<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.confiant.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://blog.confiant.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://blog.confiant.com/p/tracking-software-weaponized-by-criminals</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/analyzing-a-live-aitm-attack-targeting</loc><lastmod>2026-03-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertiser-d-shortiez-abuses-webkit</loc><lastmod>2026-03-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/disrupting-59m-malicious-impressions</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-curious-case-of-mutantbedrogs</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-one-crypto-drainer-template-facilitates</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/a-whirlwind-tour-of-crypto-phishing</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-file-hashes-fail-as-a-malware</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/profiling-hackers-using-the-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/looking-at-chrome-extensions-that</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-trend-of-client-side-fingerprinting</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertising-site-compromise-and</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/exploring-the-impact-of-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/new-macos-bundlore-loader-analysis</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertiser-egobbler-exploits-chrome</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/revealing-how-the-dandelion-group</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-malvertisers-weaponize-device</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-malvertising-campaign-lifecycle</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/uncovering-2017s-largest-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/hands-on-with-malvertisers-sneaky</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-bad-ads-hijack-your-browser-with</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/phantom-stores-retail-impersonation</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/scamclubs-deceptive-landing-pages-bf7989b388d2</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/exploring-scamclub-payloads-via-deobfuscation</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/badtrip-a-chain-of-fake-travel-sites-abuses-search-ads-to-commit-fraud-and-credential-theft-2d794ad90fb7</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertiser-makes-the-big-bucks-on-black-friday-637922cd5865</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/lart-de-levasion-how-shlayer-hides</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/cashrewindo-how-to-age-domains-for-an-investment-scam-like-fine-scotch-a48d22788c84</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-seaflower-installs-backdoors</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertising-threat-actor-yosec-exploits-browser-bugs-to-push-malware-cve-2021-1765-3040dd3c4af1</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/osxshlayer-new-shurprise-unveiling</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/hong-kong-based-malvertiser-brokers</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/massive-egobbler-malvertising-campaign</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/shlayer-purveyor-verymal-renounces</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/confiant-and-malwarebytes-uncover</loc><lastmod>2026-04-10</lastmod><changefreq>monthly</changefreq></url></urlset>