<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://twinprotocoll.com.tr/blog/index.html</loc><lastmod>2026-05-07</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/network-palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution.html</loc><lastmod>2026-05-07</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/network-palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks.html</loc><lastmod>2026-05-07</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/network-china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-regio.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-r.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/guvenlik-araclari-the-eol-blind-spot-in-your-cve-feed-what-sca-tools-don-t-check.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-we-scanned-1-million-exposed-ai-services-here-s-how-bad-the-security-ac.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-an.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/windows-server-microsoft-details-phishing-campaign-targeting-35-000-users-across-26-cou.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-weaver-e-cology-critical-bug-exploited-in-attacks-since-march.html</loc><lastmod>2026-05-05</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/active-directory-progress-patches-critical-moveit-automation-bug-enabling-authenticatio.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-trellix-discloses-data-breach-after-source-code-repository-hack.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/network-weekly-recap-ai-powered-phishing-android-spying-tool-linux-exploit-github.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-progress-warns-of-critical-moveit-automation-auth-bypass-flaw.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-ne.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-30-000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-germany-doxes-8220-unkn-8221-head-of-ru-ransomware-gangs-revil-gan.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-instructure-confirms-data-breach-shinyhunters-claims-attack.html</loc><lastmod>2026-05-04</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/windows-server-microsoft-defender-wrongly-flags-digicert-certs-as-trojan-win32-cerdigen.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-bringing-rust-to-the-pixel-baseband.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-ai-threats-in-the-wild-the-current-state-of-prompt-injections-on-the-we.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-new-checkmarx-supply-chain-breach-affects-kics-analysis-tool.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-adt-confirms-data-breach-after-shinyhunters-leak-threat.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/windows-server-american-utility-firm-itron-discloses-breach-of-internal-it-network.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-medtronic-confirms-breach-after-hackers-claim-9-million-records-theft.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-new-linux-copy-fail-flaw-gives-hackers-root-on-major-distros.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-15-year-old-detained-over-french-govt-agency-data-breach.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-google-workspace-s-continuous-approach-to-mitigating-indirect-prompt-inj.html</loc><lastmod>2026-05-03</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-cultivating-a-robust-and-efficient-quantum-safe-https.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-mitigating-prompt-injection-attacks-with-a-layered-defense-strategy.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/windows-server-threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/windows-server-microsoft-asks-iphone-users-to-reauthenticate-after-outlook-outage.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-ac.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/siber-guvenlik-anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-ch.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/yapay-zeka-trellix-confirms-source-code-breach-with-unauthorized-repository-access.html</loc><lastmod>2026-05-02</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/yapay-zeka-protecting-cookies-with-device-bound-session-credentials.html</loc><lastmod>2026-05-01</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/yapay-zeka-poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft.html</loc><lastmod>2026-05-01</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/yapay-zeka-rust-in-android-move-fast-and-fix-things.html</loc><lastmod>2026-05-01</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/05/yapay-zeka-introducing-oss-rebuild-open-source-rebuilt-to-last.html</loc><lastmod>2026-05-01</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-critical-cpanel-authentication-vulnerability-identified-update-your-server.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/siber-guvenlik-systembc-c2-server-reveals-1-570-victims-in-the-gentlemen-ransomware-op.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/guvenlik-araclari-google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-e.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-anti-ddos-firm-heaped-attacks-on-brazilian-isps.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-creden.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributio.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-project-glasswing-proved-ai-can-find-the-bugs-who-s-going-to-fix-them.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-windows-update-gets-new-controls-to-reduce-forced-restarts.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/guvenlik-araclari-hackers-exploit-rce-flaws-in-qinglong-task-scheduler-for-cryptomining.html</loc><lastmod>2026-04-30</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-firestarter-malware-survives-cisco-firewall-updates-security-patches.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-community-powered-security-with-ai-an-open-source-framework-for-security-re.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-cpanel-whm-emergency-update-fixes-critical-auth-bypass-bug.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/active-directory-webinar-how-to-automate-exposure-validation-to-match-the-speed-of-ai.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-learning-from-the-vercel-breach-shadow-ai-oauth-sprawl.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-how-to-scan-for-vulnerabilities-with-github-security-lab-s-open-source-ai-po.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure.html</loc><lastmod>2026-04-29</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-investing-in-the-people-shaping-open-source-and-securing-the-future-together.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-securing-the-open-source-supply-chain-across-github.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/guvenlik-araclari-securing-the-git-push-pipeline-responding-to-a-critical-remote-code.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/siber-guvenlik-vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-l.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/active-directory-microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-ta.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-after-mythos-new-playbooks-for-a-zero-window-era.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/guvenlik-araclari-weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rat.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-robinhood-account-creation-flaw-abused-to-send-phishing-emails.html</loc><lastmod>2026-04-28</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-gra.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-m.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patc.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/guvenlik-araclari-a-year-of-open-source-vulnerability-trends-cves-advisories-and-mal.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-microsoft-patch-tuesday-march-2026-edition.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages.html</loc><lastmod>2026-04-27</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/active-directory-microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-vercel-finds-more-compromised-accounts-in-context-ai-linked-breach.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-ba.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-hack-the-ai-agent-build-agentic-ai-security-skills-with-the-github-secure-c.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-mythos-and-cybersecurity.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/siber-guvenlik-apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitatio.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline.html</loc><lastmod>2026-04-26</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-three-microsoft-defender-zero-days-actively-exploited-two-still-unpatch.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botn.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/network-cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/yapay-zeka-cohere-ai-terrarium-sandbox-flaw-enables-root-code-execution-container-esca.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalat.html</loc><lastmod>2026-04-25</lastmod></url>
<url><loc>https://twinprotocoll.com.tr/blog/2026/04/windows-server-patch-tuesday-april-2026-edition.html</loc><lastmod>2026-04-24</lastmod></url>
</urlset>