<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.seclookup.com</loc>
    <lastmod>2026-04-21T16:15:07.694Z</lastmod>
    <changefreq>always</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-evolution-of-eviltokens-analyzing-ai-enabled-device-code-phishing-campaigns</loc>
    <lastmod>2026-04-15T17:05:08.999Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-proxifier-trap-analyzing-the-clipbanker-marathon-infection-chain</loc>
    <lastmod>2026-04-15T16:53:46.271Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/unmasking-lucidrook-a-deep-dive-into-uat-10362-s-lua-based-campaign-against-taiwan</loc>
    <lastmod>2026-04-15T16:52:25.011Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/analyzing-the-cpuid-watering-hole-stx-rat-distribution-via-trojanized-system-tools</loc>
    <lastmod>2026-04-15T16:48:37.305Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/clickfix-evolution-cross-platform-social-engineering-targeting-enterprise-workflows</loc>
    <lastmod>2026-03-26T08:35:18.137Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/weaponizing-the-watcher-analyzing-the-teampcp-trivy-supply-chain-compromise</loc>
    <lastmod>2026-03-26T08:34:03.726Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/exploiting-trust-purehvnc-rat-delivery-via-malicious-google-forms</loc>
    <lastmod>2026-03-21T05:40:12.279Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft</loc>
    <lastmod>2026-03-20T05:54:37.524Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/unpacking-the-sapecar-campaign-technical-analysis-of-the-horabot-banking-trojan-in-mexico</loc>
    <lastmod>2026-03-19T19:31:29.294Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/unmasking-darksword-the-proliferation-of-a-new-ios-full-chain-exploit-across-global-threat-actors</loc>
    <lastmod>2026-03-19T19:28:53.325Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/ipv6-obfuscation-tactics-in-healthcare-phishing-analyzing-the-free-toothbrush-campaign</loc>
    <lastmod>2026-03-19T05:02:24.352Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/analysis-vidar-infostealer-campaigns-weaponize-clickfix-tactics-via-compromised-cms</loc>
    <lastmod>2026-03-19T05:00:36.779Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-quiz-deception-push-notification-spam-campaign-targets-users-via-browser-permissions</loc>
    <lastmod>2026-03-14T09:00:12.240Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/silent-takeover-how-a-fake-google-meet-update-hijacks-windows-devices-via-mdm-enrollment</loc>
    <lastmod>2026-03-14T08:59:26.074Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/impersonating-productivity-malicious-ai-extensions-targeting-enterprise-chat-histories</loc>
    <lastmod>2026-03-14T08:58:26.401Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/deceptive-cleanmymac-site-delivers-shub-stealer-and-crypto-wallet-backdoors-via-clickfix-technique</loc>
    <lastmod>2026-03-14T08:56:43.301Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-fake-cloudflare-lure-a-global-wordpress-compromise-leading-to-credential-theft</loc>
    <lastmod>2026-03-11T13:01:46.044Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-rise-of-tycoon2fa-analyzing-the-largest-aitm-phishing-as-a-service-platform</loc>
    <lastmod>2026-03-11T13:00:12.068Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/operation-uat-9244-china-nexus-apt-targets-south-american-telecoms-with-three-malware-implants</loc>
    <lastmod>2026-03-10T11:15:37.898Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/beatbanker-android-malware-campaign-hijacking-devices-via-fake-play-store-and-persistent-audio-loops</loc>
    <lastmod>2026-03-10T11:11:52.084Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/analysis-of-arkanix-stealer-a-dual-mode-infostealer-leveraging-chromelevator-and-dynamic-configuration</loc>
    <lastmod>2026-02-27T16:54:27.587Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/firmware-level-malware-uncovering-the-keenadu-backdoor-and-android-botnet-connections</loc>
    <lastmod>2026-02-27T16:54:12.959Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/the-2026-threat-landscape-why-domain-intelligence-has-become-essential-for-enterprise-security</loc>
    <lastmod>2026-02-14T15:23:51.272Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/archive</loc>
    <lastmod>2026-04-21T16:15:07.695Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.seclookup.com/recommendations</loc>
    <lastmod>2026-04-21T16:15:07.695Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.4</priority>
  </url>
</urlset>