<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.ox.security/wp-content/plugins/wpseo-video/xml-video-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
	<url>
		<loc>https://www.ox.security/blog/say-goodbye-to-manual-appsec-overhead-unleashing-the-power-oxs-automated-no-code-workflows/</loc>
		<video:video>
			<video:title><![CDATA[Unleashing the Power OX's Automated No-Code Workflows | OX Security]]></video:title>
			<video:publication_date>2024-03-07T07:00:38+00:00</video:publication_date>
			<video:description><![CDATA[Discover how OX's Active ASPM Platform streamlines risk identification and response protocols, eliminating vulnerabilities and technical debt at scale.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/03/Copy-of-Youtube-Workflows-Active-ASPM-Bumpers.mp4</video:content_loc>
			<video:duration>50</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/03/Introducing-OX-no-code-security-automation-workflows.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/will/'>William Penfield</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/elevating-software-supply-chain-security-with-oscar/</loc>
		<video:video>
			<video:title><![CDATA[Elevating Software Supply Chain Security with OSC&amp;R | OX Security]]></video:title>
			<video:publication_date>2023-12-13T14:14:27+00:00</video:publication_date>
			<video:description><![CDATA[Five ways the OSC&amp;R framework helps CISOs and AppSec leaders verify their software supply chain security.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2023/12/OSCAR-Captions.mp4</video:content_loc>
			<video:duration>40</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2023/12/oscar-blog-featured-image.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/will/'>William Penfield</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/bridging-the-gap-uniting-development-and-appsec/</loc>
		<video:video>
			<video:title><![CDATA[Bridging the Gap: Uniting Development and AppSec | OX Security]]></video:title>
			<video:publication_date>2024-04-26T16:05:39+00:00</video:publication_date>
			<video:description><![CDATA[Tips from experts how to integrate development and security functions to increase organizational resilience]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/SHn6-bTFT38</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/04/shn6-btft38.jpg</video:thumbnail_loc>
			<video:duration>5372</video:duration>
			<video:view_count>54</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[Development and Security Alignment]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/melissa/'>Melissa Goldberger</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/unlocking-a-new-era-in-application-security-with-ox-securitys-attack-path-reachability-analysis/</loc>
		<video:video>
			<video:title><![CDATA[Unlocking a New Era in Application Security with OX Security's Attack Path Reachability Analysis | OX Security]]></video:title>
			<video:publication_date>2024-05-07T13:55:43+00:00</video:publication_date>
			<video:description><![CDATA[Discover how OX's proactive application security solution, featuring Attack Path Reachability Analysis, revolutionizes AppSec by prioritizing risks and empowering collaboration. Stay ahead of threats with actionable insights.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/05/attack_path_cta_-_captions_and_opening.mp4</video:content_loc>
			<video:duration>45</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/05/2-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/will/'>William Penfield</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/effective-incident-response/</loc>
		<video:video>
			<video:title><![CDATA[Effective Incident Response: David Cross’s Cybersecurity Playbook for Executives | OX Security]]></video:title>
			<video:publication_date>2024-05-13T00:07:25+00:00</video:publication_date>
			<video:description><![CDATA[In this episode of CyberOXtales Podcast, host Neatsun Ziv, CEO of Ox Security, interviews David B. Cross, CISO for the Oracle SaaS Cloud and Venture Partner with Rain Capital VC. They discuss the importance of having a playbook for handling data breaches and security incidents.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/lDRBmhWzX1Q</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/05/ldrbmhwzx1q.jpg</video:thumbnail_loc>
			<video:duration>1829</video:duration>
			<video:view_count>75</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Effective Incident Response]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/elad_acomediagroup-com/'>ea-cmg</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/decoding-security-frameworks-vs-actual-security-avishai-avivis-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Decoding Security Frameworks vs. Actual Security: Avishai Avivi’s Cybersecurity Playbook for Executives | OX Security]]></video:title>
			<video:publication_date>2024-06-25T21:24:32+00:00</video:publication_date>
			<video:description><![CDATA[In this episode of CyberOXtales Podcast, host Neatsun Ziv, Co-Founder and CEO of OX Security, interviews Avishai Avivi, cybersecurity expert and CISO of SafeBreach. They discuss the intricacies of security frameworks versus actual security practices. Avishai shares his insights on the importance of focusing on security over compliance, highlighting the discrepancies between regulations and real security needs.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/1wcF1X7kpao</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/06/1wcf1x7kpao.jpg</video:thumbnail_loc>
			<video:duration>1565</video:duration>
			<video:view_count>43</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/melissa/'>Melissa Goldberger</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/communicating-near-hit-incidents-to-stakeholders-tyson-kopczynskis-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Communicating Near Hit Incidents to Stakeholders: Tyson Kopczynski’s Cybersecurity Playbook for Executives | OX Security]]></video:title>
			<video:publication_date>2024-09-18T18:39:29+00:00</video:publication_date>
			<video:description><![CDATA[In this episode of CyberOXtales Podcast, host Neatsun Ziv, Co-Founder and CEO of OX Security, interviews Avishai Avivi, cybersecurity expert and CISO of SafeBreach. They discuss the intricacies of security frameworks versus actual security practices. Avishai shares his insights on the importance of focusing on security over compliance, highlighting the discrepancies between regulations and real security needs.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/V0Ux2RxbdK0</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/09/v0ux2rxbdk0.jpg</video:thumbnail_loc>
			<video:duration>1512</video:duration>
			<video:view_count>43</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/obtaining-security-budgets-you-need/</loc>
		<video:video>
			<video:title><![CDATA[Podcast: Obtaining Security Budgets You Need | OX Security]]></video:title>
			<video:publication_date>2024-05-15T00:05:45+00:00</video:publication_date>
			<video:description><![CDATA[In this episode of CyberOXtales Podcast, host Neatsun Ziv, CEO and Co-Founder of OX Security, interviews Ira Winkler, CISO and Vice President of CYE. They discuss the challenges faced by CISOs in obtaining the necessary budgets for their cybersecurity programs.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/bAHYfg_7PEI</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/05/bahyfg_7pei.jpg</video:thumbnail_loc>
			<video:duration>1537</video:duration>
			<video:view_count>73</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/elad_acomediagroup-com/'>ea-cmg</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/demystifying-attack-path-analysis-in-application-security-benefits-implementation-and-considerations-part-one/</loc>
		<video:video>
			<video:title><![CDATA[Demystifying Attack Path Analysis in Application Security: Benefits, Implementation, and Considerations | OX Security]]></video:title>
			<video:publication_date>2024-05-09T12:31:11+00:00</video:publication_date>
			<video:description><![CDATA[Dive into attack path analysis, optimizing security strategies for resilient software supply chains. Stay tuned for more insights.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Analysis-Blog-Video.mp4</video:content_loc>
			<video:duration>54</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/05/Attack-Path-Blog-Part-One-Featured-Graphic.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/melissa/'>Melissa Goldberger</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/building-a-culture-of-security-sam-rehmans-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Building a Culture of Security: Sam Rehman’s Playbook for Executives | OX Security]]></video:title>
			<video:publication_date>2025-01-29T14:55:27+00:00</video:publication_date>
			<video:description><![CDATA[Tune into the latest CyberOXtales Podcast as Neatsun Ziv, CEO of OX Security, talks with Sam Rehman, Global CISO at EPAM, about the evolving role of CISOs, secrets management, and building a strong security culture. Listen now!]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/bt9vTHlJzBQ</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/01/bt9vthljzbq.jpg</video:thumbnail_loc>
			<video:duration>1777</video:duration>
			<video:view_count>2006</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/crush-testing-cursor-does-coding-on-autopilot-mean-security-on-standby/</loc>
		<video:video>
			<video:title><![CDATA[Crush Testing Cursor: Does Coding on Autopilot Mean Security on Standby]]></video:title>
			<video:publication_date>2025-04-03T10:41:30+00:00</video:publication_date>
			<video:description><![CDATA[Can AI tools like Cursor code securely? We ran five real-world security tests on Cursor to reveal how AI coding platforms handle vulnerabilities and risks.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/04/wiki.mp4</video:content_loc>
			<video:duration>31</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/04/cursor-blog-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/tomer-katzir/'>Tomer Katzir</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/how-to-align-infosec-to-business-operations-sam-currys-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Podcast: How to Align Infosec to Business Operations| OX Security]]></video:title>
			<video:publication_date>2024-07-23T14:12:12+00:00</video:publication_date>
			<video:description><![CDATA[Sam Curry's cybersecurity playbook on aligning InfoSec with business operations to enhance security, efficiency &amp; executive decision-making.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/6xow_K4wfDM</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/07/6xow_k4wfdm.jpg</video:thumbnail_loc>
			<video:duration>1729</video:duration>
			<video:view_count>50</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/unpacking-log4j/</loc>
		<video:video>
			<video:title><![CDATA[Unpacking Log4j - Amy Chaney's Cybersecurity Playbook for Executives | OX Security]]></video:title>
			<video:publication_date>2024-05-13T00:09:53+00:00</video:publication_date>
			<video:description><![CDATA[In this episode of CyberOXtales Podcast, host Neatsun Ziv, CEO of Ox Security, interviews Amy Chaney, a financial services senior risk executive, about her experience handling the log4j vulnerability event while working at JPMorgan Chase and Company.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/h5UJefuY7NQ</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/05/h5ujefuy7nq.jpg</video:thumbnail_loc>
			<video:duration>1661</video:duration>
			<video:view_count>90</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Log4j]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/elad_acomediagroup-com/'>ea-cmg</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-science-behind-alert-fatigue-in-security-teams-how-to-beat-it/</loc>
		<video:video>
			<video:title><![CDATA[The Science Behind Alert Fatigue in Security Teams: How to Beat It | OX Security]]></video:title>
			<video:publication_date>2025-04-24T14:33:13+00:00</video:publication_date>
			<video:player_loc>https://www.youtube.com/embed/YdC1RXJWLBE</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/04/ydc1rxjwlbe.jpg</video:thumbnail_loc>
			<video:duration>3647</video:duration>
			<video:view_count>148</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/ox-security/'>OX Security</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/codes-covert-threat-unveiling-secrets-and-personally-identifiable-information/</loc>
		<video:video>
			<video:title><![CDATA[Code's Covert Threat: Unveiling Secrets and PII | OX Security]]></video:title>
			<video:publication_date>2023-12-20T14:10:31+00:00</video:publication_date>
			<video:description><![CDATA[Explore "Code's Covert Threat: UnveilinExplore "Code's Covert Threat: Unveiling Secrets and PII" to grasp the risks of embedding secrets and PII in your code.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-and-PII-Social.mp4</video:content_loc>
			<video:duration>53</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2023/12/Secrets-Blog-Featured-Image.png</video:thumbnail_loc>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Secrets Management]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/boaz/'>Boaz Barzel</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/building-a-risk-narrative-gary-hayslips-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Building a Risk Narrative: Cybersecurity Insights from Gary Hayslip on CyberOXtales]]></video:title>
			<video:publication_date>2025-05-21T09:04:22+00:00</video:publication_date>
			<video:description><![CDATA[Gary Hayslip shares how CISOs can use storytelling to align strategy, operations, and boardroom impact in this episode of CyberOXtales with Neatsun Ziv.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/wakbuCTmYSg</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/05/wakbuctmysg.jpg</video:thumbnail_loc>
			<video:duration>1498</video:duration>
			<video:view_count>100</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/confirmed-critical-the-grafana-ghost-exposes-36-of-public-facing-instances-to-malicious-account-takeover/</loc>
		<video:video>
			<video:title><![CDATA[Confirmed Critical | “The Grafana Ghost” exposes 36% of public-facing instances to malicious account takeover | OX Security]]></video:title>
			<video:publication_date>2025-06-15T13:53:17+00:00</video:publication_date>
			<video:description><![CDATA[More than 95% of Application Security alerts are just noise - as demonstrated by OX Security research. But CVE-2025-4123 - “The Grafana Ghost”, as we will refer to, is not one of them. This newly discovered vulnerability is a rare case that demands attention, time, and resources from security teams.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/06/grafana-poc-0.5.mkv</video:content_loc>
			<video:duration>101</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/06/ניר-ומשה-בלוכ.png</video:thumbnail_loc>
			<video:tag><![CDATA[CVE]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/home-page/</loc>
		<video:video>
			<video:title><![CDATA[#1 Application Security Software | OX Security]]></video:title>
			<video:publication_date>2022-09-18T15:06:53+00:00</video:publication_date>
			<video:description><![CDATA[Scale your AppSec with continuous scanning and analysis of software vulnerabilities — OX's Application Security.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/10/last-09102024.mp4</video:content_loc>
			<video:duration>44</video:duration>
			<video:width>822</video:width>
			<video:height>700</video:height>
			<video:thumbnail_loc>https://www.ox.security</video:thumbnail_loc>
			<video:tag><![CDATA[Application Security Posture Management]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/boaz/'>Boaz Barzel</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/mitigating-the-risks-of-transitive-vulnerabilities-in-appsec/</loc>
		<video:video>
			<video:title><![CDATA[Will We Survive The Transitive Vulnerability Locusts | OX Security]]></video:title>
			<video:publication_date>2024-08-09T12:04:06+00:00</video:publication_date>
			<video:description><![CDATA[Understanding different behaviors of vulnerabilities and implementing a risk calculation will help decrease the possibility of exploitation. The battle against transitive vulnerabilities is ongoing and requires a combination of careful analysis, automated tools, and a mature security culture.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/08/Untitled-design.mp4</video:content_loc>
			<video:duration>43</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/08/Locust-Blog-Social-Assets-1200x627-1-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/eyalox-security/'>Eyal Paz</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/how-to-avoid-reckless-adoption-of-ai-assisted-development-what-every-team-needs-to-know/</loc>
		<video:video>
			<video:title><![CDATA[How to Avoid Reckless Adoption of AI-Assisted Development: What Every Team Needs to Know | OX Security Avoiding AI Code Pitfalls: What Dev Teams Must Know]]></video:title>
			<video:publication_date>2025-06-30T08:50:27+00:00</video:publication_date>
			<video:description><![CDATA[Learn how to safely adopt AI coding tools—avoid security risks, review fatigue, and poor code quality with expert insights.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/-c4IdIqV3Dk</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/06/c4idiqv3dk.jpg</video:thumbnail_loc>
			<video:duration>3438</video:duration>
			<video:view_count>248</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/ox-security/'>OX Security</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/can-you-trust-that-verified-symbol-exploiting-ide-extensions-is-easier-than-it-should-be/</loc>
		<video:video>
			<video:title><![CDATA[Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be | OX Security Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be]]></video:title>
			<video:publication_date>2025-07-01T13:02:06+00:00</video:publication_date>
			<video:description><![CDATA[OX Security reveals how even “verified” IDE extensions for VS Code, Visual Studio, IntelliJ, and Cursor can be tampered with to run malicious code. []]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/07/vscode-extension-poc-0.1.mkv</video:content_loc>
			<video:duration>35</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/07/Can-You-Trust-that-Verified-Symbol_-Exploiting-IDE-Extensions-is-Easier-Than-It-Should-Be.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/risk-rewired-samir-sherifs-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[Risk Rewired: Samir Sherif’s Cybersecurity Playbook for Executives | OX Security Cyber Resilience Playbook: Samir Sherif on SOC-NOC Integration]]></video:title>
			<video:publication_date>2025-07-22T12:28:31+00:00</video:publication_date>
			<video:description><![CDATA[Samir Sherif shares how AI, culture, and SOC-NOC fusion drive cyber resilience in this must-hear CyberOXtales episode.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/j7a11nH9SlQ</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/07/j7a11nh9slq.jpg</video:thumbnail_loc>
			<video:duration>1061</video:duration>
			<video:view_count>82</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-vibesec-manifesto/</loc>
		<video:video>
			<video:title><![CDATA[The VibeSec Manifesto: AI-First Code Security]]></video:title>
			<video:publication_date>2025-09-30T09:58:28+00:00</video:publication_date>
			<video:description><![CDATA[Read the VibeSec manifesto—why autonomous, AI-native security is the future of product protection.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/E8M6LA93peE</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/09/e8m6la93pee.jpg</video:thumbnail_loc>
			<video:duration>210</video:duration>
			<video:view_count>122860</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[AI]]></video:tag>
			<video:tag><![CDATA[AI Security]]></video:tag>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[VibeSec]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/neatsun/'>Neatsun Ziv</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/watch-the-cisos-dilemma-when-the-opposing-team-got-superpowers/</loc>
		<video:video>
			<video:title><![CDATA[Watch The CISO's Dilemma: When the Opposing Team Got Superpowers | OX Security]]></video:title>
			<video:publication_date>2025-11-06T14:04:16+00:00</video:publication_date>
			<video:description><![CDATA[Watch The CISO's Dilemma: When the Opposing Team Got Superpowers https://www.youtube.com/watch?v=05EwDxrGlrA]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/05EwDxrGlrA</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/11/05ewdxrglra.jpg</video:thumbnail_loc>
			<video:duration>1527</video:duration>
			<video:view_count>7</video:view_count>
			<video:width>480</video:width>
			<video:height>360</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/actionable-insights-in-an-ai-driven-world/</loc>
		<video:video>
			<video:title><![CDATA[Actionable Insights in an AI-Driven World | OX Security OX MCP Server: Smarter AI for AppSec Risk Reduction]]></video:title>
			<video:publication_date>2025-10-13T11:25:15+00:00</video:publication_date>
			<video:description><![CDATA[Securely connect AI tools to your AppSec data with OX MCP Server—turning raw security data into actionable, evidence-based insights.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/10/mcp_server-security-champion-1.mp4</video:content_loc>
			<video:duration>163</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/10/MCP.png</video:thumbnail_loc>
			<video:tag><![CDATA[AI]]></video:tag>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[IDE]]></video:tag>
			<video:tag><![CDATA[mcp]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[SCA]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[vulnerability management]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/ox-security/'>OX Security</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/stop-wasting-time-on-manual-sla-tracking/</loc>
		<video:video>
			<video:title><![CDATA[Stop Wasting Time on Manual SLA Tracking | OX Security Automated SLA Management for AppSec: Streamline Workflows &amp; Reduce Risk with OX Security]]></video:title>
			<video:publication_date>2025-05-05T18:06:27+00:00</video:publication_date>
			<video:description><![CDATA[Stop wasting time on manual tracking—OX Security’s automated SLA management boosts AppSec efficiency with real-time visibility, faster remediation, and better decisions.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/05/SLA-Product-Video.mp4</video:content_loc>
			<video:duration>162</video:duration>
			<video:width>3840</video:width>
			<video:height>2160</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/05/sla-tracking-blog.jpg</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[SLA]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/boaz/'>Boaz Barzel</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2024-6387-regresshion/</loc>
		<video:video>
			<video:title><![CDATA[A Playbook for Detecting the OpenSSH Vulnerability - CVE-2024-6387 - regreSSHion | OX Security]]></video:title>
			<video:publication_date>2024-07-01T21:09:55+00:00</video:publication_date>
			<video:description><![CDATA[Discover the latest "high" severity vulnerability in OpenSSH's server software (sshd) uncovered by the Qualys Threat Research Unit. This signal handler race condition vulnerability (CVE-2024-6387) poses a risk for remote unauthenticated code execution (RCE) on glibc-based Linux systems, potentially affecting 14 million servers.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/J3RLL2_dowA</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2024/07/j3rll2_dowa.jpg</video:thumbnail_loc>
			<video:duration>721</video:duration>
			<video:view_count>1021</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/ox-security/'>OX Security</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/from-risk-to-resilience-the-cisos-perspective-rohit-parchuris-cybersecurity-playbook-for-executives/</loc>
		<video:video>
			<video:title><![CDATA[From Risk to Resilience: Rohit Parchuri's Cybersecurity Playbook | OX Security]]></video:title>
			<video:publication_date>2025-02-19T15:15:37+00:00</video:publication_date>
			<video:description><![CDATA[​In this CyberOXtales episode, Yext CISO Rohit Parchuri discusses building a security culture &amp; aligning cybersecurity with business goals. ​]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/3JIQJ3yYd9Y</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/02/3jiqj3yyd9y.jpg</video:thumbnail_loc>
			<video:duration>1570</video:duration>
			<video:view_count>22762</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/webinar-cycognito-ox-content-download-video-deck-thank-you/</loc>
		<video:video>
			<video:title><![CDATA[Code to Exposure and Back Again: How AI-Powered Defenders Outpace AI-Driven Threats - Thank You | OX Security]]></video:title>
			<video:publication_date>2025-11-27T08:22:15+00:00</video:publication_date>
			<video:description><![CDATA[Full Recording https://www.youtube.com/watch?v=c4vLoXNXXQ0]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/c4vLoXNXXQ0</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/11/c4vloxnxxq0.jpg</video:thumbnail_loc>
			<video:duration>2998</video:duration>
			<video:view_count>14</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/dowload_content_webinar-cycognito-ox_video_slidedeck/</loc>
		<video:video>
			<video:title><![CDATA[Are AI App Builders Secure? We Tested Lovable, Base44 &amp; Bolt]]></video:title>
			<video:publication_date>2025-11-27T06:42:17+00:00</video:publication_date>
			<video:description><![CDATA[OX Security research reveals major security gaps in top AI app builders. See how Lovable, Base44 &amp; Bolt fared—and what it means for non-tech users.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/11/riverside_shaykulud__the-second-coming_trial_run-for-vibse.mp4</video:content_loc>
			<video:duration>62</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security</video:thumbnail_loc>
			<video:tag><![CDATA[AppSec Race]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/94-vulnerabilities-in-cursor-and-windsurf-put-1-8m-developers-at-risk/</loc>
		<video:video>
			<video:title><![CDATA[Forked and Forgotten: 94 Vulnerabilities in Cursor and Windsurf Put 1.8M Developers at Risk | OX Security Forked and Forgotten: 94 Chromium Flaws Expose 1.8M Devs in Cursor &amp; Windsurf]]></video:title>
			<video:publication_date>2025-10-21T19:00:00+00:00</video:publication_date>
			<video:description><![CDATA[Outdated Chromium in Cursor &amp; Windsurf exposes 1.8M developers to 94 CVEs—just one has been weaponized in this critical supply chain attack.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/10/chromium-cursor-poc-0.2.mp4</video:content_loc>
			<video:duration>60</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/10/Cursor-Windsurf.png</video:thumbnail_loc>
			<video:tag><![CDATA[AI]]></video:tag>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[CURSOR]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[VIBE CODING]]></video:tag>
			<video:tag><![CDATA[VibeSec]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/reacts-cve-2025-55182-is-now-actively-exploitable-verified-poc/</loc>
		<video:video>
			<video:title><![CDATA[React’s CVE-2025-55182 Is Now Actively Exploitable: Verified PoC | OX Security]]></video:title>
			<video:publication_date>2025-12-05T09:15:54+00:00</video:publication_date>
			<video:description><![CDATA[A verified PoC for React CVE-2025-55182 shows active RCE exploit in Next.js 16.0.6. Millions of apps at risk.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/12/react-next-poc.mp4</video:content_loc>
			<video:duration>18</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/12/alert-1-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/two-clicks-to-1m-how-attackers-can-drain-enterprise-budgets-through-ai-platforms/</loc>
		<video:video>
			<video:title><![CDATA[Cursor &amp; Bedrock Flaws Let Attackers Drain $1M+ in AI Spend]]></video:title>
			<video:publication_date>2025-12-09T10:50:51+00:00</video:publication_date>
			<video:description><![CDATA[Non-admins can raise AI spend limits to $1M+. Learn how Cursor and AWS Bedrock expose enterprises to silent, massive financial risks.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/12/poc-token.mp4</video:content_loc>
			<video:duration>55</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/12/Group-1261153676.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/mustafa-naamnih/'>Mustafa Naamnih</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/poc-exploiting-mongobleed-cve-2025-14847-technical-walkthrough/</loc>
		<video:video>
			<video:title><![CDATA[PoC: Exploiting MongoBleed, CVE-2025-14847 | Technical Walkthrough | OX Security]]></video:title>
			<video:publication_date>2025-12-29T20:05:16+00:00</video:publication_date>
			<video:description><![CDATA[Technical walkthrough of MongoBleed (CVE-2025-14847) exploitation. Learn how attackers abuse OP_COMPRESSED to leak MongoDB memory without authentication]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2025/12/OX.Platform.Demo.Video.homepage.mp4</video:content_loc>
			<video:duration>146</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/12/MongoBleed-1.png</video:thumbnail_loc>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[MongoBleed CVE-2025-14847]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/podcasts/clawdbot-moltbot-openclaw-oh-my-jim-manico-on-the-wild-ride-of-the-agentic-internet/</loc>
		<video:video>
			<video:title><![CDATA[Jim Manico: Securing OpenClaw and the Vibe Coding Revolution]]></video:title>
			<video:publication_date>2026-02-05T15:16:39+00:00</video:publication_date>
			<video:description><![CDATA[Legendary AppSec educator Jim Manico joins Neatsun Ziv to tackle the "Wild West" of OpenClaw, Vibe Coding, and how to safely secure autonomous AI agents.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/el1ZSxfSOV8</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/el1zsxfsov8.jpg</video:thumbnail_loc>
			<video:duration>1537</video:duration>
			<video:view_count>100</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/shayna/'>Shayna Orman</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65716-markdown-preview-enhanced-vscode-vulnerability/</loc>
		<video:video>
			<video:title><![CDATA[CVE-2025-65716: Markdown Preview Enhanced Vulnerability]]></video:title>
			<video:publication_date>2026-02-17T12:34:14+00:00</video:publication_date>
			<video:description><![CDATA[Technical analysis of CVE-2025-65716 Markdown Preview Enhanced vulnerability allows JavaScript execution in VS Code]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/XPTNZbfXexk</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/xptnzbfxexk.jpg</video:thumbnail_loc>
			<video:duration>27</video:duration>
			<video:view_count>350</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[IDE Security]]></video:tag>
			<video:tag><![CDATA[Localhost Exploitation]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[CVE-2025-65716 Markdown Preview Enhanced vulnerability Technical analysis of]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65715-code-runner-vscode-rce/</loc>
		<video:video>
			<video:title><![CDATA[CVE-2025-65715: Code Runner VS Code RCE Vulnerability]]></video:title>
			<video:publication_date>2026-02-17T12:35:22+00:00</video:publication_date>
			<video:description><![CDATA[Technical Analysis of CVE-2025-65715: high-severity vulnerability in the Code Runner VS Code extension that enables remote code execution]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/v9rf6VEveYA</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/v9rf6veveya.jpg</video:thumbnail_loc>
			<video:duration>31</video:duration>
			<video:view_count>213</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Remote Code Execution]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[CVE-2025-65715 Code Runner vulnerability Technical Analysis]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-65717-live-server-vscode-vulnerability/</loc>
		<video:video>
			<video:title><![CDATA[CVE-2025-65717: Live Server VS Code Extension Vulnerability]]></video:title>
			<video:publication_date>2026-02-17T12:34:56+00:00</video:publication_date>
			<video:description><![CDATA[Technical Analysis of CVE-2025-65717, a critical vulnerability in the Live Server VS Code extension allowing remote file exfiltration]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/H8Osp1ts5vI</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/h8osp1ts5vi.jpg</video:thumbnail_loc>
			<video:duration>24</video:duration>
			<video:view_count>889</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[IDE Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[CVE-2025-65717 Live Server vulnerability]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/freescout-rce-cve-2026-27636/</loc>
		<video:video>
			<video:title><![CDATA[FreeScout RCE (CVE-2026-27636) Enables Server Takeover]]></video:title>
			<video:publication_date>2026-02-25T16:13:01+00:00</video:publication_date>
			<video:description><![CDATA[FreeScout RCE vulnerability (CVE-2026-27636) lets authenticated attackers overwrite sensitive configuration files, enabling remote code execution and full server compromise.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/scaIGkDc29g</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/scaigkdc29g.jpg</video:thumbnail_loc>
			<video:duration>122</video:duration>
			<video:view_count>125</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[CVE-2026-27636 FreeScout]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/attack-path-reachability-analysis/</loc>
		<video:video>
			<video:title><![CDATA[Attack Path Reachability Analysis | OX Security]]></video:title>
			<video:publication_date>2024-05-02T15:52:01+00:00</video:publication_date>
			<video:description><![CDATA[View security from an adversary's perspective, by turning strategic insights into actions that prioritize critical reachable issues over hygiene issues.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/05/attack_path_cta_-_captions_and_opening-1.mp4</video:content_loc>
			<video:duration>45</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security</video:thumbnail_loc>
			<video:tag><![CDATA[Attack Path Reachability Anlysis]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/melissa/'>Melissa Goldberger</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/freescout-rce-cve-2026-28289/</loc>
		<video:video>
			<video:title><![CDATA[FreeScout Zero-Click RCE (CVE-2026-28289) – Patch Bypass]]></video:title>
			<video:publication_date>2026-03-03T18:23:23+00:00</video:publication_date>
			<video:description><![CDATA[CVE-2026-28289, a Zero-Click unauthenticated RCE in FreeScout via crafted email. All versions ≤1.8.206 affected. Patch immediately.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/9T_ybp7pZr8</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/03/9t_ybp7pzr8.jpg</video:thumbnail_loc>
			<video:duration>222</video:duration>
			<video:view_count>491</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[FreeScout RCE CVE-2026-28289 CVE-2026-28289 FreeScout RCE vulnerability FreeScout patch bypass Unauthenticated RCE FreeScout]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/xssinlivepreview/</loc>
		<video:video>
			<video:title><![CDATA[XSS Vulnerability in Microsoft VS Code Live Preview Extension]]></video:title>
			<video:publication_date>2026-01-14T09:36:03+00:00</video:publication_date>
			<video:description><![CDATA[Critical XSS vulnerability discovered in Microsoft's Live Preview VS Code extension with 11M+ downloads. Full technical analysis and POC.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/wQg6e_C82nU</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/01/wqg6e_c82nu.jpg</video:thumbnail_loc>
			<video:duration>27</video:duration>
			<video:view_count>157</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[XSS Live Preview VS Code]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/cve-2025-11158/</loc>
		<video:video>
			<video:title><![CDATA[CVE-2025-11158: Critical RCE in Pentaho Puts Enterprises at Risk]]></video:title>
			<video:publication_date>2026-03-10T12:58:20+00:00</video:publication_date>
			<video:description><![CDATA[Critical zero-day RCE vulnerability in Pentaho (CVE-2025-11158) affecting all versions up to 10.2.0.6. 2,600+ exposed instances. Patch now.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/RU74APUlRWI</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/03/ru74apulrwi.jpg</video:thumbnail_loc>
			<video:duration>66</video:duration>
			<video:view_count>81</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[CVE-2025-11158 Pentaho remote code execution Pentaho zero-day vulnerability Pentaho RCE]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/nir-zadok/'>Nir Zadok</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/four-vulnerabilities-expose-a-massive-security-blind-spot-in-ide-extensions/</loc>
		<video:video>
			<video:title><![CDATA[IDE Extension Vulnerabilities Expose Massive Security Blind Spot]]></video:title>
			<video:publication_date>2026-02-17T13:37:58+00:00</video:publication_date>
			<video:description><![CDATA[New research uncovers critical flaws in widely used IDE (120M+ installs), allowing code execution, data theft, and full system compromise]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/xhx-dCfPf9U</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/02/xhx-dcfpf9u.jpg</video:thumbnail_loc>
			<video:duration>250</video:duration>
			<video:view_count>966</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[CVE-2025-65715 CVE-2025-65716 CVE-2025-65717 IDE extension vulnerabilities VS Code security code runner developer environment security supply chain security risk]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations/</loc>
		<video:video>
			<video:title><![CDATA[Malicious Chrome Extensions Steal ChatGPT Conversations]]></video:title>
			<video:publication_date>2025-12-30T11:08:03+00:00</video:publication_date>
			<video:description><![CDATA[OX Security discovered malicious Chrome extensions stealing ChatGPT and DeepSeek conversations from 900K users. One received Google's Featured badge.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/A79PeC_SNPI</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2025/12/a79pec_snpi.jpg</video:thumbnail_loc>
			<video:duration>151</video:duration>
			<video:view_count>6331</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[malicious Chrome extensions steal ChatGPT conversations]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/one-step-away-from-a-massive-data-breach-what-we-found-inside-moltbot/</loc>
		<video:video>
			<video:title><![CDATA[One Step Away From a Massive MoltBot Data Breach]]></video:title>
			<video:publication_date>2026-01-29T15:36:24+00:00</video:publication_date>
			<video:description><![CDATA[MoltBot (OpenClaw) flaws expose 300k+ users: cleartext credentials, supply chain risks, and insecure code patterns discovered by OX Security.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/X_6vzs4LIuQ</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/01/x_6vzs4liuq.jpg</video:thumbnail_loc>
			<video:duration>260</video:duration>
			<video:view_count>423</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[MoltBot security]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/eliminate-the-need-to-revisit-old-code-and-workflows-use-case/</loc>
		<video:video>
			<video:title><![CDATA[Eliminate the Need to Revisit Old Code and Workflows | OX Security]]></video:title>
			<video:publication_date>2024-10-16T11:18:39+00:00</video:publication_date>
			<video:description><![CDATA[Incorporate developers into the security cycle earlier than ever. With a 97% reduction in false positives and actionable remediation guidance, OX ensures accurate security issue identification without slowing development]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2024/10/Comp-1-2.mp4</video:content_loc>
			<video:duration>6</video:duration>
			<video:width>986</video:width>
			<video:height>554</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/meta-AP-Dev-Empowerment.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/jasmin/'>Jasmin Siloni</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-technical-deep-dive/</loc>
		<video:video>
			<video:title><![CDATA[The Mother of All AI Supply Chains: Technical Deep Dive | OX Security]]></video:title>
			<video:publication_date>2026-04-15T11:00:00+00:00</video:publication_date>
			<video:description><![CDATA[OX Research found a design flaw in Anthropic's MCP that enables arbitrary command execution. How does it work?]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/l_IMS-oLPCo</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/l_ims-olpco.jpg</video:thumbnail_loc>
			<video:duration>29</video:duration>
			<video:view_count>349</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[MCP STDIO vulnerability Anthropic MCP arbitrary command execution modelcontextprotocol security flaw MCP input sanitization vulnerability StdioServerParameters exploit]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-cloud/</loc>
		<video:video>
			<video:title><![CDATA[OX Security | OX Agentic Pentester - Closed Loop Agentic Attack Simulation]]></video:title>
			<video:publication_date>2026-03-22T15:35:11+00:00</video:publication_date>
			<video:description><![CDATA[Close the loop on AppSec with agentic pen testing that identifies and mitigates exploitable risks resulting from unseen issues in your code or deployments.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/03/OX.Platform.Long.homepage-1.mp4</video:content_loc>
			<video:duration>146</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Cloud.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-code/</loc>
		<video:video>
			<video:title><![CDATA[OX Security | OX Agentic Pentester - Closed Loop Agentic Attack Simulation]]></video:title>
			<video:publication_date>2026-03-22T14:32:09+00:00</video:publication_date>
			<video:description><![CDATA[Close the loop on AppSec with agentic pen testing that identifies and mitigates exploitable risks resulting from unseen issues in your code or deployments.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/03/OX.Platform.Long.homepage-1.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Code.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-agentic-pentester/</loc>
		<video:video>
			<video:title><![CDATA[OX Security | OX Agentic Pentester - Closed Loop Agentic Attack Simulation]]></video:title>
			<video:publication_date>2026-03-10T18:54:53+00:00</video:publication_date>
			<video:description><![CDATA[Close the loop on AppSec with agentic pen testing that identifies and mitigates exploitable risks resulting from unseen issues in your code or deployments.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/03/Agentic.Pentester.Walkthru.webm</video:content_loc>
			<video:duration>103</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/meta-OX-Agentic-Pentester.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/vercel-context-ai-supply-chain-attack-breachforums/</loc>
		<video:video>
			<video:title><![CDATA[Vercel Breached via Context AI Supply Chain Attack]]></video:title>
			<video:publication_date>2026-04-20T15:01:03+00:00</video:publication_date>
			<video:description><![CDATA[A compromised Context AI employee triggered a supply chain attack on Vercel, exposing internal environment variables and a database access key now being sold on BreachForums for $2M. Here's what happened and how to remediate.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/04/Supply-Chain-Attack-Hits-Vercel_-User-Data-Being-Sold-on-BreachForums-For-2M-shorts-cybersecurity.mp4</video:content_loc>
			<video:duration>282</video:duration>
			<video:width>720</video:width>
			<video:height>900</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/Vercel.png</video:thumbnail_loc>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[Vercel supply chain attack]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/xinference-allegedly-hacked-by-teampcp-malicious-package-in-pypi/</loc>
		<video:video>
			<video:title><![CDATA[Xinference allegedly hacked by TeamPCP, Malicious Package In PyPi | OX Security]]></video:title>
			<video:publication_date>2026-04-22T15:18:54+00:00</video:publication_date>
			<video:description><![CDATA[Xinference hit by TeamPCP supply chain attack. Malicious PyPI versions v2.6.0–2.6.2 exfiltrate secrets and credentials. Secure your AI infrastructure with OX Security.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/04/⚠️-Xinference-allegedly-hacked-by-TeamPCP-Malicious-Package-In-PyPi-shorts-cybersecurity.mp4</video:content_loc>
			<video:duration>223</video:duration>
			<video:width>720</video:width>
			<video:height>900</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/Incident-template-download-as-png-4.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-cycode/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Cycode | OX Security]]></video:title>
			<video:publication_date>2026-03-30T07:21:08+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Cycode. OX prevents risk at creation with code-to-cloud context, moving beyond Cycode’s reactive ASPM detection and correlation.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Cycode-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-veracode/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Veracode | OX Security]]></video:title>
			<video:publication_date>2026-03-26T18:36:34+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Veracode. OX prevents risk at creation with unified runtime context, moving beyond Veracode’s scanner-centric, reactive detection.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Veracode-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-checkmarx/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Checkmarx | OX Security]]></video:title>
			<video:publication_date>2026-03-26T12:23:20+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Checkmarx. OX prevents risk at creation with unified runtime context, moving beyond Checkmarx’s scanner-centric static analysis.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Checkmarx-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-snyk/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Snyk | OX Security]]></video:title>
			<video:publication_date>2026-03-26T07:38:19+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Snyk. OX prevents risk at creation with unified runtime context, moving beyond Snyk’s developer-first, reactive scanning.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Snyk-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-aikido/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Aikido | OX Security]]></video:title>
			<video:publication_date>2026-03-26T20:20:02+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Aikido. OX prevents risk at creation with enterprise-grade context, moving beyond Aikido’s simplified, reactive detection.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Aikido-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/ox-vs-black-duck/</loc>
		<video:video>
			<video:title><![CDATA[OX vs Black Duck | OX Security]]></video:title>
			<video:publication_date>2026-03-26T18:41:37+00:00</video:publication_date>
			<video:description><![CDATA[Compare OX Security vs Black Duck. OX prevents risk at creation with unified runtime visibility, moving beyond Black Duck’s reactive SCA for open-source.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/02/YTDown.com_YouTube_Swisscom-s-Historic-Security-Milestone-w_Media_NPq-KB6cPPQ_001_1080p-online-video-cutter.com.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-VS-Black-Duck-1.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/flowise-cve-2026-40933-upsonic-cve-2026-30625-what-to-do-when-best-practice-isnt-enough/</loc>
		<video:video>
			<video:title><![CDATA[The MCP Supply Chain Flaw in Flowise &amp; Upsonic]]></video:title>
			<video:publication_date>2026-04-27T19:20:43+00:00</video:publication_date>
			<video:description><![CDATA[Learn how the MCP STDIO vulnerability allows RCE bypasses despite input sanitization, and how to harden your AI infrastructure.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/YjzlTfEa3Eg</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/yjzltfea3eg.jpg</video:thumbnail_loc>
			<video:duration>28</video:duration>
			<video:view_count>161</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[Application Security]]></video:tag>
			<video:tag><![CDATA[OX Security]]></video:tag>
			<video:tag><![CDATA[Software Supply Chain Security]]></video:tag>
			<video:tag><![CDATA[MCP supply chain vulnerability RCE exploit Flowise CVE-2026-40933 Upsonic CVE-2026-30625 AI architecture hardening input sanitization bypass]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/moshe-siman-tov-bustan/'>Moshe Siman Tov Bustan</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/customer-stories/</loc>
		<video:video>
			<video:title><![CDATA[Customer Stories | OX Security]]></video:title>
			<video:publication_date>2026-04-08T17:47:49+00:00</video:publication_date>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/03/ytdown_50k7JjOZ.mp4</video:content_loc>
			<video:thumbnail_loc>https://www.ox.security</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/blog/anthropic-mcp-vulnerability-ox-vibesec-ai-supply-chain/</loc>
		<video:video>
			<video:title><![CDATA[Anthropic MCP Vulnerability: How OX VibeSec Protects AI Code]]></video:title>
			<video:publication_date>2026-04-24T17:08:35+00:00</video:publication_date>
			<video:description><![CDATA[Learn how OX VibeSec protects against the Anthropic MCP vulnerability with layered defenses that stop insecure AI-generated code, prompt injection, and MCP supply chain risk.]]></video:description>
			<video:player_loc>https://www.youtube.com/embed/AstH1Li-cNQ</video:player_loc>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/asth1li-cnq.jpg</video:thumbnail_loc>
			<video:duration>129</video:duration>
			<video:view_count>47</video:view_count>
			<video:width>480</video:width>
			<video:height>270</video:height>
			<video:tag><![CDATA[AppSec]]></video:tag>
			<video:tag><![CDATA[DevSecOps]]></video:tag>
			<video:tag><![CDATA[Anthropic MCP vulnerability]]></video:tag>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/mustafa-naamnih/'>Mustafa Naamnih</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/customer-stories/doubleverify-gains-control-and-efficiency-with-ox-security/</loc>
		<video:video>
			<video:title><![CDATA[DoubleVerify Case Study: Eliminating Fragmented AppSec Tools | OX Security]]></video:title>
			<video:publication_date>2026-04-26T17:48:30+00:00</video:publication_date>
			<video:description><![CDATA[Discover how DoubleVerify gained a clear, prioritized view of its applications and accelerated remediation without manual work using the OX Security platform]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/04/OX-Appsec-Security-Ltd-x-Double-Verify-Captioned-1-online-video-cutter.com.mp4</video:content_loc>
			<video:duration>27</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/DV-image.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/</loc>
		<video:video>
			<video:title><![CDATA[Code-to-Cloud Security Starts at the Source | Ox Security]]></video:title>
			<video:publication_date>2026-03-09T11:08:17+00:00</video:publication_date>
			<video:description><![CDATA[Accelerate the transition to software that secures itself. OX Security pinpoints risk to the exact line of code, eliminating security debt from AI generation to cloud runtime.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/03/OX-Agentic-Pentester.homepage.final-1.webm</video:content_loc>
			<video:duration>20</video:duration>
			<video:width>1920</video:width>
			<video:height>1080</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/03/meta-HP.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
	<url>
		<loc>https://www.ox.security/customer-stories/how-kaltura-achieved-total-supply-chain-visibility-in-minutes/</loc>
		<video:video>
			<video:title><![CDATA[Kaltura Case Study: Total Supply Chain Visibility in 5 Minutes | OX Security]]></video:title>
			<video:publication_date>2026-04-22T13:33:19+00:00</video:publication_date>
			<video:description><![CDATA[See how Kaltura gained total supply chain visibility in 5 minutes and secured their software pipeline by replacing manual triage with the OX Platform.]]></video:description>
			<video:content_loc>https://www.ox.security/wp-content/uploads/2026/04/Case-Study_-From-Zero-Visibility-to-a-Fully-Secured-Supply-Chain_-Kalturas-Journey-with-OX-online-video-cutter.com-1.mp4</video:content_loc>
			<video:duration>15</video:duration>
			<video:width>1280</video:width>
			<video:height>720</video:height>
			<video:thumbnail_loc>https://www.ox.security/wp-content/uploads/2026/04/Group-1261154169.png</video:thumbnail_loc>
			<video:family_friendly>yes</video:family_friendly>
			<video:uploader info='https://www.ox.security/author/igorprocoders/'>Igor</video:uploader>
		</video:video>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->