<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//accuknox.com/main-sitemap.xsl"?>
<urlset xmlns:xhtml="http://www.w3.org/1999/xhtml"  xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://accuknox.com/blog/accuknox-ctem-secure-workloads-continuously</loc>
		<lastmod>2025-11-18T06:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ctem.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-Five-Phase-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-Threat-modeling-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-automating-threat-modeling.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-prioritizes-threats-dynamically.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-Prioritization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-security-findings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-secure-CI-CD-pipeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CTEM-graphic-risk-reports.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/accuknox-ctem-secure-workloads-continuously' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/accuknox-ctem-secure-workloads-continuously' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/accuknox-ctem-secure-workloads-continuously' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/accuknox-ctem-secure-workloads-continuously' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/accuknox-ctem-secure-workloads-continuously' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/top-10-cnapp-terms-glossary</loc>
		<lastmod>2025-11-18T06:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Top10CNAPP_featured.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/uniques-distinctive-CNAPP-features.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/containerized-workloads.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Zero-Trust-LLM-Security_eBook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/BuildToRuntimeSecurity.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/top-10-cnapp-terms-glossary' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/top-10-cnapp-terms-glossary' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/top-10-cnapp-terms-glossary' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/top-10-cnapp-terms-glossary' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/top-10-cnapp-terms-glossary' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/rbi-and-sebi-compliance</loc>
		<lastmod>2025-11-18T06:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/rbi-and-sebi.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-CNAPP-steps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/application-environments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/misconfigurations-and-risks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/workflow-plugin-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-On-Prem-Control-Plane.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-air-gapped-deployment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Real-world-Applications-for-Financial-Institutions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Secure-Application-Deployment-Process.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/rbi-and-sebi-compliance' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/rbi-and-sebi-compliance' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/rbi-and-sebi-compliance' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/rbi-and-sebi-compliance' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/rbi-and-sebi-compliance' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/agentic-ai-security-ai-spm</loc>
		<lastmod>2025-11-18T06:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Agentic-AI-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/agentic-workflow-for-secops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Agentic-AI-Systems-leverage-LLMs-and-autonomous-agents.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Breaking-AIMLOps-Pipelines.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/direct-execution-of-LLM-generated-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/solutions-ai-factories.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/risk-using-MCP-agentic-AI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/MCP-Threat-Categorization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ModelKnox-principle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/MCP-Threat-Vectors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Nvidia-WASM-based_Sandbox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Configurability-Visibility-and-Analysis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Load-process-isolation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ModelKnox_eBook.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/agentic-ai-security-ai-spm' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/agentic-ai-security-ai-spm' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/agentic-ai-security-ai-spm' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/agentic-ai-security-ai-spm' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/agentic-ai-security-ai-spm' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/accuknox-addresses-jpmc-ciso-security-concerns</loc>
		<lastmod>2025-11-18T06:44:33+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/jp_morgan_chase.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/threat_modeling_approaches_form.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/dashboard-modelknox.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/inline-and-post-attack-animation-1-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/secure-code-to-cognition.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/jpmc_blog_CNAPP.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/accuknox-addresses-jpmc-ciso-security-concerns' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/accuknox-addresses-jpmc-ciso-security-concerns' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/accuknox-addresses-jpmc-ciso-security-concerns' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/accuknox-addresses-jpmc-ciso-security-concerns' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/accuknox-addresses-jpmc-ciso-security-concerns' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/cnapp-vendors</loc>
		<lastmod>2025-11-18T06:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CNAPP-Vendors-Blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CNAPP-DASHBOARD-vendor-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/wiz-cnapp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/prisma-cnapp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/sysdig-secure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/orca-security-side-scanning.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/sentinelone-singularity-cloud-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/wp_gartner-cnapp-compliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/cnapp-vendors' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/cnapp-vendors' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/cnapp-vendors' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/cnapp-vendors' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/cnapp-vendors' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/ai-spm-tools</loc>
		<lastmod>2025-11-18T05:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-security-tools.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-AI-SPM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/wiz-ai-spm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/MS-DefenderforAI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/DataRobot-AI-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Cloudflare-AI-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/download-GRC-Datasheet.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/ai-spm-tools' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/ai-spm-tools' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/ai-spm-tools' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/ai-spm-tools' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/ai-spm-tools' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/conduct-cloud-security-assessment</loc>
		<lastmod>2025-11-18T05:46:51+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Cloud-Security-Assessment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/network-storage-compute-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/cloud-assets-summary.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/hybrid-approach.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/micro-segmentation-csa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Compliance-Mapping.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/application-events-tools-troubleshooting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/security-and-runtime-defence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/private-and-public-clouds.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/conduct-cloud-security-assessment' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/conduct-cloud-security-assessment' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/conduct-cloud-security-assessment' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/conduct-cloud-security-assessment' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/conduct-cloud-security-assessment' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/ai-cyber-security-tools</loc>
		<lastmod>2025-11-18T05:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AI-Cybersecurity-Tools.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-AI-CoPilot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Darktrace.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CrowdStrike-Falcon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/SentinelOne_AI_tool.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Palo-Alto-Cortex-XSIAM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/cylance-dashboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/ai-cyber-security-tools' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/ai-cyber-security-tools' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/ai-cyber-security-tools' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/ai-cyber-security-tools' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/ai-cyber-security-tools' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/dod-cloud-security-playbook-accuknox</loc>
		<lastmod>2025-11-18T05:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/DoD-Zero-Trust-AccuKnox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/DoD-Zero-Trust.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Landing-Zone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/DoD-Security-Recommendation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/blog_secure-code-to-cognition.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/cluster.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-Policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Enforce-Zero-Trust-Network-Policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/KIEM_clusters.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Lifecycle-Approach-to-Container-Security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/API-Security-Fortifying-API-Endpoints.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/accreditations.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/33-compliance-frameworks.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/dod-cloud-security-playbook-accuknox' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/dod-cloud-security-playbook-accuknox' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/dod-cloud-security-playbook-accuknox' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/dod-cloud-security-playbook-accuknox' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/dod-cloud-security-playbook-accuknox' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime</loc>
		<lastmod>2025-11-18T05:45:44+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Block-the-CUPS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-5-1024x413.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-7-1024x261.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-9-1-1024x422.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-10-1024x477.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FromPrinttoPwn-11.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/how-accuknox-blocks-the-cups-zero-day-rce-runtime' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/file-integrity-monitoring-tools</loc>
		<lastmod>2025-11-18T05:44:15+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/10-Best-File-Integrity-Monitoring-Tools-2025.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/file-integrity-monitoring-tools.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/create-new-policy-confirmation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/runtime-security-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/create-modify-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/file-integrity-critical.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/file-integrity-monitoring-market.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/file-integrity-market-trend.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/file-integrity-monitoring-tools' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/file-integrity-monitoring-tools' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/file-integrity-monitoring-tools' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/file-integrity-monitoring-tools' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/file-integrity-monitoring-tools' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/smart-container-security</loc>
		<lastmod>2025-11-18T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/smart-container-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/container-images-in-registries.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/registry-scans.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/accuknox-registry.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/image-scanning.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/githubaction-test.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Listed-Vulnerabilities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Create-Tickets-Directly.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/container-security-tools_feat.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/container_runtime_security_feat.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/container-security-ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/smart-container-security' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/smart-container-security' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/smart-container-security' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/smart-container-security' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/smart-container-security' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/towards-fedramp-nist-800-53-accuknox</loc>
		<lastmod>2025-11-18T05:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/FedRamp_NIST_800.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/fedramp-accuknox-nist.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/detailed-NIST-800.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/NIST-800-53-Compliance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/mapping-AccuKnox-to-NIST-Control-Families.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-supports-NIST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-Compliance-Cloud-Detail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IAM-Role-Policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/EKS-Logging-Enabled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Empty-Auto-Scaling.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/RDS-Restorable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ECR-Repository.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Incident-Response-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Incident-Response-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/media-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/program-management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Risk-Assessment-Static-Responses.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/RA-Subnet-IP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CA-Security_Assessment_Authorization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/System_and_Communications_Protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/System_and_Information_Integrity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/PII-Processing-Transparency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Supply-Chain-Risk-Management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/SLA-Status.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Avg-Issue-Age.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Ticket-Status.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/JIRA-Cloud-Animation.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/disa-cis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/K8TLS-600x154-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/K8s-Trend.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/scanning-container-images.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/images-scanning-progress.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ASPM-IaC-SAST-SCA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CWPP_report.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/workload-cloud-ai-compliance.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/towards-fedramp-nist-800-53-accuknox' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/towards-fedramp-nist-800-53-accuknox' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/towards-fedramp-nist-800-53-accuknox' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/towards-fedramp-nist-800-53-accuknox' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/towards-fedramp-nist-800-53-accuknox' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/space-satellite-cyber-security</loc>
		<lastmod>2025-11-18T05:29:38+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Space_Satellite_Security_featured.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/space-satellite-cyber-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/fortress-framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/space-satellite-deployment-workflow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/space-security-arch-blueprint.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Workflow-for-creating-Security-Blueprints.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/operating-zero-trust-space-satellite.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/console-for-alerts-telemetry.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/space-satellite-cyber-security' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/space-satellite-cyber-security' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/space-satellite-cyber-security' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/space-satellite-cyber-security' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/space-satellite-cyber-security' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/ibm-ai-security-breach-report-accuknox-defense</loc>
		<lastmod>2025-11-18T05:24:45+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM-AI-Breach-Report.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/accuknox_ai_spm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/arXiv-preprint.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/demo_application_dashboard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/IBM_BreachReport_Fig33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/defending_against_model_corruption_attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AI-CNAPP-Convergence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/deploy-on.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-Deployment-Models.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-Security-Modules-1024x483.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/key-differentiators.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/ibm-ai-security-breach-report-accuknox-defense' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/ibm-ai-security-breach-report-accuknox-defense' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/ibm-ai-security-breach-report-accuknox-defense' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/ibm-ai-security-breach-report-accuknox-defense' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/ibm-ai-security-breach-report-accuknox-defense' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/gen-3-0-cloud-security</loc>
		<lastmod>2025-11-18T05:18:46+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/gen-3-cloud-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/charting-the-evolution.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/trust-cnapp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox-Security-Modules-1024x483.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/create-filter-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/CNAPP_Dashboard-for-Blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/compliance_support_list.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/AccuKnox_Settings_Integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/customer_success.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/2023/10/github.svg</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/gen-3-0-cloud-security' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/gen-3-0-cloud-security' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/gen-3-0-cloud-security' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/gen-3-0-cloud-security' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/gen-3-0-cloud-security' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/salesloft-data-theft-campaign</loc>
		<lastmod>2025-11-18T05:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/salesloft.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/salesforce_instances.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/platform-aspm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/secrets-testing-scanning.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Production-aspm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Application-aspm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/context-driven-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/automated-policy-generation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/kubearmor-cluster-vault.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/kubectl-apply-vault.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/azure-staging.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/callout_icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/ai-model-cards.webp</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/salesloft-data-theft-campaign' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/salesloft-data-theft-campaign' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/salesloft-data-theft-campaign' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/salesloft-data-theft-campaign' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/salesloft-data-theft-campaign' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/crowdstrike-npm-breach</loc>
		<lastmod>2025-11-18T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Untitled-2025-08-21-0132-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Anatomy-of-Shai-Hulud.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/image-25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/dev-pre_dev-runtime.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/image-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/platform-aspm.webp</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/crowdstrike-npm-breach' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/crowdstrike-npm-breach' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/crowdstrike-npm-breach' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/crowdstrike-npm-breach' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/crowdstrike-npm-breach' rel='alternate'/>
	</url>
	<url>
		<loc>https://accuknox.com/blog/fixing-openshift-ai-cve-2025-10725</loc>
		<lastmod>2025-11-18T05:10:55+00:00</lastmod>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Openshift-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/without-with-accuknox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI02.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI03.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI04.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI05.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI06.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI07.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/affected-packages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Redhat-Openshift-AI08.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/platform-cwpp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://accuknox.com/wp-content/uploads/Build_to_Runtime_Security_AccuKnox.png</image:loc>
		</image:image>
		<xhtml:link hreflang='x-default' href='https://accuknox.com/blog/fixing-openshift-ai-cve-2025-10725' rel='alternate'/>
		<xhtml:link hreflang='en' href='https://accuknox.com/blog/fixing-openshift-ai-cve-2025-10725' rel='alternate'/>
		<xhtml:link hreflang='zh-tw' href='https://accuknox.com/zh-tw/blog/fixing-openshift-ai-cve-2025-10725' rel='alternate'/>
		<xhtml:link hreflang='ko' href='https://accuknox.com/ko/blog/fixing-openshift-ai-cve-2025-10725' rel='alternate'/>
		<xhtml:link hreflang='ja' href='https://accuknox.com/ja/blog/fixing-openshift-ai-cve-2025-10725' rel='alternate'/>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->