<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.ox.security/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.ox.security/blog/introducing-attack-path-analysis-streamlining-appsec-one-visualization-at-a-time/</loc>
		<lastmod>2024-02-08T17:05:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/attack-path-blog-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/attack-path-open-source.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/Screenshot-2024-01-29-at-2.39.59%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/bridging-the-gap-integrating-socs-into-application-security-for-enhanced-cyber-resilience/</loc>
		<lastmod>2024-03-27T12:09:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/streamlining-devops-how-to-integrate-ox-with-gitlab-for-enhanced-security/</loc>
		<lastmod>2024-04-01T11:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/unnamed-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/gitlab-ox-identity-provider.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/gitlab-ox-token.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/gitlab-ox-scopes.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/say-goodbye-to-manual-appsec-overhead-unleashing-the-power-oxs-automated-no-code-workflows/</loc>
		<lastmod>2024-04-01T11:57:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Introducing-OX-no-code-security-automation-workflows.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/ox-secrurity-jira-ticket-workflow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Workflow-Blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/2023-the-year-of-the-ox-reflecting-on-a-year-of-momentum/</loc>
		<lastmod>2024-04-01T11:58:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Momentum-Blog-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/OX-Prioritization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/OSCR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/OX-Security-Cool-Vendor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/think-ceos-are-not-liable-for-cyber-risk-think-again/</loc>
		<lastmod>2024-04-01T11:59:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/press-release-ox-security-receives-strategic-investment-from-ibm-ventures-to-supercharge-software-supply-chain-security/</loc>
		<lastmod>2024-04-01T12:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Add_a_subheading_1_1200x627.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/automating-your-way-out-of-an-appsec-staffing-shortage/</loc>
		<lastmod>2024-04-01T12:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/11/Add-a-heading-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/ox-dashboard-screen-shot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/elevating-software-supply-chain-security-with-oscar/</loc>
		<lastmod>2024-04-01T12:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/oscar-blog-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/oscr-blog-post-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/oscr-open-source-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/oscr-code-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/oscr-secrets.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/securing-your-software-development-in-compliance-with-cisa-how-ox-security-simplifies-the-process/</loc>
		<lastmod>2024-04-01T12:03:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Copy-of-Copy-of-LinkedIn-Base-Size-2024-1200x627-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/securing-the-cloud-native-landscape-embracing-active-aspm-for-compliance/</loc>
		<lastmod>2024-04-01T12:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/Untitled-design-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/protect-your-software-supply-chain-with-ox-securitys-latest-integration-with-bitbucket-cloud/</loc>
		<lastmod>2024-04-01T12:10:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Bitbucket.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cybersecurity-excellence-awards/</loc>
		<lastmod>2024-04-01T12:18:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/03/Cybersecurity-Excellence-Awards-OX-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-and-preventing-dependency-confusion-attacks/</loc>
		<lastmod>2024-04-01T12:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Frame-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.39.45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.40.05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.40.59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.41.24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.42.58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.43.14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/Screenshot-2023-08-09-at-15.43.31.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-you-need-to-know-about-the-libwebp-exploit/</loc>
		<lastmod>2024-04-01T12:23:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/1200x628-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/cvss-3.x.-severity-and-metrics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/severity-image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/cve-2023-5129-detail-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/image1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/ox-libwebp-safe-versions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/ox-prioritization-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/ox-priortization-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/image1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/top-4-ways-to-protect-your-software-from-supply-chain-vulnerabilities/</loc>
		<lastmod>2024-04-01T12:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Top-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/introducing-ox-gpt-appsecs-first-chatgpt-integration/</loc>
		<lastmod>2024-04-01T12:25:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/05/Compliance-vs-Security_-Why-they-are-not-the-same-thing-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/05/Screen-Shot-2023-05-19-at-2.46.12-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/05/Screen-Shot-2023-05-19-at-4.16.28-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-you-need-to-know-from-the-garter-market-guide-for-cnapp/</loc>
		<lastmod>2024-04-01T12:28:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/04/1200x628-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/03/Frame-35.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-now-available-on-aws-marketplace/</loc>
		<lastmod>2024-04-01T12:30:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/05/1200x628-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/openssl-vulnerability/</loc>
		<lastmod>2024-04-01T12:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Cyber-Security-Risk-Score-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Screen-Shot-2022-10-29-at-7.49.52-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-2023-sinet16-innovator-award-winner/</loc>
		<lastmod>2024-04-01T12:31:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/SINET16_Social-Promo_OX-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/09/SINET16_Social-Promo_OX-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/find-the-root-cause-and-fix-it-by-consoldating-your-open-source-security-issues/</loc>
		<lastmod>2024-04-01T12:32:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/06/Frame-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/open-software-supply-chain-attack-reference-framework/</loc>
		<lastmod>2024-04-01T12:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/02/large-PBOM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/prepare-your-response-plan-for-the-upcoming-libcurl-security-alert/</loc>
		<lastmod>2024-04-01T12:36:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/1200x628-23.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/a-playbook-for-communicating-the-nuances-of-xz-utils-cve-2024-3094/</loc>
		<lastmod>2024-04-01T22:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Copy-of-Integrating-SOCs-into-Application-Security-for-Enhanced-CyberResilience-1200x627-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/XZ-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/xz-utils-workflow2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/bridging-the-gap-uniting-development-and-appsec/</loc>
		<lastmod>2024-04-26T16:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/Integrating-SOCs-into-Application-Security-for-Enhanced-CyberResilience-1200x627-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-winner-of-the-coveted-global-infosec-awards-during-rsa-conference-2024/</loc>
		<lastmod>2024-05-07T18:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Cyber-Defense-Award-Blog-Featured-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Winner-2024-clear.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unlocking-a-new-era-in-application-security-with-ox-securitys-attack-path-reachability-analysis/</loc>
		<lastmod>2024-05-07T20:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Analysis-GIF.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/BOM-overview-SS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/press-release-unlocking-a-new-era-in-application-security-with-ox-securitys-attack-path-reachability-analysis/</loc>
		<lastmod>2024-05-09T12:45:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-PR-Blog-Graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unpacking-log4j-a-cybersecurity-playbook-for-executives/</loc>
		<lastmod>2024-05-24T15:18:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Unpacking-Log4j-Playbook-Blog-Featured-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/log4j-meme-for-blog.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-appsec-can-learn-from-30-years-of-it-security/</loc>
		<lastmod>2024-06-25T14:29:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Copy-of-Podcast-LinkedIn-Base-Size-2024-1200x627-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/DALL%C2%B7E-2024-06-24-15.27.18-A-detailed-image-of-a-retro-computer-from-the-1980s-featuring-a-beige-desktop-with-a-bulky-CRT-monitor-a-clunky-keyboard-and-a-floppy-disk-drive.-T.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/DALL%C2%B7E-2024-06-24-15.32.00-A-detailed-image-of-a-needle-in-a-haystack.-The-scene-should-show-a-large-pile-of-hay-with-a-single-needle-visible-among-the-hay.-The-needle-should-be.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-the-risks-of-transitive-dependencies-in-software-development/</loc>
		<lastmod>2024-07-02T18:24:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Understanding-the-Risks-of-Transitive-Dependencies-in-Software-Development.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/it-is-time-to-reclaim-control-and-responsibility-over-your-application-security/</loc>
		<lastmod>2024-07-10T12:38:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/illusion.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/extending-resilience-reducing-stress-and-burnout-for-cybersecurity-teams/</loc>
		<lastmod>2024-07-30T16:26:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/mindfulness-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/that-was-then-this-is-now-modernizing-appsec-in-fast-paced-development-environments/</loc>
		<lastmod>2024-08-21T07:56:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/b2f3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/protecting-against-the-zip-slip-vulnerability-attack/</loc>
		<lastmod>2024-09-30T10:05:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/zip-slip-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-29-e1666786286243.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Ek0C6BMU8AAJAOq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/effectively-communicating-risk-with-visibility-eli-edelkinds-cybersecurity-playbook-for-executives/</loc>
		<lastmod>2024-09-30T10:51:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/ELI-EDILKIND-PLAYBOOK-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-to-align-infosec-to-business-operations-sam-currys-cybersecurity-playbook-for-executives/</loc>
		<lastmod>2024-09-30T10:54:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/for-site-playbook-sam-curry.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/eliminating-manual-appsec-practices-with-active-aspm/</loc>
		<lastmod>2024-09-30T11:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/active-aspm-blog-graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/a-deep-dive-into-graphql-api-with-python-client/</loc>
		<lastmod>2024-09-30T11:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/11/1200x627-13-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/Snippet-of-JSON-response-from-getAppInfo-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/three-ways-to-manage-cybersecurity-tool-sprawl-in-your-software-supply-chain/</loc>
		<lastmod>2024-10-02T13:01:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/tool-sprawl-blog-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/2D-Supply-Chain-Dashboard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/OX-Prioritization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/OSCR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/issue-ox-secreenshot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/believe-the-hype-ox-security-named-in-five-gartner-hype-cycles/</loc>
		<lastmod>2024-10-23T12:51:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/08/1200x628-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/your-guide-to-application-detection-and-response-adr/</loc>
		<lastmod>2024-11-06T16:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/Frame-1000005002-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/key-considerations-for-selecting-an-sbom-tool/</loc>
		<lastmod>2024-11-19T13:10:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/sbom-key-considerations-blog-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-alert-fatigue-to-actionable-insights-how-sca-fits-into-active-aspm/</loc>
		<lastmod>2024-11-19T17:33:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/Blog-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/enhanced-threat-exposure-management-with-seemplicity-and-ox-security/</loc>
		<lastmod>2024-12-05T06:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/seemplcitiy-blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-to-lightspeed-and-fortune-cyber-60-list-of-top-vc-backed-early-growth-cybersecurity-companies/</loc>
		<lastmod>2024-12-05T07:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/OX-Security_horizontal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/consolidation-is-king-how-aspm-is-transforming-appsec/</loc>
		<lastmod>2024-12-12T10:12:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/Frame-1000005007-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unleashing-the-power-of-simplicity-in-application-security-appsec/</loc>
		<lastmod>2024-12-12T10:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/blog-simpicity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/effective-incident-response-a-cybersecurity-playbook-for-executives/</loc>
		<lastmod>2024-12-12T22:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/david-cross-podcast-blog-featured-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/phising-meme.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/improve-your-cyber-risk-score/</loc>
		<lastmod>2024-12-12T22:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Cyber-Security-Risk-Score-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Frame-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/saas-bom-the-advantage-for-securing-saas-ecosystems/</loc>
		<lastmod>2024-12-12T22:20:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/SaaS-BOM-Blog-Featured-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/SaaS-BOM-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/demystifying-attack-path-analysis-in-application-security-benefits-implementation-and-considerations-part-one/</loc>
		<lastmod>2024-12-12T22:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Blog-Part-One-Featured-Graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Analysis-GIF.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/oscr-report-exposes-software-supply-chain-security-vulnerabilities/</loc>
		<lastmod>2024-12-12T22:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Copy-of-OSCR-General-Ads-Landscape-1200x627-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/7c64aec1-13a9-4547-95a6-fa9d7456fde1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/press-release-ox-security-and-hclsoftware-announce-strategic-partnership-to-launch-appscan-supply-chain-security/</loc>
		<lastmod>2024-12-12T22:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/HCL-OX-PR-Blog-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/security-included-preventing-sensitive-data-leaks-in-the-software-supply-chain/</loc>
		<lastmod>2024-12-31T16:15:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/eyal-and-tamar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-unveils-the-first-active-application-security-posture-management-platform-to-eliminate-manual-practices/</loc>
		<lastmod>2025-01-13T17:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/PBOM-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/Screenshot-2024-01-29-at-2.39.59%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/01/Screenshot-2024-01-29-at-2.41.06%E2%80%AFPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-Workflow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-composition-analysis-tool/</loc>
		<lastmod>2025-01-15T16:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/software-composition-analysis-tool-for-open-source-risks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-to-consider-when-choosing-a-software-composition-analysis-sca-tool/</loc>
		<lastmod>2025-01-15T16:48:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/SCA-Blog-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-joins-aws-isv-accelerate-program/</loc>
		<lastmod>2025-01-16T11:43:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/04/Screen-Shot-2023-04-19-at-12.00.02-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-risk-executives-can-prioritize-full-stack-technology-coverage-now/</loc>
		<lastmod>2025-01-16T11:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/How-Risk-Executives-Can-Prioritize-Full-Stack-Technology-Coverage-Now.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-a-2023-gartner-cool-vendor-in-platform-engineering-for-scaling-application-security-practices/</loc>
		<lastmod>2025-01-16T14:44:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/07/Group-68900.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/mandatory-access-control-model-guide/</loc>
		<lastmod>2025-01-21T09:12:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/12/The-Definitive-Guide-to-Cloud-Application-Security-for-2022-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/cyber-security-meme-idlememe-2-1024x576-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/Difference-Between-DAC-and-MAC-Comparison-Summary.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/preview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sdlc-security-vs-compliance/</loc>
		<lastmod>2025-01-24T10:42:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/10/Compliance-vs-Security_-Why-they-are-not-the-same-thing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/a-get-out-of-security-debt-five-ways-automation-tools-help-prioritize-security-issues-across-the-sdlc/</loc>
		<lastmod>2025-02-10T06:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/empowering-the-shift-from-integration-to-innovation-in-application-security/</loc>
		<lastmod>2025-02-10T06:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/shift-left-2-blog-sit-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-anatomy-of-a-pbom/</loc>
		<lastmod>2025-02-16T13:51:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/08/What-is-a-PBOM_-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/security-drift-what-it-is-and-how-to-manage-it/</loc>
		<lastmod>2025-02-16T13:52:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/08/How-to-Manage-Security-Drift.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/visibility-in-application-security-a-key-to-proactive-risk-management/</loc>
		<lastmod>2025-02-18T17:13:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/Frame-1000005081.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-development-vulnerabilities-what-they-are-and-how-to-avoid-them/</loc>
		<lastmod>2025-02-20T09:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/software-development-vulnerabilities.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/context-is-king-what-the-next-generation-of-appsec-tools-is-learning-from-siem/</loc>
		<lastmod>2025-02-27T10:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/moosh-on-hoverboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/everything-you-need-to-know-about-software-composition-analysis-sca/</loc>
		<lastmod>2025-03-04T16:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/tools-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/image-1404.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/lessons-from-the-postgresql-cve-2025-1094-exploitation/</loc>
		<lastmod>2025-03-04T19:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/Frame-68961.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/supply-chain-security-for-software-what-you-need-to-know/</loc>
		<lastmod>2025-03-07T10:52:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/seo-suply-chain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-the-link-between-api-exposure-and-vulnerability-risks/</loc>
		<lastmod>2025-03-07T15:28:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-shadow-apis-risks-and-management/</loc>
		<lastmod>2025-03-07T15:32:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/Shadow-API-Blog-Featured-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/05/API-BOM-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/appsec-security-for-applications/</loc>
		<lastmod>2025-03-09T13:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/appsec-security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/15-hours-of-open-sourced-hell-lessons-learned-from-tj-actions-changed-files/</loc>
		<lastmod>2025-03-25T09:32:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/changed-files-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2024-53104-are-you-really-at-risk/</loc>
		<lastmod>2025-03-25T09:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/panic-at-the-ciso-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/tame-the-tech-sprawl-effective-strategies-for-optimizing-your-security-tech-stack/</loc>
		<lastmod>2025-03-25T18:58:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/tech-sprawl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-role-of-threat-modeling-in-secure-by-design/</loc>
		<lastmod>2025-04-02T11:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/crush-testing-cursor-does-coding-on-autopilot-mean-security-on-standby/</loc>
		<lastmod>2025-04-03T14:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/cursor-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/Untitled-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/5-ways-sdlc-security-has-changed-in-2022/</loc>
		<lastmod>2025-04-11T07:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/09/X-Ways-SDLC-Security-Has-Changed-in-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/kev-and-epss/</loc>
		<lastmod>2025-04-11T09:24:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Copy-of-InfoSec-Europe-x-OX-Security-1200x628-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/KEV-prioritization-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/EPSS-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Issue-prioritization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/proactive-application-security-learning-from-the-recent-github-extortion-campaigns/</loc>
		<lastmod>2025-04-11T09:24:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Shadow-API-Blog-Featured-Image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/kubernetes-ingress-nginx-nightmare-cve-2025-1974-patch-now-or-risk-exposure/</loc>
		<lastmod>2025-04-11T09:32:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/CVE-2025-1974.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sbom-tools-mitigating-supply-chain-risk-driving-compliance/</loc>
		<lastmod>2025-04-11T09:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sbom-tools-blogpost.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sbom-dashboard.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sbom-audit.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/guide-to-the-sbom-executive-order/</loc>
		<lastmod>2025-04-11T09:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/12/A-Step-by-step-Guide-to-the-SBOM-Executive-Order.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/sbom-components-scribe-security-768x451-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/transitive-dependency-in-dbms_thumbnail.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-has-an-exciting-announcement/</loc>
		<lastmod>2025-04-11T09:45:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/09/ox_Linkedin-post_v4-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sbom-the-ingredients-label-for-cybersecurity/</loc>
		<lastmod>2025-04-11T09:46:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/SBOM-Blog-LinkedIn-Graphic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/Screenshot-2024-02-21-at-1.48.31%E2%80%AFPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/pbom-vs-sbom/</loc>
		<lastmod>2025-04-11T09:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/08/PBOM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-is-application-security-posture-management/</loc>
		<lastmod>2025-04-11T10:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/What-is-ASPM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/obtaining-security-budgets-you-need/</loc>
		<lastmod>2025-04-11T10:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Copy-of-Podcast-LinkedIn-Base-Size-2024-1200x627-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/top-security-kpis-every-team-needs-to-measure/</loc>
		<lastmod>2025-04-11T10:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/08/18-KPIs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/security-champions/</loc>
		<lastmod>2025-04-11T10:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/08/Why-You-Need-Security-Champions-and-How-to-Identify-Them.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-science-behind-alert-fatigue-in-security-teams-how-to-beat-it/</loc>
		<lastmod>2025-04-24T14:48:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/blog-webinar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/secrets-management-tools/</loc>
		<lastmod>2025-04-25T16:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/secret-management-tools-OX-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/OX-security-secrets-manager.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/OX-security-secrets-management-tools.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/Secrets-management-use-case.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/codes-covert-threat-unveiling-secrets-and-personally-identifiable-information/</loc>
		<lastmod>2025-04-25T16:48:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-Blog-Featured-Image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/PBOM-view.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Git-Posture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-and-PII-Policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-Workflow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/shift-left-budget-right-getting-the-most-from-your-appsec-budget/</loc>
		<lastmod>2025-04-30T12:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/budget-in-appsec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-ox-security-raised-60m-to-help-you-focus-on-the-5-of-risks-that-matter/</loc>
		<lastmod>2025-05-08T11:09:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/1200%D1%85628-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-appsec-tools-killed-appsec-and-three-ways-to-fix-it/</loc>
		<lastmod>2025-05-08T11:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/why-appsec-killed-appsec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-wins-application-security-company-of-the-year-at-cybersecurity-breakthrough-awards-2024/</loc>
		<lastmod>2025-05-08T11:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/cyber-security-breakthrough.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-supply-chain-security-everything-you-need-to-know/</loc>
		<lastmod>2025-05-09T18:51:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/guide-to-software-supply-chain-security-blog-image.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-supply-chain-security-and-sbom/</loc>
		<lastmod>2025-05-09T18:53:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sbom-seo-page.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/SBOM-checklist.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/software-supply-chain-compliance-and-regulation.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-and-mitigating-software-supply-chain-risk/</loc>
		<lastmod>2025-05-09T18:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/Understanding-and-Mitigating-Software-Supply-Chain-Risk-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/a-costly-divide-5-ways-to-stop-appsec-and-dev-from-working-against-each-other/</loc>
		<lastmod>2025-05-27T17:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/5-Strategies-to-Mend-the-Dangerous-AppSec-Development-Fracture-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/keeping-score-or-playing-to-win-why-vendor-data-matters/</loc>
		<lastmod>2025-06-05T16:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/Temp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/understanding-sbom-software-the-foundation-of-modern-cybersecurity/</loc>
		<lastmod>2025-06-06T11:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/understanding-sbom.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-security-tools/</loc>
		<lastmod>2025-06-10T07:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/Container-Security-Tools.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-scanning-a-path-to-enhanced-vulnerability-management/</loc>
		<lastmod>2025-06-10T07:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/04/Container-Blog-Featured-Image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/03/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-vulnerability-scanning-what-it-is-why-you-need-it/</loc>
		<lastmod>2025-06-10T07:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/container-vulnerability-scanning-tools.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/confirmed-critical-the-grafana-ghost-exposes-36-of-public-facing-instances-to-malicious-account-takeover/</loc>
		<lastmod>2025-06-15T16:38:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/%D7%A0%D7%99%D7%A8-%D7%95%D7%9E%D7%A9%D7%94-%D7%91%D7%9C%D7%95%D7%9B.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/managing-transitive-vulnerabilities/</loc>
		<lastmod>2025-06-24T08:52:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Copy-of-InfoSec-Europe-x-OX-Security-1200x628-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/mitigating-the-risks-of-transitive-vulnerabilities-in-appsec/</loc>
		<lastmod>2025-06-24T08:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Locust-Blog-Social-Assets-1200x627-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-1-Typical-npm-install-stdout.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-2-Software-Composition-Analysis-SCA-example-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Demo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-3-Simple-Exploit-POC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Research-Question-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Triage-at-Scale-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-5-Exploitability-Analysis-via-LLM-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-6-LLM-Exploitability-Analysis-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-7-Analyzing-exploit-probability-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-8-Risk-formula-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Forumula.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/to-the-thurd.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Figure-9-Risk-formula-with-alpha-variable-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-29927-is-your-middleware-really-protecting-you/</loc>
		<lastmod>2025-06-24T08:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/CVE-2025-29927-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/top-javascript-vulnerabilities/</loc>
		<lastmod>2025-06-24T09:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/12/5-Top-JavaScript-Vulnerabilities-You-Need-to-Know-b-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/r_1879577_Dw1hs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/sorted-XSS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/61f251ef69dd0a65b7b4d726_how-csrf-work.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/everything-you-need-to-know-to-make-devsecops-work-for-your-organization/</loc>
		<lastmod>2025-06-24T17:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/DevSecOps-Tools-OX-Security.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-recognized-by-gartner-in-key-devsecops-tools-report/</loc>
		<lastmod>2025-06-24T18:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/02/1200x627-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/devsecops-dashboard-build-or-buy/</loc>
		<lastmod>2025-06-24T18:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/build-or-buy-graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2023/10/ox-dashboard-screen-shot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-payloads-to-powerpoints-security-reporting-that-speaks-your-business-colleagues-language/</loc>
		<lastmod>2025-06-25T06:43:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/From-Payloads-to-Powerpoints.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-to-avoid-reckless-adoption-of-ai-assisted-development-what-every-team-needs-to-know/</loc>
		<lastmod>2025-06-30T11:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/How-to-Avoid-Reckless-Adoption-of-AI-Assisted-Development_-What-Every-Team-Needs-to-Know.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/agentic-ai-and-the-rise-of-hardcoded-secrets/</loc>
		<lastmod>2025-07-01T13:24:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/Agentic-AI-and-the-Rise-of-Hardcoded-Secrets.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/can-you-trust-that-verified-symbol-exploiting-ide-extensions-is-easier-than-it-should-be/</loc>
		<lastmod>2025-07-02T07:26:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/Can-You-Trust-that-Verified-Symbol_-Exploiting-IDE-Extensions-is-Easier-Than-It-Should-Be.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ci-cd-pipeline-security/</loc>
		<lastmod>2025-07-03T08:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/CI-CD-Pipeline-Security-Best-Practices.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/launch-your-software-career-with-security-at-the-core/</loc>
		<lastmod>2025-07-10T12:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/How-to-Become-a-Secure-Developer-Rockstar-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/api-security-testing-ox-security/</loc>
		<lastmod>2025-07-13T07:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/API-security-testing.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-foundation-to-maturity-how-to-build-a-solid-appsec-program-blog/</loc>
		<lastmod>2025-07-15T12:11:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/From-Foundation-to-Maturity_-How-to-Build-a-Solid-AppSec-Program.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/web-application-security-testing-6-essential-elements-for-2025/</loc>
		<lastmod>2025-07-18T08:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/web-application-security-testing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sast-and-dast-tools-still-essential-security-solutions-in-2025/</loc>
		<lastmod>2025-07-18T08:10:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/SAST-and-DAST-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/your-guide-to-static-application-security-testing-sast/</loc>
		<lastmod>2025-07-18T08:14:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/static-application-security-testing-sast.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/appsec-data-fabric.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/sast-early-detection.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/sast-line-code.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/sast-regulation-compliance.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/sast-vulnerability-scan.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/sast-use-cases.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-features-to-flaws-understanding-c-c-and-their-unique-vulnerabilities/</loc>
		<lastmod>2025-07-23T10:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/C-and-Their-Unique-Vulnerabilities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/image21-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/image19-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/image22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/image9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-composition-analysis-sca-security/</loc>
		<lastmod>2025-08-28T11:35:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sca-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/Screenshot-2024-11-13-at-9.35.35%E2%80%AFAM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/Screenshot-2024-11-13-at-9.38.20%E2%80%AFAM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sast-vs-sca-analysis-tools-that-are-better-together/</loc>
		<lastmod>2025-08-28T11:35:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sast-vs-sca-blogpost.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/sbom-vs-pbom.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-vulnerabilities/</loc>
		<lastmod>2025-08-28T11:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/application-security-vulnerabilities-blog.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sdlc-security-everything-you-need-to-know/</loc>
		<lastmod>2025-08-28T11:35:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Exploitable-vs.-Not-Exploitable_-Can-You-Tell-the-Difference-for-Your-Software-Vulnerabilities-today-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/appsec-tools-what-they-do-and-how-to-pick-the-right-one/</loc>
		<lastmod>2025-08-28T11:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/appsec-tools.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-sast-tools-help-secure-software/</loc>
		<lastmod>2025-08-28T11:35:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/SAST-tools.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-curse-of-the-fork-when-patching-is-not-trivial/</loc>
		<lastmod>2025-08-28T13:45:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/Fork.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-vulnerability-management/</loc>
		<lastmod>2025-09-10T12:30:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-testing/</loc>
		<lastmod>2025-09-10T12:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/Application-Security-Testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/npm-packages-compromised/</loc>
		<lastmod>2025-09-10T14:08:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/hacked.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-100-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/npm-2-0-hack-40-npm-packages-hit-in-major-supply-chain-attack/</loc>
		<lastmod>2025-09-16T15:59:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-105-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/vibesec-the-security-response-to-ai-speed-development/</loc>
		<lastmod>2025-09-30T11:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/Vibesec-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/solving-the-ai-confidence-paradox-why-developers-dont-trust-the-tools-they-use-most/</loc>
		<lastmod>2025-09-30T12:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/AI-paradox.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/this-is-vibe-coding-software-development-and-security-of-the-future/</loc>
		<lastmod>2025-10-13T06:24:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/Vibe-hacking-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-vulnerability-assessment/</loc>
		<lastmod>2025-10-14T12:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-82.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-85.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-88.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-89.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-day-i-closed-the-code-tab-in-my-vibe-coding/</loc>
		<lastmod>2025-10-15T10:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/Door.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-five-kpis-that-actually-matter-in-product-security/</loc>
		<lastmod>2025-10-16T09:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/KPI-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-vibesec-manifesto/</loc>
		<lastmod>2025-10-21T12:19:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/The-VibeSec-Manifesto-opt-2-2X.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/dynamic-application-security-testing-dast/</loc>
		<lastmod>2025-11-13T10:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/DAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-posture-management-aspm/</loc>
		<lastmod>2025-11-13T10:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/ASPM-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/actionable-insights-in-an-ai-driven-world/</loc>
		<lastmod>2025-11-13T10:50:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/MCP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-a-leader-in-application-security-posture-management-by-idc-marketscape/</loc>
		<lastmod>2025-11-13T10:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/IDC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-ide-extension-now-available-on-the-vs-code-marketplace/</loc>
		<lastmod>2025-11-13T10:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/vscode.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-78.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/shift-left-with-efficiency-and-flexibility/</loc>
		<lastmod>2025-11-13T10:51:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/CLI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-31.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-is-an-sca-scan/</loc>
		<lastmod>2025-11-13T10:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/SCA-tools.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/nx-supply-chain-breach-how-s1ngularity-weaponized-ai/</loc>
		<lastmod>2025-11-13T10:51:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/3-_-Auto-remediation-and-AI_-Reality-or-Hype.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/1000141610.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/securing-the-commit-ide-extensions-your-devs-will-use/</loc>
		<lastmod>2025-11-13T10:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/IDE-Extensions-Your-Devs-Will-Use-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-regulation-to-reality-how-ox-security-helps-teams-operationalize-the-eu-cyber-resilience-act/</loc>
		<lastmod>2025-11-13T10:51:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/Leveraging-OX-Security-for-EU-Cyber-Resilience-Act-CRA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unmasking-the-hidden-risks-why-scanning-public-container-images-is-your-next-security-imperative/</loc>
		<lastmod>2025-11-13T10:52:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/Multi-Branch-Scanning.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/introducing-agent-ox/</loc>
		<lastmod>2025-11-13T10:52:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/What-is-an-SCA-Scan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/ide-pull-code-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/ox-issue-details-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/github-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-named-in-the-2025-gartner-hype-cycle-for-application-security/</loc>
		<lastmod>2025-11-13T10:52:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/Hyper-cycle-blog-image-for-site-and-social.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/real-time-sbom-drift-detection/</loc>
		<lastmod>2025-11-13T10:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/SBOM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/malicious-dependencies-catch-the-real-threats-not-just-the-noise/</loc>
		<lastmod>2025-11-13T10:52:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/07/Malicious-Dependencies_-Catch-the-Real-Threats-Not-Just-the-Noise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/deadlines-or-danger-why-appsec-sla-management-is-more-than-a-metric/</loc>
		<lastmod>2025-11-13T10:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/Deadlines-or-Danger.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/eu-ai-act-aspm-what-devs-must-know-now/</loc>
		<lastmod>2025-11-13T10:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/From-Regulation-to-Resilience_-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/from-alerts-to-actions-turning-appsec-data-into-business-value/</loc>
		<lastmod>2025-11-13T10:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/06/Temp-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/api-security-best-practices-for-protecting-revenue-in-the-digital-age/</loc>
		<lastmod>2025-11-13T10:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/API-Security-Best-Practices-for-Protecting-Revenue-in-the-Digital-Age-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-to-focus-on-secrets-not-base-image-clutter/</loc>
		<lastmod>2025-11-13T10:53:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/How-to-Focus-on-Secrets-Not-Base-Image-Clutter-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/multi-branch-scanning-for-complete-software-development-lifecycle-coverage/</loc>
		<lastmod>2025-11-13T10:53:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Multi-Branch-Scanning-for-Complete-Software-Development-Lifecycle-Coverage-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/automation-and-ai-driven-analysis-in-appsec/</loc>
		<lastmod>2025-11-13T10:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/Automation-and-AI-Driven-Analysis.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/secrets-detection-why-it-matters-in-appsec/</loc>
		<lastmod>2025-11-13T10:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/secret-scanning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/stop-wasting-time-on-manual-sla-tracking/</loc>
		<lastmod>2025-11-13T10:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/05/sla-tracking-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-visibility-isnt-the-biggest-problem-in-application-security/</loc>
		<lastmod>2025-11-13T10:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/alo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/expanding-the-herd-why-ox-security-invested-in-more-ticketing-integrations/</loc>
		<lastmod>2025-11-13T10:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/moosh-blog-b-Artboard-82.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/integrate-microsoft-teams-with-ox-aspm-for-streamlined-security-and-development-workflows/</loc>
		<lastmod>2025-11-13T10:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/intergration-animation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-appsec-arms-race-are-we-winning/</loc>
		<lastmod>2025-11-13T10:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/arms-race.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/introducing-ox-securitys-cloud-bom/</loc>
		<lastmod>2025-11-13T10:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/cloud-bom.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/eu-cybersecurity-regulations-what-appsec-teams-need-to-know/</loc>
		<lastmod>2025-11-13T10:55:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/dominars.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-appsec-champions-matter-more-than-ever/</loc>
		<lastmod>2025-11-13T10:55:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/03/champion.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/pragmatic-approaches-to-appsec-balancing-tools-budget-and-talent/</loc>
		<lastmod>2025-11-13T10:55:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/balance-moosh.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/handling-appsec-alerts-how-to-focus-on-the-5-that-matters/</loc>
		<lastmod>2025-11-13T10:55:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/5-blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/drowning-in-application-security-alerts-prioritize-what-matters-with-unified-appsec/</loc>
		<lastmod>2025-11-13T10:55:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/Frame-1000005082.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-appsec-teams-need-a-multi-dependency-graph/</loc>
		<lastmod>2025-11-13T10:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/graph-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/image2-1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/five-reasons-standalone-vulnerability-scanning-isnt-enough-in-2025/</loc>
		<lastmod>2025-11-13T10:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/Five-Reasons-Standalone-Vulnerability-Scanning-Isnt-Enough-in-2025.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-and-the-future-of-application-security-posture-management/</loc>
		<lastmod>2025-11-13T10:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/gartner-blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-empowering-executives-with-actionable-appsec-insights/</loc>
		<lastmod>2025-11-13T10:56:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/02/1200x628-Ad-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/streamlining-devops-how-to-integrate-ox-with-github-for-enhanced-aspm/</loc>
		<lastmod>2025-11-13T10:56:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/ox-security-and-git-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unpacking-the-power-of-ox-securitys-multi-dependency-graph/</loc>
		<lastmod>2025-11-13T10:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Frame-1000005021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-false-positives-are-the-bane-of-application-security-testing/</loc>
		<lastmod>2025-11-13T10:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Frame-1000005020-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/deconstructing-the-cybersecurity-executive-order-a-practical-analysis/</loc>
		<lastmod>2025-11-13T10:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Deconstructing-the-Cybersecurity-Executive-Order_-A-Practical-Analysis-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-testing-platforms-ox-security/</loc>
		<lastmod>2025-11-13T10:57:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/application-security-testing-platform-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/securing-the-software-supply-chain-a-critical-priority-for-2025/</loc>
		<lastmod>2025-11-13T10:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/1207-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/exploitable-vs-not-exploitable-can-you-tell-the-difference-for-your-software-vulnerabilities/</loc>
		<lastmod>2025-11-13T10:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/mmmmm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/five-imperatives-to-reduce-your-application-attack-surface/</loc>
		<lastmod>2025-11-13T10:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/Five-Imperatives-to-Reduce-Your-Application-Attack-Surface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/01/DALL%C2%B7E-2025-01-02-18.59.42-A-seamless-repeating-pattern-featuring-abstract-illustrations-of-futuristic-laptops-with-glowing-purple-screens-stylized-desk-accessories-and-minima.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/five-predictions-for-application-security-in-2025/</loc>
		<lastmod>2025-11-13T10:58:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/predictions-2025.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/5-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-offers-a-newly-enhanced-developer-experience/</loc>
		<lastmod>2025-11-13T10:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/12/dev.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/true-or-false-how-reachability-analysis-uncovers-real-security-risks/</loc>
		<lastmod>2025-11-13T10:58:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/Automation-cuts-analysis-time-by-up-to-90-and-saves-70-on-labor-costs.-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/7-best-practices-for-assessing-application-vulnerabilities/</loc>
		<lastmod>2025-11-13T10:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/%D7%9E%D7%A0%D7%9A%D7%9D%D7%A2-7-%D7%94%D7%95%D7%9A%D7%A6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/aspm-vs-cspm-whats-the-difference-and-why-does-it-matter/</loc>
		<lastmod>2025-11-13T10:58:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/aspm-vs-cspm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/seven-things-to-look-for-in-an-aspm-solution/</loc>
		<lastmod>2025-11-13T10:59:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/7-thing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/three-ways-ox-security-helps-you-navigate-financial-compliance-in-application-security/</loc>
		<lastmod>2025-11-13T10:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/money-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-users-want-from-aspm/</loc>
		<lastmod>2025-11-13T10:59:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/11/1200x628-Ad-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/why-you-need-to-pay-more-attention-to-software-supply-chain-attacks/</loc>
		<lastmod>2025-11-13T10:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/Frame-1000005005.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/conquering-application-security-complexities-with-aspm-a-strategic-imperative/</loc>
		<lastmod>2025-11-13T10:59:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/blog-Conquering-Application-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/automating-secrets-management/</loc>
		<lastmod>2025-11-13T10:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/secret-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/should-appsec-teams-be-more-concerned-about-pipeline-vulnerabilities/</loc>
		<lastmod>2025-11-13T11:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/ssss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/frost-and-sullivan-leading-the-way-in-aspm/</loc>
		<lastmod>2025-11-13T11:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/Frost-blog-post-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/10/radar-frost-coloway-med.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/navigating-the-challenges-of-vulnerability-management-reachability-analysis-explored/</loc>
		<lastmod>2025-11-13T11:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/website-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/eight-reasons-why-a-data-fabric-will-improve/</loc>
		<lastmod>2025-11-13T11:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/09/8-reasons.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cnapp-and-aspm-friends-or-foes/</loc>
		<lastmod>2025-11-13T11:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/Copy-of-Locust-Blog-Social-Assets-1080-x-1080-px-1200-x-628-px.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/using-oscr-and-aspm-to-perform-a-digital-learning-loop-with-agentless-adr/</loc>
		<lastmod>2025-11-13T11:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/DLL-Blog-Social-Assets-1200x627-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/image1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/five-gartner-reports-four-categories-what-does-ox-security-do-anyway/</loc>
		<lastmod>2025-11-13T11:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-aspm-solutions-help-organizations-prepare-for-the-eus-dora/</loc>
		<lastmod>2025-11-13T11:01:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/08/dora.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/what-is-application-detection-and-response-adr/</loc>
		<lastmod>2025-11-13T11:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/adr-blog-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/a-top-ten-list-you-dont-want-to-be-on/</loc>
		<lastmod>2025-11-13T11:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/OSCR-Landscape-Findings-1200x627-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image2-1-e1721894024680.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-essential-role-of-multi-layered-defense-and-role-based-access-control-ox-securitys-enhanced-rbac-functionality/</loc>
		<lastmod>2025-11-13T11:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Frame-68757.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/empower-your-developers-with-software-supply-chain-security/</loc>
		<lastmod>2025-11-13T11:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Frame-68923-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unpacking-the-crowdstrike-windows-outage/</loc>
		<lastmod>2025-11-13T11:02:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Copy-of-Attack-Path-Analysis-Graphic-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/george-k.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/reddit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/three-ways-ox-security-helps-you-achieve-fedramp/</loc>
		<lastmod>2025-11-13T11:02:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/1200x628-Ad-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2024-6387-regresshion/</loc>
		<lastmod>2025-11-13T11:02:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Copy-of-Copy-of-Integrating-SOCs-into-Application-Security-for-Enhanced-CyberResilience-1200x627-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/Image-for-blog-7.1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/07/bloga7.1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/appsec-learns-from-polyfill/</loc>
		<lastmod>2025-11-13T11:02:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Copy-of-Active-ASPM-Webinar-Resources-Tile.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/06/Snarkle.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-recognized-by-gartner-as-sample-vendor-for-adr-bridging-code-creation-and-runtime-security/</loc>
		<lastmod>2025-11-25T16:01:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/OX-is-a-sample-vendor-in-ADR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/openai-mixpanel-3rd-party-data-breach/</loc>
		<lastmod>2025-11-27T10:20:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/Untitled-design-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-62.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-trends-in-2026/</loc>
		<lastmod>2025-12-03T14:51:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/trend-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/94-vulnerabilities-in-cursor-and-windsurf-put-1-8m-developers-at-risk/</loc>
		<lastmod>2025-12-04T12:56:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/Cursor-Windsurf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/reacts-cve-2025-55182-is-now-actively-exploitable-verified-poc/</loc>
		<lastmod>2025-12-05T10:51:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/alert-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-named-innovation-leader-for-the-second-consecutive-year-in-frost-sullivans-aspm-frost-radar/</loc>
		<lastmod>2025-12-10T16:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Named-Innovation-Leader-for-the-Second-Consecutive-Year-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/react2shell-going-granular-a-deep-deep-deep-technical-analysis-of-cve-2025-55182/</loc>
		<lastmod>2025-12-11T17:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/react-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-92.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/rce-in-react-server-components/</loc>
		<lastmod>2025-12-12T10:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Heading-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-35.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/react-cve-2025-55184-67779-55183-react-19-vulnerabilities/</loc>
		<lastmod>2025-12-12T11:20:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/alert.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-12-at-11.59.37-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-12-at-12.25.32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/two-clicks-to-1m-how-attackers-can-drain-enterprise-budgets-through-ai-platforms/</loc>
		<lastmod>2025-12-14T09:41:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Group-1261153676.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-02-at-15.27.30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-02-at-15.31.57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-02-at-15.32.58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Screenshot-2025-12-02-at-15.32.43.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/kalturas-journey-to-streamlined-development-with-ox-security/</loc>
		<lastmod>2025-12-17T09:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/kaltura-blog-grapgic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/888-holdings-betting-on-a-new-approach-with-active-aspm/</loc>
		<lastmod>2025-12-17T09:46:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2024/02/888-case-study-blog-featured-image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/poc-exploiting-mongobleed-cve-2025-14847-technical-walkthrough/</loc>
		<lastmod>2025-12-30T11:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/MongoBleed-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-105.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-104.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sast-vs-sca-2026/</loc>
		<lastmod>2026-01-05T07:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/SCA-VS-SAST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-supply-chain-risk/</loc>
		<lastmod>2026-01-27T11:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/iceberg-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-71.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/prevent-or-fail-why-detection-first-appsec-cannot-survive/</loc>
		<lastmod>2026-02-01T13:41:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-security-best-practices/</loc>
		<lastmod>2026-02-05T13:19:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/containers-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Container-Lifestyle-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-56.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-58.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/moltbook-blocks-account-deletion-privacy-risks/</loc>
		<lastmod>2026-02-10T15:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/moltbook-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/securing-the-full-application-lifecycle-with-upwind-and-ox-security/</loc>
		<lastmod>2026-02-17T12:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/OX-Upwind-BLOG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65716-markdown-preview-enhanced-vscode-vulnerability/</loc>
		<lastmod>2026-02-17T12:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Markdown-Preview-Enhanced.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65715-code-runner-vscode-rce/</loc>
		<lastmod>2026-02-17T12:47:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Code-Runner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65717-live-server-vscode-vulnerability/</loc>
		<lastmod>2026-02-17T12:48:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Live-Server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/npm-worm-hijacks-ci-workflows-ai-packages/</loc>
		<lastmod>2026-02-22T07:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/NPM-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-claude-code-security-promise-why-this-cant-be-our-safety-net/</loc>
		<lastmod>2026-02-23T15:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Claude-Code-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/freescout-rce-cve-2026-27636/</loc>
		<lastmod>2026-02-25T17:50:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/FreeScout2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/azure-security-best-practices/</loc>
		<lastmod>2026-02-27T15:12:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/12/5-Azure-Security-Best-Practices-to-Implement-Today-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2022/12/AZURE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/dc028f7f230a8e2ca1cb5cc732908281.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/azure-security-standards.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.ox.security/wp-content/uploads/2022/12/tumblr_ef56e29248664c62a8ae8db0242941ba_aa45c4c6_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/freescout-rce-cve-2026-28289/</loc>
		<lastmod>2026-03-04T14:28:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/CVE-2026-28289.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/bridging-application-security-and-security-operations-with-torq-and-ox-security/</loc>
		<lastmod>2026-03-17T07:33:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/OX-Torq-BLOG-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Group-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/xssinlivepreview/</loc>
		<lastmod>2026-03-18T08:25:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/VSCode-RCE-_-IDE-Saga-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-agentic-pentester-closing-the-loop-on-appsec-risk/</loc>
		<lastmod>2026-03-18T09:49:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/maze-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/blog-dataease-cve-2026-23958-admin-takeover/</loc>
		<lastmod>2026-03-23T13:18:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/Dataease.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/openclaw-github-phishing-crypto-wallet-attack/</loc>
		<lastmod>2026-03-24T18:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/OpenClaw-phishing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-47.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ai-attacks-are-outpacing-static-security-tools/</loc>
		<lastmod>2026-03-25T07:50:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/Brain-with-hook-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-78.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-76.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-77.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-75.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-security-is-now-available-in-the-cursor-mcp-directory/</loc>
		<lastmod>2026-03-29T11:32:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/OX-cursor-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-119.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-11158/</loc>
		<lastmod>2026-03-30T15:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/cve-2025-11158-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/3-years-later-cve-2023-38646-still-haunts-thousands-of-metabase-deployments/</loc>
		<lastmod>2026-03-30T16:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/3-years-later-cve-2023-38646-still-haunts-thousands-of-metabase-deployments-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-56.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/teampcps-telnyx-windows-malware-technical-analysis/</loc>
		<lastmod>2026-03-30T16:17:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/teampcps-telnyx-windows-malware-technical-analysis-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-95.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-17-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-11.24.28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-96.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-85.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-102.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-88.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-98.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-101.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-91.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-89.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-93.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-104.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-90.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-105.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-99.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-92.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-106.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-97.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-107.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/bridge-the-code-to-cloud-gap-and-neutralize-real-risk-with-ox-and-tenable/</loc>
		<lastmod>2026-03-31T12:08:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/OX-Tenable-BLOG.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/code-to-cloud-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-2026-03-19T115830.851.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/redashs-python-sandbox-escape-gives-attackers-full-server-access/</loc>
		<lastmod>2026-03-31T15:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/redashs-python-sandbox-escape-gives-attackers-full-server-access-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/for-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-51.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/https-www-ox-security-critical-access-control-flaw-in-apache-superset-exposes-sensitive-data-to-unauthorized-users/</loc>
		<lastmod>2026-03-31T15:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/https-www-ox-security-critical-access-control-flaw-in-apache-superset-exposes-sensitive-data-to-unauthorized-users-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-research-ai-code-not-inherently-less-secure-but-army-of-juniors-effect-undermines-software-security/</loc>
		<lastmod>2026-04-09T10:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/Army-of-Juniors.-Crisis_1200x628-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/</loc>
		<lastmod>2026-04-09T11:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/MogoDB.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-94.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-96.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-95.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/four-vulnerabilities-expose-a-massive-security-blind-spot-in-ide-extensions/</loc>
		<lastmod>2026-04-10T15:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/play-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ai-generated-code-how-to-protect-your-software-from-ai-generated-vulnerabilities/</loc>
		<lastmod>2026-04-12T13:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/AI-generated-Code_-How-to-Protect-Your-Software-From-AI-generated-Vulnerabilities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/04/image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/</loc>
		<lastmod>2026-04-15T13:45:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/The-MCP-Failure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Timeline.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/axios-compromised-with-a-malicious-dependency/</loc>
		<lastmod>2026-04-16T08:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/Axios-Compromised-With-A-Malicious-Dependency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-163.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-146.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-147.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-161.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-148.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-152.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-162.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-149.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-151.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-156.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-154.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-153.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-155.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-158.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-157.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-150.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-160.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-168.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-166.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-167.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-169.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-173.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-172.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-174.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-170.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-175.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-171.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-165.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-159.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-164.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-to-uninstall-openclaw-remove-data-revoke-access/</loc>
		<lastmod>2026-04-16T08:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/Delete-OpenClaw-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/litellm-malware-malicious-pypi-versions-steal-cloud-and-crypto-credentials/</loc>
		<lastmod>2026-04-16T08:21:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/LiteLLM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.44.44.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations/</loc>
		<lastmod>2026-04-16T08:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Malware_-Chrome-Extensions-Steal-ChatGPT-and-DeepSeek-Conversations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-126.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-127.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-124.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-140.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-143.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-125.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-136.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-139.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-135.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-132.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-134.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-138.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-130.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-137.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-128.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-128.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-129.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-142.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-141.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-133.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-131.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/one-step-away-from-a-massive-data-breach-what-we-found-inside-moltbot/</loc>
		<lastmod>2026-04-16T08:54:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/MoltBot-Findings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-81.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-84.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-82.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-85.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-87.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-86.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-90.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-89.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-88.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/mcp-supply-chain-advisory-rce-vulnerabilities-across-the-ai-ecosystem/</loc>
		<lastmod>2026-04-17T15:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Security-Advisory-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Windsurf-Prompt-Injection-to-Local-RCE-CVE-2026-30615.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/ox-supercharges-ai-coding-with-cursor-hooks/</loc>
		<lastmod>2026-04-20T18:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/OX-cursor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-technical-deep-dive/</loc>
		<lastmod>2026-04-20T19:35:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Technical-Deep-Dive-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Case-Studies_-Real-World-Exploitation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/LangFlow-Unauthenticated-RCE-at-Scale.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Flowise-Hardening-Bypass.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Windsurf-Prompt-Injection-to-Local-RCE-CVE-2026-30615-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/application-security-testing-tools/</loc>
		<lastmod>2026-04-20T19:48:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-95.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-56.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/static-application-security-sast-tools/</loc>
		<lastmod>2026-04-20T20:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/top-10-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/software-composition-analysis-and-sca-tools/</loc>
		<lastmod>2026-04-20T20:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image23-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image14-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/image-25.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/snyk-alternatives/</loc>
		<lastmod>2026-04-20T20:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-145.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-144.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-75.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-76.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-77.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/checkmarx-alternatives/</loc>
		<lastmod>2026-04-20T20:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/09/image-29.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/veracode-alternatives/</loc>
		<lastmod>2026-04-21T06:56:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/Veracode.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image17.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image18.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image20.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image16.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/10/image13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/apiiro-alternatives/</loc>
		<lastmod>2026-04-21T07:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/apiiro-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/sbom-tools/</loc>
		<lastmod>2026-04-21T07:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/SBOM-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/aspm-tools/</loc>
		<lastmod>2026-04-21T07:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/ASPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/dynamic-app-security-testing-tools-in-2026/</loc>
		<lastmod>2026-04-21T07:29:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/DAST-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/aikido-alternatives/</loc>
		<lastmod>2026-04-21T07:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/aikido.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-77.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-76.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-81.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-78.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-79.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/image-75.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-security-tools-2026/</loc>
		<lastmod>2026-04-21T07:49:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/process-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-72.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-73.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-56.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-60.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-75.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-67.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/vulnerability-scanning-tools/</loc>
		<lastmod>2026-04-21T07:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/eye-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-49.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/01/image-42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/container-security-solutions-in-2026/</loc>
		<lastmod>2026-04-21T08:21:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/containers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-48.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-51.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image7-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-53.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-54.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-49.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/telnyx-malware-teampcp-strikes-again-following-litellm-compromise/</loc>
		<lastmod>2026-04-21T10:26:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/Telnyx-Malware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-82.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-83.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-78.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-81.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-80.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/03/image-79.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/vercel-context-ai-supply-chain-attack-breachforums/</loc>
		<lastmod>2026-04-22T15:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Vercel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/xinference-allegedly-hacked-by-teampcp-malicious-package-in-pypi/</loc>
		<lastmod>2026-04-23T07:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Incident-template-download-as-png-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-46.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-45.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-40.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-41.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-43.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-44.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-42.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-37.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-second-coming-shai-hulud-is-back-at-it-how-to-protect-your-org/</loc>
		<lastmod>2026-04-23T08:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/sandworm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/11/hulud-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/shai-hulud-3-the-attack-continues/</loc>
		<lastmod>2026-04-23T08:49:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/Copy-of-Incident-template-download-as-png-1.pdf</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-97.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-99.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-103.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-101.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-98.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/12/image-102.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2026-22778-vllm-rce-vulnerability/</loc>
		<lastmod>2026-04-23T09:02:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/VLLM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/02/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-aftermath-of-cve-2025-4609-critical-sandbox-escape-leaves-1-5m-developers-vulnerable/</loc>
		<lastmod>2026-04-23T09:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2025/08/Frame-7-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/</loc>
		<lastmod>2026-04-23T16:49:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/Shai-Hulud-news.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-67.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-57.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-68.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-71.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-70.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-59.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-69.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-60.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.ox.security/blog/anthropic-mcp-vulnerability-ox-vibesec-ai-supply-chain/</loc>
		<lastmod>2026-04-24T17:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/MCP.Blog.lead.image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-74.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-75.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-76.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.ox.security/wp-content/uploads/2026/04/image-73.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->