<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://iototsecnews.jp/2026/03/30/critical-grafana-flaws-allow-attackers-to-achieve-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/grafana.png</image:loc><image:title>Grafana</image:title></image:image><lastmod>2026-04-03T01:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/29/hackers-probe-citrix-netscaler-instances-ahead-of-likely-cve-2026-3055-exploitation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/citrix2-1.png</image:loc><image:title>Citrix2</image:title></image:image><lastmod>2026-04-03T01:18:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/cybersecurity-companies-stocks-fall-as-anthropic-tests-powerful-new-model/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/anthropic-2.png</image:loc><image:title>Anthropic</image:title></image:image><lastmod>2026-04-03T01:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/cisa-warns-of-f5-big-ip-vulnerability-actively-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-11.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-04-03T01:18:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/malicious-browser-extensions-hijack-users-ai-chats-in-new-prompt-poaching-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig2-3.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-04-03T01:18:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/open-vsx-scanner-vulnerability-lets-malicious-extensions-go-live/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/open-vsx-2.png</image:loc><image:title>Open VSX</image:title></image:image><lastmod>2026-04-03T01:18:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/european-commission-confirms-cyberattack-following-aws-account-hack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws-4.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-04-03T01:18:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/28/iran-linked-handala-hackers-breach-fbi-chief-kash-patels-gmail/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/iran-4.png</image:loc><image:title>Iran</image:title></image:image><lastmod>2026-04-03T01:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/new-windows-error-reporting-vulnerability-lets-attackers-escalate-to-gain-system-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-6.png</image:loc><image:title>Windows</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-5.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-04-02T01:12:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/security-researchers-sound-the-alarm-on-vulnerabilities-in-ai-generated-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-22.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-04-02T01:07:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/databricks-expands-into-cybersecurity-with-ai-driven-lakewatch-platform/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/databricks-1.png</image:loc><image:title>Databricks</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/databricks.png</image:loc><image:title>Databricks</image:title></image:image><lastmod>2026-04-02T01:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/bind-9-security-flaws-allow-attackers-to-bypass-security-controls-and-crash-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/bind-9.png</image:loc><image:title>BIND 9</image:title></image:image><lastmod>2026-04-02T01:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/cisa-adds-critical-aquasecurity-trivy-scanner-vulnerability-to-kev-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-10.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-04-02T01:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/isc-issues-critical-warning-over-kea-dhcp-vulnerability-that-could-remotely-crash-services/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/kea-dhcp.png</image:loc><image:title>Kea DHCP</image:title></image:image><lastmod>2026-04-02T01:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/27/claude-chrome-extension-0-click-vulnerability-enables-silent-prompt-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/claude-3.png</image:loc><image:title>Claude</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-6.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-04-02T01:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/cisco-secure-firewall-vulnerability-allows-remote-code-execution-as-root-user/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-9.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-04-02T01:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/idrive-for-windows-vulnerability-allows-attackers-to-escalate-privileges-and-gain-unauthorized-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/idrive-1.png</image:loc><image:title>IDrive</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/idrive.png</image:loc><image:title>IDrive</image:title></image:image><lastmod>2026-04-02T01:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/cisa-warns-of-langflow-code-injection-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-9.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-04-02T01:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/critical-nvidia-vulnerabilities-risk-remote-code-execution-and-denial-of-service-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/nvidia.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2026-04-02T01:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/critical-ivanti-epmm-vulnerabilities-expose-systems-to-arbitrary-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ivanti-efbc92-1.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-04-02T01:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/claude-vulnerabilities-allow-data-exfiltration-and-user-redirection-to-malicious-sites/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/claude-2.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-04-01T10:01:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/chrome-gemini-vulnerability-lets-attackers-access-victims-camera-and-microphone-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/google-gemini-1.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-04-01T09:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/hackers-leveraged-cyberstrikeai-tool-to-breach-fortinet-fortigate-devices/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-04-01T09:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/langflow-csv-agent-flaw-could-let-attackers-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/langflow.png</image:loc><image:title>Langflow</image:title></image:image><lastmod>2026-04-01T09:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/26/synology-diskstation-manager-vulnerability-puts-users-at-risk-of-remote-command-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/synology.png</image:loc><image:title>Synology</image:title></image:image><lastmod>2026-04-01T01:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/ai-speeds-attacks-but-identity-remains-cybersecuritys-weakest-link/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-21.png</image:loc><image:title>FIG</image:title></image:image><lastmod>2026-04-01T01:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/fcc-targets-foreign-router-imports-amid-rising-cybersecurity-concerns/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fcc.png</image:loc><image:title>FCC</image:title></image:image><lastmod>2026-04-01T01:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/training-an-ai-agent-to-attack-llm-applications-like-a-real-adversary/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-20.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-04-01T01:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/polyshell-attacks-target-56-of-all-vulnerable-magento-stores/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/magento-2.png</image:loc><image:title>Magento</image:title></image:image><lastmod>2026-04-01T01:33:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/mozilla-releases-firefox-149-0-with-free-builtin-vpn-offering-50-gb-monthly-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/firefox.png</image:loc><image:title>Firefox</image:title></image:image><lastmod>2026-04-01T01:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/goharbor-issues-urgent-patch-for-harbor-flaw-allowing-full-registry-compromise/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/goharbor.png</image:loc><image:title>GoHarbor</image:title></image:image><lastmod>2026-04-01T01:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/f5-nginx-plus-opensource-flaw-lets-attackers-execute-code-via-mp4-file/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/nginx-1.png</image:loc><image:title>NGINX</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/f5-nginx.png</image:loc><image:title>F5 NGINX</image:title></image:image><lastmod>2026-04-01T01:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/rsa-conference-uk-ncsc-head-urges-industry-to-develop-vibe-coding-safeguards/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-19.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-31T01:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/25/node-js-patches-multiple-vulnerabilities-that-enable-dos-attacks-and-process-crashes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/node.js_.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-03-31T01:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/multiple-vulnerabilities-in-tp-link-devices-enable-arbitrary-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/tp-link.png</image:loc><image:title>TP-Link</image:title></image:image><lastmod>2026-03-31T01:08:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/nist-releases-quick-start-guide-on-cybersecurity-risk-and-workforce-management/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/nist.png</image:loc><image:title>NIST</image:title></image:image><lastmod>2026-03-31T01:08:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/dell-wyse-management-flaws-could-lead-to-full-system-compromise/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/dell.png</image:loc><image:title>Dell</image:title></image:image><lastmod>2026-03-31T01:08:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/chrome-security-update-fixes-8-vulnerabilities-that-could-enable-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-5.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-31T01:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/google-unleashes-gemini-ai-to-scour-dark-web-for-corporate-threats/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/google-gemini-2.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-03-31T01:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/24/roundcube-webmail-security-updates-patches-multiple-critical-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/roundcube.png</image:loc><image:title>Roundcube</image:title></image:image><lastmod>2026-03-31T01:08:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/monthly/monthly-pickup2026-03/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-30-at-16.01.19.png</image:loc><image:title>Screenshot 2026-03-30 at 16.01.19</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.46.25.png</image:loc><image:title>Screenshot 2026-03-28 at 19.46.25</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.45.38.png</image:loc><image:title>Screenshot 2026-03-28 at 19.45.38</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.45.19.png</image:loc><image:title>Screenshot 2026-03-28 at 19.45.19</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.44.25.png</image:loc><image:title>Screenshot 2026-03-28 at 19.44.25</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.33.33.png</image:loc><image:title>Screenshot 2026-03-28 at 19.33.33</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screenshot-2026-03-28-at-19.30.55.png</image:loc><image:title>Screenshot 2026-03-28 at 19.30.55</image:title></image:image><lastmod>2026-03-30T08:39:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/2026/03/23/datadog-launches-ai-security-agent-to-combat-machine-speed-cyberattacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/datadog.png</image:loc><image:title>Datadog</image:title></image:image><lastmod>2026-03-30T01:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/wiz-launches-ai-app-to-tackle-new-anatomy-of-cyber-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/wiz.png</image:loc><image:title>Wiz</image:title></image:image><lastmod>2026-03-30T01:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/cisco-extends-security-reach-to-ai-agents/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-8.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-30T01:08:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/crowdstrike-redefines-cybersecurity-architecture-for-autonomous-ai/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/crowdstrike-1.png</image:loc><image:title>CrowdStrike</image:title></image:image><lastmod>2026-03-30T01:08:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/hackers-exploit-quest-kace-sma-flaw-to-harvest-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/quest-kace.png</image:loc><image:title>Quest KACE</image:title></image:image><lastmod>2026-03-30T01:08:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/critical-qnap-qvr-pro-vulnerability-let-remote-attackers-gain-access-to-the-system/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/qnap.png</image:loc><image:title>QNAP</image:title></image:image><lastmod>2026-03-30T01:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/critical-netscaler-adc-and-gateway-vulnerabilities-enable-remote-attacks-on-affected-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/citrix2.png</image:loc><image:title>Citrix2</image:title></image:image><lastmod>2026-03-30T01:08:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/23/511000-end-of-life-iis-instances-found-online-raising-security-risks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-iis.png</image:loc><image:title>Microsoft IIS</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x-3.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-03-30T01:08:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/cisa-kev/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-3.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/01/vuldb-chart.png</image:loc><image:title>Vuldb Chart</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/01/2024-cve.png</image:loc><image:title>2024 CVE</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2024/02/vul-chart.png</image:loc><image:title>vul-chart</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2023/01/cisa-kev-2.png</image:loc><image:title>cisa-kev-2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2023/01/vuldb2022.png</image:loc><image:title>vuldb2022</image:title></image:image><lastmod>2026-03-30T00:46:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/monthly/</loc><lastmod>2026-03-28T10:22:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/2026/03/23/microsoft-emergency-out-of-band-update-for-windows-11-to-fix-microsoft-account-sign-in-failure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-4.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-03-27T01:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/22/u-s-cisa-adds-apple-laravel-livewire-and-craft-cms-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-8.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-27T01:19:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/21/hackers-compromise-trivy-scanner-to-inject-malicious-scripts-and-steal-login-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/trivy-scanner.png</image:loc><image:title>Trivy Scanner</image:title></image:image><lastmod>2026-03-27T01:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/21/oracle-fixes-high-severity-rce-vulnerability-affecting-identity-and-web-services-platforms/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/oracle-1.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2026-03-27T01:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/21/hackers-compromised-7500-magento-websites-to-upload-hidden-malicious-files-and-steal-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/magento.png</image:loc><image:title>Magento</image:title></image:image><lastmod>2026-03-27T01:18:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/20/chrome-security-update-fixes-26-vulnerabilities-enabling-remote-malicious-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-4.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-27T01:18:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/20/bamboo-data-center-and-server-vulnerability-let-attackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/bamboo-data-center.png</image:loc><image:title>Bamboo Data Center</image:title></image:image><lastmod>2026-03-27T01:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/20/new-critical-jenkins-vulnerabilities-put-ci-cd-servers-at-risk-of-rce-exploits/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/jenkins.png</image:loc><image:title>Jenkins</image:title></image:image><lastmod>2026-03-27T01:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/cisa-calls-on-organizations-to-strengthen-microsoft-intune-security-after-stryker-incident/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-18.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-26T01:11:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/critical-ubiquiti-unifi-vulnerabilities-allow-attackers-to-seize-full-control-of-underlying-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ubiquiti.png</image:loc><image:title>Ubiquiti</image:title></image:image><lastmod>2026-03-26T01:11:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/cisa-adds-exploited-zimbra-collaboration-suite-flaw-to-warning-list/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-7.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-26T01:11:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/iran-linked-botnet-exposed-after-open-directory-leak-reveals-15-node-relay-network/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/iran-3.png</image:loc><image:title>Iran</image:title></image:image><lastmod>2026-03-26T01:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/open-vsx-extension-delivers-rat-and-stealer-via-github-downloader/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/open-vsx-1.png</image:loc><image:title>Open VSX</image:title></image:image><lastmod>2026-03-26T01:11:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/19/cisa-warns-of-microsoft-sharepoint-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-6.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-26T01:11:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/cisco-firewall-0-day-vulnerability-exploited-in-the-wild-to-deploy-interlock-ransomware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-7.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-26T01:11:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/ubuntu-desktop-vulnerability-lets-attackers-escalate-privileges-to-full-root-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ubuntu.png</image:loc><image:title>Ubuntu</image:title></image:image><lastmod>2026-03-26T01:11:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/critical-forticlient-sql-injection-vulnerability-enables-arbitrary-database-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fortinet-4.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-03-26T01:11:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/cyberattacks-spike-245-in-the-two-weeks-after-the-start-of-war-with-iran/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/iran-2.png</image:loc><image:title>Iran</image:title></image:image><lastmod>2026-03-26T01:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/critical-telnetd-vulnerability-enables-remote-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/gnu.png</image:loc><image:title>GNU</image:title></image:image><lastmod>2026-03-26T01:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/menlo-security-adds-platform-to-secure-ai-agents/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/menlo-security.png</image:loc><image:title>Menlo Security</image:title></image:image><lastmod>2026-03-25T01:08:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/regpwn-windows-registry-vulnerability-enables-full-system-access-to-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-3.png</image:loc><image:title>Windows</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-2.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-03-25T01:08:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/apple-webkit-security-flaw-exposes-ios-and-macos-users-to-content-based-bypass-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/apple.png</image:loc><image:title>Apple</image:title></image:image><lastmod>2026-03-25T01:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/screenconnect-vulnerability-allows-hackers-to-extract-unique-machine-keys-and-hijack-sessions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/connectwise-screenconnect.png</image:loc><image:title>ConnectWise ScreenConnect</image:title></image:image><lastmod>2026-03-25T01:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/18/ai-issues-will-drive-half-of-incident-response-efforts-by-2028-says-gartner/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-17.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-25T01:08:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/glassworm-malware-infects-popular-react-native-npm-packages/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/react.png</image:loc><image:title>React</image:title></image:image><lastmod>2026-03-25T01:08:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/google-warns-ransomware-actors-are-shifting-tactics-as-profits-fall-and-data-theft-rises/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-16.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-25T01:08:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/kubernetes-csi-driver-for-nfs-vulnerability-lets-attackers-delete-or-modify-nfs-server-directories/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/kubernetes.png</image:loc><image:title>Kubernetes</image:title></image:image><lastmod>2026-03-25T01:08:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/researchers-find-data-leak-risk-in-aws-bedrock-ai-code-interpreter/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-14.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-13.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws-3.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-03-24T01:35:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/cisa-alerts-users-to-exploited-chrome-0-day-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-24T01:35:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/researchers-decrypt-and-exploit-encrypted-palo-alto-cortex-xdr-bioc-rules/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/palo-alto-networks-1.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2026-03-24T01:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/angular-xss-vulnerability-threatens-thousands-of-web-applications/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/angular-2.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2026-03-24T01:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/identity-drift-the-hidden-risk-in-hybrid-active-directory-environments/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-active-directory.png</image:loc><image:title>Microsoft Active Directory</image:title></image:image><lastmod>2026-03-24T01:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/17/stryker-confirms-destructive-wiper-attack-tens-of-thousands-of-devices-wiped/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/iran-1.png</image:loc><image:title>Iran</image:title></image:image><lastmod>2026-03-24T01:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/crowdstrike-extends-agentic-ai-alliance-with-nvidia/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/crowdstrike.png</image:loc><image:title>CrowdStrike</image:title></image:image><lastmod>2026-03-24T01:35:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/oracle-ebs-hack-only-4-corporate-giants-still-silent-on-potential-impact/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/oracle.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2026-03-23T01:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/u-s-cisa-adds-a-flaw-in-wing-ftp-server-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-4.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-23T01:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/betterleaks-launches-as-open-source-tool-for-scanning-files-directories-and-git-repositories/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/betterleaks.png</image:loc><image:title>Betterleaks</image:title></image:image><lastmod>2026-03-23T01:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/fake-filezilla-downloads-lead-to-rat-infections-through-stealthy-multi-stage-loader/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/filezilla.png</image:loc><image:title>FileZilla</image:title></image:image><lastmod>2026-03-23T01:09:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/openclaw-ai-agents-vulnerable-to-indirect-prompt-injection-causing-data-leaks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/openclaw.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-03-23T01:09:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/ibm-discovers-slopoly-ai-generated-malware-linked-to-hive0163-ransomware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-15.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ibm.png</image:loc><image:title>IBM</image:title></image:image><lastmod>2026-03-23T01:09:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/16/google-looker-studio-vulnerabilities-allow-attackers-to-exfiltrate-data-from-google-services/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/google-looker-studio.png</image:loc><image:title>Google Looker Studio</image:title></image:image><lastmod>2026-03-23T01:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/threat-actors-exploit-openvsx-aqua-trivy-with-malicious-ai-prompts-to-hijack-local-coding-tools/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/trivy-scanner-1.png</image:loc><image:title>Trivy Scanner</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/open-vsx-copy.png</image:loc><image:title>Open VSX copy</image:title></image:image><lastmod>2026-03-23T00:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/google-warns-of-aidriven-adaptive-malware-rewriting-its-own-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-11.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x-2.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-03-22T00:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/15/microsoft-releases-out-of-band-patch-for-critical-rras-rce-vulnerabilities-in-windows-11/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-03-20T06:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/15/ai-agents-present-insider-threat-as-rogue-behaviors-bypass-cyber-defenses-study/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-12.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-20T06:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/15/fortigate-firewalls-exploited-in-wave-of-attacks-to-breach-networks-and-steal-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fortinet-3.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-03-20T06:18:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/14/critical-langsmith-account-takeover-vulnerability-puts-users-at-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/langsmith.png</image:loc><image:title>LangSmith</image:title></image:image><lastmod>2026-03-20T06:18:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/14/glassworm-spreads-via-72-malicious-open-vsx-extensions-hidden-in-transitive-dependencies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/open-vsx.png</image:loc><image:title>Open VSX</image:title></image:image><lastmod>2026-03-20T06:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/14/metasploit-pro-5-0-0-released-with-powerful-new-modules-and-critical-enhancements/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/metasploit-1.png</image:loc><image:title>Metasploit</image:title></image:image><lastmod>2026-03-20T06:18:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/13/critical-zero-click-flaw-in-n8n-allows-full-server-compromise/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/n8n.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-03-20T06:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/13/veeam-patches-multiple-critical-rce-vulnerabilities-on-backup-server/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/veeam.png</image:loc><image:title>Veeam</image:title></image:image><lastmod>2026-03-19T01:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/two-newly-discovered-chrome-zero-days-exploited-in-the-wild-to-run-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-3.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-19T01:38:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/83-of-cloud-breaches-start-with-identity-ai-agents-are-about-to-make-it-worse/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig2-2.png</image:loc><image:title>FIG2</image:title></image:image><lastmod>2026-03-19T01:38:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/microsoft-copilot-email-and-teams-summarization-vulnerability-enables-phishing-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-copilot.png</image:loc><image:title>Microsoft Copilot</image:title></image:image><lastmod>2026-03-19T01:38:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/gitlab-security-update-patch-for-xss-and-api-dos-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/gitlab.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2026-03-19T01:38:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/palo-alto-cortex-xdr-broker-vulnerability-exposes-systems-to-sensitive-information-theft-and-modification/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/palo-alto-networks.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2026-03-19T01:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/cisco-ios-xr-software-vulnerability-allow-attacker-to-execute-commands-as-root/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-6.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-19T01:38:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/splunk-rce-vulnerability-exposes-systems-to-arbitrary-shell-command-execution-by-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/splunk.png</image:loc><image:title>Splunk</image:title></image:image><lastmod>2026-03-19T01:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/solarwinds-web-help-desk-deserialization-vulnerability-enables-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/solarwinds.png</image:loc><image:title>SolarWinds</image:title></image:image><lastmod>2026-03-19T01:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/12/chrome-security-update-patch-for-29-vulnerabilities-that-allow-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-19T01:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/critical-vulnerability-in-microsoft-office-allows-malicious-code-to-run-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-office.png</image:loc><image:title>Microsoft Office</image:title></image:image><lastmod>2026-03-19T01:38:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/microsoft-active-directory-domain-services-vulnerability-let-attackers-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-ad.webp</image:loc><image:title>Microsoft AD</image:title></image:image><lastmod>2026-03-19T01:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/gogs-flaw-could-let-attackers-quietly-overwrite-large-file-storage-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/gogs.png</image:loc><image:title>Gogs</image:title></image:image><lastmod>2026-03-18T01:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/unc6426-hackers-exploit-npm-package-to-gain-aws-admin-access-in-72-hours/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws-2.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-03-18T01:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/microsoft-net-0-day-vulnerability-enables-denial-of-service-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-net.png</image:loc><image:title>Microsoft NET</image:title></image:image><lastmod>2026-03-18T01:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/11/microsoft-sql-server-zero-day-vulnerability-allows-attackers-to-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-sql-server.png</image:loc><image:title>Microsoft SQL Server</image:title></image:image><lastmod>2026-03-18T01:24:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/fortinet-fortimanager-fgtupdates-vulnerability-allows-attackers-to-execute-malicious-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fortinet-2.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-03-18T01:24:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/ivanti-desktop-and-server-management-vulnerability-allows-attackers-to-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-03-18T01:24:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/05/aws-middle-east-uae-region-hit-by-drone-strikes-109-services-disrupted/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws-disrupted.png</image:loc><image:title>AWS Disrupted</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws.png</image:loc><image:title>AWS</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-3.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-17T23:12:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/28/iran-s-internet-near-totally-blacked-out-amid-us-israeli-strikes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/iran.png</image:loc><image:title>Iran</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x4.png</image:loc><image:title>x4</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x3.png</image:loc><image:title>x3</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x2.png</image:loc><image:title>x2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x1.png</image:loc><image:title>x1</image:title></image:image><lastmod>2026-03-17T23:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/epic-fury-roaring-lion-sparks-escalating-cyber-conflict-as-iran-goes-offline-hacktivists-step-up-retaliation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/iran.png</image:loc><image:title>Iran</image:title></image:image><lastmod>2026-03-17T23:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/07/14/wing-ftp-server-vulnerability-actively-exploited-2000-servers-exposed-online/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/07/wing-ftp-2.png</image:loc><image:title>Wing FTP</image:title></image:image><lastmod>2026-03-17T19:24:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-exploited/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-3.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-17T01:06:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/sap-security-update-patch-for-multiple-vulnerabilities-that-enable-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/sap.png</image:loc><image:title>SAP</image:title></image:image><lastmod>2026-03-17T01:04:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/security-risk-advisors-releases-the-purple-perspective-2026-report/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-10.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-17T01:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/ericsson-us-confirms-breach-after-third-party-provider-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ericsson.png</image:loc><image:title>Ericsson</image:title></image:image><lastmod>2026-03-17T01:04:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/microsoft-march-2026-patch-tuesday-fixes-2-zero-days-79-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-1.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2026-03-17T01:04:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/anthropic-sued-the-u-s-government-for-labelling-claude-as-supply-chain-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/anthropic-1.png</image:loc><image:title>Anthropic</image:title></image:image><lastmod>2026-03-17T01:04:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/cloudflare-pingora-flaws-enable-request-smuggling-and-cache-poisoning-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cloudflare.png</image:loc><image:title>cloudflare</image:title></image:image><lastmod>2026-03-17T01:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/10/fortinet-security-update-patch-for-multiple-vulnerabilities-that-enable-malicious-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fortinet-1.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-03-16T01:14:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/vaultwarden-vulnerabilities-enable-privilege-escalation-and-data-exposure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/vaultwarden.png</image:loc><image:title>Vaultwarden</image:title></image:image><lastmod>2026-03-16T01:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/apache-zookeeper-flaw-exposes-sensitive-data-to-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/apache-zookeeper.png</image:loc><image:title>Apache ZooKeeper</image:title></image:image><lastmod>2026-03-16T01:14:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/microsoft-fake-ai-extensions-breached-chat-histories-in-20000-enterprise-tenants/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/image-20.webp</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/image-19.webp</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/image-21.webp</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-9.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-16T01:14:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/cisa-warns-of-macos-and-ios-vulnerabilities-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-16T01:14:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/report-surfaces-higher-correlation-between-api-and-ai-security/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig2-1.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-03-16T01:14:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/transparent-tribes-vibeware-move-points-to-ai-made-malware-at-scale/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-8.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-16T01:14:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/09/critical-exiftool-flaw-lets-malicious-images-trigger-code-execution-on-macos/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/exiftool.png</image:loc><image:title>ExifTool</image:title></image:image><lastmod>2026-03-16T01:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/08/massive-github-malware-operation-spreads-boryptgrab-stealer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/github.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2026-03-13T01:16:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/08/hackers-allegedly-selling-exploit-for-windows-remote-desktop-services-0-day-flaw/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/rdp.png</image:loc><image:title>RDP</image:title></image:image><lastmod>2026-03-13T01:16:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/08/critical-nginx-ui-flaw-cve-2026-27944-exposes-server-backups/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/nginx.png</image:loc><image:title>NGINX</image:title></image:image><lastmod>2026-03-13T01:16:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/07/openais-codex-security-built-to-automate-vulnerability-discovery-and-remediation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/open-ai.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2026-03-13T01:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-ai-workforce-readiness-and-security/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-7.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-13T01:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/cisco-patches-48-firewall-vulnerabilities-with-two-cvss-10-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco-4.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-13T01:16:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/wordpress-membership-plugin-vulnerability-let-attackers-create-admin-accounts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/wordpress-2.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2026-03-13T01:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/avideo-platform-vulnerability-allows-hackers-to-hijack-streams-via-zero-click-command-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/avideo.png</image:loc><image:title>AVideo</image:title></image:image><lastmod>2026-03-13T01:16:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/05/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/freescout.png</image:loc><image:title>FreeScout</image:title></image:image><lastmod>2026-03-12T01:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/claude-ai-uncovers-22-firefox-vulnerabilities-in-two-weeks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/claude-1.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-12T01:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/aws-lc-flaw-exposes-amazon-users-to-attacks-by-bypassing-certificate-chain-validation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/aws-1.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-03-12T01:18:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/apache-activemq-allow-attackers-to-trigger-dos-attacks-with-malformed-packets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/apache-activemq.png</image:loc><image:title>Apache ActiveMQ</image:title></image:image><lastmod>2026-03-12T01:18:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/poc-exploit-released-cisco-sd-wan-0-day-vulnerability-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisco.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-12T01:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/06/zeroday-attacks-on-enterprise-software-reach-record-high-google-warns/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-6.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-5.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-4.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-12T01:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/05/google-releases-emergency-chrome-update-to-fix-10-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2-1.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-12T01:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/05/new-mongodb-vulnerability-allows-attackers-to-crash-servers-exposing-critical-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/mongodb.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-03-11T01:07:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/04/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/laravel.png</image:loc><image:title>Laravel</image:title></image:image><lastmod>2026-03-11T01:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/04/new-threat-report-ai-accelerates-high-velocity-cyber-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-11T01:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/04/u-s-cisa-adds-qualcomm-and-broadcom-vmware-aria-operations-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/cisa-kev2-1.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-11T01:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/04/ipvanish-vpn-for-macos-vulnerability-let-attackers-escalate-privilege-and-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/ipvanish.png</image:loc><image:title>IPVanish</image:title></image:image><lastmod>2026-03-11T01:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/fake-zoom-and-google-meet-pages-trick-users-into-installing-monitoring-tool/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/google-meet-zoom.png</image:loc><image:title>Google Meet Zoom</image:title></image:image><lastmod>2026-03-11T01:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-3.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/mcp-2.png</image:loc><image:title>MCP 2</image:title></image:image><lastmod>2026-03-11T01:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/chrome-unveils-plan-for-quantum-safe-https-certificates/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/chrome-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-11T01:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/ms-agent-vulnerability-exposes-ai-agents-to-remote-hijacking-granting-full-system-control/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/modelscope.png</image:loc><image:title>ModelScope</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/screen-shot-2026-03-04-at-11.55.36-am.png</image:loc><image:title>Screen Shot 2026-03-04 at 11.55.36 AM</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft-agent.png</image:loc><image:title>Microsoft Agent</image:title></image:image><lastmod>2026-03-10T01:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/zenity-details-perplexity-ai-browser-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/perplexity.png</image:loc><image:title>Perplexity</image:title></image:image><lastmod>2026-03-10T01:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/hpe-autopass-vulnerability-allows-remote-attackers-to-bypass-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/hpe.png</image:loc><image:title>HPE</image:title></image:image><lastmod>2026-03-10T01:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/new-stegabin-campaign-deploys-multi-stage-credential-stealer-via-26-malicious-npm-packages/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/npm.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2026-03-10T01:02:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/hackerbot-claw-bot-exploits-github-actions-ci-cd-flaw-to-attack-microsoft-and-datadog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/hackerbot-claw.png</image:loc><image:title>Hackerbot-Claw</image:title></image:image><lastmod>2026-03-10T01:02:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/03/angular-i18n-flaw-lets-hackers-execute-malicious-code-via-critical-xss-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/angular-1.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2026-03-10T01:02:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/mshtml-framework-0-day-exploited-by-apt28-hackers-before-feb-2026s-patch-tuesday-update/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2026-03-09T01:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/oneuptime-command-injection-vulnerability-poses-major-risk-of-full-system-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/oneuptime.png</image:loc><image:title>OneUptime</image:title></image:image><lastmod>2026-03-09T01:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/us-military-reportedly-used-claude-in-iran-strikes-despite-trumps-ban/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x-1.png</image:loc><image:title>x</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/claude.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-09T01:11:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/poc-exploit-released-for-windows-error-reporting-alpc-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-03-09T01:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/hackers-launch-massive-sonicwall-firewall-attack-using-4000-ip-addresses/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/sonicwall.png</image:loc><image:title>sonicwall</image:title></image:image><lastmod>2026-03-09T01:11:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/claude-opus-4-6-released-with-improved-cybersecurity-validating-500-high-severity-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/claude.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-06T02:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/21/anthropic-launches-claude-code-security-to-scan-codebases-for-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/anthropic.png</image:loc><image:title>Anthropic</image:title></image:image><lastmod>2026-03-06T02:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/kali-linux-introduces-claude-ai-for-automated-penetration-testing-using-model-context-protocol/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/kali-claude.png</image:loc><image:title>Kali Claude</image:title></image:image><lastmod>2026-03-06T02:46:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/02/angular-ssr-request-vulnerability-allows-attackers-to-trick-applications-into-sending-unauthorized-requests/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/angular.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2026-03-06T01:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/03/01/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/clawjacked.png</image:loc><image:title>ClawJacked</image:title></image:image><lastmod>2026-03-06T01:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/28/trump-bans-anthropic-ai-in-federal-agencies-pentagon-flags-claude-as-security-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/anthropic.png</image:loc><image:title>Anthropic</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/x.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-03-06T01:33:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/28/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/google-gemini.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-03-06T01:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/28/metasploit-adds-new-modules-targeting-linux-rc4-beyondtrust-and-registry-persistence/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/metasploit.png</image:loc><image:title>Metasploit</image:title></image:image><lastmod>2026-03-06T01:32:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/28/exploitable-vulnerabilities-present-in-87-of-organizations/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-2.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-06T01:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-intensify/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/03/fig-1.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-06T01:32:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/juniper-networks-ptx-vulnerability-enables-full-router-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/juniper.png</image:loc><image:title>Juniper</image:title></image:image><lastmod>2026-03-05T01:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/hackerone-adds-ai-agent-to-validate-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/hackerone-ai.png</image:loc><image:title>HackerONE AI</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-14.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-05T01:22:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/critical-trend-micro-apex-one-vulnerabilities-allow-remote-malicious-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/trend-micro.png</image:loc><image:title>Trend-Micro</image:title></image:image><lastmod>2026-03-05T01:22:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/stored-xss-vulnerability-in-rustfs-console-puts-s3-admin-credentials-at-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/rustfs.png</image:loc><image:title>RustFS</image:title></image:image><lastmod>2026-03-05T01:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/27/freebsd-vulnerability-allow-attackers-to-crash-the-entire-system/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/freebsd.png</image:loc><image:title>FreeBSD</image:title></image:image><lastmod>2026-03-05T01:22:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/wireshark-4-6-4-released-to-patch-multiple-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/wireshark.png</image:loc><image:title>Wireshark</image:title></image:image><lastmod>2026-03-05T01:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/27-years-old-telnet-vulnerability-enables-attackers-to-gain-root-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/gnu.png</image:loc><image:title>GNU</image:title></image:image><lastmod>2026-03-05T01:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/openai-confirms-chinese-hackers-used-chatgpt-in-cyberattack-campaign/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chatgpt-4.png</image:loc><image:title>ChatGPT 4</image:title></image:image><lastmod>2026-03-05T01:22:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/critical-servicenow-ai-platform-vulnerability-enables-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/servicenow.png</image:loc><image:title>servicenow</image:title></image:image><lastmod>2026-03-05T01:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/poc-released-for-windows-vulnerability-that-allows-attackers-to-cause-unrecoverable-bsod-crashes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/windows-2.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-03-05T01:22:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/hacker-jailbreaks-claude-ai-to-write-exploit-code-and-steal-government-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/claude-4.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-05T01:22:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/firefox-148-unveils-new-sanitizer-api-to-mitigate-xss-attacks-in-web-applications/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/firefox-2.png</image:loc><image:title>Firefox</image:title></image:image><lastmod>2026-03-05T01:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/26/claude-code-flaws-allow-remote-code-execution-and-api-key-exfiltration/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/claude-3.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-05T01:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/08/05/claude-ai-flaws-let-attackers-execute-unauthorized-commands-using-the-model-itself/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/08/claude.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-03-04T23:20:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/critical-cisco-sd-wan-0-day-vulnerability-exploited-since-2023-to-gain-root-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisco-2.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-03-04T01:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/solarwinds-critical-serv-u-vulnerabilities-enables-root-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/solarwinds-2.png</image:loc><image:title>SolarWinds</image:title></image:image><lastmod>2026-03-04T01:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/cisa-issues-alert-on-active-exploitation-of-filezen-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-10.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-04T01:39:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/critical-zyxel-router-flaw-exposed-devices-to-remote-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/zyxel-1.png</image:loc><image:title>Zyxel</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/zyxel.png</image:loc><image:title>Zyxel</image:title></image:image><lastmod>2026-03-04T01:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/survey-surfaces-increased-cybersecurity-risks-following-ai-adoption/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-13.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-03-04T01:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/oauth-attacks-in-entra-id-can-leverage-chatgpt-to-compromise-user-email-accounts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft-entra-id.png</image:loc><image:title>Microsoft Entra ID</image:title></image:image><lastmod>2026-03-04T01:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/microsoft-warns-of-hackers-attacking-developers-with-malicious-next-js-repositories/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/next-js.png</image:loc><image:title>Next js</image:title></image:image><lastmod>2026-03-04T01:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/25/threat-actors-exploit-apache-activemq-vulnerability-to-gain-rdp-access-deploy-lockbit-ransomware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apache-activemq.png</image:loc><image:title>Apache ActiveMQ</image:title></image:image><lastmod>2026-03-04T01:19:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/malicious-nuget-packages-attacking-asp-net-developers-to-steal-login-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/nuget.png</image:loc><image:title>NuGet</image:title></image:image><lastmod>2026-03-03T01:37:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/anthropic-facing-allegations-from-musk-over-largescale-data-misuse/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/anthropic-2.png</image:loc><image:title>Anthropic</image:title></image:image><lastmod>2026-03-03T01:34:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/new-deserialization-vulnerability-in-ruby-workers-could-enable-full-system-compromise/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ruby.png</image:loc><image:title>Ruby</image:title></image:image><lastmod>2026-03-03T01:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/vmware-aria-flaws-enable-attackers-to-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/vmware-1.png</image:loc><image:title>VMware</image:title></image:image><lastmod>2026-03-03T01:34:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/hackers-leverage-deepseek-and-claude-to-attack-fortigate-devices-worldwide/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fortinet-4.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-03-03T01:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/openclaw-releases-2026-2-23-released-with-security-updates-and-new-ai-features/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-14.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-03-03T01:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/24/google-chrome-emergency-security-update-patches-three-high-severity-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-2-5.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-03-03T01:33:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/23/anthropic-claude-under-large-scale-distillation-attacks-by-chinese-ai-labs-with-13-million-exchanges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/anthropic-1.png</image:loc><image:title>Anthropic</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x-4.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-03-03T01:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/23/jspdf-vulnerability-exposes-millions-of-developers-to-object-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/jspdf.png</image:loc><image:title>jsPDF</image:title></image:image><lastmod>2026-03-02T01:27:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/23/cisa-warns-of-actively-exploited-roundcube-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-9.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-03-02T01:27:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/23/google-suspends-openclaw-users-from-antigravity-ai-after-oauth-token-abuse/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x2.png</image:loc><image:title>x2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x1.png</image:loc><image:title>x1</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/google-antigravity-ai.png</image:loc><image:title>Google Antigravity AI</image:title></image:image><lastmod>2026-03-02T01:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/22/japanese-semiconductor-supplier-hit-by-ransomware-multiple-systems-impacted/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/advantest.png</image:loc><image:title>Advantest</image:title></image:image><lastmod>2026-03-02T01:27:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/23/hpe-telco-service-activator-vulnerability-allows-attackers-to-bypass-access-controls/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/hpe.png</image:loc><image:title>HPE</image:title></image:image><lastmod>2026-03-02T01:26:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/22/hackers-hide-pulsar-rat-inside-png-images-in-new-npm-supply-chain-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/png.png</image:loc><image:title>PNG</image:title></image:image><lastmod>2026-03-02T01:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/22/multiple-hacking-groups-exploit-openclaw-instances-to-steal-api-key-and-deploy-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-13.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-03-02T01:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/21/superclaw-open-source-framework-to-red-team-ai-agents-for-security-testing/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/superclaw.png</image:loc><image:title>SuperClaw</image:title></image:image><lastmod>2026-03-02T01:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/poc-released-for-critical-chrome-0-day-vulnerability-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-2-4.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-02-27T02:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/21/hackers-leveraging-multiple-ai-services-to-compromise-600-fortigate-devices/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fortinet-3.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-02-27T01:19:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/dramatic-escalation-in-frequency-and-power-of-ddos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-12.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-27T01:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/genai-has-become-the-biggest-data-exposure-risk-in-enterprise-history/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/2025-12-cloud-and-threat-520.jpg</image:loc><image:title>2025-12-cloud-and-threat-520</image:title></image:image><lastmod>2026-02-27T01:19:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/critical-jenkins-flaw-exposes-build-environments-to-xss-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/jenkins.png</image:loc><image:title>Jenkins</image:title></image:image><lastmod>2026-02-27T01:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/apache-tomcat-vulnerabilities-let-attackers-bypass-security-constraints-via-http-0-9-requests/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apache-tomcat.png</image:loc><image:title>Apache Tomcat</image:title></image:image><lastmod>2026-02-27T01:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/poc-released-for-windows-notepad-vulnerability-that-enables-malicious-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/windows-notepad.png</image:loc><image:title>Windows Notepad</image:title></image:image><lastmod>2026-02-27T01:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/hackers-exploit-critical-beyondtrust-vulnerability-to-deploy-vshell-and-sparkrat/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/beyondtrust-2.png</image:loc><image:title>BeyondTrust</image:title></image:image><lastmod>2026-02-26T01:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/20/splunk-enterprise-for-windows-vulnerability-let-attackers-hijack-dlls-and-gain-system-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/splunk.png</image:loc><image:title>Splunk</image:title></image:image><lastmod>2026-02-26T01:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/abstract-security-launches-ai-siem-platform-to-analyze-threats-in-real-time/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-11.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-26T01:42:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/microsoft-365-copilot-vulnerability-exposes-sensitive-emails-through-ai-summaries/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft-copilot.png</image:loc><image:title>Microsoft Copilot</image:title></image:image><lastmod>2026-02-26T01:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/researchers-reveal-six-new-openclaw-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-12.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-26T01:42:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/beyond-cve-chinas-dual-vulnerability-databases-reveal-a-different-disclosure-timeline/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-10.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-26T01:42:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/u-s-cisa-adds-dell-recoverpoint-and-gitlab-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-8.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-26T01:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/ai-dev-tool-clines-npm-token-hijacked-by-hackers-for-8-hours/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cline-ai.png</image:loc><image:title>Cline AI</image:title></image:image><lastmod>2026-02-26T01:20:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/19/critical-mcp-server-enables-arbitrary-code-execution-and-sensitive-data-exfiltration/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/mcp-2.png</image:loc><image:title>MCP 2</image:title></image:image><lastmod>2026-02-26T01:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/critical-ivanti-epmm-zero-day-vulnerabilities-exploited-in-the-wild-targeting-corporate-networks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ivanti-efbc92-3.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-02-26T01:20:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/vscode.png</image:loc><image:title>VSCode</image:title></image:image><lastmod>2026-02-26T01:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/moltbook-is-dangerous-but-scale-doesnt-match-the-hype-zenity/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/moltbook-1.png</image:loc><image:title>Moltbook</image:title></image:image><lastmod>2026-02-26T01:20:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/new-phishing-campaign-targets-booking-com-partners-and-customers-in-multi-stage-financial-fraud-scheme/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/booking.png</image:loc><image:title>Booking</image:title></image:image><lastmod>2026-02-26T01:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/firebase-misconfiguration-exposes-300m-messages-from-chat-ask-ai-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig2-3.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-02-26T01:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/openclaw-ai-framework-v2026-2-17-adds-anthropic-model-support-amid-credential-theft-bug-concerns/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-anthropic.png</image:loc><image:title>OpenClaw Anthropic</image:title></image:image><lastmod>2026-02-26T01:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/microsoft-teams-leverages-ai-workflows-with-microsoft-365-copilot-for-task-automation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft-twams.png</image:loc><image:title>Microsoft Twams</image:title></image:image><lastmod>2026-02-25T01:22:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/critical-windows-admin-center-vulnerability-allows-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-02-25T01:22:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/notepad-v8-9-2-released-with-double-lock-update-mechanism-following-recent-hack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/notepad-2.png</image:loc><image:title>Notepad++</image:title></image:image><lastmod>2026-02-25T01:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-7.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-25T01:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/18/dell-0-day-vulnerability-exploited-by-chinese-hackers-since-mid-2024-to-deploy-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-25T01:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/openclaw-ai-log-poisoning-vulnerability-allows-malicious-content-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-11.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-25T01:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/over-privileged-ai-drives-4-5-times-higher-incident-rates/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-9.png</image:loc><image:title>FIG</image:title></image:image><lastmod>2026-02-25T01:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/firefox-v147-0-3-released-with-critical-fix-for-heap-buffer-overflow-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/firefox-1.png</image:loc><image:title>Firefox</image:title></image:image><lastmod>2026-02-25T01:21:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/1-click-flaw-in-clawdbot-allows-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/clawdbot.png</image:loc><image:title>ClawDBot</image:title></image:image><lastmod>2026-02-24T08:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/augustus-open-source-llm-vulnerability-scanner-with-210-attacks-across-28-llm-providers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/augustus.png</image:loc><image:title>Augustus</image:title></image:image><lastmod>2026-02-24T08:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/google-warns-of-hackers-leveraging-gemini-ai-for-all-stages-of-cyberattacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/google-gemini.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-02-24T08:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/cve-2025-64712-in-unstructured-io-puts-amazon-google-and-tech-giants-at-risk-of-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-6.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-24T08:27:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/threat-actors-attacking-openclaw-configurations-to-steal-login-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-10.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-24T08:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/apache-nifi-vulnerability-enables-authorization-bypass/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apache-nifi.png</image:loc><image:title>Apache NiFi</image:title></image:image><lastmod>2026-02-24T03:13:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/malware-in-the-wild-as-malicious-fork-of-legitimate-triton-app-surfaces-on-github/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/triton.png</image:loc><image:title>Triton</image:title></image:image><lastmod>2026-02-24T03:13:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/80-of-attck-mitre-techniques-now-dedicated-to-evasion-and-persistence/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/mitre-attck.png</image:loc><image:title>MITRE ATT&amp;CK</image:title></image:image><lastmod>2026-02-24T03:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/langchain-community-ssrf-bypass-vulnerability-exposes-internal-services-to-unauthorized-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/langchain.png</image:loc><image:title>LangChain</image:title></image:image><lastmod>2026-02-24T03:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/25-vulnerabilities-in-cloud-password-managers-allow-unauthorized-access-and-modifications/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/password-managers.png</image:loc><image:title>Password Managers</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-8.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-24T03:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/17/hackers-abuse-screenconnect-to-hijack-pcs-via-fake-social-security-emails/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/screenconnect.png</image:loc><image:title>ScreenConnect</image:title></image:image><lastmod>2026-02-24T03:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/16/cleantalk-plugin-for-wordpress-exposes-sites-to-authorization-bypass-via-reverse-dns/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/wordpress-2.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2026-02-24T03:13:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/16/clawbands-github-project-looks-to-put-human-controls-on-openclaw-ai-agents/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/clawbands.png</image:loc><image:title>ClawBands</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig2-2.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-02-24T01:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/16/filezen-file-transfer-app-vulnerability-enables-arbitrary-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/filezen.png</image:loc><image:title>FileZen</image:title></image:image><lastmod>2026-02-24T01:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/16/joomla-vulnerabilities-in-novarain-tassos-framework-expose-sql-injection-risks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/joomla.png</image:loc><image:title>Joomla</image:title></image:image><lastmod>2026-02-24T01:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/16/chrome-0-day-vulnerability-actively-exploited-by-attackers-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-2-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-02-24T01:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/14/new-clickfix-exploit-tricks-users-into-changing-dns-settings-for-malware-installation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/clickfix.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2026-02-24T01:28:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/14/threat-actors-exploit-claude-artifacts-and-google-ads-to-target-macos-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apple.png</image:loc><image:title>Apple</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/claude-2.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-02-24T01:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/14/u-s-cisa-adds-a-flaw-in-beyondtrust-rs-and-pra-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-24T01:28:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/14/one-threat-actor-responsible-for-83-of-recent-ivanti-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ivanti-efbc92-2.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-02-24T01:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/u-s-cisa-adds-solarwinds-web-help-desk-notepad-microsoft-configuration-manager-and-apple-devices-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-4.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-20T02:56:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/check-point-unveils-a-new-security-strategy-for-enterprises-in-the-ai-age/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig2-1.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-02-20T01:22:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/malicious-chrome-ai-extensions-attacking-260000-users-via-injected-iframes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-extensions-2-1.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2026-02-20T01:21:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/beyondtrust-rce-vulnerability-under-active-exploitation-urgent-patch-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/beyondtrust-1.png</image:loc><image:title>BeyondTrust</image:title></image:image><lastmod>2026-02-20T01:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/critical-vulnerability-in-next-mdx-remote-allows-arbitrary-code-execution-in-react-server-side-rendering/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/next-mdx-remote.png</image:loc><image:title>Next-Mdx-Remote</image:title></image:image><lastmod>2026-02-20T01:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/zimbra-issues-security-update-to-address-xss-xxe-and-ldap-injection-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/zimbra.png</image:loc><image:title>Zimbra</image:title></image:image><lastmod>2026-02-20T01:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/13/openclaw-2026-2-12-released-to-patch-over-40-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-9.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-20T01:21:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/chrome-security-update-patch-for-vulnerabilities-that-enables-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-2-1.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-02-20T01:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/hpe-aruba-flaw-exposes-networking-devices-to-privilege-escalation-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/aruba.png</image:loc><image:title>Aruba</image:title></image:image><lastmod>2026-02-20T01:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/ai-skills-represent-dangerous-new-attack-surface-says-trendai/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-7.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-19T01:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/287-malicious-chrome-extensions-steal-browsing-data-from-37-4-million-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-extensions-2.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2026-02-19T01:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/wordpress-backup-plugin-vulnerability-exposes-800000-sites-to-remote-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/wordpress-1.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2026-02-19T01:28:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/ssh-worm-exploit-detected-by-dshield-sensor-using-credential-stuffing-and-multi-stage-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ssh.png</image:loc><image:title>SSH</image:title></image:image><lastmod>2026-02-19T01:28:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/palo-alto-networks-firewall-vulnerability-allows-an-attacker-to-force-firewalls-into-a-reboot-loop/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/palo-alto-networks.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2026-02-19T01:28:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/12/malicious-duer-js-npm-package-distributes-bada-stealer-malware-targeting-windows-and-discord-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/npm.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2026-02-19T01:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/hackers-use-llm-to-create-react2shell-malware-the-latest-example-of-ai-generated-threat/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-5.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/react2shell-1.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2026-02-19T01:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/apple-0-day-flaw-actively-exploited-in-targeted-cyberattacks-on-individuals/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apple-ios.png</image:loc><image:title>Apple iOS</image:title></image:image><lastmod>2026-02-19T01:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/gitlab-patches-multiple-vulnerabilities-that-enables-dos-and-cross-site-scripting-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/gitlab.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2026-02-19T01:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/critical-uuid-flaw-in-fiber-v2-on-go-1-24-enables-session-hijacking-csrf-bypass-and-zero-id-dos-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fiber-go.png</image:loc><image:title>Fiber Go</image:title></image:image><lastmod>2026-02-19T01:27:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/critical-sandboxjs-vulnerability-allows-remote-host-takeover-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/sandbox-js.png</image:loc><image:title>Sandbox JS</image:title></image:image><lastmod>2026-02-19T01:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/11/u-s-cisa-adds-microsoft-office-and-microsoft-windows-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-3.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-19T01:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/fortios-authentication-bypass-vulnerability-lets-attackers-bypass-ldap-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fortinet-2.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-02-19T01:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/sap-security-patch-day-fixes-critical-code-injection-flaw-in-sap-crm-and-s-4hana/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/sap.png</image:loc><image:title>SAP</image:title></image:image><lastmod>2026-02-18T01:23:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/fortisandbox-xss-vulnerability-let-attackers-run-arbitrary-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fortinet-1.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-02-18T01:23:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/react2shell-vulnerability-exploited-in-the-wild-analysts-warn/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/react2shell.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2026-02-18T01:23:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/windows-error-reporting-service-vulnerability-let-attackers-elevate-privileges-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-02-18T01:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/ivanti-endpoint-manager-vulnerability-lets-remote-attacker-leak-arbitrary-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ivanti-efbc92-1.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-02-18T01:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/15200-openclaw-control-panels-with-full-system-access-exposed-to-the-internet/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-8.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-18T01:23:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/25-million-users-affected-as-ai-chat-platform-leaks-300-million-messages/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chat-ask-ai.png</image:loc><image:title>Chat &amp; Ask AI</image:title></image:image><lastmod>2026-02-18T01:23:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/axios-vulnerability-allows-attackers-to-trigger-dos-and-crash-node-js-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/axios.png</image:loc><image:title>Axios</image:title></image:image><lastmod>2026-02-17T01:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/voidlink-malware-exhibits-multi-cloud-capabilities-and-ai-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/voidlink.png</image:loc><image:title>VoidLink</image:title></image:image><lastmod>2026-02-17T01:20:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/10/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2026-02-17T01:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/researchers-find-40000-exposed-openclaw-instances/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-7.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-17T01:20:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/hackers-abuse-clawhub-skills-to-evade-virustotal-via-social-engineering/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/virustotal.png</image:loc><image:title>VirusTotal</image:title></image:image><lastmod>2026-02-17T01:20:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/roundcube-webmail-vulnerability-let-attackers-track-email-opens/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/roundcube.png</image:loc><image:title>Roundcube</image:title></image:image><lastmod>2026-02-17T01:20:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/hackers-exploiting-ivanti-epmm-devices-to-deploy-dormant-backdoors/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x-3.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-02-17T01:20:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/claude-desktop-extensions-0-click-rce-vulnerability-exposes-10000-users-to-remote-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/claude-1.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-02-17T01:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/openclaw-becomes-new-target-in-rising-wave-of-supply-chain-poisoning-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-6.png</image:loc><image:title>OpenClaw</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-5.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-17T01:20:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/over-5-million-misconfigured-git-web-servers-found-exposing-secrets-online/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/git2.png</image:loc><image:title>Git2</image:title></image:image><lastmod>2026-02-17T01:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/hackers-actively-exploiting-solarwinds-web-help-desk-rce-vulnerability-to-deploy-custom-tools/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/solarwinds-1.png</image:loc><image:title>SolarWinds</image:title></image:image><lastmod>2026-02-16T01:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/09/critical-forticlientems-vulnerability-let-attackers-execute-malicious-code-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-02-16T01:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/08/localgpt-a-secure-local-device-focused-ai-assistant-built-in-rust/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-4.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-16T01:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/hackers-exploit-free-firebase-accounts-to-launch-phishing-campaigns/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/firebase.png</image:loc><image:title>Firebase</image:title></image:image><lastmod>2026-02-16T01:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/firefox-will-give-users-an-ai-kill-switch-for-better-privacy/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/firefox.png</image:loc><image:title>Firefox</image:title></image:image><lastmod>2026-02-16T01:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/openclaw-partners-with-virustotal-to-secure-ai-agent-skill-marketplace/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-3.png</image:loc><image:title>OpenClaw</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-1.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-16T01:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/beyondtrust-remote-access-products-0-day-vulnerability-allows-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/beyondtrust.png</image:loc><image:title>BeyondTrust</image:title></image:image><lastmod>2026-02-16T01:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/07/openclaw-v2026-2-6-released-with-support-for-opus-4-6-gpt-5-3-codex-and-safety-scanner/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-2.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-13T01:23:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/cisa-warns-of-react-native-community-command-injection-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-13T01:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/phishing-and-oauth-token-flaws-lead-to-full-microsoft-365-compromise/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft-365.png</image:loc><image:title>Microsoft 365</image:title></image:image><lastmod>2026-02-13T01:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/zscaler-integrates-squarex-to-deliver-stronger-browser-security-protections/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/zscaler-squarex.png</image:loc><image:title>Zscaler SquareX</image:title></image:image><lastmod>2026-02-13T01:23:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/bulletproof-hosting-providers-exploit-legitimate-isps-to-power-cybercrime-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-3.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-13T01:23:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/openai-launches-trusted-access-to-strengthen-cybersecurity-protections/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/open-ai.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2026-02-13T01:23:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/centos-9-security-flaw-enables-privilege-escalation-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/centos-web-panel.png</image:loc><image:title>CentOS Web Panel</image:title></image:image><lastmod>2026-02-13T01:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/f5-patches-critical-vulnerabilities-in-big-ip-nginx-and-related-products/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/f5.png</image:loc><image:title>F5</image:title></image:image><lastmod>2026-02-13T01:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/cisa-advisory-highlights-exploited-smartertools-vulnerability-in-recent-ransomware-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2-1.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-13T01:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/06/17-of-3rd-party-add-ons-for-openclaw-used-in-crypto-theft-and-macos-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw-4.png</image:loc><image:title>OpenClaw</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/openclaw.png</image:loc><image:title>OpenClaw</image:title></image:image><lastmod>2026-02-12T01:50:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/new-hacking-campaign-exploits-microsoft-windows-winrar-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/winrar-1.png</image:loc><image:title>WinRAR</image:title></image:image><lastmod>2026-02-12T01:50:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/170-solarwinds-help-desk-installations-vulnerable-to-rce-attacks-exposed-online/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/solarwinds.png</image:loc><image:title>SolarWinds</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x-2.png</image:loc><image:title>x</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x-1.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-02-12T01:49:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/go-1-25-7-and-go-1-24-13-released-with-patches-for-multiple-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/go.png</image:loc><image:title>GO</image:title></image:image><lastmod>2026-02-12T01:49:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/n8n-vulnerability-allows-remote-attackers-to-hijack-systems-via-malicious-workflow-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/n8n.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-02-12T01:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/watchguard-vpn-client-flaw-on-windows-enables-systemlevel-command-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/watchguard.png</image:loc><image:title>WatchGuard</image:title></image:image><lastmod>2026-02-12T01:49:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/hackers-exploit-sonicwall-sslvpn-credentials-to-deploy-edr-killer-and-bypass-security/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/sonicwall.png</image:loc><image:title>sonicwall</image:title></image:image><lastmod>2026-02-12T01:49:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/cisco-warns-of-meeting-management-flaw-enabling-arbitrary-file-upload-by-remote-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisco.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-02-12T01:49:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/threat-actors-exploiting-nginx-servers-to-redirect-web-traffic-to-malicious-sites/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/nginx-2.png</image:loc><image:title>NGINX</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/nginx-1.png</image:loc><image:title>NGINX</image:title></image:image><lastmod>2026-02-12T01:49:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/05/cisa-warns-of-vmware-esxi-0-day-vulnerability-exploited-in-ransomware-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/vmware.png</image:loc><image:title>VMware</image:title></image:image><lastmod>2026-02-12T01:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/hackers-using-ai-to-get-aws-admin-access-within-10-minutes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/aws.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-02-12T01:49:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/ingress-nginx-vulnerability-allow-attackers-to-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/ingress-nginx.png</image:loc><image:title>Ingress-NGINX</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/nginx.png</image:loc><image:title>NGINX</image:title></image:image><lastmod>2026-02-12T01:41:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/critical-asustor-nas-security-flaw-enables-complete-device-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/asustor.png</image:loc><image:title>ASUSTOR</image:title></image:image><lastmod>2026-02-12T01:30:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/tp-link-vulnerabilities-let-hackers-take-full-control-of-devices/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/tp-link.png</image:loc><image:title>TP-Link</image:title></image:image><lastmod>2026-02-12T01:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/hackers-actively-scanning-citrix-netscaler-infrastructure-to-discover-login-panels/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/citrix2.png</image:loc><image:title>Citrix2</image:title></image:image><lastmod>2026-02-12T01:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/u-s-cisa-adds-solarwinds-web-help-desk-sangoma-freepbx-and-gitlab-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/cisa-kev2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-12T01:30:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/critical-django-flaw-allows-dos-and-sql-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/django.png</image:loc><image:title>Django</image:title></image:image><lastmod>2026-02-12T01:30:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/chrome-vulnerabilities-let-attackers-execute-arbitrary-code-and-crash-system/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/chrome-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-02-12T01:29:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/04/apache-syncope-vulnerability-let-attackers-hijack-user-sessions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/apache-syncope.png</image:loc><image:title>Apache Syncope</image:title></image:image><lastmod>2026-02-12T01:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/the-invisible-risk-1-5-million-unmonitored-ai-agents-threaten-corporate-security/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-2.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/screen-shot-2026-02-05-at-11.16.52-am.png</image:loc><image:title>Screen Shot 2026-02-05 at 11.16.52 AM</image:title></image:image><lastmod>2026-02-12T01:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/asus-discontinues-file-shredder-feature-to-patch-critical-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/asus.png</image:loc><image:title>ASUS</image:title></image:image><lastmod>2026-02-10T01:18:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/glassworm-infiltrated-vsx-extensions-with-more-than-22000-downloads-to-attack-developers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/open-vsx-copy.png</image:loc><image:title>Open VSX copy</image:title></image:image><lastmod>2026-02-10T01:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/ai-agent-identity-management-a-new-security-control-plane-for-cisos/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig2.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-02-10T01:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/everest-ransomware-claims-90gb-data-theft-involving-legacy-polycom-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/polycom-1.png</image:loc><image:title>Polycom</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/polycom.png</image:loc><image:title>Polycom</image:title></image:image><lastmod>2026-02-10T01:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/hackers-abused-react-native-cli-flaw-to-deploy-rust-malware-before-public-disclosure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/react.png</image:loc><image:title>React</image:title></image:image><lastmod>2026-02-10T01:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/sql-injection-flaw-affects-40000-wordpress-sites/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/wordpress.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2026-02-10T01:18:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/03/foxit-pdf-editor-vulnerabilities-let-attackers-execute-arbitrary-javascript/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/foxit.png</image:loc><image:title>Foxit</image:title></image:image><lastmod>2026-02-10T01:18:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/hackers-exploiting-microsoft-office-0-day-vulnerability-to-deploy-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/microsoft-office.png</image:loc><image:title>Microsoft Office</image:title></image:image><lastmod>2026-02-09T01:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/gakido-crlf-injection-vulnerability-let-attackers-bypass-security-controls/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/python.png</image:loc><image:title>Python</image:title></image:image><lastmod>2026-02-09T01:19:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/hackers-target-mongodb-instances-to-delete-databases-and-plant-ransom-notes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/mongodb.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-02-09T01:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/google-uncovered-significant-expansion-in-shinyhunters-threat-activity-with-new-tactics/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/shinyhunters.png</image:loc><image:title>ShinyHunters</image:title></image:image><lastmod>2026-02-09T01:19:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/notepad-users-targeted-after-state-backed-attackers-hijack-update-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/notepad.png</image:loc><image:title>Notepad++</image:title></image:image><lastmod>2026-02-09T01:19:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/02/breachforums-breach-exposes-names-of-324k-cybercriminals-upends-the-threat-intel-game/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig-1.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-09T01:19:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/02/01/moltbook-ai-vulnerability-exposes-email-addresses-login-tokens-and-api-keys/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/moltbook.png</image:loc><image:title>Moltbook</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/x.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-02-09T01:19:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/31/autopentestx-automated-penetration-testing-toolkit-designed-for-linux-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/02/fig.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-09T01:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/metasploit-releases-7-new-exploit-modules-covering-freepbx-cacti-and-smartermail/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/metasploit.png</image:loc><image:title>Metasploit</image:title></image:image><lastmod>2026-02-06T01:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/sophisticated-malware-lurks-in-open-vsx-extension-with-5066-downloads/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/open-vsx.png</image:loc><image:title>Open VSX</image:title></image:image><lastmod>2026-02-06T01:28:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/microsoft-to-disable-ntlm-by-default-in-future-windows-releases/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-ntlm.png</image:loc><image:title>Microsoft NTLM</image:title></image:image><lastmod>2026-02-06T01:28:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/smartertools-patches-critical-smartermail-flaw-allowing-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/smartermail-2.png</image:loc><image:title>SmarterMail</image:title></image:image><lastmod>2026-02-06T01:27:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/nvidia-gpu-display-driver-vulnerabilities-allows-code-execution-and-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/nvidia-1.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2026-02-06T01:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/30/over-200-magento-stores-compromised-in-rootkit-rampage-via-zero-day-exploit/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/magento.png</image:loc><image:title>Magento</image:title></image:image><lastmod>2026-02-06T01:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/report-open-source-malware-instances-increased-73-in-2025/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-17.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-06T01:27:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/blackice-introduced-as-container-based-red-teaming-toolkit-for-ai-security-testing/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/blackice.png</image:loc><image:title>BlackIce</image:title></image:image><lastmod>2026-02-06T01:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2026-02-05T01:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/researchers-find-175000-publicly-exposed-ollama-ai-servers-across-130-countries/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/ollama.png</image:loc><image:title>Ollama</image:title></image:image><lastmod>2026-02-05T01:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/solarwinds-web-product-flaw-allows-attackers-to-bypass-security-and-execute-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/solarwinds.png</image:loc><image:title>SolarWinds</image:title></image:image><lastmod>2026-02-05T01:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/29/python-based-pyrat-with-cross-platform-capabilities-and-extensive-remote-access-features/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-16.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-05T01:25:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/researchers-uncover-454000-malicious-open-source-packages/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-15.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-02-05T01:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/check-point-harmony-sase-windows-client-vulnerability-enables-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/check-point-harmony.png</image:loc><image:title>Check Point Harmony</image:title></image:image><lastmod>2026-02-05T01:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/tp-link-archer-router-flaw-exposes-users-to-remote-attacks-and-full-device-control/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/tp-link-1.png</image:loc><image:title>TP-Link</image:title></image:image><lastmod>2026-02-05T01:24:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/gemini-mcp-tool-0-day-vulnerability-allows-remote-attackers-to-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gemini-mcp.png</image:loc><image:title>Google Gemini MCP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gemini-mcp.png</image:loc><image:title>Gemini MCP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gemini-1.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-02-05T01:24:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/critical-and-high-severity-n8n-sandbox-flaws-allow-rce/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/n8n-2.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-02-05T01:24:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/cal-com-broken-access-controls-lead-to-account-takeover-and-data-exposure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cal.com_-1.png</image:loc><image:title>Cal.com</image:title></image:image><lastmod>2026-02-05T01:24:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/google-warns-of-winrar-vulnerability-exploited-to-gain-control-over-windows-system/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/winrar-1.png</image:loc><image:title>WinRAR</image:title></image:image><lastmod>2026-02-04T01:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/chrome-security-update-fixes-critical-vulnerability-in-background-fetch-api/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-2-3.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-02-04T01:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/critical-openssl-vulnerabilities-allow-remote-attackers-to-execute-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/openssl.png</image:loc><image:title>OpenSSL</image:title></image:image><lastmod>2026-02-04T01:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/28/fortinet-patches-cve-2026-24858-after-active-fortios-sso-exploitation-detected/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-8.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-02-04T01:23:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/attackers-hijack-github-desktop-repo-to-spread-malware-via-official-installer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/github-1.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2026-02-04T01:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/critical-vm2-flaw-lets-attackers-bypass-sandbox-and-execute-arbitrary-code-in-node-js/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/vm2.png</image:loc><image:title>VM2</image:title></image:image><lastmod>2026-02-04T01:23:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/u-s-cisa-adds-microsoft-office-gnu-inetutils-smartertools-smartermail-and-linux-kernel-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-9.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-04T01:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/g_wagon-npm-package-exploits-users-to-steal-browser-credentials-with-obfuscated-payload/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/npm.png</image:loc><image:title>NPM</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/github.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2026-02-04T01:23:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/6000-vulnerable-smartertools-smartermail-servers-exposed-to-actively-exploited-rce-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/smartermail-1.png</image:loc><image:title>SmarterMail</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x-5.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-02-03T01:18:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/attackers-exploit-react2shell-vulnerability-to-target-it-sector-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/7599a-172wsyivrqh0nbvpwbzr-gw.webp</image:loc><image:title>1*72wSyivrQh0NBvpwbZr-Gw</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/6a1fa-1akobcppkesdo7zjiikjpew.webp</image:loc><image:title>1*akOBCpPkEsdO7ZJiIKJpEw</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/react-1.png</image:loc><image:title>React</image:title></image:image><lastmod>2026-02-03T01:18:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/node-js-25-5-0-released-update-root-certificates-and-new-command-line-flags/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/node.js_-3.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-02-03T01:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/27/okta-flags-customized-reactive-vishing-attacks-which-bypass-mfa/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/okta-2.png</image:loc><image:title>Okta 2</image:title></image:image><lastmod>2026-02-03T01:18:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/fake-microsoft-teams-billing-phishing-alerts-reach-6135-users-via-12866-emails/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-twams.png</image:loc><image:title>Microsoft Twams</image:title></image:image><lastmod>2026-02-03T01:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/malicious-vs-code-ai-extensions-with-1-5-million-installs-steal-developer-source-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-vscode.png</image:loc><image:title>Microsoft VSCode</image:title></image:image><lastmod>2026-02-03T01:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/emergency-microsoft-update-fixes-in-the-wild-office-zero-day/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-office.png</image:loc><image:title>Microsoft Office</image:title></image:image><lastmod>2026-02-03T01:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/cloudflare-misconfiguration-behind-recent-bgp-route-leak/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cloudflare-1.png</image:loc><image:title>cloudflare</image:title></image:image><lastmod>2026-02-03T01:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/cisa-expands-kev-catalog-with-1484-new-vulnerabilities-as-active-exploitation-surges-20-in-2025/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-02T17:39:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/poc-released-for-gnu-inetutils-telnetd-rce-as-800k-exposed-instances-remain-online/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gnu-2.png</image:loc><image:title>GNU</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x-4.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-02-02T01:25:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/apache-hadoop-vulnerability-exposes-systems-potential-crashes-or-data-corruption/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-hadoop.png</image:loc><image:title>Apache Hadoop</image:title></image:image><lastmod>2026-02-02T01:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/north-korea.png</image:loc><image:title>North Korea</image:title></image:image><lastmod>2026-02-02T01:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/f5-strengthens-scales-sustains-ai-security-with-integrated-runtime-protection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/f5.png</image:loc><image:title>F5</image:title></image:image><lastmod>2026-02-02T01:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/26/curl-to-end-bug-bounty-following-low-quality-ai-generated-vulnerability-reports/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/curl.png</image:loc><image:title>cURL</image:title></image:image><lastmod>2026-02-02T01:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/25/1password-adds-pop-up-warnings-for-suspected-phishing-sites/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/1password.png</image:loc><image:title>1Password</image:title></image:image><lastmod>2026-02-02T01:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/24/cisa-adds-actively-exploited-vmware-vcenter-flaw-cve-2024-37079-to-kev-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-8.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-02-02T01:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/24/trustasia-pulls-143-certificates-following-critical-litessl-acme-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/trustasia.png</image:loc><image:title>TrustAsia</image:title></image:image><lastmod>2026-02-02T01:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/node-js-sets-new-standard-for-hackerone-reports-demands-signal-of-1-0-or-higher/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/node.js_-2.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-01-30T00:57:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/24/threat-actors-leverage-sharepoint-services-in-sophisticated-aitm-phishing-campaign/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-sharepoint.png</image:loc><image:title>Microsoft SharePoint</image:title></image:image><lastmod>2026-01-30T00:57:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/20000-wordpress-sites-compromised-by-backdoor-vulnerability-enabling-malicious-admin-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/wordpress-2-2.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2026-01-30T00:57:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/zap-releases-owasp-pentest-kit-browser-extension-for-application-security-testing/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-12.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-30T00:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/hpe-alletra-and-nimble-storage-vulnerability-grants-admin-access-to-remote-attacker/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/hpe.png</image:loc><image:title>HPE</image:title></image:image><lastmod>2026-01-30T00:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/critical-appsmith-flaw-enables-account-takeovers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-14.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/appsmith.png</image:loc><image:title>Appsmith</image:title></image:image><lastmod>2026-01-30T00:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/u-s-cisa-adds-prettier-vite-vitejs-versa-concerto-sd-wan-and-synacor-zimbra-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-7.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-30T00:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/23/what-an-ai-written-honeypot-taught-us-about-trusting-machines/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig2-1.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-01-30T00:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/zero-day-exploits-surge-nearly-30-of-flaws-attacked-before-disclosure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-13.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-29T01:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/nvidia-cuda-toolkit-flaw-allows-command-injection-arbitrary-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/nvidia.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2026-01-29T01:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/bind-9-vulnerability-allow-attackers-to-crash-server-by-sending-malicious-records/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/bind-9.png</image:loc><image:title>BIND 9</image:title></image:image><lastmod>2026-01-29T01:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/node-js-binary-parser-library-flaw-enables-malicious-code-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/node.js_-1.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-01-29T01:31:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/zest-security-adds-ai-agents-to-identify-vulnerabilities-that-pose-no-actual-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-11.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-29T01:31:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/cisco-unified-cm-zero-day-rce-under-attack-cisa-issues-warning/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-6.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-29T01:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/fortinet-sso-vulnerability-actively-exploited-to-hack-firewalls-and-gain-admin-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-7.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-29T01:31:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/22/gitlab-security-flaws-could-allow-two-factor-authentication-bypass-and-dos/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gitlab-1.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2026-01-29T01:31:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/critical-zoom-command-injection-vulnerability-enables-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/zoom.png</image:loc><image:title>Zoom</image:title></image:image><lastmod>2026-01-29T01:31:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/multiple-0-day-vulnerabilities-in-anthropic-git-mcp-server-enables-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/anthropic.png</image:loc><image:title>Anthropic</image:title></image:image><lastmod>2026-01-29T01:31:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/wordpress-plugin-vulnerability-exposes-100000-sites-to-privilege-escalation-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/wordpress-2-1.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2026-01-28T08:25:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/azure-private-endpoint-deployments-expose-cloud-resources-to-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-azure-1.png</image:loc><image:title>Microsoft Azure</image:title></image:image><lastmod>2026-01-28T00:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/critical-oracle-weblogic-server-proxy-vulnerability-lets-attackers-compromise-the-server/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/oracle.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2026-01-28T00:58:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/chrome-144-released-to-fix-high-severity-v8-javascript-engine-flaw/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-2-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-01-28T00:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/critical-gnu-inetutils-vulnerability-allows-unauthenticated-root-access-via-f-root/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gnu-1.png</image:loc><image:title>GNU</image:title></image:image><lastmod>2026-01-28T00:58:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/21/lastpass-warns-of-fake-maintenance-messages-targeting-users-master-passwords/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/lastpass.png</image:loc><image:title>LastPass</image:title></image:image><lastmod>2026-01-28T00:58:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/voidlink-represents-the-future-of-ai-developed-malware-check-point/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/voidlink-1.png</image:loc><image:title>VoidLink</image:title></image:image><lastmod>2026-01-28T00:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/tp-link-router-flaw-enables-authentication-bypass-through-password-recovery-mechanism/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/tp-link.png</image:loc><image:title>TP-Link</image:title></image:image><lastmod>2026-01-28T00:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/apache-airflow-vulnerabilities-enables-expose-of-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-airflow-1.png</image:loc><image:title>Apache Airflow</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-airflow.png</image:loc><image:title>Apache Airflow</image:title></image:image><lastmod>2026-01-27T01:37:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/opnsense-25-7-11-enhances-network-visibility-with-host-discovery-feature/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/opnsense.png</image:loc><image:title>OPNsense</image:title></image:image><lastmod>2026-01-27T01:37:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/cloudflare-zero-day-flaw-allows-attackers-to-bypass-security-and-access-any-host/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cloudflare.png</image:loc><image:title>cloudflare</image:title></image:image><lastmod>2026-01-27T01:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/20/apache-brpc-vulnerability-enables-remote-command-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-brpc.png</image:loc><image:title>Apache bRPC</image:title></image:image><lastmod>2026-01-27T01:37:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/pdfsider-malware-actively-exploited-to-evade-antivirus-and-edr-defenses/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/pdf.png</image:loc><image:title>PDF</image:title></image:image><lastmod>2026-01-27T01:37:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/new-kerberos-relay-attack-uses-dns-cname-to-bypass-mitigations-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/kerberos.png</image:loc><image:title>Kerberos</image:title></image:image><lastmod>2026-01-27T01:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/livewire-filemanager-vulnerability-exposes-web-applications-to-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/livewire.png</image:loc><image:title>Livewire</image:title></image:image><lastmod>2026-01-27T01:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/google-gemini-ai-tricked-into-leaking-calendar-data-via-meeting-invites/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gemini.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2026-01-27T01:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/monthly/monthly-pickup2026-01/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/screenshot-2026-01-26-at-16.44.20.png</image:loc><image:title>Screenshot 2026-01-26 at 16.44.20</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-16.11.11.png</image:loc><image:title>Screenshot 2025-12-29 at 16.11.11</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-16.09.43.png</image:loc><image:title>Screenshot 2025-12-29 at 16.09.43</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-14.58.39.png</image:loc><image:title>Screenshot 2025-12-29 at 14.58.39</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-14.59.40.png</image:loc><image:title>Screenshot 2025-12-29 at 14.59.40</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-14.51.27.png</image:loc><image:title>Screenshot 2025-12-29 at 14.51.27</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-14.31.58.png</image:loc><image:title>Screenshot 2025-12-29 at 14.31.58</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenshot-2025-12-29-at-14.21.34.png</image:loc><image:title>Screenshot 2025-12-29 at 14.21.34</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ac2024_e38397e383ace382bce383b3e794a8e8b387e69699_ver06_202512.png</image:loc><image:title>AC2024_プレゼン用資料_Ver06_202512</image:title></image:image><lastmod>2026-01-26T08:45:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/monthly-pickup2025-12/</loc><lastmod>2026-01-26T06:17:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/2026/01/19/crashfix-hackers-using-malicious-extensions-to-display-fake-browser-warnings/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/crashfix.png</image:loc><image:title>CrashFix</image:title></image:image><lastmod>2026-01-26T01:23:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/new-bodysnatcher-flaw-allows-full-servicenow-user-impersonation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/servicenow-1.png</image:loc><image:title>servicenow</image:title></image:image><lastmod>2026-01-26T01:23:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/five-chrome-extensions-used-to-hijack-enterprise-hr-and-erp-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-extensions-2-2.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2026-01-26T01:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/security-bug-in-stealc-malware-panel-let-researchers-spy-on-threat-actor-operations/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-10.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-26T01:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/19/windows-smb-client-vulnerability-enables-attacker-to-own-active-directory/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-01-26T01:23:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/17/jfrog-researchers-uncover-rce-exploit-for-existing-redis-database-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/redis.png</image:loc><image:title>redis</image:title></image:image><lastmod>2026-01-26T01:23:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/17/mandiant-releases-rainbow-tables-enabling-ntlmv1-admin-password-hacking/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-9.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-26T01:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/17/critical-xss-vulnerabilities-in-meta-conversion-api-enable-zero-click-account-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/meta.png</image:loc><image:title>Meta</image:title></image:image><lastmod>2026-01-26T01:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/17/googles-vertex-ai-vulnerability-enables-low-privileged-users-to-gain-service-agent-roles/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-vertex-ai.png</image:loc><image:title>Google Vertex AI</image:title></image:image><lastmod>2026-01-23T01:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/16/ghostposter-browser-malware-hid-for-5-years-with-840000-installs/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/browsers-3b.png</image:loc><image:title>Browsers 3B</image:title></image:image><lastmod>2026-01-23T01:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/16/actively-exploited-critical-flaw-in-modular-ds-wordpress-plugin-enables-admin-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/wordpress-2.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2026-01-23T01:17:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/16/cisco-0-day-rce-secure-email-gateway-vulnerability-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisco-2.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-01-23T01:17:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/16/go-1-26-released-with-fixes-for-multiple-vulnerabilities-causing-memory-exhaustion/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/go_2.png</image:loc><image:title>GO_2</image:title></image:image><lastmod>2026-01-23T01:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/critical-cal-com-vulnerability-let-attackers-bypass-authentication-and-hijack-any-user-account/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cal.com_.png</image:loc><image:title>Cal.com</image:title></image:image><lastmod>2026-01-23T01:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/hpe-aruba-vulnerabilities-enables-unauthorized-access-to-sensitive-information/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/aruba.png</image:loc><image:title>Aruba</image:title></image:image><lastmod>2026-01-23T01:16:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/fortinet-fortisiem-vulnerability-cve-2025-64155-actively-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-6.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-23T01:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/aws-codebuild-misconfiguration-exposed-github-repos-to-potential-supply-chain-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/aws.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2026-01-22T01:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/azure-identity-token-vulnerability-enables-tenant-wide-compromise-in-windows-admin-center/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-azure.png</image:loc><image:title>Microsoft Azure</image:title></image:image><lastmod>2026-01-22T01:14:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/palo-alto-networks-firewall-vulnerability-allows-attacker-to-trigger-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/palo-alto-networks.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2026-01-22T01:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/15/hackers-use-fake-paypal-notices-to-steal-credentials-deploy-rmms/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/paypal.png</image:loc><image:title>PayPal</image:title></image:image><lastmod>2026-01-22T01:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/u-s-cisa-adds-a-flaw-in-microsoft-windows-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-22T01:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/new-china-linked-voidlink-linux-malware-targets-major-cloud-providers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/voidlink.png</image:loc><image:title>VoidLink</image:title></image:image><lastmod>2026-01-22T01:14:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/llms-supercharge-ransomware-speed-scale-and-global-reach/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/llms-ransomware.png</image:loc><image:title>LLMs &amp; Ransomware</image:title></image:image><lastmod>2026-01-22T01:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/elastic-patches-multiple-vulnerabilities-that-enables-arbitrary-file-theft-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/elastic.png</image:loc><image:title>Elastic</image:title></image:image><lastmod>2026-01-22T01:13:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/spring-cli-vulnerability-allows-attackers-to-execute-commands-on-user-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/spring2.png</image:loc><image:title>Spring2</image:title></image:image><lastmod>2026-01-22T01:13:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/critical-fortisiem-vulnerability-enables-arbitrary-commands-execution-via-crafted-tcp-packets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-5.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-21T01:26:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/new-magecart-campaign-steals-credit-card-details-during-online-checkouts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-8.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-21T01:26:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/fortios-and-fortiswitchmanager-flaw-allows-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-4.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-21T01:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/ai-agents-are-becoming-privilege-escalation-paths/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/ai-agent.png</image:loc><image:title>AI Agent</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/wing-security.png</image:loc><image:title>Wing Security</image:title></image:image><lastmod>2026-01-21T01:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/chrome-144-released-with-fix-for-10-vulnerabilities-in-v8-javascript-engine/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-2-1.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-01-21T01:25:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/14/microsoft-desktop-window-manager-0-day-vulnerability-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-01-21T01:25:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/palo-alto-networks-introduces-new-vibe-coding-security-governance-framework/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-7.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-21T01:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/adobe-patches-critical-apache-tika-bug-in-coldfusion/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/adobe.png</image:loc><image:title>Adobe</image:title></image:image><lastmod>2026-01-21T01:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/fortisandbox-ssrf-vulnerability-allow-attacker-to-proxy-internal-traffic-via-crafted-http-requests/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-3.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-20T01:23:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/node-js-security-release-patches-7-vulnerabilities-across-all-release-lines/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/node.js_.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-01-20T01:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/servicenow-vulnerability-enables-privilege-escalation-without-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/servicenow.png</image:loc><image:title>servicenow</image:title></image:image><lastmod>2026-01-20T01:23:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/new-angular-vulnerability-enables-an-attacker-to-execute-malicious-payload/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/angular.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2026-01-20T01:23:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/malicious-chrome-extension-steals-wallet-login-credentials-and-enables-automated-trading/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-extensions-2-1.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2026-01-20T01:23:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/13/microsoft-january-2026-patch-tuesday-fixes-3-zero-days-114-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2026-01-20T01:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/u-s-cisa-adds-a-flaw-in-gogs-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-4.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-20T01:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/invisiblejs-tool-hides-executable-es-modules-in-empty-files-using-zero-width-steganography/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/invisible-js.png</image:loc><image:title>Invisible JS</image:title></image:image><lastmod>2026-01-20T01:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/hackers-infiltrated-n8ns-community-node-ecosystem-with-a-weaponized-npm-package/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/n8n-npm.png</image:loc><image:title>n8n npm</image:title></image:image><lastmod>2026-01-20T01:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/critical-react-router-vulnerability-let-attackers-access-or-modify-server-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/react.png</image:loc><image:title>React</image:title></image:image><lastmod>2026-01-20T01:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/new-chatgpt-vulnerabilities-enable-data-exfiltration-from-gmail-outlook-and-github/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chatgpt-4-1.png</image:loc><image:title>ChatGPT 4</image:title></image:image><lastmod>2026-01-19T01:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/critical-apache-struts-2-flaw-could-let-attackers-steal-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-struts.png</image:loc><image:title>Apache Struts</image:title></image:image><lastmod>2026-01-19T01:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/critical-inputplumber-vulnerabilities-allows-ui-input-injection-and-denial-of-service/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/inputplumber.png</image:loc><image:title>InputPlumber</image:title></image:image><lastmod>2026-01-19T01:24:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/hacking-group-everest-allegedly-claims-nissan-motor-breach/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/nissan.png</image:loc><image:title>Nissan</image:title></image:image><lastmod>2026-01-19T01:24:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/critical-zlib-vulnerability-let-attackers-trigger-buffer-overflow-by-invoking-untgz/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/zlib.png</image:loc><image:title>Zlib</image:title></image:image><lastmod>2026-01-19T01:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/12/yara-x-1-11-0-released-with-a-new-hash-function-warnings/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/yara-x.png</image:loc><image:title>YARA-X</image:title></image:image><lastmod>2026-01-19T01:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/11/generative-ai-in-enterprises-security-risks-most-companies-are-not-measuring/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-6.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-19T01:24:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/10/database-of-323986-breachforums-users-leaked-as-admin-disputes-scope/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-4.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-19T01:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/gobruteforcer-botnet-targets-linux-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-5.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-19T01:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/fake-fortinet-sites-steal-vpn-credentials-in-sophisticated-phishing-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-2.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-19T01:23:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/cisco-small-business-switches-face-global-dns-crash-outage/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisco-1.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-01-16T01:31:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/undertow-vulnerability-lets-hackers-take-over-user-sessions-in-java-apps/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/undertow.png</image:loc><image:title>Undertow</image:title></image:image><lastmod>2026-01-16T01:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/trend-micro-fixed-a-remote-code-execution-in-apex-central/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/trend-micro.png</image:loc><image:title>Trend-Micro</image:title></image:image><lastmod>2026-01-16T01:31:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/smartertools-smartermail-vulnerability-enables-remote-code-execution-attack-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/smartermail.png</image:loc><image:title>SmarterMail</image:title></image:image><lastmod>2026-01-16T01:31:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/warning-fake-winrar-website-delivers-malware-disguised-as-installer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/winrar.png</image:loc><image:title>WinRAR</image:title></image:image><lastmod>2026-01-16T01:31:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/09/owasp-crs-vulnerability-allows-attackers-to-bypass-charset-validation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/owasp-crs.png</image:loc><image:title>OWASP CRS</image:title></image:image><lastmod>2026-01-16T01:31:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/gmails-new-ai-inbox-uses-gemini-but-google-says-it-wont-train-ai-on-user-emails/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gmail.png</image:loc><image:title>Google Gmail</image:title></image:image><lastmod>2026-01-16T01:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/new-oauth-attack-lets-hackers-bypass-microsoft-entra-authentication-and-steal-keys/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-entra-id.png</image:loc><image:title>Microsoft Entra ID</image:title></image:image><lastmod>2026-01-16T01:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/react2shell-vulnerability-hit-by-8-1-million-attack-attempts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/react2shell.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2026-01-16T01:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/cisco-snort-3-detection-engine-vulnerability-leaks-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisco-snort.png</image:loc><image:title>Cisco Snort</image:title></image:image><lastmod>2026-01-16T01:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/gitlab-patches-multiple-flaws-allowing-arbitrary-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gitlab.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2026-01-15T01:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/cisa-warns-of-microsoft-powerpoint-code-injection-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-3.png</image:loc><image:title>CISA KEV2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/microsoft-powerpoint.png</image:loc><image:title>Microsoft PowerPoint</image:title></image:image><lastmod>2026-01-15T01:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/linux-battery-utility-vulnerability-allows-authentication-bypass-and-system-tampering/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/linux-1.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2026-01-15T01:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/cisco-ise-vulnerability-let-remote-attacker-access-sensitive-data-public-poc-available/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisco.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-01-15T01:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/ni8mare-vulnerability-let-attackers-hijack-n8n-servers-exploit-released-and-26512-hosts-vulnerable/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/n8n-1.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-01-15T01:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/chatgpt-is-losing-market-share-as-google-gemini-gains-ground/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-2.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chatgpt-4.png</image:loc><image:title>ChatGPT 4</image:title></image:image><lastmod>2026-01-15T01:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/hackers-exploiting-vmware-esxi-instances-in-the-wild-using-zero-day-exploit-toolkit/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/vmware-esxi.png</image:loc><image:title>VMware ESXi</image:title></image:image><lastmod>2026-01-15T01:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/08/cisa-flags-microsoft-office-and-hpe-oneview-bugs-as-actively-exploited/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/cisa-kev2-1.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-15T01:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/vulnerability-in-totolink-range-extender-allows-device-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/totolink.png</image:loc><image:title>Totolink</image:title></image:image><lastmod>2026-01-15T01:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/threat-actors-exploit-google-cloud-services-to-steal-microsoft-365-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gcp-1.png</image:loc><image:title>Google GCP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-gcp.png</image:loc><image:title>Google GCP</image:title></image:image><lastmod>2026-01-15T01:25:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/poc-exploit-released-for-android-linux-kernel-vulnerability-cve-2025-38352/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/linux.png</image:loc><image:title>Linux</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/linux-wallescape.png</image:loc><image:title>Linux WallEscape</image:title></image:image><lastmod>2026-01-14T02:12:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/lockbit-5-0-unveils-advanced-encryption-and-enhanced-anti-analysis-techniques/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/lockbit-5.png</image:loc><image:title>LockBit 5</image:title></image:image><lastmod>2026-01-14T02:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/hackers-using-malicious-imageless-qr-codes-to-render-phishing-attack-via-html-table/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig-1.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-14T02:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/veeam-backup-vulnerability-exposes-systems-to-root-level-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/veeam.png</image:loc><image:title>Veeam</image:title></image:image><lastmod>2026-01-14T02:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/ongoing-attacks-exploiting-critical-rce-vulnerability-in-legacy-d-link-dsl-routers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/d-link.png</image:loc><image:title>D-Link</image:title></image:image><lastmod>2026-01-14T02:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/07/chrome-webview-vulnerability-allows-hackers-to-bypass-security-restrictions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-01-14T02:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/researchers-trap-scattered-lapsus-hunters-in-honeypot/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/resecurity-1.png</image:loc><image:title>Resecurity</image:title></image:image><lastmod>2026-01-14T02:11:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/new-macos-tcc-bypass-vulnerability-allow-attackers-to-access-sensitive-user-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apple.png</image:loc><image:title>Apple</image:title></image:image><lastmod>2026-01-13T01:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/new-n8n-vulnerability-allows-attackers-to-execute-arbitrary-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/n8n.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-01-13T01:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/critical-adonisjs-vulnerability-allow-remote-attacker-to-write-files-on-server/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/adonisjs.png</image:loc><image:title>AdonisJS</image:title></image:image><lastmod>2026-01-13T01:52:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/06/two-chrome-extensions-caught-stealing-chatgpt-and-deepseek-chats-from-900000-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/chrome-extensions-2.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2026-01-13T01:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/profilehound-post-escalation-tool-designed-to-achieve-red-team-objectives/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/profilehound.png</image:loc><image:title>ProfileHound</image:title></image:image><lastmod>2026-01-13T01:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/threat-actor-exploited-multiple-fortiweb-appliances-to-deploy-sliver-c2-for-persistent-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet-1.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-13T01:52:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/ghostcrew-ai-powered-red-team-toolkit-integrating-metasploit-nmap-and-more/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/ghostcrew.png</image:loc><image:title>GHOSTCREW</image:title></image:image><lastmod>2026-01-13T01:52:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/researchers-warn-of-data-exposure-risks-in-claude-chrome-extension/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/claude.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2026-01-13T01:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/threat-actor-allegedly-claim-leak-of-nordvpn-salesforce-database-with-source-codes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/nordvpn.png</image:loc><image:title>NordVPN</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x-3.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-01-13T01:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/multiple-vulnerabilities-in-qnap-tools-let-attackers-obtain-secret-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/qnap.png</image:loc><image:title>QNAP</image:title></image:image><lastmod>2026-01-13T01:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/05/hackers-trapped-in-resecuritys-honeypot-during-targeted-attack-on-employee-network/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/resecurity.png</image:loc><image:title>Resecurity</image:title></image:image><lastmod>2026-01-13T01:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/04/what-is-happening-to-the-internet-in-venezuela-did-the-u-s-use-cyber-capabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x-2.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-01-13T01:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/cyber-risk-in-2026-how-geopolitics-supply-chains-and-shadow-ai-will-test-resilience/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fig2.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2026-01-13T01:34:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/hacker-group-claims-responsibility-for-alleged-tokyo-fm-broadcasting-breach/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/tokyo-fm.png</image:loc><image:title>Tokyo FM</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x-1.png</image:loc><image:title>x</image:title></image:image><lastmod>2026-01-13T01:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/hackers-abusing-google-tasks-notification-for-sophisticated-phishing-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/google-tasks.png</image:loc><image:title>Google Tasks</image:title></image:image><lastmod>2026-01-13T01:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/gnu-wget2-vulnerability-enables-remote-file-overwrite-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/gnu.png</image:loc><image:title>GNU</image:title></image:image><lastmod>2026-01-13T01:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/10000-fortinet-firewalls-still-exposed-to-5-year-old-mfa-bypass-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/x.png</image:loc><image:title>X</image:title></image:image><lastmod>2026-01-09T01:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/02/lessons-from-mongobleed-vulnerability-cve-2025-14847-that-actively-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/mongodb.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-01-09T01:28:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2026/01/01/apache-nuttx-vulnerability-let-attackers-to-crash-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-nuttx.png</image:loc><image:title>Apache NuttX</image:title></image:image><lastmod>2026-01-09T01:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/31/new-cybercrime-tool-errtraffic-enables-automated-clickfix-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/clickfix.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2026-01-09T01:28:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/31/duplicati-free-open-source-backup-client/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/duplicati.png</image:loc><image:title>Duplicati</image:title></image:image><lastmod>2026-01-09T01:28:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/31/neurosploit-v2-launches-as-ai-powered-penetration-testing-framework/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/neurosploit.png</image:loc><image:title>NeuroSploit</image:title></image:image><lastmod>2026-01-09T01:28:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/31/new-open-source-c2-framework-adaptixc2-debuts-with-improved-stability-and-speed/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/adaptix.png</image:loc><image:title>Adaptix</image:title></image:image><lastmod>2026-01-09T01:28:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/31/critical-apache-streampipes-vulnerability-let-attackers-seize-admin-control/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2026/01/apache-streampipes.png</image:loc><image:title>Apache StreamPipes</image:title></image:image><lastmod>2026-01-09T01:28:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/cisa-alerts-on-active-exploitation-of-mongodb-vulnerability-cve-2025-14847/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-12.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-08T01:20:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/critical-ibm-api-connect-flaw-allows-attackers-to-bypass-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ibm.png</image:loc><image:title>IBM</image:title></image:image><lastmod>2026-01-08T01:19:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/emeditor-editor-website-hacked-to-deliver-infostealer-malware-in-supply-chain-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/emeditor.png</image:loc><image:title>EmEditor</image:title></image:image><lastmod>2026-01-08T01:19:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/hackers-infiltrated-maven-central-masquerading-as-a-legitimate-jackson-json-library/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/maven-central.png</image:loc><image:title>Maven Central</image:title></image:image><lastmod>2026-01-08T01:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/critical-smartermail-flaw-allows-attackers-to-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/smartermail.png</image:loc><image:title>SmarterMail</image:title></image:image><lastmod>2026-01-08T01:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/30/mongobleed-detector-launched-to-identify-critical-mongodb-flaw-cve-2025-14847/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mongodb-2.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-01-08T01:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/29/2-5-million-malicious-request-from-hackers-attacking-adobe-coldfusion-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/adobe.png</image:loc><image:title>Adobe</image:title></image:image><lastmod>2026-01-08T01:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/29/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/npm.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2026-01-08T01:19:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/29/hunting-windows-lpe-flaws-through-kernel-drivers-and-named-pipes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/windows-2.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2026-01-07T01:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/29/openai-hardened-chatgpt-atlas-against-prompt-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/openai-chatgpt.png</image:loc><image:title>OpenAI ChatGPT</image:title></image:image><lastmod>2026-01-07T01:30:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/29/hackers-claim-breach-of-wired-database-containing-2-3-million-subscriber-records/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/wired.png</image:loc><image:title>WIRED</image:title></image:image><lastmod>2026-01-07T01:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/28/stolen-lastpass-backups-enable-crypto-theft-through-2025/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/lastpass.png</image:loc><image:title>LastPass</image:title></image:image><lastmod>2026-01-07T01:30:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/28/87000-mongodb-instances-vulnerable-to-mongobleed-flaw-exposed-online-poc-exploit-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mongodb-1.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-01-07T01:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/27/teamviewer-dex-vulnerabilities-let-attackers-trigger-dos-attack-and-expose-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/teamviewer.png</image:loc><image:title>TeamViewer</image:title></image:image><lastmod>2026-01-07T01:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/26/parrot-7-0-released-with-new-penetration-testing-and-ai-tools/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/parrot.png</image:loc><image:title>Parrot</image:title></image:image><lastmod>2026-01-06T01:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/26/critical-langchain-core-vulnerability-exposes-secrets-via-serialization-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/langchain.png</image:loc><image:title>LangChain</image:title></image:image><lastmod>2026-01-06T01:28:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/26/llms-can-assist-with-vulnerability-scoring-but-context-still-matters/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-9.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-06T01:28:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/26/trustwallet-chrome-extension-hacked-users-reporting-millions-in-losses/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/trust-wallet.png</image:loc><image:title>Trust Wallet</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x3.png</image:loc><image:title>X3</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x1.png</image:loc><image:title>X1</image:title></image:image><lastmod>2026-01-06T01:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/hackers-exploiting-three-year-old-fortigate-vulnerability-to-bypass-2fa-on-firewalls/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet-5.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-06T01:28:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/nist-mitre-partner-on-20m-ai-centers-for-manufacturing-and-cybersecurity/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nist.png</image:loc><image:title>NIST</image:title></image:image><lastmod>2026-01-06T01:28:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/exploit-db/</loc><lastmod>2026-01-05T03:13:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/2025/12/24/m-files-vulnerability-allows-attackers-to-steal-active-user-session-tokens/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/m-file.png</image:loc><image:title>M-File</image:title></image:image><lastmod>2026-01-05T03:03:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/nvidia-isaac-vulnerabilities-enable-remote-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nvidia-3.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2026-01-05T03:02:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/top-ransomware-trends-of-2025/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ransomware.live_.png</image:loc><image:title>ransomware.live</image:title></image:image><lastmod>2026-01-05T03:02:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/operation-pcpcat-exploits-next-js-and-react-impacting-59000-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react-next-3.png</image:loc><image:title>React Next</image:title></image:image><lastmod>2026-01-05T03:02:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/five-identity-driven-shifts-reshaping-enterprise-security-in-2026/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-8.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-05T03:02:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/critical-mongodb-flaw-leaks-sensitive-data-through-zlib-compression/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mongodb.png</image:loc><image:title>MongoDB</image:title></image:image><lastmod>2026-01-05T03:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/24/net-snmp-vulnerability-triggers-buffer-overflow-crashing-the-daemon/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/net-snmp.png</image:loc><image:title>Net-SNMP</image:title></image:image><lastmod>2026-01-05T03:02:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/webrat-malware-spread-via-fake-vulnerability-exploits-on-github/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/github-1.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2026-01-05T03:02:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/ai-code-looks-fine-until-the-review-starts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-6.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-05T02:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/spotify-music-library-with-86m-music-files-scraped-by-hacktivist-group/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/spotify.png</image:loc><image:title>Spotify</image:title></image:image><lastmod>2026-01-05T02:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/critical-n8n-vulnerability-exposes-103000-automation-instances-to-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/n8n.png</image:loc><image:title>n8n</image:title></image:image><lastmod>2026-01-05T02:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/cloud-security-is-stuck-in-slow-motion/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-5.png</image:loc><image:title>fig</image:title></image:image><lastmod>2026-01-05T02:44:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/23/malicious-chrome-extensions-as-vpn-intercept-user-traffic-to-steal-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/chrome-2-2.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2026-01-05T02:44:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/poc-exploit-released-for-use-after-free-vulnerability-in-linux-kernel-posix-cpu-timers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/linux-3.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2026-01-05T02:44:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/browser-agents-dont-always-respect-your-privacy-choices/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-7.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/privacy-practices-of-browser-agents.png</image:loc><image:title>Privacy Practices of Browser Agents</image:title></image:image><lastmod>2026-01-05T02:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/docker-open-sources-production-ready-hardened-images-for-free/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/docker-1.png</image:loc><image:title>Docker</image:title></image:image><lastmod>2026-01-05T02:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/125000-ips-watchguard-firebox-devices-exposed-to-internet-vulnerable-to-0-day-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/watchguard-1.png</image:loc><image:title>WatchGuard</image:title></image:image><lastmod>2026-01-05T02:30:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/multiple-exim-server-vulnerabilities-let-attackers-seize-control-of-the-server/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/exim.png</image:loc><image:title>Exim</image:title></image:image><lastmod>2026-01-05T02:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/nissan-discloses-data-breach-linked-to-compromised-red-hat-infrastructure/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nissan.png</image:loc><image:title>Nissan</image:title></image:image><lastmod>2026-01-05T02:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/22/microsoft-brokering-file-system-vulnerability-let-attackers-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft-2.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2026-01-05T02:30:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/21/100-cisco-secure-email-devices-exposed-to-zeroday-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisco-2.png</image:loc><image:title>Cisco</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x-4.png</image:loc><image:title>X</image:title></image:image><lastmod>2026-01-05T02:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/cloud-atlas-exploits-office-vulnerabilities-to-execute-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft-office.png</image:loc><image:title>Microsoft Office</image:title></image:image><lastmod>2026-01-05T02:29:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/new-linux-kernel-rust-vulnerability-triggers-system-crashes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/linux-2.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2026-01-05T02:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/25000-forticloud-sso-enabled-systems-vulnerable-to-remote-exploitation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet-4.png</image:loc><image:title>fortinet</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x-3.png</image:loc><image:title>X</image:title></image:image><lastmod>2026-01-05T02:29:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/new-research-uncovers-the-alliance-between-qilin-dragonforce-and-lockbit/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/qilin-dragonforce-lockbit.png</image:loc><image:title>Qilin DragonForce LockBit</image:title></image:image><lastmod>2026-01-05T02:09:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/new-kibana-vulnerabilities-allow-attackers-to-embed-malicious-scripts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/kibana.png</image:loc><image:title>Kibana</image:title></image:image><lastmod>2026-01-05T02:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/apache-log4j-vulnerability-allow-attackers-to-intercept-sensitive-log-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/log4j.png</image:loc><image:title>Log4j</image:title></image:image><lastmod>2026-01-05T02:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/roundcube-flaws-let-attackers-execute-malicious-scripts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/roundcube.png</image:loc><image:title>Roundcube</image:title></image:image><lastmod>2026-01-05T02:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/hackers-using-putty-for-both-lateral-movement-and-data-exfiltration/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/putty.png</image:loc><image:title>PuTTY</image:title></image:image><lastmod>2026-01-05T02:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/watchguard-zero-day-actively-exploited-to-seize-control-of-firewalls/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/watchguard.png</image:loc><image:title>WatchGuard</image:title></image:image><lastmod>2026-01-05T02:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/19/clop-ransomware-group-exploiting-gladinet-centrestack-servers-to-steal-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/clop.png</image:loc><image:title>Clop</image:title></image:image><lastmod>2026-01-05T02:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/18/u-s-cisa-adds-cisco-sonicwall-and-asus-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-11.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2026-01-05T02:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/18/critical-vulnerability-in-popular-node-js-library-exposes-windows-systems-to-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/node.js_.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2026-01-05T01:56:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/18/hpe-oneview-software-vulnerability-let-attackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/hpe.png</image:loc><image:title>HPE</image:title></image:image><lastmod>2026-01-05T01:54:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/18/critical-apache-commons-text-flaw-lets-hackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-commons-text.png</image:loc><image:title>Apache Commons Text</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-commmons-text.png</image:loc><image:title>Apache Commmons Text</image:title></image:image><lastmod>2026-01-05T01:54:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/18/cisco-unified-contact-center-express-vulnerabilities-enables-remote-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisco-1.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2026-01-05T01:54:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/fortinet-fortiweb-vulnerability-cve-2025-64446-exploited-in-the-wild-for-full-admin-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x-2.png</image:loc><image:title>x</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet-3.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2026-01-05T01:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/sonicwall-fixes-actively-exploited-cve-2025-40602-in-sma-100-appliances/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/sonicwall.png</image:loc><image:title>SonicWall</image:title></image:image><lastmod>2026-01-05T01:54:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/nvidia-isaac-lab-flaw-enables-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nvidia-2.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2026-01-05T01:54:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/askul-data-breach-exposed-over-700000-records-after-ransomware-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/askul.png</image:loc><image:title>Askul</image:title></image:image><lastmod>2026-01-05T01:54:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/chrome-security-update-fixes-remote-code-execution-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/chrome-2-1.png</image:loc><image:title>Chrome 2</image:title></image:image><lastmod>2025-12-29T01:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/cisa-adds-fortinet-vulnerability-to-kev-catalog-after-active-exploitation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-10.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-29T01:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/17/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisco.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-12-29T01:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/llm-driven-automation-a-new-catalyst-for-ransomware-and-raas-ecosystems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/llms-ransomware.png</image:loc><image:title>LLMs &amp; Ransomware</image:title></image:image><lastmod>2025-12-29T01:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/linux-1.png</image:loc><image:title>Linux</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-6.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-29T01:30:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/critical-screenconnect-vulnerability-let-attackers-expose-sensitive-configuration-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/screenconnect.png</image:loc><image:title>ScreenConnect</image:title></image:image><lastmod>2025-12-29T01:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/openshift-gitops-vulnerability-allows-attackers-to-escalate-privileges-to-root/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/openshift.png</image:loc><image:title>OpenShift</image:title></image:image><lastmod>2025-12-29T01:30:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/windows-admin-center-vulnerability-cve-2025-64669-let-attackers-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-12-29T01:30:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/16/critical-fortigate-devices-sso-vulnerabilities-actively-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet-2.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2025-12-26T01:28:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/atlassian-fixed-maximum-severity-flaw-cve-2025-66516-in-apache-tika/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/atlassian.png</image:loc><image:title>Atlassian</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-tika-1.png</image:loc><image:title>Apache Tika</image:title></image:image><lastmod>2025-12-26T01:27:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/u-s-cisa-adds-apple-and-gladinet-centrestack-and-triofox-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-8.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-26T01:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/new-pcpcat-exploiting-react2shell-vulnerability-to-compromise-59000-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-7.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-26T01:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/wireshark-4-6-2-released-with-fix-for-vulnerabilities-and-updated-protocol-support/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/wireshark.png</image:loc><image:title>Wireshark</image:title></image:image><lastmod>2025-12-26T01:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/prometheus-open-source-metrics-and-monitoring-systems-and-services/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/prometheus.png</image:loc><image:title>Prometheus</image:title></image:image><lastmod>2025-12-26T01:27:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/critical-plesk-vulnerability-allows-users-to-gain-root-level-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/plesk.png</image:loc><image:title>Plesk</image:title></image:image><lastmod>2025-12-26T01:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/apache-streampark-vulnerability-let-attackers-access-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-streampark.png</image:loc><image:title>Apache StreamPark</image:title></image:image><lastmod>2025-12-26T01:27:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/freepbx-patches-critical-sqli-file-upload-and-authtype-bypass-flaws-enabling-rce/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/freepbx.png</image:loc><image:title>FreePBX</image:title></image:image><lastmod>2025-12-25T01:30:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/nvidia-merlin-vulnerabilities-allows-malicious-code-execution-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nvidia-1.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-12-25T01:30:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/15/critical-pgadmin-vulnerability-let-attackers-execute-shell-commands-on-the-host/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/postgre-admin.png</image:loc><image:title>Postgre Admin</image:title></image:image><lastmod>2025-12-25T01:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/13/microsoft-bug-bounty-program-expanded-to-third-party-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft-1.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2025-12-25T01:30:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/13/empire-6-3-0-released-as-updated-post-exploitation-framework-for-red-teams/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/empire.png</image:loc><image:title>Empire</image:title></image:image><lastmod>2025-12-25T01:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/13/apple-0-day-vulnerabilities-exploited-in-sophisticated-attacks-targeting-iphone-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apple-ios-1.png</image:loc><image:title>Apple iOS</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apple-ios.png</image:loc><image:title>Apple iOS</image:title></image:image><lastmod>2025-12-25T01:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/13/u-s-cisa-adds-google-chromium-and-sierra-wireless-airlink-aleos-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><lastmod>2025-12-25T01:29:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/13/google-warns-multiple-hacker-groups-are-exploiting-react2shell-to-spread-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-5.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-25T01:29:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/12/kali-linux-2025-4-released-with-3-new-tools-desktop-updates/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/kali-linux.png</image:loc><image:title>Kali Linux</image:title></image:image><lastmod>2025-12-24T01:27:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/12/cisa-warns-of-osgeo-geoserver-0-day-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-24T01:27:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/12/mitre-releases-top-25-most-dangerous-software-weaknesses-of-2025/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mitre-1.png</image:loc><image:title>MITRE</image:title></image:image><lastmod>2025-12-24T01:27:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/12/openai-enhances-defensive-models-to-mitigate-cyber-threats/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/open-ai-1.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-12-24T01:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/brave-browser-starts-testing-agentic-ai-mode-for-automated-tasks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/brave.png</image:loc><image:title>Brave</image:title></image:image><lastmod>2025-12-24T01:27:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/notepad-fixes-flaw-that-let-attackers-push-malicious-update-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/notepad.png</image:loc><image:title>Notepad++</image:title></image:image><lastmod>2025-12-24T01:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/high-severity-jenkins-vulnerability-allows-unauthenticated-dos-via-http-cli/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/jenkins.png</image:loc><image:title>Jenkins</image:title></image:image><lastmod>2025-12-24T01:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/google-alerts-users-to-actively-exploited-chrome-0-day-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/chrome-1-1.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-12-24T01:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/644k-websites-at-risk-due-to-critical-react-server-components-flaw/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-4.png</image:loc><image:title>React2Shell</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x-1.png</image:loc><image:title>x</image:title></image:image><lastmod>2025-12-23T01:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/11/gogs-0-day-vulnerability-exploited-in-the-wild-to-hack-700-instances/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/gogs.png</image:loc><image:title>Gogs</image:title></image:image><lastmod>2025-12-23T01:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/10/u-s-cisa-adds-microsoft-windows-and-winrar-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-4.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-23T01:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/10/threat-actors-exploit-chatgpt-and-grok-conversations-to-deliver-amos-stealer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/openai-grok.png</image:loc><image:title>OpenAI Grok</image:title></image:image><lastmod>2025-12-23T01:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/10/fortisandbox-flaw-allows-os-command-injection-and-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet-1.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2025-12-23T01:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/10/gemini-zero-click-vulnerability-let-attackers-access-gmail-calendar-and-docs/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/google-gemini-2.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-12-23T01:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/10/windows-cloud-files-mini-filter-driver-0-day-exploited-for-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-12-23T01:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/malicious-mcp-servers-enable-stealthy-prompt-injection-to-drain-system-resources/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mcp-2.png</image:loc><image:title>MCP 2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/mcp.png</image:loc><image:title>MCP</image:title></image:image><lastmod>2025-12-23T01:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/ruby-saml-library-vulnerability-let-attackers-bypass-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ruby.png</image:loc><image:title>Ruby</image:title></image:image><lastmod>2025-12-22T01:21:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2025-12-22T01:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/cisa-adds-critical-react2shell-vulnerability-to-kev-catalog-following-active-exploitation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-22T01:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/ivanti-warns-of-critical-endpoint-manager-code-execution-flaw/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2025-12-22T01:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/researchers-find-malicious-vs-code-go-npm-and-rust-packages-stealing-developer-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-2.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-22T01:20:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/burp-suite-upgrades-scanner-with-detection-for-critical-react2shell-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/burp-suite.png</image:loc><image:title>Burp Suite</image:title></image:image><lastmod>2025-12-22T01:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/google-chrome-adds-new-security-layer-for-gemini-ai-agentic-browsing/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/google-gemini-3.png</image:loc><image:title>Google Gemini</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/google-gemini-1.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-12-22T01:20:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/akira-group-targets-hyper-v-and-vmware-esxi-with-ransomware-exploiting-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-4.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig-3.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/akira-2.png</image:loc><image:title>Akira 2</image:title></image:image><lastmod>2025-12-22T01:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/microsoft-december-2025-patch-tuesday-fixes-3-zero-days-57-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2025-12-19T01:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/09/cisa-warns-of-d-link-routers-buffer-overflow-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2-1.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-19T01:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/08/react2shell-vulnerability-under-attack-from-china-nexus-groups/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-2.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-19T01:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/08/netreaper-offensive-security-toolkit-that-wraps-70-penetration-testing-tools/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/netreaper.png</image:loc><image:title>NETREAPER</image:title></image:image><lastmod>2025-12-19T01:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/08/sneeit-wordpress-rce-exploited-in-the-wild-while-ictbroadcast-bug-fuels-frost-botnet-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/ictbroadcast.png</image:loc><image:title>ICTBroadcast</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/wordpress-2-1.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2025-12-19T01:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/08/critical-vulnerabilities-in-github-copilot-gemini-cli-claude-and-other-tools-impact-millions-of-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig2.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2025-12-19T01:19:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/08/next-js-releases-scanner-to-detect-and-fix-apps-affected-by-react2shell-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-3.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-19T01:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/07/lockbit-5-0-infrastructure-exposed-in-new-server-ip-and-domain-leak/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/lockbit-5.png</image:loc><image:title>LockBit 5</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/x.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-12-19T01:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/06/malicious-go-packages-impersonate-googles-uuid-library-to-steal-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/go_2.png</image:loc><image:title>GO_2</image:title></image:image><lastmod>2025-12-18T01:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/06/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/palo-alto-networks.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2025-12-18T01:20:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/06/2-15m-next-js-web-services-exposed-online-active-attacks-reported-update-immediately/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell-1.png</image:loc><image:title>React2Shell</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react-next-2.png</image:loc><image:title>React Next</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/next-js-2.png</image:loc><image:title>Next js</image:title></image:image><lastmod>2025-12-18T01:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/06/researchers-hack-googles-gemini-cli-through-prompt-injections-in-github-actions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/google-gemini.png</image:loc><image:title>Google Gemini</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/next-js-1.png</image:loc><image:title>Next js</image:title></image:image><lastmod>2025-12-18T01:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/zero-click-agentic-browser-attack-can-delete-entire-google-drive-using-crafted-emails/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/comet.png</image:loc><image:title>Comet</image:title></image:image><lastmod>2025-12-18T01:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/cloudflare-outage-caused-by-react2shell-mitigations/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cloudflare-1.png</image:loc><image:title>cloudflare</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react2shell.png</image:loc><image:title>React2Shell</image:title></image:image><lastmod>2025-12-18T01:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/apache-tika-core-flaw-allows-attackers-to-exploit-systems-with-malicious-pdf-uploads/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-tika.png</image:loc><image:title>Apache Tika</image:title></image:image><lastmod>2025-12-18T01:20:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/nvidia-triton-vulnerability-let-attackers-trigger-dos-attack-using-malicious-payload/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nvidia.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-12-18T01:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/avast-antivirus-sandbox-vulnerabilities-allow-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/avast.png</image:loc><image:title>Avast</image:title></image:image><lastmod>2025-12-17T01:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/poc-exploit-released-for-critical-react-next-js-rce-vulnerability-cve-2025-55182/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/next-js.png</image:loc><image:title>Next js</image:title></image:image><lastmod>2025-12-17T01:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/chained-synology-beestation-vulnerabilities-enable-root-privilege-escalation-via-task-scheduler-exploit/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/synology.png</image:loc><image:title>Synology</image:title></image:image><lastmod>2025-12-17T01:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/splunk-enterprise-vulnerabilities-allow-privilege-escalation-via-incorrect-file-permissions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/splunk.png</image:loc><image:title>Splunk</image:title></image:image><lastmod>2025-12-17T01:22:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/prompt-injection-vulnerability-in-github-actions-impacts-multiple-fortune-500-companies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/github.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2025-12-17T01:21:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/cacti-command-injection-vulnerability-let-attackers-execute-malicious-code-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cacti.png</image:loc><image:title>Cacti</image:title></image:image><lastmod>2025-12-17T01:21:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/05/cisa-warns-of-android-0-day-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cisa-kev2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-17T01:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/akamai-patches-http-request-smuggling-vulnerability-in-edge-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/akamai.png</image:loc><image:title>Akamai</image:title></image:image><lastmod>2025-12-17T01:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/critical-react-and-next-js-flaw-lets-remote-attackers-run-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react-next.png</image:loc><image:title>React Next</image:title></image:image><lastmod>2025-12-16T01:40:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/new-scanner-released-to-detect-exposed-reactjs-and-next-js-rsc-endpoints-cve-2025-55182/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/react-next-1.png</image:loc><image:title>React Next</image:title></image:image><lastmod>2025-12-16T01:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/vim-for-windows-vulnerability-let-attackers-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/vim.png</image:loc><image:title>Vim</image:title></image:image><lastmod>2025-12-16T01:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/cloudflare-shielding-nearly-70-of-active-phishing-kits-new-report-reveals/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/cloudflare.png</image:loc><image:title>cloudflare</image:title></image:image><lastmod>2025-12-16T01:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/picklescan-0-day-vulnerabilities-enable-arbitrary-code-execution-via-malicious-pytorch-models/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/picklescan.png</image:loc><image:title>PickleScan</image:title></image:image><lastmod>2025-12-16T01:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/k7-antivirus-flaw-lets-attackers-gain-system-level-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/k7-antivirus.png</image:loc><image:title>K7 Antivirus</image:title></image:image><lastmod>2025-12-16T01:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/04/threat-actors-leveraging-foxit-pdf-reader-to-gain-system-control-and-steal-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/foxit.png</image:loc><image:title>Foxit</image:title></image:image><lastmod>2025-12-16T01:20:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/bpfdoor-and-symbiote-advanced-ebpf-based-rootkits-target-linux-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/linux.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2025-12-16T01:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/critical-elementor-plugin-vulnerability-let-attackers-takeover-wordpress-site-admin-control/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/wordpress-2.png</image:loc><image:title>WordPress 2</image:title></image:image><lastmod>2025-12-15T01:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/chatgpt-down-users-report-outage-worldwide-conversations-disappeared-for-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/chatgpt.png</image:loc><image:title>ChatGPT</image:title></image:image><lastmod>2025-12-15T01:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/multiple-django-vulnerability-expose-applications-to-sql-injection-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/django.png</image:loc><image:title>Django</image:title></image:image><lastmod>2025-12-15T01:20:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/chrome-143-released-with-fix-for-13-vulnerabilities-that-enable-arbitrary-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/chrome-1.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-12-15T01:20:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/03/angular-platform-vulnerability-lets-attackers-execute-code-through-malicious-svg-animations/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/angular.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2025-12-15T01:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/02/openvpn-vulnerabilities-let-hackers-triggers-dos-attack-and-bypass-security-checks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/openvpn.png</image:loc><image:title>OpenVPN</image:title></image:image><lastmod>2025-12-15T01:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/02/nopcommerce-flaw-lets-attackers-access-accounts-using-captured-cookies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/nopcommerce.png</image:loc><image:title>nopCommerce</image:title></image:image><lastmod>2025-12-15T01:19:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/02/apache-struts-flaw-allows-attackers-to-launch-disk-exhaustion-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-struts.png</image:loc><image:title>Apache Struts</image:title></image:image><lastmod>2025-12-15T01:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/openai-codex-cli-command-injection-vulnerability-let-attackers-execute-arbitrary-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/open-ai.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-12-12T01:23:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/devolutions-server-hit-by-sql-injection-flaw-allowing-data-theft/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/devolutions.png</image:loc><image:title>Devolutions</image:title></image:image><lastmod>2025-12-12T01:23:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/microsoft-azure-api-management-flaw-enables-cross-tenant-account-creation-bypassing-admin-restrictions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft-azure.png</image:loc><image:title>Microsoft Azure</image:title></image:image><lastmod>2025-12-12T01:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/critical-apache-brpc-flaw-allows-attackers-to-crash-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/apache-brpc.png</image:loc><image:title>Apache bRPC</image:title></image:image><lastmod>2025-12-12T01:22:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/4-3-million-chrome-and-edge-users-hacked-in-7-year-shadypanda-malware-campaign/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/browsers-2.png</image:loc><image:title>Browsers 2</image:title></image:image><lastmod>2025-12-12T01:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/12/01/poc-exploit-released-for-critical-outlook-0-click-remote-code-execution-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/microsoft-outlook.png</image:loc><image:title>Microsoft Outlook</image:title></image:image><lastmod>2025-12-12T01:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/29/threat-actors-exploit-calendar-subscriptions-for-phishing-and-malware-delivery/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/12/fig.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-12T01:22:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/29/mystery-oast-tool-exploits-200-cves-using-google-cloud-for-large-scale-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/oast.png</image:loc><image:title>OAST</image:title></image:image><lastmod>2025-12-11T01:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/29/leak-confirms-openai-is-preparing-ads-on-chatgpt-for-public-roll-out/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chatgpt-1.png</image:loc><image:title>ChatGPT</image:title></image:image><lastmod>2025-12-11T01:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/29/beware-of-weaponized-google-meet-page-uses-clickfix-technique-to-deliver-malicious-payload/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/google-meet.png</image:loc><image:title>Google Meet</image:title></image:image><lastmod>2025-12-11T01:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/28/public-gitlab-repositories-exposed-more-than-17000-secrets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/gitlab-1.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2025-12-11T01:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/28/thousands-of-sensitive-secrets-published-on-jsonformatter-and-codebeautify/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/json.png</image:loc><image:title>JSON</image:title></image:image><lastmod>2025-12-11T01:20:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/cronos-kicks-off-42k-global-hackathon-focused-on-ai-powered-on-chain-payments/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-10.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-11T01:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/legacy-python-package-vulnerabilities-enable-pypi-attacks-through-domain-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/python.png</image:loc><image:title>Python</image:title></image:image><lastmod>2025-12-11T01:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/prompt-injections-loom-large-over-chatgpts-atlas-browser/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chatgpt-2.png</image:loc><image:title>ChatGPT</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chatgpt.png</image:loc><image:title>ChatGPT</image:title></image:image><lastmod>2025-12-10T02:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/angular-http-client-flaw-leaks-xsrf-tokens-to-attacker-controlled-domains/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/angular.png</image:loc><image:title>Angular</image:title></image:image><lastmod>2025-12-10T02:34:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/asahi-confirms-1-5-million-customers-affected-in-major-cyber-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/asahi.png</image:loc><image:title>Asahi</image:title></image:image><lastmod>2025-12-10T02:34:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/nvidia-dgx-spark-flaws-allow-attackers-to-run-malicious-code-and-launch-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/nvidia-3.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-12-10T02:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/gitlab-patches-multiple-vulnerabilities-that-enable-authentication-bypass-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/gitlab.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2025-12-10T02:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/openai-discloses-mixpanel-data-breach-name-email-address-and-operating-system-details-exposed/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-ai-4.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-12-10T02:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/27/new-unauthenticated-dos-vulnerability-crashes-next-js-servers-with-a-single-request/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/next-js.png</image:loc><image:title>Next js</image:title></image:image><lastmod>2025-12-10T02:33:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/chrome-extension-caught-injecting-hidden-solana-transfer-fees-into-raydium-swaps/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chrome-extensions-2.png</image:loc><image:title>chrome extensions 2</image:title></image:image><lastmod>2025-12-09T01:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/tor-adopts-galois-onion-encryption-to-strengthen-defense-against-online-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/tor-2.png</image:loc><image:title>Tor</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-9.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-09T01:22:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/account-takeover-fraud-caused-262-million-in-losses-in-2025-fbi/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fbi.png</image:loc><image:title>FBI</image:title></image:image><lastmod>2025-12-09T01:22:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/romcom-uses-socgholish-fake-update-attacks-to-deliver-mythic-agent-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-8.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-09T01:22:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/hashjack-a-novel-exploit-leveraging-url-fragments-to-deceive-ai-browsers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/hashjack.png</image:loc><image:title>HashJack</image:title></image:image><lastmod>2025-12-09T01:21:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/hackers-exploit-ntlm-authentication-flaws-to-target-windows-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/ntlm.png</image:loc><image:title>NTLM</image:title></image:image><lastmod>2025-12-09T01:21:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/26/asus-myasus-flaw-lets-hackers-escalate-to-system-level-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/asus-2.png</image:loc><image:title>ASUS</image:title></image:image><lastmod>2025-12-09T01:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/deepseek-r1-makes-code-for-prompts-with-severe-security-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/deepseek.png</image:loc><image:title>DeepSeek</image:title></image:image><lastmod>2025-12-08T01:53:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/25/cobalt-strike-4-12-adds-new-injection-uac-bypasses-c2-features/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cobalt-strike.png</image:loc><image:title>cobalt-strike</image:title></image:image><lastmod>2025-12-08T01:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/25/apache-syncope-flaw-lets-attackers-access-internal-database-content/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/apache-syncope.png</image:loc><image:title>Apache Syncope</image:title></image:image><lastmod>2025-12-08T01:22:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/25/canon-says-subsidiary-impacted-by-oracle-ebs-hack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/canon.png</image:loc><image:title>Canon</image:title></image:image><lastmod>2025-12-08T01:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/25/nvidias-isaac-groot-robotics-platform-vulnerability-let-attackers-inject-malicious-codes/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/nvidia-2.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-12-08T01:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/25/hashicorp-vault-vulnerability-allow-attackers-to-authenticate-to-vault-without-valid-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/hashicorp-vault.png</image:loc><image:title>HashiCorp Vault</image:title></image:image><lastmod>2025-12-08T01:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/vllm-flaw-allows-remote-code-execution-through-malicious-payloads/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/vllm.png</image:loc><image:title>vLLM</image:title></image:image><lastmod>2025-12-08T01:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/windows-5.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-12-08T01:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/wireshark-vulnerabilities-let-attackers-crash-by-injecting-a-malformed-packet/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/wireshark.png</image:loc><image:title>Wireshark</image:title></image:image><lastmod>2025-12-05T01:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/tenda-n300-flaws-allow-attackers-to-run-commands-as-root/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/tenda.png</image:loc><image:title>Tenda</image:title></image:image><lastmod>2025-12-05T01:24:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/clickfix-attack-uses-fake-windows-update-screen-to-push-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/clickfix-2.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2025-12-05T01:24:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/24/poc-published-for-w3-total-cache-flaw-exposing-1m-sites-to-rce/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/w3-total-cache-1.png</image:loc><image:title>W3 Total Cache</image:title></image:image><lastmod>2025-12-05T01:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/23/critical-vulnerability-in-azure-bastion-let-attackers-bypass-authentication-and-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-azure.png</image:loc><image:title>Microsoft Azure</image:title></image:image><lastmod>2025-12-05T01:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/22/metasploit-adds-exploit-module-for-recently-disclosed-fortiweb-0-day-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/metasploit.png</image:loc><image:title>Metasploit</image:title></image:image><lastmod>2025-12-05T01:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/salesforce-alerts-users-to-potential-data-exposure-via-gainsight-oauth-apps/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/salesforce.png</image:loc><image:title>Salesforce</image:title></image:image><lastmod>2025-12-04T03:03:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/cisa-warns-oracle-identity-manager-rce-flaw-is-being-actively-exploited/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-9.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-04T03:03:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/sonicos-sslvpn-vulnerability-let-attackers-crash-the-firewall-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/sonicwall-1.png</image:loc><image:title>SonicWall</image:title></image:image><lastmod>2025-12-04T03:03:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/milvus-proxy-flaw-lets-attackers-forge-headers-and-skip-authorization/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/milvus.png</image:loc><image:title>Milvus</image:title></image:image><lastmod>2025-12-04T03:03:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/grafana.png</image:loc><image:title>Grafana</image:title></image:image><lastmod>2025-12-04T03:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/21/cisa-issues-new-guidance-on-bulletproof-hosting-threat/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/bph.png</image:loc><image:title>BPH</image:title></image:image><lastmod>2025-12-04T03:03:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/supply-chain-breaches-impact-almost-all-firms-globally-bluevoyant-reveals/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-7.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-12-04T03:03:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/over-50000-asus-routers-hacked-in-operation-wrthug/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/asus-1.png</image:loc><image:title>ASUS</image:title></image:image><lastmod>2025-12-03T01:23:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/critical-twonky-server-vulnerabilities-let-attackers-bypass-authentication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/twonky.png</image:loc><image:title>Twonky</image:title></image:image><lastmod>2025-12-03T01:23:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/security-gap-in-perplexitys-comet-browser-exposed-users-to-system-level-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/perplexity.png</image:loc><image:title>Perplexity</image:title></image:image><lastmod>2025-12-03T01:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/critical-n-able-n-central-vulnerabilities-allow-attacker-to-interact-with-legacy-apis-and-read-sensitive-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/n-able.png</image:loc><image:title>N-able</image:title></image:image><lastmod>2025-12-03T01:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/w3-total-cache-security-vulnerability-exposes-one-million-wordpress-sites-to-rce/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/w3-total-cache.png</image:loc><image:title>W3 Total Cache</image:title></image:image><lastmod>2025-12-03T01:22:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/cisa-warns-of-google-chrome-0-day-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-8.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-03T01:22:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/solarwinds-patches-three-critical-serv-u-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/solarwinds.png</image:loc><image:title>SolarWinds</image:title></image:image><lastmod>2025-12-03T01:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/hackers-attacking-palo-alto-networks-globalprotect-vpn-portals-with-2-3-million-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/palo-alto-networks-1.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2025-12-02T01:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/threat-actors-allegedly-selling-microsoft-office-0-day-rce-vulnerability-on-hacking-forums/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-office.png</image:loc><image:title>Microsoft Office</image:title></image:image><lastmod>2025-12-02T01:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/malicious-free-vpn-extension-with-9-million-installs-hijacks-traffic-and-steals-browsing-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/free-vpn.png</image:loc><image:title>Free VPN</image:title></image:image><lastmod>2025-12-02T01:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/cline-ai-coding-agent-vulnerabilities-enables-prompt-injection-code-execution-and-data-leakage/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cline-ai.png</image:loc><image:title>Cline AI</image:title></image:image><lastmod>2025-12-02T01:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/ollama-flaws-let-hackers-run-any-code-using-malicious-model-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/ollama.png</image:loc><image:title>Ollama</image:title></image:image><lastmod>2025-12-02T01:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/20/gartner-40-of-firms-to-be-hit-by-shadow-ai-security-incidents/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/gartner-1.png</image:loc><image:title>Gartner</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/gartner.png</image:loc><image:title>gartner</image:title></image:image><lastmod>2025-12-02T01:19:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/can-a-global-decentralized-system-save-cve-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cves.png</image:loc><image:title>CVEs</image:title></image:image><lastmod>2025-12-02T01:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-to-mimic-the-browser-address-bar/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig2.png</image:loc><image:title>fig2</image:title></image:image><lastmod>2025-12-01T01:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/microsoft-investigating-copilot-issue-on-processing-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-copilot.png</image:loc><image:title>Microsoft Copilot</image:title></image:image><lastmod>2025-12-01T01:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/servicenow-ai-agents-can-be-tricked-into-acting-against-each-other-via-second-order-prompts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/servicenow.png</image:loc><image:title>servicenow</image:title></image:image><lastmod>2025-12-01T01:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/hackers-actively-exploiting-7-zip-rce-vulnerability-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/7-zip.png</image:loc><image:title>7-Zip</image:title></image:image><lastmod>2025-12-01T01:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/cloudflare-outage-jolts-the-internet-what-happened-and-who-was-hit/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cloudflare.png</image:loc><image:title>cloudflare</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/x-2.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-12-01T01:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/19/cisa-warns-of-fortinet-fortiweb-os-command-injection-vulnerability-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-7.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-12-01T01:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/18/senators-expect-10-year-extension-of-cyber-data-sharing-law-in-future-budget-package/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/usa.png</image:loc><image:title>USA</image:title></image:image><lastmod>2025-12-01T01:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/18/chrome-type-confusion-zero-day-vulnerability-actively-exploited-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chrome-1-2.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-11-28T01:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/the-next-tech-divide-is-written-in-ai-diffusion/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft_ai_diffusion_trends.webp</image:loc><image:title>microsoft_AI_diffusion_trends</image:title></image:image><lastmod>2025-11-28T01:22:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/new-evalusion-clickfix-campaign-delivers-amatera-stealer-and-netsupport-rat/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/clickfix-1.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2025-11-28T01:22:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/ibm-aix-vulnerabilities-let-remote-attacker-execute-arbitrary-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/ibm.png</image:loc><image:title>IBM</image:title></image:image><lastmod>2025-11-28T01:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/google-gemini-3-spotted-on-ai-studio-ahead-of-imminent-release/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/google-gemini-2.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-11-28T01:22:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/threat-actors-can-use-xanthorox-ai-tool-to-generate-different-malicious-code-based-on-prompts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/xanthorox.png</image:loc><image:title>Xanthorox</image:title></image:image><lastmod>2025-11-28T01:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/hackers-use-rogue-mcp-server-to-inject-malicious-code-and-control-the-cursors-built-in-browser/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cursor.png</image:loc><image:title>Cursor</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/mcp.png</image:loc><image:title>MCP</image:title></image:image><lastmod>2025-11-28T01:22:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/17/how-do-ai-driven-security-systems-keep-up-with-new-threats/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/ai-nhi.png</image:loc><image:title>AI NHI</image:title></image:image><lastmod>2025-11-27T01:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/15/rondodox-exploits-unpatched-xwiki-servers-to-pull-more-devices-into-its-botnet/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/xwiki-1.png</image:loc><image:title>XWiki</image:title></image:image><lastmod>2025-11-27T01:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/15/akira-raas-targets-nutanix-vms-threatens-critical-orgs/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/akira-2.png</image:loc><image:title>Akira 2</image:title></image:image><lastmod>2025-11-27T01:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/15/critical-pgadmin4-vulnerability-lets-attackers-execute-remote-code-on-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/postgre-admin.png</image:loc><image:title>Postgre Admin</image:title></image:image><lastmod>2025-11-27T01:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/15/us-cisa-adds-fortinet-fortiweb-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-6.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-27T01:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/critical-cve-2025-59367-flaw-lets-hackers-access-asus-dsl-routers-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/asus.png</image:loc><image:title>ASUS</image:title></image:image><lastmod>2025-11-27T01:20:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/critical-zoho-analytics-plus-flaw-allows-attackers-to-run-arbitrary-sql-queries/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/zoho.png</image:loc><image:title>Zoho</image:title></image:image><lastmod>2025-11-27T01:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/multiple-cisco-unified-ccx-vulnerabilities-enable-arbitrary-command-execution-by-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco-4.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-11-26T01:18:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/nvidia-nemo-framework-vulnerabilities-allows-code-injection-and-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/nvidia-1.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-11-26T01:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/critical-imunify360-vulnerability-exposes-millions-of-linux-hosted-sites-to-rce-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/imunify360.png</image:loc><image:title>Imunify360</image:title></image:image><lastmod>2025-11-26T01:17:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/hackers-flooded-npm-registry-over-43000-spam-packages-survived-for-almost-two-years/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/npm-2.png</image:loc><image:title>npm</image:title></image:image><lastmod>2025-11-26T01:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/cisco-catalyst-center-vulnerability-allows-attackers-to-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco-3.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-11-26T01:17:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/chinese-hackers-automate-cyber-attacks-with-ai-powered-claude-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-6.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/claude-3.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2025-11-26T01:17:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/fortiweb-authentication-bypass-vulnerability-exploited-script-to-detect-vulnerable-appliances/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/x.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-11-26T01:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/hackers-actively-exploiting-cisco-and-citrix-0-days-in-the-wild-to-deploy-webshell/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco-ctrix.png</image:loc><image:title>Cisco Ctrix</image:title></image:image><lastmod>2025-11-25T01:49:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/14/cl0p-ransomware-group-allegedly-claims-breach-of-entrust-in-oracle-0-day-ebs-hack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/oracle.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-11-25T01:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/13/malicious-npm-package-with-206k-downloads-targeting-github-repositories-to-steal-tokens/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/github.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2025-11-25T01:39:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/13/u-s-cisa-adds-watchguard-firebox-microsoft-windows-and-gladinet-triofox-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-25T01:39:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/13/kibana-vulnerabilities-expose-systems-to-ssrf-and-xss-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/kibana.png</image:loc><image:title>Kibana</image:title></image:image><lastmod>2025-11-25T01:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/13/palo-alto-pan-os-firewall-vulnerability-let-attackers-reboot-firewall-by-sending-malicious-packet/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/palo-alto-networks.png</image:loc><image:title>Palo Alto Networks</image:title></image:image><lastmod>2025-11-25T01:38:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/13/critical-dell-data-lakehouse-flaw-allows-remote-attackers-to-escalate-privileges/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/dell.png</image:loc><image:title>Dell</image:title></image:image><lastmod>2025-11-25T01:38:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/lite-xl-vulnerability-allows-attackers-to-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/lite-xl.png</image:loc><image:title>Lite XL</image:title></image:image><lastmod>2025-11-25T01:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/multiple-apache-openoffice-vulnerabilities-leads-to-memory-corruption-and-unauthorized-content-loading/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/apache-openoffice-1.png</image:loc><image:title>Apache OpenOffice</image:title></image:image><lastmod>2025-11-25T01:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/hackers-exploit-ssrf-flaw-in-custom-gpts-to-steal-chatgpt-secrets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-ai-3.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-11-25T01:25:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/citrix-netscaler-adc-and-gateway-vulnerability-enables-cross-site-scripting-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/citrix2.png</image:loc><image:title>Citrix2</image:title></image:image><lastmod>2025-11-25T01:24:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/tor-browser-15-0-1-update-patches-several-high-risk-security-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/tor-1.png</image:loc><image:title>Tor</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/tor.png</image:loc><image:title>Tor</image:title></image:image><lastmod>2025-11-25T01:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/securevibes-ai-tool-scans-for-vulnerabilities-in-11-languages-with-claude-ai-agents/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/securevibes.png</image:loc><image:title>SecureVibes</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/claude-2.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2025-11-25T01:24:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/windows-kernel-0-day-under-active-exploitation-for-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/windows-3.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-25T01:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/12/chrome-patches-high-severity-implementation-vulnerability-in-v8-javascript-engine/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chrome-1-1.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-11-21T01:27:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/ivanti-endpoint-manager-vulnerabilities-let-attackers-write-files-anywhere-on-target-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2025-11-21T01:27:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/synology-beestation-0-day-vulnerability-let-remote-attackers-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/synology.png</image:loc><image:title>Synology</image:title></image:image><lastmod>2025-11-21T01:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/watchguard-firebox-flaw-allows-attackers-to-gain-unauthorized-ssh-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/firebox.png</image:loc><image:title>Firebox</image:title></image:image><lastmod>2025-11-21T01:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/sap-security-update-patch-for-critical-vulnerabilities-allowing-code-execution-and-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/sap-2.png</image:loc><image:title>SAP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/sap-1.png</image:loc><image:title>SAP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/sap.png</image:loc><image:title>SAP</image:title></image:image><lastmod>2025-11-21T01:27:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/devolutions-server-flaw-allows-attackers-to-impersonate-users-via-pre-mfa-cookie/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/devolutions.png</image:loc><image:title>Devolutions</image:title></image:image><lastmod>2025-11-21T01:26:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/65-of-top-ai-firms-found-exposing-verified-api-keys-and-tokens-on-github/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-4.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-11-21T01:26:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/hackers-exploiting-triofox-0-day-vulnerability-to-execute-malicious-payload-abusing-anti-virus-feature/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/triofox.png</image:loc><image:title>Triofox</image:title></image:image><lastmod>2025-11-20T01:21:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/zoom-vulnerabilities-let-attackers-bypass-access-controls-to-access-session-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/zoom.png</image:loc><image:title>Zoom</image:title></image:image><lastmod>2025-11-20T01:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/11/microsoft-november-2025-patch-tuesday-fixes-1-zero-day-63-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2025-11-20T01:21:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/hackgpt-launches-as-ai-driven-penetration-testing-suite-using-gpt-4-and-other-models/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/hackgpt.png</image:loc><image:title>HackGPT</image:title></image:image><lastmod>2025-11-20T01:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/googles-gemini-deep-research-tool-gains-access-to-gmail-chat-and-drive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/google-gemini-1.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-11-20T01:21:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/popular-npm-library-used-in-ai-and-nlp-projects-exposes-systems-to-rce/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/javascript.png</image:loc><image:title>JavaScript</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/npm-1.png</image:loc><image:title>npm</image:title></image:image><lastmod>2025-11-20T01:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/owasp-top-10-2025-revised-version-released-with-two-new-categories/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-5.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/owasp-2.png</image:loc><image:title>OWASP 2</image:title></image:image><lastmod>2025-11-20T01:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/monsta-web-based-ftp-remote-code-execution-vulnerability-exploited/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/monsta.png</image:loc><image:title>Monsta</image:title></image:image><lastmod>2025-11-19T01:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/elastic-defend-for-windows-vulnerability-allows-threat-actors-to-gain-elevated-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/elastic.png</image:loc><image:title>Elastic</image:title></image:image><lastmod>2025-11-19T01:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/critical-runc-vulnerabilities-put-docker-and-kubernetes-container-isolation-at-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/runc.png</image:loc><image:title>runc</image:title></image:image><lastmod>2025-11-19T01:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/langgraph-deserialization-flaw-enables-execution-of-malicious-python-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/langgraph.png</image:loc><image:title>LangGraph</image:title></image:image><lastmod>2025-11-19T01:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/10/ai-chat-privacy-at-risk-microsoft-details-whisper-leak-side-channel-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-3.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-11-19T01:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/08/ai-powered-cyber-threats-rise-attackers-target-manufacturing-sector/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-2.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-11-19T01:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/08/threat-actors-leveraging-rdp-credentials-to-deploy-cephalus-ransomware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/rdp.png</image:loc><image:title>RDP</image:title></image:image><lastmod>2025-11-19T01:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/threat-actors-may-abuse-vs-code-extensions-to-deploy-ransomware-and-use-github-as-c2-server/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-vscode-1.png</image:loc><image:title>Microsoft VSCode</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-vscode.png</image:loc><image:title>Microsoft VSCode</image:title></image:image><lastmod>2025-11-18T01:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/i-paid-twice-scam-infects-booking-com-users-with-purerat-via-clickfix/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/booking.png</image:loc><image:title>Booking</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/booking.com_.png</image:loc><image:title>Booking.com</image:title></image:image><lastmod>2025-11-18T01:20:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/qnap-fixes-seven-nas-zero-day-flaws-exploited-at-pwn2own/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/qnap.png</image:loc><image:title>QNAP</image:title></image:image><lastmod>2025-11-18T01:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/15-weaponized-npm-packages-attacking-windows-systems-to-deliver-vidar-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/npm.png</image:loc><image:title>npm</image:title></image:image><lastmod>2025-11-18T01:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/attackers-upgrade-clickfix-with-tricks-used-by-online-stores/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/clickfix.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2025-11-18T01:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/amazon-workspaces-for-linux-vulnerability-exposes-valid-auth-tokens-to-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/aws.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2025-11-18T01:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/nvidia-nvapp-for-windows-vulnerability-let-attackers-execute-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/nvidia.png</image:loc><image:title>Nvidia</image:title></image:image><lastmod>2025-11-18T01:20:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/07/opnsense-firewall-update-addresses-multiple-security-issues-and-enhances-features/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/opnsense.png</image:loc><image:title>OPNsense</image:title></image:image><lastmod>2025-11-17T01:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/list-of-ai-tools-promoted-by-threat-actors-in-underground-forums-and-their-capabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-11-17T01:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/cisco-uccx-vulnerabilities-allow-remote-attackers-to-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco-2.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-11-17T01:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/critical-rce-vulnerabilities-in-claude-desktop-let-attackers-execute-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/claude-1.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2025-11-17T01:25:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/sonicwall-confirms-state-sponsored-hackers-behind-the-massive-firewall-backup-breach/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/sonicwall.png</image:loc><image:title>SonicWall</image:title></image:image><lastmod>2025-11-17T01:25:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/multiple-django-flaws-could-allow-sql-injection-and-denial-of-service-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/django.png</image:loc><image:title>Django</image:title></image:image><lastmod>2025-11-17T01:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/google-warns-of-new-promptflux-malware-using-gemini-api-to-rewrite-its-own-source-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/google-gemini.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-11-17T01:25:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/cisco-confirms-active-exploitation-of-secure-asa-and-ftd-rce-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco-1.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-11-14T01:23:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/06/chrome-emergency-update-to-patch-multiple-vulnerabilities-that-enable-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/chrome-1.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-11-14T01:23:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/cisa-warns-of-control-web-panel-os-command-injection-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-3.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-14T01:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/clop-ransomware-group-exploits-new-0-day-vulnerabilities-in-active-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/clop.png</image:loc><image:title>Clop</image:title></image:image><lastmod>2025-11-14T01:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/hackedgpt-7-new-vulnerabilities-in-gpt-4o-and-gpt-5-enables-0-click-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-ai-2.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-11-14T01:22:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/attackers-exploit-microsoft-teams-flaws-to-manipulate-messages-and-fake-notifications/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-twams-2.png</image:loc><image:title>Microsoft Twams</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-twams-1.png</image:loc><image:title>Microsoft Twams</image:title></image:image><lastmod>2025-11-14T01:22:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/hackers-abuse-onedrive-exe-via-dll-sideloading-to-run-malicious-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-onedrive.png</image:loc><image:title>Microsoft OneDrive</image:title></image:image><lastmod>2025-11-14T01:22:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/cisa-issues-alert-on-gladinet-centrestack-and-triofox-vulnerabilities-under-active-exploitation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2-2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-13T01:22:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/05/jupyter-misconfiguration-flaw-allow-attackers-to-escalate-privileges-as-root-user/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/jupyter.png</image:loc><image:title>Jupyter</image:title></image:image><lastmod>2025-11-13T01:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/04/weaponized-putty-and-teams-ads-deliver-malware-allowing-hackers-to-access-network/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/fig-1.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/putty.png</image:loc><image:title>PuTTY</image:title></image:image><lastmod>2025-11-13T01:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/04/sesameop-using-the-openai-assistants-api-for-covert-c2-communication/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-ai-1.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-11-13T01:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/04/critical-wordpress-post-smtp-plugin-vulnerability-puts-400000-sites-at-risk-of-account-takeover/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/wordpress.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2025-11-13T01:21:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/04/hackers-actively-scanning-internet-to-exploit-xwiki-remote-code-execution-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/xwiki.png</image:loc><image:title>XWiki</image:title></image:image><lastmod>2025-11-13T01:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/hackers-can-manipulate-claude-ai-apis-with-indirect-prompts-to-steal-user-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/claude.png</image:loc><image:title>Claude</image:title></image:image><lastmod>2025-11-13T01:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/new-bof-tool-exploits-microsoft-teams-cookie-encryption-allowing-attackers-to-access-user-chats/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/microsoft-twams.png</image:loc><image:title>Microsoft Twams</image:title></image:image><lastmod>2025-11-12T01:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/hackers-actively-scanning-tcp-ports-8530-8531-for-wsus-cve-2025-59287/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/windows-2.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-12T01:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/beware-of-new-phishing-attack-that-abuses-cloudflare-and-zendesk-pages-to-steal-logins/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/phishing.png</image:loc><image:title>Phishing</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/tw.png</image:loc><image:title>TW</image:title></image:image><lastmod>2025-11-12T01:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/open-vsx-registry-responds-to-leaked-tokens-and-malicious-extension-incident/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-vsx.png</image:loc><image:title>Open VSX</image:title></image:image><lastmod>2025-11-12T01:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/03/proton-warns-of-300-million-stolen-login-details-circulating-on-dark-web/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/proton.png</image:loc><image:title>proton</image:title></image:image><lastmod>2025-11-12T01:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/01/google-confirms-ai-search-will-have-ads-but-they-may-look-different/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/google.png</image:loc><image:title>Google</image:title></image:image><lastmod>2025-11-12T01:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/01/cisco-ios-xe-vulnerability-being-abused-in-the-wild-to-plant-badcandy/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisco.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-11-12T01:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/11/01/akira-ransomware-allegedly-claims-theft-of-23gb-in-apache-openoffice-breach/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/apache-openoffice.png</image:loc><image:title>Apache OpenOffice</image:title></image:image><lastmod>2025-11-11T01:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/31/unpatched-windows-vulnerability-continues-to-be-exploited-by-apts-cve-2025-9491/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-11T01:21:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/31/openai-unveils-aardvark-gpt-5-agent-that-finds-and-fixes-code-flaws-automatically/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/open-ai.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-11-11T01:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/31/threat-actors-exploit-lanscope-endpoint-manager-zero-day-vulnerability-to-steal-confidential-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/lanscope.png</image:loc><image:title>LANSCOPE</image:title></image:image><lastmod>2025-11-11T01:21:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/31/progress-patches-moveit-transfer-uncontrolled-resource-consumption-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/progress-moveit.png</image:loc><image:title>Progress MOVEit</image:title></image:image><lastmod>2025-11-11T01:20:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/31/attackers-exploit-windows-server-update-services-flaw-to-steal-sensitive-organizational-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-11T01:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/u-s-cisa-adds-xwiki-platform-and-broadcom-vmware-aria-operations-and-vmware-tools-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/11/cisa-kev2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-11T01:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/wordpress-plugin-vulnerability-lets-attackers-read-any-server-file/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/wordpress-3.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2025-11-10T01:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/critical-redishell-rce-vulnerability-threatens-8500-redis-deployments-worldwide/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/redis-2.png</image:loc><image:title>redis</image:title></image:image><lastmod>2025-11-10T01:19:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/multiple-jenkins-vulnerability-saml-authentication-bypass-and-mcp-server-plugin-permissions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/jenkins.png</image:loc><image:title>Jenkins</image:title></image:image><lastmod>2025-11-10T01:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/new-brash-exploit-crashes-chromium-browsers-instantly-with-a-single-malicious-url/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chromium.png</image:loc><image:title>Chromium</image:title></image:image><lastmod>2025-11-10T01:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/chrome-142-released-with-fix-for-20-vulnerabilities-that-allows-malicious-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-7.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-11-10T01:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/new-malware-infects-woocommerce-sites-through-fake-plugins-to-steal-credit-card-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/woocommerce.png</image:loc><image:title>WooCommerce</image:title></image:image><lastmod>2025-11-10T01:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/microsoft-windows-cloud-files-minifilter-privilege-escalation-vulnerability-exploited/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/windows-4.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-10T01:18:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/phantomraven-attack-discovered-in-126-malicious-npm-packages-exceeding-86000-downloads/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/npm-2.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2025-11-10T01:18:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/29/wordpress-plugin-vulnerability-exposes-7-million-sites-to-xss-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/wordpress-2.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2025-11-09T06:59:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/30/cisa-alerts-on-active-exploitation-of-wsus-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/windows-3.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-07T01:24:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/x-to-phase-out-twitter-domain-users-advised-to-re-enroll-in-2fa-keys/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/tw-to-x.png</image:loc><image:title>TW to X</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/x2.png</image:loc><image:title>X2</image:title></image:image><lastmod>2025-11-07T01:24:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/filefix-cache-smuggling-a-new-evasion-combo/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/filefix-cache-smuggling.png</image:loc><image:title>FileFix + Cache Smuggling</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/filefix.png</image:loc><image:title>FileFix</image:title></image:image><lastmod>2025-11-07T01:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/ubuntus-kernel-vulnerability-let-attackers-escalate-privileges-and-gain-root-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/ubuntu.png</image:loc><image:title>Ubuntu</image:title></image:image><lastmod>2025-11-07T01:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/ipfire-2-29-released-with-enhanced-intrusion-prevention-system-reporting/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/ipfire.png</image:loc><image:title>IPFire</image:title></image:image><lastmod>2025-11-07T01:23:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/xwiki-rce-vulnerability-actively-exploted-in-wild-to-deliver-coinminer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/xwiki.png</image:loc><image:title>XWiki</image:title></image:image><lastmod>2025-11-07T01:23:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/new-phishing-attack-using-invisible-characters-hidden-in-subject-line-using-mime-encoding/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-outlook-1.png</image:loc><image:title>Microsoft Outlook</image:title></image:image><lastmod>2025-11-07T01:23:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/mozilla-wants-all-new-firefox-extensions-to-disclose-data-collection-policies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/firefox.png</image:loc><image:title>Firefox</image:title></image:image><lastmod>2025-11-06T01:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/google-denies-claims-of-gmail-security-breach-impacting-millions/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/google-gmail-1.png</image:loc><image:title>Google Gmail</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/x-3.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-11-06T01:19:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/critical-qnap-net-flaw-lets-attackers-bypass-security-protections/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/qnap-2.png</image:loc><image:title>QNAP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/qnap-1.png</image:loc><image:title>QNAP</image:title></image:image><lastmod>2025-11-06T01:19:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/first-zero-click-attack-exploits-mcp-and-connected-popular-ai-agents-to-exfiltrate-data-silently/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/mcp-1.png</image:loc><image:title>MCP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/google-gmail.png</image:loc><image:title>Google Gmail</image:title></image:image><lastmod>2025-11-06T01:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/apache-tomcat-flaws-allow-remote-code-execution-on-vulnerable-servers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/apache-tomcat.png</image:loc><image:title>Apache Tomcat</image:title></image:image><lastmod>2025-11-06T01:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/openvpn-vulnerability-exposes-linux-macos-systems-to-script-injection-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/openvpn.png</image:loc><image:title>OpenVPN</image:title></image:image><lastmod>2025-11-06T01:18:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/28/gamaredon-phishing-campaign-exploits-winrar-vulnerability-to-target-government-agencies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/winrar-1.png</image:loc><image:title>WinRAR</image:title></image:image><lastmod>2025-11-06T01:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/critical-hashicorp-vault-vulnerabilities-allow-authentication-bypass-and-dos-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/hashicorp-vault.png</image:loc><image:title>HashiCorp Vault</image:title></image:image><lastmod>2025-11-06T01:18:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/81-router-usres-have-not-changed-default-admin-passwords-exposing-devices-to-hackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/router.png</image:loc><image:title>Router</image:title></image:image><lastmod>2025-11-05T01:20:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/dependency-track-open-source-component-analysis-platform/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/dependency-track.png</image:loc><image:title>Dependency-Track</image:title></image:image><lastmod>2025-11-05T01:20:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/hackers-exploiting-microsoft-wsus-vulnerability-in-the-wild-2800-instances-exposed-online/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/windows-2.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-11-05T01:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/chatgpt-atlas-browser-can-be-tricked-by-fake-urls-into-executing-hidden-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/open-ai.png</image:loc><image:title>Open AI</image:title></image:image><lastmod>2025-11-05T01:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/critical-dell-storage-manager-vulnerabilities-let-attackers-compromise-system/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/dell.png</image:loc><image:title>Dell</image:title></image:image><lastmod>2025-11-05T01:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/critical-chrome-0-day-under-attack-mem3nt0-mori-hackers-actively-exploiting-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-6.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-11-05T01:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/qilin-ransomware-exploits-mspaint-and-notepad-to-locate-sensitive-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/qilin-ransomware-2.png</image:loc><image:title>Qilin Ransomware 2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/qilin-ransomware-1.png</image:loc><image:title>Qilin Ransomware</image:title></image:image><lastmod>2025-11-05T01:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/27/new-cophish-attack-exploits-copilot-studio-to-exfiltrate-oauth-tokens/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-copilot-1.png</image:loc><image:title>Microsoft Copilot</image:title></image:image><lastmod>2025-11-05T01:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/25/hackers-exploit-wordpress-arbitrary-installation-vulnerabilities-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/wordpress-1.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2025-11-04T01:51:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/25/706000-bind-9-resolver-instances-vulnerable-to-cache-poisoning-exposed-online-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/bind-9-1.png</image:loc><image:title>BIND 9</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/x-2.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-11-04T01:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/25/hackers-use-clickfix-technique-to-deploy-netsupport-rat-loaders/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/clickfix.png</image:loc><image:title>ClickFix</image:title></image:image><lastmod>2025-11-04T01:51:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/24/microsoft-boosts-windows-security-by-disabling-file-previews-for-downloads/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig4.png</image:loc><image:title>fig4</image:title></image:image><lastmod>2025-11-04T01:51:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/24/new-phishing-wave-uses-oauth-prompts-to-take-over-microsoft-accounts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oauth-2.png</image:loc><image:title>OAuth 2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oauth.png</image:loc><image:title>OAuth</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/x-1.png</image:loc><image:title>X</image:title></image:image><lastmod>2025-11-04T01:50:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/24/new-pdf-tool-to-detect-malicious-pdf-using-pdf-object-hashing-technique/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/pdf-1.png</image:loc><image:title>PDF</image:title></image:image><lastmod>2025-11-04T01:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/24/iis-servers-hijacked-via-exposed-asp-net-machine-keys-malicious-modules-injected-in-the-wild/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-iis.png</image:loc><image:title>Microsoft IIS</image:title></image:image><lastmod>2025-11-04T01:50:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/24/u-s-cisa-adds-microsoft-wsus-and-adobe-commerce-and-magento-open-source-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-7.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-11-04T01:50:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/bind-9-vulnerabilities-expose-dns-servers-to-cache-poisoning-and-dos/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/bind-9.png</image:loc><image:title>BIND 9</image:title></image:image><lastmod>2025-11-04T01:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/active-exploits-target-magento-and-adobe-commerce-rce-attackers-inject-webshells/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/magento.png</image:loc><image:title>Magento</image:title></image:image><lastmod>2025-11-04T01:33:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/multiple-oracle-vm-virtualbox-vulnerabilities-enable-complete-takeover-of-virtualbox/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oracle-6.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-11-04T01:33:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/jira-vulnerability-lets-attackers-alter-files-accessible-to-the-jira-jvm-process/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/jira.png</image:loc><image:title>Jira</image:title></image:image><lastmod>2025-11-04T01:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/tarmageddon-flaw-in-async-tar-rust-library-allows-to-smuggle-extra-archives-when-the-library-is-processing-nested-tar-files/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig-3.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-11-04T01:33:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/23/perplexitys-comet-browser-screenshot-feature-vulnerability-let-attackers-inject-malicious-prompts/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/perplexity.png</image:loc><image:title>Perplexity</image:title></image:image><lastmod>2025-11-04T01:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/critical-argument-injection-vulnerability-in-popular-ai-agents-let-attackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/trailofbits.png</image:loc><image:title>trailofbits</image:title></image:image><lastmod>2025-11-04T01:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/multiple-gitlab-security-vulnerabilities-let-attackers-trigger-dos-condition/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/gitlab-1.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2025-11-04T01:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/bitter-apt-exploits-winrar-zero-day-through-malicious-word-files-to-steal-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/winrar.png</image:loc><image:title>WinRAR</image:title></image:image><lastmod>2025-10-31T01:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/critical-vulnerability-in-mcp-server-platform-exposes-3000-servers-and-thousands-of-api-keys/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/smithery-mcp.png</image:loc><image:title>Smithery MCP</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/mcp.png</image:loc><image:title>MCP</image:title></image:image><lastmod>2025-10-31T01:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/chinese-hackers-using-toolshell-vulnerability-to-compromise-networks-of-government-agencies/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-sharepoint.png</image:loc><image:title>Microsoft SharePoint</image:title></image:image><lastmod>2025-10-31T01:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/critical-vulnerability-in-oracle-e-business-suites-marketing-product-allows-full-access-to-attackers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oracle-5.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-10-31T01:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/threat-actors-compromise-xubuntu-website-to-deliver-malicious-windows-executable/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/xubuntu.png</image:loc><image:title>xubuntu</image:title></image:image><lastmod>2025-10-31T01:27:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/vidar-stealer-exploits-direct-memory-attacks-used-to-capture-browser-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/vidar-stealer.png</image:loc><image:title>Vidar Stealer</image:title></image:image><lastmod>2025-10-31T01:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/chrome-v8-javascript-engine-vulnerability-let-attackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-5.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-10-31T01:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/22/openfga-the-open-source-engine-redefining-access-control/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/openfga.png</image:loc><image:title>OpenFGA</image:title></image:image><lastmod>2025-10-31T01:26:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/lanscope-endpoint-manager-flaw-allows-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/lanscope.png</image:loc><image:title>LANSCOPE</image:title></image:image><lastmod>2025-10-30T01:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/apache-syncope-groovy-flaw-allows-remote-code-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/apache-syncope.png</image:loc><image:title>Apache Syncope</image:title></image:image><lastmod>2025-10-30T01:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/better-auth-api-keys-vulnerability-let-attackers-create-privileged-credentials-for-arbitrary-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/better-auth.png</image:loc><image:title>Better Auth</image:title></image:image><lastmod>2025-10-30T01:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/microsoft-365-copilot-flaw-lets-hackers-steal-sensitive-data-via-indirect-prompt-injection/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-copilot.png</image:loc><image:title>Microsoft Copilot</image:title></image:image><lastmod>2025-10-30T01:19:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/zyxel-authorization-bypass-vulnerability-let-attackers-view-and-download-system-configuration/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/zyxel.png</image:loc><image:title>Zyxel</image:title></image:image><lastmod>2025-10-30T01:19:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/adaptixc2-emerges-in-npm-supply-chain-exploit-against-developers/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/npm-1.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2025-10-30T01:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/21/critical-asp-net-vulnerability-allows-attacker-to-bypass-security-feature-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-asp.net_.png</image:loc><image:title>Microsoft ASP.NET</image:title></image:image><lastmod>2025-10-30T01:18:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/ai-driven-social-engineering-top-cyber-threat-for-2026-isaca-survey-reveals/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig-4.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-10-30T01:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/19/poc-exploit-released-for-linux-pam-vulnerability-allowing-root-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/linux-3.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2025-10-29T01:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/salt-typhoon-uses-citrix-flaw-in-global-cyber-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/citrix2.png</image:loc><image:title>Citrix2</image:title></image:image><lastmod>2025-10-29T01:20:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/retail-giant-muji-halts-online-sales-after-ransomware-attack-on-supplier/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig2.png</image:loc><image:title>fig2</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig-2.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/muji.png</image:loc><image:title>Muji</image:title></image:image><lastmod>2025-10-29T01:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/131-malicious-chrome-extensions-discovered-targeting-whatsapp-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-4.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-10-29T01:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/poc-exploit-released-for-windows-server-update-services-remote-code-execution-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-windows.png</image:loc><image:title>Microsoft Windows</image:title></image:image><lastmod>2025-10-29T01:20:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/20/five-new-exploited-bugs-land-in-cisas-catalog-oracle-and-microsoft-among-targets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-6.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-10-29T01:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/18/winos-4-0-hackers-expand-to-japan-and-malaysia-with-new-malware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/winos.png</image:loc><image:title>Winos</image:title></image:image><lastmod>2025-10-29T01:20:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/18/poc-exploit-for-7-zip-vulnerabilities-that-allows-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/7-zip-1.png</image:loc><image:title>7-Zip</image:title></image:image><lastmod>2025-10-29T01:20:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/18/critical-zimbra-ssrf-flaw-exposes-sensitive-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/zimbra-1.png</image:loc><image:title>Zimbra</image:title></image:image><lastmod>2025-10-28T01:19:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/leaks-in-microsoft-vs-code-marketplace-put-supply-chain-at-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft-vscode.png</image:loc><image:title>Microsoft VSCode</image:title></image:image><lastmod>2025-10-28T01:19:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/hackers-using-tiktok-videos-to-deploy-self-compiling-malware-that-leverages-powershell-for-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/tiktok.png</image:loc><image:title>TikTok</image:title></image:image><lastmod>2025-10-28T01:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/cisco-ios-and-ios-xe-software-vulnerabilities-let-attackers-execute-remote-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisco-3.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-10-28T01:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/windows-rust-kernel-gdi-vulnerability-leads-to-crash-and-blue-screen-of-death-error/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/windows-1.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-10-28T01:19:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/attackers-exploit-zendesk-authentication-issue-to-flood-targets-inboxes-with-corporate-notifications/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/zendesk.png</image:loc><image:title>Zendesk</image:title></image:image><lastmod>2025-10-28T01:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/over-269000-f5-devices-exposed-online-after-major-breach-u-s-faces-largest-risk/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/x.png</image:loc><image:title>x</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/f5-2.png</image:loc><image:title>F5</image:title></image:image><lastmod>2025-10-28T01:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/critical-connectwise-vulnerabilities-allow-attackers-to-inject-malicious-updates/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/connectwise-1.png</image:loc><image:title>ConnectWise</image:title></image:image><lastmod>2025-10-28T01:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/monthly/monthly-pickup2025-10/</loc><lastmod>2025-10-27T07:03:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://iototsecnews.jp/2025/10/17/cisco-desk-ip-and-video-phones-vulnerable-to-remote-dos-and-xss-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisco-2.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-10-27T01:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/watchguard-vpn-flaw-allows-remote-attackers-to-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/watchguard.png</image:loc><image:title>WatchGuard</image:title></image:image><lastmod>2025-10-27T01:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/17/f5-released-security-updates-covering-multiple-products-following-recent-hack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/f5-1.png</image:loc><image:title>F5</image:title></image:image><lastmod>2025-10-27T01:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/cisa-warns-of-adobe-experience-manager-forms-0-day-vulnerability-exploited-in-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-4.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-10-27T01:19:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/qilin-ransomware-leverages-ghost-bulletproof-hosting-for-global-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/qilin-ransomware.png</image:loc><image:title>Qilin Ransomware</image:title></image:image><lastmod>2025-10-27T01:19:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/critical-apache-activemq-vulnerability-let-attackers-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/apache-activemq.png</image:loc><image:title>Apache ActiveMQ</image:title></image:image><lastmod>2025-10-27T01:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/critical-samba-rce-vulnerability-enables-arbitrary-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/samba.png</image:loc><image:title>Samba</image:title></image:image><lastmod>2025-10-27T01:19:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/malicious-ivanti-vpn-client-sites-in-google-search-deliver-malware-users-warned/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/ivanti-efbc92-1.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2025-10-27T01:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/hackers-breach-f5-and-stole-big-ip-source-code-and-undisclosed-vulnerability-data/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/f5.png</image:loc><image:title>F5</image:title></image:image><lastmod>2025-10-24T03:20:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/16/u-s-cisa-adds-skysea-client-view-rapid7-velociraptor-microsoft-windows-and-igel-os-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-5.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-10-24T01:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/hackers-registered-13000-unique-domains-and-leverages-cloudflare-to-launch-clickfix-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cloudflare.png</image:loc><image:title>cloudflare</image:title></image:image><lastmod>2025-10-24T01:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/hackers-exploit-windows-remote-access-connection-manager-0-day-in-ongoing-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/windows.png</image:loc><image:title>Windows</image:title></image:image><lastmod>2025-10-24T01:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/cisco-snmp-0-day-vulnerability-actively-exploited-to-deploy-linux-rootkits/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisco-1.png</image:loc><image:title>Cisco</image:title></image:image><lastmod>2025-10-24T01:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/critical-veeam-backup-rce-vulnerabilities-let-attackers-execute-malicious-code-remotely/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/veeam.png</image:loc><image:title>Veeam</image:title></image:image><lastmod>2025-10-24T01:20:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/chrome-use-after-free-vulnerability-let-attackers-execute-arbitrary-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-3.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-10-24T01:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/15/telegram-becomes-the-nerve-center-for-modern-hacktivist-operations/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/telegram.png</image:loc><image:title>Telegram</image:title></image:image><lastmod>2025-10-24T01:20:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/researchers-warn-of-widespread-rdp-attacks-by-100k-node-botnet/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/rdp.png</image:loc><image:title>RDP</image:title></image:image><lastmod>2025-10-24T01:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/fortipam-and-fortiswitch-manager-vulnerability-let-attackers-bypass-authentication-process/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fortinet-1.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2025-10-23T01:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/ivanti-patches-13-endpoint-manager-flaws-allowing-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/ivanti-efbc92.png</image:loc><image:title>Ivanti ２</image:title></image:image><lastmod>2025-10-23T01:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/elastic-cloud-enterprise-vulnerability-let-attackers-execute-malicious-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/elastic.png</image:loc><image:title>Elastic</image:title></image:image><lastmod>2025-10-23T01:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/sap-netweaver-memory-corruption-flaw-lets-attackers-send-corrupted-logon-tickets/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/sap.png</image:loc><image:title>SAP</image:title></image:image><lastmod>2025-10-23T01:29:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/screenconnect-abused-by-threat-actors-to-gain-unauthorized-remote-access-to-your-computer/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/connectwise.png</image:loc><image:title>ConnectWise</image:title></image:image><lastmod>2025-10-23T01:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/poc-released-for-sudo-chroot-flaw-allowing-local-privilege-escalation/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/linux-sudo-1.png</image:loc><image:title>Linux Sudo</image:title></image:image><lastmod>2025-10-23T01:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/fortios-cli-command-bypass-vulnerability-let-attacker-execute-system-commands/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fortinet.png</image:loc><image:title>fortinet</image:title></image:image><lastmod>2025-10-23T01:28:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/14/microsoft-october-2025-patch-tuesday-fixes-6-zero-days-172-flaws/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/microsoft.png</image:loc><image:title>Microsoft</image:title></image:image><lastmod>2025-10-23T01:28:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/13/linux-kernel-6-18-rc1-released-with-extensive-updates-following-a-steady-merge-window/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/linux-2.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2025-10-22T01:27:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/13/hackers-claim-massive-salesforce-breach-1-billion-records-stolen/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/salesforce-2.png</image:loc><image:title>Salesforce</image:title></image:image><lastmod>2025-10-22T01:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/13/hackers-leveraging-microsoft-edge-internet-explorer-mode-to-gain-access-to-users-devices/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/edge-ie.png</image:loc><image:title>Edge IE</image:title></image:image><lastmod>2025-10-22T01:27:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/13/axis-communications-vulnerability-exposes-azure-storage-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/axis.png</image:loc><image:title>Axis</image:title></image:image><lastmod>2025-10-22T01:27:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/12/threat-actors-exploit-discord-webhooks-for-c2-via-npm-pypi-and-ruby-packages/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/discord-2.png</image:loc><image:title>Discord</image:title></image:image><lastmod>2025-10-22T01:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/12/another-remotely-exploitable-oracle-ebs-vulnerability-requires-your-attention-cve-2025-61884/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oracle-4.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-10-22T01:27:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/11/cve-2025-11371-unpatched-zero-day-in-gladinet-centrestack-triofox-under-attack/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/gladinet.png</image:loc><image:title>Gladinet</image:title></image:image><lastmod>2025-10-22T01:27:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/11/new-stealit-malware-exploits-node-js-extensions-to-target-windows-systems/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/node.js_.png</image:loc><image:title>NODE.js</image:title></image:image><lastmod>2025-10-22T01:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/11/new-kali-tool-llm-tools-nmap-uses-nmap-for-network-scanning-capabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/kali-nmap.png</image:loc><image:title>Kali nmap</image:title></image:image><lastmod>2025-10-21T01:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/175-malicious-npm-packages-with-26000-downloads-attacking-technology-and-energy-companies-worldwide/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/npm.png</image:loc><image:title>NPM</image:title></image:image><lastmod>2025-10-21T01:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/sonicwall-ssl-vpn-devices-targeted-by-threat-actors-to-distribute-akira-ransomware/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/sonicwall-1.png</image:loc><image:title>sonicwall</image:title></image:image><lastmod>2025-10-21T01:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/google-warns-of-cl0p-ransomware-group-actively-exploiting-oracle-e-business-suite-zero-day/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oracle-3.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-10-21T01:24:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/7-zip-vulnerabilities-allowing-remote-code-execution/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/7-zip.png</image:loc><image:title>7-Zip</image:title></image:image><lastmod>2025-10-21T01:24:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/critical-github-copilot-vulnerability-let-attackers-exfiltrate-source-code-from-private-repos/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/github.png</image:loc><image:title>GitHub</image:title></image:image><lastmod>2025-10-21T01:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/10/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig.png</image:loc><image:title>fig</image:title></image:image><lastmod>2025-10-21T01:24:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/hackers-targeting-wordpress-plugin-vulnerability-to-seize-admin-access/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/wordpress.png</image:loc><image:title>Wordpress</image:title></image:image><lastmod>2025-10-21T01:24:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/virustotal-introduces-simplified-platform-access-and-new-contributor-model/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/virustotal.png</image:loc><image:title>VirusTotal</image:title></image:image><lastmod>2025-10-20T01:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/crowdstrike-falcon-windows-sensor-vulnerability-let-attackers-execute-code-and-delete-files-on-host/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/crowdstrike.png</image:loc><image:title>CrowdStrike</image:title></image:image><lastmod>2025-10-20T01:25:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/gitlab-releases-security-update-to-patch-multiple-dos-enabling-vulnerabilities/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/gitlab.png</image:loc><image:title>GitLab</image:title></image:image><lastmod>2025-10-20T01:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/linux-kernel-ksmbd-filesystem-vulnerability-exploited-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/fig-1.png</image:loc><image:title>fig</image:title></image:image><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/linux-1.png</image:loc><image:title>Linux</image:title></image:image><lastmod>2025-10-20T01:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/09/threat-actors-steal-firewall-configs-impacting-all-sonicwall-cloud-backup-users/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/sonicwall.png</image:loc><image:title>sonicwall</image:title></image:image><lastmod>2025-10-20T01:25:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/hackers-exploit-wordpress-sites-to-power-next-gen-clickfix-phishing-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-20T01:25:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/googles-new-ai-agent-codemender-automatically-rewrites-vulnerable-code/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/codemender.png</image:loc><image:title>CodeMender</image:title></image:image><lastmod>2025-10-20T01:25:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/poc-exploit-released-for-critical-vulnerabilities-in-lua-engine/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/redis-1.png</image:loc><image:title>redis</image:title></image:image><lastmod>2025-10-20T01:24:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/clamav-1-5-0-released-with-new-ms-office-and-pdf-verification-feature/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/clamav.png</image:loc><image:title>ClamAV</image:title></image:image><lastmod>2025-10-17T01:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/aws-client-vpn-for-macos-hit-by-critical-privilege-escalation-vulnerability/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/aws-1.png</image:loc><image:title>AWS</image:title></image:image><lastmod>2025-10-17T01:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/freepbx-sql-injection-vulnerability-leads-to-database-tampering/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/freepbx.png</image:loc><image:title>FreePBX</image:title></image:image><lastmod>2025-10-17T01:24:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/08/multiple-chrome-vulnerabilities-expose-users-to-arbitrary-code-execution-attacks/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/chrome-1-2.png</image:loc><image:title>Chrome 1</image:title></image:image><lastmod>2025-10-17T01:23:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/google-wont-fix-new-ascii-smuggling-attack-in-gemini/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/google-gemini-1.png</image:loc><image:title>Google Gemini</image:title></image:image><lastmod>2025-10-17T01:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/u-s-cisa-adds-synacor-zimbra-collaboration-suite-zcs-flaw-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-2.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-10-17T01:23:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/kibana-crowdstrike-connector-flaw-exposes-sensitive-credentials/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/kibana.png</image:loc><image:title>Kibana</image:title></image:image><lastmod>2025-10-17T01:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/cl0p-ransomware-actively-exploiting-oracle-e-business-suite-0-day/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/oracle-2.png</image:loc><image:title>Oracle</image:title></image:image><lastmod>2025-10-17T01:23:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/openssh-vulnerability-exploited-via-proxycommand-to-execute-remote-code-poc-released/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/openssh.png</image:loc><image:title>OpenSSH</image:title></image:image><lastmod>2025-10-16T01:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp/2025/10/07/u-s-cisa-adds-oracle-mozilla-microsoft-windows-linux-kernel-and-microsoft-ie-flaws-to-its-known-exploited-vulnerabilities-catalog/</loc><image:image><image:loc>https://iototsecnews.jp/wp-content/uploads/2025/10/cisa-kev2-1.png</image:loc><image:title>CISA KEV2</image:title></image:image><lastmod>2025-10-16T01:14:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://iototsecnews.jp</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-03T01:18:51+00:00</lastmod></url></urlset>
