<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://1898advisories.burnsmcd.com/rockwell-automation-logix-products-actively-exploited-authentication-bypass-via-insufficiently-protected-cryptographic-key</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/high-impact-asp.net-security-feature-bypass-cve-2025-55315-confidentiality-and-integrity-risks-for-iis-and-sharepoint-environments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-ivanti-connect-secure-exploited-by-spawnchimera-malware</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-ami-megarac-bmc-software-cve-2024-54085</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-03-19</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-php-vulnerability-active-exploitation-global-impact-and-mitigation-strategies</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/Cyberthreat-Advisories-Header.jpg</image:loc><image:caption>1898ampCoCyberthreatAdvisoriesBlog</image:caption><image:title>CyberthreatAdvisoriesHeader</image:title></image:image><lastmod>2024-12-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-denial-of-service-vulnerability-in-palo-alto-networks-pan-os</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-threats-in-renewable-energy-infrastructure-rogue-communication-devices-in-chinese-inverters</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-05-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/zyxel-usg-flex-h-series-vulnerabilities-privilege-escalation-and-file-system-exploits</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-react-vulnerability-immediate-action-required-to-mitigate-remote-code-execution-risk</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-12-08</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-chrome-vulnerability-exploited-in-the-wild-immediate-update-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/perfektblue-vulnerabilities-in-opensynergys-bluesdk-bluetooth-stack</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-07-29</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/mongobleed-vulnerability-critical-threat-to-mongodb-instances</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/fortinet-fortigate-saml-authentication-bypass-vulnerabilities-actively-exploited-in-targeted-network-intrusions</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-gladinet-centrestack-and-triofox-immediate-update-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-nvidia-vulnerabilities-in-ai-workloads-and-container-environments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-apache-http-server-cve-2024-38475</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-05-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-veeam-backup-replication-software</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-secure-boot-bypass-vulnerabilities-cve-2025-3052-and-cve-2025-4275</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/urgent-mitigation-required-for-cisco-asa-and-ftd-zero-day-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-09-30</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-ios-xr-software-cli-privilege-escalation-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-snmp-vulnerability-high-severity-flaw-in-ios-and-ios-xe-software</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-09-30</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/multiple-vulnerabilities-in-palo-alto-networks-virtual-ngfw-on-siemens-ruggedcom-ape1808-devices</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-erlang/otp-ssh-implementation-cve-2025-32433</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-23</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-exploit-chain-in-fortiweb-critical-vulnerabilities-and-mitigation-strategies</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-11-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-windows-remote-desktop-services-remote-code-execution-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/unauthenticated-information-disclosure-in-web-server-of-simatic-s7-1500-cpus</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-mobatime-network-master-clock-affects-key-sectors</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-01-08</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-cross-site-scripting-vulnerability-in-vmware-aria-automation</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exploitation-of-zero-day-vulnerabilities-in-citrix-and-cisco-systems</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/f5-big-ip-breach-widespread-exposure-and-supply-chain-risks-following-nation-state-attack</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/openssh-vulnerabilities-mitm-and-dos-threats-identified-and-mitigated</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-02-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-exploitation-of-ivanti-vpn-vulnerability-by-advanced-persistent-threat-group</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-03</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-myscada-mypro-pose-significant-risks-to-industrial-control-systems</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-03-20</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vmware-vcenter-and-nsx-vulnerabilities-immediate-action-recommended</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-09-30</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-sysaid-it-support-software-immediate-update-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-next.js-framework-cve-2025-29927</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-03-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-ingress-nginx-controller-for-kubernetes</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-03-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/fast-flux-a-persistent-cybersecurity-threat</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-zero-day-vulnerabilities-in-windows-bitlocker-expose-encrypted-data</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-08-28</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-n8n-workflow-automation-platform</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-gladinet-centrestack-exploited-in-the-wild</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-stored-cross-site-scripting-vulnerability-in-siemens-simatic-s7-1500-programmable-logic-controllers</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/high-severity-vulnerability-in-moxa-network-devices</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-02</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-cisco-secure-firewall-management-center-software</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-08-28</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-and-high-vulnerabilities-in-codesys-components-bundled-with-festo-automation-suite</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-23</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exploitation-of-critical-authentication-bypasses-in-fortinet-fortigate-devices</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-fortras-goanywhere-mft-software</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-cisco-identity-services-engine-ise-cloud-deployments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/mitsubishi-electric-high-severity-denial-of-service-vulnerability-in-melsec-iq-f-series-fx5-eip-ethernet/ip-module</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-choco-tei-watcher-mini-devices-pose-significant-risks-to-industrial-environments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-03</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-citrix-netscaler-adc/gateway-immediate-action-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-08-29</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/frostygoop-malware-attacks-ot-environments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-hpe-oneview-software-immediate-action-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/rockwell-automation-factorytalk-assetcentre-critical-credential-and-encryption-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/recent-reports-have-highlighted-multiple-unpatched-vulnerabilities-in-ruckus-wireless-management-products-specifically-affecting-the-virtual-smartzone-vsz-and-ru-1752503614455</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-07-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-threats-in-openplc-scadabr-and-oast-exploit-operations</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-12-08</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-palo-alto-networks-virtual-ngfw</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/countering-chinese-state-sponsored-cyber-threats</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-08-29</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-trend-micro-apex-one-management-console</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-08-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/splunk-enterprise-remote-code-execution-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-directory-domain-services-elevation-of-privilege-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-threats-in-sap-netweaver-exploitation-of-new-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/operation-epic-fury-anticipated-iranian-cyber-counteroffensive-operations-targeting-critical-infrastructure-and-government-entities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-fortisiem-and-fortifone-immediate-updates-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-remote-code-execution-vulnerability-in-langflow-ai-platform</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-26</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-winrar-vulnerability-actively-exploited-by-romcom-malware</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-08-28</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-n8n-workflow-automation-platform</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/sonicwall-firewall-vulnerability-exploited-following-poc-release</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-02-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-netscaler-vulnerabilities-enable-unauthenticated-data-leakage-and-session-hijacking</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-exchange-server-hybrid-deployments</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-08-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-exploitation-of-ivanti-endpoint-manager-mobile-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-09-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-windows-vulnerability-cve-2025-24054-active-exploitation-and-mitigation-strategies</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/remote-command-execution-vulnerability-in-rockwell-automation-verve-asset-manager</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-docker-desktop-for-windows-and-macos</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-08-28</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/fortijump-vulnerability-confirmed-by-fortinet</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-01-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-citrix-netscaler-appliances-immediate-action-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-07-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-fortinet-products-authentication-bypass-risk</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-palo-alto-networks-globalprotect-vpn</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-07-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-veeam-backup-replication-software-1</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-brocade-fabric-os-cve-2025-1976</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-05-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exploitation-of-windows-clfs-vulnerability-by-ransomexx-ransomware-gang</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-7-zip-symlink-vulnerabilities-enable-path-traversal-and-remote-code-execution</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-servicenow-ai-platform</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/zoom-workplace-apps-vulnerabilities-critical-security-risks-and-mitigation-strategies</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-06-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-pan-os-management-interface-and-other-palo-alto-networks-products</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-02-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-exploitation-of-windows-remote-access-connection-manager-zero-day-cve-2025-59230</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/rockwell-automation-factorytalk-view-site-edition-local-privilege-escalation-and-code-injection-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exploitation-of-critical-rce-vulnerability-in-wing-ftp-server</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-07-31</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/schneider-electric-plant-it/brewmaxx-multiple-redis-lua-engine-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-03-27</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-webex-app-client-side-remote-code-execution-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-siemens-industrial-edge-devices-cve-2024-54092</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-threats-in-fortinet-firewalls-authentication-bypass-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-02-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-zero-day-vulnerability-in-cisco-asyncos-software-exploited-by-apt-group</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-oracle-identity-manager-exploited-in-the-wild</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-11-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-patched-in-splunk-products-immediate-updates-recommended</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-03-27</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-apache-tomcat-cve-2025-24813</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-03</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/johnson-controls-critical-pre-authentication-vulnerabilities-in-frick-controls-quantum-hd-industrial-refrigeration-controller</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-commvault-command-center-cve-2025-34028</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-25</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-vulnerabilities-medium-severity-flaws-in-ise-and-snort-4</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-fortinet-ngfw-and-siemens-systems</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-apache-roller-software-immediate-action-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-threats-in-siemens-simatic-pcs-neo-insufficient-session-expiration-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-05-16</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exposing-the-homoglyph-hustle-a-covert-channel-threat-in-desktop-applications</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-cisco-ise-and-papercut-software-demand-immediate-attention</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-07-31</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/cisco-vulnerabilities-medium-severity-flaws-in-ise-and-snort-3</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-wordpress-theme-exploited-for-site-takeovers</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-08-11</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-zero-day-vulnerability-in-fortinet-products-immediate-action-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/rockwell-automation-factorytalk-view-machine-edition-critical-remote-code-execution-and-local-privilege-escalation-vulnerabilities</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-10</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-exploitation-of-fortinet-fortiweb-path-traversal-vulnerability</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/active-exploitation-of-crushftp-vulnerability</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-04-02</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-lantronix-xport-threatens-industrial-infrastructure</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-04-23</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-sql-injection-vulnerability-in-fortiweb-immediate-update-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-07-29</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-vmware-esxi-exposes-over-37000-servers-to-active-exploitation</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-03-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/emerging-zero-day-exploits-in-craft-cms-and-active-mail-critical-vulnerabilities-and-mitigation-strategies</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-05-06</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerability-in-cisco-ios-xe-wireless-controller</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/critical-vulnerabilities-in-sonicwall-sma-100-series-appliances</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2026-01-09</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/regpwn-windows-accessibility-infrastructure-registry-vulnerability-enables-full-system-compromise</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://1898advisories.burnsmcd.com/exploitation-of-trimble-cityworks-vulnerability-urgent-patch-required</loc><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898-logo-grey-R-1.webp</image:loc><image:caption>1898logogreyR1</image:caption><image:title>1898logogreyR1</image:title></image:image><image:image><image:loc>https://1936845.fs1.hubspotusercontent-na1.net/hubfs/1936845/1898%20Cyberthreat%20Advisory%20Blog%20Assets/1898-Co-Ampersand.png</image:loc><image:caption>1898CoAmpersand</image:caption><image:title>1898CoAmpersand</image:title></image:image><lastmod>2025-02-10</lastmod></url></urlset>