<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:23 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://biondit.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>biondit</title>
		<link><![CDATA[https://biondit.com]]></link>
		<description><![CDATA[biondit]]></description>
		<lastBuildDate><![CDATA[Thu, 21 Aug 2025 10:41:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://biondit.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://biondit.com/cyber-mentorship/]]></guid>
			<link><![CDATA[https://biondit.com/cyber-mentorship/]]></link>
			<title>Free Consultation</title>
			<pubDate><![CDATA[Thu, 21 Aug 2025 10:41:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/5-mfa-myths-that-put-your-business-at-risk-how-to-fix-them/]]></guid>
			<link><![CDATA[https://biondit.com/5-mfa-myths-that-put-your-business-at-risk-how-to-fix-them/]]></link>
			<title>5 MFA myths that put your business at risk &amp; how to fix them</title>
			<pubDate><![CDATA[Thu, 19 Jun 2025 06:28:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/get-in-touch/]]></guid>
			<link><![CDATA[https://biondit.com/get-in-touch/]]></link>
			<title>Ready to illuminate your identity vulnerabilities?</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/illuminate/]]></guid>
			<link><![CDATA[https://biondit.com/illuminate/]]></link>
			<title>Expose &amp; Eliminate Identity Threats</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/identity-security-resources-whitepapers-tools/]]></guid>
			<link><![CDATA[https://biondit.com/identity-security-resources-whitepapers-tools/]]></link>
			<title>Identity Security Resources: Whitepapers &amp; Tools</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/insights/]]></guid>
			<link><![CDATA[https://biondit.com/insights/]]></link>
			<title>Identity Security Intelligence | Research &amp; Reports</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/our-identity-illumination-framework-security-methodology/]]></guid>
			<link><![CDATA[https://biondit.com/our-identity-illumination-framework-security-methodology/]]></link>
			<title>Our Identity Illumination Framework | Security Methodology</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/privacy-policy-2/]]></guid>
			<link><![CDATA[https://biondit.com/privacy-policy-2/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 11:22:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/passkeys-explained-the-future-of-authentication-and-secure-access/]]></guid>
			<link><![CDATA[https://biondit.com/passkeys-explained-the-future-of-authentication-and-secure-access/]]></link>
			<title>Passkeys Explained: The Future of Authentication and Secure Access</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 10:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/preventing-and-detecting-advanced-phishing-attacks-evilginx-and-aitm-proxies/]]></guid>
			<link><![CDATA[https://biondit.com/preventing-and-detecting-advanced-phishing-attacks-evilginx-and-aitm-proxies/]]></link>
			<title>Preventing and Detecting Advanced Phishing Attacks: Evilginx and AiTM Proxies</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/ottokit-wordpress-plugin-admin-creation-vulnerability-under-active-exploitation/]]></guid>
			<link><![CDATA[https://biondit.com/ottokit-wordpress-plugin-admin-creation-vulnerability-under-active-exploitation/]]></link>
			<title>OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/over-1500-postgresql-servers-compromised-in-fileless-cryptocurrency-mining-campaign/]]></guid>
			<link><![CDATA[https://biondit.com/over-1500-postgresql-servers-compromised-in-fileless-cryptocurrency-mining-campaign/]]></link>
			<title>Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/single-sign-on-sso-in-an-ai-driven-world-a-strategic-insight/]]></guid>
			<link><![CDATA[https://biondit.com/single-sign-on-sso-in-an-ai-driven-world-a-strategic-insight/]]></link>
			<title>Single Sign-On (SSO) in an AI-Driven World: A Strategic Insight</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/the-people-factor-why-employees-is-the-biggest-challenge-for-organisations/]]></guid>
			<link><![CDATA[https://biondit.com/the-people-factor-why-employees-is-the-biggest-challenge-for-organisations/]]></link>
			<title>The People Factor: Why Employees is the Biggest Challenge for Organisations</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/sessionshark-toolkit-evades-microsoft-office-365-mfa/]]></guid>
			<link><![CDATA[https://biondit.com/sessionshark-toolkit-evades-microsoft-office-365-mfa/]]></link>
			<title>&#8216;SessionShark&#8217; ToolKit Evades Microsoft Office 365 MFA</title>
			<pubDate><![CDATA[Thu, 12 Jun 2025 09:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/theres-a-weak-spot-in-your-system-and-threat-actors-are-going-to-find-it/]]></guid>
			<link><![CDATA[https://biondit.com/theres-a-weak-spot-in-your-system-and-threat-actors-are-going-to-find-it/]]></link>
			<title>There’s a Weak Spot in Your System, and Threat Actors Are Going to Find It</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/hierarchy-of-cybersecurity-needs/]]></guid>
			<link><![CDATA[https://biondit.com/hierarchy-of-cybersecurity-needs/]]></link>
			<title>The Hierarchy of Cybersecurity Needs</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/windows-hello-for-business-what-you-need-to-know/]]></guid>
			<link><![CDATA[https://biondit.com/windows-hello-for-business-what-you-need-to-know/]]></link>
			<title>Windows Hello for Business: What You Need to Know</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/in-the-midst-of-nigerias-vibrant-digital-world-a-spine-chilling-story-of-cyber-invasion-sent-shivers-down-the-nations-spine/]]></guid>
			<link><![CDATA[https://biondit.com/in-the-midst-of-nigerias-vibrant-digital-world-a-spine-chilling-story-of-cyber-invasion-sent-shivers-down-the-nations-spine/]]></link>
			<title> In the midst of Nigeria&#8217;s vibrant digital world, a spine-chilling story of cyber invasion sent shivers down the nation&#8217;s spine.</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/navigating-the-midnight-blizzard-expert-insights-on-nation-state-attacks/]]></guid>
			<link><![CDATA[https://biondit.com/navigating-the-midnight-blizzard-expert-insights-on-nation-state-attacks/]]></link>
			<title>Navigating the Midnight Blizzard: Expert Insights on Nation-State Attacks</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/cybersecurity-testing-explained-red-blue-purple-and-pen-testing/]]></guid>
			<link><![CDATA[https://biondit.com/cybersecurity-testing-explained-red-blue-purple-and-pen-testing/]]></link>
			<title>Cybersecurity Testing Explained: Red, Blue, Purple, and Pen Testing</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:07:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/390000-wordpress-credentials-stolen-via-malicious-github-repository-hosting-poc-exploits/]]></guid>
			<link><![CDATA[https://biondit.com/390000-wordpress-credentials-stolen-via-malicious-github-repository-hosting-poc-exploits/]]></link>
			<title>390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/new-glutton-malware-exploits-popular-php-frameworks-like-laravel-and-thinkphp/]]></guid>
			<link><![CDATA[https://biondit.com/new-glutton-malware-exploits-popular-php-frameworks-like-laravel-and-thinkphp/]]></link>
			<title>New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/the-mask-apt-resurfaces-with-sophisticated-multi-platform-malware-arsenal/]]></guid>
			<link><![CDATA[https://biondit.com/the-mask-apt-resurfaces-with-sophisticated-multi-platform-malware-arsenal/]]></link>
			<title>The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/16-chrome-extensions-hacked-exposing-over-600000-users-to-data-theft/]]></guid>
			<link><![CDATA[https://biondit.com/16-chrome-extensions-hacked-exposing-over-600000-users-to-data-theft/]]></link>
			<title>16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/chinese-apt-exploits-beyondtrust-api-key-to-access-u-s-treasury-systems-and-documents/]]></guid>
			<link><![CDATA[https://biondit.com/chinese-apt-exploits-beyondtrust-api-key-to-access-u-s-treasury-systems-and-documents/]]></link>
			<title>Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/ultralytics-ai-library-compromised-cryptocurrency-miner-found-in-pypi-versions/]]></guid>
			<link><![CDATA[https://biondit.com/ultralytics-ai-library-compromised-cryptocurrency-miner-found-in-pypi-versions/]]></link>
			<title>Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/volkswagen-breach-exposes-data-of-800k-ev-customers/]]></guid>
			<link><![CDATA[https://biondit.com/volkswagen-breach-exposes-data-of-800k-ev-customers/]]></link>
			<title>Volkswagen Breach Exposes Data of 800K EV Customers</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/unpatched-active-directory-flaw-can-crash-any-microsoft-server/]]></guid>
			<link><![CDATA[https://biondit.com/unpatched-active-directory-flaw-can-crash-any-microsoft-server/]]></link>
			<title>Unpatched Active Directory Flaw Can Crash Any Microsoft Server</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/researchers-uncover-prompt-injection-vulnerabilities-in-deepseek-and-claude-ai/]]></guid>
			<link><![CDATA[https://biondit.com/researchers-uncover-prompt-injection-vulnerabilities-in-deepseek-and-claude-ai/]]></link>
			<title>Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/hackers-weaponize-visual-studio-code-remote-tunnels-for-cyber-espionage/]]></guid>
			<link><![CDATA[https://biondit.com/hackers-weaponize-visual-studio-code-remote-tunnels-for-cyber-espionage/]]></link>
			<title>Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/researchers-uncover-backdoor-in-solanas-popular-web3-js-npm-library/]]></guid>
			<link><![CDATA[https://biondit.com/researchers-uncover-backdoor-in-solanas-popular-web3-js-npm-library/]]></link>
			<title>Researchers Uncover Backdoor in Solana&#8217;s Popular Web3.js npm Library</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/researchers-crack-microsoft-azure-mfa-in-an-hour/]]></guid>
			<link><![CDATA[https://biondit.com/researchers-crack-microsoft-azure-mfa-in-an-hour/]]></link>
			<title>Researchers Crack Microsoft Azure MFA in an Hour</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/digital-certificates-with-shorter-lifespans-reduce-security-vulnerabilities/]]></guid>
			<link><![CDATA[https://biondit.com/digital-certificates-with-shorter-lifespans-reduce-security-vulnerabilities/]]></link>
			<title>Digital Certificates With Shorter Lifespans Reduce Security Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/pegasus-spyware-infections-proliferate-across-ios-android-devices/]]></guid>
			<link><![CDATA[https://biondit.com/pegasus-spyware-infections-proliferate-across-ios-android-devices/]]></link>
			<title>Pegasus Spyware Infections Proliferate Across iOS, Android Devices</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/veeam-urges-updates-after-discovering-critical-vulnerability/]]></guid>
			<link><![CDATA[https://biondit.com/veeam-urges-updates-after-discovering-critical-vulnerability/]]></link>
			<title>Veeam Urges Updates After Discovering Critical Vulnerability</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/this-3000-android-trojan-targeting-banks-and-cryptocurrency-exchanges/]]></guid>
			<link><![CDATA[https://biondit.com/this-3000-android-trojan-targeting-banks-and-cryptocurrency-exchanges/]]></link>
			<title>This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/microsoft-uncovers-macos-vulnerability-cve-2024-44243-allowing-rootkit-installation/]]></guid>
			<link><![CDATA[https://biondit.com/microsoft-uncovers-macos-vulnerability-cve-2024-44243-allowing-rootkit-installation/]]></link>
			<title>Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/owasps-new-llm-top-10-shows-emerging-ai-threats/]]></guid>
			<link><![CDATA[https://biondit.com/owasps-new-llm-top-10-shows-emerging-ai-threats/]]></link>
			<title>OWASP&#8217;s New LLM Top 10 Shows Emerging AI Threats</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/attackers-hijack-google-advertiser-accounts-to-spread-malware/]]></guid>
			<link><![CDATA[https://biondit.com/attackers-hijack-google-advertiser-accounts-to-spread-malware/]]></link>
			<title>Attackers Hijack Google Advertiser Accounts to Spread Malware</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/microsoft-identifies-3000-publicly-disclosed-asp-net-machine-keys-vulnerable-to-code-injection/]]></guid>
			<link><![CDATA[https://biondit.com/microsoft-identifies-3000-publicly-disclosed-asp-net-machine-keys-vulnerable-to-code-injection/]]></link>
			<title>Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/over-1000-wordpress-sites-infected-with-javascript-backdoors-enabling-persistent-attacker-access/]]></guid>
			<link><![CDATA[https://biondit.com/over-1000-wordpress-sites-infected-with-javascript-backdoors-enabling-persistent-attacker-access/]]></link>
			<title>Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/lazarus-group-uses-react-based-admin-panel-to-control-global-cyber-attacks/]]></guid>
			<link><![CDATA[https://biondit.com/lazarus-group-uses-react-based-admin-panel-to-control-global-cyber-attacks/]]></link>
			<title>Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/apple-releases-urgent-patch-for-usb-vulnerability/]]></guid>
			<link><![CDATA[https://biondit.com/apple-releases-urgent-patch-for-usb-vulnerability/]]></link>
			<title>Apple Releases Urgent Patch for USB Vulnerability</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/microsofts-patch-tuesday-fixes-63-flaws-including-two-under-active-exploitation/]]></guid>
			<link><![CDATA[https://biondit.com/microsofts-patch-tuesday-fixes-63-flaws-including-two-under-active-exploitation/]]></link>
			<title>Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/microsoft-6-zero-days-in-march-2025-patch-tuesday/]]></guid>
			<link><![CDATA[https://biondit.com/microsoft-6-zero-days-in-march-2025-patch-tuesday/]]></link>
			<title>Microsoft: 6 Zero-Days in March 2025 Patch Tuesday</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/__trashed-106/]]></guid>
			<link><![CDATA[https://biondit.com/__trashed-106/]]></link>
			<title>BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/coyote-malware-expands-reach-now-targets-1030-sites-and-73-financial-institutions/]]></guid>
			<link><![CDATA[https://biondit.com/coyote-malware-expands-reach-now-targets-1030-sites-and-73-financial-institutions/]]></link>
			<title>Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/openai-operator-agent-used-in-proof-of-concept-phishing-attack/]]></guid>
			<link><![CDATA[https://biondit.com/openai-operator-agent-used-in-proof-of-concept-phishing-attack/]]></link>
			<title>OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://biondit.com/github-uncovers-new-ruby-saml-vulnerabilities-allowing-account-takeover-attacks/]]></guid>
			<link><![CDATA[https://biondit.com/github-uncovers-new-ruby-saml-vulnerabilities-allowing-account-takeover-attacks/]]></link>
			<title>GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks</title>
			<pubDate><![CDATA[Fri, 06 Jun 2025 09:06:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
