<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.invisirisk.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.invisirisk.com/blog/the-great-npm-heist-what-happened-and-how-invisirisk-protects-you/</loc>
		<lastmod>2026-05-02T09:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/great-npm-heist.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/could-standard-security-attestations-powered-by-invisirisk-have-shielded-the-nhs-supplier-from-the/</loc>
		<lastmod>2026-05-02T10:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/standard-security.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/achieve-software-security-compliance-with-invisirisk/</loc>
		<lastmod>2026-05-02T10:21:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/software-compliance.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/invisirisk-announces-the-launch-of-its-innovative-governance-risk-and-compliance-platform-for-the-s/</loc>
		<lastmod>2026-05-02T10:24:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/ir-grc-platform.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/beyond-open-source-vulnerability-tracking-comprehensive-software-supply-chain-security-with-invisir/</loc>
		<lastmod>2026-05-02T10:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/beyond-open-source.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/ensuring-software-supply-chain-security-with-blessed-open-source-repositories/</loc>
		<lastmod>2026-05-02T11:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/software-supply-chain-security.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/in-depth-analysis-how-invisirisk-baf-effectively-mitigates-github-actions-supply-chain-attacks/</loc>
		<lastmod>2026-05-02T11:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/github-action-security.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/40296a_3170fa8ea7614bf4be885e042fe854b8mv2.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/how-invisirisk-baf-effectively-mitigates-github-actions-supply-chain-attacks-like-the-ultralytics-ac/</loc>
		<lastmod>2026-05-02T11:22:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/invisirisk-baf.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/baf-protective.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/middlewareauthorizationbypass/</loc>
		<lastmod>2026-05-02T11:31:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/cve.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/cve-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/cve-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/cve-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/cve-4.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/don-t-let-a-typo-sink-your-ship/</loc>
		<lastmod>2026-05-02T11:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/typo-sink-your-ship.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/invisirisk-unveils-groundbreaking-build-security-ai-agent/</loc>
		<lastmod>2026-05-02T11:43:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/security-ai-agent.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/github-s-pwn-request-misconfiguration-how-invisirisk-baf-shields-your-ci-cd-from-hidden-threats/</loc>
		<lastmod>2026-05-02T11:48:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/github-pwn.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-5.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-6.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-7.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gpwn-8.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/whyyoursecretsfaucetisstillleaking/</loc>
		<lastmod>2026-05-02T11:50:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/secret-faucet.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/secret-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/secret-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/secret-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/secret-4.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/git-s-silent-takeover-how-a-simple-clone-command-can-compromise-your-entire-system/</loc>
		<lastmod>2026-05-02T11:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/git-takeover.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gits-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gits-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gits-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/gits-4.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/shai-hulud-npm-worm-attack-overview-and-invisirisk-protection/</loc>
		<lastmod>2026-05-02T12:02:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-hulud.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-4.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-5.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-6.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-7.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/the-s1ngularity-attack-weaponizing-ai-cli-tools-and-how-invisirisk-stops-it/</loc>
		<lastmod>2026-05-02T12:08:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/singularity.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/sing-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/sing-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/sing-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/sing-4.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/shai-hulud-worm-reloaded-a-new-wave-of-npm-supply-chain-attacks-and-how-invisirisk-stops-it/</loc>
		<lastmod>2026-05-02T12:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shai-worm.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-2.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-3.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-4.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-6.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/shaiw-7.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/why-the-aws-codebreach-vulnerability-is-a-reminder-we-cant-ignore/</loc>
		<lastmod>2026-05-02T12:18:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/aws-breach.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/why-traditional-devops-security-tools-miss-cicd-pipeline-attacks/</loc>
		<lastmod>2026-05-02T12:26:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/traditional-devops.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/dev-1.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/dev-2.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/hackerbot-claw-ai-driven-pull-request-exploits-in-github-actions-ci-cd/</loc>
		<lastmod>2026-05-02T12:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/hackerbot-claw.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/hack-1.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/sandworm_mode-how-a-shai-hulud-style-npm-worm-targets-ci-cd-pipelines/</loc>
		<lastmod>2026-05-02T12:39:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/sandworm.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/how-attack.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/glassworm-invisible-code-supply-chain-worm-attack/</loc>
		<lastmod>2026-05-02T12:41:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/glassworm.avif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/glass-1.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/teampcp-how-a-supply-chain-attack-hit-build-systems-and-ci-cd-pipelines/</loc>
		<lastmod>2026-05-02T12:43:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/teampcp.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/axios-npm-supply-chain-attack/</loc>
		<lastmod>2026-05-02T12:45:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/axios-npm.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/invisirisk-expands-build-application-firewall-with-encoded-secret-detection/</loc>
		<lastmod>2026-05-02T12:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/invisirisk-expands.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/xinference-pypi-compromise-teampcp-style-credential-stealer/</loc>
		<lastmod>2026-05-02T12:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/pypi.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.invisirisk.com/blog/bitwarden-cli-npm-compromise-bun-staged-credential-stealer/</loc>
		<lastmod>2026-05-02T12:56:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.invisirisk.com/wp-content/uploads/2026/05/bitwarden.avif</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->