<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
<loc>https://iplogger.org/blog/this-old-school-scam-is-still-working/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/this-old-school-scam-is-still-working/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-19T16:00:01+00:00</news:publication_date>
<news:title>The Enduring Threat: How Classic Advance-Fee Scams Leverage Modern Vectors for High-Impact Deception</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/this-old-school-scam-is-still-working/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/this-old-school-scam-is-still-working/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-19T16:00:01+00:00</news:publication_date>
<news:title>Die anhaltende Bedrohung: Wie klassische Vorschussbetrügereien moderne Vektoren für hochwirksame Täuschung nutzen</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/this-old-school-scam-is-still-working/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/this-old-school-scam-is-still-working/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-19T16:00:01+00:00</news:publication_date>
<news:title>La Menace Persistante : Comment les Escroqueries Classiques à Frais Avancés Exploitent les Vecteurs Modernes pour une Tromperie à Fort Impact</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/this-old-school-scam-is-still-working/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/this-old-school-scam-is-still-working/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/this-old-school-scam-is-still-working/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-19T16:00:01+00:00</news:publication_date>
<news:title>La Amenaza Persistente: Cómo las Estafas Clásicas de Anticipo Aprovechan los Vectores Modernos para un Engaño de Alto Impacto</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-20T00:00:01+00:00</news:publication_date>
<news:title>Week in Review: Acrobat Reader Zero-Day Exploited &amp; Claude Mythos Offensive AI Capabilities</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-20T00:00:01+00:00</news:publication_date>
<news:title>Wochenrückblick: Acrobat Reader Schwachstelle ausgenutzt &amp; Claude Mythos Offensive KI-Fähigkeiten</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-20T00:00:01+00:00</news:publication_date>
<news:title>Bilan de la Semaine: Faille Acrobat Reader Exploitée &amp; Capacités Offensives de Claude Mythos AI</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/week-in-review-acrobat-reader-flaw-exploited-claude-mythos-offensive-capabilities-and-limits/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-20T00:00:01+00:00</news:publication_date>
<news:title>Resumen Semanal: Falla de Acrobat Reader Explotada y Capacidades Ofensivas de Claude Mythos IA</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-20T08:00:01+00:00</news:publication_date>
<news:title>Section 702: Congress's Unexplained Surveillance Power – A Technical Deep Dive</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-20T08:00:01+00:00</news:publication_date>
<news:title>Abschnitt 702: Das unbegreifliche Überwachungsgesetz des Kongresses – Eine Technische Analyse</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-20T08:00:01+00:00</news:publication_date>
<news:title>Section 702 : Le Pouvoir de Surveillance Inexpliqué du Congrès – Une Analyse Technique Approfondie</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/the-surveillance-law-congress-can-t-quit-and-can-t-explain/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-20T08:00:01+00:00</news:publication_date>
<news:title>Sección 702: El Poder de Vigilancia Inexplicable del Congreso – Un Análisis Técnico Profundo</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-20T16:00:01+00:00</news:publication_date>
<news:title>Browser Espionage: Fake TikTok Downloaders Spy on 130,000 Chrome &amp; Edge Users with Advanced Fingerprinting</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-20T16:00:01+00:00</news:publication_date>
<news:title>Browser-Spionage: Gefälschte TikTok-Downloader spähen 130.000 Chrome- &amp; Edge-Nutzer mittels Advanced Fingerprinting aus</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-20T16:00:01+00:00</news:publication_date>
<news:title>Espionnage par Navigateur : De Faux Téléchargeurs TikTok Espionnent 130 000 Utilisateurs Chrome &amp; Edge avec Empreinte Numérique Avancée</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/fake-tiktok-downloaders-on-chrome-and-edge-spying-on-130-000-users/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-20T16:00:01+00:00</news:publication_date>
<news:title>Espionaje en Navegadores: Falsos Descargadores de TikTok Espían a 130.000 Usuarios de Chrome y Edge con Fingerprinting Avanzado</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-21T00:00:01+00:00</news:publication_date>
<news:title>SGLang CVE-2026-5760: Critical RCE via Malicious GGUF Models – A Deep Dive into Command Injection</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-21T00:00:01+00:00</news:publication_date>
<news:title>SGLang CVE-2026-5760: Kritische RCE durch bösartige GGUF-Modelldateien – Eine Tiefenanalyse der Command Injection</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-21T00:00:01+00:00</news:publication_date>
<news:title>SGLang CVE-2026-5760 : RCE Critique via des Fichiers de Modèle GGUF Malveillants – Plongée dans l'Injection de Commandes</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-21T00:00:01+00:00</news:publication_date>
<news:title>SGLang CVE-2026-5760: RCE Crítica vía Archivos de Modelo GGUF Maliciosos – Una Inmersión Profunda en la Inyección de Comandos</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/blog/zionsiphon-malware-targets-water-infrastructure-systems/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-21T08:00:01+00:00</news:publication_date>
<news:title>ZionSiphon: Unveiling the Advanced Threat to Critical Water Infrastructure OT</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/zionsiphon-malware-targets-water-infrastructure-systems/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-21T08:00:01+00:00</news:publication_date>
<news:title>ZionSiphon: Enthüllung der fortgeschrittenen Bedrohung für kritische Wasserinfrastruktur-OT</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/zionsiphon-malware-targets-water-infrastructure-systems/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-21T08:00:01+00:00</news:publication_date>
<news:title>ZionSiphon: Révélation de la Menace Avancée Contre les Systèmes OT d'Infrastructure Hydrique Critique</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/zionsiphon-malware-targets-water-infrastructure-systems/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/zionsiphon-malware-targets-water-infrastructure-systems/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-21T08:00:01+00:00</news:publication_date>
<news:title>ZionSiphon: Revelando la Amenaza Avanzada para la OT de Infraestructuras Hídricas Críticas</news:title>
</news:news>
</url>
</urlset>