<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/cve-2025-53521-f5-big-ip-apm-rce-active-exploitation</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:04:28.292Z</news:publication_date>
      <news:title>CVE-2025-53521 turns into an actively exploited F5 BIG-IP APM RCE</news:title>
      <news:keywords>CVE-2025-53521, F5 BIG-IP APM vulnerability, BIG-IP APM RCE, F5 active exploitation, CISA KEV F5, edge device security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/cve-2026-3502-trueconf-kev-malware-update-channel</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:10:45.313Z</news:publication_date>
      <news:title>CVE-2026-3502 turns TrueConf updates into a KEV-listed malware channel</news:title>
      <news:keywords>CVE-2026-3502, TrueConf vulnerability, TrueConf KEV, malicious software updates, on-prem update mechanism abuse, government cyber espionage</news:keywords>
    </news:news>
  </url>
</urlset>