<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://signals.falconcyber.online/en/</loc>
    <lastmod>2026-02-24T04:17:37Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/</loc>
    <lastmod>2026-02-24T04:17:37Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/</loc>
    <lastmod>2026-02-24T04:17:37Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260224-isc-stormcast-for-tuesday-february-24th-2026-https-isc-sans-edu-e20ae32.html</loc>
    <lastmod>2026-02-24T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260224-isc-stormcast-for-tuesday-february-24th-2026-https-isc-sans-edu-e20ae32.html</loc>
    <lastmod>2026-02-24T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260224-isc-stormcast-for-tuesday-february-24th-2026-https-isc-sans-edu-e20ae32.html</loc>
    <lastmod>2026-02-24T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-c1d6ab4.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-c1d6ab4.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-c1d6ab4.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-613150d.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-613150d.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-613150d.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-multiples-vuln-rabilit-s-dans-microsoft-edge-23-f-vrier-2026-eb7b5d7.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-multiples-vuln-rabilit-s-dans-microsoft-edge-23-f-vrier-2026-eb7b5d7.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-multiples-vuln-rabilit-s-dans-microsoft-edge-23-f-vrier-2026-eb7b5d7.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-muddywater-targets-mena-organizations-with-ghostfetch-char-and-h-4312da1.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-muddywater-targets-mena-organizations-with-ghostfetch-char-and-h-4312da1.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-muddywater-targets-mena-organizations-with-ghostfetch-char-and-h-4312da1.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-to-ed23626.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-to-ed23626.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-to-ed23626.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-isc-stormcast-for-monday-february-23rd-2026-https-isc-sans-edu-p-eb09652.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-isc-stormcast-for-monday-february-23rd-2026-https-isc-sans-edu-p-eb09652.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-isc-stormcast-for-monday-february-23rd-2026-https-isc-sans-edu-p-eb09652.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-how-exposed-endpoints-increase-risk-across-llm-infrastructure-414d73b.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-how-exposed-endpoints-increase-risk-across-llm-infrastructure-414d73b.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-how-exposed-endpoints-increase-risk-across-llm-infrastructure-414d73b.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-apt28-targeted-european-entities-using-webhook-based-macro-malwa-6d9d99e.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-apt28-targeted-european-entities-using-webhook-based-macro-malwa-6d9d99e.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-apt28-targeted-european-entities-using-webhook-based-macro-malwa-6d9d99e.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260223-another-day-another-malicious-jpeg-mon-feb-23rd-1ae2281.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260223-another-day-another-malicious-jpeg-mon-feb-23rd-1ae2281.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260223-another-day-another-malicious-jpeg-mon-feb-23rd-1ae2281.html</loc>
    <lastmod>2026-02-23T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-japanese-language-phishing-emails-sat-feb-21st-0284f02.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-japanese-language-phishing-emails-sat-feb-21st-0284f02.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-japanese-language-phishing-emails-sat-feb-21st-0284f02.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-1be0f85.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-1be0f85.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-1be0f85.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2026-22702-virtualenv-has-toctou-vulnerabilities-in-director-b93a1c5.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2026-22702-virtualenv-has-toctou-vulnerabilities-in-director-b93a1c5.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2026-22702-virtualenv-has-toctou-vulnerabilities-in-director-b93a1c5.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2026-21860-werkzeug-safe-join-allows-windows-special-device-59cdd6b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2026-21860-werkzeug-safe-join-allows-windows-special-device-59cdd6b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2026-21860-werkzeug-safe-join-allows-windows-special-device-59cdd6b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71143-clk-samsung-exynos-clkout-assign-num-before-acces-f59c50c.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71143-clk-samsung-exynos-clkout-assign-num-before-acces-f59c50c.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71143-clk-samsung-exynos-clkout-assign-num-before-acces-f59c50c.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71133-rdma-irdma-avoid-invalid-read-in-irdma-net-event-962adc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71133-rdma-irdma-avoid-invalid-read-in-irdma-net-event-962adc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71133-rdma-irdma-avoid-invalid-read-in-irdma-net-event-962adc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71122-iommufd-selftest-check-for-overflow-in-iommu-test-bc52bc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71122-iommufd-selftest-check-for-overflow-in-iommu-test-bc52bc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71122-iommufd-selftest-check-for-overflow-in-iommu-test-bc52bc2.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71114-via-wdt-fix-critical-boot-hang-due-to-unnamed-res-6349e63.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71114-via-wdt-fix-critical-boot-hang-due-to-unnamed-res-6349e63.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71114-via-wdt-fix-critical-boot-hang-due-to-unnamed-res-6349e63.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71109-mips-ftrace-fix-memory-corruption-when-kernel-is-44ee4b1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71109-mips-ftrace-fix-memory-corruption-when-kernel-is-44ee4b1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71109-mips-ftrace-fix-memory-corruption-when-kernel-is-44ee4b1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71105-f2fs-use-global-inline-xattr-slab-instead-of-per-c351516.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71105-f2fs-use-global-inline-xattr-slab-instead-of-per-c351516.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71105-f2fs-use-global-inline-xattr-slab-instead-of-per-c351516.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71101-platform-x86-hp-bioscfg-fix-out-of-bounds-array-a-cd712af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71101-platform-x86-hp-bioscfg-fix-out-of-bounds-array-a-cd712af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71101-platform-x86-hp-bioscfg-fix-out-of-bounds-array-a-cd712af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71081-asoc-stm32-sai-fix-of-node-leak-on-probe-6babaaf.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71081-asoc-stm32-sai-fix-of-node-leak-on-probe-6babaaf.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71081-asoc-stm32-sai-fix-of-node-leak-on-probe-6babaaf.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71074-functionfs-fix-the-open-removal-races-ff61da9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71074-functionfs-fix-the-open-removal-races-ff61da9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71074-functionfs-fix-the-open-removal-races-ff61da9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71067-ntfs-set-dummy-blocksize-to-read-boot-block-when-edaeb9f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71067-ntfs-set-dummy-blocksize-to-read-boot-block-when-edaeb9f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71067-ntfs-set-dummy-blocksize-to-read-boot-block-when-edaeb9f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71066-net-sched-ets-always-remove-class-from-active-lis-b7da9c3.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71066-net-sched-ets-always-remove-class-from-active-lis-b7da9c3.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71066-net-sched-ets-always-remove-class-from-active-lis-b7da9c3.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-71064-net-hns3-using-the-num-tqps-in-the-vf-driver-to-a-328194f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-71064-net-hns3-using-the-num-tqps-in-the-vf-driver-to-a-328194f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-71064-net-hns3-using-the-num-tqps-in-the-vf-driver-to-a-328194f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68823-ublk-fix-deadlock-when-reading-partition-table-8f56fd9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68823-ublk-fix-deadlock-when-reading-partition-table-8f56fd9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68823-ublk-fix-deadlock-when-reading-partition-table-8f56fd9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68819-media-dvb-usb-dtv5100-fix-out-of-bounds-in-dtv510-4c889eb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68819-media-dvb-usb-dtv5100-fix-out-of-bounds-in-dtv510-4c889eb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68819-media-dvb-usb-dtv5100-fix-out-of-bounds-in-dtv510-4c889eb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68817-ksmbd-fix-use-after-free-in-ksmbd-tree-connect-pu-23aec0d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68817-ksmbd-fix-use-after-free-in-ksmbd-tree-connect-pu-23aec0d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68817-ksmbd-fix-use-after-free-in-ksmbd-tree-connect-pu-23aec0d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68808-media-vidtv-initialize-local-pointers-upon-transf-d01f2d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68808-media-vidtv-initialize-local-pointers-upon-transf-d01f2d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68808-media-vidtv-initialize-local-pointers-upon-transf-d01f2d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68786-ksmbd-skip-lock-range-check-on-equal-size-to-avoi-35d9a5d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68786-ksmbd-skip-lock-range-check-on-equal-size-to-avoi-35d9a5d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68786-ksmbd-skip-lock-range-check-on-equal-size-to-avoi-35d9a5d.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68781-usb-phy-fsl-usb-fix-use-after-free-in-delayed-wor-7868212.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68781-usb-phy-fsl-usb-fix-use-after-free-in-delayed-wor-7868212.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68781-usb-phy-fsl-usb-fix-use-after-free-in-delayed-wor-7868212.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68771-ocfs2-fix-kernel-bug-in-ocfs2-find-victim-chain-389f4d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68771-ocfs2-fix-kernel-bug-in-ocfs2-find-victim-chain-389f4d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68771-ocfs2-fix-kernel-bug-in-ocfs2-find-victim-chain-389f4d0.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68766-irqchip-mchp-eic-fix-error-code-in-mchp-eic-domai-75d09fa.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68766-irqchip-mchp-eic-fix-error-code-in-mchp-eic-domai-75d09fa.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68766-irqchip-mchp-eic-fix-error-code-in-mchp-eic-domai-75d09fa.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68763-crypto-starfive-correctly-handle-return-of-sg-nen-d0bbbb1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68763-crypto-starfive-correctly-handle-return-of-sg-nen-d0bbbb1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68763-crypto-starfive-correctly-handle-return-of-sg-nen-d0bbbb1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68758-backlight-led-bl-add-devlink-to-supplier-leds-e269765.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68758-backlight-led-bl-add-devlink-to-supplier-leds-e269765.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68758-backlight-led-bl-add-devlink-to-supplier-leds-e269765.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68755-staging-most-remove-broken-i2c-driver-72de77b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68755-staging-most-remove-broken-i2c-driver-72de77b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68755-staging-most-remove-broken-i2c-driver-72de77b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-68753-alsa-firewire-motu-add-bounds-check-in-put-user-l-9343dd7.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-68753-alsa-firewire-motu-add-bounds-check-in-put-user-l-9343dd7.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-68753-alsa-firewire-motu-add-bounds-check-in-put-user-l-9343dd7.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-66382-in-libexpat-through-2-7-3-a-crafted-file-with-an-a913993.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-66382-in-libexpat-through-2-7-3-a-crafted-file-with-an-a913993.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-66382-in-libexpat-through-2-7-3-a-crafted-file-with-an-a913993.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-65637-a-denial-of-service-vulnerability-exists-in-githu-daeb31b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-65637-a-denial-of-service-vulnerability-exists-in-githu-daeb31b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-65637-a-denial-of-service-vulnerability-exists-in-githu-daeb31b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-61729-excessive-resource-consumption-when-printing-erro-c6c880f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-61729-excessive-resource-consumption-when-printing-erro-c6c880f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-61729-excessive-resource-consumption-when-printing-erro-c6c880f.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-61727-improper-application-of-excluded-dns-name-constra-0c66151.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-61727-improper-application-of-excluded-dns-name-constra-0c66151.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-61727-improper-application-of-excluded-dns-name-constra-0c66151.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-58436-openprinting-cups-slow-client-can-halt-cupsd-lead-6346f93.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-58436-openprinting-cups-slow-client-can-halt-cupsd-lead-6346f93.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-58436-openprinting-cups-slow-client-can-halt-cupsd-lead-6346f93.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-48637-in-multiple-functions-of-mem-protect-c-there-is-a-cdebce9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-48637-in-multiple-functions-of-mem-protect-c-there-is-a-cdebce9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-48637-in-multiple-functions-of-mem-protect-c-there-is-a-cdebce9.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-40289-drm-amdgpu-hide-vram-sysfs-attributes-on-gpus-wit-5c9dc82.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-40289-drm-amdgpu-hide-vram-sysfs-attributes-on-gpus-wit-5c9dc82.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-40289-drm-amdgpu-hide-vram-sysfs-attributes-on-gpus-wit-5c9dc82.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-40215-xfrm-delete-x-tunnel-as-we-delete-x-20d4b74.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-40215-xfrm-delete-x-tunnel-as-we-delete-x-20d4b74.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-40215-xfrm-delete-x-tunnel-as-we-delete-x-20d4b74.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-34468-libcoap-stack-based-buffer-overflow-in-address-re-c961e89.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-34468-libcoap-stack-based-buffer-overflow-in-address-re-c961e89.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-34468-libcoap-stack-based-buffer-overflow-in-address-re-c961e89.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-29768-vim-vulnerable-to-potential-data-loss-with-zip-vi-a17a1af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-29768-vim-vulnerable-to-potential-data-loss-with-zip-vi-a17a1af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-29768-vim-vulnerable-to-potential-data-loss-with-zip-vi-a17a1af.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-2953-pytorch-torch-mkldnn-max-pool2d-denial-of-service-1b4489e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-2953-pytorch-torch-mkldnn-max-pool2d-denial-of-service-1b4489e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-2953-pytorch-torch-mkldnn-max-pool2d-denial-of-service-1b4489e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21866-powerpc-code-patching-fix-kasan-hit-by-not-flaggi-c60cb16.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21866-powerpc-code-patching-fix-kasan-hit-by-not-flaggi-c60cb16.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21866-powerpc-code-patching-fix-kasan-hit-by-not-flaggi-c60cb16.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21864-tcp-drop-secpath-at-the-same-time-as-we-currently-05cadf1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21864-tcp-drop-secpath-at-the-same-time-as-we-currently-05cadf1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21864-tcp-drop-secpath-at-the-same-time-as-we-currently-05cadf1.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21863-io-uring-prevent-opcode-speculation-b2b8847.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21863-io-uring-prevent-opcode-speculation-b2b8847.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21863-io-uring-prevent-opcode-speculation-b2b8847.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-5c023dc.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-5c023dc.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21861-mm-migrate-device-don-t-add-folio-to-be-freed-to-5c023dc.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21856-s390-ism-add-release-function-for-struct-device-8c53908.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21856-s390-ism-add-release-function-for-struct-device-8c53908.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21856-s390-ism-add-release-function-for-struct-device-8c53908.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios-359888e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios-359888e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21855-ibmvnic-don-t-reference-skb-after-sending-to-vios-359888e.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21847-asoc-sof-stream-ipc-check-for-cstream-nullity-in-0b331da.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21847-asoc-sof-stream-ipc-check-for-cstream-nullity-in-0b331da.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21847-asoc-sof-stream-ipc-check-for-cstream-nullity-in-0b331da.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21846-acct-perform-last-write-from-workqueue-dc9be2b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21846-acct-perform-last-write-from-workqueue-dc9be2b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21846-acct-perform-last-write-from-workqueue-dc9be2b.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-21839-kvm-x86-load-dr6-with-guest-value-only-before-ent-84df854.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-21839-kvm-x86-load-dr6-with-guest-value-only-before-ent-84df854.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-21839-kvm-x86-load-dr6-with-guest-value-only-before-ent-84df854.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-1767-this-cve-only-affects-kubernetes-clusters-that-uti-f6e71bb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-1767-this-cve-only-affects-kubernetes-clusters-that-uti-f6e71bb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-1767-this-cve-only-affects-kubernetes-clusters-that-uti-f6e71bb.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/en/s/20260221-cve-2025-15444-crypt-sodium-xs-module-versions-prior-to-0-000042-857a3b6.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ru/s/20260221-cve-2025-15444-crypt-sodium-xs-module-versions-prior-to-0-000042-857a3b6.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
  <url>
    <loc>https://signals.falconcyber.online/ar/s/20260221-cve-2025-15444-crypt-sodium-xs-module-versions-prior-to-0-000042-857a3b6.html</loc>
    <lastmod>2026-02-21T00:00:00Z</lastmod>
  </url>
</urlset>
