<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://fluent-jennet.10web.cloud/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://fluent-jennet.10web.cloud/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/</loc><lastmod>2025-10-23T05:44:51+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/securing-agentic-ai-your-guide-to-the-microsoft-ignite-sessions-catalog/</loc><lastmod>2025-10-23T05:44:56+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/building-a-lasting-security-culture-at-microsoft/</loc><lastmod>2025-10-23T05:44:59+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-raises-the-bar-a-smarter-way-to-measure-ai-for-cybersecurity/</loc><lastmod>2025-10-23T05:45:00+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-importance-of-hardening-customer-support-tools-against-cyberattacks/</loc><lastmod>2025-10-23T05:45:01+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/extortion-and-ransomware-drive-over-half-of-cyberattacks/</loc><lastmod>2025-10-23T05:45:01+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-named-a-leader-in-the-2025-gartner-magic-quadrant-for-siem/</loc><lastmod>2025-10-23T05:45:02+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/</loc><lastmod>2025-10-23T05:45:03+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-new-microsoft-security-store-unites-partners-and-innovation/</loc><lastmod>2025-10-23T05:45:04+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-ciso-imperative-building-resilience-in-an-era-of-accelerated-cyberthreats/</loc><lastmod>2025-10-23T05:45:05+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/harden-your-identity-defense-with-improved-protection-deeper-correlation-and-richer-context/</loc><lastmod>2025-10-24T14:28:35+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-5-generative-ai-security-threats-you-need-to-know-about-detailed-in-new-e-book/</loc><lastmod>2025-10-31T01:18:51+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/sesameop-novel-backdoor-uses-openai-assistants-api-for-command-and-control/</loc><lastmod>2025-11-04T01:19:40+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/learn-what-generative-ai-can-do-for-your-security-operations-center/</loc><lastmod>2025-11-05T01:20:18+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/securing-critical-infrastructure-why-europes-risk-based-regulations-matter/</loc><lastmod>2025-11-06T01:19:45+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-idc-research-highlights-a-major-cloud-security-shift/</loc><lastmod>2025-11-07T01:19:53+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/whisper-leak-a-novel-side-channel-attack-on-remote-language-models/</loc><lastmod>2025-11-08T01:16:13+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/securing-our-future-november-2025-progress-report-on-microsofts-secure-future-initiative/</loc><lastmod>2025-11-11T00:35:18+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/collaborative-research-by-microsoft-and-nvidia-on-real-time-immunity/</loc><lastmod>2025-11-17T21:38:46+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/ambient-and-autonomous-security-for-the-agentic-era/</loc><lastmod>2025-11-19T01:17:12+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/agents-built-into-your-workflow-get-security-copilot-with-microsoft-365-e5/</loc><lastmod>2025-11-19T01:17:16+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-named-a-leader-in-the-gartner-magic-quadrant-for-access-management-for-the-ninth-consecutive-year/</loc><lastmod>2025-11-22T01:23:16+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/charting-the-future-of-soc-human-and-ai-collaboration-for-better-security/</loc><lastmod>2025-11-26T01:22:43+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/how-to-build-forward-thinking-cybersecurity-teams-for-tomorrow/</loc><lastmod>2025-12-03T01:19:33+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/cybersecurity-strategies-to-prioritize-now/</loc><lastmod>2025-12-05T01:22:17+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-named-a-leader-in-the-2025-gartner-magic-quadrant-for-email-security/</loc><lastmod>2025-12-07T01:19:27+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/stronger-together-new-beazley-collaboration-enhances-cyber-resilience/</loc><lastmod>2025-12-09T01:18:39+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/changing-the-physics-of-cyber-defense/</loc><lastmod>2025-12-10T01:18:43+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack/</loc><lastmod>2025-12-10T01:18:45+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/clarity-in-complexity-new-insights-for-transparent-email-security/</loc><lastmod>2025-12-11T01:20:45+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/from-awareness-to-action-building-a-security-first-culture-for-the-agentic-ai-era/</loc><lastmod>2025-12-11T01:20:46+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/imposter-for-hire-how-fake-people-can-gain-very-real-access/</loc><lastmod>2025-12-12T01:20:43+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-named-an-overall-leader-in-kuppingercole-leadership-compass-for-generative-ai-defense/</loc><lastmod>2025-12-16T01:18:08+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/</loc><lastmod>2025-12-16T01:18:09+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/access-fabric-a-modern-approach-to-identity-and-network-access/</loc><lastmod>2025-12-18T01:18:41+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-microsoft-e-book-3-reasons-point-solutions-are-holding-you-back/</loc><lastmod>2025-12-19T01:19:33+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/introducing-the-microsoft-defender-experts-suite-elevate-your-security-with-expert-led-services/</loc><lastmod>2026-01-07T01:20:36+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/phishing-actors-exploit-complex-routing-and-misconfigurations-to-spoof-domains/</loc><lastmod>2026-01-07T01:20:39+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/explore-the-latest-microsoft-incident-response-proactive-services-for-enhanced-resilience/</loc><lastmod>2026-01-08T01:18:30+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/how-microsoft-builds-privacy-and-security-to-work-hand-in-hand/</loc><lastmod>2026-01-14T01:19:41+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/inside-redvds-how-a-single-virtual-desktop-provider-fueled-worldwide-cybercriminal-operations/</loc><lastmod>2026-01-15T01:19:59+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-named-a-leader-in-idc-marketscape-for-unified-ai-governance-platforms/</loc><lastmod>2026-01-15T01:20:01+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/four-priorities-for-ai-powered-identity-and-network-access-security-in-2026/</loc><lastmod>2026-01-21T01:17:08+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/a-new-era-of-agents-a-new-era-of-posture/</loc><lastmod>2026-01-22T01:19:30+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/resurgence-of-a-multi-stage-aitm-phishing-and-bec-campaign-abusing-sharepoint/</loc><lastmod>2026-01-23T01:19:03+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-security-success-stories-why-integrated-security-is-the-foundation-of-ai-transformation/</loc><lastmod>2026-01-23T01:19:04+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/from-runtime-risk-to-real-time-defense-securing-ai-agents/</loc><lastmod>2026-01-24T01:17:37+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/security-strategies-for-safeguarding-governmental-data/</loc><lastmod>2026-01-26T18:15:09+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-announces-the-2026-security-excellence-awards-winners/</loc><lastmod>2026-01-28T01:23:54+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-microsoft-data-security-index-report-explores-secure-ai-adoption-to-protect-sensitive-data/</loc><lastmod>2026-01-30T01:22:49+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/turning-threat-reports-into-detection-insights-with-ai/</loc><lastmod>2026-01-30T01:22:50+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/case-study-securing-ai-application-supply-chains/</loc><lastmod>2026-01-30T22:18:56+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/infostealers-without-borders-macos-python-stealers-and-platform-abuse/</loc><lastmod>2026-02-03T01:21:15+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/microsoft-sdl-evolving-security-practices-for-an-ai-powered-world/</loc><lastmod>2026-02-05T01:22:11+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/detecting-backdoored-language-models-at-scale/</loc><lastmod>2026-02-05T01:22:12+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-security-implementation-gap-why-microsoft-is-supporting-operation-winter-shield/</loc><lastmod>2026-02-06T01:23:07+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-clickfix-variant-crashfix-deploying-python-remote-access-trojan/</loc><lastmod>2026-02-06T01:23:09+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/analysis-of-active-exploitation-of-solarwinds-web-help-desk/</loc><lastmod>2026-02-07T01:30:20+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/a-one-prompt-attack-that-breaks-llm-safety-alignment/</loc><lastmod>2026-02-10T01:23:42+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/manipulating-ai-memory-for-profit-the-rise-of-ai-recommendation-poisoning/</loc><lastmod>2026-02-11T01:21:19+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/80-of-fortune-500-use-active-ai-agents-observability-governance-and-security-shape-the-new-frontier/</loc><lastmod>2026-02-11T01:21:20+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-strategic-siem-buyers-guide-choosing-an-ai-ready-platform-for-the-agentic-era/</loc><lastmod>2026-02-12T01:25:46+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/your-complete-guide-to-microsoft-experiences-at-rsac-2026-conference/</loc><lastmod>2026-02-13T01:21:36+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/copilot-studio-agent-security-top-10-risks-you-can-detect-and-prevent/</loc><lastmod>2026-02-13T01:21:41+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/unify-now-or-pay-later-new-research-exposes-the-operational-cost-of-a-fragmented-soc/</loc><lastmod>2026-02-18T00:14:05+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/running-openclaw-safely-identity-isolation-and-runtime-risk/</loc><lastmod>2026-02-20T01:25:31+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-e-book-establishing-a-proactive-defense-with-microsoft-security-exposure-management/</loc><lastmod>2026-02-20T01:25:32+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/scaling-security-operations-with-microsoft-defender-autonomous-defense-and-expert-led-services/</loc><lastmod>2026-02-25T01:24:04+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/developer-targeting-campaign-using-malicious-next-js-repositories/</loc><lastmod>2026-02-25T01:24:06+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/threat-modeling-ai-applications/</loc><lastmod>2026-02-26T21:26:13+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/oauth-redirection-abuse-enables-phishing-and-malware-delivery/</loc><lastmod>2026-03-03T01:22:28+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/signed-malware-impersonating-workplace-apps-deploys-rmm-backdoors/</loc><lastmod>2026-03-05T01:26:19+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-operated-at-scale/</loc><lastmod>2026-03-05T01:26:22+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/malicious-ai-assistant-extensions-harvest-llm-chat-histories/</loc><lastmod>2026-03-06T01:25:27+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/womens-history-month-encouraging-women-in-cybersecurity-at-every-career-stage/</loc><lastmod>2026-03-06T01:25:29+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/ai-as-tradecraft-how-threat-actors-operationalize-ai/</loc><lastmod>2026-03-07T01:21:00+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/secure-agentic-ai-for-your-frontier-transformation/</loc><lastmod>2026-03-10T01:20:59+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/contagious-interview-malware-delivered-through-fake-developer-job-interviews/</loc><lastmod>2026-03-12T02:03:44+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/detecting-and-analyzing-prompt-abuse-in-ai-tools/</loc><lastmod>2026-03-12T20:51:56+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/from-transparency-to-action-what-the-latest-microsoft-email-security-benchmark-reveals/</loc><lastmod>2026-03-12T20:51:57+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft/</loc><lastmod>2026-03-12T20:51:59+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/help-on-the-line-how-a-microsoft-teams-support-call-led-to-compromise/</loc><lastmod>2026-03-16T21:59:07+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-microsoft-purview-innovations-for-fabric-to-safely-accelerate-your-ai-transformation/</loc><lastmod>2026-03-16T21:59:09+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/observability-for-ai-systems-strengthening-visibility-for-proactive-risk-detection/</loc><lastmod>2026-03-18T21:07:54+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/when-tax-season-becomes-cyberattack-season-phishing-and-malware-campaigns-using-tax-related-lures/</loc><lastmod>2026-03-20T01:17:17+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/new-tools-and-guidance-announcing-zero-trust-for-ai/</loc><lastmod>2026-03-20T01:17:19+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/secure-agentic-ai-end-to-end/</loc><lastmod>2026-03-20T22:25:06+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/cti-realm-a-new-benchmark-for-end-to-end-detection-rule-generation-with-ai-agents/</loc><lastmod>2026-03-20T22:25:07+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/case-study-how-predictive-shielding-in-defender-stopped-gpo-based-ransomware-before-it-started/</loc><lastmod>2026-03-24T02:58:15+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/governing-ai-agent-behavior-aligning-user-developer-role-and-organizational-intent/</loc><lastmod>2026-03-25T01:27:45+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/guidance-for-detecting-investigating-and-defending-against-the-trivy-supply-chain-compromise/</loc><lastmod>2026-03-25T01:27:45+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/identity-security-is-the-new-pressure-point-for-modern-cyberattacks/</loc><lastmod>2026-03-26T01:22:18+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/how-microsoft-defender-protects-high-value-assets-in-real-world-attack-scenarios/</loc><lastmod>2026-03-28T01:15:09+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/addressing-the-owasp-top-10-risks-in-agentic-ai-with-microsoft-copilot-studio/</loc><lastmod>2026-03-30T18:40:14+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/whatsapp-malware-campaign-delivers-vbscript-and-msi-backdoors/</loc><lastmod>2026-03-31T21:03:36+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/applying-security-fundamentals-to-ai-practical-advice-for-cisos/</loc><lastmod>2026-03-31T21:03:37+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/the-threat-to-critical-infrastructure-has-changed-has-your-readiness/</loc><lastmod>2026-03-31T21:03:38+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/mitigating-the-axios-npm-supply-chain-compromise/</loc><lastmod>2026-04-02T23:48:06+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/cookie-controlled-php-webshells-a-stealthy-tradecraft-in-linux-hosting-environments/</loc><lastmod>2026-04-02T23:48:07+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/threat-actor-abuse-of-ai-accelerates-from-tool-to-cyberattack-surface/</loc><lastmod>2026-04-02T23:48:08+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/</loc><lastmod>2026-04-07T01:17:16+00:00</lastmod></url><url><loc>https://fluent-jennet.10web.cloud/inside-an-ai-enabled-device-code-phishing-campaign/</loc><lastmod>2026-04-07T01:17:21+00:00</lastmod></url></urlset>
