<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://news.kiantechnologies.in/</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/contact</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/about</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/advertise</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/privacy</loc>
    <lastmod>2026-04-03</lastmod>
    <priority>1.00</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/apple-patches-critical-webkit-vulnerability-safeguarding-ios-and-macos-against-same-origin-policy-bypass-1773914641</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ubuntu-vulnerability-cve-2026-3888-exploited-for-root-access-via-systemd-cleanup-timing-1773914635</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/exposing-attack-paths-to-crown-jewels-a-deep-dive-into-mesh-csma-1773914631</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/9-critical-ip-kvm-vulnerabilities-expose-systems-to-unauthenticated-root-access-1773914627</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uncovering-hidden-threats-magecart-payloads-in-favicon-exif-data-1773914622</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unpatched-telnetd-vulnerability-exposes-systems-to-unauthenticated-root-rce-1773914617</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/interlock-ransomware-exploits-cisco-fmc-zero-day-for-root-access-a-cyber-security-threat-alert-1773914612</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/north-korean-it-workers-sanctioned-for-funding-wmd-programs-through-fake-remote-jobs-1773914607</loc>
    <lastmod>2026-03-18</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/urgent-security-patches-issued-for-zimbra-and-sharepoint-protect-your-systems-now-1773914601</loc>
    <lastmod>2026-03-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unveiling-darksword-the-ios-exploit-kit-wielding-6-flaws-and-3-zero-days-for-total-device-control-1773914596</loc>
    <lastmod>2026-03-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cisco-sd-wan-zero-day-vulnerability-a-looming-threat-to-enterprise-networks-1772206718</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/malicious-stripeapi-nuget-package-a-threat-to-financial-sector-s-api-security-1772206714</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-exposes-coordinated-campaign-targeting-developers-with-malicious-next-js-repositories-1772206710</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/prepare-for-post-quantum-cryptography-pqc-expert-insights-on-future-proofing-your-cybersecurity-1772206706</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unseen-dangers-kali-linux-chrome-exploits-and-winrar-vulnerabilities-threaten-cybersecurity-1772206690</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uat-10027-campaign-unleashes-dohdoor-backdoor-on-us-education-and-healthcare-1772206686</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/aeternum-c2-botnet-the-blockchain-powered-threat-to-cybersecurity-1772206681</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/meta-takes-down-celeb-bait-scammers-a-global-cybersecurity-effort-1772206676</loc>
    <lastmod>2026-02-27</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/trojanized-gaming-tools-the-hidden-threat-to-your-online-security-1772206672</loc>
    <lastmod>2026-02-27</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/scarcruft-s-latest-campaign-how-north-korean-hackers-breach-air-gapped-networks-with-zoho-workdrive-and-usb-malware-1772206668</loc>
    <lastmod>2026-02-27</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/massiv-android-malware-fake-iptv-apps-target-mobile-banking-users</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ai-powered-attacks-how-exposed-cloud-workloads-collapse-response-windows</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/openssl-rce-and-foxit-0-days-navigating-the-latest-cyber-threat-landscape</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-patches-high-severity-privilege-escalation-vulnerability-in-windows-admin-center</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/interpol-operation-red-card-2-0-651-arrests-in-african-cybercrime-crackdown</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/android-malware-exploits-gemini-ai-uncovering-the-threat-of-promptspy</loc>
    <lastmod>2026-02-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/former-google-engineers-indicted-for-alleged-trade-secret-theft-and-transfer-to-iran</loc>
    <lastmod>2026-02-20</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fbi-warns-of-surge-in-atm-jackpotting-incidents-20m-lost-in-2025</loc>
    <lastmod>2026-02-20</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ukrainian-national-sentenced-for-role-in-north-korea-it-worker-fraud-scheme</loc>
    <lastmod>2026-02-20</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/identity-cyber-scores-revolutionizing-cyber-insurance-with-enhanced-risk-assessment</loc>
    <lastmod>2026-02-20</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uncovering-zerodayrat-the-stealthy-mobile-spyware-threatening-android-and-ios-devices</loc>
    <lastmod>2026-02-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/lithuania-prepares-for-ai-driven-cyber-fraud-building-a-safe-and-inclusive-e-society-1771342218</loc>
    <lastmod>2026-02-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-attack-trends-how-small-gaps-become-big-threats</loc>
    <lastmod>2026-02-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cloud-password-managers-exposed-25-password-recovery-attacks-revealed</loc>
    <lastmod>2026-02-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/infostealer-targets-openclaw-ai-the-new-frontier-of-data-breaches</loc>
    <lastmod>2026-02-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/apple-rolls-out-end-to-end-encrypted-rcs-messaging-in-ios-26-4-developer-beta</loc>
    <lastmod>2026-02-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ai-hijacking-how-legitimate-businesses-are-manipulating-chatbot-recommendations</loc>
    <lastmod>2026-02-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unlocking-network-threat-hunting-a-deep-dive-into-ndr-systems</loc>
    <lastmod>2026-02-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/accelerating-cloud-breach-investigations-with-ai-and-context-a-modern-soc-approach</loc>
    <lastmod>2026-02-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uncovering-the-smartloader-attack-how-trojanized-oura-mcp-servers-deploy-stealc-infostealer</loc>
    <lastmod>2026-02-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/single-threat-actor-dominates-ivanti-rce-attacks-83-exploitation-rate-uncovered</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beware-of-lottery-scams-protect-your-money</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beware-of-lottery-scams-protect-yourself-from-fraud</loc>
    <lastmod>2026-02-01</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beware-of-gift-card-scams-protect-yourself-from-financial-loss</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/gift-card-scam-alert-protect-yourself-from-phishing-attacks</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/protect-yourself-from-banking-otp-scams</loc>
    <lastmod>2025-08-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beware-of-fake-charity-scams</loc>
    <lastmod>2025-11-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/protect-yourself-from-app-store-fraud</loc>
    <lastmod>2025-09-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/investment-ponzi-scheme-alert</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/phpmyfaq-2-9-8-vulnerability-understanding-the-cross-site-request-forgery-csrf-threat</loc>
    <lastmod>2025-12-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/phpmyfaq-2-9-8-vulnerability-understanding-the-cross-site-request-forgery-csrf-threat</loc>
    <lastmod>2025-12-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-php-code-execution-vulnerability-discovered-in-pluck-4-7-7-dev2</loc>
    <lastmod>2025-12-08</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/esm-dev-136-vulnerability-understanding-the-path-traversal-exploit</loc>
    <lastmod>2025-12-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-vulnerability-discovered-in-summar-employee-portal-3-98-0-authenticated-sql-injection</loc>
    <lastmod>2025-12-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/freebsd-rtsold-vulnerability-remote-code-execution-via-dnssl</loc>
    <lastmod>2025-12-25</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unauthenticated-insecure-direct-object-reference-vulnerability-in-chained-quiz-1-3-5</loc>
    <lastmod>2025-12-25</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-glibc-2-38-buffer-overflow-vulnerability-understanding-the-risks-and-mitigations</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/windows-10-vulnerability-exposed-spoofing-flaw-in-10-0-17763-7009-version</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/motioneye-0-43-1b4-vulnerability-remote-code-execution-risk</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/crypto-theft-attacks-threat-actors-target-trezor-and-ledger-users-with-snail-mail-scam</loc>
    <lastmod>2026-02-14</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/exposing-malicious-ai-powered-chrome-extensions-300k-users-at-risk</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uncovering-the-amos-infostealer-how-macos-users-are-being-targeted-through-ai-apps</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-rce-vulnerability-found-in-wpvivid-backup-migration-plugin-over-900-000-wordpress-sites</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/odido-data-breach-6-2-million-customers-personal-info-exposed-in-massive-cyber-attack</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/romania-s-oil-pipeline-operator-conpet-hit-by-qilin-ransomware-what-you-need-to-know</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/windows-lnk-spoofing-issues-understanding-the-latest-vulnerabilities</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beyondtrust-rce-flaw-under-active-exploitation-patch-immediately</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/bitwarden-unveils-cupid-vault-revolutionizing-secure-password-sharing</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/russia-s-cyber-attack-on-whatsapp-and-telegram-a-communication-blockade</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-resolves-browser-blocking-bug-in-family-safety-service</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cisa-warns-of-critical-microsoft-sccm-flaw-exploited-in-ongoing-cyber-attacks</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ibm-qradar-integration-with-criminal-ip-revolutionizing-threat-intelligence</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/luxury-fashion-brands-slapped-with-25-million-fine-for-data-breaches-a-wake-up-call-for-cybersecur</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/mac-infostealers-spread-via-clickfix-attack-claude-llm-artifacts-abused</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/north-korean-threat-actors-target-developers-with-malicious-coding-challenges</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/massive-patch-tuesday-60-software-vendors-fix-security-flaws-across-os-cloud-and-network-platfor</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/indian-entities-under-siege-apt36-and-sidecopy-launch-cross-platform-rat-campaigns-1771071668</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/malicious-outlook-add-in-exposed-4-000-microsoft-credentials-stolen-in-sophisticated-supply-chain-attack-1771071664</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ivanti-epmm-exploited-83-of-attacks-linked-to-single-ip-on-bulletproof-hosting-1771071659</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-attack-trends-how-attackers-are-refining-their-tactics-1771071655</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/apple-patches-zero-day-vulnerability-in-ios-macos-and-other-devices</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/bridging-the-ctem-divide-how-continuous-threat-exposure-management-boosts-security</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/lazarus-group-unleashes-malicious-packages-in-npm-and-pypi-a-new-era-of-cyber-threats</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/state-backed-hackers-leverage-gemini-ai-for-cyber-attacks-google-s-latest-report</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-beyondtrust-vulnerability-exploited-in-the-wild-a-threat-to-remote-access-security</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/npm-enhances-security-a-deeper-dive-into-supply-chain-hardening</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/malicious-chrome-extensions-exposed-protect-your-business-from-data-theft</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uat-9921-unleashes-voidlink-malware-on-tech-and-finance-sectors</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/nation-state-actors-unite-google-exposes-coordinated-cyber-attacks-on-defense-sector</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/google-uncovers-canfail-malware-attacks-on-ukrainian-organizations-a-suspected-russian-actor-expose</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/revolutionizing-cloud-security-automating-aws-incident-investigation-with-tines-and-ai</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-365-admin-center-outage-cyber-attack-or-technical-glitch-</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-rolls-out-new-secure-boot-certificates-to-enhance-device-security</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/volvo-group-north-america-data-breach-customer-information-exposed-in-conduent-hack</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-releases-critical-windows-11-cumulative-updates-to-patch-security-vulnerabilities</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-patch-tuesday-6-zero-days-58-flaws-fixed-in-latest-security-updates</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-releases-windows-10-kb5075912-extended-security-update-to-patch-zero-days-and-expire-secur</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/trojanized-7-zip-installer-turns-computers-into-residential-proxy-nodes</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/north-korean-hackers-unleash-new-macos-malware-in-crypto-theft-attacks-a-growing-cyber-threat</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/linux-botnet-sshstalker-revives-old-school-irc-for-command-and-control</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-unveils-windows-11-26h1-exclusive-to-select-cpus-and-future-devices</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/reynolds-ransomware-a-new-threat-with-byovd-capabilities</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/north-korean-operatives-use-linkedin-to-infiltrate-companies-a-rising-cyber-threat</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/north-korea-linked-unc1069-exploits-ai-lures-to-breach-cryptocurrency-organizations</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/uncovering-the-sshstalker-botnet-how-legacy-kernel-exploits-compromise-linux-systems</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-patches-59-vulnerabilities-6-zero-days-exploited-in-the-wild</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unintended-consequences-exposed-training-apps-pave-way-for-crypto-mining-in-cloud-environments</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ethical-hacking-roadmap-2026-charting-your-course-to-become-a-certified-hacker</loc>
    <lastmod>2025-12-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-career-of-the-future-navigating-the-cybersecurity-landscape-in-2026</loc>
    <lastmod>2025-06-25</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fortifying-the-enterprise-why-corporate-cybersecurity-training-is-the-ultimate-business-investment</loc>
    <lastmod>2025-08-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/empowering-the-next-generation-a-deep-dive-into-kian-technologies-cybersecurity-workshops</loc>
    <lastmod>2025-08-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/transforming-classrooms-into-command-centers-the-impact-of-kian-technologies-workshops</loc>
    <lastmod>2025-09-24</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/building-a-strong-tech-club-culture-in-2026-the-blueprint-for-corporate-readiness</loc>
    <lastmod>2026-01-01</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-strength-in-self-awareness-why-stepping-back-is-a-mark-of-professionalism</loc>
    <lastmod>2025-11-21</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/a-new-frontier-in-digital-defense-cybersecurity-club-launched-at-csit-college-durg</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-awareness-for-college-students-strengthening-the-campus-frontline</loc>
    <lastmod>2026-01-16</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-architecture-of-command-leadership-and-governance-in-the-cybersecurity-club</loc>
    <lastmod>2026-01-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-future-vision-transforming-the-cybersecurity-club-into-a-national-center-of-excellence</loc>
    <lastmod>2025-11-19</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-power-of-mentorship-how-kian-technologies-is-architecting-the-next-generation-of-cyber-professionals</loc>
    <lastmod>2026-01-15</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/building-india-s-digital-shield-kian-technologies-and-the-rise-of-the-5-000-digital-commandos</loc>
    <lastmod>2025-12-24</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/zerodayrat-malware-the-ultimate-threat-to-android-and-ios-devices</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-introduces-mobile-style-security-controls-in-windows-11-a-new-era-of-user-consent</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/revolutionizing-code-security-zast-ai-secures-6m-pre-a-funding-for-ai-powered-solutions</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/the-evolution-of-cyber-attacks-from-ransomware-to-stealthy-infiltration</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/warlock-ransomware-breach-smartertools-hacked-via-unpatched-smartermail-server</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/frontier-ai-agents-the-ethics-conundrum-when-kpis-clash-with-moral-constraints</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/wordpress-quiz-maker-vulnerability-sql-injection-exploited-in-version-6-7-0-56</loc>
    <lastmod>2025-12-25</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/siklu-etherhaul-series-eh-8010-vulnerability-understanding-the-remote-command-execution-risk</loc>
    <lastmod>2026-01-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/siklu-etherhaul-series-eh-8010-vulnerability-uncovering-the-risks-of-arbitrary-file-upload</loc>
    <lastmod>2026-01-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/rpi-jukebox-rfid-2-8-0-vulnerability-exploited-understanding-remote-command-execution-risks</loc>
    <lastmod>2026-01-17</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/d-link-dir-825-rev-b-router-vulnerable-to-stack-buffer-overflow-attack</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/rpi-jukebox-rfid-2-8-0-vulnerability-stored-cross-site-scripting-xss-exploited</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/piranha-cms-12-0-stored-xss-vulnerability-exposed-a-threat-to-web-application-security</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unauthenticated-api-exposure-in-docker-desktop-4-44-3-a-critical-vulnerability</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fortiweb-fabric-connector-vulnerability-sql-injection-to-remote-code-execution-exploit</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/aiohttp-3-9-1-vulnerability-understanding-the-directory-traversal-exploit</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ingress-nginx-admission-controller-vulnerability-a-critical-security-risk</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/octoprint-vulnerability-uncovering-the-file-upload-flaw-in-version-1-11-2</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/redis-8-0-2-vulnerability-understanding-the-remote-code-execution-risk</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/windows-10-11-ntlm-hash-disclosure-spoofing-vulnerability-a-critical-cyber-threat</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cve-2026-24423-smartermail-rce-flaw-exploited-in-ransomware-attacks-a-cyber-security-alert</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/dknife-linux-toolkit-uncovering-the-hidden-threat-to-router-security</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/state-sponsored-threat-actors-target-senior-figures-via-signal-phishing-attacks</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ransomware-attack-hits-bridgepay-nationwide-payment-disruption-ensues</loc>
    <lastmod>2026-02-07</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/unveiling-the-shadow-campaigns-a-global-cyber-espionage-operation</loc>
    <lastmod>2026-02-07</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/new-open-source-tool-tirith-combats-imposter-attacks-with-command-line-environment-security</loc>
    <lastmod>2026-02-08</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/european-commission-suffers-data-breach-staff-information-exposed</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-exchange-online-flags-legitimate-emails-as-phishing-what-you-need-to-know</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fanduel-data-breach-thousands-of-stolen-identities-fuel-3-million-scam</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beyondtrust-remote-support-software-vulnerability-critical-rce-flaw-exposed</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cracking-passwords-without-ai-the-power-of-targeted-wordlists</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/smartertools-data-breach-warlock-ransomware-gang-exploits-software-flaw</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/solarwinds-whd-vulnerabilities-exploited-by-hackers-to-deploy-dfir-tools</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/singapore-telcos-hacked-unc3886-breach-exposes-cyber-threat</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fugitive-mastermind-behind-73-million-cryptocurrency-scam-receives-20-year-prison-sentence</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/malicious-chrome-extensions-hijack-affiliate-links-and-steal-chatgpt-access</loc>
    <lastmod>2026-01-30</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/coordinated-cyber-attacks-hit-30-renewable-energy-farms-in-poland</loc>
    <lastmod>2026-01-31</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/mandiant-uncovers-sophisticated-vishing-attacks-on-saas-platforms</loc>
    <lastmod>2026-01-31</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/iran-linked-redkitten-cyber-campaign-targets-human-rights-ngos</loc>
    <lastmod>2026-01-31</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/open-vsx-registry-hit-by-glassworm-supply-chain-attack</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/escan-antivirus-update-servers-hacked-to-deliver-sophisticated-malware</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/notepad-update-mechanism-hijacked-by-state-sponsored-attackers</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/proactive-cybersecurity-for-mid-market-organizations-a-threat-lifecycle-approach</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-attacks-escalate-proxy-botnets-zero-days-and-ransom-demands</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-phases-out-ntlm-a-3-stage-plan-to-boost-windows-security-with-kerberos</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/openclaw-bug-one-click-rce-vulnerability-via-malicious-link</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/malicious-clawhub-skills-expose-openclaw-users-to-data-theft</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/notepad-hosting-breach-china-linked-lotus-blossom-group-strikes</loc>
    <lastmod>2026-02-02</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/mozilla-enhances-firefox-with-one-click-genai-opt-out</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/apt28-exploits-microsoft-office-vulnerability-in-latest-cyber-attacks</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cloud-outages-understanding-the-ripple-effect-on-internet-services</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/metro4shell-vulnerability-hackers-exploit-critical-rce-flaw-in-react-native-cli</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/optimizing-security-operations-with-smarter-soc-blueprint</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/docker-patches-critical-ai-vulnerability-allowing-code-execution</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cisa-warns-of-actively-exploited-solarwinds-web-help-desk-rce-vulnerability</loc>
    <lastmod>2026-02-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/eclipse-foundation-boosts-open-vsx-registry-security-with-pre-publish-checks</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/macos-under-siege-python-infostealers-spread-via-fake-ads-and-installers</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-moments-in-cyber-attacks-mastering-the-first-90-seconds-of-incident-response</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/revolutionizing-identity-management-orchid-security-s-continuous-observability</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/china-linked-hackers-exploit-winrar-vulnerability-in-southeast-asia-espionage-campaigns</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/dead-vax-malware-campaign-asyncrat-deployment-via-ipfs-hosted-vhd-phishing-files</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/microsoft-unveils-ai-powered-scanner-to-detect-backdoors-in-large-language-models</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/nginx-configurations-exploited-in-large-scale-web-traffic-hijacking-campaign</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/critical-n8n-vulnerability-enables-system-command-execution-via-malicious-workflows</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/infy-hackers-revive-operations-with-enhanced-c2-servers-post-iran-internet-blackout</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/mitigating-ai-related-vulnerabilities-a-comprehensive-guide</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-attacks-on-the-rise-hidden-threats-in-plain-sight</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/aisuru-kimwolf-botnet-unleashes-unprecedented-31-4-tbps-ddos-attack</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ai-model-uncovers-500-high-severity-security-flaws-in-open-source-libraries</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/npm-and-pypi-packages-compromised-dydx-wallet-stealers-and-rat-malware</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/enhance-network-security-with-samsung-knox-protect-against-breaches</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/asian-state-backed-hackers-breach-70-government-entities-globally</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cisa-mandates-removal-of-outdated-edge-devices-to-mitigate-federal-network-risks</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/china-linked-dknife-aitm-framework-exposed-router-traffic-hijacking-and-malware-delivery</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/signal-phishing-attacks-target-german-politicians-military-and-journalists</loc>
    <lastmod>2026-02-07</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/openclaw-enhances-security-with-virustotal-scanning-for-clawhub-skills</loc>
    <lastmod>2026-02-08</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/beyondtrust-patches-critical-rce-vulnerability-in-remote-support-and-pra</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/teampcp-worm-targets-cloud-infrastructure-for-malicious-exploitation</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/bloody-wolf-unleashes-spear-phishing-campaign-on-uzbekistan-and-russia</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/optimizing-soc-efficiency-strategies-for-cisos-to-combat-burnout</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/cyber-attacks-escalate-ai-malware-massive-ddos-and-trusted-app-breaches</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/solarwinds-web-help-desk-exploited-in-sophisticated-cyber-attacks</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/singapore-telecom-sector-under-siege-unc3886-cyber-espionage-campaign-exposed</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/fortinet-patches-critical-sql-injection-flaw-in-forticlientems</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/ivanti-zero-day-exploit-dutch-authorities-confirm-cyber-attack-exposing-employee-data</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/build-your-ethical-hacking-career-a-comprehensive-guide-by-kian-technologies</loc>
    <lastmod>2025-07-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/kian-technologies-honored-at-call-of-the-creators-</loc>
    <lastmod>2025-07-08</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/from-classroom-to-cyber-commandos-the-story-behind-our-vision</loc>
    <lastmod>2025-07-07</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/kian-technologies-wins-cybersecurity-awareness-award-2025</loc>
    <lastmod>2025-07-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/news/call-of-the-creators-a-gathering-of-innovators</loc>
    <lastmod>2025-07-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/exposing-the-fake-zoom-meeting-update-a-cyber-attack-case-study-1772206808</loc>
    <lastmod>2026-02-24</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/roblox-data-breach-how-predators-exploited-vulnerabilities-to-target-children-1772206805</loc>
    <lastmod>2026-02-24</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/reddit-and-porn-sites-fined-a-data-breach-case-study-on-children-s-safety-and-privacy-1772206802</loc>
    <lastmod>2026-02-24</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/detecting-smart-glasses-a-novel-approach-to-enhance-personal-security-1772206800</loc>
    <lastmod>2026-02-25</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/instagram-s-delayed-response-to-explicit-messages-a-data-breach-case-study-1772206796</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/conduent-data-breach-uncovering-the-third-party-vulnerability-that-exposed-25-million-americans-1772206793</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/unmasking-advanced-persistent-threats-a-deep-dive-into-apt-attacks-and-mitigation-strategies-1772206790</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/zoom-and-google-meet-scams-a-technical-deep-dive-into-teramind-installation-1772206786</loc>
    <lastmod>2026-02-26</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/exposing-the-fake-google-security-check-a-browser-rat-disguise-1772206783</loc>
    <lastmod>2026-02-27</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/exposing-gemini-ai-data-the-unintended-consequences-of-public-google-api-keys-1772206780</loc>
    <lastmod>2026-02-27</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/empowering-user-choice-mozilla-s-ai-off-switch-and-the-future-of-cloud-security</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/ai-generated-content-crisis-grok-s-failure-to-address-sexualized-image-production</loc>
    <lastmod>2026-02-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/unlicensed-exposure-flock-cameras-unsanctioned-sharing-of-license-plate-data</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/malicious-pdf-attachments-the-dead-vax-campaign-exposed</loc>
    <lastmod>2026-02-05</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/apple-pay-phishing-campaign-uncovering-the-fake-support-call-scam</loc>
    <lastmod>2026-02-06</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/cyber-attack-case-study-a-week-in-security-february-2-february-8-2026-</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/ai-generated-clone-websites-a-rising-threat-to-cybersecurity</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/zero-day-exploitation-apple-patches-critical-flaw-allowing-device-takeover</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/meta-on-trial-uncovering-the-dark-side-of-social-media-a-case-study-on-child-exploitation-and-cyb</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/outlook-add-in-turned-phishing-kit-lessons-from-the-agreeto-data-breach</loc>
    <lastmod>2026-02-12</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/winter-olympics-2026-fans-targeted-by-fake-shops-a-cyber-attack-case-study</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/uncovering-malicious-chrome-extensions-a-case-study-on-credential-stealing-attacks</loc>
    <lastmod>2026-02-13</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/malicious-7-zip-downloads-how-fake-archivers-turn-home-pcs-into-proxy-nodes</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/exposed-database-leak-uncovering-the-chat-ask-ai-app-breach</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/uncovering-the-truth-is-your-phone-listening-to-you-</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/snapchat-security-breach-how-hundreds-of-women-were-tricked-into-exposing-their-accounts</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/vulnerabilities-in-social-media-a-data-breach-case-study-on-child-safety</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/discord-s-age-verification-a-cybersecurity-case-study-on-default-teen-appropriate-profiles</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/malwarebytes-achieves-unprecedented-success-a-cybersecurity-case-study</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/zero-day-exploitation-analyzing-the-february-2026-patch-tuesday-vulnerabilities</loc>
    <lastmod>2026-02-11</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/sanctioned-but-still-spying-intellexa-s-prolific-zero-day-exploits-continue-to-threaten-global-secu</loc>
    <lastmod>2025-12-03</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/proactive-defense-against-shinyhunters-branded-data-theft-targeting-saas-a-cybersecurity-case-study</loc>
    <lastmod>2026-01-30</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/shining-a-light-on-shinyhunters-uncovering-the-expansion-of-saas-data-theft</loc>
    <lastmod>2026-01-30</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/cybersecurity-forecast-2026-preparing-for-threats-to-come</loc>
    <lastmod>2025-11-04</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/net-ntlmv1-vulnerability-exploitation-accelerating-protocol-deprecation-with-rainbow-tables</loc>
    <lastmod>2026-01-15</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/unc1069-targets-cryptocurrency-sector-with-new-tooling-and-ai-enabled-social-engineering</loc>
    <lastmod>2026-02-09</lastmod>
    <priority>0.80</priority>
  </url>
  <url>
    <loc>https://news.kiantechnologies.in/case_studies/cyber-threats-to-the-defense-industrial-base-a-comprehensive-analysis</loc>
    <lastmod>2026-02-10</lastmod>
    <priority>0.80</priority>
  </url>
</urlset>