<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyber.agence-aether.fr</loc>
<lastmod>2025-12-31T07:01:09.019Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/actively-exploited-vulnerabilities-in-widely-used-software-smartermail-mongodb</loc>
<lastmod>2025-12-31T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/rise-in-sophisticated-chinese-espionage-campaigns-employing-rootkits</loc>
<lastmod>2025-12-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/former-coinbase-support-agent-arrested-for-helping-hackers</loc>
<lastmod>2025-12-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/data-breaches-and-customer-data-exposure</loc>
<lastmod>2025-12-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/actively-exploited-vulnerability-in-mongodb-mongobleed</loc>
<lastmod>2025-12-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-mongodb-vulnerability-under-active-exploitation-cve-2025-14847-mongobleed</loc>
<lastmod>2025-12-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-mongodb-vulnerability-mongobleed-exploitation</loc>
<lastmod>2025-12-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/active-exploitation-of-mongodb-vulnerability-cve-2025-14847</loc>
<lastmod>2025-12-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ubisoft-rainbow-six-siege-breach-and-game-integrity-concerns</loc>
<lastmod>2025-12-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/data-breach-targeting-media-organization-wired-cond-nast</loc>
<lastmod>2025-12-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-mongodb-vulnerability-exposing-sensitive-data</loc>
<lastmod>2025-12-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/potential-bias-and-manipulation-in-chatgpt-responses-via-sponsored-content</loc>
<lastmod>2025-12-27T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ai-assisted-code-vulnerabilities-and-supply-chain-risks</loc>
<lastmod>2025-12-27T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ai-assisted-code-generation-security-risks</loc>
<lastmod>2025-12-27T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/trust-wallet-chrome-extension-compromise-leading-to-crypto-theft</loc>
<lastmod>2025-12-26T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/fortios-ssl-vpn-vulnerability-exploitation</loc>
<lastmod>2025-12-26T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ai-llm-security-risks-vulnerabilities-and-exploitation</loc>
<lastmod>2025-12-26T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/rise-in-ai-enabled-scams-and-deepfakes</loc>
<lastmod>2025-12-25T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ongoing-cryptocurrency-thefts-linked-to-lastpass-2022-breach</loc>
<lastmod>2025-12-25T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/malicious-use-of-impersonation-and-deception</loc>
<lastmod>2025-12-25T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-mongodb-rce-and-webrat-via-fake-exploits</loc>
<lastmod>2025-12-24T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/credential-theft-via-malicious-chrome-extensions</loc>
<lastmod>2025-12-24T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/credential-stealing-chrome-extensions</loc>
<lastmod>2025-12-24T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/malicious-packages-targeting-whatsapp-users-and-systems</loc>
<lastmod>2025-12-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/escalating-data-breach-incidents-targeting-customer-and-user-information</loc>
<lastmod>2025-12-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/credential-stealing-via-malicious-chrome-extensions</loc>
<lastmod>2025-12-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ransomware-threat-nefilim-gang</loc>
<lastmod>2025-12-22T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/mobile-malware-evolution-increased-sophistication-and-capabilities</loc>
<lastmod>2025-12-22T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/resurgence-of-iranian-apt-group-infy-with-new-malware</loc>
<lastmod>2025-12-21T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/atm-jackpotting-scheme-using-ploutus-malware</loc>
<lastmod>2025-12-21T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/exploitation-of-watchguard-fireware-os-vpn-vulnerability</loc>
<lastmod>2025-12-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-and-attacks-targeting-cisco-infrastructure</loc>
<lastmod>2025-12-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/cisco-security-vulnerabilities-and-targeted-attacks</loc>
<lastmod>2025-12-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/uefi-vulnerabilities-and-supply-chain-risks-in-motherboard-firmware</loc>
<lastmod>2025-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/microsoft-365-accounts-under-phishing-assault-via-oauth-device-code-mechanism</loc>
<lastmod>2025-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-in-widely-used-software-hpe-oneview-sonicwall</loc>
<lastmod>2025-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/north-korean-threat-actors-engaged-in-financial-theft-and-malware-distribution</loc>
<lastmod>2025-12-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/cryptomining-campaigns-exploiting-aws-accounts</loc>
<lastmod>2025-12-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/account-hijacking-and-credential-stuffing-attacks-targeting-critical-services</loc>
<lastmod>2025-12-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/widespread-exploitation-of-vulnerable-network-devices</loc>
<lastmod>2025-12-17T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/russian-state-sponsored-cyberattacks-targeting-critical-infrastructure-and-edge-devices</loc>
<lastmod>2025-12-17T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/exploitation-of-edge-devices-and-zero-day-vulnerabilities-for-initial-access</loc>
<lastmod>2025-12-17T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/data-breaches-and-extortion-targeting-user-data</loc>
<lastmod>2025-12-16T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/browser-extension-risks-data-exfiltration-and-hijacking</loc>
<lastmod>2025-12-16T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/widespread-phishing-campaigns-targeting-financial-and-government-institutions</loc>
<lastmod>2025-12-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ransomware-vulnerabilities-and-attacks-volklocker</loc>
<lastmod>2025-12-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/phishing-attacks-abusing-legitimate-paypal-subscription-features</loc>
<lastmod>2025-12-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerability-in-sierra-wireless-routers-exploited-in-rce-attacks</loc>
<lastmod>2025-12-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/zero-day-exploitation-in-apple-products</loc>
<lastmod>2025-12-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/insider-threats-and-data-breaches</loc>
<lastmod>2025-12-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/advanced-phishing-campaigns-leveraging-ai-and-mfa-bypass-techniques</loc>
<lastmod>2025-12-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/supply-chain-attacks-via-development-tools-vscode-notepad</loc>
<lastmod>2025-12-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-in-widely-used-software-gogs-chrome-react</loc>
<lastmod>2025-12-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ai-themed-malware-distribution-and-social-engineering</loc>
<lastmod>2025-12-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/active-exploitation-of-known-vulnerabilities-in-widely-used-software-winrar-net-framework-gladinet</loc>
<lastmod>2025-12-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/phishing-attacks-targeting-european-banks-and-crypto-holders</loc>
<lastmod>2025-12-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/microsoft-patch-tuesday-zero-day-vulnerabilities</loc>
<lastmod>2025-12-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-in-widely-used-software-microsoft-ivanti-fortinet-sap</loc>
<lastmod>2025-12-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ransomware-tactics-and-financial-impact</loc>
<lastmod>2025-12-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/malicious-vs-code-extensions-targeting-developers</loc>
<lastmod>2025-12-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/critical-vulnerabilities-apache-tika-and-ivanti-endpoint-manager</loc>
<lastmod>2025-12-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/active-exploitation-of-wordpress-plugin-vulnerability-sneeit-framework</loc>
<lastmod>2025-12-08T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/vpn-login-attempts-targeting-palo-alto-globalprotect</loc>
<lastmod>2025-12-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/targeted-attacks-on-vpn-portals</loc>
<lastmod>2025-12-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/security-vulnerabilities-in-ai-coding-tools</loc>
<lastmod>2025-12-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/ransomware-attacks-and-data-breaches-targeting-critical-infrastructure-and-industries</loc>
<lastmod>2025-12-06T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/oracle-e-business-suite-zero-day-exploited-in-clop-ransomware-attack</loc>
<lastmod>2025-12-06T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/chinese-state-sponsored-actors-actively-exploiting-brickstorm-backdoor-in-vmware-vsphere-environments</loc>
<lastmod>2025-12-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/active-exploitation-of-react2shell-vulnerability-by-china-linked-groups</loc>
<lastmod>2025-12-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/active-exploitation-of-command-injection-vulnerability-in-array-ag-series-vpn-devices</loc>
<lastmod>2025-12-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/record-breaking-ddos-attack-leveraging-aisuru-botnet</loc>
<lastmod>2025-12-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/escalating-threat-landscape-banking-trojan-evolution-and-whatsapp-exploitation-water-saci</loc>
<lastmod>2025-12-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/emerging-ai-driven-cyberattack-capabilities-and-ai-security-tool-vulnerabilities</loc>
<lastmod>2025-12-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/cybercrime-as-a-service-caas-model-expanding-accessibility-and-sophistication-of-attacks</loc>
<lastmod>2025-12-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/north-korean-it-worker-scheme-and-malicious-npm-package-factory-targeting-ai-security-tools</loc>
<lastmod>2025-12-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/compromise-of-smarttube-youtube-app-for-android-tv-via-malicious-update</loc>
<lastmod>2025-12-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/browser-extension-malware-campaign-shadypanda-compromises-millions-of-users</loc>
<lastmod>2025-12-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/tomiris-apt-group-targeting-government-entities-with-stealthier-command-and-control-infrastructure</loc>
<lastmod>2025-12-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/coupang-data-breach-exposing-personal-information-of-33-7-million-customers</loc>
<lastmod>2025-12-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/data-breach-at-asahi-group-holdings-exposing-personal-information-of-1-5-million-individuals</loc>
<lastmod>2025-11-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber.agence-aether.fr/blog/cisa-adds-actively-exploited-xss-bug-cve-2021-26829-in-openplc-scadabr-to-kev</loc>
<lastmod>2025-11-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
