<?xml version="1.0" encoding="UTF-8"?>
<!-- Diese Sitemap wurde dynamisch am 2026-04-03 um 21:17 von All in One SEO v4.9.5.1 – dem originalen SEO-Plugin für WordPress – erstellt. -->

<?xml-stylesheet type="text/xsl" href="https://lostbrain.blog/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Lostbrain</title>
		<link><![CDATA[https://lostbrain.blog]]></link>
		<description><![CDATA[Lostbrain]]></description>
		<lastBuildDate><![CDATA[Wed, 20 Aug 2025 19:22:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://lostbrain.blog/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://lostbrain.blog/blog/]]></guid>
			<link><![CDATA[https://lostbrain.blog/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Wed, 20 Aug 2025 19:22:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-1-active-exploits-detected-2026-04-01/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-1-active-exploits-detected-2026-04-01/]]></link>
			<title>🚨 CRITICAL ALERT: 1 Active Exploits Detected (2026-04-01)</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 08:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-12/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-12/]]></link>
			<title>🚨 CRITICAL ALERT: 2 Active Exploits Detected (2026-03-12)</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 07:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-04-02/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-04-02/]]></link>
			<title>🚨 CRITICAL ALERT: 2 Active Exploits Detected (2026-04-02)</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/the-role-of-ai-in-modern-cyber-warfare/]]></guid>
			<link><![CDATA[https://lostbrain.blog/the-role-of-ai-in-modern-cyber-warfare/]]></link>
			<title>The Role of AI in Modern Cyber Warfare</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 11:39:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-6-active-exploits-detected-2026-03-29/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-6-active-exploits-detected-2026-03-29/]]></link>
			<title>🚨 CRITICAL ALERT: 6 Active Exploits Detected (2026-03-29)</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 07:11:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/]]></guid>
			<link><![CDATA[https://lostbrain.blog/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 21:47:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-14/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-14/]]></link>
			<title>🚨 CRITICAL ALERT: 2 Active Exploits Detected (2026-03-14)</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 07:00:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-8-active-exploits-detected-2026-04-03/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-8-active-exploits-detected-2026-04-03/]]></link>
			<title>🚨 CRITICAL ALERT: 8 Active Exploits Detected (2026-04-03)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-10/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-2-active-exploits-detected-2026-03-10/]]></link>
			<title>🚨 CRITICAL ALERT: 2 Active Exploits Detected (2026-03-10)</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 07:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-03/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-03/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-03)</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 07:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-05/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-05/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-05)</title>
			<pubDate><![CDATA[Thu, 05 Mar 2026 07:00:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-04/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-04/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-04)</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 07:00:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-08/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-08/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-08)</title>
			<pubDate><![CDATA[Sun, 08 Mar 2026 07:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-07-2/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-07-2/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-07)</title>
			<pubDate><![CDATA[Sat, 07 Mar 2026 07:03:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/when-geopolitics-meets-cloud-inside-irans-strike-on-aws-and-the-new-era-of-cyber-physical-warfare/]]></guid>
			<link><![CDATA[https://lostbrain.blog/when-geopolitics-meets-cloud-inside-irans-strike-on-aws-and-the-new-era-of-cyber-physical-warfare/]]></link>
			<title>When Geopolitics Meets Cloud: Inside Iran&#8217;s Strike on AWS and the New Era of Cyber-Physical Warfare</title>
			<pubDate><![CDATA[Sat, 07 Mar 2026 06:43:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/🚨-critical-alert-5-active-exploits-detected-2026-03-09/]]></guid>
			<link><![CDATA[https://lostbrain.blog/🚨-critical-alert-5-active-exploits-detected-2026-03-09/]]></link>
			<title>🚨 CRITICAL ALERT: 5 Active Exploits Detected (2026-03-09)</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 07:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-06/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-06/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-06)</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 07:00:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-01/]]></guid>
			<link><![CDATA[https://lostbrain.blog/security-briefing-active-exploits-2026-03-01/]]></link>
			<title>Security Briefing: Active Exploits (2026-03-01)</title>
			<pubDate><![CDATA[Sun, 01 Mar 2026 07:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/resources/]]></guid>
			<link><![CDATA[https://lostbrain.blog/resources/]]></link>
			<title>Resources</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 17:44:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/about/]]></guid>
			<link><![CDATA[https://lostbrain.blog/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 17:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/supply-chain-attacks-the-hidden-threat-to-your-organization/]]></guid>
			<link><![CDATA[https://lostbrain.blog/supply-chain-attacks-the-hidden-threat-to-your-organization/]]></link>
			<title>Supply Chain Attacks: The Hidden Threat to Your Organization</title>
			<pubDate><![CDATA[Tue, 24 Feb 2026 20:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/deepfake-scams-the-new-frontier-of-social-engineering/]]></guid>
			<link><![CDATA[https://lostbrain.blog/deepfake-scams-the-new-frontier-of-social-engineering/]]></link>
			<title>Deepfake Scams – The New Frontier of Social Engineering</title>
			<pubDate><![CDATA[Tue, 16 Sep 2025 19:19:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/faq/]]></guid>
			<link><![CDATA[https://lostbrain.blog/faq/]]></link>
			<title>FAQ</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 20:28:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/securing-agentic-ai-risks-and-defenses-in-2025/]]></guid>
			<link><![CDATA[https://lostbrain.blog/securing-agentic-ai-risks-and-defenses-in-2025/]]></link>
			<title>Securing Agentic AI – Risks and Defenses in 2025</title>
			<pubDate><![CDATA[Sun, 12 Oct 2025 16:19:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/contact/]]></guid>
			<link><![CDATA[https://lostbrain.blog/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 17:42:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/gallery/]]></guid>
			<link><![CDATA[https://lostbrain.blog/gallery/]]></link>
			<title>Gallery</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 17:42:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/silent-storm-the-strategic-depth-of-volt-typhoon-and-the-kv-botnet/]]></guid>
			<link><![CDATA[https://lostbrain.blog/silent-storm-the-strategic-depth-of-volt-typhoon-and-the-kv-botnet/]]></link>
			<title>Silent Storm: The Strategic Depth of Volt Typhoon and the KV-Botnet</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 13:52:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/the-long-con-anatomy-of-the-xz-utils-backdoor/]]></guid>
			<link><![CDATA[https://lostbrain.blog/the-long-con-anatomy-of-the-xz-utils-backdoor/]]></link>
			<title>The Long Con: Anatomy of the XZ Utils Backdoor</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 13:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/the-8-terabyte-heist-inside-the-conduent-breach-and-the-rise-of-safepay/]]></guid>
			<link><![CDATA[https://lostbrain.blog/the-8-terabyte-heist-inside-the-conduent-breach-and-the-rise-of-safepay/]]></link>
			<title>The 8 Terabyte Heist: Inside the Conduent Breach and the Rise of SafePay</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 13:41:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/cookie-policy/]]></guid>
			<link><![CDATA[https://lostbrain.blog/cookie-policy/]]></link>
			<title>Cookie Policy</title>
			<pubDate><![CDATA[Sat, 13 Sep 2025 17:48:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/privacy-policy/]]></guid>
			<link><![CDATA[https://lostbrain.blog/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Sat, 13 Sep 2025 17:21:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/ai-powered-cyberattacks-the-rise-of-zero-day-ai-threats/]]></guid>
			<link><![CDATA[https://lostbrain.blog/ai-powered-cyberattacks-the-rise-of-zero-day-ai-threats/]]></link>
			<title>AI-Powered Cyberattacks – The Rise of Zero-Day AI Threats</title>
			<pubDate><![CDATA[Sat, 08 Nov 2025 19:30:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/ransomware-as-a-service-the-business-model-behind-modern-extortion/]]></guid>
			<link><![CDATA[https://lostbrain.blog/ransomware-as-a-service-the-business-model-behind-modern-extortion/]]></link>
			<title>Ransomware-as-a-Service: The Business Model Behind Modern Extortion</title>
			<pubDate><![CDATA[Fri, 27 Feb 2026 06:30:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/anatomy-of-the-september-2025-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://lostbrain.blog/anatomy-of-the-september-2025-npm-supply-chain-attack/]]></link>
			<title>Anatomy of the September 2025 npm Supply-Chain Attack</title>
			<pubDate><![CDATA[Sat, 13 Sep 2025 16:45:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/how-hackers-really-work-how-to-protect-yourself/]]></guid>
			<link><![CDATA[https://lostbrain.blog/how-hackers-really-work-how-to-protect-yourself/]]></link>
			<title>How Hackers Really Work &amp; How To Protect Yourself</title>
			<pubDate><![CDATA[Sat, 13 Sep 2025 16:45:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://lostbrain.blog/recent-most-important-weaknesses-regarding-clawdbot/]]></guid>
			<link><![CDATA[https://lostbrain.blog/recent-most-important-weaknesses-regarding-clawdbot/]]></link>
			<title>Critical Security Weaknesses in Clawdbot: A Deep Dive into Current Threats</title>
			<pubDate><![CDATA[Sat, 07 Feb 2026 10:54:09 +0000]]></pubDate>
		</item>
				</channel>
</rss>
