<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//socprime.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://socprime.com/it/active-threats/resoker-rat-utilizza-telegram-per-comando-e-controllo/</loc>
		<lastmod>2026-04-20T01:32:33+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/muddywater-svelato-all-interno-di-un-operazione-apt-iraniana/</loc>
		<lastmod>2026-04-20T01:34:23+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/abuso-api-bitbucket-un-trucco-semplice-per-furto-di-dati-invisibile/</loc>
		<lastmod>2026-04-20T01:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/etherrat-ethereum-etherhiding-selezione-target-beacon-simile-cdn/</loc>
		<lastmod>2026-04-20T01:36:39+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/compromesso-catena-di-fornitura-litellm/</loc>
		<lastmod>2026-04-20T01:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/cinque-domande-sulla-sicurezza-di-browser-e-ai-che-i-cxo-non-possono-ignorare/</loc>
		<lastmod>2026-04-20T01:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/broker-accesso-iniziale-target-imprese/</loc>
		<lastmod>2026-04-20T01:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/pay2key-analisi-tecnica/</loc>
		<lastmod>2026-04-20T01:39:10+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/ctrl-framework-analisi-toolkit-accesso-russo/</loc>
		<lastmod>2026-04-20T01:40:34+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/analisi-approfondita-pxa-stealer/</loc>
		<lastmod>2026-04-20T01:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/analisi-brushworm-e-brushlogger/</loc>
		<lastmod>2026-04-20T01:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/operazione-dualscript-prende-di-mira-cripto/</loc>
		<lastmod>2026-04-20T01:44:11+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/strumento-ransomware-esposto-legato-allaffiliato-thegentlemen/</loc>
		<lastmod>2026-04-20T01:45:16+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/t1547-006-moduli-e-estensioni-del-kernel-in-mitre-attck-spiegato/</loc>
		<lastmod>2026-04-20T01:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/ransomware-utilizza-strumenti-legittimi-per-aggirare-antivirus/</loc>
		<lastmod>2026-04-20T01:46:58+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/t1547-008-driver-lsass-in-mitre-attck-spiegato/</loc>
		<lastmod>2026-04-20T01:47:44+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/cyberattacco-uac-0255-da-cert-ua/</loc>
		<lastmod>2026-04-20T01:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/infiniti-stealer-macos-infostealer/</loc>
		<lastmod>2026-04-20T01:49:40+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/miolab-impero-macos-stealer/</loc>
		<lastmod>2026-04-20T01:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/interlock-analisi-ransomware/</loc>
		<lastmod>2026-04-20T01:51:03+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/la-campagna-pawn-storm-prismex/</loc>
		<lastmod>2026-04-20T01:51:56+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/defender-ferma-ransomware-basato-su-gpo/</loc>
		<lastmod>2026-04-20T01:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/smartapesg-distribuisce-remcos/</loc>
		<lastmod>2026-04-20T01:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/larva-26002-analisi/</loc>
		<lastmod>2026-04-20T01:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/regphantom-backdoor-analisi-delle-minacce-e-approfondimenti-sulla-rilevazione/</loc>
		<lastmod>2026-04-20T01:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/fauxelevate-attori-di-minaccia-puntano-alla-francia/</loc>
		<lastmod>2026-04-20T01:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/analisi-kiss-loader/</loc>
		<lastmod>2026-04-20T01:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/glassworm-nasconde-un-rat-allinterno-di-un-estensione-maligna-per-chrome/</loc>
		<lastmod>2026-04-20T01:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/conflitto-iraniano-attivita-spionaggio-contro-medio-oriente/</loc>
		<lastmod>2026-04-20T02:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Iran-conflict-drives-heightened-espionage-activity-against-Middle-East-targets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/t1547-001-in-mitre-attck-chiavi-di-esecuzione-del-registro-e-cartella-di-avvio-spiegate/</loc>
		<lastmod>2026-04-20T02:01:24+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/t1547-003-provider-di-tempo-spiegati-nel-mitre-attck/</loc>
		<lastmod>2026-04-20T02:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/google-forms-potrebbe-infestare-il-tuo-dispositivo/</loc>
		<lastmod>2026-04-20T02:03:19+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/campagna-malware-da-vbs-a-infrastruttura-aperta/</loc>
		<lastmod>2026-04-20T02:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/silentconnect-infezione-con-screenconnect/</loc>
		<lastmod>2026-04-20T02:05:32+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/malware-winos-4-0-che-si-maschera-da-programma-di-installazione-di-kakaotalk/</loc>
		<lastmod>2026-04-20T02:06:52+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/indizi-di-phishing-nascosti-nella-cartella-tmp/</loc>
		<lastmod>2026-04-20T02:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/eset-research-killer-edr-spiegati-oltre-i-driver/</loc>
		<lastmod>2026-04-20T02:09:03+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/dal-w-2-al-byovd-come-una-ricerca-fiscale-porta-al-blocco-av-edr-in-modalita-kernel/</loc>
		<lastmod>2026-04-20T02:09:57+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/analisi-backdoor-gsocket/</loc>
		<lastmod>2026-04-20T02:10:42+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/ricerca-minaccia-cato-ctrl/</loc>
		<lastmod>2026-04-20T02:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/wsl-nel-sistema-malware/</loc>
		<lastmod>2026-04-20T02:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/it/active-threats/unc1069-colpisce-settore-criptovalute/</loc>
		<lastmod>2026-04-20T02:13:18+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-desckvb-rat/</loc>
		<lastmod>2026-04-20T02:16:01+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/chainshell-muddywater-maas-russe/</loc>
		<lastmod>2026-04-20T02:17:04+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/hermes-px-le-proxy-ai-de-confidentialite/</loc>
		<lastmod>2026-04-20T02:17:58+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/les-leurres-claude-code-transforment-les-releases-github-en-un-canal-de-livraison-de-logiciels-malveillants/</loc>
		<lastmod>2026-04-20T02:18:38+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/talos-liens-cve-2025-55182-react2shell/</loc>
		<lastmod>2026-04-20T02:19:31+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/campagnes-liees-a-la-rpdc-avec-lnk-et-github-c2/</loc>
		<lastmod>2026-04-20T02:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-ven0m-ransomware/</loc>
		<lastmod>2026-04-20T02:22:43+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/campagne-malware-apt-q-27/</loc>
		<lastmod>2026-04-20T02:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/stealers-sur-macos-observes-ce-que-les-defenseurs-doivent-surveiller/</loc>
		<lastmod>2026-04-20T02:24:58+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/ta416-reprend-campagnes-espionnage-gouvernements-europeens/</loc>
		<lastmod>2026-04-20T02:25:45+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/webshells-php-controle-cookies/</loc>
		<lastmod>2026-04-20T02:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/chaine-infection-qilin-edr-killer/</loc>
		<lastmod>2026-04-20T02:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/mustang-panda-et-plugx/</loc>
		<lastmod>2026-04-20T02:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-blank-grabber-stealer/</loc>
		<lastmod>2026-04-20T02:30:04+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/le-malware-deepload-associe-la-livraison-clickfix/</loc>
		<lastmod>2026-04-20T02:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-campagnes-casbaneiro/</loc>
		<lastmod>2026-04-20T02:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/crysome-rat-un-cheval-de-troie-d-acces-a-distance-persistant-et-avance-net/</loc>
		<lastmod>2026-04-20T02:32:46+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/resoker-rat-utilise-telegram-pour-le-commandement-et-le-controle/</loc>
		<lastmod>2026-04-20T02:33:27+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/muddywater-devoile-a-l-interieur-d-une-operation-apt-iranienne/</loc>
		<lastmod>2026-04-20T02:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/exploitation-api-bitbucket-un-stratageme-simple-pour-vol-donnees-furtif/</loc>
		<lastmod>2026-04-20T02:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/etherrat-ethereum-etherhiding-selection-cibles-balises-cdn/</loc>
		<lastmod>2026-04-20T02:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/attaque-chaine-approvisionnement-litellm/</loc>
		<lastmod>2026-04-20T02:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/cinq-questions-securite-navigateurs-ia-cxo-ne-peuvent-ignorer/</loc>
		<lastmod>2026-04-20T02:38:49+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/courtiers-acces-initial-visent-entreprises/</loc>
		<lastmod>2026-04-20T02:39:08+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/pay2key-analyse-technique/</loc>
		<lastmod>2026-04-20T02:39:43+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/ctrl-framework-analyse-outil-acces-russe/</loc>
		<lastmod>2026-04-20T02:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/pxa-stealer-analyse-approfondie/</loc>
		<lastmod>2026-04-20T02:42:07+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-de-brushworm-et-brushlogger/</loc>
		<lastmod>2026-04-20T02:42:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/operation-dualscript-cible-crypto/</loc>
		<lastmod>2026-04-20T02:43:49+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/outil-ransomware-expose-lie-a-affilie-thegentlemen/</loc>
		<lastmod>2026-04-20T02:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/t1547-006-modules-du-noyau-et-extensions-dans-mitre-attck-explique/</loc>
		<lastmod>2026-04-20T02:45:45+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/ransomwares-utilisent-outils-legitimes-pour-contourner-av/</loc>
		<lastmod>2026-04-20T02:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/t1547-008-pilote-lsass-dans-mitre-attck-explique/</loc>
		<lastmod>2026-04-20T02:47:07+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/cyberattaque-uac-0255-du-cert-ua/</loc>
		<lastmod>2026-04-20T02:47:46+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/infiniti-stealer-macos-infostealer/</loc>
		<lastmod>2026-04-20T02:48:36+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/miolab-empire-voleurs-macos/</loc>
		<lastmod>2026-04-20T02:49:47+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-rancongiciel-interlock/</loc>
		<lastmod>2026-04-20T02:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/pawn-storm-prismex/</loc>
		<lastmod>2026-04-20T02:52:11+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/smartapesg-delivre-remcos/</loc>
		<lastmod>2026-04-20T02:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/larva-26002-analyse/</loc>
		<lastmod>2026-04-20T02:55:01+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/t1547-004-dans-mitre-attck-assistant-winlogon-explique/</loc>
		<lastmod>2026-04-20T02:55:40+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/regphantom-backdoor-analyse-menaces-detection/</loc>
		<lastmod>2026-04-20T02:56:25+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/fauxelevate-acteurs-de-menace-ciblent-la-france/</loc>
		<lastmod>2026-04-20T02:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-kiss-loader/</loc>
		<lastmod>2026-04-20T02:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/glassworm-cache-un-rat-dans-une-extension-chrome-malveillante/</loc>
		<lastmod>2026-04-20T02:59:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/activite-espionnage-iran-contre-moyen-orient/</loc>
		<lastmod>2026-04-20T02:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Iran-conflict-drives-heightened-espionage-activity-against-Middle-East-targets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/t1547-001-dans-mitre-attck-explication-des-cles-de-demarrage-dans-le-registre-et-du-dossier-de-demarrage/</loc>
		<lastmod>2026-04-20T03:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/t1547-003-fournisseurs-de-temps-dans-mitre-attck-expliques/</loc>
		<lastmod>2026-04-20T03:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/google-forms-pourrait-infecter-votre-appareil/</loc>
		<lastmod>2026-04-20T03:02:07+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/campagne-de-malware-du-vbs-a-l-infrastructure-ouverte/</loc>
		<lastmod>2026-04-20T03:03:04+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/silentconnect-infection-avec-screenconnect/</loc>
		<lastmod>2026-04-20T03:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/winos-4-0-malware-deguise-en-installateur-kakaotalk/</loc>
		<lastmod>2026-04-20T03:04:55+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/les-indices-de-phishing-caches-dans-le-dossier-tmp/</loc>
		<lastmod>2026-04-20T03:05:45+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/recherche-eset-explication-tueurs-edr-au-dela-des-pilotes/</loc>
		<lastmod>2026-04-20T03:06:32+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/de-w-2-a-byovd-comment-une-recherche-fiscale-mene-a-la-desactivation-av-edr-en-mode-noyau/</loc>
		<lastmod>2026-04-20T03:07:30+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/analyse-du-cheval-de-troie-gsocket/</loc>
		<lastmod>2026-04-20T03:08:18+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/cato-ctrl-recherche-menace/</loc>
		<lastmod>2026-04-20T03:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/wsl-dans-lecosysteme-des-malwares/</loc>
		<lastmod>2026-04-20T03:09:44+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/fr/active-threats/unc1069-cible-le-secteur-des-cryptomonnaies/</loc>
		<lastmod>2026-04-20T03:10:32+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/chainshell-muddywater-russian-maas/</loc>
		<lastmod>2026-04-20T03:15:23+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/hermes-px-the-privacy-ai-proxy/</loc>
		<lastmod>2026-04-20T03:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/claude-code-lures-peretvoryu-relyzy-github-na-kanal-dostavky-shkidlyvoho-pz/</loc>
		<lastmod>2026-04-20T03:18:25+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/talos-links-cve-2025-55182-react2shell/</loc>
		<lastmod>2026-04-20T03:19:33+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/kampanii-povyazani-z-kndr-z-vikoristannyam-lnk-ta-github-c2/</loc>
		<lastmod>2026-04-20T03:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/ven0m-ransomware-analysis/</loc>
		<lastmod>2026-04-20T03:22:29+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/apt-q-27-malware-campaign/</loc>
		<lastmod>2026-04-20T03:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/cyberattack-uac-0255-from-cert-ua/</loc>
		<lastmod>2026-04-20T03:24:24+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/vikradalnyky-dlya-macos-vyyavleno-na-shcho-slid-zvertaty-uvahu-zakhysnykam/</loc>
		<lastmod>2026-04-20T03:24:54+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/ta416-vidnovlyuye-kampaniyi-shpyhunstva-za-yevropeyskymy-uryadamy/</loc>
		<lastmod>2026-04-20T03:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/qilin-edr-killer-infection-chain/</loc>
		<lastmod>2026-04-20T03:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/mustang-panda-ta-plugx/</loc>
		<lastmod>2026-04-20T03:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/analiz-blank-grabber-stealer/</loc>
		<lastmod>2026-04-20T03:29:25+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/shkidlyve-programne-zabezpechennya-deepload-poyednue-dostavku-clickfix/</loc>
		<lastmod>2026-04-20T03:30:11+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/%d0%b0%d0%bd%d0%b0%d0%bb%d1%96%d0%b7-%d0%ba%d0%b0%d0%bc%d0%bf%d0%b0%d0%bd%d1%96%d0%b9-casbaneiro/</loc>
		<lastmod>2026-04-20T03:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/crysome-rat-rozvinute-stiyke-net-troyanske-programne-zabezpechennya-dlya-viddalenogo-dostupu/</loc>
		<lastmod>2026-04-20T03:32:28+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/resoker-rat-vykorystovuye-telegram-dlya-komanduvannya-i-kontrolyu/</loc>
		<lastmod>2026-04-20T03:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/muddywater-vikryto-vseredyni-operatsiyi-iranskoyi-apt/</loc>
		<lastmod>2026-04-20T03:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/etherrat-ethereum-etherhiding-vybir-tsili-podoba-cdn-mayachka/</loc>
		<lastmod>2026-04-20T03:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/litellm-lantjuchok-postavok-atak/</loc>
		<lastmod>2026-04-20T03:37:27+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/pyat-zapytan-z-bezpeky-brauzeriv-i-ii-yaki-kerivnyky-ne-mozhut-ignoruvaty/</loc>
		<lastmod>2026-04-20T03:37:56+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/brokeri-pochatkovogo-dostupu-target-enterprises/</loc>
		<lastmod>2026-04-20T03:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/pay2key-%d1%82%d0%b5%d1%85%d0%bd%d1%96%d1%87%d0%bd%d0%b8%d0%b9-%d0%b0%d0%bd%d0%b0%d0%bb%d1%96%d0%b7/</loc>
		<lastmod>2026-04-20T03:38:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/ctrl-framework-russian-access-toolkit-analysis/</loc>
		<lastmod>2026-04-20T03:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/pxa-stealer-deep-dive/</loc>
		<lastmod>2026-04-20T03:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/analiz-brushworm-i-brushlogger/</loc>
		<lastmod>2026-04-20T03:42:49+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/%d0%be%d0%bf%d0%b5%d1%80%d0%b0%d1%86%d1%96%d1%8f-dualscript-%d0%bd%d0%b0%d1%86%d1%96%d0%bb%d1%8e%d1%94%d1%86%d1%8f-%d0%bd%d0%b0-%d0%ba%d1%80%d0%b8%d0%bf%d1%82%d1%83/</loc>
		<lastmod>2026-04-20T03:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/%d0%b2%d0%b8%d1%8f%d0%b2%d0%bb%d0%b5%d0%bd%d0%b8%d0%b9-%d0%bd%d0%b0%d0%b1%d1%96%d1%80-%d1%96%d0%bd%d1%81%d1%82%d1%80%d1%83%d0%bc%d0%b5%d0%bd%d1%82%d1%96%d0%b2-%d0%b7-%d0%b2%d0%b8%d0%bc%d0%be%d0%b3/</loc>
		<lastmod>2026-04-20T03:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/t1547-006-moduli-yadra-ta-rozshyrennia-u-mitre-attck-poiasnennia/</loc>
		<lastmod>2026-04-20T03:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/program-vymagach-vykorystovuje-zakonni-instrumenty-dlya-obhodu-av/</loc>
		<lastmod>2026-04-20T03:47:02+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/t1547-008-drayver-lsass-v-mitre-attck-poyasnennya/</loc>
		<lastmod>2026-04-20T03:47:35+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/infiniti-stealer-macos-infostealer/</loc>
		<lastmod>2026-04-20T03:48:43+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/interlock-ransomware-analysis/</loc>
		<lastmod>2026-04-20T03:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/pawn-storm-prismex/</loc>
		<lastmod>2026-04-20T03:52:11+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/defender-stop-gpo-based-ransomware/</loc>
		<lastmod>2026-04-20T03:53:18+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/smartapesg-delivers-remcos/</loc>
		<lastmod>2026-04-20T03:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/larva-26002-analysis/</loc>
		<lastmod>2026-04-20T03:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/t1547-004-u-mitre-attck-poyasnennya-winlogon-helper/</loc>
		<lastmod>2026-04-20T03:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/zadyj-khid-regphantom-analiz-zagrozy-ta-rekomendatsiyi-z-vyyavlennya/</loc>
		<lastmod>2026-04-20T03:57:55+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/fauxelevate-zlovmisnyky-atakuyut-frantsiyu/</loc>
		<lastmod>2026-04-20T03:59:07+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/kiss-loader-analysis/</loc>
		<lastmod>2026-04-20T04:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/glassworm-khovaye-rat-vseredini-zlovmisnogo-rozshirennya-chrome/</loc>
		<lastmod>2026-04-20T04:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/iran-espionage-activity-against-middle-east/</loc>
		<lastmod>2026-04-20T04:02:48+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Iran-conflict-drives-heightened-espionage-activity-against-Middle-East-targets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/t1547-001-u-mitre-attck-poyasnennya-reyestru-klyuchiv-zapusku-ta-papky-avtozavantazhennya/</loc>
		<lastmod>2026-04-20T04:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/t1547-003-postachalnyky-chasu-v-mitre-attck-poiasneno/</loc>
		<lastmod>2026-04-20T04:04:05+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/google-forms-could-infect-your-device/</loc>
		<lastmod>2026-04-20T04:05:06+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/kampaniya-zlovmisne-pz-vid-vbs-do-vidkritoyi-infrastrukturi/</loc>
		<lastmod>2026-04-20T04:06:03+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/silentconnect-zarazhennya-screenconnect/</loc>
		<lastmod>2026-04-20T04:07:04+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/winos-4-0-malware-masquerading-as-a-kakaotalk-installer/</loc>
		<lastmod>2026-04-20T04:08:16+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/phishing-clues-hidden-in-the-tmp-folder/</loc>
		<lastmod>2026-04-20T04:09:48+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/vid-w-2-do-byovd-yak-poshuk-podatkiv-vede-do-znishchennya-av-edr-u-rezhymi-yadra/</loc>
		<lastmod>2026-04-20T04:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/analiz-gsocket-backdoor/</loc>
		<lastmod>2026-04-20T04:12:42+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/cato-ctrl-threat-research/</loc>
		<lastmod>2026-04-20T04:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://socprime.com/ua/active-threats/unc1069-targets-cryptocurrency-sector/</loc>
		<lastmod>2026-04-20T04:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://socprime.com/wp-content/uploads/Image_bg.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->