<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//expertinsights.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://expertinsights.com/news/claude-ai-vulnerability-allowed-attackers-to-steal-chat-data</loc>
		<lastmod>2026-04-22T11:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Claude-AI-Vulnerability-Allowed-Attackers-to-Steal-Chat-Data-Through-Hidden-Prompts.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/apple-fixes-webkit-with-new-background-security-updates</loc>
		<lastmod>2026-04-22T11:38:14+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Google-AI-Identifies-Vulnerabilities-In-Apples-Safari.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/popular-password-managers-spoofed-in-ongoing-phishing-campaigns</loc>
		<lastmod>2026-04-22T11:38:43+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Top-Password-Managers-Spoofed-In-Phishing-Campaigns.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/expert-insights-report-2026</loc>
		<lastmod>2026-04-22T11:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/CISO-Report.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-alerts-actively-exploited-adobe-flaw</loc>
		<lastmod>2026-04-22T11:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/CISA-Alerts-on-Actively-Exploited-Critical-Adobe-Experience-Manager-Flaw.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/attackers-chain-cisco-cloudflare-to-steal-m365-credentials</loc>
		<lastmod>2026-04-22T11:39:07+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Attackers-Chain-Cisco-Cloudflare-And-Expired-Domains-to-Steal-M365-Credentials.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/100-vs-code-extensions-exposed</loc>
		<lastmod>2026-04-22T11:39:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Over-100-VS-Code-Extensions-Exposed-Developers-to-Hidden-Supply-Chain-Risks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-identifies-credential-theft-campaign-by-storm-2561</loc>
		<lastmod>2026-04-22T11:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Microsoft-Identifies-Credential-Theft-Campaign-By-Storm-2561.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/north-korean-hackers-target-developers</loc>
		<lastmod>2026-04-22T11:39:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/North-Korean-Hackers-Target-Developers-With-Crypto-Stealing-Malware.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-generated-phishing-surges-hoxhunt-finds</loc>
		<lastmod>2026-04-22T11:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Winter-holiday-spike-in-AI-generated-phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/97-of-identity-attacks-involve-passwords-says-microsoft</loc>
		<lastmod>2026-04-22T11:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/97-Of-Identity-Attacks-Involve-Passwords-Says-Microsoft.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/most-breaches-tied-to-account-compromise-google-warns</loc>
		<lastmod>2026-04-22T11:39:42+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/H2-2025-distribution-of-initial-access-vectors-exploited-in-Google-Cloud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/one-in-five-ransomware-attacks-target-the-us-says-kela</loc>
		<lastmod>2026-04-22T11:39:44+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/One-In-Five-Ransomware-Attacks-Target-The-US-Says-KELA.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-teams-fake-it-support-scam</loc>
		<lastmod>2026-04-22T11:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Microsoft-Teams-Security-Settings-Can-Be-Overruled-By-Guest-Tenants.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-watchguard-fireware-flaw</loc>
		<lastmod>2026-04-22T11:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Critical-WatchGuard-Fireware-Flaw-Could-Let-Attackers-Execute-Code-Pre-Authentication.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/veeam-to-acquire-dspm-leader-securiti-ai</loc>
		<lastmod>2026-04-22T11:40:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Veeam-To-Acquire-DSPM-Leader-Securiti-AI-For-1.7bn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-warns-ai-is-accelerating-phishing-malware-and-identity-fraud</loc>
		<lastmod>2026-04-22T11:40:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Microsoft-Defende-Flaws-Remain-Unpatched.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/anthropics-claude-finds-22-high-severity-firefox-flaws-in-two-weeks</loc>
		<lastmod>2026-04-22T11:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Anthropic-Announces-Claude-Code-Security-Capabilities-What-Security-Leaders-Need-To-know.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/ciso-qa-abbas-kudrati</loc>
		<lastmod>2026-04-22T11:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Abbas-Kudrati.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-seizes-dmains-behind-mfa-bypass-attacks</loc>
		<lastmod>2026-04-22T11:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Microsoft-Detects-SesameOp-Backdoor-Using-OpenAIs-API-as-Command-Channel.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/connectwise-fixes-two-bugs-that-could-allow-mitm-attacks</loc>
		<lastmod>2026-04-22T11:40:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/ConnectWise-Fixes-Two-Bugs-That-Could-Allow-MiTM-Attacks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-exploited-vulnerabilities-added-to-kev-catalog</loc>
		<lastmod>2026-04-22T11:41:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/New-Exploited-Vulnerabilities-Added-To-KEV-Catalog-Urgent-Remediation-Recommended.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-warns-of-phishing-attacks-exploiting-entra-id</loc>
		<lastmod>2026-04-22T11:41:03+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Microsoft-Warns-Of-Phishing-Attacks-Exploiting-Entra-ID-and-Google-OAuth-Redirects.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/pleasefix-flaws-and-zero-click-hijack</loc>
		<lastmod>2026-04-22T11:41:23+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/PleaseFix-Flaws-In-Perplexity-Comet-Expose-Local-Files-And-Password-Vaults-to-Zero-Click-Agent-Hijacking.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/europol-shuts-down-sim-box-network</loc>
		<lastmod>2026-04-22T11:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Europol-Shuts-Down-SIM-Box-Network-Linked-To-Thousands-Of-Cybercrime-Cases.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-phishing-kit-targets-hundreds-of-m365-accounts-globally</loc>
		<lastmod>2026-04-22T11:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/New-Phishing-Kit-Targets-Hundreds-Of-M365-Accounts-Globally.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/fake-microsoft-outlook-anti-spam-pages-used-to-deploy-c2</loc>
		<lastmod>2026-04-22T11:41:41+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Fake-Microsoft-Outlook-Antispam-Pages-Used-To-Deploy-Customized-Havoc-C2-In-Multi-Endpoint-Intrusions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/russian-coldriver-hackers-develop-three-new-malware-families</loc>
		<lastmod>2026-04-22T11:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Russian-COLDRIVER-Hackers-Develop-Three-New-Malware-Families.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/winners-of-the-cybersecurity-community-awards-2026</loc>
		<lastmod>2026-04-22T11:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/1_720.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/jlr-attack-cost-record-breaking-2-5-billion-say-experts</loc>
		<lastmod>2026-04-22T11:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/JLR-Attack-Cost-Record-Breaking-2.5-Billion-Say-Experts.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/north-korean-cyberespionage-group-targets-european-defense-sector</loc>
		<lastmod>2026-04-22T11:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/North-Korean-Cyberespionage-Group-Targets-European-Defense-Sector.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-rce-discovered-in-servicenow-ai-platform</loc>
		<lastmod>2026-04-22T11:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Critical-CVSS-9.8-RCE-Flaw-Discovered-In-ServiceNow-AI-Platform.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/two-thirds-of-it-leaders-fooled-phishing</loc>
		<lastmod>2026-04-22T11:42:25+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Arctic-Wolf-Survey-Finds-Nearly-Two-Thirds-of-IT-Leaders-Have-Fallen-for-Phishing-Attacks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-ai-search-tools-pose-multiple-prompt-injection-risks</loc>
		<lastmod>2026-04-22T11:42:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/New-AI-Search-Tools-Pose-Multiple-Prompt-Injection-Risks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-orders-emergency-cisco-sd-wan-patch</loc>
		<lastmod>2026-04-22T11:42:46+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Resizing-Template-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/rajesh-ganesan-manageengine-ceo</loc>
		<lastmod>2026-04-22T11:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Group-1000004534-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Rajesh-Ganesan-2-copy-min-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/ManagEngineUserConf-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/anthropic-announces-claude-code-security-capabilities</loc>
		<lastmod>2026-04-22T11:43:02+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Anthropic-Announces-Claude-Code-Security-Capabilities-What-Security-Leaders-Need-To-know.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-wsus-rce-vulnerability</loc>
		<lastmod>2026-04-22T11:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Microsoft-WSUS-RCE-Shifts-To-Active-Exploitation-Urgent-Patching-Required.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-augmented-hacker-compromises-600-fortigate-devices</loc>
		<lastmod>2026-04-22T11:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/AI-Augmented-Hacker-Compromises-600-FortiGate-Devices-Across-55-Countries.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/trustconnect-maas-poses-as-rmm-sells-ev-signed-rat</loc>
		<lastmod>2026-04-22T11:43:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/TrustConnect-MaaS-Poses-as-RMM-Sells-EV-Signed-RAT-for-USD-300Month.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cybercriminals-use-google-meet-impersonation-in-new-attacks</loc>
		<lastmod>2026-04-22T11:43:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/90-of-Breaches-Linked-to-Preventable-Gaps-Unit-42-Finds.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/malicious-oauth-apps-target-entra-id</loc>
		<lastmod>2026-04-22T11:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Microsoft-Reports-90-Drop-In-Fake-Partner-Accounts-After-Automating-Identity-Checks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/breaches-linked-to-preventable-gaps-unit-42-finds</loc>
		<lastmod>2026-04-22T11:44:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/The-Speed-of-First-Quartile-Attacks-Rose-Between-2024-and-2025.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/us-nuclear-weapons-plant-breached-by-foreign-hackers</loc>
		<lastmod>2026-04-22T11:44:17+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/US-Nuclear-Weapons-Plant-Breached-By-Foreign-Hackers.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/google-warns-dell-recoverpoint-zero-day</loc>
		<lastmod>2026-04-22T11:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Dell-Storage-Manager-Vulnerabilities-Expose-Systems-to-Remote-Attack.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-adds-beyondtrust-flaw-to-kev</loc>
		<lastmod>2026-04-22T11:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/hackers-exploit-adobe-commerce-flaw-sessionreaper</loc>
		<lastmod>2026-04-22T11:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Hackers-Exploit-Adobe-Commerce-Flaw-22SessionReaper22.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/proofpoint-unveils-new-partner-initiative</loc>
		<lastmod>2026-04-22T11:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Proofpoint-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/workers-scam-employers-with-ai-generated-expense-receipts</loc>
		<lastmod>2026-04-22T11:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Workers-Scam-Employers-With-AI-Generated-Expense-Receipts.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-local-government-services-impacted-by-cyberattacks</loc>
		<lastmod>2026-04-22T11:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Critical-Local-Government-Services-Impacted-By-Cyberattacks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/google-patches-chrome-zero-day</loc>
		<lastmod>2026-04-22T11:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/actively-exploited-delmia-flaws-enable-full-application-compromise</loc>
		<lastmod>2026-04-22T11:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Actively-Exploited-DELMIA-Flaws-Enable-Full-Application-Compromise.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/apple-patches-exploited-ios-zero-day</loc>
		<lastmod>2026-04-22T11:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Google-AI-Identifies-Vulnerabilities-In-Apples-Safari.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/novel-cophish-attack-uses-copilot-studio-agents-for-oauth-phishing</loc>
		<lastmod>2026-04-22T11:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Novel-CoPhish-Attack-Uses-Copilot-Studio-Agents-For-OAuth-Phishing.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-lanscope-flaw-added-to-cisas-kev-catalog</loc>
		<lastmod>2026-04-22T11:46:07+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Critical-LANSCOPE-Flaw-Added-To-CISAs-Kev-Catalog.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-generated-malware-exploits-react2shell</loc>
		<lastmod>2026-04-22T11:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/AI-Generated-Malware-Exploits-React2Shell-In-Docker-Honeypots.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/mitre-reveals-detection-overhaul-in-attck-v18</loc>
		<lastmod>2026-04-22T11:46:46+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/MITRE-Reveals-Detection-Overhaul-In-ATTCK-v18.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/1password-2025-findings</loc>
		<lastmod>2026-04-22T11:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Resizing-Template-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/claude-desktop-extensions-expose-over-10000-users-to-rce-vulnerability</loc>
		<lastmod>2026-04-22T11:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Claude-Desktop-Extensions-Expose-Over-10000-Users-To-RCE-Vulnerability.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/dell-storage-manager-vulnerabilities</loc>
		<lastmod>2026-04-22T11:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Dell-Storage-Manager-Vulnerabilities-Expose-Systems-to-Remote-Attack.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-reportedly-delivers-false-phishing-warnings</loc>
		<lastmod>2026-04-22T11:47:26+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Microsoft-Reportedly-Delivers-False-Phishing-Warnings.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-android-banking-trojan-mimics-human-behavior</loc>
		<lastmod>2026-04-22T11:47:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/New-Android-Banking-Trojan-Mimics-Human-Behavior-To-Evade-Detection.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/image-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/prometei-botnet-continues-targeting-windows-servers</loc>
		<lastmod>2026-04-22T11:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Prometei-Botnet-Continues-Targeting-Windows-Servers.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/russian-backed-group-weaponizes-new-m365-flaw</loc>
		<lastmod>2026-04-22T11:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Russian-Espionage-Tool-Provides-Backdoor-Access-to-Microsoft-Outlook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/wordpress-security-plugin-vulnerability-exposes-sensitive-data</loc>
		<lastmod>2026-04-22T11:47:59+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/WordPress-Security-Plugin-Exposes-Sensitive-Data.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-powers-phishing-attacks-every-19-seconds</loc>
		<lastmod>2026-04-22T11:48:06+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Percentage-Change-in-Malicious-Emails-Bypassing-Email-Security-Perimeters-Year-Over-Year.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-and-nsa-reveal-new-ms-exchange-security-guidance</loc>
		<lastmod>2026-04-22T11:48:08+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/CISA-And-NSA-Reveal-New-MS-Exchange-Server-Security-Guidance.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/jamf-to-be-acquired-in-2-2-billion-deal</loc>
		<lastmod>2026-04-22T11:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Jamf-To-Be-Acquired-In-2.2-Billion-Deal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/macos-users-increasingly-targeted-by-social-engineering-and-infostealers</loc>
		<lastmod>2026-04-22T11:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/macOS-Users-Increasingly-Targeted-By-Social-Engineering-And-Infostealers.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/openai-to-release-gpt-5-powered-cybersecurity-agent</loc>
		<lastmod>2026-04-22T11:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/OpenAI-To-Release-GPT-5-Powered-Cybersecurity-Agent.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-and-weak-identity-controls-used-in-amazon-bedrock-and-gpu-exploitation</loc>
		<lastmod>2026-04-22T11:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/AI-And-Weak-Identity-Controls-Used-In-Amazon-Bedrock-And-GPU-Exploitation.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/chinese-state-sponsored-vmware-flaw</loc>
		<lastmod>2026-04-22T11:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Chinese-State-Sponsored-Attackers-Abuse-VMWare-Flaw-CISA-Urges-Remediation.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/expert-insights-announces-finalists-for-cybersecurity-community-awards-2026</loc>
		<lastmod>2026-04-22T11:48:50+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/data-loss-is-a-people-problem-says-proofpoint</loc>
		<lastmod>2026-04-22T11:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Data-Loss-Is-A-People-Problem-Says-Proofpoint.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/multi-stage-pdf-and-dropbox-phishing-campaign-used-in-credential-theft</loc>
		<lastmod>2026-04-22T11:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Multi-Stage-PDF-And-DropBox-Phishing-Campaign-Used-In-Credential-Theft.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-outlines-a-phased-plan-to-disable-ntlm-by-default-in-windows</loc>
		<lastmod>2026-04-22T11:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Microsoft-Outlines-A-Phased-Plan-To-Disable-NTLM-By-Default-In-Windows.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/lost-in-transit-hackers-using-rmm</loc>
		<lastmod>2026-04-22T11:49:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Lost-In-Transit-Hackers-And-Organized-Crime-Groups-Team-Up-To-Steal-Goods-Shipments.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-teams-flaws-could-allow-hackers-to-edit-messages-and-notifications-researchers-say</loc>
		<lastmod>2026-04-22T11:49:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Microsoft-Teams-Impersonation-Spoofing-And-Malware-Delivery.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-reports-90-drop-in-fake-partner-accounts</loc>
		<lastmod>2026-04-22T11:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Microsoft-Reports-90-Drop-In-Fake-Partner-Accounts-After-Automating-Identity-Checks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/73-surge-in-malicious-open-source-packages-signals-supply-chain-trust-crisis</loc>
		<lastmod>2026-04-22T11:50:36+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/2-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/security-leaders-rank-hidden-ai-as-top-security-risk</loc>
		<lastmod>2026-04-22T11:50:37+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/a8fdb713-e523-49b1-b344-c348bc3639a3-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-warns-gladinet-and-cwp-flaws</loc>
		<lastmod>2026-04-22T11:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/fortinet-confirms-forticloud-sso-bypass-flaw</loc>
		<lastmod>2026-04-22T11:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Attackers-Exploit-FortiWeb-Flaws-To-Deploy-Sliver-C2-For-Long-Term-Access.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/rogue-cyber-experts-hack-us-firms</loc>
		<lastmod>2026-04-22T11:50:57+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Rogue-Cyber-Experts-Partake-In-Conspiracy-To-Hack-Multiple-US-Firms-And-Extort-Millions-min-min-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-patches-actively-exploited-office-zero-day</loc>
		<lastmod>2026-04-22T11:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisos-are-suffering-under-the-weight-of-liability</loc>
		<lastmod>2026-04-22T11:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISOs-Are-Suffering-Under-The-Weight-Of-Liability-Says-RSAC.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/prompt-injection-remains-a-persistent-enterprise-ai-risk</loc>
		<lastmod>2026-04-22T11:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/ePrompt-Injection-Remains-A-Persistent-Enterprise-AI-Risk-As-Adoption-Accelerates.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/dpkr-attackers-abuse-microsoft-dev-tools</loc>
		<lastmod>2026-04-22T11:51:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/North-Korea.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/2026-ciso-priorities</loc>
		<lastmod>2026-04-22T11:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/What-Are-Security-Leaders-Prioritizing-in-2026-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-detects-sesameop-backdoor</loc>
		<lastmod>2026-04-22T11:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Microsoft-Detects-SesameOp-Backdoor-Using-OpenAIs-API-as-Command-Channel.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/69-of-organizations-hit-by-identity-related-cloud-incidents</loc>
		<lastmod>2026-04-22T11:52:03+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/69-Of-Organizations-Hit-by-Identity-Related-Cloud-Incidents-Survey-Finds.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/us-government-budget-office-hit-by-foreign-cyber-attack</loc>
		<lastmod>2026-04-22T11:52:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Foreign-Cyber-Attack-On-US-Government-Budget-Office.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/exposed-training-apps-still-use-default-passwords</loc>
		<lastmod>2026-04-22T11:52:12+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/54-of-Exposed-Training-Apps-Still-Use-Default-Passwords.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/multiple-security-loopholes-could-trick-chatgpt-into-sharing-private-data-researchers-say</loc>
		<lastmod>2026-04-22T11:52:20+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/HackGPT-Seven-New-Vulnerabilities-Discovered-In-OpenAIs-Flagship-Tool.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/dprk-linked-interview-campaign-expands</loc>
		<lastmod>2026-04-22T11:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/DPRK-Linked-Contagious-Interview-Campaign-Expands-Use-Of-Visual-Studio-Code-Backdoors.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-ai-enabled-malware-adapts-its-behavior-mid-attack</loc>
		<lastmod>2026-04-22T11:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/New-AI-Enabled-Malware-Adapts-Its-Behavior-Mid-Attack.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/nsa-releases-new-zero-trust-implementation-guidelines</loc>
		<lastmod>2026-04-22T11:52:46+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/NSA-Releases-New-Zero-Trust-Implementation-Guidelines-To-Help-Organizations-Move-Beyond-Perimeter-Security.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/announcing-cybersecurity-community-awards-2026</loc>
		<lastmod>2026-04-22T11:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/202526-Awards-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/russian-hackers-impersonate-eset-in-phishing-attacks-against-ukraine</loc>
		<lastmod>2026-04-22T11:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Russian-Attackers-Impersonate-ESET-In-Attacks-Against-Ukraine.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/novel-whisperleak-attack</loc>
		<lastmod>2026-04-22T11:53:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Novel-WhisperLeak-Attack-Allows-Adversaries-To-Spy-On-LLM-Conversation-Topics.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/account-takeovers-surge-in-past-year</loc>
		<lastmod>2026-04-22T11:53:17+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Account-Takeovers-Surge-389-As-Cybercrime-Hits-A-14-Minute-Breach-Window.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/hackers-exploit-patch-gap-android-spyware</loc>
		<lastmod>2026-04-22T11:53:23+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Hackers-Exploit-22Patch-Gap22-To-Deploy-Android-Spyware-Urgent-Remediation-Required.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/fired-intel-engineer-facing-lawsuit-after-downloading-18000-top-secret-files</loc>
		<lastmod>2026-04-22T11:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Intel-Sues-Ex-Employee-For-Stealing-Top-Secret-Company-Data.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-adds-microsoft-windows-dwm-flaw-to-kev-catalog</loc>
		<lastmod>2026-04-22T11:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/popular-npm-javascript-tool-with-800k-weekly-downloads-vulnerable-to-critical-vulnerability</loc>
		<lastmod>2026-04-22T11:53:49+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Popular-NPM-JavaScript-Tool-With-800k-Weekly-Downloads-Vulnerable-To-Critical-Vulnerability-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/crowdstrike-plans-seraphic-acquisition</loc>
		<lastmod>2026-04-22T11:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Crowdstrike-Seraphic-Acquisition.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/south-korean-cyber-fraudsters-made-millions-from-phishing-scams-and-blackmail</loc>
		<lastmod>2026-04-22T11:54:09+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/South-Korean-Cyber-Fraudsters-Made-Millions-From-Phishing-Scams-And-Blackmail-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/wireless-dos-flaw-in-broadcom-chipsets-disrupts-asus-routers</loc>
		<lastmod>2026-04-22T11:54:09+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Implementation-level-weakness-allows-over-the-air-attacks-to-knock-5-GHz-Wi-Fi-networks-offline.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/new-phishing-kit-targeting-m365-can-steal-credentials</loc>
		<lastmod>2026-04-22T11:54:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/A-New-Phishing-Kit-Targeting-M365-Can-Harvest-Credentials-In-Just-One-Click.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/top-ai-companies-are-leaking-api-secrets-on-github-says-wiz</loc>
		<lastmod>2026-04-22T11:54:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/65-Of-Forbes-AI-50-Leak-Secrets-On-GitHub.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/workforce-impersonation-turns-credential-leaks-into-real-world-fraud</loc>
		<lastmod>2026-04-22T11:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Billions-At-Risk-As-Workforce-Impersonation-Turns-Credential-Leaks-Into-Real-World-Fraud.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/ciso-qa-greg-crowley</loc>
		<lastmod>2026-04-22T11:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Greg-Crowley-eSentire-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-warns-phishing-campaigns-spoof-internal-emails</loc>
		<lastmod>2026-04-22T11:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Microsoft-Phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cmmc-begins-enforcement</loc>
		<lastmod>2026-04-22T11:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Department-Of-Defense-Policies-Begin-Enforcement-Years-After-Being-Announced.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/veeam-fixes-critical-flaw-in-backup-replication</loc>
		<lastmod>2026-04-22T11:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Veeam-Image-Template.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/forget-hackers-copy-paste-is-your-biggest-data-risk-research-finds</loc>
		<lastmod>2026-04-22T11:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CopyPaste-Has-Become-The-Top-Data-Leak-Vector-Says-LayerX.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/infostealer-fuels-cloud-file-sharing-breaches</loc>
		<lastmod>2026-04-22T11:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Infostealer-Malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/watchguard-firebox-vulnerability-under-active-attack-cisa-warns</loc>
		<lastmod>2026-04-22T11:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/chinese-cyber-spies-use-anthropic-ai-to-automate-espionage</loc>
		<lastmod>2026-04-22T11:55:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Chinese-Cyber-Spies-Use-Anthropic-AI-To-Automate-Espionage.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/attackers-exploit-fortiweb-flaws-to-deploy-sliver-c2</loc>
		<lastmod>2026-04-22T11:55:56+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Attackers-Exploit-FortiWeb-Flaws-To-Deploy-Sliver-C2-For-Long-Term-Access.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cybersecurity-sharing-law-revived-by-new-federal-funding-bill</loc>
		<lastmod>2026-04-22T11:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Cybersecurity-Sharing-Law-Revived-By-New-Federal-Funding-Bill.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-authentication-bypass-flaws-highlight-ongoing-identity-risks</loc>
		<lastmod>2026-04-22T11:56:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Critical-Authentication-Bypass-Flaws-Highlight-Ongoing-Identity-Risks-In-Enterprise-Platforms.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/lessons-from-women-in-cyber</loc>
		<lastmod>2026-04-22T11:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/THUMBNAIL-WIC-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/fortiweb-flaw-added-to-kev-catalog</loc>
		<lastmod>2026-04-22T11:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/logitech-confirmed-data-theft-after-oracle-zero-day-exploit</loc>
		<lastmod>2026-04-22T11:56:43+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Logitech-Confirmed-Data-Theft-After-Oracle-Zero-Day-Exploit.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/attackers-use-google-cloud-for-credible-phishing-emails</loc>
		<lastmod>2026-04-22T11:56:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/01/Attackers-Abuse-Google-Cloud-Automation-to-Deliver-Credible-Phishing-Emails-at-Scale.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/rces-vulnerability-copied-to-meta-microsoft-and-nvidia</loc>
		<lastmod>2026-04-22T11:57:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/RCEs-Vulnerability-Copied-To-Meta-Microsoft-and-Nvidia.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/attackers-abused-microsoft-entra-invitations-in-new-toad-phishing-scheme</loc>
		<lastmod>2026-04-22T11:57:11+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Attackers-Abused-Microsoft-Entra-Invitations-In-New-TOAD-Phishing-Scheme.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/ciso-qa-steve-cairns</loc>
		<lastmod>2026-04-22T11:57:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Steve-Clarke-Cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cloud-migrations-exposed-governance-gaps-pathlock-report-found</loc>
		<lastmod>2026-04-22T11:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Cloud-Migrations-Exposed-Governance-Gaps-Pathlock-Report-Found.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/top-10-enterprise-cybersecurity-challenges-in-2026</loc>
		<lastmod>2026-04-22T11:57:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/09/Top-10-Enterprise-Cybersecurity-Challenges-In-2025.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/obfuscated-javascript-malware-targets-windows-systems</loc>
		<lastmod>2026-04-22T11:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Heavily-Obfuscated-JavaScript-Malware-Expands-Into-Multi-Domain-Campaign-Targeting-Windows-Systems.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisos-believe-security-budgets-wont-cover-cyber-risks-in-2026</loc>
		<lastmod>2026-04-22T11:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Most-CISOs-Believe-Security-Budgets-Wont-Cover-New-Cyber-Risks-In-2026.001-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ciso-pay-increases-despite-tightening-security-budgets</loc>
		<lastmod>2026-04-22T11:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISO-Pay-Rises-As-Security-Budgets-Tighten.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/plushdaemon-used-newly-identified-edgestepper-implant</loc>
		<lastmod>2026-04-22T11:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/PlushDaemon-Used-Newly-Identified-EdgeStepper-Implant-To-Hijack-Software-Updates.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/russian-state-backed-hackers-breach-western-critical-infrastructure</loc>
		<lastmod>2026-04-22T11:58:40+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Russian-State-Backed-Hackers-Breach-Western-Critical-Infrastructure-Via-Device-Misconfigurations.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/vulnerability-risks-grow-as-average-patch-time-hits-four-weeks-study-finds</loc>
		<lastmod>2026-04-22T11:58:47+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Backlog-Grows-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/santa-stealer-malware-for-sale</loc>
		<lastmod>2026-04-22T11:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Naughty-Or-Nice-SantaStealer-Is-Production-Ready.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-7-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/research-reveals-major-flaws-in-cve-program</loc>
		<lastmod>2026-04-22T11:59:04+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Sonatype.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/more-than-half-of-ransomware-attacks-hit-during-holidays</loc>
		<lastmod>2026-04-22T11:59:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/More-Than-Half-of-Ransomware-Attacks-Hit-During-Holidays-New-Global-Report-Shows.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-geoserver-xxe-flaw-added-to-kev-catalog</loc>
		<lastmod>2026-04-22T11:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Cybersecurity-Sharing-Law-Revived-By-New-Federal-Funding-Bill.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/blackforce-phishing-kit-enables-real-time-mfa-bypass-researchers-warn</loc>
		<lastmod>2026-04-22T11:59:27+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/BlackForce-Phishing-Kit-Enables-Real-Time-MFA-Bypass-Researchers-Warn.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/global-campaigns-target-secure-messaging-apps</loc>
		<lastmod>2026-04-22T11:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Warned-of-Rising-Global-Campaigns-Targeting-Secure-Messaging-Apps.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/china-nexus-hackers-and-dprk-operators-race-to-weaponize-react2shell</loc>
		<lastmod>2026-04-22T11:59:34+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/China-Nexus-Hackers-And-DPRK-Operators-Race-To-Weaponize-React2Shell.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cyberattack-attempts-targeting-holidays-rise-620</loc>
		<lastmod>2026-04-22T11:59:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Cyberattack-Attempts-Targeting-Holidays-Rise-620.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/image-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ivanti-patches-critical-and-high-severity-epm-flaws</loc>
		<lastmod>2026-04-22T11:59:50+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Ivanti-Patches-Critical-And-High-Severity-EPM-Flaws.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/geminijack-shows-a-poisoned-workspace-can-hijack-enterprise-ai-searches</loc>
		<lastmod>2026-04-22T11:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/GeminiJack-Flaw-Shows-How-A-Single-Poisoned-Workspace-File-Could-Hijack-Enterprise-AI-Searches.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/crowdstrike-fires-insider-after-screenshots-sold-to-scattered-lapsus-hunters</loc>
		<lastmod>2026-04-22T12:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CrowdStrike-Fires-Insider-After-Screenshots-Sold-to-Scattered-Lapsus-Hunters.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/proofpoint-completes-hornetsecurity-acquisition</loc>
		<lastmod>2026-04-22T12:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Proofpoint-acquires-Hornetsecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/262-million-lost-to-account-takeover-fraud-in-2025</loc>
		<lastmod>2026-04-22T12:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/FBI-Reports-USD-262-Million-Lost-To-Account-Takeover-Fraud-In-2025.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/phishing-campaign-uses-nested-pdfs-to-steal-microsoft-365-credentials</loc>
		<lastmod>2026-04-22T12:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Phishing-Campaign-Uses-Nested-PDFs-And-Real-Time-MFA-Bypass-To-Steal-Microsoft-365-Credentials.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-teams-security-settings-can-be-overruled-by-guest-tenants</loc>
		<lastmod>2026-04-22T12:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Microsoft-Teams-Security-Settings-Can-Be-Overruled-By-Guest-Tenants.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/palo-alto-and-sonicwall-portals-hit-by-linked-credential-stuffing-campaign</loc>
		<lastmod>2026-04-22T12:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Palo-Alto-and-SonicWall-Portals-Hit-by-Linked-Credential-Stuffing-Campaign.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/global-ddos-attacks-hit-8-3-million-in-q3-2025</loc>
		<lastmod>2026-04-22T12:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Global-DDoS-Attacks-Hit-8.3-Million-in-Q3-2025-Network-Layer-Traffic-Surges.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-agents-the-new-attack-surface</loc>
		<lastmod>2026-04-22T12:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/AI-Agents-The-New-Attack-Surface.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/opentext-world-2025-reflections</loc>
		<lastmod>2026-04-22T12:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/OpenText-World-2025-Reflections-How-Can-Teams-Responsibly-Adopt-AI.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-plan-major-change-to-entra-id-sign-ins-to-stop-account-takeover-risks</loc>
		<lastmod>2026-04-22T12:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Attackers-Abused-Microsoft-Entra-Invitations-In-New-TOAD-Phishing-Scheme.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-react-and-next-js-rce-flaws-put-default-deployments-at-risk</loc>
		<lastmod>2026-04-22T12:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Cybercrime-Costs-Expected-To-Hit-USD-15.6-Trillion-By-2029.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/interview-scott-richards-opentext</loc>
		<lastmod>2026-04-22T12:01:33+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Scott-Richards-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/malicious-llms-put-advanced-cyber-tools-in-the-hands-of-inexperienced-hackers</loc>
		<lastmod>2026-04-22T12:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/04ec6c8d-8161-4a7f-92ef-4c47e6b42bdf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-adds-openplc-scadabr-xss-flaw-to-kev-catalog</loc>
		<lastmod>2026-04-22T12:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/openai-codex-cli-flaw-enabled-silent-rce-through-project-files</loc>
		<lastmod>2026-04-22T12:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/OpenAI-Codex-CLI-Flaw-Enabled-Silent-RCE-Through-Project-Files.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisa-unviels-new-platform-to-sreamline-collaboration</loc>
		<lastmod>2026-04-22T12:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/CISA-Adds-Gladinet-and-CWP-Flaws-to-KEV-Catalog-Amid-Active-Exploitation-Evidence.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/scattered-lapsus-hunters-linked-to-zendesk-phishing</loc>
		<lastmod>2026-04-22T12:02:12+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Scattered-Lapsus-Hunters-Linked-to-New-Wave-of-Zendesk-Themed-Phishing-Infrastructure.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/qa-conor-sherman</loc>
		<lastmod>2026-04-22T12:02:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/11/Conor-Sherman-CISO.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/phishing-campaign-targets-business-ad-accounts</loc>
		<lastmod>2026-04-22T12:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Sophisticated-Phishing-Campaign-Used-Calendly-Themed-Lures-To-Target-Business-Ad-Accounts.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cybercrime-costs-expected-to-hit-usd-15-6-trillion-by-2029</loc>
		<lastmod>2026-04-22T12:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Cybercrime-Costs-Expected-To-Hit-USD-15.6-Trillion-By-2029.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-teams-chat-with-anyone-misused-in-social-engineering-attack</loc>
		<lastmod>2026-04-22T12:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Microsoft-Teams-Chat-With-Anyone-Misused-In-Social-Engineering-Attack.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/boards-must-take-responsibility-to-improve-cyber-resilience</loc>
		<lastmod>2026-04-22T12:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/Boards-Must-Take-More-Responsibility-To-Improve-Cyber-Resilience-Industry-Leaders-Urge.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/12/img_2816_720.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/vercel-discloses-supply-chain-breach</loc>
		<lastmod>2026-04-22T12:03:44+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Vercelk.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/chaotic-eclipse-drops-redsun-exploit</loc>
		<lastmod>2026-04-22T12:09:08+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Chaotic-Eclipse-Drops-RedSun-Exploit.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/cisco-sd-wan-attack-surface-widens</loc>
		<lastmod>2026-04-22T12:09:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Cisco-SD-WAN-Attack-Surface-Widens-as-CISA-Flags-Three-More-Actively-Exploited-Flaws.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/openai-launches-gpt-5-4-cyber-model</loc>
		<lastmod>2026-04-22T12:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/OpenAI-Fires-Back-at-Anthropic-With-GPT-5.4-Cyber-a-Cybersecurity-AI-Only-Defenders-Can-Access.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-warns-storm-1175-is-exploiting-zero-days</loc>
		<lastmod>2026-04-22T12:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Microsoft-Warns-Storm-1175-Is-Exploiting-Zero-Days-to-Deploy-Medusa-Ransomware-Within-24-Hours.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/anthropic-launches-project-glasswing</loc>
		<lastmod>2026-04-22T12:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Anthropic-Launches-Project-Glasswing-With-Microsoft-Google-to-Test-Security-Focused-AI-Model.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/us-state-department-launches-bureau-of-emerging-threats</loc>
		<lastmod>2026-04-22T12:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/US-State-Department-Launches-Bureau-Of-Emerging-Threats-to-Address-AI-Cyber-and-Space-Risks.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-warns-of-ai-driven-device-code-phishing-campaign</loc>
		<lastmod>2026-04-22T12:16:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Microsoft-Warns-of-AI-Driven-Device-Code-Phishing-Campaign-Bypassing-MFA-Protections.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/risk-management/the-top-operational-risk-management-software</loc>
		<lastmod>2026-04-22T12:16:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-8-Operational-Risk-Management-Software.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/iran-hack-fbi-director</loc>
		<lastmod>2026-04-22T12:41:37+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/03/Iran-Published-the-FBI-Directors-Private-Emails.-Heres-Why.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/risk-management/top-it-vendor-risk-management-solutions</loc>
		<lastmod>2026-04-22T14:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/02/The-Top-8-IT-Vendor-Risk-Management-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/network-management/the-top-observability-tools</loc>
		<lastmod>2026-04-22T15:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-10-Observability-Tools.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/endpoint-security/the-top-on-premises-endpoint-security-solutions</loc>
		<lastmod>2026-04-22T15:17:07+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-On-Premises-Endpoint-Security-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-saas-backup-solutions</loc>
		<lastmod>2026-04-22T15:31:13+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/02/Top-SaaS-Backup-Solutions-min-min.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/network-security/the-top-soar-solutions</loc>
		<lastmod>2026-04-22T15:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2022/04/Top-10-SOAR-Solutions.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/hoxhunt-david-badanes-phishing-trends</loc>
		<lastmod>2026-04-22T15:52:56+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Hoxhunt-Podcast1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/image-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/network-security/the-top-web-application-firewalls</loc>
		<lastmod>2026-04-23T10:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/Top-11-Web-Application-Firewalls.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/mythos-claude-critics-not-convinced</loc>
		<lastmod>2026-04-23T12:45:30+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Claudes-Mythos-Model-Finds-271-Firefox-Vulnerabilities-But-Critics-Still-Arent-Convinced.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/industry-perspectives/ciso-qa-matthew-rosenquist</loc>
		<lastmod>2026-04-28T15:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Matthew-Rosenquist.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/web-security/top-web-content-filtering-solutions-for-business</loc>
		<lastmod>2026-04-27T13:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Web-Content-Filtering-Solutions-for-Business.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/user-auth/top-single-sign-on-solutions-for-business</loc>
		<lastmod>2026-04-27T13:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/01/10-Best-Single-Sign-On-Solutions-For-Business.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/risk-management/the-top-third-party-and-supplier-risk-management-software</loc>
		<lastmod>2026-04-27T13:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Third-Party-And-Supplier-Risk-Management-Software.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/endpoint-security/edr-market-overview</loc>
		<lastmod>2026-04-27T13:30:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/EDR-Market-Overview_-Key-Stats-And-Insights.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/data-management/the-top-managed-file-transfer-solutions</loc>
		<lastmod>2026-04-27T13:36:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/03/Top-12-Managed-File-Transfer-Solutions-.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/devsecops/the-top-application-security-posture-management-aspm-tools</loc>
		<lastmod>2026-04-27T13:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Application-Security-Posture-Management-ASPM-Tools.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/devsecops/the-top-application-security-open-source-tools</loc>
		<lastmod>2026-04-27T13:46:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/10/Best-Application-Security-Open-Source-Tools-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/compliance/the-top-policy-management-software-solutions</loc>
		<lastmod>2026-04-27T13:52:52+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Policy-Management-Software-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/business-operations/best-secure-collaboration-tools</loc>
		<lastmod>2026-04-27T14:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/02/Best-Cloud-Collaboration-Tools-With-Strong-Security-Controls.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-teams-phishing-gets-more-sophisticated</loc>
		<lastmod>2026-04-27T16:16:57+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Microsoft-Teams-Phishing-Gets-More-Sophisticated-as-Google-Tracks-New-UNC6692-Group.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/identity-and-access-management/top-alternatives-to-beyondtrust</loc>
		<lastmod>2026-04-28T08:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/09/Top-Alts-to-BeyondTrust.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/identity-and-access-management/top-alternatives-to-cyberark-pam</loc>
		<lastmod>2026-04-28T08:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/09/Top-Alternatives-To-CyberArk-PAM.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/ai-era-threats-spread-beyond-email</loc>
		<lastmod>2026-04-28T09:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/AI-Era-Threats-Spread-Beyond-Email-Into-SaaS-Collaboration-Apps-and-AI-Assistants.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/endpoint-security/the-top-managed-detection-and-response-mdr-solutions</loc>
		<lastmod>2026-04-28T10:16:40+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/01/Top-10-Managed-Detection-And-Response-MDR-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/compliance/top-compliance-training-solutions</loc>
		<lastmod>2026-04-28T11:07:53+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Top-10-Compliance-Training-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/devsecops/the-top-security-testing-tools</loc>
		<lastmod>2026-04-28T11:28:35+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/01/Top-10-Security-Testing-Tools.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-backup-solutions-for-microsoft-entra-id</loc>
		<lastmod>2026-04-28T13:50:58+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/06/Top-8-Backup-Solutions-for-Microsoft-Entra-ID.001-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-vm-backup-solutions</loc>
		<lastmod>2026-04-28T14:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/03/Top-11-VM-Backup-Solutions.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/security-operations/top-digital-risk-protection-solutions</loc>
		<lastmod>2026-04-28T15:53:21+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/01/The-Top-10-Digital-Risk-Protection-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/email-security/top-email-security-solutions-for-office-365</loc>
		<lastmod>2026-04-29T08:30:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/03/Top-12-Email-Security-Solutions-For-Microsoft-365.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/wiz-discloses-github-flaw-cve-2026-3854</loc>
		<lastmod>2026-04-29T11:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Wiz-Discloses-GitHub-Flaw-CVE-2026-3854-One-Git-Push-Enabled-RCE-Across-Shared-Nodes.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-patches-entra-id-agent-role-flaw</loc>
		<lastmod>2026-04-29T11:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Microsoft-Patches-Entra-ID-Agent-Role-Flaw-That-Allowed-Service-Principal-Takeover.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/email-security/top-mimecast-alternatives-for-email-security</loc>
		<lastmod>2026-04-29T13:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/The-Top-9-Mimecast-Alternatives-For-Email-Security-.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/fortinet-warns-vulnerabilites-exploited-under-2-days</loc>
		<lastmod>2026-04-30T13:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Patch-Window-Collapses-As-Attackers-Exploit-New-Vulnerabilities-In-Under-48-Hours.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/email-security/the-best-email-security-solutions-for-msps</loc>
		<lastmod>2026-04-30T12:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-12-Email-Security-Solutions-For-MSPs.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/security-awareness-training/the-top-phishing-awareness-training-and-simulation-solutions</loc>
		<lastmod>2026-04-30T15:52:10+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/01/Top-10-Phishing-Awareness-Training-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/cloud-infrastructure/the-top-cloud-detection-and-response-cdr-software-solutions</loc>
		<lastmod>2026-05-01T00:28:52+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/10/Top-12-Cloud-Detection-and-Response-CDR-Software-Solutions.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/it-management/the-top-patch-management-software-for-business</loc>
		<lastmod>2026-05-01T00:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-10-Patch-Management-Software-For-Business.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/backup-and-recovery-google-workspace</loc>
		<lastmod>2026-05-01T07:43:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/02/Top-11-Backup-And-Recovery-Solutions-For-Google-Workspace.001-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/it-management/the-top-rmm-solutions-for-msps</loc>
		<lastmod>2026-05-01T15:22:26+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/03/Top-RMM-Solutions-For-MSPs-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/identity-and-access-management/the-top-privileged-access-management-pam-solutions</loc>
		<lastmod>2026-05-01T15:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/10/Top-11-Privileged-Access-Management-PAM-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/cloud-infrastructure/the-top-cloud-security-monitoring-and-analytics-software</loc>
		<lastmod>2026-05-01T16:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-11-Cloud-Security-Monitoring-And-Analytics-Software.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/cloud-infrastructure/the-top-cloud-file-security-software</loc>
		<lastmod>2026-05-01T19:45:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/10/Top-10-Cloud-File-Security-Software.001-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/devsecops/top-secure-code-review-software</loc>
		<lastmod>2026-05-01T20:18:12+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Top-Secure-Code-Review-Software-For-Development-Teams.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/devsecops/the-top-static-code-analysis-solutions</loc>
		<lastmod>2026-05-02T10:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Static-Code-Analysis-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/crashplan-review</loc>
		<lastmod>2026-05-05T09:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/Crashplan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/CrashPlan-Dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/CrashPlan-Backup-Reports.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/05/CrashPlan-Policy-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/critical-cpanel-web-hosting-vulnerability-server-compromise</loc>
		<lastmod>2026-05-05T10:08:39+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/cPanel-Flaw.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/microsoft-flags-code-of-conduct-phishing-campaign</loc>
		<lastmod>2026-05-05T11:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/Microsoft-Flags-Code-of-Conduct-Phishing-Campaign-Targeting-35000-Users-Across-26-Countries.001.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/trellix-confirms-source-code-repository-breach</loc>
		<lastmod>2026-05-05T12:12:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/Trellix-Confirms-Source-Code-Repository-Breach.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/identity-and-access-management/the-top-age-verification-solutions</loc>
		<lastmod>2026-05-05T16:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Age-Verification-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/ai-solutions/the-top-genai-security-solutions</loc>
		<lastmod>2026-05-05T17:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/08/Top-10-GenAI-Security-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/archiving-software/the-top-email-archiving-solutions-for-microsoft-365</loc>
		<lastmod>2026-05-05T17:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Email-Archiving-Solutions-For-Microsoft-365.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/archiving-software/the-top-email-archiving-solutions-for-businesses</loc>
		<lastmod>2026-05-05T17:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Email-Archiving-Solutions-For-Business.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-active-directory-recovery-tools</loc>
		<lastmod>2026-05-05T17:26:32+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Active-Directory-Recovery-Tools.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-alternatives-to-veeam-backup-and-recovery-for-microsoft-365</loc>
		<lastmod>2026-05-05T17:28:30+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Alternatives-To-Veeam-Backup-And-Recovery-For-Microsoft-365.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-backup-solutions-for-microsoft-onedrive-business</loc>
		<lastmod>2026-05-05T17:31:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/03/Top-Backup-For-Microsoft-OneDrive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-backup-for-microsoft-sharepoint-online</loc>
		<lastmod>2026-05-05T17:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/03/Top-7-Backup-For-Microsoft-SharePoint-Online.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-business-continuity-and-disaster-recovery-solutions</loc>
		<lastmod>2026-05-05T17:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/01/Best-Business-Continuity-And-Disaster-Recovery-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-business-continuity-and-alerting-solutions</loc>
		<lastmod>2026-05-05T17:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/10/Top-7-Business-Continuity-And-Alerting-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-cloud-backup-solutions-for-microsoft-dynamics-365</loc>
		<lastmod>2026-05-05T17:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/03/Best-Cloud-Backup-Solutions-For-Microsoft-Dynamics-365.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-data-protection-as-a-service-solutions</loc>
		<lastmod>2026-05-05T17:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Data-Protection-as-a-Service-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-disaster-recovery-dr-software-solutions</loc>
		<lastmod>2026-05-05T17:51:01+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/03/The-Top-10-Disaster-Recovery-DR-Software-Solutions.001-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-endpoint-backup-solutions</loc>
		<lastmod>2026-05-05T17:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Endpoint-Backup-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/email-security/the-top-cloud-email-security-solutions</loc>
		<lastmod>2026-05-06T08:49:44+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2023/05/Top-10-Integrated-Cloud-Email-Security-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/ai-security/the-best-soc-automation-platforms</loc>
		<lastmod>2026-05-06T09:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/The-Best-SOC-Automation-Platforms.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/news/palo-alto-firewall-zero-day-under-active-attack</loc>
		<lastmod>2026-05-06T10:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/05/Palo-Alto-Firewall-Zero-Day-Under-Active-Attack-With-No-Fix-Available-Until-May-13.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-backup-and-recovery-solutions-for-microsoft-office-365</loc>
		<lastmod>2026-05-06T11:03:20+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Microsoft-365-Office-365-Backup-And-Recovery-Solutions-In-2026.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/identity-and-access-management/6-reasons-you-need-multi-factor-authentication-mfa</loc>
		<lastmod>2026-05-06T11:15:48+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2020/10/c4a70c2224cfc8314f81ed7aa1cbe7f8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/ai-security/a-war-of-algorithms-how-artificial-intelligence-is-shaping-the-future-of-cybersecurity</loc>
		<lastmod>2026-05-06T11:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2021/10/Darktrace.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/compliance/building-a-long-term-email-archiving-strategy-for-compliance</loc>
		<lastmod>2026-05-06T11:15:52+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/08/Email-Archiving.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/application-security/api-gateways-buyers-guide</loc>
		<lastmod>2026-05-06T11:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2024/06/API-Gateways-Buyers-Guide-2026.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-public-cloud-backup-solutions</loc>
		<lastmod>2026-05-06T11:23:36+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Public-Cloud-Backup-Solutions.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/the-top-server-backup-software</loc>
		<lastmod>2026-05-06T11:24:11+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2026/04/Best-Server-Backup-Software.001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://expertinsights.com/backup-and-recovery/top-salesforce-backup-and-recovery-solutions</loc>
		<lastmod>2026-05-06T11:25:31+00:00</lastmod>
		<image:image>
			<image:loc>https://expertinsights.com/wp-content/uploads/2025/02/The-Top-10-Salesforce-Backup-And-Recovery-Solutions.001-2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->