<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/threat-hunting-and-intel/firestarter-leaves-patched-cisco-firewalls-at-continued-risk</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-26T08:05:02.570Z</news:publication_date>
      <news:title>Firestarter leaves patched Cisco firewalls at continued risk</news:title>
      <news:keywords>Firestarter Cisco firewall persistence, Cisco Firepower Firestarter malware, ArcaneDoor UAT-4356 persistence, Cisco ASA FTD post patch compromise, CISA Firestarter backdoor guidance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/pack2theroot-packagekit-local-root-risk</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:05:28.044Z</news:publication_date>
      <news:title>Pack2TheRoot flaw puts Linux systems with PackageKit on a local root path</news:title>
      <news:keywords>Pack2TheRoot CVE-2026-41651, PackageKit local root exploit, Linux privilege escalation PackageKit, CVE-2026-41651 remediation, PackageKit 1.3.5 patch</news:keywords>
    </news:news>
  </url>
</urlset>