<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://threatbook.io/use-case/attack-surface-management</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/product/threatbook-onedns</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Website%20Images/OneDNSHero.png</image:loc><image:caption>OneDNSHero</image:caption><image:title>OneDNSHero</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/siem-alert-triage</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/press-releases</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ATILaunch_2025_Featured_Image.png</image:loc><image:caption>ATILaunch2025FeaturedImage</image:caption><image:title>ATILaunch2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook%20Launches%20Disruptive%20AI-Native%20Agentic%20SecOps%20Platform%2c%20AI%20Agent%20Skills%20Security%20Platform%2c%20Amid%20Brand%20Relaunch.png</image:loc><image:caption>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:caption><image:title>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://threatbook.io/blog/why-were-becoming-the-agentic-company</loc><image:image><image:loc>https://threatbook.io/hubfs/featured-image-ceo-forward-looking.png</image:loc><image:caption>featuredimageceoforwardlooking</image:caption><image:title>featuredimageceoforwardlooking</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Introducing-ATI-Featured-Image.png</image:loc><image:caption>IntroducingATIFeaturedImage</image:caption><image:title>IntroducingATIFeaturedImage</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Authors/Ted%20Xiong-1.png</image:loc><image:caption>TedXiong1</image:caption><image:title>TedXiong1</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Authors/Xue%20Feng-1.png</image:loc><image:caption>XueFeng1</image:caption><image:title>XueFeng1</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Threat%20Intelligence%2c%20DRPS%2c%20and%20EASM.png</image:loc><image:caption>ThreatIntelligenceDRPSandEASM</image:caption><image:title>ThreatIntelligenceDRPSandEASM</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/featured-image-nick-rebrand.png</image:loc><image:caption>featuredimagenickrebrand</image:caption><image:title>featuredimagenickrebrand</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/incident-response</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/agentic-security-is-the-architecture-decision</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Xue%20Feng-1.png</image:loc><image:caption>XueFeng1</image:caption><image:title>XueFeng1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Gartner_ThreatBook_EPP_StrongPerformer_251022.png</image:loc><image:caption>GartnerThreatBookEPPStrongPerformer251022</image:caption><image:title>GartnerThreatBookEPPStrongPerformer251022</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/featured-image-nick-rebrand.png</image:loc><image:caption>featuredimagenickrebrand</image:caption><image:title>featuredimagenickrebrand</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/featured-image-ceo-forward-looking.png</image:loc><image:caption>featuredimageceoforwardlooking</image:caption><image:title>featuredimageceoforwardlooking</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/acceptable-use-policy</loc><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/terms-of-service</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://threatbook.io/use-case/ransomware</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/solution/telco</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/press-releases/threatbook-launches-disruptive-ai-native-agentic-secops-platform-ai-agent-skills-security-platform-amid-brand-relaunch</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ATILaunch_2025_Featured_Image.png</image:loc><image:caption>ATILaunch2025FeaturedImage</image:caption><image:title>ATILaunch2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook%20Launches%20Disruptive%20AI-Native%20Agentic%20SecOps%20Platform%2c%20AI%20Agent%20Skills%20Security%20Platform%2c%20Amid%20Brand%20Relaunch.png</image:loc><image:caption>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:caption><image:title>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/zero-day-detection</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/ai-governance</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/when-security-tools-get-compromised-the-litellm-supply-chain-poisoning-incident</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-34-18-2653-AM.png</image:loc><image:caption>undefinedMar2520260734182653AM</image:caption><image:title>undefinedMar2520260734182653AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-33-45-3938-AM.png</image:loc><image:caption>undefinedMar2520260733453938AM</image:caption><image:title>undefinedMar2520260733453938AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-30-54-4463-AM.png</image:loc><image:caption>undefinedMar2520260730544463AM</image:caption><image:title>undefinedMar2520260730544463AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20LiteLLM%20Supply%20Chain%20Poisoning%20Incident.jpg</image:loc><image:caption>TheLiteLLMSupplyChainPoisoningIncident</image:caption><image:title>TheLiteLLMSupplyChainPoisoningIncident</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-31-20-7413-AM.png</image:loc><image:caption>undefinedMar2520260731207413AM</image:caption><image:title>undefinedMar2520260731207413AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-30-44-3767-AM.png</image:loc><image:caption>undefinedMar2520260730443767AM</image:caption><image:title>undefinedMar2520260730443767AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-3-1.png</image:loc><image:caption>undefined31</image:caption><image:title>undefined31</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-33-22-9301-AM.png</image:loc><image:caption>undefinedMar2520260733229301AM</image:caption><image:title>undefinedMar2520260733229301AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-33-56-0891-AM.png</image:loc><image:caption>undefinedMar2520260733560891AM</image:caption><image:title>undefinedMar2520260733560891AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-34-21-6409-AM.png</image:loc><image:caption>undefinedMar2520260734216409AM</image:caption><image:title>undefinedMar2520260734216409AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-31-30-1388-AM.png</image:loc><image:caption>undefinedMar2520260731301388AM</image:caption><image:title>undefinedMar2520260731301388AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Apr-09-2026-09-14-01-7068-AM.png</image:loc><image:caption>imagepngApr0920260914017068AM</image:caption><image:title>imagepngApr0920260914017068AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/blog-banner-v2.jpg</image:loc><image:caption>blogbannerv2</image:caption><image:title>blogbannerv2</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-30-34-7226-AM.png</image:loc><image:caption>undefinedMar2520260730347226AM</image:caption><image:title>undefinedMar2520260730347226AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-29-21-0630-AM.png</image:loc><image:caption>undefinedMar2520260729210630AM</image:caption><image:title>undefinedMar2520260729210630AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-2-1.png</image:loc><image:caption>undefined21</image:caption><image:title>undefined21</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-1-1.png</image:loc><image:caption>imagepng11</image:caption><image:title>imagepng11</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-34-10-5899-AM.png</image:loc><image:caption>undefinedMar2520260734105899AM</image:caption><image:title>undefinedMar2520260734105899AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-4-1.png</image:loc><image:caption>undefined41</image:caption><image:title>undefined41</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-30-03-0116-AM.png</image:loc><image:caption>undefinedMar2520260730030116AM</image:caption><image:title>undefinedMar2520260730030116AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/undefined-1.png</image:loc><image:caption>undefined1</image:caption><image:title>undefined1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-34-01-5736-AM.png</image:loc><image:caption>undefinedMar2520260734015736AM</image:caption><image:title>undefinedMar2520260734015736AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-25-2026-07-35-16-9111-AM.png</image:loc><image:caption>undefinedMar2520260735169111AM</image:caption><image:title>undefinedMar2520260735169111AM</image:title></image:image><lastmod>2026-03-25</lastmod></url><url><loc>https://threatbook.io/use-case/apac-threat-visibility</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/threat-intelligence-drps-and-easm-a-practical-guide</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Incorrect_Mental_Model-CTI.png</image:loc><image:caption>IncorrectMentalModelCTI</image:caption><image:title>IncorrectMentalModelCTI</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Threat%20Intelligence%2c%20DRPS%2c%20and%20EASM.png</image:loc><image:caption>ThreatIntelligenceDRPSandEASM</image:caption><image:title>ThreatIntelligenceDRPSandEASM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Commercial_Threat_Intel.png</image:loc><image:caption>CommercialThreatIntel</image:caption><image:title>CommercialThreatIntel</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/External_Security_Disciplines.png</image:loc><image:caption>ExternalSecurityDisciplines</image:caption><image:title>ExternalSecurityDisciplines</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20AI%20Tools%20Your%20Security%20Team%20Doesnt%20Know%20Are%20Running.jpeg</image:loc><image:caption>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:caption><image:title>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://threatbook.io/product/threatbook-safeskill</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog</loc><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/ta558-banner.jpg</image:loc><image:caption>ta558banner</image:caption><image:title>ta558banner</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/The%20AI%20Tools%20Your%20Security%20Team%20Doesnt%20Know%20Are%20Running.jpeg</image:loc><image:caption>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:caption><image:title>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Authors/Xue%20Feng-1.png</image:loc><image:caption>XueFeng1</image:caption><image:title>XueFeng1</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/featured-image-ceo-forward-looking.png</image:loc><image:caption>featuredimageceoforwardlooking</image:caption><image:title>featuredimageceoforwardlooking</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Axios%20on%20npm%20Backdoored%20with%20Cross-Platform%20RAT.jpg</image:loc><image:caption>AxiosonnpmBackdooredwithCrossPlatformRAT</image:caption><image:title>AxiosonnpmBackdooredwithCrossPlatformRAT</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/The%20LiteLLM%20Supply%20Chain%20Poisoning%20Incident.jpg</image:loc><image:caption>TheLiteLLMSupplyChainPoisoningIncident</image:caption><image:title>TheLiteLLMSupplyChainPoisoningIncident</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/featured-image-nick-rebrand.png</image:loc><image:caption>featuredimagenickrebrand</image:caption><image:title>featuredimagenickrebrand</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://threatbook.io</loc><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/ta558-banner.jpg</image:loc><image:caption>ta558banner</image:caption><image:title>ta558banner</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/Logo-ThreatBook-SafeSkill.png</image:loc><image:caption>LogoThreatBookSafeSkill</image:caption><image:title>LogoThreatBookSafeSkill</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Axios%20on%20npm%20Backdoored%20with%20Cross-Platform%20RAT.jpg</image:loc><image:caption>AxiosonnpmBackdooredwithCrossPlatformRAT</image:caption><image:title>AxiosonnpmBackdooredwithCrossPlatformRAT</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/Logo-ThreatBook-DRPS.png</image:loc><image:caption>LogoThreatBookDRPS</image:caption><image:title>LogoThreatBookDRPS</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/Logo-ThreatBook-OneDNS.png</image:loc><image:caption>LogoThreatBookOneDNS</image:caption><image:title>LogoThreatBookOneDNS</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/Logo-ThreatBook-ATI.png</image:loc><image:caption>LogoThreatBookATI</image:caption><image:title>LogoThreatBookATI</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/Logo-ThreatBook-TDP.png</image:loc><image:caption>LogoThreatBookTDP</image:caption><image:title>LogoThreatBookTDP</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><lastmod>2026-05-06</lastmod></url><url><loc>https://threatbook.io/blog/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uzbekistan</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-014.png</image:loc><image:caption>articleimg014</image:caption><image:title>articleimg014</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-015.png</image:loc><image:caption>articleimg015</image:caption><image:title>articleimg015</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-002.png</image:loc><image:caption>articleimg002</image:caption><image:title>articleimg002</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-011.png</image:loc><image:caption>articleimg011</image:caption><image:title>articleimg011</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-003.png</image:loc><image:caption>articleimg003</image:caption><image:title>articleimg003</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-013.png</image:loc><image:caption>articleimg013</image:caption><image:title>articleimg013</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-017.png</image:loc><image:caption>articleimg017</image:caption><image:title>articleimg017</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-005.png</image:loc><image:caption>articleimg005</image:caption><image:title>articleimg005</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-012.png</image:loc><image:caption>articleimg012</image:caption><image:title>articleimg012</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Axios%20on%20npm%20Backdoored%20with%20Cross-Platform%20RAT.jpg</image:loc><image:caption>AxiosonnpmBackdooredwithCrossPlatformRAT</image:caption><image:title>AxiosonnpmBackdooredwithCrossPlatformRAT</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-016.png</image:loc><image:caption>articleimg016</image:caption><image:title>articleimg016</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-004.png</image:loc><image:caption>articleimg004</image:caption><image:title>articleimg004</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-001.png</image:loc><image:caption>articleimg001</image:caption><image:title>articleimg001</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-007.png</image:loc><image:caption>articleimg007</image:caption><image:title>articleimg007</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-006.png</image:loc><image:caption>articleimg006</image:caption><image:title>articleimg006</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-010.png</image:loc><image:caption>articleimg010</image:caption><image:title>articleimg010</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/blog-banner-v2.jpg</image:loc><image:caption>blogbannerv2</image:caption><image:title>blogbannerv2</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-008.png</image:loc><image:caption>articleimg008</image:caption><image:title>articleimg008</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/article-img-009.png</image:loc><image:caption>articleimg009</image:caption><image:title>articleimg009</image:title></image:image><lastmod>2026-04-14</lastmod></url><url><loc>https://threatbook.io/press-releases/threatbook-strong-performer-2025-gartner-peer-insights</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ATILaunch_2025_Featured_Image.png</image:loc><image:caption>ATILaunch2025FeaturedImage</image:caption><image:title>ATILaunch2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GPI_ReviewSnippet_192202_12112025%20(1).png</image:loc><image:caption>GPIReviewSnippet192202121120251</image:caption><image:title>GPIReviewSnippet192202121120251</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GPI_ReviewSnippet_192669_12112025.png</image:loc><image:caption>GPIReviewSnippet19266912112025</image:caption><image:title>GPIReviewSnippet19266912112025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><lastmod>2025-11-13</lastmod></url><url><loc>https://threatbook.io/request-demo</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/singapores-cyber-threat-landscape-inside-the-2025-data</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Hong%20Kong%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>HongKongCyberThreatLandscape2025</image:caption><image:title>HongKongCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/ta558-banner.jpg</image:loc><image:caption>ta558banner</image:caption><image:title>ta558banner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><lastmod>2026-03-15</lastmod></url><url><loc>https://threatbook.io/blog/ta558-uses-steganography-to-launch-global-cyberattacks</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-003.png</image:loc><image:caption>articleimg003</image:caption><image:title>articleimg003</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-020.png</image:loc><image:caption>articleimg020</image:caption><image:title>articleimg020</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-007.png</image:loc><image:caption>articleimg007</image:caption><image:title>articleimg007</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-018.png</image:loc><image:caption>articleimg018</image:caption><image:title>articleimg018</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-023.png</image:loc><image:caption>articleimg023</image:caption><image:title>articleimg023</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-021.png</image:loc><image:caption>articleimg021</image:caption><image:title>articleimg021</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-011.png</image:loc><image:caption>articleimg011</image:caption><image:title>articleimg011</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-014.png</image:loc><image:caption>articleimg014</image:caption><image:title>articleimg014</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/suspected-north-korea-linked-hackers-conduct-targeted-attack-campaign-against-uz/blog-banner-v2.jpg</image:loc><image:caption>blogbannerv2</image:caption><image:title>blogbannerv2</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-005.png</image:loc><image:caption>articleimg005</image:caption><image:title>articleimg005</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-017.png</image:loc><image:caption>articleimg017</image:caption><image:title>articleimg017</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-016.png</image:loc><image:caption>articleimg016</image:caption><image:title>articleimg016</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-004.png</image:loc><image:caption>articleimg004</image:caption><image:title>articleimg004</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-006.png</image:loc><image:caption>articleimg006</image:caption><image:title>articleimg006</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-001.png</image:loc><image:caption>articleimg001</image:caption><image:title>articleimg001</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-019.png</image:loc><image:caption>articleimg019</image:caption><image:title>articleimg019</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-015.png</image:loc><image:caption>articleimg015</image:caption><image:title>articleimg015</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-012.png</image:loc><image:caption>articleimg012</image:caption><image:title>articleimg012</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-013.png</image:loc><image:caption>articleimg013</image:caption><image:title>articleimg013</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/blog-banner.jpg</image:loc><image:caption>blogbanner</image:caption><image:title>blogbanner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-008.png</image:loc><image:caption>articleimg008</image:caption><image:title>articleimg008</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-024.png</image:loc><image:caption>articleimg024</image:caption><image:title>articleimg024</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-025.png</image:loc><image:caption>articleimg025</image:caption><image:title>articleimg025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-002.png</image:loc><image:caption>articleimg002</image:caption><image:title>articleimg002</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-010.png</image:loc><image:caption>articleimg010</image:caption><image:title>articleimg010</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-022.png</image:loc><image:caption>articleimg022</image:caption><image:title>articleimg022</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/ta558-banner.jpg</image:loc><image:caption>ta558banner</image:caption><image:title>ta558banner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ta558-uses-steganography-to-launch-global-cyberattacks/article-img-009.png</image:loc><image:caption>articleimg009</image:caption><image:title>articleimg009</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-04-14</lastmod></url><url><loc>https://threatbook.io/solution/manufacturing</loc><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/agentic-soc</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/ai-supply-chain</loc><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://threatbook.io/hubfs/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/introducing-threatbook-ati</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Website%20Images/ATI-2.png</image:loc><image:caption>ATI2</image:caption><image:title>ATI2</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Ted%20Xiong-1.png</image:loc><image:caption>TedXiong1</image:caption><image:title>TedXiong1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Commercial_Threat_Intel.png</image:loc><image:caption>CommercialThreatIntel</image:caption><image:title>CommercialThreatIntel</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Gartner_ThreatBook_EPP_StrongPerformer_251022.png</image:loc><image:caption>GartnerThreatBookEPPStrongPerformer251022</image:caption><image:title>GartnerThreatBookEPPStrongPerformer251022</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Website%20Images/ATI-3.png</image:loc><image:caption>ATI3</image:caption><image:title>ATI3</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ThreatBook%20Overview.png</image:loc><image:caption>ThreatBookOverview</image:caption><image:title>ThreatBookOverview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Website%20Images/ATI-1.png</image:loc><image:caption>ATI1</image:caption><image:title>ATI1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Introducing-ATI-Featured-Image.png</image:loc><image:caption>IntroducingATIFeaturedImage</image:caption><image:title>IntroducingATIFeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><lastmod>2025-09-29</lastmod></url><url><loc>https://threatbook.io/company</loc><video:video><video:thumbnail_loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook%20Brand%20Video_2023.mp4/medium.jpg</video:thumbnail_loc><video:title>ThreatBookBrandVideo2023</video:title><video:description>ThreatBookBrandVideo2023</video:description><video:content_loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook%20Brand%20Video_2023.mp4</video:content_loc><video:duration>72</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Forrester.png</image:loc><image:caption>LogoForrester</image:caption><image:title>LogoForrester</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Gartner.png</image:loc><image:caption>LogoGartner</image:caption><image:title>LogoGartner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Frost-Sullivan.png</image:loc><image:caption>LogoFrostSullivan</image:caption><image:title>LogoFrostSullivan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/phishing-with-google-ads-and-fake-ai-docs-a-criminal-campaign-targeting-the-ai-ecosystem</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-12-17-0557-AM.png</image:loc><image:caption>undefinedMar1320260612170557AM</image:caption><image:title>undefinedMar1320260612170557AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20LiteLLM%20Supply%20Chain%20Poisoning%20Incident.jpg</image:loc><image:caption>TheLiteLLMSupplyChainPoisoningIncident</image:caption><image:title>TheLiteLLMSupplyChainPoisoningIncident</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-10-35-7709-AM.png</image:loc><image:caption>undefinedMar1320260610357709AM</image:caption><image:title>undefinedMar1320260610357709AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-02-07-8481-AM.png</image:loc><image:caption>undefinedMar1320260602078481AM</image:caption><image:title>undefinedMar1320260602078481AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20AI%20Tools%20Your%20Security%20Team%20Doesnt%20Know%20Are%20Running.jpeg</image:loc><image:caption>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:caption><image:title>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-14-18-4945-AM.png</image:loc><image:caption>undefinedMar1320260614184945AM</image:caption><image:title>undefinedMar1320260614184945AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-13-04-7623-AM.png</image:loc><image:caption>undefinedMar1320260613047623AM</image:caption><image:title>undefinedMar1320260613047623AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-14-42-9889-AM.png</image:loc><image:caption>undefinedMar1320260614429889AM</image:caption><image:title>undefinedMar1320260614429889AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-12-52-1101-AM.png</image:loc><image:caption>undefinedMar1320260612521101AM</image:caption><image:title>undefinedMar1320260612521101AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><lastmod>2026-03-20</lastmod></url><url><loc>https://threatbook.io/blog/how-a-malicious-plugin-turned-openclaw-into-a-credential-stealer</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20LiteLLM%20Supply%20Chain%20Poisoning%20Incident.jpg</image:loc><image:caption>TheLiteLLMSupplyChainPoisoningIncident</image:caption><image:title>TheLiteLLMSupplyChainPoisoningIncident</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-30-45-7110-AM.png</image:loc><image:caption>undefinedMar1320260630457110AM</image:caption><image:title>undefinedMar1320260630457110AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-31-01-5588-AM.png</image:loc><image:caption>undefinedMar1320260631015588AM</image:caption><image:title>undefinedMar1320260631015588AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Silver_Fox.png</image:loc><image:caption>SilverFox</image:caption><image:title>SilverFox</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-30-32-8329-AM.png</image:loc><image:caption>undefinedMar1320260630328329AM</image:caption><image:title>undefinedMar1320260630328329AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-31-17-7920-AM.png</image:loc><image:caption>undefinedMar1320260631177920AM</image:caption><image:title>undefinedMar1320260631177920AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-06-31-28-5572-AM.png</image:loc><image:caption>undefinedMar1320260631285572AM</image:caption><image:title>undefinedMar1320260631285572AM</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://threatbook.io/blog/threatbook-strong-performer-2026-gartner-peer-insights-endpoint</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GPI_ReviewSnippet_222382_26022026.png</image:loc><image:caption>GPIReviewSnippet22238226022026</image:caption><image:title>GPIReviewSnippet22238226022026</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/blog-banner.jpg</image:loc><image:caption>blogbanner</image:caption><image:title>blogbanner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Ted%20Xiong-1.png</image:loc><image:caption>TedXiong1</image:caption><image:title>TedXiong1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GPI_ReviewSnippet_220975_26022026.png</image:loc><image:caption>GPIReviewSnippet22097526022026</image:caption><image:title>GPIReviewSnippet22097526022026</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Introducing-ATI-Featured-Image.png</image:loc><image:caption>IntroducingATIFeaturedImage</image:caption><image:title>IntroducingATIFeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Gartner_ThreatBook_EPP_StrongPerformer_251022.png</image:loc><image:caption>GartnerThreatBookEPPStrongPerformer251022</image:caption><image:title>GartnerThreatBookEPPStrongPerformer251022</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><lastmod>2026-02-26</lastmod></url><url><loc>https://threatbook.io/solution/energy</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/product/threatbook-drps</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/use-case/brand-protection</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/product/threatbook-tdp</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook_TDP.png</image:loc><image:caption>ThreatBookTDP</image:caption><image:title>ThreatBookTDP</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/solution/internet-consumer</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/press-releases/threatbook-selected-in-the-first-ever-gartner-magic-quadrant-for-network-detection-and-response-ndr</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook%20Launches%20Disruptive%20AI-Native%20Agentic%20SecOps%20Platform%2c%20AI%20Agent%20Skills%20Security%20Platform%2c%20Amid%20Brand%20Relaunch.png</image:loc><image:caption>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:caption><image:title>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><lastmod>2025-09-12</lastmod></url><url><loc>https://threatbook.io/blog/unknown-group-novel-in-memory-backdoor-central-asia-china</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-016.png</image:loc><image:caption>articleimg016</image:caption><image:title>articleimg016</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-008.png</image:loc><image:caption>articleimg008</image:caption><image:title>articleimg008</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-014.png</image:loc><image:caption>articleimg014</image:caption><image:title>articleimg014</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-018.png</image:loc><image:caption>articleimg018</image:caption><image:title>articleimg018</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-020.png</image:loc><image:caption>articleimg020</image:caption><image:title>articleimg020</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-012.png</image:loc><image:caption>articleimg012</image:caption><image:title>articleimg012</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-021.png</image:loc><image:caption>articleimg021</image:caption><image:title>articleimg021</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20LiteLLM%20Supply%20Chain%20Poisoning%20Incident.jpg</image:loc><image:caption>TheLiteLLMSupplyChainPoisoningIncident</image:caption><image:title>TheLiteLLMSupplyChainPoisoningIncident</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-002.png</image:loc><image:caption>articleimg002</image:caption><image:title>articleimg002</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-011.png</image:loc><image:caption>articleimg011</image:caption><image:title>articleimg011</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-010.png</image:loc><image:caption>articleimg010</image:caption><image:title>articleimg010</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-013.png</image:loc><image:caption>articleimg013</image:caption><image:title>articleimg013</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-009.png</image:loc><image:caption>articleimg009</image:caption><image:title>articleimg009</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/blog-banner.jpg</image:loc><image:caption>blogbanner</image:caption><image:title>blogbanner</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-019.png</image:loc><image:caption>articleimg019</image:caption><image:title>articleimg019</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-003.png</image:loc><image:caption>articleimg003</image:caption><image:title>articleimg003</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-005.png</image:loc><image:caption>articleimg005</image:caption><image:title>articleimg005</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-007.png</image:loc><image:caption>articleimg007</image:caption><image:title>articleimg007</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-001.png</image:loc><image:caption>articleimg001</image:caption><image:title>articleimg001</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-004.png</image:loc><image:caption>articleimg004</image:caption><image:title>articleimg004</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-017.png</image:loc><image:caption>articleimg017</image:caption><image:title>articleimg017</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-022.png</image:loc><image:caption>articleimg022</image:caption><image:title>articleimg022</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-015.png</image:loc><image:caption>articleimg015</image:caption><image:title>articleimg015</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/unknown-group-leverages-novel-in-memory-backdoor-in-targeted-attacks-against-cen/article-img-006.png</image:loc><image:caption>articleimg006</image:caption><image:title>articleimg006</image:title></image:image><lastmod>2026-04-14</lastmod></url><url><loc>https://threatbook.io/privacy-policy</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://threatbook.io/blog/openclaw-users-at-risk-axios-on-npm-backdoored-with-cross-platform-rat</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Axios%20on%20npm%20Backdoored%20with%20Cross-Platform%20RAT.jpg</image:loc><image:caption>AxiosonnpmBackdooredwithCrossPlatformRAT</image:caption><image:title>AxiosonnpmBackdooredwithCrossPlatformRAT</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-05-51-37-6180-AM.png</image:loc><image:caption>undefinedMar3120260551376180AM</image:caption><image:title>undefinedMar3120260551376180AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Silver_Fox.png</image:loc><image:caption>SilverFox</image:caption><image:title>SilverFox</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Hong%20Kong%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>HongKongCyberThreatLandscape2025</image:caption><image:title>HongKongCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download-png.png</image:loc><image:caption>downloadpng</image:caption><image:title>downloadpng</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download%20(1)-png.png</image:loc><image:caption>download1png</image:caption><image:title>download1png</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download%20(5)-png.png</image:loc><image:caption>download5png</image:caption><image:title>download5png</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download%20(3)-png.png</image:loc><image:caption>download3png</image:caption><image:title>download3png</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-2-1.png</image:loc><image:caption>imagepng21</image:caption><image:title>imagepng21</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-05-51-29-9739-AM.png</image:loc><image:caption>undefinedMar3120260551299739AM</image:caption><image:title>undefinedMar3120260551299739AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download%20(4)-png.png</image:loc><image:caption>download4png</image:caption><image:title>download4png</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/download%20(2)-png.png</image:loc><image:caption>download2png</image:caption><image:title>download2png</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://threatbook.io/use-case/apt-hunting</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/lazarus-group-poisons-axios-inside-the-npm-supply-chain-attack</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-37-36-6837-PM.png</image:loc><image:caption>undefinedMar3120260437366837PM</image:caption><image:title>undefinedMar3120260437366837PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-38-59-7676-PM.png</image:loc><image:caption>undefinedMar3120260438597676PM</image:caption><image:title>undefinedMar3120260438597676PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-3-1.png</image:loc><image:caption>imagepng31</image:caption><image:title>imagepng31</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-38-16-0483-PM.png</image:loc><image:caption>undefinedMar3120260438160483PM</image:caption><image:title>undefinedMar3120260438160483PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-38-49-5756-PM.png</image:loc><image:caption>undefinedMar3120260438495756PM</image:caption><image:title>undefinedMar3120260438495756PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-39-14-8010-PM.png</image:loc><image:caption>undefinedMar3120260439148010PM</image:caption><image:title>undefinedMar3120260439148010PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-37-27-5583-PM.png</image:loc><image:caption>undefinedMar3120260437275583PM</image:caption><image:title>undefinedMar3120260437275583PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-39-05-0875-PM.png</image:loc><image:caption>undefinedMar3120260439050875PM</image:caption><image:title>undefinedMar3120260439050875PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-36-53-1718-PM.png</image:loc><image:caption>undefinedMar3120260436531718PM</image:caption><image:title>undefinedMar3120260436531718PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-36-18-2972-PM.png</image:loc><image:caption>undefinedMar3120260436182972PM</image:caption><image:title>undefinedMar3120260436182972PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-38-36-6221-PM.png</image:loc><image:caption>undefinedMar3120260438366221PM</image:caption><image:title>undefinedMar3120260438366221PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-37-10-7043-PM.png</image:loc><image:caption>undefinedMar3120260437107043PM</image:caption><image:title>undefinedMar3120260437107043PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-39-09-8672-PM.png</image:loc><image:caption>undefinedMar3120260439098672PM</image:caption><image:title>undefinedMar3120260439098672PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-37-21-2671-PM.png</image:loc><image:caption>undefinedMar3120260437212671PM</image:caption><image:title>undefinedMar3120260437212671PM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-31-2026-04-36-06-9840-PM.png</image:loc><image:caption>undefinedMar3120260436069840PM</image:caption><image:title>undefinedMar3120260436069840PM</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://threatbook.io/blog/the-ai-tools-your-security-team-doesnt-know-are-running</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Ted%20Xiong-1.png</image:loc><image:caption>TedXiong1</image:caption><image:title>TedXiong1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/WeChatWorkScreenshot_40fad1ab-197b-4b4d-8670-4e44257dd24c-png.png</image:loc><image:caption>WeChatWorkScreenshot40fad1ab197b4b4d86704e44257dd24cpng</image:caption><image:title>WeChatWorkScreenshot40fad1ab197b4b4d86704e44257dd24cpng</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/WeChatWorkScreenshot_613399b9-83f1-4f27-8501-76080e4f739f-png.png</image:loc><image:caption>WeChatWorkScreenshot613399b983f14f27850176080e4f739fpng</image:caption><image:title>WeChatWorkScreenshot613399b983f14f27850176080e4f739fpng</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20AI%20Tools%20Your%20Security%20Team%20Doesnt%20Know%20Are%20Running.jpeg</image:loc><image:caption>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:caption><image:title>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Threat%20Intelligence%2c%20DRPS%2c%20and%20EASM.png</image:loc><image:caption>ThreatIntelligenceDRPSandEASM</image:caption><image:title>ThreatIntelligenceDRPSandEASM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/WeChatWorkScreenshot_7b23cae3-dac1-4953-8cb6-8795e73c7c78-png.png</image:loc><image:caption>WeChatWorkScreenshot7b23cae3dac149538cb68795e73c7c78png</image:caption><image:title>WeChatWorkScreenshot7b23cae3dac149538cb68795e73c7c78png</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Introducing-ATI-Featured-Image.png</image:loc><image:caption>IntroducingATIFeaturedImage</image:caption><image:title>IntroducingATIFeaturedImage</image:title></image:image><lastmod>2026-03-24</lastmod></url><url><loc>https://threatbook.io/product/threatbook-flocks</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/inside-the-attack-complete-technical-breakdown-of-the-ai-ecosystem-threat-campaign</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-3-1.png</image:loc><image:caption>undefined31</image:caption><image:title>undefined31</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20npm%20Supply%20Chain%20Attack.png</image:loc><image:caption>InsidethenpmSupplyChainAttack</image:caption><image:title>InsidethenpmSupplyChainAttack</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/How%20a%20Malicious%20Plugin%20Turned%20OpenClaw%20Into%20a%20Credential%20Stealer.jpeg</image:loc><image:caption>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:caption><image:title>HowaMaliciousPluginTurnedOpenClawIntoaCredentialStealer</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Apr-09-2026-09-14-01-7068-AM.png</image:loc><image:caption>imagepngApr0920260914017068AM</image:caption><image:title>imagepngApr0920260914017068AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-05-52-47-9124-AM.png</image:loc><image:caption>undefinedMar1320260552479124AM</image:caption><image:title>undefinedMar1320260552479124AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-05-51-08-8309-AM.png</image:loc><image:caption>undefinedMar1320260551088309AM</image:caption><image:title>undefinedMar1320260551088309AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Inside%20the%20Attack%20Complete%20Technical%20Breakdown%20of%20the%20AI%20Ecosystem%20Threat%20Campaign.jpeg</image:loc><image:caption>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:caption><image:title>InsidetheAttackCompleteTechnicalBreakdownoftheAIEcosystemThreatCampaign</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/undefined-1.png</image:loc><image:caption>undefined1</image:caption><image:title>undefined1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-05-53-48-2876-AM.png</image:loc><image:caption>undefinedMar1320260553482876AM</image:caption><image:title>undefinedMar1320260553482876AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-2-1.png</image:loc><image:caption>undefined21</image:caption><image:title>undefined21</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-Mar-13-2026-05-53-26-6899-AM.png</image:loc><image:caption>undefinedMar1320260553266899AM</image:caption><image:title>undefinedMar1320260553266899AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/undefined-4-1.png</image:loc><image:caption>undefined41</image:caption><image:title>undefined41</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/undefined.png</image:loc><image:caption>undefined</image:caption><image:title>undefined</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><lastmod>2026-03-20</lastmod></url><url><loc>https://threatbook.io/blog/silver-fox-not-an-organization-but-a-tool-uncovering-the-underground-ecosystem</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-3-1.png</image:loc><image:caption>imagepng31</image:caption><image:title>imagepng31</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-4-1.png</image:loc><image:caption>imagepng41</image:caption><image:title>imagepng41</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Feb-03-2026-07-09-24-2181-AM.png</image:loc><image:caption>imagepngFeb0320260709242181AM</image:caption><image:title>imagepngFeb0320260709242181AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Apr-09-2026-09-14-01-7068-AM.png</image:loc><image:caption>imagepngApr0920260914017068AM</image:caption><image:title>imagepngApr0920260914017068AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Feb-03-2026-06-50-11-4948-AM.png</image:loc><image:caption>imagepngFeb0320260650114948AM</image:caption><image:title>imagepngFeb0320260650114948AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Feb-03-2026-07-05-35-1415-AM.png</image:loc><image:caption>imagepngFeb0320260705351415AM</image:caption><image:title>imagepngFeb0320260705351415AM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-1-1.png</image:loc><image:caption>imagepng11</image:caption><image:title>imagepng11</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-2-1.png</image:loc><image:caption>imagepng21</image:caption><image:title>imagepng21</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Hong%20Kong%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>HongKongCyberThreatLandscape2025</image:caption><image:title>HongKongCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Silver_Fox.png</image:loc><image:caption>SilverFox</image:caption><image:title>SilverFox</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/image-png-Feb-03-2026-08-32-16-7174-AM.png</image:loc><image:caption>imagepngFeb0320260832167174AM</image:caption><image:title>imagepngFeb0320260832167174AM</image:title></image:image><lastmod>2026-03-20</lastmod></url><url><loc>https://threatbook.io/solution/web3</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/solution/government</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/cookie-policy</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://threatbook.io/solution/financial-services</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/hong-kongs-cyber-threat-landscape-inside-the-2025-data</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Silver_Fox.png</image:loc><image:caption>SilverFox</image:caption><image:title>SilverFox</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Singapore%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>SingaporeCyberThreatLandscape2025</image:caption><image:title>SingaporeCyberThreatLandscape2025</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Hong%20Kong%20Cyber%20Threat%20Landscape%202025.png</image:loc><image:caption>HongKongCyberThreatLandscape2025</image:caption><image:title>HongKongCyberThreatLandscape2025</image:title></image:image><lastmod>2026-03-15</lastmod></url><url><loc>https://threatbook.io/resources</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Resource%20Center/Resource%20Thumbnails/2025%20ThreatBook%20Hong%20Kong%20Threat%20Landcape%20Report.jpg</image:loc><image:caption>2025ThreatBookHongKongThreatLandcapeReport</image:caption><image:title>2025ThreatBookHongKongThreatLandcapeReport</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Resource%20Center/Resource%20Thumbnails/2024%20ThreatBook%20Global%20Threat%20Intelligence%20Report.jpg</image:loc><image:caption>2024ThreatBookGlobalThreatIntelligenceReport</image:caption><image:title>2024ThreatBookGlobalThreatIntelligenceReport</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Resource%20Center/Resource%20Thumbnails/2025%20ThreatBook%20Singapore%20Threat%20Landcape%20Report.jpg</image:loc><image:caption>2025ThreatBookSingaporeThreatLandcapeReport</image:caption><image:title>2025ThreatBookSingaporeThreatLandcapeReport</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-03-15</lastmod></url><url><loc>https://threatbook.io/use-case/dark-web-monitoring</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/product/threatbook-ati</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-KPMG.png</image:loc><image:caption>LogoKPMG</image:caption><image:title>LogoKPMG</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Estee%20Lauder.png</image:loc><image:caption>LogoEsteeLauder</image:caption><image:title>LogoEsteeLauder</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Watsons.png</image:loc><image:caption>LogoWatsons</image:caption><image:title>LogoWatsons</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Bytedance.svg</image:loc><image:caption>LogoBytedance</image:caption><image:title>LogoBytedance</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BlackRock.png</image:loc><image:caption>LogoBlackRock</image:caption><image:title>LogoBlackRock</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Wilmar.png</image:loc><image:caption>LogoWilmar</image:caption><image:title>LogoWilmar</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Website%20Images/ATI-1.png</image:loc><image:caption>ATI1</image:caption><image:title>ATI1</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Honda.png</image:loc><image:caption>LogoHonda</image:caption><image:title>LogoHonda</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-BMW.png</image:loc><image:caption>LogoBMW</image:caption><image:title>LogoBMW</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Ant%20Group.png</image:loc><image:caption>LogoAntGroup</image:caption><image:title>LogoAntGroup</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-JD.png</image:loc><image:caption>LogoJD</image:caption><image:title>LogoJD</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Lululemon.svg</image:loc><image:caption>LogoLululemon</image:caption><image:title>LogoLululemon</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Starbucks.png</image:loc><image:caption>LogoStarbucks</image:caption><image:title>LogoStarbucks</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-AirBnB.png</image:loc><image:caption>LogoAirBnB</image:caption><image:title>LogoAirBnB</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Tencent.png</image:loc><image:caption>LogoTencent</image:caption><image:title>LogoTencent</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Logos/Logo-Herbalife.png</image:loc><image:caption>LogoHerbalife</image:caption><image:title>LogoHerbalife</image:title></image:image><lastmod>2026-05-05</lastmod></url><url><loc>https://threatbook.io/blog/why-enterprises-need-commercial-threat-intelligence</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/The%20AI%20Tools%20Your%20Security%20Team%20Doesnt%20Know%20Are%20Running.jpeg</image:loc><image:caption>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:caption><image:title>TheAIToolsYourSecurityTeamDoesntKnowAreRunning</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Commercial_Threat_Intel.png</image:loc><image:caption>CommercialThreatIntel</image:caption><image:title>CommercialThreatIntel</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Threat%20Intelligence%2c%20DRPS%2c%20and%20EASM.png</image:loc><image:caption>ThreatIntelligenceDRPSandEASM</image:caption><image:title>ThreatIntelligenceDRPSandEASM</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/Phishing%20With%20Google%20Ads%20and%20Fake%20AI%20Docs%20A%20Criminal%20Campaign%20Targeting%20the%20AI%20Ecosystem.jpeg</image:loc><image:caption>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:caption><image:title>PhishingWithGoogleAdsandFakeAIDocsACriminalCampaignTargetingtheAIEcosystem</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/favicon-192x192.png</image:loc><image:caption>favicon192x192</image:caption><image:title>favicon192x192</image:title></image:image><lastmod>2026-03-09</lastmod></url><url><loc>https://threatbook.io/press-releases/threatbook-named-a-notable-vendor-in-global-network-analysis-and-visibility-nav-independent-report</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook%20Launches%20Disruptive%20AI-Native%20Agentic%20SecOps%20Platform%2c%20AI%20Agent%20Skills%20Security%20Platform%2c%20Amid%20Brand%20Relaunch.png</image:loc><image:caption>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:caption><image:title>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2025-09-26</lastmod></url><url><loc>https://threatbook.io/ethics</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/threatbook-preview.png</image:loc><image:caption>threatbookpreview</image:caption><image:title>threatbookpreview</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><lastmod>2026-03-17</lastmod></url><url><loc>https://threatbook.io/press-releases/threatbook-launches-best-of-breed-advanced-threat-intelligence-solution</loc><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal.png</image:loc><image:caption>ThreatBookLogo</image:caption><image:title>ThreatBookLogoHorizontal</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/GartnerMQ_2025_Featured_Image.jpg</image:loc><image:caption>GartnerMQ2025FeaturedImage</image:caption><image:title>GartnerMQ2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/PeerInsightsCover.png</image:loc><image:caption>PeerInsightsCover</image:caption><image:title>PeerInsightsCover</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Images/ATILaunch_2025_Featured_Image.png</image:loc><image:caption>ATILaunch2025FeaturedImage</image:caption><image:title>ATILaunch2025FeaturedImage</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Brand%20Resources/ThreatBook_Logo_Horizontal-white.png</image:loc><image:caption>ThreatBookLogoHorizontalwhite</image:caption><image:title>ThreatBookLogoHorizontalwhite</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/Blog%20Authors/Nicholas-Tan.jpg</image:loc><image:caption>NicholasTan</image:caption><image:title>NicholasTan</image:title></image:image><image:image><image:loc>https://243127325.fs1.hubspotusercontent-na2.net/hubfs/243127325/ThreatBook%20Launches%20Disruptive%20AI-Native%20Agentic%20SecOps%20Platform%2c%20AI%20Agent%20Skills%20Security%20Platform%2c%20Amid%20Brand%20Relaunch.png</image:loc><image:caption>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:caption><image:title>ThreatBookLaunchesDisruptiveAINativeAgenticSecOpsPlatformAIAgentSkillsSecurityPlatformAmidBrandRelaunch</image:title></image:image><lastmod>2025-09-29</lastmod></url></urlset>