<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://blog.nanofirewall.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://blog.nanofirewall.com/proactive-detection-in-action-the-sharepoint-exploit-we-blocked-before-microsoft-did/</loc><lastmod>2025-12-17T07:18:23+00:00</lastmod></url><url><loc>https://blog.nanofirewall.com/iran-israel-cyber-conflict-an-in-depth-analysis-of-threat-actors-and-cyber-operations/</loc><lastmod>2025-12-17T07:18:41+00:00</lastmod></url><url><loc>https://blog.nanofirewall.com/the-zombie-server-how-a-dead-t-shirt-store-became-a-cyberattack-hub/</loc><lastmod>2025-12-17T07:53:02+00:00</lastmod></url><url><loc>https://blog.nanofirewall.com/react2shell-critical-pre-auth-rce-in-react-server-components/</loc><lastmod>2025-12-16T08:12:44+00:00</lastmod></url><url><loc>https://blog.nanofirewall.com/how-a-simple-post-request-leads-to-persistent-whisper-botnet-access/</loc><lastmod>2025-12-17T10:05:06+00:00</lastmod></url><url><loc>https://blog.nanofirewall.com/llmprobe-early-2026-automated-scanning-of-public-llm-inference-endpoints/</loc><lastmod>2026-01-08T12:33:53+00:00</lastmod></url></urlset>
