<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://perimeter-scan.ru/</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/" />
    <lastmod>2026-02-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/blog" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/express-audit</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/express-audit" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/express-audit" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/express-audit" />
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/pricing</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/pricing" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/pricing" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/pricing" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/brand-check</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/brand-check" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/brand-check" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/brand-check" />
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/dns-lookup</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/dns-lookup" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/dns-lookup" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/dns-lookup" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/password-generator</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/password-generator" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/password-generator" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/password-generator" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/dns-propagation</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/dns-propagation" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/dns-propagation" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/dns-propagation" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/spf-flatten</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/spf-flatten" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/spf-flatten" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/spf-flatten" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/email-header-analyzer</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/email-header-analyzer" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/email-header-analyzer" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/email-header-analyzer" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/dmarc-report-analyzer</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/dmarc-report-analyzer" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/dmarc-report-analyzer" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/dmarc-report-analyzer" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/api-docs</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/api-docs" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/api-docs" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/api-docs" />
    <lastmod>2026-02-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/whois</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/whois" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/whois" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/whois" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/ping</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/ping" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/ping" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/ping" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/traceroute</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/traceroute" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/traceroute" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/traceroute" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/blacklist-check</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/blacklist-check" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/blacklist-check" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/blacklist-check" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/spf-check</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/spf-check" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/spf-check" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/spf-check" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/dmarc-check</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/dmarc-check" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/dmarc-check" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/dmarc-check" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/headers-check</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/headers-check" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/headers-check" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/headers-check" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/spf-generator</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/spf-generator" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/spf-generator" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/spf-generator" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/dmarc-generator</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/dmarc-generator" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/dmarc-generator" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/dmarc-generator" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/tools/subnet-calculator</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/tools/subnet-calculator" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/tools/subnet-calculator" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/tools/subnet-calculator" />
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/changelog</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/changelog" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/changelog" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/changelog" />
    <lastmod>2026-02-11</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/privacy</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/privacy" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/privacy" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/privacy" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/terms</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/terms" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/terms" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/terms" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/pdn</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/pdn" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/pdn" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/pdn" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/login</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/login" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/login" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/login" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.1</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/register</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/register" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/register" />
    <xhtml:link rel="alternate" hreflang="x-default" href="https://perimeter-scan.ru/register" />
    <lastmod>2026-02-10</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.1</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/the-evolving-landscape-of-business-email-compromise-fraud</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/the-evolving-landscape-of-business-email-compromise-fraud" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/the-evolving-landscape-of-business-email-compromise-fraud" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/unveiling-uat-10608-a-widespread-automated-credential-harvesting-campaign-exploiting-web-applications</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/unveiling-uat-10608-a-widespread-automated-credential-harvesting-campaign-exploiting-web-applications" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/unveiling-uat-10608-a-widespread-automated-credential-harvesting-campaign-exploiting-web-applications" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/north-korean-linked-threat-actors-exploit-github-for-sophisticated-lnk-phishing-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/north-korean-linked-threat-actors-exploit-github-for-sophisticated-lnk-phishing-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/north-korean-linked-threat-actors-exploit-github-for-sophisticated-lnk-phishing-attacks" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/massive-adobe-data-leak-alleged-exposing-millions-of-support-tickets-and-employee-records</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/massive-adobe-data-leak-alleged-exposing-millions-of-support-tickets-and-employee-records" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/massive-adobe-data-leak-alleged-exposing-millions-of-support-tickets-and-employee-records" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/openssh-103-addresses-critical-shell-injection-flaw-and-enhances-ssh-security</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/openssh-103-addresses-critical-shell-injection-flaw-and-enhances-ssh-security" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/openssh-103-addresses-critical-shell-injection-flaw-and-enhances-ssh-security" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/vulnerability-in-google-clouds-vertex-ai-platform-exposes-sensitive-data-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/vulnerability-in-google-clouds-vertex-ai-platform-exposes-sensitive-data-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/vulnerability-in-google-clouds-vertex-ai-platform-exposes-sensitive-data-risks" />
    <lastmod>2026-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/urgent-threat-active-exploitation-of-critical-oracle-weblogic-server-vulnerability</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/urgent-threat-active-exploitation-of-critical-oracle-weblogic-server-vulnerability" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/urgent-threat-active-exploitation-of-critical-oracle-weblogic-server-vulnerability" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/google-urges-immediate-update-to-chrome-amid-active-zero-day-exploitation</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/google-urges-immediate-update-to-chrome-amid-active-zero-day-exploitation" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/google-urges-immediate-update-to-chrome-amid-active-zero-day-exploitation" />
    <lastmod>2026-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/key-developer-of-redline-malware-extradited-to-the-united-states</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/key-developer-of-redline-malware-extradited-to-the-united-states" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/key-developer-of-redline-malware-extradited-to-the-united-states" />
    <lastmod>2026-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-the-axios-supply-chain-attack-implications-for-external-attack-surface-management</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-the-axios-supply-chain-attack-implications-for-external-attack-surface-management" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-the-axios-supply-chain-attack-implications-for-external-attack-surface-management" />
    <lastmod>2026-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-chatgpt-exposed-user-data-through-silent-extraction</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-chatgpt-exposed-user-data-through-silent-extraction" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-chatgpt-exposed-user-data-through-silent-extraction" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/healthcare-it-provider-suffers-data-breach-exposing-patient-information</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/healthcare-it-provider-suffers-data-breach-exposing-patient-information" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/healthcare-it-provider-suffers-data-breach-exposing-patient-information" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-teampcps-latest-multi-stage-supply-chain-attack-on-security-infrastructure</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-teampcps-latest-multi-stage-supply-chain-attack-on-security-infrastructure" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-teampcps-latest-multi-stage-supply-chain-attack-on-security-infrastructure" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/unveiling-hidden-risks-in-google-clouds-vertex-ai-the-double-agent-vulnerability</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/unveiling-hidden-risks-in-google-clouds-vertex-ai-the-double-agent-vulnerability" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/unveiling-hidden-risks-in-google-clouds-vertex-ai-the-double-agent-vulnerability" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-modern-fuzzing-attacks-insights-from-analyzing-20000-nginx-log-lines</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-modern-fuzzing-attacks-insights-from-analyzing-20000-nginx-log-lines" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-modern-fuzzing-attacks-insights-from-analyzing-20000-nginx-log-lines" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-targets-axios-npm-packages-injecting-malicious-code</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-axios-npm-packages-injecting-malicious-code" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-axios-npm-packages-injecting-malicious-code" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/ai-powered-discovery-uncovers-zero-day-rce-vulnerabilities-in-vim-and-emacs</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/ai-powered-discovery-uncovers-zero-day-rce-vulnerabilities-in-vim-and-emacs" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/ai-powered-discovery-uncovers-zero-day-rce-vulnerabilities-in-vim-and-emacs" />
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/misconfigured-server-leak-unveils-thegentlemen-ransomware-toolkit-and-sensitive-credentials</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/misconfigured-server-leak-unveils-thegentlemen-ransomware-toolkit-and-sensitive-credentials" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/misconfigured-server-leak-unveils-thegentlemen-ransomware-toolkit-and-sensitive-credentials" />
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-homoglyph-attack-techniques-pose-new-risks-to-domain-security</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-homoglyph-attack-techniques-pose-new-risks-to-domain-security" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-homoglyph-attack-techniques-pose-new-risks-to-domain-security" />
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/streamlining-access-management-understanding-single-sign-on-and-its-implementation-in-multifactor</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/streamlining-access-management-understanding-single-sign-on-and-its-implementation-in-multifactor" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/streamlining-access-management-understanding-single-sign-on-and-its-implementation-in-multifactor" />
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-zero-click-vulnerability-in-claude-chrome-extension-exposes-millions-to-silent-ai-hijacking</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-zero-click-vulnerability-in-claude-chrome-extension-exposes-millions-to-silent-ai-hijacking" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-zero-click-vulnerability-in-claude-chrome-extension-exposes-millions-to-silent-ai-hijacking" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-pypi-package-disguises-malware-inside-audio-file-posing-new-threat-to-developers</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-pypi-package-disguises-malware-inside-audio-file-posing-new-threat-to-developers" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-pypi-package-disguises-malware-inside-audio-file-posing-new-threat-to-developers" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-file-access-vulnerability-discovered-in-popular-wordpress-slider-plugin</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-file-access-vulnerability-discovered-in-popular-wordpress-slider-plugin" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-file-access-vulnerability-discovered-in-popular-wordpress-slider-plugin" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-releases-critical-updates-for-windows-recovery-environment-and-setup-ahead-of-secure-boot-certificate-expiry</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-releases-critical-updates-for-windows-recovery-environment-and-setup-ahead-of-secure-boot-certificate-expiry" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-releases-critical-updates-for-windows-recovery-environment-and-setup-ahead-of-secure-boot-certificate-expiry" />
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/early-signs-of-exploitation-attempts-targeting-critical-citrix-netscaler-vulnerability</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/early-signs-of-exploitation-attempts-targeting-critical-citrix-netscaler-vulnerability" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/early-signs-of-exploitation-attempts-targeting-critical-citrix-netscaler-vulnerability" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/developers-targeted-by-fake-vs-code-security-alerts-on-github-malware-campaign-uncovered</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/developers-targeted-by-fake-vs-code-security-alerts-on-github-malware-campaign-uncovered" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/developers-targeted-by-fake-vs-code-security-alerts-on-github-malware-campaign-uncovered" />
    <lastmod>2026-03-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/european-commission-probes-security-breach-following-unauthorized-access-to-amazon-cloud-account</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/european-commission-probes-security-breach-following-unauthorized-access-to-amazon-cloud-account" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/european-commission-probes-security-breach-following-unauthorized-access-to-amazon-cloud-account" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/dutch-national-police-reports-security-breach-following-phishing-attack</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/dutch-national-police-reports-security-breach-following-phishing-attack" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/dutch-national-police-reports-security-breach-following-phishing-attack" />
    <lastmod>2026-03-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-critical-f5-big-ip-flaw</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-critical-f5-big-ip-flaw" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-critical-f5-big-ip-flaw" />
    <lastmod>2026-03-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-alerts-organizations-to-actively-exploited-vulnerability-in-f5-big-ip-systems</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-alerts-organizations-to-actively-exploited-vulnerability-in-f5-big-ip-systems" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-alerts-organizations-to-actively-exploited-vulnerability-in-f5-big-ip-systems" />
    <lastmod>2026-03-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/european-commission-discloses-cyberattack-targeting-aws-cloud-environment</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/european-commission-discloses-cyberattack-targeting-aws-cloud-environment" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/european-commission-discloses-cyberattack-targeting-aws-cloud-environment" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-flags-critical-vulnerability-in-aquasecuritys-trivy-scanner-raising-alarms-for-cicd-security</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-flags-critical-vulnerability-in-aquasecuritys-trivy-scanner-raising-alarms-for-cicd-security" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-flags-critical-vulnerability-in-aquasecuritys-trivy-scanner-raising-alarms-for-cicd-security" />
    <lastmod>2026-03-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-telnyx-python-sdk-on-pypi</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-telnyx-python-sdk-on-pypi" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-telnyx-python-sdk-on-pypi" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-supply-chain-threat-malicious-code-found-in-widely-used-linux-compression-tool</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-supply-chain-threat-malicious-code-found-in-widely-used-linux-compression-tool" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-supply-chain-threat-malicious-code-found-in-widely-used-linux-compression-tool" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-world-leaks-a-growing-threat-in-data-extortion</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-world-leaks-a-growing-threat-in-data-extortion" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-world-leaks-a-growing-threat-in-data-extortion" />
    <lastmod>2026-03-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-nvidia-vulnerabilities-expose-ai-systems-to-remote-code-execution-and-denial-of-service-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-nvidia-vulnerabilities-expose-ai-systems-to-remote-code-execution-and-denial-of-service-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-nvidia-vulnerabilities-expose-ai-systems-to-remote-code-execution-and-denial-of-service-risks" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-alerts-on-active-exploitation-of-critical-langflow-code-injection-vulnerability</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-alerts-on-active-exploitation-of-critical-langflow-code-injection-vulnerability" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-alerts-on-active-exploitation-of-critical-langflow-code-injection-vulnerability" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-privilege-escalation-vulnerability-found-in-idrive-windows-client</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-privilege-escalation-vulnerability-found-in-idrive-windows-client" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-privilege-escalation-vulnerability-found-in-idrive-windows-client" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-the-supply-chain-threat-targeting-litellm-ai-gateway</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-the-supply-chain-threat-targeting-litellm-ai-gateway" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-the-supply-chain-threat-targeting-litellm-ai-gateway" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/unveiling-overlapping-cyberespionage-campaigns-against-a-southeast-asian-government-entity</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/unveiling-overlapping-cyberespionage-campaigns-against-a-southeast-asian-government-entity" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/unveiling-overlapping-cyberespionage-campaigns-against-a-southeast-asian-government-entity" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/enhancing-secure-remote-access-with-openvpn-and-keycloak-integration</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/enhancing-secure-remote-access-with-openvpn-and-keycloak-integration" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/enhancing-secure-remote-access-with-openvpn-and-keycloak-integration" />
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/understanding-private-dns-managing-your-own-domains-within-internal-networks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/understanding-private-dns-managing-your-own-domains-within-internal-networks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/understanding-private-dns-managing-your-own-domains-within-internal-networks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-targets-aqua-securitys-trivy-vulnerability-scanner</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-aqua-securitys-trivy-vulnerability-scanner" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-aqua-securitys-trivy-vulnerability-scanner" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/hackerone-employee-data-compromised-through-third-party-benefits-provider-breach</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/hackerone-employee-data-compromised-through-third-party-benefits-provider-breach" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/hackerone-employee-data-compromised-through-third-party-benefits-provider-breach" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-dell-wyse-management-suite-could-lead-to-full-system-takeover</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-dell-wyse-management-suite-could-lead-to-full-system-takeover" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-dell-wyse-management-suite-could-lead-to-full-system-takeover" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tycoon2fa-phishing-campaigns-reignite-following-law-enforcement-disruption</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/tycoon2fa-phishing-campaigns-reignite-following-law-enforcement-disruption" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/tycoon2fa-phishing-campaigns-reignite-following-law-enforcement-disruption" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/persistent-attacks-on-ms-sql-servers-unveil-new-ice-cloud-scanner-malware</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/persistent-attacks-on-ms-sql-servers-unveil-new-ice-cloud-scanner-malware" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/persistent-attacks-on-ms-sql-servers-unveil-new-ice-cloud-scanner-malware" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/north-korean-hackers-exploit-vs-code-auto-run-features-to-spread-stoatwaffle-malware</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/north-korean-hackers-exploit-vs-code-auto-run-features-to-spread-stoatwaffle-malware" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/north-korean-hackers-exploit-vs-code-auto-run-features-to-spread-stoatwaffle-malware" />
    <lastmod>2026-03-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/exploring-eight-potential-attack-vectors-in-aws-bedrock-what-security-teams-need-to-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/exploring-eight-potential-attack-vectors-in-aws-bedrock-what-security-teams-need-to-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/exploring-eight-potential-attack-vectors-in-aws-bedrock-what-security-teams-need-to-know" />
    <lastmod>2026-03-28</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/trivy-supply-chain-attack-delivers-infostealer-and-kubernetes-wiper-through-docker</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/trivy-supply-chain-attack-delivers-infostealer-and-kubernetes-wiper-through-docker" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/trivy-supply-chain-attack-delivers-infostealer-and-kubernetes-wiper-through-docker" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-quest-kace-sma-actively-exploited-by-threat-actors</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-quest-kace-sma-actively-exploited-by-threat-actors" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-quest-kace-sma-actively-exploited-by-threat-actors" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/when-ransomware-strikes-a-real-life-account-of-business-recovery</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/when-ransomware-strikes-a-real-life-account-of-business-recovery" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/when-ransomware-strikes-a-real-life-account-of-business-recovery" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/global-law-enforcement-takes-down-iot-botnets-behind-massive-30-tbps-ddos-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/global-law-enforcement-takes-down-iot-botnets-behind-massive-30-tbps-ddos-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/global-law-enforcement-takes-down-iot-botnets-behind-massive-30-tbps-ddos-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/urgent-alert-active-exploitation-of-zimbra-collaboration-suite-vulnerability-demands-immediate-action</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/urgent-alert-active-exploitation-of-zimbra-collaboration-suite-vulnerability-demands-immediate-action" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/urgent-alert-active-exploitation-of-zimbra-collaboration-suite-vulnerability-demands-immediate-action" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/oracle-issues-urgent-patch-for-critical-remote-code-execution-vulnerability-in-identity-manager</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/oracle-issues-urgent-patch-for-critical-remote-code-execution-vulnerability-in-identity-manager" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/oracle-issues-urgent-patch-for-critical-remote-code-execution-vulnerability-in-identity-manager" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/major-data-breach-at-anime-streaming-service-highlights-risks-in-third-party-partnerships</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/major-data-breach-at-anime-streaming-service-highlights-risks-in-third-party-partnerships" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/major-data-breach-at-anime-streaming-service-highlights-risks-in-third-party-partnerships" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/lapsus-group-claims-breach-of-astrazeneca-offering-internal-data-for-sale</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/lapsus-group-claims-breach-of-astrazeneca-offering-internal-data-for-sale" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/lapsus-group-claims-breach-of-astrazeneca-offering-internal-data-for-sale" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/urgent-directive-federal-agencies-must-patch-critical-cisco-firewall-flaw-by-march-22</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/urgent-directive-federal-agencies-must-patch-critical-cisco-firewall-flaw-by-march-22" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/urgent-directive-federal-agencies-must-patch-critical-cisco-firewall-flaw-by-march-22" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/global-collaboration-dismantles-major-iot-botnets-fueling-ddos-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/global-collaboration-dismantles-major-iot-botnets-fueling-ddos-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/global-collaboration-dismantles-major-iot-botnets-fueling-ddos-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-five-new-critical-flaws</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-five-new-critical-flaws" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-five-new-critical-flaws" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/abuse-of-microsoft-azure-monitor-alerts-enables-sophisticated-callback-phishing-campaigns</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/abuse-of-microsoft-azure-monitor-alerts-enables-sophisticated-callback-phishing-campaigns" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/abuse-of-microsoft-azure-monitor-alerts-enables-sophisticated-callback-phishing-campaigns" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-on-trivy-scanner-threatens-cicd-pipeline-security</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-on-trivy-scanner-threatens-cicd-pipeline-security" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-on-trivy-scanner-threatens-cicd-pipeline-security" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/google-chrome-patch-resolves-26-remote-code-execution-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/google-chrome-patch-resolves-26-remote-code-execution-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/google-chrome-patch-resolves-26-remote-code-execution-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/oracle-releases-emergency-patch-for-critical-remote-code-execution-vulnerability-in-identity-and-web-services-manager</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/oracle-releases-emergency-patch-for-critical-remote-code-execution-vulnerability-in-identity-and-web-services-manager" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/oracle-releases-emergency-patch-for-critical-remote-code-execution-vulnerability-in-identity-and-web-services-manager" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/widespread-magento-website-breach-exposes-thousands-to-hidden-malware-and-data-theft</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/widespread-magento-website-breach-exposes-thousands-to-hidden-malware-and-data-theft" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/widespread-magento-website-breach-exposes-thousands-to-hidden-malware-and-data-theft" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/leaknet-ransomware-a-new-twist-in-social-engineering-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/leaknet-ransomware-a-new-twist-in-social-engineering-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/leaknet-ransomware-a-new-twist-in-social-engineering-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/enhancing-docker-network-security-with-a-custom-firewall-operator</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/enhancing-docker-network-security-with-a-custom-firewall-operator" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/enhancing-docker-network-security-with-a-custom-firewall-operator" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-calls-for-enhanced-security-of-microsoft-intune-after-stryker-cyberattack</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-calls-for-enhanced-security-of-microsoft-intune-after-stryker-cyberattack" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-calls-for-enhanced-security-of-microsoft-intune-after-stryker-cyberattack" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-ubiquiti-unifi-network-application-expose-systems-to-full-compromise</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-ubiquiti-unifi-network-application-expose-systems-to-full-compromise" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-ubiquiti-unifi-network-application-expose-systems-to-full-compromise" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-python-package-pyronut-poses-remote-code-execution-risk-to-telegram-bots</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-python-package-pyronut-poses-remote-code-execution-risk-to-telegram-bots" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-python-package-pyronut-poses-remote-code-execution-risk-to-telegram-bots" />
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/chained-vulnerabilities-in-claudeai-enable-data-theft-and-malicious-redirects</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/chained-vulnerabilities-in-claudeai-enable-data-theft-and-malicious-redirects" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/chained-vulnerabilities-in-claudeai-enable-data-theft-and-malicious-redirects" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/international-effort-takes-down-major-iot-botnets-fueling-massive-ddos-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/international-effort-takes-down-major-iot-botnets-fueling-massive-ddos-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/international-effort-takes-down-major-iot-botnets-fueling-massive-ddos-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-zero-day-in-cisco-firewall-management-center-exploited-by-interlock-ransomware-group</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-zero-day-in-cisco-firewall-management-center-exploited-by-interlock-ransomware-group" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-zero-day-in-cisco-firewall-management-center-exploited-by-interlock-ransomware-group" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-malware-campaigns-exploit-network-devices-for-ddos-and-crypto-mining</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-malware-campaigns-exploit-network-devices-for-ddos-and-crypto-mining" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-malware-campaigns-exploit-network-devices-for-ddos-and-crypto-mining" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-screenconnect-puts-remote-sessions-at-risk</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-screenconnect-puts-remote-sessions-at-risk" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-screenconnect-puts-remote-sessions-at-risk" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/leaknet-ransomware-group-expands-operations-with-sophisticated-tools-and-tactics</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/leaknet-ransomware-group-expands-operations-with-sophisticated-tools-and-tactics" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/leaknet-ransomware-group-expands-operations-with-sophisticated-tools-and-tactics" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/balancing-security-risks-in-ai-agent-deployments-what-organizations-need-to-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/balancing-security-risks-in-ai-agent-deployments-what-organizations-need-to-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/balancing-security-risks-in-ai-agent-deployments-what-organizations-need-to-know" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-react-native-npm-packages-with-credential-stealing-malware</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-react-native-npm-packages-with-credential-stealing-malware" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-popular-react-native-npm-packages-with-credential-stealing-malware" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/security-flaw-in-aws-bedrock-agentcore-enables-covert-data-exfiltration-via-sandbox-bypass</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/security-flaw-in-aws-bedrock-agentcore-enables-covert-data-exfiltration-via-sandbox-bypass" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/security-flaw-in-aws-bedrock-agentcore-enables-covert-data-exfiltration-via-sandbox-bypass" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/seo-poisoning-and-signed-trojans-new-tactics-in-vpn-credential-theft-campaign</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/seo-poisoning-and-signed-trojans-new-tactics-in-vpn-credential-theft-campaign" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/seo-poisoning-and-signed-trojans-new-tactics-in-vpn-credential-theft-campaign" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-path-traversal-flaw-in-kubernetes-nfs-csi-driver-puts-server-directories-at-risk</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-path-traversal-flaw-in-kubernetes-nfs-csi-driver-puts-server-directories-at-risk" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-path-traversal-flaw-in-kubernetes-nfs-csi-driver-puts-server-directories-at-risk" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/exploring-the-fragility-of-large-language-models-through-prompt-fuzzing</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/exploring-the-fragility-of-large-language-models-through-prompt-fuzzing" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/exploring-the-fragility-of-large-language-models-through-prompt-fuzzing" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/handala-hack-group-employs-rdp-netbird-and-multiple-wipers-in-targeted-destructive-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/handala-hack-group-employs-rdp-netbird-and-multiple-wipers-in-targeted-destructive-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/handala-hack-group-employs-rdp-netbird-and-multiple-wipers-in-targeted-destructive-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/rondodox-botnet-grows-with-174-exploits-exploiting-residential-ip-networks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/rondodox-botnet-grows-with-174-exploits-exploiting-residential-ip-networks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/rondodox-botnet-grows-with-174-exploits-exploiting-residential-ip-networks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/ibm-identifies-slopoly-potential-ai-generated-malware-in-recent-hive0163-ransomware-campaign</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/ibm-identifies-slopoly-potential-ai-generated-malware-in-recent-hive0163-ransomware-campaign" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/ibm-identifies-slopoly-potential-ai-generated-malware-in-recent-hive0163-ransomware-campaign" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/qihoo-360-exposes-wildcard-ssl-private-key-in-public-ai-assistant-installer</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/qihoo-360-exposes-wildcard-ssl-private-key-in-public-ai-assistant-installer" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/qihoo-360-exposes-wildcard-ssl-private-key-in-public-ai-assistant-installer" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/simplifying-tls-certificate-management-with-angies-acme-module</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/simplifying-tls-certificate-management-with-angies-acme-module" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/simplifying-tls-certificate-management-with-angies-acme-module" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/google-urgently-patches-two-zero-day-vulnerabilities-in-chrome-exploited-in-active-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/google-urgently-patches-two-zero-day-vulnerabilities-in-chrome-exploited-in-active-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/google-urgently-patches-two-zero-day-vulnerabilities-in-chrome-exploited-in-active-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-two-new-critical-entries</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-two-new-critical-entries" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-two-new-critical-entries" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-langsmith-exposes-users-to-account-takeover-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-langsmith-exposes-users-to-account-takeover-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-langsmith-exposes-users-to-account-takeover-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-issues-urgent-hotpatch-for-critical-windows-11-rras-vulnerability</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-issues-urgent-hotpatch-for-critical-windows-11-rras-vulnerability" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-issues-urgent-hotpatch-for-critical-windows-11-rras-vulnerability" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/introducing-betterleaks-an-enhanced-open-source-tool-for-detecting-exposed-secrets</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/introducing-betterleaks-an-enhanced-open-source-tool-for-detecting-exposed-secrets" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/introducing-betterleaks-an-enhanced-open-source-tool-for-detecting-exposed-secrets" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/supply-chain-attack-targets-appsflyer-web-sdk-to-deploy-crypto-stealing-javascript</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-appsflyer-web-sdk-to-deploy-crypto-stealing-javascript" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/supply-chain-attack-targets-appsflyer-web-sdk-to-deploy-crypto-stealing-javascript" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-issues-urgent-patch-for-critical-windows-11-rras-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-issues-urgent-patch-for-critical-windows-11-rras-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-issues-urgent-patch-for-critical-windows-11-rras-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/persistent-threats-target-fortigate-firewalls-to-infiltrate-enterprise-networks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/persistent-threats-target-fortigate-firewalls-to-infiltrate-enterprise-networks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/persistent-threats-target-fortigate-firewalls-to-infiltrate-enterprise-networks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-npm-packages-disguised-as-roblox-script-executors-target-discord-and-crypto-wallets</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-npm-packages-disguised-as-roblox-script-executors-target-discord-and-crypto-wallets" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-npm-packages-disguised-as-roblox-script-executors-target-discord-and-crypto-wallets" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/glassworm-campaign-expands-attack-surface-through-72-malicious-open-vsx-extensions</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/glassworm-campaign-expands-attack-surface-through-72-malicious-open-vsx-extensions" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/glassworm-campaign-expands-attack-surface-through-72-malicious-open-vsx-extensions" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/global-law-enforcement-disrupts-over-45000-malicious-ips-fueling-ransomware-campaigns</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/global-law-enforcement-disrupts-over-45000-malicious-ips-fueling-ransomware-campaigns" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/global-law-enforcement-disrupts-over-45000-malicious-ips-fueling-ransomware-campaigns" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/major-canadian-retailer-faces-data-breach-impacting-it-network-and-customer-data</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/major-canadian-retailer-faces-data-breach-impacting-it-network-and-customer-data" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/major-canadian-retailer-faces-data-breach-impacting-it-network-and-customer-data" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/global-law-enforcement-shuts-down-malicious-proxy-network-exploiting-thousands-of-routers</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/global-law-enforcement-shuts-down-malicious-proxy-network-exploiting-thousands-of-routers" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/global-law-enforcement-shuts-down-malicious-proxy-network-exploiting-thousands-of-routers" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/starbucks-employee-data-compromised-in-phishing-driven-security-breach</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/starbucks-employee-data-compromised-in-phishing-driven-security-breach" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/starbucks-employee-data-compromised-in-phishing-driven-security-breach" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/veeam-addresses-critical-remote-code-execution-flaws-in-backup-replication-software</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/veeam-addresses-critical-remote-code-execution-flaws-in-backup-replication-software" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/veeam-addresses-critical-remote-code-execution-flaws-in-backup-replication-software" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-copilots-email-and-teams-summarization-feature-exposes-new-phishing-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-copilots-email-and-teams-summarization-feature-exposes-new-phishing-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-copilots-email-and-teams-summarization-feature-exposes-new-phishing-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-found-in-palo-alto-cortex-xdr-broker-vm-could-expose-sensitive-data</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-found-in-palo-alto-cortex-xdr-broker-vm-could-expose-sensitive-data" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-found-in-palo-alto-cortex-xdr-broker-vm-could-expose-sensitive-data" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/ericsson-us-reports-data-breach-involving-third-party-service-provider</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/ericsson-us-reports-data-breach-involving-third-party-service-provider" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/ericsson-us-reports-data-breach-involving-third-party-service-provider" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-privilege-escalation-flaws-discovered-in-cisco-ios-xr-software</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-privilege-escalation-flaws-discovered-in-cisco-ios-xr-software" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-privilege-escalation-flaws-discovered-in-cisco-ios-xr-software" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-splunk-vulnerability-enables-remote-command-execution-what-security-teams-need-to-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-splunk-vulnerability-enables-remote-command-execution-what-security-teams-need-to-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-splunk-vulnerability-enables-remote-command-execution-what-security-teams-need-to-know" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/phantomraven-supply-chain-attacks-target-npm-registry-with-malicious-packages</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/phantomraven-supply-chain-attacks-target-npm-registry-with-malicious-packages" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/phantomraven-supply-chain-attacks-target-npm-registry-with-malicious-packages" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-new-high-risk-flaw</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-new-high-risk-flaw" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-updates-known-exploited-vulnerabilities-catalog-with-new-high-risk-flaw" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/google-chrome-version-146-released-with-patches-for-29-security-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/google-chrome-version-146-released-with-patches-for-29-security-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/google-chrome-version-146-released-with-patches-for-29-security-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/stryker-faces-major-cyberattack-involving-wiper-malware-and-data-erasure</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/stryker-faces-major-cyberattack-involving-wiper-malware-and-data-erasure" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/stryker-faces-major-cyberattack-involving-wiper-malware-and-data-erasure" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/iran-linked-hackers-target-global-medtech-company-with-data-wiping-attack</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/iran-linked-hackers-target-global-medtech-company-with-data-wiping-attack" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/iran-linked-hackers-target-global-medtech-company-with-data-wiping-attack" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-fortinet-fortimanager-enables-remote-command-execution</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-fortinet-fortimanager-enables-remote-command-execution" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-fortinet-fortimanager-enables-remote-command-execution" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addresses-78-vulnerabilities-including-active-zero-day-exploit</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addresses-78-vulnerabilities-including-active-zero-day-exploit" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addresses-78-vulnerabilities-including-active-zero-day-exploit" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudflares-pingora-framework-expose-organizations-to-request-smuggling-and-cache-poisoning-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudflares-pingora-framework-expose-organizations-to-request-smuggling-and-cache-poisoning-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudflares-pingora-framework-expose-organizations-to-request-smuggling-and-cache-poisoning-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addressing-77-vulnerabilities-across-windows-ecosystem</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addressing-77-vulnerabilities-across-windows-ecosystem" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/microsoft-march-2026-patch-tuesday-addressing-77-vulnerabilities-across-windows-ecosystem" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/examining-ai-judges-how-stealthy-prompt-injection-undermines-security-controls</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/examining-ai-judges-how-stealthy-prompt-injection-undermines-security-controls" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/examining-ai-judges-how-stealthy-prompt-injection-undermines-security-controls" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/iranianlinked-apt-seedworm-expands-presence-in-us-networks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/iranianlinked-apt-seedworm-expands-presence-in-us-networks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/iranianlinked-apt-seedworm-expands-presence-in-us-networks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/fraudfriendly-botnets-how-a-vietnambased-network-is-masscreating-fake-accounts</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/fraudfriendly-botnets-how-a-vietnambased-network-is-masscreating-fake-accounts" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/fraudfriendly-botnets-how-a-vietnambased-network-is-masscreating-fake-accounts" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/new-benchmark-report-sheds-light-on-realworld-detection-and-prevention-gaps</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/new-benchmark-report-sheds-light-on-realworld-detection-and-prevention-gaps" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/new-benchmark-report-sheds-light-on-realworld-detection-and-prevention-gaps" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/streamlining-largescale-vpn-deployments-on-mikrotik-a-practical-guide</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/streamlining-largescale-vpn-deployments-on-mikrotik-a-practical-guide" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/streamlining-largescale-vpn-deployments-on-mikrotik-a-practical-guide" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/advanced-dpi-filtering-hits-moscows-mobile-networks-what-it-means-for-your-external-attack-surface</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/advanced-dpi-filtering-hits-moscows-mobile-networks-what-it-means-for-your-external-attack-surface" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/advanced-dpi-filtering-hits-moscows-mobile-networks-what-it-means-for-your-external-attack-surface" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/new-malware-campaign-targets-south-american-telecoms-what-the-threat-means-for-your-external-attack-surface</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/new-malware-campaign-targets-south-american-telecoms-what-the-threat-means-for-your-external-attack-surface" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/new-malware-campaign-targets-south-american-telecoms-what-the-threat-means-for-your-external-attack-surface" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/eu-court-opinion-calls-for-immediate-refunds-to-phishing-victims</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/eu-court-opinion-calls-for-immediate-refunds-to-phishing-victims" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/eu-court-opinion-calls-for-immediate-refunds-to-phishing-victims" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/phishing-campaigns-turn-to-arpa-and-ipv6-reverse-dns-to-slip-past-defenses</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/phishing-campaigns-turn-to-arpa-and-ipv6-reverse-dns-to-slip-past-defenses" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/phishing-campaigns-turn-to-arpa-and-ipv6-reverse-dns-to-slip-past-defenses" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/zeroday-exploit-for-windows-remote-desktop-services-hits-darkweb-marketplace</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/zeroday-exploit-for-windows-remote-desktop-services-hits-darkweb-marketplace" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/zeroday-exploit-for-windows-remote-desktop-services-hits-darkweb-marketplace" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aipowered-assistants-redefine-the-enterprise-attack-surface</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aipowered-assistants-redefine-the-enterprise-attack-surface" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aipowered-assistants-redefine-the-enterprise-attack-surface" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/velvet-tempest-exploits-clickfix-and-native-windows-utilities-to-deploy-donutloader-and-castlerat</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/velvet-tempest-exploits-clickfix-and-native-windows-utilities-to-deploy-donutloader-and-castlerat" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/velvet-tempest-exploits-clickfix-and-native-windows-utilities-to-deploy-donutloader-and-castlerat" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aipowered-threat-actors-what-it-means-for-your-external-attack-surface</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aipowered-threat-actors-what-it-means-for-your-external-attack-surface" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aipowered-threat-actors-what-it-means-for-your-external-attack-surface" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/zeroclick-remote-code-execution-in-avideo-60-cve202629058-what-security-teams-need-to-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/zeroclick-remote-code-execution-in-avideo-60-cve202629058-what-security-teams-need-to-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/zeroclick-remote-code-execution-in-avideo-60-cve202629058-what-security-teams-need-to-know" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/massive-trizetto-provider-solutions-breach-exposes-health-records-of-over-34-million-patients</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/massive-trizetto-provider-solutions-breach-exposes-health-records-of-over-34-million-patients" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/massive-trizetto-provider-solutions-breach-exposes-health-records-of-over-34-million-patients" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aidriven-application-security-openais-codex-security-enters-the-enterprise-landscape</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aidriven-application-security-openais-codex-security-enters-the-enterprise-landscape" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aidriven-application-security-openais-codex-security-enters-the-enterprise-landscape" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aipowered-open-source-scanning-introducing-openant</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aipowered-open-source-scanning-introducing-openant" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aipowered-open-source-scanning-introducing-openant" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malformed-packets-in-apache-activemq-can-lead-to-service-disruption</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malformed-packets-in-apache-activemq-can-lead-to-service-disruption" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malformed-packets-in-apache-activemq-can-lead-to-service-disruption" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/phishingasaservice-platform-tycoon-2fa-taken-down-what-it-means-for-your-external-attack-surface</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/phishingasaservice-platform-tycoon-2fa-taken-down-what-it-means-for-your-external-attack-surface" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/phishingasaservice-platform-tycoon-2fa-taken-down-what-it-means-for-your-external-attack-surface" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-trends-in-vulnerabilities-and-c2-frameworks-insights-from-q4-2025</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-trends-in-vulnerabilities-and-c2-frameworks-insights-from-q4-2025" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-trends-in-vulnerabilities-and-c2-frameworks-insights-from-q4-2025" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/persistent-threat-campaign-clunk1068-exploits-tunneling-reconnaissance-and-credential-theft</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/persistent-threat-campaign-clunk1068-exploits-tunneling-reconnaissance-and-credential-theft" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/persistent-threat-campaign-clunk1068-exploits-tunneling-reconnaissance-and-credential-theft" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/proof-of-concept-released-for-critical-cisco-sd-wan-zero-day-actively-exploited-since-2023</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/proof-of-concept-released-for-critical-cisco-sd-wan-zero-day-actively-exploited-since-2023" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/proof-of-concept-released-for-critical-cisco-sd-wan-zero-day-actively-exploited-since-2023" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-threat-funnull-group-deploys-ringh23-toolkit-to-exploit-maccms-and-cdn-systems</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-threat-funnull-group-deploys-ringh23-toolkit-to-exploit-maccms-and-cdn-systems" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-threat-funnull-group-deploys-ringh23-toolkit-to-exploit-maccms-and-cdn-systems" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/coordinated-attacks-target-cryptocurrency-ecosystem-highlighting-risks-in-external-attack-surfaces</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/coordinated-attacks-target-cryptocurrency-ecosystem-highlighting-risks-in-external-attack-surfaces" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/coordinated-attacks-target-cryptocurrency-ecosystem-highlighting-risks-in-external-attack-surfaces" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/new-mongodb-flaw-enables-remote-server-crashes-with-minimal-effort</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/new-mongodb-flaw-enables-remote-server-crashes-with-minimal-effort" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/new-mongodb-flaw-enables-remote-server-crashes-with-minimal-effort" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-remote-code-execution-flaw-discovered-in-cisco-secure-firewall-management-center</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-remote-code-execution-flaw-discovered-in-cisco-secure-firewall-management-center" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-remote-code-execution-flaw-discovered-in-cisco-secure-firewall-management-center" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/uncovering-a-ransomware-network-through-a-single-brute-force-incident</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/uncovering-a-ransomware-network-through-a-single-brute-force-incident" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/uncovering-a-ransomware-network-through-a-single-brute-force-incident" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/collaborative-takedown-of-tycoon-2fa-phishing-platform-disrupts-mfa-bypass-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/collaborative-takedown-of-tycoon-2fa-phishing-platform-disrupts-mfa-bypass-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/collaborative-takedown-of-tycoon-2fa-phishing-platform-disrupts-mfa-bypass-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-threat-voidlink-malware-targets-kubernetes-and-ai-workloads-in-cloud-environments</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-threat-voidlink-malware-targets-kubernetes-and-ai-workloads-in-cloud-environments" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-threat-voidlink-malware-targets-kubernetes-and-ai-workloads-in-cloud-environments" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/how-a-stolen-api-key-led-to-82000-in-unauthorized-cloud-charges-in-just-two-days</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/how-a-stolen-api-key-led-to-82000-in-unauthorized-cloud-charges-in-just-two-days" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/how-a-stolen-api-key-led-to-82000-in-unauthorized-cloud-charges-in-just-two-days" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/legitimate-azure-tool-azcopy-exploited-for-data-theft-in-ongoing-ransomware-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/legitimate-azure-tool-azcopy-exploited-for-data-theft-in-ongoing-ransomware-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/legitimate-azure-tool-azcopy-exploited-for-data-theft-in-ongoing-ransomware-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/lexisnexis-legal-professional-faces-data-breach-with-204-gb-of-data-allegedly-exfiltrated</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/lexisnexis-legal-professional-faces-data-breach-with-204-gb-of-data-allegedly-exfiltrated" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/lexisnexis-legal-professional-faces-data-breach-with-204-gb-of-data-allegedly-exfiltrated" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-phishing-attack-exploits-oauth-redirection-to-bypass-security-controls</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-phishing-attack-exploits-oauth-redirection-to-bypass-security-controls" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-phishing-attack-exploits-oauth-redirection-to-bypass-security-controls" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/zerobot-botnet-exploits-tenda-router-flaws-to-spread-malware</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/zerobot-botnet-exploits-tenda-router-flaws-to-spread-malware" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/zerobot-botnet-exploits-tenda-router-flaws-to-spread-malware" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/emerging-threat-indirect-prompt-injection-attacks-targeting-ai-agents-via-web-content</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/emerging-threat-indirect-prompt-injection-attacks-targeting-ai-agents-via-web-content" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/emerging-threat-indirect-prompt-injection-attacks-targeting-ai-agents-via-web-content" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/enhancing-dos-protection-in-angie-web-server-leveraging-third-party-modules-and-fail2ban</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/enhancing-dos-protection-in-angie-web-server-leveraging-third-party-modules-and-fail2ban" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/enhancing-dos-protection-in-angie-web-server-leveraging-third-party-modules-and-fail2ban" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/gtfire-phishing-campaign-exploits-google-services-to-bypass-security-filters-and-steal-credentials</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/gtfire-phishing-campaign-exploits-google-services-to-bypass-security-filters-and-steal-credentials" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/gtfire-phishing-campaign-exploits-google-services-to-bypass-security-filters-and-steal-credentials" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/european-cyber-report-2026-highlights-rising-ddos-threats-to-digital-infrastructure</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/european-cyber-report-2026-highlights-rising-ddos-threats-to-digital-infrastructure" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/european-cyber-report-2026-highlights-rising-ddos-threats-to-digital-infrastructure" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/widespread-scanning-campaign-targets-sonicwall-firewalls-with-thousands-of-ip-addresses</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/widespread-scanning-campaign-targets-sonicwall-firewalls-with-thousands-of-ip-addresses" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/widespread-scanning-campaign-targets-sonicwall-firewalls-with-thousands-of-ip-addresses" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/rising-cyber-threats-linked-to-iranian-actors-what-security-teams-need-to-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/rising-cyber-threats-linked-to-iranian-actors-what-security-teams-need-to-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/rising-cyber-threats-linked-to-iranian-actors-what-security-teams-need-to-know" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/addressing-a-critical-chrome-vulnerability-impacting-the-gemini-panel</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/addressing-a-critical-chrome-vulnerability-impacting-the-gemini-panel" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/addressing-a-critical-chrome-vulnerability-impacting-the-gemini-panel" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudcharge-platform-expose-ev-charging-infrastructure-to-hijacking-and-disruption</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudcharge-platform-expose-ev-charging-infrastructure-to-hijacking-and-disruption" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-cloudcharge-platform-expose-ev-charging-infrastructure-to-hijacking-and-disruption" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-switch-ev-charging-infrastructure-pose-significant-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-switch-ev-charging-infrastructure-pose-significant-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-switch-ev-charging-infrastructure-pose-significant-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-alerts-on-resurge-malware-targeting-ivanti-connect-secure-devices</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-alerts-on-resurge-malware-targeting-ivanti-connect-secure-devices" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-alerts-on-resurge-malware-targeting-ivanti-connect-secure-devices" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/managing-third-party-software-risks-strengthening-your-external-attack-surface-through-consistent-patching</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/managing-third-party-software-risks-strengthening-your-external-attack-surface-through-consistent-patching" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/managing-third-party-software-risks-strengthening-your-external-attack-surface-through-consistent-patching" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/unmasking-the-kimwolf-botmaster-known-as-dort-what-security-teams-should-know</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/unmasking-the-kimwolf-botmaster-known-as-dort-what-security-teams-should-know" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/unmasking-the-kimwolf-botmaster-known-as-dort-what-security-teams-should-know" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-in-trend-micro-apex-one-expose-organizations-to-remote-code-execution-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-trend-micro-apex-one-expose-organizations-to-remote-code-execution-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-in-trend-micro-apex-one-expose-organizations-to-remote-code-execution-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-zero-click-flaw-in-openclaw-ai-agent-framework-enables-silent-takeover-by-malicious-websites</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-zero-click-flaw-in-openclaw-ai-agent-framework-enables-silent-takeover-by-malicious-websites" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-zero-click-flaw-in-openclaw-ai-agent-framework-enables-silent-takeover-by-malicious-websites" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/phishing-campaigns-exploit-arpa-domain-and-ipv6-tunnels-to-slip-past-security-defenses</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/phishing-campaigns-exploit-arpa-domain-and-ipv6-tunnels-to-slip-past-security-defenses" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/phishing-campaigns-exploit-arpa-domain-and-ipv6-tunnels-to-slip-past-security-defenses" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/threat-actors-exploit-windows-file-explorer-and-webdav-to-deliver-malware-undetected</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/threat-actors-exploit-windows-file-explorer-and-webdav-to-deliver-malware-undetected" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/threat-actors-exploit-windows-file-explorer-and-webdav-to-deliver-malware-undetected" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/metasploit-update-enhances-capabilities-with-new-linux-and-beyondtrust-exploits</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/metasploit-update-enhances-capabilities-with-new-linux-and-beyondtrust-exploits" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/metasploit-update-enhances-capabilities-with-new-linux-and-beyondtrust-exploits" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-go-crypto-module-targets-developer-environments-with-password-theft-and-backdoor-deployment</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-go-crypto-module-targets-developer-environments-with-password-theft-and-backdoor-deployment" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-go-crypto-module-targets-developer-environments-with-password-theft-and-backdoor-deployment" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/infostealer-malware-drives-surge-in-credential-stuffing-attacks-on-corporate-sso-systems</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/infostealer-malware-drives-surge-in-credential-stuffing-attacks-on-corporate-sso-systems" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/infostealer-malware-drives-surge-in-credential-stuffing-attacks-on-corporate-sso-systems" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-freebsd-vulnerability-enables-jail-escape-and-system-compromise</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-freebsd-vulnerability-enables-jail-escape-and-system-compromise" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-freebsd-vulnerability-enables-jail-escape-and-system-compromise" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-zyxel-router-vulnerabilities-enable-remote-command-injection-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-zyxel-router-vulnerabilities-enable-remote-command-injection-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-zyxel-router-vulnerabilities-enable-remote-command-injection-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerability-in-juniper-ptx-series-routers-allows-full-remote-control</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-juniper-ptx-series-routers-allows-full-remote-control" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerability-in-juniper-ptx-series-routers-allows-full-remote-control" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/critical-vulnerabilities-discovered-in-johnson-controls-frick-controls-quantum-hd-systems</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-discovered-in-johnson-controls-frick-controls-quantum-hd-systems" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/critical-vulnerabilities-discovered-in-johnson-controls-frick-controls-quantum-hd-systems" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/over-one-million-customer-records-exposed-in-data-breach-at-dutch-telecom-provider-odido</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/over-one-million-customer-records-exposed-in-data-breach-at-dutch-telecom-provider-odido" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/over-one-million-customer-records-exposed-in-data-breach-at-dutch-telecom-provider-odido" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/legacy-google-api-keys-enable-unauthorized-access-to-gemini-ai-endpoints</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/legacy-google-api-keys-enable-unauthorized-access-to-gemini-ai-endpoints" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/legacy-google-api-keys-enable-unauthorized-access-to-gemini-ai-endpoints" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/wireshark-464-update-addresses-critical-security-flaws-and-stability-issues</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/wireshark-464-update-addresses-critical-security-flaws-and-stability-issues" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/wireshark-464-update-addresses-critical-security-flaws-and-stability-issues" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aeternum-botnet-leverages-polygon-blockchain-to-strengthen-command-and-control-resilience</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aeternum-botnet-leverages-polygon-blockchain-to-strengthen-command-and-control-resilience" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aeternum-botnet-leverages-polygon-blockchain-to-strengthen-command-and-control-resilience" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/the-developer-trap-malicious-repositories-targeting-job-seekers</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/the-developer-trap-malicious-repositories-targeting-job-seekers" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/the-developer-trap-malicious-repositories-targeting-job-seekers" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/threat-actors-target-notepad-supply-chain-new-infrastructure-uncovered-by-unit-42</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/threat-actors-target-notepad-supply-chain-new-infrastructure-uncovered-by-unit-42" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/threat-actors-target-notepad-supply-chain-new-infrastructure-uncovered-by-unit-42" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/decoding-muddled-libra-the-search-engine-playbook-and-rogue-host-tactics</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/decoding-muddled-libra-the-search-engine-playbook-and-rogue-host-tactics" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/decoding-muddled-libra-the-search-engine-playbook-and-rogue-host-tactics" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/beyond-the-noise-mapping-cloud-alerts-to-identify-threat-actors</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/beyond-the-noise-mapping-cloud-alerts-to-identify-threat-actors" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/beyond-the-noise-mapping-cloud-alerts-to-identify-threat-actors" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/aipowered-runtime-assembly-how-llms-are-turning-browsers-into-ondemand-code-factories</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/aipowered-runtime-assembly-how-llms-are-turning-browsers-into-ondemand-code-factories" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/aipowered-runtime-assembly-how-llms-are-turning-browsers-into-ondemand-code-factories" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/azure-private-endpoints-may-be-vulnerable-to-dnsbased-denialofservice</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/azure-private-endpoints-may-be-vulnerable-to-dnsbased-denialofservice" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/azure-private-endpoints-may-be-vulnerable-to-dnsbased-denialofservice" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/claude-code-vulnerabilities-rce-api-keys</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/claude-code-vulnerabilities-rce-api-keys" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/claude-code-vulnerabilities-rce-api-keys" />
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisco-sd-wan-vulnerability-defense</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisco-sd-wan-vulnerability-defense" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisco-sd-wan-vulnerability-defense" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-nuget-packages-aspnet-identity-backdoors</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-nuget-packages-aspnet-identity-backdoors" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-nuget-packages-aspnet-identity-backdoors" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-kev-cisco-sd-wan-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-kev-cisco-sd-wan-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-kev-cisco-sd-wan-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/solarwinds-serv-u-rce-vulnerabilities-patches</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/solarwinds-serv-u-rce-vulnerabilities-patches" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/solarwinds-serv-u-rce-vulnerabilities-patches" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/gardyn-home-kit-vulnerabilities-iot-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/gardyn-home-kit-vulnerabilities-iot-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/gardyn-home-kit-vulnerabilities-iot-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/kubernetes-helm-charts-rce-mitigation</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/kubernetes-helm-charts-rce-mitigation" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/kubernetes-helm-charts-rce-mitigation" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/masterscada-buk-ts-rce-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/masterscada-buk-ts-rce-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/masterscada-buk-ts-rce-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-kev-filezen-cve-2026-25108</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-kev-filezen-cve-2026-25108" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-kev-filezen-cve-2026-25108" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/roguepilot-github-codespaces-token-leak</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/roguepilot-github-codespaces-token-leak" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/roguepilot-github-codespaces-token-leak" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/malicious-npm-packages-steal-secrets</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/malicious-npm-packages-steal-secrets" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/malicious-npm-packages-steal-secrets" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/weekly-cybersecurity-threats-easm-impact</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/weekly-cybersecurity-threats-easm-impact" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/weekly-cybersecurity-threats-easm-impact" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/byovd-cryptomining-time-bomb-campaign</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/byovd-cryptomining-time-bomb-campaign" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/byovd-cryptomining-time-bomb-campaign" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/muddywater-mena-new-malware-tools</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/muddywater-mena-new-malware-tools" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/muddywater-mena-new-malware-tools" />
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/exposed-llm-endpoints-security-risks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/exposed-llm-endpoints-security-risks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/exposed-llm-endpoints-security-risks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/2026-cybersecurity-predictions-quantum-easm</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/2026-cybersecurity-predictions-quantum-easm" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/2026-cybersecurity-predictions-quantum-easm" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/ldap-active-directory-integration-guide</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/ldap-active-directory-integration-guide" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/ldap-active-directory-integration-guide" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/claude-code-security-vulnerability-scanning</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/claude-code-security-vulnerability-scanning" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/claude-code-security-vulnerability-scanning" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/clickfix-mimicrat-rat-hacked-sites</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/clickfix-mimicrat-rat-hacked-sites" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/clickfix-mimicrat-rat-hacked-sites" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/usb-risks-vdi-security</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/usb-risks-vdi-security" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/usb-risks-vdi-security" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/cisa-kev-roundcube-vulnerabilities</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/cisa-kev-roundcube-vulnerabilities" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/cisa-kev-roundcube-vulnerabilities" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/identity-risk-scoring-cyber-insurance-2026</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/identity-risk-scoring-cyber-insurance-2026" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/identity-risk-scoring-cyber-insurance-2026" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/beyondtrust-cve-2026-1731-webshell-attacks</loc>
    <xhtml:link rel="alternate" hreflang="ru" href="https://perimeter-scan.ru/blog/beyondtrust-cve-2026-1731-webshell-attacks" />
    <xhtml:link rel="alternate" hreflang="en" href="https://perimeter-scan.ru/blog/beyondtrust-cve-2026-1731-webshell-attacks" />
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/category/cybersecurity</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/category/easm</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/category/vulnerabilities</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/category/guides</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/category/compliance</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/identity-security</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/cyber-insurance</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/risk-assessment</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/mfa</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/privileged-access</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/password-hygiene</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/vulnerability-management</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/attack-surface-management</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/cisa-kev</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/malware</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/easm</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/container-security</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://perimeter-scan.ru/blog/tag/data-exfiltration</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
  </url>
</urlset>