<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap_generator/default/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://www.coresecurity.com/</loc>
  <lastmod>2025-10-01T14:12:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/d-link-central-wifimanager-software-controller-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/softnas-cloud-os-command-injection</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/freebsd-kernel-amd64setldt-heap-overflow</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-download-manager-password-weak-encryption</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/samsung-sw-update-tool-mitm</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/intel-driver-update-utility-mitm</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/lenovo-shareit-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/microsoft-windows-media-center-link-file-incorrectly-resolved-reference</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/forticlient-antivirus-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/airlink101-skyipcam1620w-os-command-injection</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/airlive-multiple-products-os-command-injection</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sendio-esp-information-disclosure-vulnerability</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/infocus-in3128hd-projector-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/schneider-vampset-stack-and-heap-buffer-overflow</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/fortinet-single-sign-on-stack-overflow</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/windows-pass-through-authentication-methods-improper-validation</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advantech-eki-1221d-buffer-overflow</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/freebsd-kernel-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/android-wifi-direct-denial-service</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/corel-software-dll-hijacking</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mercadopago-android-app-information-disclosure</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advantech-webaccess-stack-based-buffer-overflow</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advantech-eki-6340-command-injection</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advantech-adamview-buffer-overflow</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/delphi-and-c-builder-vcl-library-heap-buffer-overflow</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advantech-webaccess-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/delphi-and-c-builder-vcl-library-buffer-overflow</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-router-password-timing-attack</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/publish-it-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/realplayer-heap-based-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/divide-error-windows-kernel</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/icofx-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vivotek-ip-cameras-rtsp-authentication-bypass</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/pdfcool-studio-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/pinapp-mail-secure-access-control-failure</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sophos-web-protection-appliance-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/aloaha-pdf-suite-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/eps-viewer-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/avtech-dvr-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hikvision-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-tp-link-tl-sc3171-ip-cameras</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/foscam-ip-cameras-improper-access-restrictions</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/xnview-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/artweaver-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/buffer-overflow-ubiquiti-aircam-rtsp-service</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/xpient-cash-drawer-operation-vulnerability</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mac-osx-server-directoryservice-buffer-overflow</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/maygion-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/zavio-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/tp-link-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vivotek-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/d-link-ip-cameras-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerabilidades-arnet-wifi</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-sapcar-heap-based-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-serverprotect-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-deep-discovery-director-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-smart-protection-os-command-injection</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-note-assistant-insecure-handling-sap-notes-signature-vulnerability</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/dell-emc-isilon-onefs-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mikrotik-routeros-smb-buffer-overflow</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/tp-link-eap-controller-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/quest-kace-system-management-appliance-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:31-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/opsview-monitor-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/viper-rgb-driver-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/gwtupload-xss-file-upload-functionality</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/logicaldoc-virtual-appliance-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/advisories/zulip-account-takeover-stored-xss</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/open-audit-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-car-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/tp-link-tddp-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/active-directory-stack-overflow</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/adobe-acrobat-acrord23-reader-use-after-free</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/adobe-audition-malformed-ses-file</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/adobe-director-memory-corruption</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/adobe-reader-buffer-overflow</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/adobe-shockwave-textxtra-vulnerability</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/amaya-buffer-overflows</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/anzio-web-print-object-buffer-overflow</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/aol-icq-pro-2003b-heap-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/applecups-null-pointer-vulnerability</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/apple-osx-atsserver-charstrings-sign-mismatch</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/apple-osx-sandbox-bypass</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/asterisk-pbx-truncated-video-frame-vulnerability</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/3dsmax-arbitrary-command-execution</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/maya-arbitrary-command-execution</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/softimage-arbitrary-command-execution</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/winds3d-viewer-advisory</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/axis-network-camera-http-authentication-bypass</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/blender-scripting-injection</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/borland</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/broadcom-input-validation-bcm4325-bcm4329</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/buffer-overflow-in-rsaref2</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cfengine-rsa-authentication-heap-corruption</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cisco-secure-desktop-xss</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/webex-atp-and-wrf-overflow-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/webex-wrf-memory-corruption-vulnerability</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/core-force-kernel-buffer-overflow</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/corel-paintshop-heap-overflow</loc>
  <lastmod>2025-05-29T11:57:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cross-site-scripting-in-verisigns-haydnexe-cgi-script</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/dazstudio-scripting-injection</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/dce-rpc-vulnerabilities-new-attack-vectors-analysis</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/dnsmasq-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/dxstudio-player-firefox-plugin</loc>
  <lastmod>2025-05-29T11:56:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/e107-cms-script-command-injection</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/efront-php-file-inclusion</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/firebird-remote-memory-corruption</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/firebird-sql-dos</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/foxit-reader-vulnerabilities</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/gnupg-and-gnupg-clients-unsigned-data-injection-vulnerability</loc>
  <lastmod>2025-05-29T11:57:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/google-sketchup-vulnerability</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/groupwise-55-user-mailbox-authentication-vulnerability</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hp-data-protector-execcmd-vulnerability</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/openview-buffer-overflows</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/openview-nnm-internaldb-dos</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hp-nnm-ovjavalocale-buffer-overflow</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sun-delegated-administrator</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hyperic-hq-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/iaxclient-truncated-frames-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ibm-soliddb-errorcode-dos</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ibm-websphere-csrf</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/iis-nntp-service-xpat-command-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/insufficient-firewall</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/internet-explorer-dynamic-object-tag</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ie-security-zone-bypass</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/internet-explorer-zone-elevation</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/iphone-safari-javascript-alert-denial-of-service</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/jetty-persistent-xss</loc>
  <lastmod>2025-05-29T11:48:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/landesk-csrf-vulnerability</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/landesk-os-command-injection-vulnerability</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/lattice-diamond-programmer-buffer-overflow</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/leopard-server</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/libpurple-arbitrary-write</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/libsmi-smigetnode-buffer-overflow</loc>
  <lastmod>2025-05-29T11:59:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/lotus-note-overflow</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/lotusnotes-xls-viewer-heap-overflow</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/luxology-modo-lxo-vulnerability</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mailenable-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/excel-buffer-overflow</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/core-2009-1103</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/core-2010-0407-excel-pivottable-cdr-overflow</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ms-office-htmldlghelper-memory-corruption</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ms-visio-dxf-buffer-overflow</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/publisher-pubconv-memory-corruption</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/microsoft-srvsys-smb-com-transaction-denial-of-service</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/microsoft-windows-createwindow-function-callback-bug</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/word-arbitrary-free</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mplayer-overflow-advisorie</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/mplayer-advisorie</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hyperv-vmbus-persistent-dos-vulnerability</loc>
  <lastmod>2025-05-29T11:48:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ms-iis-frontpage-98-extensions-buffer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:56:43-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ms-opentype-cff-parsing-vulnerability</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ms-wins-ecommenddlg-input-validation</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/msn-messenger-png-image-parsing-vulnerability</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-ibm-db2-stack-overflow-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-bugtracker</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advisory-google</loc>
  <lastmod>2025-05-29T11:56:43-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/hp-data-protector-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ical</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-icq-toolbar-13-for-internet</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-mirabilis-icq-client</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-stack-smashing-protection-technologies</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sun-calendar-express</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-tooltalk-database-server</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiple-vulnerabilities-in-ximians-evolution-mail-user-agent</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/filename-pseudonyms-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/testlink-multiple-injection-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sun-communications-express</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/multiples-vulnerabilities-manageengine-sdp</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/nai-net-tools-pki-server-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:42-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/nasa-big-view</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cdf</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/netmeeting-directory-traversal-vulnerability</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/novell-imanager-buffer-overflow-off-by-one-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/open-redirect-opencart</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/open-bsd-advisorie</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/openfire-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/oracle-glassfish-server-administration-console-authentication-bypass</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/orbit-downloader</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advisory-vmware</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/proftpd-controls-buffer-overflow</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vnc-remote-dos</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/real-helix-dna</loc>
  <lastmod>2025-05-29T11:47:31-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/realplayer-png-deflate-heap-corruption-vulnerability</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/html-and-javascript-advisory</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/report-for-realserver-memory-contents-disclosure-vulnerability</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-netweaver-dispatcher-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/sap-netweaver-msg-srv-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/security-issues-in-sun-nis</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/silc-pkcs</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/snort-tcp-stream-reassembly-integer-overflow-vulnerability</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cubecart-php-shopping-cart-sql-injection</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ssh-insertion-attack</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ssh-protocol-15-session-key-recovery-vulnerability</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ssh1-crc-32-compensation-attack-detector-vulnerability</loc>
  <lastmod>2025-05-29T11:58:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/open-bsd-dhcp-server</loc>
  <lastmod>2025-05-29T11:48:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/stonetrip-s3dplayers</loc>
  <lastmod>2025-05-29T11:47:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/symantec-intel-handler-service-remote-dos</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/synce-remote-command-injection</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/timbuktu</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/unix-locale-format-string-vulnerability</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/unixware-scohelp-http-server-format-string-vulnerability</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cactushop-xss-persistent-vulnerability</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vbulletin-cross-site-scripting-vulnerability</loc>
  <lastmod>2025-05-29T11:47:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vinagre-format-string</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/virtual-pc-2007-hypervisor-memory-protection-bug</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/virtualbox-privilege-escalation-vulnerability</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vlc-activex--vulnerability</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/advisory-vlc</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vlc-xspf-memory-corruption</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vlc-vulnerabilities-amv-nsv-files</loc>
  <lastmod>2025-05-29T11:58:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vmware-esx-input-validation-error</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vnc-integer-overflows</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerabilidades-en-bind-y-soluciones</loc>
  <lastmod>2025-05-29T11:57:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerabilities-in-kerio-personal-firewall</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerabilities-in-putty-and-pscp</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-in-gnomes-eye-of-gnome</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-in-mutt-mail-user-agent</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-bea-weblogics-proxy</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-buffer-overflow-in-att-winvnc</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-cisco-ios-web-administration-dos</loc>
  <lastmod>2025-05-29T11:57:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-inktomi-traffic-server</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-linksys-devices-december-2nd-2002-</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-microsoft-phonebook-server-overflow</loc>
  <lastmod>2025-05-29T11:56:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-microsoft-windows-nt-40-terminal</loc>
  <lastmod>2025-05-29T11:56:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-mysql-authentication</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-netscape-iplanet-cms-and-netscape</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-netscape-servers-denial-of-service</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-netscape-servers-heap-buffer-overflow</loc>
  <lastmod>2025-05-29T11:57:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-network-associates-pgp-keyserver-70</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-server-overflow-in-att-vnc</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-weak-authentication-in-att-vnc</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-windows-smb-dos</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/vulnerability-report-for-wu-ftpd-server</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/windows-kernel-readlayoutfile</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/movie-maker-heap-overflow</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/core-2010-0424-windows-smtp-dns-query-id-bugs</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/wonderware</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/wordpress-privileges-unchecked</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/xnview-mbm-processing-heap-overflow</loc>
  <lastmod>2025-05-29T11:58:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/nextgen-gallery-xss-vulnerability</loc>
  <lastmod>2025-05-29T11:57:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/zoho-manageengine-vulnerabilities</loc>
  <lastmod>2025-05-29T11:58:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:56:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/pydio-cells-204-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/pandora-fms-community-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution</loc>
  <lastmod>2025-05-29T11:48:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities</loc>
  <lastmod>2025-05-29T11:48:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cisco-anyconnect-posture-hostscan-security-service-local-privilege-escalation</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/cisco-anyconnect-posture-hostscan-security-service-bypass</loc>
  <lastmod>2025-05-29T11:47:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection</loc>
  <lastmod>2025-05-29T11:47:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-4</loc>
  <lastmod>2025-05-29T11:38:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/dejablue-vulnerabilities-windows-7-windows-10-cve-2019-1181-and-cve-2019-1182</loc>
  <lastmod>2025-05-29T11:37:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/exploiting-citrix-application-delivery-controller-adc-and-gateway-cve-2019-19781-core-impact</loc>
  <lastmod>2025-05-29T11:36:03-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-2</loc>
  <lastmod>2025-05-29T11:37:54-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-1</loc>
  <lastmod>2025-05-29T11:37:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/next-generation-ubi-and-ubifs</loc>
  <lastmod>2025-05-29T11:36:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/linux-flash-newbies-how-linux-works-flash</loc>
  <lastmod>2025-05-29T11:37:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/linux-flash-newbies-flash-memory-basics</loc>
  <lastmod>2025-05-28T16:41:04-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/low-level-reversing-bluekeep-vulnerability-cve-2019-0708</loc>
  <lastmod>2025-05-29T11:37:48-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/webexec-revolutions-strange-case-update-service</loc>
  <lastmod>2025-05-29T11:37:48-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/bypassing-cve-2018-15442-another-case-dll-hijacking</loc>
  <lastmod>2025-05-29T11:36:03-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/how-phish-core-impact</loc>
  <lastmod>2025-05-29T11:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/making-something-out-zeros-alternative-primitive-windows-kernel-exploitation</loc>
  <lastmod>2025-05-29T11:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/core-impact-2017-versus-metasploit-shootout-comparison</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/solving-post-exploitation-issue-cve-2017-7308</loc>
  <lastmod>2025-05-29T11:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/sapcar-heap-buffer-overflow-crash-exploit</loc>
  <lastmod>2025-05-29T11:36:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/the-unpatched-lsass-remote-denial-of-service</loc>
  <lastmod>2025-05-29T11:36:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/advanced-pen-testing-tricks-building-a-lure-to-collect-high-value-credentials</loc>
  <lastmod>2025-05-29T11:36:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/how-to-pen-test-around-the-password</loc>
  <lastmod>2025-05-29T11:36:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/getting-physical-extreme-abuse-of-intel-based-paging-systems</loc>
  <lastmod>2025-05-29T11:36:11-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/how-to-build-a-usb-drop-attack</loc>
  <lastmod>2025-05-29T11:36:11-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/getting-physical-extreme-abuse-of-intel-based-paging-systems-part-2-windows</loc>
  <lastmod>2025-05-29T11:36:10-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/exploiting-internet-explorers-ms15-106-part-i-vbscript-filter-type-confusion-vulnerability-cve-2015-6055</loc>
  <lastmod>2025-05-29T11:36:10-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/abusing-gdi-for-ring0-exploit-primitives</loc>
  <lastmod>2025-05-29T11:36:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/ms15-083-microsoft-windows-smb-memory-corruption-vulnerability</loc>
  <lastmod>2025-05-29T11:36:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/ms15-011-microsoft-windows-group-policy-real-exploitation-via-a-smb-mitm-attack</loc>
  <lastmod>2025-05-29T11:36:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/exploiting-cve-2015-0311-part-ii-bypassing-control-flow-guard-on-windows-8-1-update-3</loc>
  <lastmod>2025-05-29T11:36:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/exploiting-cve-2015-0311-a-use-after-free-in-adobe-flash-player</loc>
  <lastmod>2025-05-29T11:36:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/early-release-exploit-for-ms14-068-vulnerability-affecting-kerberos</loc>
  <lastmod>2025-05-29T11:36:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/identifying-idevices-on-your-network-using-core-impact-and-where-to-go-from-there</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/the-bios-embedded-anti-theft-persistant-agent-that-couldnt-response-handling-the-ostrich-defense</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/getting-physical-extreme-abuse-of-intel-based-paging-systems-part-1</loc>
  <lastmod>2025-05-29T11:36:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/building-custom-modules-core-impact-part-1-n-1</loc>
  <lastmod>2025-05-29T11:36:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/building-custom-modules-core-impact-part-2-n-1</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/building-custom-modules-core-impact-part-3-n-1</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-3</loc>
  <lastmod>2025-05-29T11:37:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-5</loc>
  <lastmod>2025-05-29T11:38:03-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/are-your-domain-controllers-protected-cve-2020-1472-zerologon-attacks</loc>
  <lastmod>2025-05-28T16:30:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/low-level-reversing-sigred-cve-2020-1350</loc>
  <lastmod>2025-05-28T16:30:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-6</loc>
  <lastmod>2025-05-28T16:52:50-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/exploitation-chains-lightweight-desktop-applications</loc>
  <lastmod>2025-05-28T16:52:50-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/analysis-cisco-anyconnect-posture-hostscan-local-privilege-escalation-cve-2021</loc>
  <lastmod>2025-05-28T16:52:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reading-dpapi-encrypted-keys-mimikatz</loc>
  <lastmod>2025-05-28T16:52:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-exploiting-free-tools-part-7</loc>
  <lastmod>2025-05-28T16:52:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-series</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/simple-dns-redirectors-cobalt-strike</loc>
  <lastmod>2025-05-28T16:40:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/understanding-evolution-ransomware</loc>
  <lastmod>2025-05-28T16:52:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/how-deal-microsoft-monthly-updates-reverse-engineering-binary-patches</loc>
  <lastmod>2025-05-28T16:52:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-8</loc>
  <lastmod>2025-05-28T16:52:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/analysis-cve-2021-26897-dns-server-rce</loc>
  <lastmod>2025-05-28T16:52:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-9</loc>
  <lastmod>2025-05-28T16:52:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-10</loc>
  <lastmod>2025-05-28T16:51:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-11</loc>
  <lastmod>2025-05-28T16:51:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/nanodump-red-team-approach-minidumps</loc>
  <lastmod>2025-05-28T16:51:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/core-impact-issues-latest-exploit-log4shell-vulnerability</loc>
  <lastmod>2025-05-28T16:28:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/writing-beacon-object-files-flexibie-stealthy-and-compatible</loc>
  <lastmod>2025-05-28T16:40:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-12</loc>
  <lastmod>2025-05-28T16:51:17-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-21882-win32k-window-object-type-confusion-exploit</loc>
  <lastmod>2025-05-28T16:28:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-13</loc>
  <lastmod>2025-05-28T16:51:17-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/proof-concept-cve-2022-21907-http-protocol-stack-remote-code-execution</loc>
  <lastmod>2025-05-28T16:28:27-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/core-impact-issues-latest-exploit-f5-big-ip-icontrol-rest-vulnerability</loc>
  <lastmod>2025-05-28T16:28:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-30136-windows-network-file-system-vulnerability</loc>
  <lastmod>2025-05-28T16:25:50-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls</loc>
  <lastmod>2025-05-28T16:51:17-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-14</loc>
  <lastmod>2025-05-28T16:51:15-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/reversing-and-exploiting-free-tools-part-15</loc>
  <lastmod>2025-05-29T11:38:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/understanding-cve-2022-37969-windows-clfs-lpe</loc>
  <lastmod>2025-05-29T11:38:03-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability</loc>
  <lastmod>2025-05-29T11:38:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/impacket-v0110-now-available</loc>
  <lastmod>2025-05-29T11:38:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/impacket-we-love-playing-tickets</loc>
  <lastmod>2025-05-29T11:38:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/running-pes-inline-without-console</loc>
  <lastmod>2025-05-28T16:38:45-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/core-impact-monthly-chronicle-exploits-and-updates-oct-2023</loc>
  <lastmod>2025-05-28T16:24:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/core-impact-monthly-chronicle-exploits-and-updates-nov-2023</loc>
  <lastmod>2025-05-28T16:24:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/cve-2024-6768-improper-validation-specified-quantity-input-produces</loc>
  <lastmod>2025-05-29T11:38:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051</loc>
  <lastmod>2025-05-29T11:38:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/whats-new-impacket-012</loc>
  <lastmod>2025-05-29T11:38:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/articles/cve-2024-6769-poisoning-activation-cache-elevate-medium-high-integrity</loc>
  <lastmod>2025-05-29T11:38:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/bob-erdman</loc>
  <lastmod>2023-03-06T12:18:06-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/jorge-mieres</loc>
  <lastmod>2022-11-29T14:41:59-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/diego-sor</loc>
  <lastmod>2021-03-23T17:09:43-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/ricardo-narvaja</loc>
  <lastmod>2025-07-23T10:31:27-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/marcos-accossatto</loc>
  <lastmod>2025-07-23T10:31:21-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/fernando-catoira</loc>
  <lastmod>2022-11-29T14:41:09-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/julio-sanchez</loc>
  <lastmod>2022-11-29T14:42:27-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/lucas-dominikow</loc>
  <lastmod>2022-11-29T14:42:46-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/ernesto-alvarez</loc>
  <lastmod>2022-11-29T14:39:57-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/santiago-pecin</loc>
  <lastmod>2023-08-17T11:42:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/esteban-kazimirow</loc>
  <lastmod>2023-08-17T11:47:16-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/chris-reffkin</loc>
  <lastmod>2023-03-06T11:54:22-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/mark-bell</loc>
  <lastmod>2023-03-06T12:00:14-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/pablo-zurro</loc>
  <lastmod>2025-06-03T17:56:14-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/fernando-diaz</loc>
  <lastmod>2023-08-17T11:46:30-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/connor-johnson</loc>
  <lastmod>2022-11-29T14:39:40-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/john-stahmann</loc>
  <lastmod>2024-03-15T08:58:25-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/mark-bergman</loc>
  <lastmod>2023-05-15T14:18:47-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/hector-manrique</loc>
  <lastmod>2024-05-06T11:36:04-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/corelabs-team</loc>
  <lastmod>2023-08-03T16:53:08-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/leandro-cuozzo</loc>
  <lastmod>2023-08-04T17:27:58-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/santiago-moliner</loc>
  <lastmod>2023-08-04T17:28:37-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/alexis-balbachan</loc>
  <lastmod>2023-08-04T17:29:07-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/gabi-gonzalez</loc>
  <lastmod>2023-08-04T17:29:32-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/jon-hallberg</loc>
  <lastmod>2023-10-13T11:05:25-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/nahuel-gonzalez</loc>
  <lastmod>2023-11-07T18:12:14-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/arthur-lallemant</loc>
  <lastmod>2023-11-07T18:12:19-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/luis-garcia-sierra</loc>
  <lastmod>2023-11-07T18:13:47-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/fernando-paez</loc>
  <lastmod>2023-11-20T16:42:39-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/daniel-de-luca</loc>
  <lastmod>2023-11-20T16:42:17-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/cristian-rubio</loc>
  <lastmod>2023-11-20T16:43:02-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/kyle-avery</loc>
  <lastmod>2024-07-10T18:34:13-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/pieter-ceelen</loc>
  <lastmod>2025-03-10T17:12:20-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/steve-salinas</loc>
  <lastmod>2025-07-28T12:02:28-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/max-grim</loc>
  <lastmod>2025-05-29T09:53:32-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/profile/katrina-thompson</loc>
  <lastmod>2025-07-07T16:13:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-protect-your-business-against-common-cybersecurity-threats-siem</loc>
  <lastmod>2025-05-28T16:47:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/four-network-security-challenges-organizations-remote-workforce</loc>
  <lastmod>2025-02-07T09:52:04-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/common-security-concerns-and-how-reduce-your-risk</loc>
  <lastmod>2025-05-28T16:33:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-voice-biometrics-became-real-game-changer-large-financial-services-organization</loc>
  <lastmod>2025-05-30T12:27:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-deal-orphaned-accounts-your-business</loc>
  <lastmod>2025-02-07T09:52:05-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-multi-tenancy-important-siem-solution</loc>
  <lastmod>2025-05-28T16:47:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-phishing-has-evolved-and-three-ways-prevent-attacks</loc>
  <lastmod>2025-05-28T16:33:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/basics-iga-roi-how-show-value-identity-governance</loc>
  <lastmod>2025-05-30T12:24:12-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-cmmc-and-how-can-you-prepare-it</loc>
  <lastmod>2025-05-29T13:04:34-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-big-takeaways-gartner-iam-summit-you-need-know</loc>
  <lastmod>2025-05-30T12:26:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-challenges-pen-testing</loc>
  <lastmod>2025-02-07T09:52:06-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-iam-security</loc>
  <lastmod>2025-05-30T12:20:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/top-2019-siem-content-review-five-key-takeaways</loc>
  <lastmod>2025-05-28T16:47:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/four-cyber-threats-2019-and-how-manage-them-2020</loc>
  <lastmod>2025-11-10T16:36:36-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/taking-command-three-step-approach-surviving-todays-cyber-domain</loc>
  <lastmod>2025-05-29T13:16:03-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-tackle-top-five-healthcare-information-security-challenges</loc>
  <lastmod>2025-05-30T12:14:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-major-reasons-healthcare-organizations-need-identity-governance</loc>
  <lastmod>2025-06-30T11:05:29-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/better-together-how-pen-testing-helps-take-vulnerability-assessments-next-level</loc>
  <lastmod>2025-05-28T16:25:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/when-should-you-replace-your-free-siem-tools</loc>
  <lastmod>2025-05-28T16:48:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-reasons-micro-certifications-are-essential-identity-governance</loc>
  <lastmod>2025-05-30T12:28:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-action-items-consider-after-completing-pen-test</loc>
  <lastmod>2025-05-30T10:46:10-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-commercial-pen-testing-tools-can-make-your-house-testing-program-more-effective-and</loc>
  <lastmod>2025-05-30T10:50:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-benefits-house-penetration-testing-capabilities</loc>
  <lastmod>2025-05-29T14:47:48-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/you-cant-protect-what-you-cant-see-improving-cybersecurity-monitoring-solutions</loc>
  <lastmod>2025-05-28T16:48:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/keeping-bots-how-rise-rpa-impacts-iga</loc>
  <lastmod>2025-05-30T12:15:00-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/six-strategies-ensure-you-give-right-access-right-people-right-time</loc>
  <lastmod>2025-05-28T16:56:03-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-strike-right-balance-between-prioritizing-security-and-increasing-efficiency</loc>
  <lastmod>2025-05-28T16:56:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/evaluating-security-information-and-event-management-siem-solutions-pros-and-cons-freeware</loc>
  <lastmod>2025-05-28T16:48:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-identify-and-prevent-insider-threats-your-organization</loc>
  <lastmod>2025-05-28T16:57:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/human-element-pen-testing-and-role-tools-can-play</loc>
  <lastmod>2025-05-28T16:33:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-identity-governance-and-administration-iga-improves-security-efficiency-and-compliance</loc>
  <lastmod>2025-05-30T12:16:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/silencing-bells-how-siem-can-prevent-alert-fatigue</loc>
  <lastmod>2025-05-28T16:48:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/10-reasons-linux-attacks-happen-and-how-avoid-them</loc>
  <lastmod>2025-05-29T15:19:08-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-build-effective-phishes-social-engineering-penetration-tests</loc>
  <lastmod>2025-05-30T10:41:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-manage-identities-contractors-consultants-and-other-non-employees</loc>
  <lastmod>2025-05-28T16:56:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/secure-transactions-pci-dss-pa-dss-overview-and-compliance-checklist</loc>
  <lastmod>2025-05-28T16:33:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/sophos-alternative-unix-centralized-management-antivirus-were-here-stay</loc>
  <lastmod>2025-05-29T14:51:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/best-practices-red-teams-blue-teams-purple-teams</loc>
  <lastmod>2025-05-28T16:41:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/one-big-way-reduce-helpdesk-costs-while-increasing-security</loc>
  <lastmod>2025-05-30T12:24:37-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/diversionary-tactics-use-ransomware-misdirection</loc>
  <lastmod>2025-02-07T09:52:11-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-rubber-stamping-and-why-it-serious-cybersecurity-concern</loc>
  <lastmod>2025-05-30T12:21:00-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cybersecurity-dangers-dark-web-and-how-protect-your-organization</loc>
  <lastmod>2025-05-28T16:33:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-reasons-you-need-identity-governance-administration</loc>
  <lastmod>2025-05-30T12:29:26-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-malicious-insider-threat-indicators-and-how-mitigate-risk</loc>
  <lastmod>2025-05-29T14:51:39-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/six-stages-penetration-testing</loc>
  <lastmod>2025-05-28T16:33:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/staying-ahead-curve-implementing-privileged-access-management-solutions</loc>
  <lastmod>2025-02-07T09:53:03-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cryptoviral-extortion-enduring-problem-ransomware</loc>
  <lastmod>2025-05-29T15:14:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/staying-accountable-sarbanes-oxley-sox-overview-and-compliance-checklist</loc>
  <lastmod>2025-05-29T13:05:54-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/penetration-testing-breaking-keep-others-out</loc>
  <lastmod>2025-02-07T09:53:03-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/monitoring-application-security-siem</loc>
  <lastmod>2025-05-28T16:48:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/evaluating-security-information-and-event-management-eight-criteria-choosing-right-siem</loc>
  <lastmod>2025-05-28T16:48:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/top-content-review-2018s-most-read-cybersecurity-information-it-and-security-professionals</loc>
  <lastmod>2025-05-29T10:24:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/powertech-antivirus-and-clamav-detection-rate-comparison</loc>
  <lastmod>2025-05-30T10:47:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-corporate-networks-are-key-targets-cryptojacking</loc>
  <lastmod>2025-05-29T15:15:08-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/precarious-balance-privileged-users-and-cloud</loc>
  <lastmod>2025-05-30T12:15:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cloud-watching-ensuring-security-every-cloud-environment</loc>
  <lastmod>2025-02-07T09:53:04-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/full-body-scan-protect-your-organization-endpoint-antivirus-software</loc>
  <lastmod>2025-05-30T08:10:49-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/endpoint-antivirus-software-what-it-and-why-you-need-it</loc>
  <lastmod>2025-05-30T10:43:12-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/lifecycle-security-event</loc>
  <lastmod>2025-05-28T16:48:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/open-source-siem-vs-enterprise-level-siem-which-right-you</loc>
  <lastmod>2025-05-28T16:48:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-are-3-most-common-access-risks</loc>
  <lastmod>2025-05-30T12:25:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/are-employees-undermining-your-data-breach-defenses-inside</loc>
  <lastmod>2025-05-28T16:57:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-solve-top-3-struggles-identity-governance-and-administration</loc>
  <lastmod>2025-02-07T09:53:07-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-reasons-you-need-native-linux-virus-scanning</loc>
  <lastmod>2025-05-28T16:49:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-pen-test-core-impact</loc>
  <lastmod>2025-05-28T16:33:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/do-i-need-identity-governance-administration-iga</loc>
  <lastmod>2025-05-30T12:24:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/security-so-easy-sales-guy-can-do-it</loc>
  <lastmod>2025-05-30T12:15:46-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/sao-vs-siem-not-enemies-security-defending-duo</loc>
  <lastmod>2025-05-28T16:48:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-siem-protects-cloud-servers</loc>
  <lastmod>2025-05-28T16:48:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/introducing-access-assurance-suite-91</loc>
  <lastmod>2025-05-28T16:56:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/assess-effectiveness-your-security-controls-penetration-testing</loc>
  <lastmod>2025-05-28T16:33:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ransomware-hits-city-atlanta</loc>
  <lastmod>2025-05-28T16:48:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-teslas-cryptojack-attack-means-rest-us</loc>
  <lastmod>2025-05-28T16:48:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/latest-exploits-shipped-core-impact-181</loc>
  <lastmod>2025-05-28T16:33:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/customizable-reports-core-impact</loc>
  <lastmod>2025-10-02T10:08:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-release-core-impact-181</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/security-answers-plain-english-what-man-middle-attack</loc>
  <lastmod>2025-02-07T09:53:11-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/lessons-learned-gartner-identity-and-access-management-summit-2017</loc>
  <lastmod>2025-05-30T12:28:27-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/tips-success-access-assurance-suite</loc>
  <lastmod>2025-05-28T16:56:06-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/latest-exploits-shipped-core-impact</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/securing-your-organization-inside-out</loc>
  <lastmod>2025-05-30T10:43:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-helps-secure-pci-dss-v4.0-requirement-11</loc>
  <lastmod>2025-05-28T16:25:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-you-can-benefit-penetration-tests</loc>
  <lastmod>2025-05-30T10:48:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-keys-building-red-team</loc>
  <lastmod>2025-05-28T16:41:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-steps-building-vulnerability-management-program-part-2</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/remember-these-pci-pen-testing-requirements</loc>
  <lastmod>2025-05-29T14:45:14-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-steps-building-vulnerability-management-program-pt-1</loc>
  <lastmod>2025-05-29T09:51:12-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/who-have-part-your-red-team</loc>
  <lastmod>2025-05-28T16:41:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-vulnerability-management-program</loc>
  <lastmod>2025-05-29T14:45:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-tips-conducting-successful-web-application-tests</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/latest-improvements-shipped-core-impact-2017-r2</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/importance-pci-compliance</loc>
  <lastmod>2025-05-29T12:59:30-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-spot-and-stop-zombie-accounts-your-network</loc>
  <lastmod>2025-05-28T16:56:06-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/biggest-risk-security-breaches-humans</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-set-smart-goals-your-red-team</loc>
  <lastmod>2025-05-28T16:41:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-release-most-beautiful-experience-identity</loc>
  <lastmod>2025-05-28T16:56:06-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/quick-guide-penetration-testing</loc>
  <lastmod>2025-05-28T16:33:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/pivoting-penetration-testing</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/interns-gone-not-forgotten</loc>
  <lastmod>2025-05-29T13:09:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-hacking-your-network-good-idea</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/protecting-your-organization-phishing-schemes-tips-fbi</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/healthcares-unique-cyber-security-challenges</loc>
  <lastmod>2026-02-16T11:24:26-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/benefits-core-impact</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/are-you-prepared-dfars</loc>
  <lastmod>2025-05-29T12:59:56-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-release-core-impact-2017-r2</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-build-red-team</loc>
  <lastmod>2025-05-28T16:41:05-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-questions-ask-about-vulnerability-management</loc>
  <lastmod>2025-05-30T10:38:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/petya-what-really-happened</loc>
  <lastmod>2025-05-30T10:48:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/you-download-penetration-testing-your-applications</loc>
  <lastmod>2025-05-28T16:33:25-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-questions-ask-your-security-consultants</loc>
  <lastmod>2025-05-29T15:16:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-think-attacker-advice-not-so-dark-side</loc>
  <lastmod>2025-05-28T16:33:25-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/lessen-blow-ransomware-or-social-engineering</loc>
  <lastmod>2025-05-28T16:34:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/10-reasons-you-should-be-pen-testing</loc>
  <lastmod>2025-05-28T16:34:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-things-you-need-penetration-testing-tool</loc>
  <lastmod>2025-05-28T16:32:01-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/wannacry-and-rise-ransomware</loc>
  <lastmod>2025-05-28T16:34:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/phishing-what-does-it-look-and-how-avoid-it</loc>
  <lastmod>2025-05-30T10:52:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/biggest-problem-user-access-and-how-fix-it</loc>
  <lastmod>2025-05-30T12:17:01-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-pen-testing-protects-your-federal-agency</loc>
  <lastmod>2025-05-28T16:34:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-penetration-tests-protect-your-retail-business</loc>
  <lastmod>2025-05-29T10:27:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ways-hackers-look-exploit-state-and-local-governments</loc>
  <lastmod>2025-05-30T08:12:39-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/building-best-offensive-security-team</loc>
  <lastmod>2025-02-07T09:54:15-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/students-safely-using-devices-networks-home-school-and-business</loc>
  <lastmod>2025-02-07T09:54:15-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-deal-changing-financial-cybersecurity-regulations</loc>
  <lastmod>2025-05-30T10:43:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/when-revisit-cyber-security-plan</loc>
  <lastmod>2025-05-30T10:34:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-way-thinking-about-vulnerability-management</loc>
  <lastmod>2025-05-29T15:17:22-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/horrible-mistakes-youre-making-pen-testing-pt-2</loc>
  <lastmod>2025-05-29T09:50:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/tips-helping-vulnerability-managers-sleep-easier</loc>
  <lastmod>2025-02-07T09:54:16-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/horrible-mistakes-youre-making-pen-testing-pt-1</loc>
  <lastmod>2025-05-30T10:46:56-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/when-use-pen-test-and-when-use-vulnerability-scan</loc>
  <lastmod>2025-05-30T08:16:59-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-common-mistakes-pen-testing</loc>
  <lastmod>2025-05-30T10:39:13-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-you-should-pen-test-your-applications</loc>
  <lastmod>2025-05-29T12:56:44-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-steps-building-vulnerability-management-program</loc>
  <lastmod>2025-05-29T09:49:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/tips-better-understand-cyber-security</loc>
  <lastmod>2025-05-30T10:52:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-things-you-need-know-about-ransomware</loc>
  <lastmod>2025-05-29T09:45:28-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-outsourcing-security-isnt-something-be-scared</loc>
  <lastmod>2025-02-07T09:54:19-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/security-any-business-size</loc>
  <lastmod>2025-02-07T09:54:19-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-identity-and-access-management-so-hard</loc>
  <lastmod>2025-02-07T09:54:19-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/create-culture-security</loc>
  <lastmod>2025-05-30T10:34:37-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/protecting-your-organization-identity-theft</loc>
  <lastmod>2025-05-30T12:25:22-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/jingle-bells-retail-sells-attacks-are-way-part-1</loc>
  <lastmod>2025-05-29T13:12:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-mitigate-data-breaches-in-healthcare-it</loc>
  <lastmod>2025-06-30T11:10:47-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-prepare-for-a-ddos-attack</loc>
  <lastmod>2025-05-30T10:39:34-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-2016-pro-r1-2-now-available</loc>
  <lastmod>2025-05-28T16:34:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-increase-password-security-with-mobile-reset</loc>
  <lastmod>2025-05-28T16:44:59-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/securing-access-in-an-always-connected-world</loc>
  <lastmod>2025-05-30T12:26:02-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/10-reasons-to-pen-test-your-network</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-pen-test-against-orphaned-and-privileged-accounts</loc>
  <lastmod>2025-05-30T10:46:34-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/the-new-rules-of-penetration-testing</loc>
  <lastmod>2025-05-30T10:53:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-spot-high-risk-accounts-in-your-organization</loc>
  <lastmod>2025-05-30T12:17:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-embarrassing-mistakes-found-in-penetration-tests</loc>
  <lastmod>2025-05-30T10:35:30-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-is-privileged-account-management</loc>
  <lastmod>2025-05-28T16:57:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-2016-pro-r1-1-now-available</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-does-privilege-account-really-mean</loc>
  <lastmod>2025-02-07T09:54:23-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/6-realities-for-effectively-managing-privileged-accounts</loc>
  <lastmod>2025-05-28T16:57:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-steps-to-a-winning-vulnerability-management-program</loc>
  <lastmod>2025-05-30T10:50:48-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/8-tips-for-penetration-testing</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/guest-post-alex-naveira-director-itga-ciso-on-compliance</loc>
  <lastmod>2025-05-30T12:16:04-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-does-compliance-mean-to-a-healthcare-ciso</loc>
  <lastmod>2025-06-30T11:03:45-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-is-intelligent-identity-and-access-management</loc>
  <lastmod>2025-05-30T12:18:54-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/interview-with-a-healthcare-security-expert-william-buddy-gillespie-hcispp</loc>
  <lastmod>2026-02-16T11:26:07-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/navigating-vulnerability-management-infographic</loc>
  <lastmod>2025-05-30T10:49:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/password-auditing</loc>
  <lastmod>2025-05-28T16:44:59-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/navigating-toward-password-free-future-privileged-access-management</loc>
  <lastmod>2025-05-28T16:57:29-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/case-pedm</loc>
  <lastmod>2025-05-28T16:57:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-signs-youve-outgrown-password-vaulting</loc>
  <lastmod>2025-05-28T16:57:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/different-paths-same-goal-privileged-account-and-session-management-pasm-and-privilege</loc>
  <lastmod>2025-05-28T16:57:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/six-ws-granular-access-control</loc>
  <lastmod>2025-05-28T16:57:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/eight-steps-toward-secure-hybrid-cloud-environment</loc>
  <lastmod>2025-05-28T16:57:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/perspectives-changing-linux-ecosystem</loc>
  <lastmod>2025-05-28T16:57:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/public-cloud-os-instances-growing-security-challenges-grow-too</loc>
  <lastmod>2025-05-28T16:57:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/pen-testing-stories-field-combining-tools-take-over-entire-domain</loc>
  <lastmod>2025-05-28T16:33:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/the-threat-and-vulnerability-management-maturity-model</loc>
  <lastmod>2025-05-29T15:17:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/the-exponential-nature-of-password-cracking-costs</loc>
  <lastmod>2025-05-28T16:44:59-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/thoughts-from-black-hat-and-defcon</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/obligatory-java-zero-day-blog-post</loc>
  <lastmod>2025-05-30T10:53:45-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-ready-to-put-on-its-black-hat</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-choose-penetration-tester-vs-red-team</loc>
  <lastmod>2025-05-30T08:11:13-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-manage-pen-testing-skills-shortage</loc>
  <lastmod>2025-05-28T16:32:02-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-financial-services-organizations-mitigate-top-identity-related-access-risks</loc>
  <lastmod>2025-05-30T12:31:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-leverage-comprehensive-privileged-access-management-approach</loc>
  <lastmod>2025-05-28T16:57:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-is-the-ccpa</loc>
  <lastmod>2025-05-29T10:00:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/top-3-it-strategies-for-optimizing-productivity</loc>
  <lastmod>2020-06-03T08:46:23-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-revamp-your-organizations-cybersecurity-program</loc>
  <lastmod>2025-05-28T16:49:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/top-data-breaches-of-2019</loc>
  <lastmod>2025-04-15T12:41:09-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/penetration-testing-for-regulatory-compliance</loc>
  <lastmod>2025-05-28T16:32:02-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/the-importance-of-pen-testing-for-remote-workforce</loc>
  <lastmod>2025-05-28T16:32:01-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/the-truth-abouth-pen-testing-automation</loc>
  <lastmod>2025-05-28T16:31:59-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/healthcare-identity-governance-era-covid-19-five-critical-issues-your-organization-cant-afford</loc>
  <lastmod>2025-05-28T16:22:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/whats-difference-between-iam-iga-and-pam</loc>
  <lastmod>2025-05-28T16:54:53-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-select-right-third-party-pen-testing-service</loc>
  <lastmod>2025-05-28T16:52:53-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-why-active-directories-are-popular-targets</loc>
  <lastmod>2025-05-28T16:31:00-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/5-most-notable-new-features-core-impact-201</loc>
  <lastmod>2025-05-28T16:30:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/iga-and-cloud-what-you-need-to-know</loc>
  <lastmod>2025-05-28T16:54:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-mature-your-vulnerability-management-program</loc>
  <lastmod>2025-05-28T16:30:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/6-ways-defend-yourself-against-password-attacks</loc>
  <lastmod>2025-05-28T16:30:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-reasons-every-organization-should-leverage-third-party-pen-testers</loc>
  <lastmod>2025-05-28T16:52:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/intersection-rpa-and-iga-why-automation-and-identity-governance-go-hand-hand</loc>
  <lastmod>2025-05-28T16:22:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-part-2-external-attacks-active-directory</loc>
  <lastmod>2025-05-28T16:52:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-ways-enterprise-grade-identity-governance-now-works-small-and-mid-sized-organizations</loc>
  <lastmod>2025-05-28T16:22:37-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-major-drivers-iga-and-pam-financial-services-organizations-today</loc>
  <lastmod>2025-05-28T16:54:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/top-14-vulnerability-scanners-cybersecurity-professionals</loc>
  <lastmod>2025-05-28T16:29:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-you-dont-know-about-access-management-hurts-you</loc>
  <lastmod>2025-05-28T16:22:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-part-3-internal-attacks-active-directory</loc>
  <lastmod>2025-05-28T16:52:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/open-source-vs-enterprise-why-not-all-exploits-are-created-equal</loc>
  <lastmod>2025-05-28T16:24:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-phased-approach-can-help-your-iga-program-succeed</loc>
  <lastmod>2025-05-28T16:22:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-part-4-additional-internal-attack-techniques</loc>
  <lastmod>2025-05-28T16:52:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/day-life-pen-tester</loc>
  <lastmod>2025-05-28T16:52:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-reasons-you-may-need-rethink-your-virus-protection-strategy</loc>
  <lastmod>2025-05-28T16:49:37-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/interoperability-cobalt-strike-and-other-notable-new-features-core-impact-203</loc>
  <lastmod>2025-05-28T16:29:56-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-identity-governance-is-essential-for-segregation-of-duties</loc>
  <lastmod>2025-05-30T12:14:06-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/finding-clarity-chaos-5-cybersecurity-trends-2020</loc>
  <lastmod>2025-05-28T16:29:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/adapting-changed-world-6-cybersecurity-predictions-2021</loc>
  <lastmod>2025-05-28T16:29:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-part-5-final-words-advice</loc>
  <lastmod>2025-05-28T16:52:49-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/6-steps-better-securing-internet-things-iot</loc>
  <lastmod>2025-05-28T16:29:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/pros-and-cons-puppets-configuration-management-security</loc>
  <lastmod>2025-05-28T16:57:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-approaches-swift-and-pci-dss-framework</loc>
  <lastmod>2025-05-28T16:57:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-ways-core-impact-can-benefit-large-security-teams</loc>
  <lastmod>2025-05-28T16:29:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/importance-static-application-testing-and-application-pen-tests</loc>
  <lastmod>2025-05-28T16:52:49-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/remote-work-here-to-stay-how-to-deal-access-risks-across-expanded-workforce</loc>
  <lastmod>2025-05-30T12:23:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-ways-identity-governance-should-integrate-with-enterprise-data</loc>
  <lastmod>2025-05-28T16:54:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-privileged-access-management-matters-now-more-ever</loc>
  <lastmod>2025-05-28T16:57:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-the-power-of-core-impact-is-more-accessible-than-ever</loc>
  <lastmod>2025-05-28T16:29:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-reasons-you-should-be-using-siem</loc>
  <lastmod>2025-05-28T16:46:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/penetration-testing-frequency-how-often-should-you-pen-test</loc>
  <lastmod>2025-05-28T16:29:47-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/role-based-access-control-why-it-delivers-modern-approach-managing-access</loc>
  <lastmod>2025-02-07T09:50:57-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/14-exploits-cybersecurity-professionals-are-concerned-about</loc>
  <lastmod>2025-08-19T16:07:47-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-best-practices-patch-management</loc>
  <lastmod>2025-05-28T16:29:44-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/even-better-way-pen-test-new-features-core-impact-211</loc>
  <lastmod>2025-05-28T16:29:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-after-breach-achieving-persistence-golden-and-silver-tickets</loc>
  <lastmod>2025-05-28T16:52:46-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/network-monitoring-and-identity-governance-how-they-work-together-enhance-your-security</loc>
  <lastmod>2025-05-30T12:29:06-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-issues-latest-exploit-printnightmare-flaw</loc>
  <lastmod>2025-05-28T16:29:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-do-ransomware-attacks-keep-happening</loc>
  <lastmod>2025-05-28T16:29:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-strengthen-identity-and-access-management-rise-hybrid-workforce</loc>
  <lastmod>2025-05-28T16:22:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-types-attacks-does-siem-detect</loc>
  <lastmod>2025-05-28T16:46:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/getting-inside-mind-attacker-after-breach-achieving-persistence-domain-replication-abuse</loc>
  <lastmod>2025-05-28T16:51:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-adds-integrations-frontline-vm-and-besecure</loc>
  <lastmod>2025-05-28T16:29:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-after-breach-achieving-persistence-misc-techniques</loc>
  <lastmod>2025-05-28T16:51:20-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-does-least-privilege-access-actually-mean</loc>
  <lastmod>2025-05-28T16:57:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-tools-maturing-your-vulnerability-management-program</loc>
  <lastmod>2025-05-28T16:29:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/getting-inside-mind-attacker-after-breach-achieving-persistence-final-words-advice</loc>
  <lastmod>2025-05-28T16:51:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/iam-mergers-acquisitions-finding-balance-between-security-efficiency</loc>
  <lastmod>2025-05-28T16:22:29-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/tired-hacking-tropes-tv-shows-and-movies</loc>
  <lastmod>2025-05-28T16:28:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-212-incorporating-mitre-framework-and-attack-map-enhancements</loc>
  <lastmod>2025-05-28T16:28:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-critical-access-risks-you-should-find-before-audit-does</loc>
  <lastmod>2025-05-28T16:57:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/reflections-ekoparty-2021</loc>
  <lastmod>2025-05-28T16:51:18-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-is-mitre-attack-framework</loc>
  <lastmod>2025-05-28T16:28:39-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-normal-cybersecurity-part-1-top-three-2021-trends</loc>
  <lastmod>2025-05-28T16:28:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/new-normal-cybersecurity-part-2-top-three-2022-predictions</loc>
  <lastmod>2025-05-28T16:28:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-ways-use-siem-smb</loc>
  <lastmod>2025-05-28T16:46:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/incorporating-new-tools-core-impact</loc>
  <lastmod>2025-05-28T16:28:30-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-its-not-core-impact-vs-cobalt-strike</loc>
  <lastmod>2025-05-28T16:28:29-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/pen-testing-different-environments</loc>
  <lastmod>2025-11-10T16:40:27-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/importance-penetration-testing-cloud-infrastructures</loc>
  <lastmod>2025-05-28T16:28:27-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/overcome-these-3-challenges-achieve-siem-success</loc>
  <lastmod>2025-05-28T16:46:54-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-is-owasp</loc>
  <lastmod>2025-05-28T16:28:27-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-introduces-ransomware-simulation</loc>
  <lastmod>2025-05-28T16:28:25-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/are-you-ready-penetration-test</loc>
  <lastmod>2025-06-10T15:05:02-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-updates-python-agents-and-owasp-top-10</loc>
  <lastmod>2025-05-28T16:25:51-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/going-offensive-federal-agencies-must-move-reactive-proactive-security-approach</loc>
  <lastmod>2025-05-28T16:25:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/4-steps-take-following-pen-test</loc>
  <lastmod>2025-05-28T16:25:49-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/intelligence-gathering-foundation-good-penetration-test</loc>
  <lastmod>2025-07-22T16:00:28-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/active-directory-attack-scenarios-path-printer-domain-admin</loc>
  <lastmod>2025-05-28T16:51:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-offensive-security-enhances-visibility-potential-threats</loc>
  <lastmod>2025-08-19T16:08:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/active-directory-attack-scenarios-part-2-going-beyond-domain-admin</loc>
  <lastmod>2025-05-28T16:51:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/active-directory-attack-scenarios-part-3-deserializing-your-way</loc>
  <lastmod>2025-05-28T16:51:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/use-multifactor-authentication-your-secure-password-reset</loc>
  <lastmod>2025-05-28T16:44:52-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/spotlight-cybersecurity-2022-trends-and-2023-predictions</loc>
  <lastmod>2025-05-28T16:25:46-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-relationship-between-ransomware-and-phishing</loc>
  <lastmod>2025-05-29T09:47:46-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-updates-new-version-release-and-impacket</loc>
  <lastmod>2025-05-28T16:25:44-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/understanding-cve-ranking-and-top-cves</loc>
  <lastmod>2025-05-28T16:25:44-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-supply-chain-attack-and-how-can-organizations-defend-against-them</loc>
  <lastmod>2025-05-29T09:52:29-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-to-prevent-supply-chain-attacks</loc>
  <lastmod>2025-05-29T09:51:56-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ibmi-hacking-tale</loc>
  <lastmod>2025-05-28T16:25:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/hardware-call-stack</loc>
  <lastmod>2023-03-06T12:16:26-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/vintage-vulnerabilities-new-attacks-can-exploit-old-weaknesses</loc>
  <lastmod>2025-05-28T16:25:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/role-house-penetration-testing</loc>
  <lastmod>2025-07-22T16:00:15-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/pen-testing-across-environment-external-internal-wireless</loc>
  <lastmod>2025-07-22T16:00:00-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/advantages-cybersecurity-vendor-consolidation</loc>
  <lastmod>2025-05-28T16:25:40-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/upskilling-and-reskilling-your-it-team-user-friendly-offensive-security-tools</loc>
  <lastmod>2025-05-28T16:25:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/danger-overconfidence-cybersecurity</loc>
  <lastmod>2025-05-28T16:25:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/active-directory-attack-paths-discovery-leverage-power-bloodhound-within-core-impact</loc>
  <lastmod>2025-05-28T16:25:38-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/three-reasons-why-organizations-should-always-retest-after-initial-pen-test</loc>
  <lastmod>2025-07-22T15:59:39-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/prioritizing-cybersecurity-during-organizational-change</loc>
  <lastmod>2025-05-28T16:25:36-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/underestimating-why-ransomware</loc>
  <lastmod>2025-05-29T10:03:01-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/standardizing-red-teaming-financial-sector-tiber-eu-framework</loc>
  <lastmod>2025-05-28T16:37:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cybersecurity-heats-summer</loc>
  <lastmod>2025-05-28T16:25:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/accelerating-security-maturity-fortra-bundles</loc>
  <lastmod>2025-05-28T16:25:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/best-security-practices-digital-banking</loc>
  <lastmod>2025-05-28T16:25:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/five-things-you-didnt-know-about-core-impact</loc>
  <lastmod>2025-05-28T16:25:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-recover-after-failing-cybersecurity-audit</loc>
  <lastmod>2025-05-28T16:24:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/debunking-popular-myths-about-pen-testing</loc>
  <lastmod>2025-05-28T16:24:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-update-version-215-release</loc>
  <lastmod>2025-05-28T16:24:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-updates-dec-2023</loc>
  <lastmod>2025-05-28T16:24:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cybersecurity-and-the-law-taking-proactive-steps</loc>
  <lastmod>2025-05-28T16:24:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-jan-2024</loc>
  <lastmod>2025-05-28T16:24:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/what-role-purple-team-and-why-it-important</loc>
  <lastmod>2025-05-28T16:37:19-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/why-relay-attacks-are-still-common-and-how-prevent-them</loc>
  <lastmod>2025-05-28T16:24:33-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-feb-2024</loc>
  <lastmod>2025-05-28T16:24:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/advantages-offensive-security-vendor-consolidation</loc>
  <lastmod>2025-05-28T16:24:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-march-2024</loc>
  <lastmod>2025-05-28T16:24:32-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-april-2024</loc>
  <lastmod>2025-05-28T16:24:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-may-2024</loc>
  <lastmod>2025-05-28T16:24:31-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/weighing-risk-cost-skipping-pen-tests</loc>
  <lastmod>2025-12-30T15:28:45-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ciso-commentary-how-often-should-you-pen-test</loc>
  <lastmod>2025-08-19T15:31:57-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ciso-commentary-budgeting-offensive-security</loc>
  <lastmod>2025-08-19T15:20:45-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/ciso-commentary-art-patching</loc>
  <lastmod>2025-08-19T15:22:50-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-june-2024</loc>
  <lastmod>2025-05-28T16:24:28-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/3-components-proactive-security-strategy</loc>
  <lastmod>2025-07-22T15:53:35-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-july-2024</loc>
  <lastmod>2025-05-28T16:24:27-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-216-take-control-with-connection-store</loc>
  <lastmod>2025-05-28T16:24:27-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-august-september-2024</loc>
  <lastmod>2025-05-28T16:24:21-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/are-you-prepared-for-ransomware-irl</loc>
  <lastmod>2025-07-22T15:53:10-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-proactively-harden-your-environment-against-compromised-credentials</loc>
  <lastmod>2025-07-22T15:52:53-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-october-2024</loc>
  <lastmod>2025-05-28T16:24:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-november-2024</loc>
  <lastmod>2025-05-28T16:24:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-and-cobalt-strike-distinct-strengths-enhanced-combination</loc>
  <lastmod>2025-05-28T16:24:13-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-monthly-chronicle-exploits-and-updates-december-2024-january-2025</loc>
  <lastmod>2025-05-28T16:24:13-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-quarterly-chronicle-exploits-and-updates-q1-2025</loc>
  <lastmod>2025-05-28T16:24:12-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-217-transform-your-agents</loc>
  <lastmod>2025-05-28T16:24:12-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/proposed-hipaa-update-makes-yearly-pen-testing-mandatory</loc>
  <lastmod>2025-07-17T15:32:49-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/completing-circle-path-cve-2025-7388</loc>
  <lastmod>2025-09-04T10:45:07-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/sec-readiness-why-offensive-security-matters-more-than-ever</loc>
  <lastmod>2025-09-10T11:54:39-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-quarterly-chronicle-exploits-and-updates-q2-2025</loc>
  <lastmod>2025-10-09T21:51:26-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/offensive-security-is-now-a-must</loc>
  <lastmod>2025-09-10T11:20:41-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-cyber-weaknesses-lead-to-empty-shelves</loc>
  <lastmod>2025-09-23T16:06:16-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/strategic-value-of-offensive-security</loc>
  <lastmod>2025-10-17T10:50:17-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/how-pen-testing-shines-light-your-hidden-technical-debt</loc>
  <lastmod>2025-10-15T13:03:55-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/7-overlooked-attack-vectors-lurking-your-office-environment</loc>
  <lastmod>2025-10-22T10:14:42-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/whats-new-impackets-013-release</loc>
  <lastmod>2025-10-30T11:42:53-05:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-v218-release-blog</loc>
  <lastmod>2025-12-09T14:26:23-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/core-impact-chronicle-exploits-and-updates-h2-2025</loc>
  <lastmod>2026-02-06T13:17:12-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/blog/cve-2026-2636-blf-log-file-unrecoverable-state-bsod</loc>
  <lastmod>2026-02-25T13:00:27-06:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/auto-parts-manufacturer</loc>
  <lastmod>2025-05-28T16:44:58-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/cigna-healthspring</loc>
  <lastmod>2026-02-16T11:23:41-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/global-manufacturer</loc>
  <lastmod>2025-05-28T16:44:58-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/large-midwestern-university</loc>
  <lastmod>2025-05-28T16:33:15-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/major-airline-carrier</loc>
  <lastmod>2025-05-28T16:33:15-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/west-midlands-police</loc>
  <lastmod>2025-05-28T16:56:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/banking-customer</loc>
  <lastmod>2025-05-28T16:22:43-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/us-government-laboratory</loc>
  <lastmod>2025-05-28T16:33:15-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/wellspan-health</loc>
  <lastmod>2026-02-16T11:22:02-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/financial-company-id-administration-and-logging</loc>
  <lastmod>2025-05-28T16:57:29-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/food-and-beverage-automated-access-control</loc>
  <lastmod>2025-05-28T16:57:29-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/health-system-server-management-system</loc>
  <lastmod>2026-02-16T11:22:50-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/banking-privileged-user-authentication</loc>
  <lastmod>2025-05-28T16:57:24-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/national-television-network-centralizes-its-penetration-testing-toolkit-core</loc>
  <lastmod>2025-05-28T16:31:55-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/large-healthcare-organization</loc>
  <lastmod>2026-02-16T11:20:58-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/security-consulting-firm-increases-efficiency-automated-pen-tests-core</loc>
  <lastmod>2025-05-28T16:30:46-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/cybersecurity-consulting-firm-leverages-core-impact-flexible-pen-testing</loc>
  <lastmod>2025-05-28T16:29:57-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/enhancing-hospital-cybersecurity-automated-penetration-testing-software</loc>
  <lastmod>2026-03-24T14:28:16-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/government-penetration-testing-use-case</loc>
  <lastmod>2026-02-20T15:52:22-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/case-studies/finance-penetration-testing-use-case</loc>
  <lastmod>2026-02-24T11:34:13-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/siem</loc>
  <lastmod>2025-05-28T16:47:13-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/privileged-access-management</loc>
  <lastmod>2025-05-28T16:57:27-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/identity-governance-and-administration</loc>
  <lastmod>2023-07-27T02:59:33-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing</loc>
  <lastmod>2025-05-28T16:33:10-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing/red-team</loc>
  <lastmod>2025-05-28T16:37:21-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing/phishing</loc>
  <lastmod>2025-05-28T16:33:08-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/compliance</loc>
  <lastmod>2025-04-14T16:09:05-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/threat-detection</loc>
  <lastmod>2025-05-28T16:49:40-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/identity-governance-and-administration/iam</loc>
  <lastmod>2025-05-28T16:54:58-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/compliance/nist</loc>
  <lastmod>2023-06-01T10:23:51-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/vulnerability-management-program</loc>
  <lastmod>2025-03-13T15:40:29-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/cyber-attacks</loc>
  <lastmod>2025-05-28T16:30:54-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/cyber-attacks/ransomware</loc>
  <lastmod>2025-05-28T16:30:52-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/identity-governance-and-administration/role-based-access-control</loc>
  <lastmod>2022-01-18T16:16:25-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/healthcare/iam</loc>
  <lastmod>2025-05-28T16:35:47-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/offensive-security</loc>
  <lastmod>2025-05-28T16:25:41-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.8</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/demo-watch</loc>
  <lastmod>2025-05-28T16:47:11-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2020-pen-testing-survey-report</loc>
  <lastmod>2025-05-28T16:32:10-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/demo</loc>
  <lastmod>2025-05-28T16:47:10-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/pricing</loc>
  <lastmod>2025-05-28T16:47:10-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/freemium</loc>
  <lastmod>2025-05-28T16:47:09-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/trial-download</loc>
  <lastmod>2025-05-28T16:47:07-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-insiders-2019-malware-report</loc>
  <lastmod>2025-05-30T10:51:46-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2019-insider-threat-report</loc>
  <lastmod>2025-05-28T16:54:58-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/7-iam-fears-and-how-overcome-them</loc>
  <lastmod>2025-05-30T12:19:13-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite/demo</loc>
  <lastmod>2025-05-30T12:29:46-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite/pricing</loc>
  <lastmod>2025-05-30T11:11:37-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-assurance-suite/demo</loc>
  <lastmod>2025-05-28T16:54:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-assurance-suite/pricing</loc>
  <lastmod>2025-05-28T16:54:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-privileged-access-manager-boks/demo</loc>
  <lastmod>2025-05-28T16:57:22-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-privileged-access-manager-boks/pricing</loc>
  <lastmod>2025-05-28T16:57:22-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-privileged-access-manager-boks/demo-watch</loc>
  <lastmod>2025-05-28T16:57:22-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/demo</loc>
  <lastmod>2025-05-28T16:32:09-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/enterprise-pricing</loc>
  <lastmod>2025-05-28T16:32:09-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-password/pricing</loc>
  <lastmod>2025-05-28T16:44:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-insight/demo</loc>
  <lastmod>2025-05-30T11:12:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-insight/scan</loc>
  <lastmod>2025-05-30T12:18:14-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/cyber-threat-solutions/demo</loc>
  <lastmod>2026-02-23T08:42:48-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/iga-solutions/demo</loc>
  <lastmod>2025-05-30T12:23:34-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/about/contact</loc>
  <lastmod>2024-11-06T15:45:04-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/pricing</loc>
  <lastmod>2023-08-22T09:24:32-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/demo</loc>
  <lastmod>2025-05-29T10:04:33-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/contact</loc>
  <lastmod>2020-05-26T12:34:36-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/pricing</loc>
  <lastmod>2025-05-30T10:51:18-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/about/partners</loc>
  <lastmod>2025-05-29T09:59:19-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/government/contact</loc>
  <lastmod>2025-05-29T10:23:54-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/doing-healthcare-identity-governance-right</loc>
  <lastmod>2025-05-30T11:14:09-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-role-designer/smart-roles-demo</loc>
  <lastmod>2025-05-30T12:21:39-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/identity-access-governance-buyers-guide</loc>
  <lastmod>2025-02-07T09:20:14-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/identity-access-risk</loc>
  <lastmod>2025-05-30T12:27:22-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/insider-threat-toolkit</loc>
  <lastmod>2025-05-30T10:54:17-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/intelligent-iam-dummies</loc>
  <lastmod>2025-05-30T11:14:23-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/making-case-for-identity-governance</loc>
  <lastmod>2025-05-30T12:30:35-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/identity-governance</loc>
  <lastmod>2025-05-30T12:22:01-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/penetration-testing</loc>
  <lastmod>2025-05-28T16:32:07-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-insiders-2020-malware-report</loc>
  <lastmod>2025-05-28T16:49:39-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/iga-solutions/healthcare-demo-watch</loc>
  <lastmod>2025-05-28T16:54:54-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/financial-services-identity-governance-privileged-access-management</loc>
  <lastmod>2025-05-30T11:13:31-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/iga-solutions/excess-privilege-stimulus</loc>
  <lastmod>2021-12-20T14:05:31-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-role-designer/free-role-design/trial</loc>
  <lastmod>2026-02-23T08:42:22-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/demo-watch</loc>
  <lastmod>2025-10-03T08:29:46-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-password/demo</loc>
  <lastmod>2025-05-28T16:44:55-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/access-assurance-suite</loc>
  <lastmod>2025-05-28T16:22:36-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/core-impact</loc>
  <lastmod>2025-05-28T16:30:44-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/connector-rapid-development-kit</loc>
  <lastmod>2025-05-28T16:54:50-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/trial-download</loc>
  <lastmod>2025-05-28T16:29:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/basic-pricing</loc>
  <lastmod>2025-05-28T16:29:55-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/pro-pricing</loc>
  <lastmod>2025-09-04T10:27:16-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite/trial-download</loc>
  <lastmod>2025-05-30T12:27:04-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-insiders-2021-siem-report</loc>
  <lastmod>2025-05-28T16:46:57-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-password/voice-biometrics-authentication/demo</loc>
  <lastmod>2025-05-28T16:44:52-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-insiders-2021-malware-report</loc>
  <lastmod>2025-05-28T16:49:36-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2021-identity-and-access-management-report</loc>
  <lastmod>2025-05-28T16:22:34-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/advanced-pricing</loc>
  <lastmod>2026-03-12T13:30:22-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-insiders-2022-siem-report</loc>
  <lastmod>2025-05-28T16:46:54-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/advanced-trial-download</loc>
  <lastmod>2025-05-28T16:28:26-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/proactive-approach-federal-cybersecurity-0</loc>
  <lastmod>2026-02-17T10:46:57-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/essentials-pricing</loc>
  <lastmod>2025-05-28T16:28:21-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/elite-pricing</loc>
  <lastmod>2025-05-28T16:28:19-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing-core-impact</loc>
  <lastmod>2025-09-29T15:59:24-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/red-team-pricing</loc>
  <lastmod>2025-12-19T00:31:15-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2023-pen-testing-survey-report</loc>
  <lastmod>2025-05-28T16:25:41-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/simple-guide-successful-red-teaming-0</loc>
  <lastmod>2026-02-17T11:01:51-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/2023-penetration-testing-report-webinar</loc>
  <lastmod>2023-04-07T12:24:38-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2023-national-cybersecurity-strategy</loc>
  <lastmod>2025-05-29T09:58:06-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/offensive-security-suite-pricing</loc>
  <lastmod>2025-12-18T17:43:51-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/bundling-up-importance-layering-offensive-security-solutions</loc>
  <lastmod>2025-05-29T14:46:31-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/pricing-request</loc>
  <lastmod>2025-05-29T09:58:49-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/cobalt-strike/pricing</loc>
  <lastmod>2025-11-24T14:35:33-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing-core-impact-on-demand-demo</loc>
  <lastmod>2025-05-28T16:24:36-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/text-legibility</loc>
  <lastmod>2024-04-18T08:52:27-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/guide-to-creating-a-proactive-cybersecurity-strategy-0</loc>
  <lastmod>2026-02-10T14:47:56-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/demo</loc>
  <lastmod>2025-12-18T18:44:39-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/decoding-attacker-mindset-pen-testing-revelations-0</loc>
  <lastmod>2026-02-10T14:52:48-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/cobalt-strike/trial-download</loc>
  <lastmod>2025-05-28T16:38:45-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles/advanced-trial</loc>
  <lastmod>2025-05-28T16:24:20-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/avoiding-compliance-surprises-healthcare</loc>
  <lastmod>2025-06-27T14:15:01-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cisos-guide-justifying-offensive-security-investments-0</loc>
  <lastmod>2026-02-10T14:44:34-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.7</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-impact</loc>
  <lastmod>2025-05-28T16:33:16-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-role-designer</loc>
  <lastmod>2025-05-30T12:19:35-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-password</loc>
  <lastmod>2025-05-28T16:44:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/penetration-testing-services</loc>
  <lastmod>2025-05-28T16:52:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-certify</loc>
  <lastmod>2025-05-30T12:13:43-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/visual-identity-suite</loc>
  <lastmod>2025-05-30T12:23:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/access-request</loc>
  <lastmod>2025-05-28T16:22:43-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/compliance</loc>
  <lastmod>2025-05-28T16:42:20-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/provisioning</loc>
  <lastmod>2025-05-28T16:35:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-access-assurance-suite</loc>
  <lastmod>2025-05-28T16:56:03-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-pdns</loc>
  <lastmod>2025-05-30T10:55:01-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/access-insight</loc>
  <lastmod>2025-05-30T12:30:55-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/event-manager</loc>
  <lastmod>2025-05-28T16:47:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/password-reset</loc>
  <lastmod>2025-05-28T16:44:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/access-risk-quick-scan</loc>
  <lastmod>2025-05-30T12:22:54-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-privileged-access-manager-boks</loc>
  <lastmod>2025-05-28T16:57:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-impact-technical</loc>
  <lastmod>2025-11-12T08:32:47-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/government/DOE-BPA</loc>
  <lastmod>2025-05-28T16:29:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/voice-biometrics</loc>
  <lastmod>2025-05-28T16:44:55-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/advanced-bundle</loc>
  <lastmod>2025-05-28T16:29:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/cobalt-strike</loc>
  <lastmod>2025-05-28T16:40:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/infrastructure-protection-proactive-security-datasheet</loc>
  <lastmod>2025-05-28T16:29:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/essentials-bundle</loc>
  <lastmod>2025-05-28T16:28:22-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/elite-bundle</loc>
  <lastmod>2026-03-09T15:47:56-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/ost-outflank-security-tooling</loc>
  <lastmod>2025-05-28T16:37:21-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/red-team-suite</loc>
  <lastmod>2025-12-18T12:27:00-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/offensive-security-suite</loc>
  <lastmod>2025-12-19T00:09:26-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/offensive-security-bundles-fortra</loc>
  <lastmod>2025-12-18T13:48:13-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/wireless-network-pen-testing-datasheet</loc>
  <lastmod>2025-05-28T16:25:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/datasheets/core-impact-101-training</loc>
  <lastmod>2025-05-28T16:24:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/daily-siem-use-case-guide-event-manager</loc>
  <lastmod>2025-05-28T16:46:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/our-privileged-access-management-solution-your-sudo-replacement</loc>
  <lastmod>2021-02-16T12:18:48-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/how-assess-your-security-pen-testing-use-case-guide</loc>
  <lastmod>2025-07-18T12:40:31-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/a-simple-guide-to-successful-penetration-testing</loc>
  <lastmod>2025-05-28T16:29:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2020-siem-report</loc>
  <lastmod>2025-05-28T16:46:55-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2019-iam-report</loc>
  <lastmod>2025-05-28T16:22:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2020-iam-report</loc>
  <lastmod>2025-05-28T16:22:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/taking-back-control-proactive-approach-advance-your-security-maturity</loc>
  <lastmod>2025-05-28T16:28:35-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2021-penetration-testing-report</loc>
  <lastmod>2025-05-28T16:28:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2022-pen-testing-survey-report/thank-you</loc>
  <lastmod>2025-05-28T16:28:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2022-penetration-testing-report</loc>
  <lastmod>2025-05-29T09:58:27-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cybersecurity-trends-and-predictions-2022-2023</loc>
  <lastmod>2025-05-14T14:35:21-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/certifications-look-when-choosing-pen-testing-team</loc>
  <lastmod>2025-05-28T16:51:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/what-look-pen-test-report</loc>
  <lastmod>2025-05-28T16:24:33-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2023-penetration-testing-report</loc>
  <lastmod>2025-05-29T10:06:07-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2024-pen-testing-survey-report</loc>
  <lastmod>2025-05-28T16:38:43-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/financial-industry-threat-landscape</loc>
  <lastmod>2025-05-28T16:24:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/avoiding-fintech-compliance-surprises</loc>
  <lastmod>2025-10-14T14:25:01-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/how-to-use-upskilling-reskilling-to-scale-your-cybersecurity-team</loc>
  <lastmod>2025-10-14T14:27:19-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/managing-your-attack-surface</loc>
  <lastmod>2025-10-14T14:28:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/complete-guide-layering-offensive-security</loc>
  <lastmod>2025-10-14T14:31:32-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/understanding-mobile-application-penetration-testing</loc>
  <lastmod>2026-01-14T15:44:41-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/when-to-use-pen-testing-tools-services-both</loc>
  <lastmod>2025-10-14T14:35:16-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/malware-attacks-ibmi-aix-linux-servers</loc>
  <lastmod>2025-10-14T14:37:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/how-build-red-team</loc>
  <lastmod>2025-10-14T14:38:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/corporate-risk-due-diligence</loc>
  <lastmod>2025-10-14T14:40:04-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/smarter-about-pen-testing</loc>
  <lastmod>2025-10-14T14:41:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/ways-cyber-attackers-exploit-government-agencies</loc>
  <lastmod>2025-10-14T14:43:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/10-cybersecurity-mistakes-avoid</loc>
  <lastmod>2025-10-14T14:44:54-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/implementing-strategic-cloud-security</loc>
  <lastmod>2025-10-14T14:46:31-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/siem-buyers-guide</loc>
  <lastmod>2025-10-14T14:47:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/federal-cybersecurity-toolkit</loc>
  <lastmod>2025-10-14T14:48:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/frequent-mistakes-in-ransomware-prevention</loc>
  <lastmod>2025-10-14T14:50:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/red-blue-and-purple-teams</loc>
  <lastmod>2025-10-14T14:51:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/ways-hackers-exploit-federal-agencies</loc>
  <lastmod>2025-10-14T14:54:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/dissecting-ransomware-understanding-types-stages-and-prevention</loc>
  <lastmod>2025-10-14T15:03:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/how-build-culture-security</loc>
  <lastmod>2025-10-14T15:04:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/cisos-guide-justifying-offensive-security-investments</loc>
  <lastmod>2026-02-10T14:45:21-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/guide-to-creating-a-proactive-cybersecurity-strategy</loc>
  <lastmod>2026-02-10T14:49:22-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/simple-guide-successful-red-teaming</loc>
  <lastmod>2026-02-17T11:04:23-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/decoding-attacker-mindset-pen-testing-revelations</loc>
  <lastmod>2026-02-10T14:53:35-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/proactive-approach-federal-cybersecurity</loc>
  <lastmod>2026-02-17T10:49:11-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/showmecon</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/black-hat-usa-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/troopers-2025</loc>
  <lastmod>2025-05-30T14:15:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/fortra-cobalt-strike-demo-session-may-2025</loc>
  <lastmod>2025-05-30T14:15:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/secretcon-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/x33fcon-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/defcon-33-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/sikkerhetsfestivalen-norwegian-security-festival-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/orangecon-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/sector-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/wild-west-hackin-fest-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/black-hat-europe-2025</loc>
  <lastmod>2025-05-30T14:14:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/gridseccon-2025</loc>
  <lastmod>2025-05-30T14:38:58-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/les-assises-2025</loc>
  <lastmod>2025-05-30T14:38:43-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/black-hat-session-next-generation-post-exploitation-cobalt-strike-0</loc>
  <lastmod>2025-05-30T14:15:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/black-hat-session-training-specialist-models-automating-malware-development-0</loc>
  <lastmod>2025-05-30T14:15:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/insomnihack-2026</loc>
  <lastmod>2026-03-05T09:58:46-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/rsac-conference-san-francisco</loc>
  <lastmod>2026-03-11T14:28:38-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/secure-360-conference-2026</loc>
  <lastmod>2026-02-13T12:31:40-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/orangecon-2026</loc>
  <lastmod>2026-02-16T10:08:33-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/x33fcon-2026</loc>
  <lastmod>2026-02-16T10:30:22-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/defcon-2026</loc>
  <lastmod>2026-02-16T10:55:44-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/sikkerhetsfestivalen-2026</loc>
  <lastmod>2026-02-16T11:19:55-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/prasec-2026</loc>
  <lastmod>2026-02-18T14:41:50-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/cyphercon-2026</loc>
  <lastmod>2026-02-26T16:41:54-06:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/upcoming/black-hat-asia-2026</loc>
  <lastmod>2026-03-26T17:24:12-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries</loc>
  <lastmod>2025-10-06T12:52:01-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services</loc>
  <lastmod>2025-07-07T11:25:21-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/about</loc>
  <lastmod>2026-01-15T11:12:00-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/healthcare</loc>
  <lastmod>2026-03-24T14:26:26-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/financial-services</loc>
  <lastmod>2026-01-21T15:42:43-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/government</loc>
  <lastmod>2026-01-16T12:47:20-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/higher-education</loc>
  <lastmod>2025-07-22T15:50:48-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/industries/retail</loc>
  <lastmod>2025-07-22T15:38:42-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/paragraph-type-examples-internal-use-only</loc>
  <lastmod>2025-05-21T09:23:39-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/about/partners/find</loc>
  <lastmod>2021-11-04T14:27:15-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/iga-solutions/connectors</loc>
  <lastmod>2025-05-29T09:53:08-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support</loc>
  <lastmod>2024-01-16T10:12:26-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/iot-security</loc>
  <lastmod>2025-05-30T10:47:37-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/social-engineering</loc>
  <lastmod>2020-05-26T18:55:57-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/cloud-security</loc>
  <lastmod>2025-05-29T12:57:06-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/network-security</loc>
  <lastmod>2025-05-29T12:57:34-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/services/application-security</loc>
  <lastmod>2025-05-30T10:40:13-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs</loc>
  <lastmod>2025-05-28T16:32:05-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/siem-integrations</loc>
  <lastmod>2025-05-28T16:47:05-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/features</loc>
  <lastmod>2025-05-28T16:32:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/404</loc>
  <lastmod>2020-05-20T17:53:58-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/solutions</loc>
  <lastmod>2020-05-21T10:06:13-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/pricing-plans</loc>
  <lastmod>2025-05-28T16:47:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/siem-integrations/all</loc>
  <lastmod>2025-05-28T16:47:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/test-svg</loc>
  <lastmod>2020-06-19T11:42:34-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/agents</loc>
  <lastmod>2025-05-28T16:31:59-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager/pci-dss</loc>
  <lastmod>2025-05-28T16:47:03-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/rapid-pen-tests</loc>
  <lastmod>2025-05-28T16:31:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/releases/20-1</loc>
  <lastmod>2025-05-28T16:31:54-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-customer-quarterly-update-sep-2020</loc>
  <lastmod>2025-05-28T16:30:51-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/cve-2020-1472-detector</loc>
  <lastmod>2025-05-28T16:30:51-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/exploits</loc>
  <lastmod>2025-08-25T11:14:43-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training</loc>
  <lastmod>2025-05-28T16:30:48-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/core-impact-product-suggestion</loc>
  <lastmod>2025-05-28T16:30:48-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/network-insight/demo-watch/full-demo</loc>
  <lastmod>2021-11-10T13:46:10-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/demo-watch/full-demo</loc>
  <lastmod>2025-05-28T16:30:47-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/trial-instructions</loc>
  <lastmod>2025-05-28T16:30:47-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/core-impact/20-3</loc>
  <lastmod>2025-05-28T16:29:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/pricing-plans</loc>
  <lastmod>2025-12-18T17:53:12-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-march-2021</loc>
  <lastmod>2025-05-28T16:29:51-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/g2-review%3Fg2coreimpact</loc>
  <lastmod>2021-02-22T12:14:32-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/trials</loc>
  <lastmod>2025-09-10T10:26:30-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/guides/2020-pen-testing-survey-report-1</loc>
  <lastmod>2025-05-28T16:29:49-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/core-impact/core-impact-en-20-minutos</loc>
  <lastmod>2025-05-28T16:29:49-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/core-impact/21-1</loc>
  <lastmod>2025-05-28T16:29:41-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/about/partners/educational-partners</loc>
  <lastmod>2022-10-25T12:45:59-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products</loc>
  <lastmod>2025-12-17T23:04:01-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-impact-insiders-quarterly-update-december-2021</loc>
  <lastmod>2025-05-28T16:28:40-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/bundles</loc>
  <lastmod>2026-03-25T09:36:42-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/exploits-criteria</loc>
  <lastmod>2025-08-15T10:53:42-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/penetration-testing-core-impact-demo-watch/thank-you</loc>
  <lastmod>2025-05-28T16:24:35-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/penetration-testing-proactive-security</loc>
  <lastmod>2024-04-11T09:00:49-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/reporting</loc>
  <lastmod>2025-05-28T16:24:21-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/impacket</loc>
  <lastmod>2026-02-11T10:20:15-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/interactive-demo</loc>
  <lastmod>2025-05-28T16:24:17-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/why-core-impact</loc>
  <lastmod>2025-09-08T11:08:42-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/cobalt-strike/cobalt-strike-research-labs</loc>
  <lastmod>2026-04-02T17:03:00-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-brings-consumer-grade-user-experience-access-assurance-suite</loc>
  <lastmod>2025-05-28T16:56:06-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-continues-its-position-industry-leader-penetration-testing</loc>
  <lastmod>2025-05-28T16:33:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-continues-lead-identity-management-innovation-introduction-new-toolkit</loc>
  <lastmod>2025-05-28T16:56:06-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-fortra-company-announces-new-release-leading-penetration-testing-software</loc>
  <lastmod>2025-05-28T16:33:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-mitigates-security-risks-and-increases-efficiency-release-core-mobile-reset-and</loc>
  <lastmod>2025-05-30T12:18:35-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-recognized-frost-sullivans-2017-technology-leadership-award</loc>
  <lastmod>2025-05-29T13:08:45-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-releases-updated-multi-vector-penetration-testing-solution-find-remediate</loc>
  <lastmod>2025-05-28T16:34:09-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/first-ever-penetration-testing-survey-core-security-reveals-pen-testing-critical-tool</loc>
  <lastmod>2025-05-28T16:33:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-cobalt-strike-expand-core-security-business</loc>
  <lastmod>2025-05-28T16:41:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-core-security-solutions-secureauth-expand-cybersecurity-portfolio</loc>
  <lastmod>2022-10-25T12:20:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-event-manager-receives-475-out-5-stars-sc-labs-group-test-siem</loc>
  <lastmod>2025-05-28T16:47:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-making-password-reset-process-self-service-faster-and-simpler</loc>
  <lastmod>2025-05-28T16:44:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/hacking-ibm-i-penetration-testing-gains-popularity</loc>
  <lastmod>2025-05-28T16:33:05-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-buys-ethical-hacking-company-beefing-its-cybersecurity-business</loc>
  <lastmod>2025-05-28T16:41:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/fortra-makes-another-acquisition-scooping-cobalt-strike</loc>
  <lastmod>2025-05-28T16:41:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/industry-leaders-and-cybersecurity-experts-insight-marriott-international-data-breach</loc>
  <lastmod>2025-05-29T10:22:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/plextrac-announces-integration-core-impact</loc>
  <lastmod>2025-05-28T16:32:15-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/leader-kuppingercole-leadership-compass</loc>
  <lastmod>2025-05-30T12:26:22-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/e-spin-group-partners-with-core-security</loc>
  <lastmod>2025-05-30T10:45:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/native-virus-protection-software-linuxone-linux-ibmz</loc>
  <lastmod>2025-05-28T16:49:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/new-cobalt-strike-penetration-testing-software-release-drives-security</loc>
  <lastmod>2025-05-28T16:41:01-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-announces-new-flexible-licensing-and-product-release-cycle</loc>
  <lastmod>2025-05-28T16:31:54-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/tindo-group-deliver-penetration-testing-solutions-singapore</loc>
  <lastmod>2025-05-29T15:18:45-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-announces-availability-enterprise-grade-identity-governance-SMB</loc>
  <lastmod>2025-05-28T16:22:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/fortra-acquires-digital-defense-to-expand-cybersecurity-portfolio</loc>
  <lastmod>2022-10-31T12:55:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/penetration-testing-still-vital-part-of-organizational-security-based-on-annual-survey</loc>
  <lastmod>2025-05-28T16:29:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/organizations-forced-to-ramp-up-pen-testing-during-the-pandemic</loc>
  <lastmod>2025-05-28T16:29:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/penetration-testing-of-enterprise-systems-more-prevalent-than-ever</loc>
  <lastmod>2025-05-28T16:29:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-buildit-virtual-user-conference-helping-organizations-build</loc>
  <lastmod>2025-05-29T09:53:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/advancement-of-penetration-testing-throughout-the-pandemic</loc>
  <lastmod>2025-05-28T16:29:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-robust-growth-draws-new-investment-harvest-partners-scf-lp</loc>
  <lastmod>2022-11-02T10:53:35-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/evolution-and-advancement-of-pen-testing-under-covid-19</loc>
  <lastmod>2025-05-28T16:29:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/ceo-kate-bolseth-named-second-round-mspbj-2021-women-business-award</loc>
  <lastmod>2025-05-29T10:04:52-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/how-we-test-antivirus-and-security-software</loc>
  <lastmod>2025-05-28T16:29:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-phishlabs-continue-expansion-cybersecurity-portfolio</loc>
  <lastmod>2025-05-29T09:57:31-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-enterprise-data-loss-prevention-leader-digital</loc>
  <lastmod>2022-11-02T10:52:45-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/10-essential-skills-and-traits-ethical-hackers</loc>
  <lastmod>2025-05-28T16:28:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-launches-free-cybersecurity-partner-program-higher-education</loc>
  <lastmod>2025-05-28T16:28:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/new-normal-cybersecurity-examining-top-three-2021-trends-and-2022</loc>
  <lastmod>2025-05-28T16:28:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquire-alert-logic-enable-customers-address-cybersecurity</loc>
  <lastmod>2022-11-02T10:54:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/how-set-pentest-lab-using-core-impact</loc>
  <lastmod>2025-05-28T16:28:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/pen-testing-remains-vital-for-reducing-cyber-risk-exposure</loc>
  <lastmod>2025-05-28T16:28:29-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-terranova-security-aid-global-customers-building</loc>
  <lastmod>2025-05-29T10:00:06-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/core-security-helpsystems-introduces-new-ransomware-simulator</loc>
  <lastmod>2025-05-28T16:25:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/e-channelnews-interview-mark-bell-core-security-releases-new-ransomware</loc>
  <lastmod>2025-05-28T16:25:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/helpsystems-acquires-outflank</loc>
  <lastmod>2025-02-07T09:40:22-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/fortra-introduces-new-integrations-offensive-security</loc>
  <lastmod>2025-05-28T16:25:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/press-releases/it-nerd-interview-chris-reffkin-chief-security-risk-officer-fortra</loc>
  <lastmod>2025-05-28T16:24:28-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.4</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/event-manager</loc>
  <lastmod>2025-05-28T16:47:15-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-assurance-suite</loc>
  <lastmod>2025-05-28T16:22:41-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact</loc>
  <lastmod>2026-03-09T15:47:05-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/cobalt-strike</loc>
  <lastmod>2025-12-17T22:58:16-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-access</loc>
  <lastmod>2025-05-28T16:22:38-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-provisioning</loc>
  <lastmod>2025-05-28T16:35:49-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-compliance</loc>
  <lastmod>2025-06-30T10:57:07-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-password</loc>
  <lastmod>2025-05-28T16:44:56-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite</loc>
  <lastmod>2021-12-07T15:27:10-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-role-designer</loc>
  <lastmod>2021-12-20T13:31:26-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-certify</loc>
  <lastmod>2021-12-20T13:26:36-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/access-insight</loc>
  <lastmod>2021-12-20T13:25:22-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-privileged-access-manager-boks</loc>
  <lastmod>2025-05-28T16:57:25-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite/data-integrations</loc>
  <lastmod>2022-01-10T13:00:04-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-privileged-access-manager-boks/granular-control</loc>
  <lastmod>2025-05-28T16:57:19-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-password/voice-biometrics-authentication</loc>
  <lastmod>2025-05-28T16:44:52-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/visual-identity-suite/sailpoint-integration</loc>
  <lastmod>2022-01-10T13:00:07-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/test-product-page</loc>
  <lastmod>2022-01-19T09:58:43-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/fortra-products</loc>
  <lastmod>2025-05-28T16:29:34-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/outflank-security-tooling</loc>
  <lastmod>2025-12-17T22:46:23-06:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-impact-cobalt-strike-advanced-bundle</loc>
  <lastmod>2025-05-28T16:25:33-05:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.9</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/gfuzz-instrumented-web-application-fuzzing-environment</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/windows-smep-bypass-us</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/power-save-denial-service-80211-networks</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/syscall-proxying-simulating-remote-execution</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/html5-heap-sprays-pwn-all-things</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/sap-network-protocols-revisited</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/abusing-windows-wifi-native-api-create-covert-channel</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/building-dynamic-reputation-system-dns</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/detecting-malware-domains-upper-dns-hierarchy</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/md5-to-be-considered-harmful-today</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/using-ai-techniques-improve-pen-testing-automation</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/pentesting-en-aws</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/80211-massive-monitoring</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/attack-planning-real-world</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/vulnerability-management-crossroads-part-i</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/algorithm-find-optimal-attack-paths-nondeterministic-scenarios</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/automating-penetration-tests-ivan-arce-presentation</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/getting-fun-frida</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/intercepting-sap-snc-protected-traffic</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/uncovering-sap-vulnerabilities-reversing-and-breaking-diag-protocol</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/abusing-gdi-ring0-exploit-primitives-reloaded</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/imddos-botnet-discovery-and-analysis</loc>
  <lastmod>2025-05-29T12:02:52-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/dns-noise-measuring-pervasiveness-disposable-domains-modern-dns-traffic</loc>
  <lastmod>2025-05-29T12:02:52-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/characterizing-malicious-traffic-cellular-networks-retrospective</loc>
  <lastmod>2025-05-29T12:02:52-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/breaking-out-virtualbox-through-3d-acceleration</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/modifying-windows-nt-logon-credential</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/deactivate-rootkit</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/core-impact-penetration-test-automation</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/four-different-tricks-to-bypass-stackshield-and-stackguard-protection</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/about-exploits-writing-gerardo-richarte</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/pass-hash-toolkit-windows</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/killing-myth-cisco-ios-rootkitsdik-da-ios-rootkit</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/penetration-testing-learning-kit</loc>
  <lastmod>2025-05-29T12:02:01-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/dynamic-binary-instrumentation-frameworks</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/attack-on-crc-32-integrity-checks-of-encrypted-channels-using-cbc-and-cfb-modes</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/deep-dive-sap-archive-file-formats</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/persistent-bios-infection</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/foundations-and-applications-secure-triggers</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/one-firmware-monitor-em-all-hacklu2012</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/anecdotas-de-seguridad</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/deep-boot</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/honeysap-who-really-wants-your-money</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/code-injection-virtual-machines</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/wpa-migration-mode-wep-back-haunt-you</loc>
  <lastmod>2025-05-29T12:02:00-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/advanced-software-protection-now</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/agafi-advanced-gadget-finder</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/new-smb-and-dcerpc-features-impacket-v0960</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/one-firmware-monitor-em-all</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/password-security-policies-lessons-learned-recent-password-leaks</loc>
  <lastmod>2025-05-29T12:02:02-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/impact-predicting-attacker-tools-security-risk-assessments</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/automating-penetration-tests-a-new-challenge-for-the-is-industry</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/bug-hunting-the-seven-ways-of-the-security-samurai</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/deactivate-the-rootkit-ekoparty-edition</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/heuristics-applied-binary-diffing</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/state-of-the-art-security-from-attackers-viewpoint</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/strong-payload-obfuscation-and-encryption</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/security-in-free-software</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/simulating-cyber-attacks-fun-and-profit</loc>
  <lastmod>2025-05-29T12:02:03-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/the-shellcode-generation</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/an-analysis-of-the-slapper-worm</loc>
  <lastmod>2025-05-29T12:02:05-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/core-labs/publications/examination-ip-cameras-attack-surface-ekoparty2013</loc>
  <lastmod>2025-05-29T12:02:51-05:00</lastmod>
  <changefreq>yearly</changefreq>
  <priority>0.2</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/8-tips-penetration-testing</loc>
  <lastmod>2025-05-28T16:32:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/role-designer-quick-look-demo</loc>
  <lastmod>2025-05-30T13:43:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/lazy-pen-tester-tips-and-tricks</loc>
  <lastmod>2025-05-28T16:32:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/what-identity-governance-and-administration</loc>
  <lastmod>2025-05-30T13:47:18-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/one-two-pick-sticks-learn-hack-counting-six</loc>
  <lastmod>2025-05-28T16:32:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-solve-top-3-struggles-identity-governance-and-administration-iga</loc>
  <lastmod>2025-05-30T13:45:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/responding-ransomware-steps-take-reduce-your-risk</loc>
  <lastmod>2025-05-28T16:49:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/tips-and-tricks-core-impact-expert</loc>
  <lastmod>2025-05-28T16:32:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/access-assurance-suite-92-features-and-enhancements</loc>
  <lastmod>2025-05-28T16:54:58-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/best-practices-effective-phishing-campaigns</loc>
  <lastmod>2025-05-28T16:32:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/identity-access-management-strategies-mitigate-risk</loc>
  <lastmod>2025-05-30T13:59:57-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/whats-new-core-impact-191</loc>
  <lastmod>2025-05-28T16:32:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-use-pen-testing-results-shape-your-broader-security-strategy</loc>
  <lastmod>2025-05-30T13:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/red-blue-and-purple-teams-combining-your-security-capabilities-best-outcome</loc>
  <lastmod>2025-05-28T16:41:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/webinar-incorporating-risk-management-into-your-cybersecurity-strategy</loc>
  <lastmod>2025-05-30T13:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-mitigate-cyber-risk-security-information-and-event-management-siem</loc>
  <lastmod>2025-05-28T16:47:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/top-reasons-move-syslog-siem</loc>
  <lastmod>2025-05-28T16:47:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/balancing-security-priorities-user-efficiency</loc>
  <lastmod>2025-05-30T13:43:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/top-cybersecurity-threats-and-how-siem-protects-against-them</loc>
  <lastmod>2025-05-28T16:47:11-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/top-penetration-testing-challenges-and-how-overcome-them</loc>
  <lastmod>2025-05-30T13:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/the-truth-about-viruses-on-linux</loc>
  <lastmod>2025-05-28T16:49:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/why-endpoint-antivirus-belongs-in-your-security-environment</loc>
  <lastmod>2025-05-28T16:49:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/cybersecurity-trends-2019-and-predictions-2020</loc>
  <lastmod>2025-05-30T13:38:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-demo-security-weekly</loc>
  <lastmod>2025-05-28T16:32:12-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/common-iam-fears-and-how-overcome-them</loc>
  <lastmod>2025-05-30T13:46:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/securing-your-amazon-web-infrastructure</loc>
  <lastmod>2025-05-30T13:39:08-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-get-grip-managing-identity-chaos</loc>
  <lastmod>2025-05-30T13:45:13-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/modern-day-cyber-threats-and-how-siem-solutions-can-reduce-your-risk</loc>
  <lastmod>2025-05-28T16:47:11-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/intelligently-mitigate-your-biggest-healthcare-identity-risks</loc>
  <lastmod>2025-05-30T14:00:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/determining-best-approach-pam-you</loc>
  <lastmod>2025-05-28T16:57:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/pam-without-passwords-fast-tracking-2020-compliance-regimes-without-add-ons</loc>
  <lastmod>2025-05-28T16:57:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/effects-cloud-migration-iam-pam-and-audit</loc>
  <lastmod>2025-05-28T16:57:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/2020-core-security-pen-testing-survey-results</loc>
  <lastmod>2025-05-28T16:32:10-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/healthcare-identity-governance-101-six-proven-strategies-tackling-biggest-healthcare</loc>
  <lastmod>2025-05-30T13:46:11-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/getting-inside-mind-attacker-tls-attacks-and-pitfalls</loc>
  <lastmod>2025-05-30T14:10:38-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/pam-unlocking-potential-password-vault-alternatives</loc>
  <lastmod>2025-05-28T16:57:21-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/s/what%27s-lurking-your-network-uncovering-hidden-access-risks</loc>
  <lastmod>2025-05-28T16:54:56-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/combating-ransomware-strategies-to-prevent-and-detect-attacks</loc>
  <lastmod>2025-05-28T16:49:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/videos/manage-ransomware-attacks-against-your-remote-workforce</loc>
  <lastmod>2025-05-30T13:37:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-penetration-testing-reduces-risk</loc>
  <lastmod>2025-05-28T16:32:02-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-18-2-demo</loc>
  <lastmod>2025-05-28T16:33:21-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/getting-inside-mind-attacker-going-beyond-exploitation</loc>
  <lastmod>2025-05-28T16:52:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/closing-gap-access-risk</loc>
  <lastmod>2025-05-28T16:54:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-pen-testing-reduces-risk</loc>
  <lastmod>2025-05-28T16:32:01-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/how-take-your-vulnerability-management-program-next-level</loc>
  <lastmod>2025-05-28T16:31:59-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/8-ways-tackle-biggest-access-related-information-security-challenges-financial</loc>
  <lastmod>2025-05-28T16:54:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/covid-19-impact-6-critical-access-risks-watch-out-remote-workforce</loc>
  <lastmod>2025-05-28T16:54:53-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/what-it-takes-small-mid-sized-organizations-steer-clear-critical-access-risks</loc>
  <lastmod>2025-05-28T16:54:52-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/meeting-compliance-goals-and-beyond-virus-protection-ibm-systems</loc>
  <lastmod>2025-05-28T16:49:37-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/3-fundamental-pen-tests-every-organization-should-run</loc>
  <lastmod>2025-05-28T16:30:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-customer-quarterly-update-dec-2020</loc>
  <lastmod>2025-05-28T16:30:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/cybersecurity-chaotic-time-2020-trends-and-2021-predictions</loc>
  <lastmod>2025-05-28T16:30:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-certify-quick-look-demo</loc>
  <lastmod>2025-05-30T13:42:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-compliance-quick-look-demo</loc>
  <lastmod>2025-05-28T16:42:19-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-password-quick-look-demo</loc>
  <lastmod>2025-05-28T16:44:55-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-access-insight-quick-look-demo</loc>
  <lastmod>2025-05-30T13:44:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-provisioning-quick-look-demo</loc>
  <lastmod>2025-05-28T16:35:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/evolution-siem-2021-survey-results-revealed</loc>
  <lastmod>2025-05-28T16:46:57-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/prioritizing-pen-testing-2021-survey-results-revealed</loc>
  <lastmod>2025-05-28T16:29:51-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-security-identity-insiders-series-april-2021</loc>
  <lastmod>2025-05-28T16:22:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-role-designer-overview</loc>
  <lastmod>2025-05-30T14:01:57-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/next-steps-after-compromising-active-directory</loc>
  <lastmod>2025-05-28T16:52:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/why-pen-testing-essential-todays-threat-landscape</loc>
  <lastmod>2025-05-28T16:29:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-june-2021</loc>
  <lastmod>2025-05-28T16:29:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-security-identity-insiders-series-june-2021</loc>
  <lastmod>2025-05-28T16:22:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/bolstering-identity-and-access-management-within-business-critical-insights</loc>
  <lastmod>2025-05-28T16:54:50-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-security-identity-insiders-series-july-2021</loc>
  <lastmod>2025-05-28T16:22:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/three-ways-extend-your-vulnerability-management-program</loc>
  <lastmod>2025-05-30T13:34:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-overview</loc>
  <lastmod>2025-05-28T16:29:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/staying-one-step-ahead-tips-successful-penetration-testing</loc>
  <lastmod>2025-05-28T16:29:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-security-identity-insiders-series-october-2021</loc>
  <lastmod>2025-05-30T14:03:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/secure-alliance-how-vulnerability-management-and-penetration-testing-work-together</loc>
  <lastmod>2025-05-28T16:29:34-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/cybersecurity-changed-world-2021-trends-and-2022-predictions</loc>
  <lastmod>2025-05-28T16:28:41-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/support/training/core-impact/21-2</loc>
  <lastmod>2025-05-28T16:28:40-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-september-2021</loc>
  <lastmod>2025-05-28T16:28:39-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-march-2022</loc>
  <lastmod>2025-05-28T16:28:30-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/practice-pen-testing-2022-survey-results-revealed</loc>
  <lastmod>2025-05-30T13:34:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/keeping-security-siem-ple-2022-survey-results-revealed</loc>
  <lastmod>2025-05-28T16:46:54-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/getting-inside-mind-attacker-active-directory-attack-scenarios</loc>
  <lastmod>2025-05-28T16:28:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/critical-next-steps-after-pen-test</loc>
  <lastmod>2025-05-28T16:28:26-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-june-2022</loc>
  <lastmod>2025-05-28T16:28:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/building-a-proactive-security-strategy</loc>
  <lastmod>2025-05-28T16:28:25-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/proactive-cybersecurity-one-place-where-youre-being-offensive-compliment</loc>
  <lastmod>2025-05-28T16:28:23-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/total-vulnerability-management-securing-both-networks-and-applications</loc>
  <lastmod>2025-05-30T14:11:10-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/adopting-proactive-approach-federal-cybersecurity</loc>
  <lastmod>2025-05-28T16:28:22-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/bundling-importance-layering-offensive-security-solutions</loc>
  <lastmod>2025-05-28T16:38:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-sept-2022</loc>
  <lastmod>2025-05-28T16:25:49-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/when-use-pen-testing-red-teaming-or-both</loc>
  <lastmod>2025-05-28T16:25:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-december-2022</loc>
  <lastmod>2025-05-28T16:25:46-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/spotlight-cybersecurity-2022-trends-and-2023-predictions</loc>
  <lastmod>2025-05-30T14:10:55-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-march-2023</loc>
  <lastmod>2025-05-28T16:25:44-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/practice-pen-testing-2023-survey-results-revealed</loc>
  <lastmod>2025-05-30T13:34:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/prioritizing-blue-team-success-over-red-team-wins</loc>
  <lastmod>2025-05-28T16:37:19-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/core-impact-insiders-quarterly-update-june-2023</loc>
  <lastmod>2025-05-28T16:25:36-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/what-makes-cobalt-strike-essential-red-teaming-tool</loc>
  <lastmod>2025-12-12T03:01:27-06:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/cobalt-strike-introduction-demo</loc>
  <lastmod>2025-05-28T16:38:47-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/resources/videos/elevating-red-team-engagements-advanced-tooling</loc>
  <lastmod>2025-05-28T16:37:19-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.coresecurity.com/products/core-impact/on-demand-demo</loc>
  <lastmod>2025-05-28T16:24:24-05:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
</urlset>
