-Vulnerabilities-Exploited-in-March-as-Interlock-Hits-Cisco-FMC-Zero-Day-218x150-1.webp</image:loc>
			<image:title>31-High-Impact-Vulnerabilities-Exploited-in-March-as-Interlock-Hits-Cisco-FMC-Zero-Day-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nginx-ui-vulnerability-actively-exploited-in-attack-enables-full-server-takeover/</loc>
		<lastmod>2026-04-16T10:20:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nginx-ui-Vulnerability-Actively-Exploited-in-Attack-Enables-Full-Server-Takeover-218x150-1.webp</image:loc>
			<image:title>Nginx-ui-Vulnerability-Actively-Exploited-in-Attack-Enables-Full-Server-Takeover--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisco-webex-services-vulnerability-let-remote-attacker-impersonate-any-user/</loc>
		<lastmod>2026-04-16T10:19:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Cisco-Webex-Services-Vulnerability-Let-remote-attacker-impersonate-any-user-218x150-1.webp</image:loc>
			<image:title>Cisco-Webex-Services-Vulnerability-Let-remote-attacker-impersonate-any-user-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-chrome-vulnerabilities-let-attackers-execute-arbitrary-code-update-now/</loc>
		<lastmod>2026-04-16T09:06:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Chrome-Vulnerabilities-Let-Attackers-Execute-Arbitrary-Code-Update-NowWithout-Logging-In-218x150-1.webp</image:loc>
			<image:title>Critical-Chrome-Vulnerabilities-Let-Attackers-Execute-Arbitrary-Code-Update-NowWithout-Logging-In-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-16T09:01:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Splunk-Enterprise-and-Cloud-Platform-Vulnerability-Enables-Remote-Code-Execution-Attacks-218x150-1.webp</image:loc>
			<image:title>Splunk-Enterprise-and-Cloud-Platform-Vulnerability-Enables-Remote-Code-Execution-Attacks--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fake-adobe-reader-download-delivers-screenconnect-through-stealthy-in-memory-loader/</loc>
		<lastmod>2026-04-16T08:58:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Fake-Adobe-Reader-Download-Delivers-ScreenConnect-Through-Stealthy-In-Memory-Loader-218x150-1.webp</image:loc>
			<image:title>Fake-Adobe-Reader-Download-Delivers-ScreenConnect-Through-Stealthy-In-Memory-Loader-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/</loc>
		<lastmod>2026-04-16T08:54:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Chrome-Privacy-Analysis-Shows-How-Fingerprinting-and-Header-Leaks-Can-Expose-Users-218x150-1.webp</image:loc>
			<image:title>New-Chrome-Privacy-Analysis-Shows-How-Fingerprinting-and-Header-Leaks-Can-Expose-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/</loc>
		<lastmod>2026-04-16T07:16:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/1250-C2-Servers-Mapped-Across-Russian-Hosting-Across-165-Providers-218x150-1.webp</image:loc>
			<image:title>1250-C2-Servers-Mapped-Across-Russian-Hosting-Across-165-Providers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/</loc>
		<lastmod>2026-04-16T05:25:46+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Using-Google-Cloud-Storage-to-Bypass-Email-Filters-and-Deliver-Remcos-RAT-218x150-1.webp</image:loc>
			<image:title>Hackers-Using-Google-Cloud-Storage-to-Bypass-Email-Filters-and-Deliver-Remcos-RAT-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/</loc>
		<lastmod>2026-04-16T05:24:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Hide-Backdoor-in-Trusted-WordPress-Plugins-for-8-Months-Before-Activating-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Hide-Backdoor-in-Trusted-WordPress-Plugins-for-8-Months-Before-Activating-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/</loc>
		<lastmod>2026-04-16T05:22:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/MuddyWater-Style-Hackers-Scan-12000-Systems-Before-Hitting-Middle-East-Critical-Sectors-218x150-1.webp</image:loc>
			<image:title>MuddyWater-Style-Hackers-Scan-12000-Systems-Before-Hitting-Middle-East-Critical-Sectors-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/</loc>
		<lastmod>2026-04-16T05:12:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Releases-cumulative-update-KB5083769-for-Windows-11-version-25H2-and-24H2-218x150-1.webp</image:loc>
			<image:title>Microsoft-Releases-cumulative-update-KB5083769-for-Windows-11-version-25H2-and-24H2--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/adobe-acrobat-reader-vulnerabilities-let-attackers-execute-arbitrary-code/</loc>
		<lastmod>2026-04-16T05:09:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Adobe-Acrobat-Reader-Vulnerability-Let-Attackers-Execute-Arbitrary-Code-218x150-1.webp</image:loc>
			<image:title>Adobe-Acrobat-Reader-Vulnerability-Let-Attackers-Execute-Arbitrary-Code-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/</loc>
		<lastmod>2026-04-16T05:08:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-Active-Directory-Vulnerability-Allow-Attackers-to-execute-Malicious-code-218x150-1.webp</image:loc>
			<image:title>Windows-Active-Directory-Vulnerability-Allow-Attackers-to-execute-Malicious-code-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/</loc>
		<lastmod>2026-04-16T04:50:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Microsoft-Meta-Tracking-You-Even-if-You-Opt-Out-New-Research-218x150-1.webp</image:loc>
			<image:title>Google-Microsoft-Meta-Tracking-You-Even-if-You-Opt-Out-New-Research--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/</loc>
		<lastmod>2026-04-16T04:50:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-Google-Discover-With-AI-Generated-Content-to-Push-Malicious-Notifications-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-Google-Discover-With-AI-Generated-Content-to-Push-Malicious-Notifications-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/</loc>
		<lastmod>2026-04-16T04:49:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-s-Vulnerability-Let-Attackers-Execute-arbitrary-commands-218x150-1.webp</image:loc>
			<image:title>New-s-Vulnerability-Let-Attackers-Execute-arbitrary-commands-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0017-multiple-vulnerabilities-in-microsoft-products/</loc>
		<lastmod>2026-04-15T15:14:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0186-multiple-vulnerabilities-in-nvidia/</loc>
		<lastmod>2026-04-15T15:04:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0185-multiple-vulnerabilities-in-cisco/</loc>
		<lastmod>2026-04-15T15:00:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0184-arbitrary-file-upload-vulnerability-in-ninja-forms-file-uploads-plugin-for-wordpress/</loc>
		<lastmod>2026-04-15T14:56:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ciad-2026-0016-multiple-vulnerabilities-in-sap-products/</loc>
		<lastmod>2026-04-15T14:52:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/</loc>
		<lastmod>2026-04-15T12:05:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Create-Hidden-Mailbox-Rules-in-Microsoft-365-to-Intercept-Sensitive-Business-Emails-218x150-1.webp</image:loc>
			<image:title>Hackers-Create-Hidden-Mailbox-Rules-in-Microsoft-365-to-Intercept-Sensitive-Business-Emails-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/</loc>
		<lastmod>2026-04-15T11:38:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Agentic-LLM-Browsers-Expose-New-Attack-Surface-for-Prompt-Injection-and-Data-Theft-218x150-1.webp</image:loc>
			<image:title>Agentic-LLM-Browsers-Expose-New-Attack-Surface-for-Prompt-Injection-and-Data-Theft-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/</loc>
		<lastmod>2026-04-15T10:11:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Windows-BitLocker-Vulnerability-allows-Attacker-to-bypass-a-security-feature-218x150-1.webp</image:loc>
			<image:title>Windows-BitLocker-Vulnerability-allows-Attacker-to-bypass-a-security-feature-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/</loc>
		<lastmod>2026-04-15T10:09:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/FUNNULL-Linked-Triad-Nexus-Resurfaces-With-175-Rotating-CNAME-Domains-and-Global-Scam-Portals-218x150-1.webp</image:loc>
			<image:title>FUNNULL-Linked-Triad-Nexus-Resurfaces-With-175-Rotating-CNAME-Domains-and-Global-Scam-Portals-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/layer-2-switching-in-data-centers/</loc>
		<lastmod>2026-04-15T10:04:48+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/data-center.jpg</image:loc>
			<image:title>data-center</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/</loc>
		<lastmod>2026-04-15T09:27:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/sra-purple-team-cpe-credits-pr-featured-1776180900vzhtqvbtwp.jpg</image:loc>
			<image:title>sra-purple-team-cpe-credits-pr-featured-1776180900vzhtqvbtwp</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/</loc>
		<lastmod>2026-04-15T09:08:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Defender-0-Day-Vulnerability-Enables-Privilege-Escalation-Attack-218x150-1.webp</image:loc>
			<image:title>Microsoft-Defender-0-Day-Vulnerability-Enables-Privilege-Escalation-Attack-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/</loc>
		<lastmod>2026-04-15T09:05:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-JanaWare-Ransomware-Targets-Turkish-Users-Through-Customized-Adwind-RAT-218x150-1.webp</image:loc>
			<image:title>New-JanaWare-Ransomware-Targets-Turkish-Users-Through-Customized-Adwind-RAT-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/</loc>
		<lastmod>2026-04-15T05:49:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/25000-Endpoints-Exposed-by-Dragon-Boss-Solutions-Update-Domain-Supply-Chain-Attack-218x150-1.webp</image:loc>
			<image:title>25000-Endpoints-Exposed-by-Dragon-Boss-Solutions-Update-Domain-Supply-Chain-Attack-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/synology-ssl-vpn-client-vulnerabilities-let-remote-attackers-access-sensitive-files/</loc>
		<lastmod>2026-04-15T05:27:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Synology-SSL-VPN-Client-Vulnerability-Let-Remote-Attackers-access-sensitive-files-218x150-1.webp</image:loc>
			<image:title>Synology-SSL-VPN-Client-Vulnerability-Let-Remote-Attackers-access-sensitive-files-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/</loc>
		<lastmod>2026-04-15T05:26:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Microsoft-Exchange-and-Windows-CLFS-Vulnerabilities-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Microsoft-Exchange-and-Windows-CLFS-Vulnerabilities-Exploited-in-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-patch-tuesday-april-2026-168-vulnerabilities-fixed-including-actively-exploited-0-day/</loc>
		<lastmod>2026-04-15T05:25:04+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-Patch-Tuesday-April-2026-218x150-1.webp</image:loc>
			<image:title>Microsoft-Patch-Tuesday-April-2026-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/</loc>
		<lastmod>2026-04-15T05:24:13+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Ivanti-Neurons-ITSM-Vulnerabilities-218x150-1.webp</image:loc>
			<image:title>Ivanti-Neurons-ITSM-Vulnerabilities-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/</loc>
		<lastmod>2026-04-15T05:23:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-etcd-Auth-Bypass-Flaw-Lets-Attackers-Access-Sensitive-Cluster-APIs-Without-Authorization-218x150-1.webp</image:loc>
			<image:title>Critical-etcd-Auth-Bypass-Flaw-Lets-Attackers-Access-Sensitive-Cluster-APIs-Without-Authorization-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/</loc>
		<lastmod>2026-04-15T05:22:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/FortiClient-EMS-Instances-Exposed-Online-218x150-1-1.webp</image:loc>
			<image:title>FortiClient-EMS-Instances-Exposed-Online-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-15T05:21:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/SharePoint-Server-0-Day-Vulnerability-218x150-1.webp</image:loc>
			<image:title>SharePoint-Server-0-Day-Vulnerability-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-analysis-and-malware-analysis-features/</loc>
		<lastmod>2026-04-15T05:20:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/OpenAI-Launches-GPT-5.4-218x150-1.webp</image:loc>
			<image:title>OpenAI-Launches-GPT-5.4-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-fortisandbox-vulnerabilities-allow-attackers-to-execute-unauthorized-commands/</loc>
		<lastmod>2026-04-15T04:56:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/FortiSandbox-Vulnerability-Command-Execution-218x150-1.webp</image:loc>
			<image:title>FortiSandbox-Vulnerability-Command-Execution-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-showdoc-rce-vulnerability-active-exploited-in-the-wild/</loc>
		<lastmod>2026-04-15T04:50:16+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-ShowDoc-RCE-Vulnerability-active-exploited-in-the-wild-218x150-1.webp</image:loc>
			<image:title>Critical-ShowDoc-RCE-Vulnerability-active-exploited-in-the-wild--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/</loc>
		<lastmod>2026-04-15T04:39:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Leave-Credential-Stuffing-Botnet-Wide-Open-With-Full-Worker-Access-and-Root-Passwords-218x150-1.webp</image:loc>
			<image:title>Hackers-Leave-Credential-Stuffing-Botnet-Wide-Open-With-Full-Worker-Access-and-Root-Passwords-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/</loc>
		<lastmod>2026-04-15T04:36:35+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-PlugX-USB-Worm-Spreads-Across-Multiple-Continents-Using-DLL-Sideloading-218x150-1.webp</image:loc>
			<image:title>New-PlugX-USB-Worm-Spreads-Across-Multiple-Continents-Using-DLL-Sideloading-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/</loc>
		<lastmod>2026-04-15T04:34:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Mirax-Android-RAT-Turns-Infected-Phones-Into-Residential-Proxy-Nodes-218x150-1.webp</image:loc>
			<image:title>New-Mirax-Android-RAT-Turns-Infected-Phones-Into-Residential-Proxy-Nodes-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-janela-rat-campaign-uses-fake-msi-installers-and-malicious-browser-extensions-to-steal-data/</loc>
		<lastmod>2026-04-15T04:31:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-Janela-RAT-Campaign-Uses-Fake-MSI-Installers-and-Malicious-Browser-Extensions-to-Steal-Data-218x150-1.webp</image:loc>
			<image:title>New-Janela-RAT-Campaign-Uses-Fake-MSI-Installers-and-Malicious-Browser-Extensions-to-Steal-Data-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-15T04:28:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CISA-Warns-of-Fortinet-SQL-Injection-Vulnerability-Actively-Exploited-in-Attacks-218x150-1.webp</image:loc>
			<image:title>CISA-Warns-of-Fortinet-SQL-Injection-Vulnerability-Actively-Exploited-in-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/</loc>
		<lastmod>2026-04-14T12:00:32+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Weaponize-Obsidian-Shell-Commands-Plugin-to-Launch-Cross-Platform-Malware-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Weaponize-Obsidian-Shell-Commands-Plugin-to-Launch-Cross-Platform-Malware-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/</loc>
		<lastmod>2026-04-14T11:57:14+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Bypass-Phishing-Emails-and-Target-Okta-Identity-Systems-Instead-218x150-1.webp</image:loc>
			<image:title>Hackers-Bypass-Phishing-Emails-and-Target-Okta-Identity-Systems-Instead-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/</loc>
		<lastmod>2026-04-14T11:07:11+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Booking.com-Data-Breach-218x150-1.webp</image:loc>
			<image:title>Booking.com-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/</loc>
		<lastmod>2026-04-14T10:38:52+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/APT41-Turns-Linux-Cloud-Servers-Into-Credential-Theft-Targets-With-New-Winnti-Backdoor-218x150-1.webp</image:loc>
			<image:title>APT41-Turns-Linux-Cloud-Servers-Into-Credential-Theft-Targets-With-New-Winnti-Backdoor-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/researcher-reverse-engineered-0-day-used-to-disable-crowdstrike-edr/</loc>
		<lastmod>2026-04-14T10:29:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Researcher-Reverse-Engineered-0-Day-Used-to-Disable-CrowdStrike-EDR-218x150-1.webp</image:loc>
			<image:title>Researcher-Reverse-Engineered-0-Day-Used-to-Disable-CrowdStrike-EDR-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-108-chrome-extensions-to-steal-user-data-through-shared-c2-infrastructure/</loc>
		<lastmod>2026-04-14T10:25:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Chrome-Extensions-Steal-User-Data-218x150-1.webp</image:loc>
			<image:title>Chrome-Extensions-Steal-User-Data-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/</loc>
		<lastmod>2026-04-14T10:23:00+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/W3LL-Phishing-Kit-Takedown-Hits-Global-Credential-Theft-and-MFA-Bypass-Operation-218x150-1.webp</image:loc>
			<image:title>W3LL-Phishing-Kit-Takedown-Hits-Global-Credential-Theft-and-MFA-Bypass-Operation-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/</loc>
		<lastmod>2026-04-14T06:15:43+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Fake-Proxifier-Installer-on-GitHub-to-Spread-ClipBanker-Crypto-Stealing-Malware-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-Proxifier-Installer-on-GitHub-to-Spread-ClipBanker-Crypto-Stealing-Malware-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/nginx-1-29-8-and-freenginx-released-with-critical-security-updates/</loc>
		<lastmod>2026-04-14T05:16:47+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Nginx-1.29.8-and-FreeNginx-Released-With-Critical-Security-Updates-218x150-1.webp</image:loc>
			<image:title>Nginx-1.29.8-and-FreeNginx-Released-With-Critical-Security-Updates-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-msbuild-lolbin-to-evade-detection-and-launch-fileless-windows-attacks/</loc>
		<lastmod>2026-04-14T05:15:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-MSBuild-LOLBin-to-Evade-Detection-and-Launch-Fileless-Windows-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-MSBuild-LOLBin-to-Evade-Detection-and-Launch-Fileless-Windows-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/marimo-rce-vulnerability-exploited-in-the-within-10-hours-of-disclosure/</loc>
		<lastmod>2026-04-14T05:14:34+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Marimo-RCE-Vulnerability-Exploited-in-the-Within-10-Hours-of-Disclosure-218x150-1.webp</image:loc>
			<image:title>Marimo-RCE-Vulnerability-Exploited-in-the-Within-10-Hours-of-Disclosure-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-axios-vulnerability-allows-remote-code-execution-poc-released/</loc>
		<lastmod>2026-04-14T05:10:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-Axios-Vulnerability-Allows-Remote-Code-Execution-PoC-Released-218x150-1.webp</image:loc>
			<image:title>Critical-Axios-Vulnerability-Allows-Remote-Code-Execution-PoC-Released-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/</loc>
		<lastmod>2026-04-14T05:08:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Mozilla-Criticizes-Microsoft-for-Copilot-218x150-1.webp</image:loc>
			<image:title>Mozilla-Criticizes-Microsoft-for-Copilot-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apache-tomcat-vulnerabilities-enables-bypass-of-encryptinterceptor/</loc>
		<lastmod>2026-04-14T04:35:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Apache-Tomcat-Vulnerabilities-Bypass-of-EncryptInterceptor-218x150-1.webp</image:loc>
			<image:title>Apache-Tomcat-Vulnerabilities-Bypass-of-EncryptInterceptor--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/</loc>
		<lastmod>2026-04-14T04:34:09+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Threat-Intelligence-Boosts-ROI-and-Strengthens-Your-SOC.jpg</image:loc>
			<image:title>Threat Intelligence Boosts ROI and Strengthens Your SOC</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/iran-linked-cyberav3ngers-sets-sights-on-water-utilities-and-industrial-controllers/</loc>
		<lastmod>2026-04-14T04:33:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Iran-Linked-CyberAv3ngers-Sets-Sights-on-Water-Utilities-and-Industrial-Controllers-218x150-1.webp</image:loc>
			<image:title>Iran-Linked-CyberAv3ngers-Sets-Sights-on-Water-Utilities-and-Industrial-Controllers-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/</loc>
		<lastmod>2026-04-14T04:33:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-GitHub-and-Jira-Notifications-to-Deliver-Phishing-Through-Trusted-SaaS-Channels-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-GitHub-and-Jira-Notifications-to-Deliver-Phishing-Through-Trusted-SaaS-Channels-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain/</loc>
		<lastmod>2026-04-14T04:30:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Hide-VIPERTUNNEL-Python-Backdoor-Inside-Fake-DLL-and-Obfuscated-Loader-Chain-218x150-1.webp</image:loc>
			<image:title>Hackers-Hide-VIPERTUNNEL-Python-Backdoor-Inside-Fake-DLL-and-Obfuscated-Loader-Chain-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/</loc>
		<lastmod>2026-04-14T04:29:53+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Claude-AI-Reportedly-Down-218x150-1.webp</image:loc>
			<image:title>Claude-AI-Reportedly-Down-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/</loc>
		<lastmod>2026-04-14T04:28:42+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Rockstars-GTA-Game-Hacked-218x150-1.webp</image:loc>
			<image:title>Rockstars-GTA-Game-Hacked-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0183-multiple-vulnerabilities-in-google-chrome-for-desktop/</loc>
		<lastmod>2026-04-13T14:02:59+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0182-multiple-vulnerabilities-in-gitlab/</loc>
		<lastmod>2026-04-13T13:59:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0181-security-bypass-vulnerability-in-palo-alto-cortex-xdr-agent/</loc>
		<lastmod>2026-04-13T13:56:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0180-multiple-vulnerabilities-in-node-js/</loc>
		<lastmod>2026-04-13T13:50:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/basic-fit-data-breach-exposes-millions-of-users-across-multiple-countries/</loc>
		<lastmod>2026-04-13T11:02:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Basic-Fit-Data-Breach-218x150-1.webp</image:loc>
			<image:title>Basic-Fit-Data-Breach-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/</loc>
		<lastmod>2026-04-13T11:00:28+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Invoice_TW-25-26-00100-Next-Level-Experiences-Llp-Next-Level-Experiences-Llp-04-49-52-4-pdf-1.jpg</image:loc>
			<image:title>Invoice_TW-25-26-00100-Next-Level-Experiences-Llp-Next-Level-Experiences-Llp-04-49-52 (4)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/elon-musk-announces-to-launch-xchat-with-self-destruct-message-features/</loc>
		<lastmod>2026-04-13T09:28:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Elon-Musk-Announces-to-Launch-XChat-With-self-destruct-message-Features-218x150-1.webp</image:loc>
			<image:title>Elon-Musk-Announces-to-Launch-XChat-With-self-destruct-message-Features-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/microsoft-confirms-recent-windows-11-updates-break-push-button-reset/</loc>
		<lastmod>2026-04-13T09:27:41+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Microsoft-confirms-Recent-Windows-11-updates-break-Push-Button-Reset-1-218x150-1.webp</image:loc>
			<image:title>Microsoft-confirms-Recent-Windows-11-updates-break-Push-Button-Reset-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/etherchannel-link-aggregation-explained/</loc>
		<lastmod>2026-04-13T08:56:08+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Link-aggregation.webp</image:loc>
			<image:title>Link aggregation</image:title>
		</image:image>
		<image:image>
			<image:loc>https://teamwin.in/cdn-0001/431667d089ee42998a55b14970c143b9526e74b94306bde48a8478357d076f6e?ts=1774439782</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/adobe-patches-acrobat-reader-0-day-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-04-13T08:53:40+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Adobe-Patches-Acrobat-Reader-0-Day-Vulnerability-Exploited-in-the-Wild-218x150-1.webp</image:loc>
			<image:title>Adobe-Patches-Acrobat-Reader-0-Day-Vulnerability-Exploited-in-the-Wild-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/critical-wordpress-plugin-flaw-lets-attackers-bypass-authentication-and-gain-admin-access/</loc>
		<lastmod>2026-04-13T08:23:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Critical-WordPress-Plugin-Flaw-Lets-Attackers-Bypass-Authentication-and-Gain-Admin-Access-218x150-1.webp</image:loc>
			<image:title>Critical-WordPress-Plugin-Flaw-Lets-Attackers-Bypass-Authentication-and-Gain-Admin-Access-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/how-to-troubleshoot-layer-2-switching-issues/</loc>
		<lastmod>2026-04-13T07:36:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/layer-2-network-switch.jpg</image:loc>
			<image:title>layer-2-network-switch</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-bts-world-tour-ticket-sites-to-scam-fans-across-multiple-countries/</loc>
		<lastmod>2026-04-13T05:10:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Fake-BTS-World-Tour-Ticket-Sites-to-Scam-Fans-Across-Multiple-Countries-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-BTS-World-Tour-Ticket-Sites-to-Scam-Fans-Across-Multiple-Countries-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hpe-aruba-private-5g-platform-vulnerability-enables-credential-theft-attacks/</loc>
		<lastmod>2026-04-13T05:09:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/HPE-Aruba-Private-5G-Platform-Vulnerability-Enables-credential-Theft-Attacks-218x150-1.webp</image:loc>
			<image:title>HPE-Aruba-Private-5G-Platform-Vulnerability-Enables-credential-Theft-Attacks--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/censys-warns-5219-rockwell-allen-bradley-plcs-are-exposed-amid-iranian-apt-activity/</loc>
		<lastmod>2026-04-13T05:08:33+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Censys-Warns-5219-Rockwell-Allen-Bradley-PLCs-Are-Exposed-Amid-Iranian-APT-Activity-218x150-1.webp</image:loc>
			<image:title>Censys-Warns-5219-Rockwell-Allen-Bradley-PLCs-Are-Exposed-Amid-Iranian-APT-Activity-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-exploit-github-copilot-flaw-to-exfiltrate-sensitive-data/</loc>
		<lastmod>2026-04-13T05:07:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Exploit-GitHub-Copilot-Flaw-to-Exfiltrate-Sensitive-Data-218x150-1.webp</image:loc>
			<image:title>Hackers-Exploit-GitHub-Copilot-Flaw-to-Exfiltrate-Sensitive-Data--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-aitm-session-hijacking-to-redirect-employee-salaries-in-new-storm-2755-campaign/</loc>
		<lastmod>2026-04-13T05:01:49+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-AiTM-Session-Hijacking-to-Redirect-Employee-Salaries-in-New-Storm-2755-Campaign-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-AiTM-Session-Hijacking-to-Redirect-Employee-Salaries-in-New-Storm-2755-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/engagesdk-vulnerability-exposes-millions-of-crypto-wallet-users-to-cyberattacks/</loc>
		<lastmod>2026-04-13T05:00:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/EngageSDK-Vulnerability-Exposes-Millions-of-Crypto-Wallet-Users-to-Cyberattacks-218x150-1.webp</image:loc>
			<image:title>EngageSDK-Vulnerability-Exposes-Millions-of-Crypto-Wallet-Users-to-Cyberattacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/anthropic-launches-claude-beta-for-word-bringing-ai-powered-editing-to-microsoft-docs/</loc>
		<lastmod>2026-04-13T04:59:58+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Claude-Beta-for-Word-218x150-1.webp</image:loc>
			<image:title>Claude-Beta-for-Word-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/__trashed-2/</loc>
		<lastmod>2026-04-13T04:59:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1-218x150-1.webp</image:loc>
			<image:title>Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ransomware-gangs-expand-use-of-edr-killers-beyond-vulnerable-drivers-eset-warns/</loc>
		<lastmod>2026-04-13T04:57:22+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Ransomware-Gangs-Expand-Use-of-EDR-Killers-Beyond-Vulnerable-Drivers-ESET-Warns-1-218x150-1.webp</image:loc>
			<image:title>Ransomware-Gangs-Expand-Use-of-EDR-Killers-Beyond-Vulnerable-Drivers-ESET-Warns-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-unveils-device-bound-chrome-sessions-in-anti-cookie-theft-move/</loc>
		<lastmod>2026-04-13T04:42:06+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Unveils-Device-Bound-Chrome-Sessions-in-Anti-Cookie-Theft-Move-1-218x150-1.webp</image:loc>
			<image:title>Google-Unveils-Device-Bound-Chrome-Sessions-in-Anti-Cookie-Theft-Move-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/google-launches-gmail-end-to-end-encryption-for-android-and-ios/</loc>
		<lastmod>2026-04-13T04:37:12+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Google-Launches-Gmail-End-to-End-Encryption-for-Android-and-iOS-1-218x150-1.webp</image:loc>
			<image:title>Google-Launches-Gmail-End-to-End-Encryption-for-Android-and-iOS-1-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/openai-warns-macos-users-to-update-chatgpt-and-codex-immediately/</loc>
		<lastmod>2026-04-13T04:36:21+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/OpenAI-macOS-Users-218x150-1.webp</image:loc>
			<image:title>OpenAI-macOS-Users-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/</loc>
		<lastmod>2026-04-13T04:35:02+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/WhatsApp-End-to-End-Encryption-Pavel-Durov-218x150-1.webp</image:loc>
			<image:title>WhatsApp-End-to-End-Encryption-Pavel-Durov-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-abuse-github-and-gitlab-to-host-malware-and-credential-phishing-campaigns/</loc>
		<lastmod>2026-04-11T05:38:54+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Abuse-GitHub-and-GitLab-to-Host-Malware-and-Credential-Phishing-Campaigns-218x150-1.webp</image:loc>
			<image:title>Hackers-Abuse-GitHub-and-GitLab-to-Host-Malware-and-Credential-Phishing-Campaigns-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/ai-router-vulnerabilities-allow-attackers-to-inject-malicious-code-and-steal-sensitive-data/</loc>
		<lastmod>2026-04-11T04:45:36+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AI-Router-Vulnerabilities-218x150-1.webp</image:loc>
			<image:title>AI-Router-Vulnerabilities-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-impersonate-secure-messaging-apps-to-deploy-prospy-in-middle-east-espionage-attacks/</loc>
		<lastmod>2026-04-11T04:41:38+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Impersonate-Secure-Messaging-Apps-to-Deploy-ProSpy-in-Middle-East-Espionage-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Impersonate-Secure-Messaging-Apps-to-Deploy-ProSpy-in-Middle-East-Espionage-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0179-security-misconfiguration-vulnerability-in-atom-3x-projector/</loc>
		<lastmod>2026-04-10T13:42:39+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0178-authorization-bypass-vulnerability-in-docker-engine/</loc>
		<lastmod>2026-04-10T13:39:51+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/muddywater-turns-to-russian-malware-as-a-service-in-new-chainshell-campaign/</loc>
		<lastmod>2026-04-10T10:52:30+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/MuddyWater-Turns-to-Russian-Malware-as-a-Service-in-New-ChainShell-Campaign-218x150-1.webp</image:loc>
			<image:title>MuddyWater-Turns-to-Russian-Malware-as-a-Service-in-New-ChainShell-Campaign-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/multiple-tp-link-vulnerabilities-allow-attackers-to-seize-control-of-the-device/</loc>
		<lastmod>2026-04-10T10:06:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Multiple-TP-Link-Vulnerabilities-allow-attackers-to-seize-control-of-the-device-218x150-1.webp</image:loc>
			<image:title>Multiple-TP-Link-Vulnerabilities-allow-attackers-to-seize-control-of-the-device-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/</loc>
		<lastmod>2026-04-10T09:34:27+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/ai-native-threat-intelligence-platform.jpg</image:loc>
			<image:title>ai-native-threat-intelligence-platform</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/react-server-components-vulnerability-enables-dos-attacks/</loc>
		<lastmod>2026-04-10T09:31:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/React-Server-Components-Vulnerability-Enables-DoS-Attacks-218x150-1.webp</image:loc>
			<image:title>React-Server-Components-Vulnerability-Enables-DoS-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/juniper-networks-default-password-vulnerability-let-attacker-take-full-control-of-the-device/</loc>
		<lastmod>2026-04-10T09:30:29+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Juniper-Networks-Default-Password-vulnerability-Let-Attacker-take-full-control-of-the-device-218x150-1.webp</image:loc>
			<image:title>Juniper-Networks-Default-Password-vulnerability-Let-Attacker-take-full-control-of-the-device--218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/cpuid-website-compromised-to-deliver-weaponized-hwmonitor-and-cpu-z-tools/</loc>
		<lastmod>2026-04-10T09:29:24+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/CPUID-Website-Compromise-218x150-1.webp</image:loc>
			<image:title>CPUID-Website-Compromise-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/desckvb-rat-uses-obfuscated-javascript-and-fileless-net-loader-to-evade-detection/</loc>
		<lastmod>2026-04-10T08:56:19+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/DesckVB-RAT-Uses-Obfuscated-JavaScript-and-Fileless-.NET-Loader-to-Evade-Detection-218x150-1.webp</image:loc>
			<image:title>DesckVB-RAT-Uses-Obfuscated-JavaScript-and-Fileless-.NET-Loader-to-Evade-Detection-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/trojanized-openvsx-extension-spreads-glassworm-across-vs-code-cursor-and-windsurf/</loc>
		<lastmod>2026-04-10T08:53:25+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Trojanized-OpenVSX-Extension-Spreads-GlassWorm-Across-VS-Code-Cursor-and-Windsurf-218x150-1.webp</image:loc>
			<image:title>Trojanized-OpenVSX-Extension-Spreads-GlassWorm-Across-VS-Code-Cursor-and-Windsurf-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-svg-onload-trick-to-hide-magecart-skimmer-on-magento-checkout-pages/</loc>
		<lastmod>2026-04-10T08:33:44+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Magento-Checkout-Pages-218x150-1.webp</image:loc>
			<image:title>Magento-Checkout-Pages-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/single-line-of-code-can-jailbreak-11-ai-models-including-chatgpt-claude-and-gemini/</loc>
		<lastmod>2026-04-10T07:14:05+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Single-Line-of-Code-Can-jailbreak-11-AI-models-Including-ChatGPT-Claude-and-Gemini-218x150-1.webp</image:loc>
			<image:title>Single-Line-of-Code-Can-jailbreak-11-AI-models-Including-ChatGPT-Claude-and-Gemini-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/aws-patches-critical-rce-and-escalate-privileges-in-research-and-engineering-studio/</loc>
		<lastmod>2026-04-10T07:12:26+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/AWS-Patches-Critical-RCE-and-escalate-privileges-in-Research-and-Engineering-Studio-218x150-1.webp</image:loc>
			<image:title>AWS-Patches-Critical-RCE-and-escalate-privileges-in-Research-and-Engineering-Studio-218x150 (1)</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-fake-security-software-to-deliver-lucidrook-malware-in-taiwan-attacks/</loc>
		<lastmod>2026-04-10T05:14:23+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-Fake-Security-Software-to-Deliver-LucidRook-Malware-in-Taiwan-Attacks-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-Fake-Security-Software-to-Deliver-LucidRook-Malware-in-Taiwan-Attacks-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-stx-rat-uses-hidden-remote-desktop-and-infostealer-features-to-evade-detection/</loc>
		<lastmod>2026-04-10T04:59:57+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-STX-RAT-Uses-Hidden-Remote-Desktop-and-Infostealer-Features-to-Evade-Detection-218x150-1.webp</image:loc>
			<image:title>New-STX-RAT-Uses-Hidden-Remote-Desktop-and-Infostealer-Features-to-Evade-Detection-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/hackers-use-clickfix-and-malicious-dmg-files-to-deliver-notnullosx-on-macos/</loc>
		<lastmod>2026-04-10T04:59:10+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/Hackers-Use-ClickFix-and-Malicious-DMG-Files-to-Deliver-notnullOSX-on-macOS-218x150-1.webp</image:loc>
			<image:title>Hackers-Use-ClickFix-and-Malicious-DMG-Files-to-Deliver-notnullOSX-on-macOS-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/new-clickfix-campaign-uses-macos-script-editor-to-deliver-atomic-stealer/</loc>
		<lastmod>2026-04-10T04:58:18+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/New-ClickFix-Campaign-Uses-macOS-Script-Editor-to-Deliver-Atomic-Stealer-218x150-1.webp</image:loc>
			<image:title>New-ClickFix-Campaign-Uses-macOS-Script-Editor-to-Deliver-Atomic-Stealer-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/whatsapp-introduces-username-feature-for-connecting-without-sharing-phone-numbers/</loc>
		<lastmod>2026-04-10T04:57:31+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2026/04/WhatsApp-username-feature-218x150-1.webp</image:loc>
			<image:title>WhatsApp-username-feature-218x150</image:title>
		</image:image>
	</url>
	<url>
		<loc>https://teamwin.in/civn-2026-0177-multiple-vulnerabilities-in-openssl/</loc>
		<lastmod>2026-04-09T13:52:37+00:00</lastmod>
		<changefreq>daily</changefreq>
		<priority>0.8</priority>
		<image:image>
			<image:loc>https://teamwin.in/wp-content/uploads/2025/06/certin-new-e1751351599950.png</image:loc>
		</image:image>
	</url>
</urlset>
