<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//r00tcore.com/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://r00tcore.com/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc><lastmod>2026-04-06T20:43:24.000Z</lastmod></url><url><loc>https://r00tcore.com/weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc><lastmod>2026-04-06T20:43:06.000Z</lastmod></url><url><loc>https://r00tcore.com/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc><lastmod>2026-04-06T20:40:55.000Z</lastmod></url><url><loc>https://r00tcore.com/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc><lastmod>2026-04-06T20:40:38.000Z</lastmod></url><url><loc>https://r00tcore.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc><lastmod>2026-04-06T20:40:20.000Z</lastmod></url></urlset>