<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.confiant.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://blog.confiant.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://blog.confiant.com/p/tracking-software-weaponized-by-criminals</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/analyzing-a-live-aitm-attack-targeting</loc><lastmod>2026-03-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertiser-d-shortiez-abuses-webkit</loc><lastmod>2026-03-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/disrupting-59m-malicious-impressions</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-curious-case-of-mutantbedrogs</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-one-crypto-drainer-template-facilitates</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/a-whirlwind-tour-of-crypto-phishing</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-file-hashes-fail-as-a-malware</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/profiling-hackers-using-the-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/looking-at-chrome-extensions-that</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-trend-of-client-side-fingerprinting</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertising-site-compromise-and</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/exploring-the-impact-of-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/new-macos-bundlore-loader-analysis</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/malvertiser-egobbler-exploits-chrome</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/revealing-how-the-dandelion-group</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-malvertisers-weaponize-device</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/the-malvertising-campaign-lifecycle</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/uncovering-2017s-largest-malvertising</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/hands-on-with-malvertisers-sneaky</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-bad-ads-hijack-your-browser-with</loc><lastmod>2026-02-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/phantom-stores-retail-impersonation</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/exploring-scamclub-payloads-via-deobfuscation</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.confiant.com/p/how-seaflower-installs-backdoors</loc><lastmod>2026-04-01</lastmod><changefreq>monthly</changefreq></url></urlset>