<?xml version="1.0" encoding="UTF-8"?>
<!-- generated-on="2026-04-20T08:00:02+00:00" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9                                 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
                         <url><loc>https://unsurfaced.com/</loc><lastmod>2026-04-20T08:00:02+00:00</lastmod></url><url><loc>https://unsurfaced.com/about</loc></url><url><loc>https://unsurfaced.com/contact</loc></url><url><loc>https://unsurfaced.com/terms</loc></url><url><loc>https://unsurfaced.com/privacy</loc></url><url><loc>https://unsurfaced.com/tools</loc></url><url><loc>https://unsurfaced.com/tools/password-generator</loc></url><url><loc>https://unsurfaced.com/tools/check-ip</loc></url><url><loc>https://unsurfaced.com/tools/whois</loc></url><url><loc>https://unsurfaced.com/tools/hash</loc></url><url><loc>https://unsurfaced.com/tools/base64</loc></url><url><loc>https://unsurfaced.com/tools/url-encode</loc></url><url><loc>https://unsurfaced.com/tools/jwt</loc></url><url><loc>https://unsurfaced.com/tools/security-headers</loc></url><url><loc>https://unsurfaced.com/tools/dns</loc></url><url><loc>https://unsurfaced.com/category/vulnerabilities</loc></url><url><loc>https://unsurfaced.com/category/breaches</loc></url><url><loc>https://unsurfaced.com/category/malware</loc></url><url><loc>https://unsurfaced.com/category/cloud-infra</loc></url><url><loc>https://unsurfaced.com/category/appsec</loc></url><url><loc>https://unsurfaced.com/category/identity</loc></url><url><loc>https://unsurfaced.com/category/privacy-policy</loc></url><url><loc>https://unsurfaced.com/category/cybercrime</loc></url><url><loc>https://unsurfaced.com/category/industry</loc></url><url><loc>https://unsurfaced.com/article/four-notable-data-security-breaches-to-be-aware-of-in-february-2026</loc><lastmod>2026-04-20T07:00:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ten-essential-data-security-updates-to-be-aware-of-in-march-2026</loc><lastmod>2026-04-19T07:00:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/bookingcom-reports-unauthorized-access-to-user-data</loc><lastmod>2026-04-18T07:00:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/major-european-fitness-chain-reports-data-breach-affects-one-million-customers</loc><lastmod>2026-04-17T07:00:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/30-year-old-vulnerability-discovered-in-libpng-library</loc><lastmod>2026-04-16T11:45:40+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/microsoft-addresses-exploited-sharepoint-vulnerability-and-fixes-160-additional-security-flaws</loc><lastmod>2026-04-16T07:00:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/10-persistent-software-bugs-that-took-ages-to-fix</loc><lastmod>2026-04-15T12:00:40+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/vulnerability-may-allow-hackers-to-seize-control-of-juniper-networks-ptx-core-routers</loc><lastmod>2026-04-14T17:51:36+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/2026-cybersecurity-budgets-insights-from-the-data</loc><lastmod>2026-04-13T10:50:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/sshstalker-botnet-attacks-7000-linux-systems-with-brute-force</loc><lastmod>2026-04-07T17:42:42+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybersecurity-arena-hosts-bot-battles</loc><lastmod>2026-04-07T12:12:16+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/active-attacks-exploit-critical-beyondtrust-rs-vulnerability</loc><lastmod>2026-04-06T15:15:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/google-reports-exploit-for-new-chrome-zero-day-vulnerability</loc><lastmod>2026-04-06T11:40:38+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/vulnerabilities-in-four-vs-code-extensions-exposed-128-million-installations-to-risk</loc><lastmod>2026-04-05T17:28:23+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/four-common-vulnerability-management-mistakes-and-how-to-correct-them</loc><lastmod>2026-04-05T13:22:16+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chinese-hackers-exploited-dell-recoverpoint-zero-day-flaw-for-18-months</loc><lastmod>2026-04-05T12:09:44+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/notepad-creator-claims-update-mechanism-is-now-effectively-unexploitable</loc><lastmod>2026-04-05T11:52:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/infected-npm-package-stealthily-installs-openclaw-on-developer-systems</loc><lastmod>2026-04-04T17:10:46+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/13-methods-attackers-use-generative-ai-to-compromise-your-systems</loc><lastmod>2026-04-04T13:59:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/hackers-leverage-ivanti-epmm-zero-days-to-hijack-mdm-servers</loc><lastmod>2026-04-04T12:23:09+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/vmware-patches-command-injection-vulnerability-in-aria-operations</loc><lastmod>2026-04-04T11:48:29+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/new-serv-u-vulnerabilities-continue-solarwinds-trend-of-critical-disclosures</loc><lastmod>2026-04-03T14:50:40+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/five-eyes-release-urgent-warning-on-cisco-sd-wan-zero-day-vulnerability-exploitation</loc><lastmod>2026-04-03T11:13:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/us-officials-crack-down-on-malware-and-spyware-sellers</loc><lastmod>2026-04-03T09:35:15+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/your-openclaw-agent-might-be-receiving-commands-from-harmful-websites</loc><lastmod>2026-04-02T17:01:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/google-api-key-change-quietly-exposed-gemini-ai-data</loc><lastmod>2026-04-02T11:26:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ethical-hacker-top-job-of-2026</loc><lastmod>2026-04-01T09:37:15+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/a-decade-of-ransomware-havoc-the-financial-impact</loc><lastmod>2026-03-31T13:36:16+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/strategies-for-securing-approval-of-cybersecurity-budget-requests</loc><lastmod>2026-03-31T10:26:05+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/required-gpa-for-pursuing-a-cybersecurity-degree</loc><lastmod>2026-03-30T15:45:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/three-practical-penetration-testing-insights-for-cisos-and-security-teams</loc><lastmod>2026-03-30T14:18:08+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/rising-global-costs-of-software-supply-chain-attacks</loc><lastmod>2026-03-30T10:33:46+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/black-hat-appoints-suzy-pallett-as-new-brand-president</loc><lastmod>2026-03-29T17:55:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chances-of-experiencing-a-data-breach</loc><lastmod>2026-03-29T14:50:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/teen-computer-whizs-journey-to-becoming-a-crypto-godfather</loc><lastmod>2026-03-29T11:47:18+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/mastercards-deputy-chief-security-officer-alissa-abdullah-phd-discusses-ai-and-cybersecurity</loc><lastmod>2026-03-29T10:17:43+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/dangers-of-incorporating-llms-in-business-applications</loc><lastmod>2026-03-28T13:40:33+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/winter-2025-women-in-cybersecurity-report</loc><lastmod>2026-03-28T12:13:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/sharp-increase-in-cybersecurity-spending-outside-ciso-offices</loc><lastmod>2026-03-27T14:02:48+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/boost-your-cybersecurity-the-impact-of-a-company-name</loc><lastmod>2026-03-27T13:42:27+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/australias-cybersecurity-strategy-testing-kids-with-pentesting</loc><lastmod>2026-03-27T10:00:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybersecurity-testing-reaches-the-boardroom</loc><lastmod>2026-03-27T09:28:54+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/microsoft-discusses-women-in-cybersecurity-at-black-hat-europe-2025-in-london</loc><lastmod>2026-03-26T16:51:24+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/why-2025-is-the-year-of-cyberattacks-on-uk-businesses</loc><lastmod>2026-03-26T15:23:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/leading-cybersecurity-forecasts-for-2026</loc><lastmod>2026-03-26T14:26:20+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/nir-zuk-palo-alto-networks-founder-cto-named-2025-cybersecurity-person-of-the-year</loc><lastmod>2026-03-25T15:36:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/essential-cybersecurity-insights-for-businesses-in-2026</loc><lastmod>2026-03-25T13:00:35+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/nasdaq-cybersecurity-etf-poised-to-be-a-top-investment-in-2026</loc><lastmod>2026-03-25T12:00:04+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/australias-smes-key-cyber-threats-to-monitor-in-2026</loc><lastmod>2026-03-24T14:46:01+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/investors-target-data-centers-raising-concerns-over-downtime</loc><lastmod>2026-03-24T11:48:50+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/future-cybersecurity-prepared-for-breaches-board-ready-and-ai-driven</loc><lastmod>2026-03-24T10:13:53+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ai-deepfake-scams-hit-hard-on-your-wallet</loc><lastmod>2026-03-23T16:02:36+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/canon-usa-consolidates-office-tech-it-infrastructure-and-cybersecurity-operations</loc><lastmod>2026-03-23T14:45:25+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/first-trust-nasdaq-cybersecurity-etf-2026-growth-outlook</loc><lastmod>2026-03-22T17:27:12+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/1989-us-secret-service-captures-notorious-hacker-queen</loc><lastmod>2026-03-22T16:45:44+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/mastercard-ceo-michael-miebach-discusses-cybersecurity-at-world-economic-forum</loc><lastmod>2026-03-22T14:36:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/top-cybersecurity-newsletters-to-follow-in-2026</loc><lastmod>2026-03-22T09:02:14+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/top-10-ransomware-incidents-of-the-past-year</loc><lastmod>2026-03-21T11:51:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/top-5-cybersecurity-certifications-boosting-salaries-in-2026</loc><lastmod>2026-03-21T10:41:25+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/is-the-cybercrime-economy-set-to-level-off-by-2026</loc><lastmod>2026-03-20T13:55:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/key-topics-for-government-cisos-and-cybersecurity-leaders-in-2026</loc><lastmod>2026-03-20T12:54:09+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/las-vegas-mob-museum-discover-cybercrimes-history-and-future</loc><lastmod>2026-03-20T09:33:55+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/orca-securitys-gil-geron-trailblazer-in-cloud-security</loc><lastmod>2026-03-19T13:04:37+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/secret-service-agents-recover-almost-1m-for-71-year-old-retiree</loc><lastmod>2026-03-19T10:10:39+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/understanding-autonomous-penetration-testing-and-its-functionality</loc><lastmod>2026-03-18T15:47:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/global-ransomware-damage-predicted-to-reach-74-billion-by-2026</loc><lastmod>2026-03-18T11:36:25+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ciso-dilemma-should-i-remain-or-leave</loc><lastmod>2026-03-18T10:06:12+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/higinio-ochoa-ex-hacktivist-turned-white-hat-featured-on-cybercrime-magazine-podcast</loc><lastmod>2026-03-17T16:45:22+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/scam-interceptors-tv-show-blends-ethical-hacking-with-investigative-journalism</loc><lastmod>2026-03-17T14:08:22+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/bank-of-america-warns-cybercrime-will-intensify</loc><lastmod>2026-03-17T13:03:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ransomware-among-the-top-10-ai-threats-in-2026</loc><lastmod>2026-03-16T17:46:39+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/betashares-global-cybersecurity-etf-asx-hack-a-broad-investment-in-the-industry</loc><lastmod>2026-03-16T14:26:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/exploring-the-digital-frontier-inside-cybercrime-magazine</loc><lastmod>2026-03-16T13:54:52+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ransomware-endangers-smbs-cyberinsurance-may-not-provide-financial-protection</loc><lastmod>2026-03-15T14:52:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ransom-man-jenny-kleeman-probes-psychotherapy-services-alarming-data-breach</loc><lastmod>2026-03-15T12:23:05+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/guide-to-structured-cybercrime</loc><lastmod>2026-03-14T16:54:04+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/why-cyberinsurance-is-essential-for-small-businesses</loc><lastmod>2026-03-14T15:33:18+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybercrime-magazine-debuts-first-youtube-short-more-coming-soon</loc><lastmod>2026-03-14T12:49:19+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/theresa-caputo-of-long-island-medium-visits-cybercrime-magazine-live</loc><lastmod>2026-03-14T10:35:01+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybercrime-magazine-podcast-debuts-ciso-confidential-series</loc><lastmod>2026-03-13T16:44:46+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/the-economic-ripple-effects-triggered-by-cybercrime</loc><lastmod>2026-03-13T15:51:14+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/webcamgate-2009-high-school-laptop-program-sparks-national-spying-controversy</loc><lastmod>2026-03-13T13:03:09+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/rising-threats-in-software-supply-chain-security</loc><lastmod>2026-03-13T12:44:01+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/hollywoods-ethical-hacker-featured-on-cybercrime-magazine-podcast</loc><lastmod>2026-03-12T13:48:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/exploring-north-koreas-cybercrime-industry</loc><lastmod>2026-03-12T12:28:15+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/651-arrested-in-africa-during-operation-red-card-20</loc><lastmod>2026-03-11T16:13:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/richter-scale-approach-gauges-severity-of-ot-cyber-incidents</loc><lastmod>2026-03-11T12:58:06+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chinese-police-employ-chatgpt-to-discredit-japan-pm-takaichi</loc><lastmod>2026-03-11T09:46:04+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cisco-sd-wan-zero-day-exploited-for-three-years</loc><lastmod>2026-03-10T16:10:17+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/marquis-sues-sonicwall-intensifying-breach-blame-debate</loc><lastmod>2026-03-10T14:35:27+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/claude-code-security-promising-yet-imperfect</loc><lastmod>2026-03-10T10:55:53+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/why-improved-breach-transparency-is-crucial</loc><lastmod>2026-03-09T16:51:02+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/major-event-cities-must-prioritize-wireless-and-drone-defense</loc><lastmod>2026-03-09T12:12:17+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ransomware-targets-hospitals-both-on-tv-and-in-real-life</loc><lastmod>2026-03-08T15:12:24+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/flaw-in-googles-gemini-ai-panel-allows-potential-hijacking</loc><lastmod>2026-03-08T13:39:54+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/30-suspected-the-com-members-detained-in-project-compass</loc><lastmod>2026-03-08T10:46:06+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/openclaw-flaw-highlights-ai-agent-vulnerabilities</loc><lastmod>2026-03-07T17:09:50+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/pro-iranian-groups-ramp-up-cyberattacks-amid-ongoing-war</loc><lastmod>2026-03-07T16:43:46+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/managing-ai-agent-overload-addressing-the-workload-identity-crisis</loc><lastmod>2026-03-07T11:48:11+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/targeted-android-attacks-exploit-qualcomm-zero-day-vulnerability</loc><lastmod>2026-03-06T15:40:15+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/tire-pressure-sensors-allow-covert-vehicle-tracking</loc><lastmod>2026-03-06T11:48:09+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/indian-apt-sloppy-lemming-attacks-defense-and-critical-infrastructure</loc><lastmod>2026-03-06T09:41:11+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chinas-silver-dragon-topples-governments-in-eu-and-southeast-asia</loc><lastmod>2026-03-05T14:56:52+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/why-call-this-number-toad-emails-beat-gateways</loc><lastmod>2026-03-05T13:48:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/rogue--next-js-repositories-go-after-developers-using-bogus-job-interviews</loc><lastmod>2026-03-05T11:44:30+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/seizure-of-the-ramp-forum-disrupts-the-ransomware-underworld</loc><lastmod>2026-03-05T09:58:16+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/vulnerabilities-in-claudes-software-could-compromise-developers-systems</loc><lastmod>2026-03-04T17:53:39+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/darktrace-identifies-32-million-phishing-emails-in-2025-amid-rising-identity-attacks</loc><lastmod>2026-03-04T13:55:45+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/aeternum-botnet-moves-command-control-to-polygon-blockchain</loc><lastmod>2026-03-04T11:50:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/project-compass-targets-the-com-30-cybercrime-gang-members-arrested</loc><lastmod>2026-03-04T09:06:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/uk-service-reduces-unresolved-security-flaws-by-75-through-vulnerability-monitoring</loc><lastmod>2026-03-03T13:46:01+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/north-koreas-apt37-enhances-tools-to-infiltrate-air-gapped-networks</loc><lastmod>2026-03-03T10:39:24+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ransomware-payments-drop-8-despite-50-increase-in-attacks</loc><lastmod>2026-03-02T13:12:19+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/clawjacked-exploit-allows-secret-ai-agent-takeover</loc><lastmod>2026-03-02T12:55:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/hybrid-conflict-in-the-middle-east-sparks-global-cyber-activity-surge</loc><lastmod>2026-03-02T11:30:42+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/google-threat-intel-chief-warns-of-global-cyber-attacks-from-iran</loc><lastmod>2026-03-02T09:08:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chrome-announces-quantum-safe-https-certificate-plan</loc><lastmod>2026-03-01T11:05:39+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/iranian-cyber-group-launches-ai-driven-attack-on-iraqi-government-officials</loc><lastmod>2026-03-01T10:42:15+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/massive-shadow-layer-of-organizations-targeted-in-supply-chain-attacks</loc><lastmod>2026-02-28T15:10:46+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/half-of-us-cisos-work-equivalent-to-six-days-a-week</loc><lastmod>2026-02-28T14:08:29+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/leaked-database-reveals-iranian-evasion-of-crypto-sanctions</loc><lastmod>2026-02-28T12:06:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cloudflare-warns-ai-and-deepfakes-amplify-advanced-cyber-attacks</loc><lastmod>2026-02-28T09:53:23+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/israel-redalert-spyware-targets-wartime-fear-using-trojanized-app</loc><lastmod>2026-02-27T11:46:07+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/push-for-global-digital-estate-standard-as-posthumous-deepfake-fraud-risk-increases</loc><lastmod>2026-02-27T10:14:03+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ukraine-targeted-by-multi-stage-badpaw-malware-campaign</loc><lastmod>2026-02-26T17:02:19+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/meta-ai-in-whatsapp-structures-chats-raises-privacy-concerns</loc><lastmod>2026-02-26T13:24:19+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ipfire-releases-200th-core-update-featuring-new-domain-blocklist-and-kernel-upgrade</loc><lastmod>2026-02-26T10:02:07+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybersecurity-positions-open-as-of-march-3-2026</loc><lastmod>2026-02-25T17:30:34+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/five-years-of-changing-cybersecurity-practices</loc><lastmod>2026-02-25T14:11:45+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/healthcare-groups-embrace-cyber-risk-to-reduce-expenses</loc><lastmod>2026-02-25T13:16:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ais-shift-from-assistant-to-autonomous-actor-outpaced-security-measures</loc><lastmod>2026-02-24T17:40:31+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/march-2026-android-security-update-addresses-100-vulnerabilities-including-one-actively-exploited</loc><lastmod>2026-02-24T15:57:39+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/anthropic-attracts-users-from-competing-chatbots-with-simpler-migration</loc><lastmod>2026-02-24T14:39:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/new-defender-tool-simplifies-windows-device-onboarding-with-one-executable</loc><lastmod>2026-02-24T11:52:24+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/100-device-tracks-cars-via-tire-sensors</loc><lastmod>2026-02-23T15:11:57+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cloudflare-analyzed-230-billion-daily-threats-heres-what-they-discovered</loc><lastmod>2026-02-23T10:30:10+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/hackers-exploit-oauth-redirection-to-spread-malware</loc><lastmod>2026-02-22T16:59:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/coruna-advanced-ios-exploit-kit-fueling-financial-crime</loc><lastmod>2026-02-22T15:13:50+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/industrial-ai-demands-robust-cybersecurity-for-entry</loc><lastmod>2026-02-22T11:30:44+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/addressing-workforce-identity-vulnerabilities-and-solutions</loc><lastmod>2026-02-21T15:22:38+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/mquire-open-source-tool-for-linux-memory-forensics</loc><lastmod>2026-02-21T13:34:03+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cybersecurity-experts-face-burnout-from-excessive-weekly-overtime</loc><lastmod>2026-02-21T09:03:55+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/nitrux-600-linux-distro-introduces-gpu-passthrough-boot-recovery-and-c-update-system</loc><lastmod>2026-02-20T17:42:17+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/google-accelerates-chrome-updates-with-a-new-security-focused-release-cycle</loc><lastmod>2026-02-20T12:25:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/the-flaw-that-makes-your-ai-agent-betray-you</loc><lastmod>2026-02-19T14:55:22+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/cisa-outlines-key-principles-for-strong-cybersecurity-and-risk-management</loc><lastmod>2026-02-19T13:47:51+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/protecting-retails-trillion-dollar-season-how-cybercriminals-target-holiday-shopping-pressure</loc><lastmod>2026-02-19T10:11:52+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/is-your-earbud-your-biggest-security-risk</loc><lastmod>2026-02-18T12:54:31+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/the-years-riskiest-six-weeks</loc><lastmod>2026-02-18T11:36:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ais-role-in-cybercrime-economics-and-adapting-defense-strategies</loc><lastmod>2026-02-18T09:26:09+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ai-security-focused-on-human-element</loc><lastmod>2026-02-17T17:35:55+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/understanding-agentic-ai-security-a-complex-challenge-for-hyper-scalers</loc><lastmod>2026-02-17T14:29:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/compliance-theater-how-cybersecuritys-beloved-tragedy-is-letting-us-down</loc><lastmod>2026-02-17T13:54:49+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/why-you-should-transition-away-from-legacy-access-control-systems</loc><lastmod>2026-02-17T10:56:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/new-ai-executive-order-shifts-security-responsibilities-to-users-and-organizations</loc><lastmod>2026-02-16T16:51:28+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/protecting-executives-with-strategic-planning-and-online-presence-management</loc><lastmod>2026-02-16T12:48:49+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/robust-privacy-needs-robust-security-and-genai-increases-the-challenge</loc><lastmod>2026-02-16T11:06:20+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/2026-security-trends-how-leaders-can-navigate-an-interconnected-risk-landscape</loc><lastmod>2026-02-16T10:14:17+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/what-organizations-must-know-about-breaches-before-and-after-they-occur</loc><lastmod>2026-02-15T12:01:07+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/shadow-ai-the-hidden-insider-risk</loc><lastmod>2026-02-15T11:10:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/valentines-day-2026-exploring-the-mass-scale-romance-scam-industry</loc><lastmod>2026-02-15T10:32:59+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/olympics-go-mobile-update-your-security-strategy</loc><lastmod>2026-02-14T13:01:13+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ai-created-image-harm-is-emerging-as-a-security-concern-organizations-need-to-prepare</loc><lastmod>2026-02-14T10:02:32+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/can-an-ai-pentester-be-trusted-to-operate-independently</loc><lastmod>2026-02-13T16:50:49+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/aws-transforms-security-hub-into-a-multi-domain-security-platform</loc><lastmod>2026-02-13T15:58:26+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/nick-andersen-named-acting-cisa-director</loc><lastmod>2026-02-12T14:40:25+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/months-after-hack-madison-square-garden-confirms-data-breach</loc><lastmod>2026-02-12T10:43:18+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/openclaw-flaw-let-websites-take-over-ai-agents</loc><lastmod>2026-02-12T09:53:34+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/chromes-gemini-live-ai-assistant-vulnerable-to-hijacking</loc><lastmod>2026-02-11T15:46:01+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/scientists-discover-technique-to-monitor-cars-using-tire-sensors</loc><lastmod>2026-02-11T12:26:54+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/ms-agent-ai-framework-flaw-could-lead-to-complete-system-compromise</loc><lastmod>2026-02-10T16:10:58+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/iran-cyber-front-hacktivist-activity-surges-state-sponsored-attacks-remain-minimal</loc><lastmod>2026-02-10T14:23:42+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/android-update-fixes-exploited-qualcomm-zero-day-vulnerability</loc><lastmod>2026-02-10T10:42:22+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/university-of-hawaii-cancer-center-data-breach-impacts-12-million-individuals</loc><lastmod>2026-02-09T17:25:04+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/new-airsnitch-attack-reveals-wi-fi-client-isolation-may-offer-false-security</loc><lastmod>2026-02-09T15:39:26+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/quantum-decryption-of-rsa-nearer-than-anticipated</loc><lastmod>2026-02-09T14:46:47+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/honeywell-and-researcher-dispute-building-controller-vulnerability-impact</loc><lastmod>2026-02-08T16:28:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/fig-security-debuts-with-38-million-to-strengthen-secops-resilience</loc><lastmod>2026-02-08T12:25:27+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/iranian-attacks-on-amazon-data-centers-expose-industrys-susceptibility-to-physical-disasters</loc><lastmod>2026-02-08T11:07:49+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/vmware-aria-operations-flaw-actively-exploited</loc><lastmod>2026-02-07T17:52:24+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/severe-freescout-flaw-results-in-complete-server-breach</loc><lastmod>2026-02-07T09:09:56+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/global-group-releases-6g-security-and-resilience-guidelines</loc><lastmod>2026-02-06T15:13:26+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/google-sets-biweekly-release-schedule-for-chrome</loc><lastmod>2026-02-06T12:28:41+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/anthropic-stands-firm-against-pentagon-on-ai-safeguards-as-deadline-approaches</loc><lastmod>2026-02-06T11:45:00+00:00</lastmod></url><url><loc>https://unsurfaced.com/article/lastpass-alerts-users-to-new-phishing-threat</loc><lastmod>2026-02-06T09:35:06+00:00</lastmod></url></urlset>
