<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://dailydeveloperinsights.tech</loc>
<lastmod>2026-04-20T03:17:36.833Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/about</loc>
<lastmod>2026-04-20T03:17:36.833Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/privacy</loc>
<lastmod>2026-04-20T03:17:36.833Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/terms</loc>
<lastmod>2026-04-20T03:17:36.833Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/search</loc>
<lastmod>2026-04-20T03:17:36.833Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more</loc>
<lastmod>2026-04-18T00:08:36.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs</loc>
<lastmod>2026-04-18T00:08:07.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
<lastmod>2026-04-18T00:07:57.839Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows</loc>
<lastmod>2026-04-18T01:20:46.836Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers</loc>
<lastmod>2026-04-18T00:08:22.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials</loc>
<lastmod>2026-04-18T00:05:42.355Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture</loc>
<lastmod>2026-04-10T04:02:49.180Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</loc>
<lastmod>2026-04-09T12:02:58.604Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit</loc>
<lastmod>2026-04-09T04:02:42.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners</loc>
<lastmod>2026-04-08T23:50:53.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips</loc>
<lastmod>2026-04-07T20:02:58.690Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations</loc>
<lastmod>2026-04-06T20:02:20.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass</loc>
<lastmod>2026-04-06T12:20:46.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories</loc>
<lastmod>2026-04-06T13:00:55.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks</loc>
<lastmod>2026-04-04T23:13:29.582Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug</loc>
<lastmod>2026-04-04T23:39:47.927Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks</loc>
<lastmod>2026-04-04T23:12:10.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing</loc>
<lastmod>2026-04-04T23:18:07.979Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
<lastmod>2026-04-04T23:13:55.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-don-t-see-it-coming</loc>
<lastmod>2026-04-08T15:47:29.799Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels</loc>
<lastmod>2026-04-04T23:14:53.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion</loc>
<lastmod>2026-04-02T09:14:19.200Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</loc>
<lastmod>2026-04-02T09:14:37.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leaks</loc>
<lastmod>2026-04-02T09:45:06.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more</loc>
<lastmod>2026-04-02T09:13:43.670Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks</loc>
<lastmod>2026-04-02T09:47:48.759Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website</loc>
<lastmod>2026-04-02T09:22:56.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories</loc>
<lastmod>2026-03-29T20:02:09.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks</loc>
<lastmod>2026-03-28T20:02:23.335Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites</loc>
<lastmod>2026-03-28T12:03:14.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/we-are-at-war</loc>
<lastmod>2026-03-27T20:02:43.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-manager</loc>
<lastmod>2026-03-27T12:03:13.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-warns-irs-phishing-hits-29-000-users-deploys-rmm-malware</loc>
<lastmod>2026-03-27T08:29:36.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials</loc>
<lastmod>2026-03-27T08:30:28.629Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths</loc>
<lastmod>2026-04-02T05:46:52.898Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware</loc>
<lastmod>2026-03-27T08:30:37.324Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages</loc>
<lastmod>2026-04-04T02:57:54.945Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover</loc>
<lastmod>2026-03-27T08:32:53.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure</loc>
<lastmod>2026-03-23T20:02:28.532Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks</loc>
<lastmod>2026-03-23T12:04:05.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks</loc>
<lastmod>2026-03-23T04:02:32.090Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials</loc>
<lastmod>2026-03-23T11:09:13.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8</loc>
<lastmod>2026-03-20T20:02:07.363Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers</loc>
<lastmod>2026-04-04T05:49:24.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewels</loc>
<lastmod>2026-03-20T09:40:31.235Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/glassworm-supply-chain-attack-abuses-72-open-vsx-extensions-to-target-developers</loc>
<lastmod>2026-03-20T11:17:04.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce</loc>
<lastmod>2026-03-20T09:37:08.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exploit</loc>
<lastmod>2026-04-06T04:50:05.933Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/claude-code-security-and-magecart-getting-the-threat-model-right</loc>
<lastmod>2026-03-20T13:15:12.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-attacks</loc>
<lastmod>2026-03-20T09:36:41.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-exploit</loc>
<lastmod>2026-03-17T20:03:22.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malware</loc>
<lastmod>2026-03-17T12:03:43.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting-india</loc>
<lastmod>2026-03-17T04:02:49.371Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days</loc>
<lastmod>2026-03-16T12:03:03.793Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/meta-to-shut-down-instagram-end-to-end-encrypted-chat-support-starting-may-2026</loc>
<lastmod>2026-03-16T04:02:29.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credentials</loc>
<lastmod>2026-03-15T20:02:08.478Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/chrome-extension-turns-malicious-after-ownership-transfer-enabling-code-injection-and-data-theft</loc>
<lastmod>2026-03-15T12:03:44.448Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/attackers-don-t-just-send-phishing-emails-they-weaponize-your-soc-s-workload</loc>
<lastmod>2026-03-15T04:02:25.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-flags-actively-exploited-n8n-rce-bug-as-24-700-instances-remain-exposed</loc>
<lastmod>2026-04-05T15:14:08.294Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/researchers-trick-perplexity-s-comet-ai-browser-into-phishing-scam-in-under-four-minutes</loc>
<lastmod>2026-03-13T20:02:34.720Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crackdown</loc>
<lastmod>2026-03-13T12:02:14.959Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-exploited</loc>
<lastmod>2026-04-05T19:15:47.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-queries</loc>
<lastmod>2026-03-12T20:02:03.164Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-adds-actively-exploited-vmware-aria-operations-flaw-cve-2026-22719-to-kev-catalog</loc>
<lastmod>2026-03-12T04:02:20.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work-device</loc>
<lastmod>2026-03-11T20:02:23.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle-east-conflict</loc>
<lastmod>2026-03-11T04:01:56.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog</loc>
<lastmod>2026-03-10T04:03:16.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux</loc>
<lastmod>2026-03-09T20:02:25.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fbi-and-europol-seize-leakbase-forum-used-to-trade-stolen-credentials</loc>
<lastmod>2026-03-09T12:02:40.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-4-6-ai-model</loc>
<lastmod>2026-03-09T05:24:17.485Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations</loc>
<lastmod>2026-03-08T20:02:20.678Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets</loc>
<lastmod>2026-03-08T12:02:05.303Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-reveals-clickfix-campaign-using-windows-terminal-to-deploy-lumma-stealer</loc>
<lastmod>2026-03-08T18:42:03.010Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks</loc>
<lastmod>2026-03-23T07:43:48.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement</loc>
<lastmod>2026-03-08T18:39:12.112Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-develops-merkle-tree-certificates-to-enable-quantum-resistant-https-in-chrome</loc>
<lastmod>2026-03-08T18:39:30.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-drive-c2</loc>
<lastmod>2026-03-08T18:32:03.943Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged</loc>
<lastmod>2026-03-04T13:02:20.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor</loc>
<lastmod>2026-03-13T06:20:25.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemini-panel</loc>
<lastmod>2026-03-13T22:54:18.223Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/microsoft-warns-developers-of-fake-next-js-job-repos-delivering-in-memory-malware</loc>
<lastmod>2026-03-16T01:43:38.285Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more</loc>
<lastmod>2026-03-13T22:55:08.552Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries</loc>
<lastmod>2026-03-13T21:12:29.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb</loc>
<lastmod>2026-03-13T21:40:08.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026</loc>
<lastmod>2026-03-02T05:02:55.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-scams</loc>
<lastmod>2026-04-02T05:59:31.097Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/slh-offers-500-1-000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks</loc>
<lastmod>2026-03-01T16:18:34.786Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15-stories</loc>
<lastmod>2026-03-01T16:18:18.810Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens</loc>
<lastmod>2026-02-28T14:59:26.392Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/roguepilot-flaw-in-github-codespaces-enabled-copilot-to-leak-github-token</loc>
<lastmod>2026-04-05T13:01:15.632Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cline-cli-2-3-0-supply-chain-attack-installed-openclaw-on-developer-systems</loc>
<lastmod>2026-02-28T07:22:51.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fbi-reports-1-900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025</loc>
<lastmod>2026-04-10T06:20:14.407Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/aeternum-c2-botnet-stores-encrypted-commands-on-polygon-blockchain-to-evade-takedown</loc>
<lastmod>2026-04-08T05:53:00.944Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence</loc>
<lastmod>2026-03-13T13:42:15.735Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-malware</loc>
<lastmod>2026-03-25T13:25:56.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/cisa-confirms-active-exploitation-of-filezen-cve-2026-25108-vulnerability</loc>
<lastmod>2026-04-02T22:55:36.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware</loc>
<lastmod>2026-02-25T00:01:31.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates</loc>
<lastmod>2026-04-06T17:40:41.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024</loc>
<lastmod>2026-04-03T13:43:14.898Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-orgs</loc>
<lastmod>2026-04-06T04:09:31.395Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-history</loc>
<lastmod>2026-02-25T07:04:02.280Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/interpol-operation-red-card-2-0-arrests-651-in-african-cybercrime-crackdown</loc>
<lastmod>2026-02-27T07:56:06.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/3-ways-to-start-your-intelligent-workflow-program</loc>
<lastmod>2026-04-09T18:04:50.371Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users</loc>
<lastmod>2026-03-31T19:25:32.202Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning</loc>
<lastmod>2026-02-22T23:36:57.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-support</loc>
<lastmod>2026-02-28T10:17:35.394Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://dailydeveloperinsights.tech/blog/ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries-qffipe</loc>
<lastmod>2026-02-22T15:11:45.786Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
