<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.fox-it.com/2025/09/01/three-lazarus-rats-coming-for-your-cheese/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/79ac5-telegram-pyongyang2.jpg</image:loc><image:title>telegram-pyongyang</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/909ce-telegram-pyongyang.jpg</image:loc><image:title>telegram-pyongyang</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/29d30-romeogolf_ida_screenshot.png</image:loc><image:title>romeogolf_ida_screenshot</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/05b34-themeforest_ida_screenshot.png</image:loc><image:title>themeforest_ida_screenshot</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/66f90-sessionenv-perfhloader-overview.png</image:loc><image:title>sessionenv-perfhloader-overview</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/c9ce6-attack-overview.png</image:loc><image:title>attack-overview</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/b01c4-comparison-file-renaming.png</image:loc><image:title>comparison-file-renaming</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/346ab-comparison-status-codes-c2.png</image:loc><image:title>comparison-status-codes-c2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/efead-comparison-bot-id-generation-2.png</image:loc><image:title>comparison-bot-id-generation</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/df958-comparison-bot-id-generation-1.png</image:loc><image:title>comparison-bot-id-generation</image:title></image:image><lastmod>2026-05-21T19:29:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2024/09/25/red-teaming-in-the-age-of-edr-evasion-of-endpoint-detection-through-malware-virtualisation/</loc><lastmod>2026-05-21T09:48:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/12/07/encryption-does-not-equal-invisibility-detecting-anomalous-tls-certificates-with-the-half-space-trees-algorithm/</loc><lastmod>2026-05-07T17:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2024/12/11/decrypting-full-disk-encryption-with-dissect/</loc><lastmod>2024-12-05T14:38:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2024/04/25/sifting-through-the-spines-identifying-potential-cactus-ransomware-victims/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/bea58-top-20-countries-compromised-qlik-sense.png</image:loc><image:title>top-20-countries-compromised-qlik-sense</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/b9928-powershell-dir-listing-qle-fonts.png</image:loc><image:title>powershell-dir-listing-qle-fonts</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/eb337-top-20-countries-vulnerable-qlik-sense.png</image:loc><image:title>top-20-countries-vulnerable-qlik-sense</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/91047-qlik-sense-vuln-status.png</image:loc><image:title>qlik-sense-vuln-status</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/7107e-image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/b6a65-image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-04-25T04:56:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2024/03/28/android-malware-vultur-expands-its-wingspan/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3740b-542e4746fdf58bc882731fa490a99ed1867a4a95_14.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_14</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/9340e-542e4746fdf58bc882731fa490a99ed1867a4a95_13.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_13</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/dc025-542e4746fdf58bc882731fa490a99ed1867a4a95_12.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_12</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/f081a-542e4746fdf58bc882731fa490a99ed1867a4a95_11.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_11</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/d0869-542e4746fdf58bc882731fa490a99ed1867a4a95_10-1.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_10-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/f8cd9-image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ceec2-542e4746fdf58bc882731fa490a99ed1867a4a95_10.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_10</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/fc82b-542e4746fdf58bc882731fa490a99ed1867a4a95_9.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_9</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/25249-542e4746fdf58bc882731fa490a99ed1867a4a95_8.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_8</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/b4628-542e4746fdf58bc882731fa490a99ed1867a4a95_7.png</image:loc><image:title>542e4746fdf58bc882731fa490a99ed1867a4a95_7</image:title></image:image><lastmod>2024-03-28T10:00:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2024/01/25/memory-scanning-for-the-masses/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/be200-notepad_exe_attributes.png</image:loc><image:title>notepad_exe_attributes</image:title></image:image><lastmod>2024-01-26T11:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/12/14/reverse-reveal-recover-windows-defender-quarantine-forensics/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ba168-upload_193c111d8639e63369484615023e25e8.png</image:loc><image:title>upload_193c111d8639e63369484615023e25e8</image:title></image:image><lastmod>2023-12-14T14:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/11/15/the-spelling-police-searching-for-malicious-http-servers-by-identifying-typos-in-http-responses/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/a7dd1-9_new_content_length.png</image:loc><image:title>9_new_CONTENT_LENGTH</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4745f-7_new_contenttyle.png</image:loc><image:title>7_new_contenttyle</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ab277-6_new_apache64.png</image:loc><image:title>6_new_Apache64</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/8f631-5_new_ngengx.png</image:loc><image:title>5_new_ngengx</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3c545-4_new_microsoftiis.png</image:loc><image:title>4_new_microsoftiis</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/e0054-new-rr.png</image:loc><image:title>new-rr</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/de5c6-http-request-and-response-client-en-server-example.png</image:loc><image:title>HTTP-request-and-response-client-en-server-example</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/c22ca-microsoft-iis-1.png</image:loc><image:title>Microsoft-IIS-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/6d153-content_length.png</image:loc><image:title>CONTENT_LENGTH</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/e3b65-screenshot-content-tyle-landing-page.png</image:loc><image:title>Screenshot-Content-Tyle-landing-page</image:title></image:image><lastmod>2023-11-15T14:00:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/11/01/popping-blisters-for-research-an-overview-of-past-payloads-and-exploring-recent-developments/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/7bebe-blister_samples_overview.png</image:loc><image:title>blister_samples_overview</image:title></image:image><lastmod>2023-11-01T13:18:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/09/11/from-ermac-to-hook-investigating-the-technical-differences-between-two-android-malware-variants/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/6f5d0-image-36.png</image:loc><image:title>image-36</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/0eed1-image-35.png</image:loc><image:title>image-35</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/76311-image-34.png</image:loc><image:title>image-34</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4f99b-image-33.png</image:loc><image:title>image-33</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/568cc-image-32.png</image:loc><image:title>image-32</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/50b16-image-31.png</image:loc><image:title>image-31</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/f18cd-image-30.png</image:loc><image:title>image-30</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/77553-image-29.png</image:loc><image:title>image-29</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/28542-image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4fedd-image-27.png</image:loc><image:title>image-27</image:title></image:image><lastmod>2023-09-11T09:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/fb8d3-vulnerable-netscalers-1.png</image:loc><image:title>Vulnerable-NetScalers-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/1e2e2-known-backdoored-top-20-countries.png</image:loc><image:title>known-backdoored-top-20-countries</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/5204c-percentage-vuln-over-time-legend.png</image:loc><image:title>percentage-vuln-over-time-legend</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3db55-pie-chart-backdoor-on-patched-unpatched-systems.png</image:loc><image:title>pie-chart-backdoor-on-patched-unpatched-systems</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/555f2-compromised-netscalers.png</image:loc><image:title>Compromised-NetScalers</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/5aee0-vulnerable-netscalers.png</image:loc><image:title>Vulnerable-NetScalers</image:title></image:image><lastmod>2023-08-15T16:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/02/15/threat-spotlight-hydra/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/bd2b6-c2_countries.png</image:loc><image:title>c2_countries</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/c45a5-c2_api_mirrors.png</image:loc><image:title>c2_api_mirrors</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4086c-tor_libs.png</image:loc><image:title>tor_libs</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/81a7a-github_mirrors.png</image:loc><image:title>github_mirrors</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/eeb29-github_mirrors_code.png</image:loc><image:title>github_mirrors_code</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/d914d-decoded_mirrors_onion.png</image:loc><image:title>decoded_mirrors_onion</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3a0a0-send_stolen_credentials_and_cookies.png</image:loc><image:title>send_stolen_credentials_and_cookies</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/9cd59-steal_cookies_targets_last.png</image:loc><image:title>steal_cookies_targets_last</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/dd9b4-steal_cookies_targets_june.png</image:loc><image:title>steal_cookies_targets_june</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ebd68-screencast_start_call.png</image:loc><image:title>screencast_start_call</image:title></image:image><lastmod>2023-03-09T08:48:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2023/02/22/from-backup-to-backdoor-exploitation-of-cve-2022-36537-in-r1soft-server-backup-manager/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/11ba6-r1soft-backdoor-totals-2023-03-03.png</image:loc><image:title>r1soft-backdoor-totals-2023-03-03</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/0baa9-picture2.png</image:loc><image:title>Picture2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/a630b-picture1.png</image:loc><image:title>Picture1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/f4e64-mysql-jar-ziplisting.png</image:loc><image:title>mysql-jar-ziplisting</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/60037-r1soft-backdoors-by-org.png</image:loc><image:title>r1soft-backdoors-by-org</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/c2e57-r1soft-backdoors-by-country.png</image:loc></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4017d-r1soft-total-backdoors.png</image:loc><image:title>r1soft-total-backdoors</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/84c06-image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-03-03T17:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/209ae-update-adoption-1.png</image:loc><image:title>update-adoption-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/39557-top-versions-1.png</image:loc><image:title>top-versions-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/308dc-citrix-by-country-1.png</image:loc><image:title>citrix-by-country-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/58633-version_hash-1.png</image:loc><image:title>version_hash-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/94948-gist.png</image:loc><image:title>gist</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/850c2-target-fs.png</image:loc><image:title>target-fs</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/01c5c-update-adoption.png</image:loc><image:title>update-adoption</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/70014-citrix-by-country.png</image:loc><image:title>citrix-by-country</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/980bc-top-versions.png</image:loc><image:title>top-versions</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ce3d8-cloudshell.png</image:loc><image:title>cloudshell</image:title></image:image><lastmod>2022-12-29T15:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/12/12/one-year-since-log4shell-lessons-learned-for-the-next-code-red/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4c7d2-log4shell-timeline-1.png</image:loc><image:title>Log4Shell-Timeline-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/a28cd-log4shell-timeline.png</image:loc><image:title>Log4Shell-Timeline</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/16032-log4j7.png</image:loc><image:title>Log4j7</image:title></image:image><lastmod>2022-12-12T08:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/10/18/im-in-your-hypervisor-collecting-your-evidence/</loc><lastmod>2022-11-29T15:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/09/02/sharkbot-is-back-in-google-play/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/1e581-ats_config_example.png</image:loc><image:title>ats_config_example</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/69867-grabber_config_example.png</image:loc><image:title>grabber_config_example</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/fcaf4-grabber_config_start.png</image:loc><image:title>grabber_config_start</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/6a191-create_webview_logscookie.png</image:loc><image:title>create_webview_logsCookie</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/d5a80-get_webview_cookies-1.png</image:loc><image:title>get_webview_cookies-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3fd63-onpagefinished_send_cookies.png</image:loc><image:title>onPageFinished_send_cookies</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/e76f5-get_webview_cookies.png</image:loc><image:title>get_webview_cookies</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/c9fe8-logscookie_command.png</image:loc><image:title>logsCookie_command</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/3ba17-dga_v1_v2.png</image:loc><image:title>dga_v1_v2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/71271-ats_accept_permissions.png</image:loc><image:title>ats_accept_permissions</image:title></image:image><lastmod>2022-09-02T11:07:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/08/11/detecting-dns-implants-old-kitten-new-tricks-a-saitama-case-study/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/018ae-05_distribution.png</image:loc><image:title>05_distribution</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/615f6-04_transmission.png</image:loc><image:title>04_transmission</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/9bdbf-03_sleeptimes.png</image:loc><image:title>03_sleeptimes</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/49a81-02_determine_alphabet.png</image:loc><image:title>02_determine_alphabet</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ce2c1-01_int_to_string.png</image:loc><image:title>01_int_to_string</image:title></image:image><lastmod>2022-08-11T16:05:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/06/29/flubot-the-evolution-of-a-notorious-android-banking-malware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/57953-fedex_web.png</image:loc><image:title>fedex_web</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/51536-section1.png</image:loc><image:title>section1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/27e45-56_mms_rate.png</image:loc><image:title>56_MMS_RATE</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/90d09-56_get_mms.png</image:loc><image:title>56_GET_MMS</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/32db0-55_cookie_send.png</image:loc><image:title>55_cookie_send</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/db14e-55_cookie_stealing_gmail.png</image:loc><image:title>55_cookie_stealing_gmail</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/90804-55_get_injects_list_new.png</image:loc><image:title>55_GET_INJECTS_LIST_new</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/db1e8-54_get_notif_msg.png</image:loc><image:title>54_GET_NOTIF_MSG</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/0a99b-54_directreply_code.png</image:loc><image:title>54_directreply_code</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/f34a4-53_smishing_countries3.png</image:loc><image:title>53_smishing_countries3</image:title></image:image><lastmod>2022-06-30T09:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/04/29/adventures-in-the-land-of-bumblebee/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/27a6b-bumblebee_tasks.png</image:loc><image:title>Bumblebee_tasks</image:title></image:image><lastmod>2022-04-29T11:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2022/03/03/sharkbot-a-new-generation-android-banking-trojan-being-distributed-on-google-play-store/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/4e540-image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-03-03T19:23:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/12/14/log4j-jndi-be-gone-a-simple-mitigation-for-cve-2021-44228/</loc><lastmod>2021-12-16T12:36:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/12/12/log4shell-reconnaissance-and-post-exploitation-network-detection/</loc><lastmod>2021-12-16T11:46:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/12/02/tracking-a-p2p-network-related-to-ta505/</loc><lastmod>2021-12-02T09:34:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access/</loc><lastmod>2021-11-09T14:39:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/10/12/reverse-engineering-and-decrypting-cyberark-vault-credential-files/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/1d0b3-image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/0ac0f-image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/278f6-image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/85a7a-image.png</image:loc><image:title>image</image:title></image:image><lastmod>2021-10-12T07:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/10/11/snapmc-skips-ransomware-steals-data/</loc><lastmod>2021-10-11T19:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2021/05/04/rm3-curiosities-of-the-wildest-banking-malware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/30418-rm3_aes.png</image:loc><image:title>RM3_AES</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/fa770-rm3_hook_worker.png</image:loc><image:title>RM3_Hook_Worker</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/a1d89-rm3_msedge.png</image:loc><image:title>RM3_Msedge</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/154ad-rm3_serpent-1.png</image:loc><image:title>RM3_Serpent-1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/833cd-rm3_serpent.png</image:loc><image:title>RM3_Serpent</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/b3f8a-rm3_aes_code.png</image:loc><image:title>RM3_AES_Code</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/41c41-rm3_loading_inject.png</image:loc><image:title>RM3_Loading_Inject</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/38924-rm3_inject_sample.png</image:loc><image:title>RM3_Inject_Sample</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/ab727-rm3_ssl_proxy.png</image:loc><image:title>RM3_SSL_Proxy</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/55ca6-rm3_sqlite3_build.png</image:loc><image:title>RM3_SQLITE3_Build</image:title></image:image><lastmod>2021-05-04T18:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/11/16/ta505-a-brief-history-of-their-time/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2026/05/a4f95-getandgo-infection-chain.png</image:loc><image:title>GetandGo-Infection-Chain</image:title></image:image><lastmod>2020-11-26T11:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/11/11/decrypting-openssh-sessions-for-fun-and-profit/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/11/ssh_frame.png</image:loc><image:title>ssh_frame</image:title></image:image><lastmod>2020-11-11T10:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/09/10/streamdivert-relaying-specific-network-connections/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/08/copy-of-streamdivert-4-1.png</image:loc><image:title>Copy-of-streamdivert-4</image:title></image:image><lastmod>2020-09-10T09:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/09/02/machine-learning-from-idea-to-reality-a-powershell-case-study/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/08/small.png</image:loc><image:title>small</image:title></image:image><lastmod>2020-09-02T07:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/01/ntlmrelay_final.png</image:loc><image:title>ntlmrelay_final</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/01/auth-proxies_fixed.png</image:loc><image:title>auth-proxies_fixed</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/01/ipconfig_fixed.png</image:loc><image:title>ipconfig_fixed</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/01/mitm6_cropped.png</image:loc><image:title>mitm6_cropped</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/01/dhcpv6_cropped.png</image:loc><image:title>dhcpv6_cropped</image:title></image:image><lastmod>2020-08-12T14:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/07/01/a-second-look-at-cve-2019-19781-citrix-netscaler-adc/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/07/microsoftteams-image-3.jpg</image:loc><image:title>MicrosoftTeams-image (3)</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/07/microsoftteams-image-2.jpg</image:loc><image:title>MicrosoftTeams-image (2)</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/07/microsoftteams-image-1.jpg</image:loc><image:title>MicrosoftTeams-image (1)</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/07/microsoftteams-image.jpg</image:loc><image:title>MicrosoftTeams-image</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/compromised-servers-patch-status-june.png</image:loc><image:title>Compromised Servers - Patch Status - June</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/compromised-servers-patch-status-jan.png</image:loc><image:title>Compromised Servers - Patch Status - Jan</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/compromised-servers-by-country-june.png</image:loc><image:title>Compromised Servers by Country - June</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/compromised-servers-by-country-jan.png</image:loc><image:title>Compromised Servers by Country - Jan</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/citrix-blog-images-25.png</image:loc><image:title>citrix-blog-images-25</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/citrix-blog-images-24.png</image:loc><image:title>citrix-blog-images-24</image:title></image:image><lastmod>2020-07-01T09:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/</loc><lastmod>2020-06-24T08:22:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure6.png</image:loc><image:title>figure6</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure5.png</image:loc><image:title>figure5</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure4.png</image:loc><image:title>figure4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure3.png</image:loc><image:title>figure3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure2.png</image:loc><image:title>figure2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/06/figure1.png</image:loc><image:title>figure1</image:title></image:image><lastmod>2020-06-02T14:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/11.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/10.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/8.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/9.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/03/3.png</image:loc><image:title>3</image:title></image:image><lastmod>2020-03-19T11:04:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/05/09/relaying-credentials-everywhere-with-ntlmrelayx/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/nbns_spoof.png</image:loc><image:title>NBNS_spoof</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/autologon.png</image:loc><image:title>autologon</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/relay_ntlm.png</image:loc><image:title>relay_ntlm</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/ntlm_auth.png</image:loc><image:title>ntlm_auth</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/http_relay.png</image:loc><image:title>http_relay</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/imap_relay.png</image:loc><image:title>imap_relay</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/ldapdump.png</image:loc><image:title>ldapdump</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/da_add.png</image:loc><image:title>da_add</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/ldd_by_group.png</image:loc><image:title>ldd_by_group</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/ldd_clean.png</image:loc><image:title>ldd_clean</image:title></image:image><lastmod>2020-03-09T13:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2020/01/15/hunting-for-beacons/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/01/blog-beaconing-img-2.png</image:loc><image:title>blog beaconing img 2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2020/01/blog-beaconing-img-1.png</image:loc><image:title>Blog beaconing img 1</image:title></image:image><lastmod>2020-01-15T12:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/10/16/detecting-random-filenames-using-unsupervised-machine-learning/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/10/fox-it-blog-detecting-random-filenames-04.png</image:loc><image:title>Fox-IT-Blog detecting random filenames-04</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/10/fox-it-blog-detecting-random-filenames-02.png</image:loc><image:title>Fox-IT-Blog detecting random filenames-02</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/10/fox-it-blog-detecting-random-filenames-01.png</image:loc><image:title>Fox-IT-Blog detecting random filenames-01</image:title></image:image><lastmod>2019-10-16T11:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/09/11/office-365-prone-to-security-breaches/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/08/blog-pic-2.png</image:loc><image:title>blog pic 2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/08/blog-pic-1.png</image:loc><image:title>blog pic 1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/08/blogpic2-groot.png</image:loc><image:title>blogpic2-groot</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/08/blogpic2-e1565684727574.png</image:loc><image:title>blogpic2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/08/blogpic1.png</image:loc><image:title>blogpic1</image:title></image:image><lastmod>2019-09-11T14:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/06/11/using-anomaly-detection-to-find-malicious-domains/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/blog-figure.png</image:loc><image:title>blog figure</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/ngram.png</image:loc><image:title>ngram</image:title></image:image><lastmod>2019-06-06T13:58:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/06/06/syncing-yourself-to-global-administrator-in-azure-active-directory/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/ceomailbox.png</image:loc><image:title>ceomailbox</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/get-msolrolemember.png</image:loc><image:title>get-msolrolemember</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/get-msoluser.png</image:loc><image:title>get-msoluser</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/msolrole.png</image:loc><image:title>msolrole</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/onpremise.png</image:loc><image:title>onpremise</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/syncednow.png</image:loc><image:title>syncednow</image:title></image:image><lastmod>2019-06-06T13:08:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/06/04/export-corrupts-windows-event-log-files/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-forensics-4.png</image:loc><image:title>Fox-IT Forensics 4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-forensics-3.png</image:loc><image:title>Fox-IT Forensics 3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-forensics-2.png</image:loc><image:title>Fox-IT Forensics 2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-forensics-1.png</image:loc><image:title>Fox-IT Forensics 1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-blog-3.png</image:loc><image:title>Fox-IT blog 3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-blog-2.png</image:loc><image:title>Fox-IT blog 2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/06/fox-it-blog-1.png</image:loc><image:title>Fox-IT blog 1</image:title><image:caption>Image 5: Original data: record content on the left, record headers on the right. </image:caption></image:image><lastmod>2019-06-04T12:29:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/04/25/getting-in-the-zone-dumping-active-directory-dns-using-adidnsdump/</loc><lastmod>2019-04-25T16:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/03/28/mkyara-writing-yara-rules-for-the-lazy-analyst/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/mkyara5.gif</image:loc><image:title>mkyara5</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/mkyara4.gif</image:loc><image:title>mkyara4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/mkyara.png</image:loc><image:title>mkyara</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/mkyara-image-1.png</image:loc><image:title>mkYARA - image 1</image:title></image:image><lastmod>2019-03-28T13:15:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/03/27/psixbot-the-evolution-of-a-modular-net-bot/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/login.png</image:loc><image:title>login</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/03/versions.png</image:loc><image:title>versions</image:title></image:image><lastmod>2019-03-27T19:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2019/02/26/identifying-cobalt-strike-team-servers-in-the-wild/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/02/space_video.png</image:loc><image:title>space_video</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/02/teamservers_stats.png</image:loc><image:title>teamservers_stats</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/02/space.png</image:loc><image:title>space</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2019/02/changelog.png</image:loc><image:title>changelog</image:title></image:image><lastmod>2019-02-26T14:18:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/exploit.png</image:loc><image:title>exploit</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/org_management1.png</image:loc><image:title>org_management</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/psexec-relay1.png</image:loc><image:title>psexec-relay</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/pwn1.png</image:loc><image:title>pwn</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/relayadduserdomainacl1.png</image:loc><image:title>relayadduserdomainacl</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/sddl1.png</image:loc><image:title>sddl</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/secretsdump1.png</image:loc><image:title>secretsdump</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/secretsdump-21.png</image:loc><image:title>secretsdump-2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/secretsdumppwn1.png</image:loc><image:title>secretsdumppwn</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/domain_permission1.png</image:loc><image:title>domain_permission</image:title></image:image><lastmod>2019-01-20T16:49:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/12/18/your-trust-our-signature/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/twitter.png</image:loc><image:title>twitter</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/gov.png</image:loc><image:title>gov</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/Ktn66H2-1.png</image:loc><image:title>Ktn66H2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/OxmuNkt.png</image:loc><image:title>OxmuNkt</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/EHH4vBz.png</image:loc><image:title>EHH4vBz</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/iFPwV2x.png</image:loc><image:title>iFPwV2x</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/B8TQT4f.png</image:loc><image:title>B8TQT4f</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/CpRQtRz.png</image:loc><image:title>CpRQtRz</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/8nhvj29.png</image:loc><image:title>8nhvj29</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/12/175MRhH.png</image:loc><image:title>175MRhH</image:title></image:image><lastmod>2018-12-18T16:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/archive/</loc><lastmod>2018-09-10T14:04:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive/</loc><lastmod>2018-08-14T13:53:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_post_request.png</image:loc><image:title>bokbot_post_request</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_target_format.png</image:loc><image:title>bokbot_target_format</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_event_timeline.png</image:loc><image:title>bokbot_event_timeline</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_attributions.png</image:loc><image:title>bokbot_attributions</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_zeus_sig.png</image:loc><image:title>bokbot_zeus_sig</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_reporting_targets.png</image:loc><image:title>bokbot_reporting_targets</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_id_format.png</image:loc><image:title>bokbot_id_format</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/bokbot_neverquest_target_format.png</image:loc><image:title>bokbot_neverquest_target_format</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/08/76service_krebs.jpg</image:loc><image:title>76service_krebs</image:title></image:image><lastmod>2018-08-09T17:15:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/05/17/introducing-team-foundation-server-decryption-tool/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/msf_tfs.png</image:loc><image:title>msf_tfs</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/tfs_decrypted.png</image:loc><image:title>tfs_decrypted</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/tfs_variable.png</image:loc><image:title>TFS_Variable</image:title></image:image><lastmod>2018-05-17T11:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/05/09/introducing-orchestrator-decryption-tool/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/orch_result_sql.png</image:loc><image:title>orch_result_sql</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/msf_output.png</image:loc><image:title>msf_output</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/orch_tool_result.png</image:loc><image:title>orch_tool_result</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/dialog.png</image:loc><image:title>dialog</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/05/msf_orch.png</image:loc><image:title>msf_orch</image:title></image:image><lastmod>2018-05-09T12:06:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/06/27/liveblog-huge-petya-ransomware-wave/</loc><lastmod>2018-05-04T13:03:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2018/04/06/compromising-sharefile-on-premise-via-7-chained-vulnerabilities/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/uploadid-double.png</image:loc><image:title>uploadid-double</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/xxe.png</image:loc><image:title>xxe</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/validate_1.png</image:loc><image:title>validate_1</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/validate_2.png</image:loc><image:title>validate_2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/upload_initresponse.png</image:loc><image:title>upload_initresponse</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/upload_unzip.png</image:loc><image:title>upload_unzip</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/uploadid_traversal.png</image:loc><image:title>uploadid_traversal</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/uploadid_traversal_2.png</image:loc><image:title>uploadid_traversal_2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/unzipfromdisk.png</image:loc><image:title>unzipfromdisk</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2018/04/upload-hmac.png</image:loc><image:title>upload-hmac</image:title></image:image><lastmod>2018-04-09T09:46:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/12/14/lessons-learned-from-a-man-in-the-middle-attack/</loc><lastmod>2018-01-01T18:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/04/05/security-advisory-unencrypted-storage-of-confidential-information-in-keeper-password-data-vault-v5-3-for-ios/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/04/mysqlitedb560.png</image:loc><image:title>mysqlitedb560</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/04/masterpasswordstatement.png</image:loc><image:title>masterpasswordstatement</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/04/keeper-welcome.png</image:loc><image:title>keeper welcome</image:title></image:image><lastmod>2017-12-22T13:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/12/12/criminals-in-a-festive-mood/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/2-campagne.png</image:loc><image:title>2-campagne</image:title><image:caption>Statistics from hxxp://stegengaweb.nl/files/contactgegevens%2012_2017_10_00_.zip</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/1-campagne.png</image:loc><image:title>1-campagne</image:title><image:caption>Statistics from: hxxp://partytimeevents.nl/contactgegevens%2012_2017_10_00_.zip</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/zeus-panel.png</image:loc><image:title>zeus-panel</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/coolblue_main.png</image:loc><image:title>coolblue_main</image:title><image:caption>Zeus Panda Banker web inject</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/amazon_main.png</image:loc><image:title>amazon_main</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/2e-campagne.png</image:loc><image:title>2e-campagne</image:title><image:caption>Statistics from hxxp://stegengaweb.nl/files/contactgegevens%2012_2017_10_00_.zip</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/1e-campagne.png</image:loc><image:title>1e-campagne</image:title><image:caption>Statistics from hxxp://partytimeevents.nl/contactgegevens%2012_2017_10_00_.zip</image:caption></image:image><lastmod>2017-12-13T12:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/05/02/ransomware-deployments-after-brute-force-rdp-attack/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/05/indialocker.png</image:loc><image:title>indialocker</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/05/visio_blog.png</image:loc><image:title>visio_blog</image:title></image:image><lastmod>2017-12-13T07:47:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/12/08/detection-and-recovery-of-nsas-covered-up-tracks/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/dsz_evtx_in_use-e1512736524298.png</image:loc><image:title>Recovering removed event records</image:title><image:caption>Figure 4: Recovering removed event records</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/eventviewer_pre_post.png</image:loc><image:title>Before (back) and after (front) eventlogedit</image:title><image:caption>Figure 2: Before (back) and after (front) eventlogedit</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/03_eventlogedit-e1512735666674.png</image:loc><image:title>DanderSpritz with eventlogedit in action</image:title><image:caption>Figure 1: DanderSpritz with _eventlogedit_ in action</image:caption></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/12/eventrecords.png</image:loc><image:title>Untouched event records (left) and deleted event record (right)</image:title><image:caption>Figure 3: Untouched event records (left) and deleted event record (right). Note: not all field are displayed here.</image:caption></image:image><lastmod>2017-12-08T15:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/11/28/further-abusing-the-badpwdcount-attribute/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/11/bruted.png</image:loc><image:title>bruted</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/11/spray_check.png</image:loc><image:title>spray_check</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/11/ps_test.png</image:loc><image:title>ps_test</image:title></image:image><lastmod>2017-11-28T16:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/09/13/fox-it-debunks-report-on-bylock-app-that-landed-75000-people-in-jail-in-turkey/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/09/expert_witness_report_bylock.png</image:loc><image:title>expert_witness_report_bylock</image:title></image:image><lastmod>2017-09-13T17:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/06/28/faq-about-petya-outbreak/</loc><lastmod>2017-06-29T16:10:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/05/12/massive-outbreak-of-ransomware-variant-infects-large-amounts-of-computers-around-the-world/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/05/ransomware.jpg</image:loc><image:title>ransomware</image:title></image:image><lastmod>2017-05-21T20:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/05/13/faq-on-the-wanacry-ransomware-outbreak/</loc><lastmod>2017-05-16T15:56:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/05/03/snake-coming-soon-in-mac-os-x-flavour/</loc><lastmod>2017-05-07T13:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/04/14/a-mole-exposing-itself-to-sunlight/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/04/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/04/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/04/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/04/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/04/website.png</image:loc><image:title>website</image:title></image:image><lastmod>2017-04-14T14:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/03/23/turkish-hacktivists-targeting-the-netherlands-high-noise-low-impact/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/03/turkhackteam_hollandaoperasyonu.jpg</image:loc><image:title>Hollanda Operasyonu</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/03/defaced_website.png</image:loc><image:title>Defaced Dutch website</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/03/ddos_targets.png</image:loc><image:title>Dutch DDoS targets</image:title></image:image><lastmod>2017-03-23T12:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2017/02/13/detecting-ticketbleed-cve-2016-9244/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2017/02/ticketbleed_wireshark.png</image:loc><image:title>ticketbleed_wireshark</image:title></image:image><lastmod>2017-02-13T16:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/11/28/recent-vulnerability-in-eir-d1000-router-used-to-spread-updated-version-of-mirai-ddos-bot/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/11/mirai-hf.png</image:loc><image:title>mirai-hf</image:title></image:image><lastmod>2016-11-28T22:06:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/10/20/ziggo-ransomware-phishing-campaign-still-increasing-in-size/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/10/lock.png</image:loc><image:title>TorrentLocker lock screen</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/10/1475825302447.png</image:loc><image:title>Ziggo phishing e-mail</image:title></image:image><lastmod>2016-10-20T12:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/06/15/mofang-a-politically-motivated-information-stealing-adversary/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/06/mofang_targetedcountries_image.png</image:loc><image:title>mofang_targetedcountries_image</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/06/mofang_cover_image.png</image:loc><image:title>mofang_cover_image</image:title></image:image><lastmod>2016-06-15T01:02:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/06/07/linkedin-information-used-to-spread-banking-malware-in-the-netherlands/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/06/screenshot-phishing-campagin.png</image:loc><image:title>Screenshot phishing campagin</image:title></image:image><lastmod>2016-06-07T17:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/04/11/large-malvertising-campaign-hits-popular-dutch-websites/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/04/protact-fox-it-com-angler-malvertising.png</image:loc><image:title>protact-fox-it-com-angler-malvertising</image:title></image:image><lastmod>2016-04-11T10:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/03/21/financial-crisis-exercise-at-rsa-2016/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/rsa_3.jpg</image:loc><image:title>RSA_3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/rsa_2.jpg</image:loc><image:title>RSA_2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/rsa_1.jpg</image:loc><image:title>RSA_1</image:title></image:image><lastmod>2016-04-01T07:42:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/03/11/rsa-2016-security-heeft-nog-een-lange-weg-te-gaan/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/jeremy_butcher2.jpg</image:loc><image:title>Jeremy_Butcher2</image:title></image:image><lastmod>2016-03-31T08:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/03/11/rsa-2016-a-long-road-ahead-for-security/</loc><lastmod>2016-03-31T08:46:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2016/03/24/website-of-security-certification-provider-spreading-ransomware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/teslacrypt_4-0.png</image:loc><image:title>TeslaCrypt 4.0 ransom notes</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/teslacrypt_screen.png</image:loc><image:title>TeslaCrypt ransom notes</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2016/03/iclass-eccouncil-org_anglerredirect.png</image:loc><image:title>EC-COUNCIL iClass Angler exploit kit injected script</image:title></image:image><lastmod>2016-03-29T08:15:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/12/ponmocup_cover_page.png</image:loc><image:title>Ponmocup threat report cover page</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/12/fox-it_infographic_fig-2.png</image:loc><image:title>Ponmocup botnet global infections</image:title></image:image><lastmod>2015-12-02T11:16:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/09/07/how-a-research-project-at-fox-it-enhances-your-security-career/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/image401461.jpg</image:loc><image:title>image401461</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/foxer_barry2.jpg</image:loc><image:title>Foxer_Barry2</image:title></image:image><lastmod>2015-09-09T08:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/09/07/the-state-of-ransomware-in-2015/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/torrentlocker_warning.png</image:loc><image:title>TorrentLocker lock screen</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/ctb_lockscreen.png</image:loc><image:title>CTB Lock screen</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/ctb_lock_background.png</image:loc><image:title>CTB background lock screen</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/09/help_decrypt.png</image:loc><image:title>CryptoWall ransom note</image:title></image:image><lastmod>2015-09-07T11:59:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/04/20/deep-dive-into-quantum-insert/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/04/quantum_follow_stream3.png</image:loc><image:title>quantum_follow_stream3</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/04/quantum_insert_wireshark.png</image:loc><image:title>quantum_insert_wireshark</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/04/detect_qi.png</image:loc><image:title>Detect QUANTUMINSERT CSEC</image:title></image:image><lastmod>2015-09-07T10:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/08/24/finding-the-hidden-attacker-in-your-network/</loc><lastmod>2015-09-02T07:40:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/08/13/do-you-have-a-clue/</loc><lastmod>2015-09-02T07:40:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/07/15/how-to-become-cyber-resilient-quickly-and-remain-in-full-control/</loc><lastmod>2015-07-15T13:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/06/15/large-malvertising-campaign-targeting-the-netherlands/</loc><lastmod>2015-06-16T10:39:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2015/04/07/liveblog-malvertising-from-google-advertisements-via-possibly-compromised-reseller/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2015/04/malvertising_google_reseller_ru.png</image:loc><image:title>Malvertising via Doubleclick</image:title></image:image><lastmod>2015-04-10T12:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/about/</loc><lastmod>2014-12-17T08:33:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.fox-it.com/2014/11/26/cryptophp-a-week-later-more-than-23-000-sites-affected/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/cryptophp_sinkhole_infection_statistics_2.png</image:loc><image:title>CryptoPHP Sinkhole Infection_Statistics</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/cryptophp_sinkhole_infection_statistics.png</image:loc><image:title>CryptoPHP Sinkhole Infection Statistics</image:title></image:image><lastmod>2014-12-30T22:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/cryptophp_cover_300pdi.png</image:loc><image:title>CryptoPHP</image:title></image:image><lastmod>2015-02-02T07:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/11/06/cryptolocker-variant-torrentlocker-making-new-victims-in-nl/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/word-macros.png</image:loc><image:title>word macros</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/incasso-mail.png</image:loc><image:title>incasso mail</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/11/warning-tl.png</image:loc><image:title>warning-tl</image:title></image:image><lastmod>2015-01-12T15:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/10/15/torrentlocker-spreading-in-the-netherlands/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/payment.png</image:loc><image:title>payment</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/warning.png</image:loc><image:title>warning</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/torrentlocker.png</image:loc><image:title>TorrentLocker</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/tracktrace2.png</image:loc><image:title>tracktrace2</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/tracktrace.png</image:loc><image:title>tracktrace</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/postnl-phishing.png</image:loc><image:title>postnl phishing</image:title></image:image><lastmod>2014-10-31T08:30:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/10/21/update-on-the-torrentlocker-ransomware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/10/harvested-torrentlocker-addresses.png</image:loc><image:title>harvested-torrentlocker-addresses</image:title></image:image><lastmod>2014-10-24T20:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/10/15/poodle/</loc><lastmod>2014-10-15T11:20:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/09/04/update-on-decryptcryptolocker/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/09/cryptolocker_stats-top10_filetypes_rounded.png</image:loc><image:title>Cryptolocker_stats-top10_filetypes_rounded</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/09/cryptolocker_stats-requests.png</image:loc><image:title>Cryptolocker_stats-requests</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/09/cryptolocker_stats-top20_request.png</image:loc><image:title>Cryptolocker_stats-top20_request</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/09/cryptolocker_stats-infection.png</image:loc><image:title>Cryptolocker_stats-infection</image:title></image:image><lastmod>2015-01-21T18:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/08/27/malvertising-not-all-java-from-java-com-is-legitimate/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/fireeye_asprox_tracking.png</image:loc><image:title>FireEye Asprox tracking</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/malvertising.png</image:loc><image:title>Malvertising</image:title></image:image><lastmod>2014-08-30T01:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/08/06/cryptolocker-ransomware-intelligence-report/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/payments-cryptolocker.png</image:loc><image:title>Payments-Cryptolocker</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/infections-per-month.png</image:loc><image:title>infections-per-month</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/global-infection-rate-cryptolocker.png</image:loc><image:title>Global-Infection-Rate-Cryptolocker</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/08/cryptolocker-warning.jpg</image:loc><image:title>CryptoLocker warning</image:title></image:image><lastmod>2014-10-28T14:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/04/heartbleed-example.png</image:loc><image:title>heartbleed example</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/04/heartbleed.png</image:loc><image:title>heartbleed</image:title></image:image><lastmod>2014-07-09T09:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/03/07/building-bowser-a-password-cracking-story/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image018.jpg</image:loc><image:title>image018</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image016.jpg</image:loc><image:title>image016</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image056.jpg</image:loc><image:title>image056</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image054.jpg</image:loc><image:title>image054</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image058.jpg</image:loc><image:title>image058</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image066.jpg</image:loc><image:title>image066</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image064.jpg</image:loc><image:title>image064</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image062.png</image:loc><image:title>image062</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image061.png</image:loc><image:title>image061</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/03/image059.png</image:loc><image:title>image059</image:title></image:image><lastmod>2014-03-14T00:31:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/02/25/tilonspyeye2-intelligence-report/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/02/spyeye2-infrastructure.png</image:loc><image:title>SpyEye2 infrastructure</image:title></image:image><lastmod>2014-02-25T10:56:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2014/01/03/malicious-advertisements-served-via-yahoo/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/yahoo-ads-malware1.jpg</image:loc><image:title>yahoo ads malware</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/yahoo-ad-distribution.jpg</image:loc><image:title>yahoo ad distribution</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/yahoo-ads-malware.jpg</image:loc><image:title>yahoo ads malware</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/distribution-infections.jpg</image:loc><image:title>distribution infections</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/distribution-infections.png</image:loc><image:title>distribution infections</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2014/01/yahoo-ads-malware.png</image:loc><image:title>yahoo ads malware</image:title></image:image><lastmod>2014-02-28T16:30:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/12/19/not-quite-the-average-exploit-kit-zuponcic/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/zuponcic_attack_flow1.png</image:loc><image:title>zuponcic_attack_flow</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/htaccess_fake_redirects.png</image:loc><image:title>htaccess_fake_redirects</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/zuponcic_redirect_flow.png</image:loc><image:title>zuponcic_redirect_flow</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/path-to-trojan1.png</image:loc><image:title>Path-to-trojan</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/path-to-trojan.png</image:loc><image:title>Path-to-trojan</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/zuponcic_zip_bing_keyword.png</image:loc><image:title>zuponcic_zip_bing_keyword</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/kurz-instruments-inc-certificate.png</image:loc><image:title>Kurz Instruments Inc Certificate</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/ie10_jar.png</image:loc><image:title>IE10_jar</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/12/htaccess_referer_check.png</image:loc><image:title>htaccess_referer_check</image:title></image:image><lastmod>2013-12-20T09:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/09/tor_metrics1.png</image:loc><image:title>Tor Metrics</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/09/tor_module_analysis.png</image:loc><image:title>Tor Module Analysis</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/09/tor_metrics.png</image:loc><image:title>Tor Statistics</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/09/sbc_panel.png</image:loc><image:title>SBC Panel</image:title></image:image><lastmod>2013-09-14T04:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/08/05/dns-takeover-redirects-thousands-of-websites-to-malware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/08/conrad_iframe.png</image:loc><image:title>Malicious iframe</image:title></image:image><lastmod>2013-08-07T19:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/08/01/analysis-of-malicious-advertisements-on-telegraaf-nl/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/08/vm_cleanup.png</image:loc><image:title>vm_cleanup</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/08/telegraaf-nl_winlocker_ano.png</image:loc><image:title>telegraaf.nl_winlocker_ano</image:title></image:image><lastmod>2013-08-02T08:46:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/07/25/analysis-of-the-kins-malware/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/07/kins-ida.jpg</image:loc><image:title>kins-ida</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/07/kins-ida-600.png</image:loc><image:title>kins-ida 600</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/07/kins-ida-640.png</image:loc><image:title>kins-ida 640</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/07/kins-ida.png</image:loc><image:title>kins-ida</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/07/kins.png</image:loc><image:title>kins</image:title></image:image><lastmod>2014-03-25T18:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/06/06/geinfecteerde-advertenties-op-nu-nl/</loc><lastmod>2014-04-11T06:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/03/06/seen-in-the-wild-updated-exploit-kits/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/sweetorange_landingpage_deobfuscated.png</image:loc><image:title>sweetorange_landingpage_deobfuscated</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/sweetorange_landingpage_obfuscated.png</image:loc><image:title>sweetorange_landingpage_obfuscated</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/nicepack_found.png</image:loc><image:title>nicepack_found</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/nice_landingpage_deobfuscated.png</image:loc><image:title>nice_landingpage_deobfuscated</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/nice_landingpage_obfuscated.png</image:loc><image:title>nice_landingpage_obfuscated</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/03/registrant.png</image:loc><image:title>registrant</image:title></image:image><lastmod>2013-03-28T15:54:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/02/21/writeup-on-nbc-com-distributing-citadel-malware/</loc><lastmod>2013-02-22T21:12:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/02/12/oracle-getting-serious-about-java/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/02/javaone.jpg</image:loc><image:title>JavaOne</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/02/javatwo.jpg</image:loc><image:title>JavaTwo</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/02/blackhole_2-0-1_succesful_exploitation_distribution.png</image:loc><image:title>Blackhole_2.0.1_succesful_exploitation_distribution</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/02/java-sec-information.jpg</image:loc><image:title>java sec information</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2013/02/java-update-needed.jpg</image:loc><image:title>java update needed</image:title></image:image><lastmod>2013-02-13T11:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2013/01/11/demystifying-pobelka/</loc><lastmod>2013-09-08T21:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/11/28/cyber-security-in-nederland-op-de-agenda/</loc><lastmod>2012-12-07T13:17:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/10/18/fox-it-discovers-security-bugs-in-oracle-software/</loc><lastmod>2012-10-18T15:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/10/15/mogen-we-terugslaan/</loc><lastmod>2012-10-15T23:16:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/08/30/observations-on-the-recent-java-0-day-exploits-in-the-wild/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/exe.jpg</image:loc><image:title>Exe</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/jar.jpg</image:loc><image:title>Jar</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/1_7.png</image:loc><image:title>1_7</image:title></image:image><lastmod>2012-10-10T12:01:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/08/09/xdoccryptdorifel-document-encrypting-and-network-spreading-virus/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/rc41.png</image:loc><image:title>rc4</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/xdoccrypt_loader1.png</image:loc><image:title>XDocCrypt_loader</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/xdoccrypt_loader.png</image:loc><image:title>XDocCrypt_loader</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/recover_and_load_original.png</image:loc><image:title>recover_and_load_original</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/08/rc4.png</image:loc><image:title>rc4</image:title></image:image><lastmod>2012-08-31T14:37:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/06/21/how-to-find-malcious-communcation-leaving-your-network/</loc><lastmod>2012-06-21T17:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/05/08/mime-sniffing-feature-or-vulnerability/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/05/xss-zip-file.png</image:loc><image:title>xss zip file</image:title></image:image><lastmod>2014-10-22T17:34:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/04/12/critical-analysis-of-microsoft-operation-b71/</loc><lastmod>2012-05-10T02:07:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2012/03/16/post-mortem-report-on-the-sinowallnu-nl-incident/</loc><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/03/smoke-loader.jpg</image:loc><image:title>smoke loader</image:title></image:image><image:image><image:loc>https://blog.fox-it.com/wp-content/uploads/2012/03/nuclear-pack.jpg</image:loc><image:title>nuclear pack</image:title></image:image><lastmod>2012-04-04T18:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2011/11/21/rsa-512-certificates-abused-in-the-wild/</loc><lastmod>2012-01-04T23:37:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2011/11/15/onze-visie-op-de-eigen-slagkracht-van-de-overheid/</loc><lastmod>2011-11-15T08:32:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2011/11/09/presentatie-fox-it-op-infosecurity-nl-2011/</loc><lastmod>2011-11-09T12:57:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2011/06/02/over-het-cda-en-het-bestraffen-van-gebruik-van-crypto/</loc><lastmod>2012-11-28T09:22:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2011/05/13/dpi-laten-we-het-doen-zoals-in-chili/</loc><lastmod>2011-06-02T11:02:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com/2010/05/31/forbes-bert-hubert-explains-the-dns-issue-with-china/</loc><lastmod>2010-05-31T16:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fox-it.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-05-21T19:29:43+00:00</lastmod></url></urlset>
